To see the other types of publications on this topic, follow the link: Cryptographie logicielle.

Books on the topic 'Cryptographie logicielle'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 25 books for your research on the topic 'Cryptographie logicielle.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Lucas, Michael. PGP & GPG: Assurer la confidentialite de son courrier e lectronique. E ditions Eyrolles, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lucas, Michael. PGP & GPG: Email for the practical paranoid. No Starch Press, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lucas, Michael. PGP & GPG: Assurer la confidentialité de son courrier électronique. Eyrolles, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Faith, Cranor Lorrie, and Garfinkel Simson, eds. Security and Usability: Designing Secure Systems That People Can Use. O'Reilly, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Stamp, Mark. Information Security. John Wiley & Sons, Ltd., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

McAndrew, Alasdair. Introduction to Cryptography with Open-Source Software. Taylor & Francis Group, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Introduction to cryptography with open-source software. CRC Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Cranor, Lorrie Faith, and Simson Garfinkel. Security and Usability: Designing Secure Systems that People Can Use. O'Reilly Media, Inc., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cranor, Lorrie Faith, and Simson Garfinkel. Security and Usability: Designing Secure Systems That People Can Use. O'Reilly Media, Incorporated, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cranor, Lorrie Faith, and Simson Garfinkel. Security and Usability: Designing Secure Systems That People Can Use. O'Reilly Media, Incorporated, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Cranor, Lorrie Faith, and Simson Garfinkel. Security and Usability: Designing Secure Systems That People Can Use. O'Reilly Media, Incorporated, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Apache Accumulo for Developers. Packt Publishing, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Apache Accumulo for Developers. Packt Publishing, Limited, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Stamp, Mark. Information Security: Principles and Practice. Wiley & Sons, Incorporated, John, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Stamp, Mark. Information Security: Principles and Practice. Wiley & Sons, Incorporated, John, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Stamp, Mark. Information Security: Principles and Practice. Wiley & Sons, Incorporated, John, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Stamp, Mark. Information Security: Principles and Practice. Wiley & Sons, Incorporated, John, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Stamp, Mark. Information Security: Principles and Practice. Wiley-Interscience, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Stamp, Mark. Information Security: Principles and Practice. Wiley & Sons, Incorporated, John, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Stamp, Mark. Information Security. Wiley & Sons, Incorporated, John, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Secrets and lies: Digital security in a networked world. John Wiley, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Information security: Principles and practice. Wiley-Interscience, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Information Security: Principles and Practice. Wiley & Sons, Incorporated, John, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Information Security: Principles and Practice. Wiley & Sons, Limited, John, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Information Security. Wiley & Sons Canada, Limited, John, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!