To see the other types of publications on this topic, follow the link: Logiciel – Mesures de sûreté.

Books on the topic 'Logiciel – Mesures de sûreté'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Logiciel – Mesures de sûreté.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Highland, Harold Joseph. Comment protéger votre micro: Matériel et logiciel : protection et confidentialité en micro-informatique. Masson, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Paget, François. Vers & virus: Classification, lutte anti-virale et perspectives. Dunod, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hansteen, Peter N. M. Le livre de PF: Packet filter. Eyrolles, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Faith, Cranor Lorrie, and Garfinkel Simson, eds. Security and Usability: Designing Secure Systems That People Can Use. O'Reilly, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Canada. Approvisionnements et services Canada. Manuel de la sécurité industrielle. Ministre des approvisionnements et services Canada, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jan, Christophe. La sécurité informatique. Eyrolles, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Boutherin, Bernard. Se curiser un re seau Linux. 3rd ed. Eyrolles, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Commission canadienne de sûreté nucléaire. Les programmes informatiques utilisés lors de la conception et des analyses de sûreté des centrales nucléaires et des réacteurs de recherche. Commission canadienne de sûreté nucléaire, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

CRYPTO (Conference) (1992 Santa Barbara, Calif.). Advances in cryptology--CRYPTO '92: 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992 : proceedings. Springer-Verlag, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Canada, Gendarmerie royale du. Norme de sécurité technique dans le domaine de la technologie de l'information (NSTTI). Gendarmerie royale du Canada, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Commission canadienne de sûreté nucléaire. Rapport national du Canada pour la Convention sur la sûreté nucléaire: Deuxième réunion d'examen de la Convention. Commission canadienne de sûreté nucléaire, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Post, Richard S. Security administration: An introduction to the protective services. 4th ed. Butterworth-Heinemann, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

European Symposium on Research in Computer Security (3rd 1994 Brighton, England). Computer security: ESORICS 94 : third European Symposium on Research in Computer Security, Brighton, United Kingdom, November 7-9, 1994 : proceedings. Springer-Verlag, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Bauer, Friedrich Ludwig. Decrypted secrets: Methods and maxims of cryptology. Springer, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Schneier, Bruce. Cryptographie appliquée: Protocoles, algorithmes et codes sources en C. 2nd ed. Vuibert, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Lucas, Michael. PGP & GPG: Assurer la confidentialite de son courrier e lectronique. E ditions Eyrolles, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Lucas, Michael. PGP & GPG: Email for the practical paranoid. No Starch Press, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Lucas, Michael. PGP & GPG: Assurer la confidentialité de son courrier électronique. Eyrolles, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Slatalla, Michelle. Masters of deception: The gang that ruled cyberspace. HarperCollins Publishers, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Schneier, Bruce. E-mail security: How to keep your electronic messages private. Wiley, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Police, Royal Canadian Mounted. Technical security standards for information technology (TSSIT) =: Normes de sécurité technique dans le domaine de la technologie de l'information. Royal Canadian Mounted Police = Gendarmerie royale du Canada, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

J, Simmons Gustavus, and Institute of Electrical and Electronics Engineers., eds. Contemporary cryptology: The science of information integrity. IEEE Press, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Anguilla), FC '98 (1998. Financial cryptography: Second International Conference, FC '98, Anguilla, British West Indies, February 23-25, 1998 : proceedings. Springer, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Anguilla), FC '97 (1997. Financial cryptography: First International Conference, FC '97, Anguilla, British West Indies, February 24-28, 1997 : proceedings. Springer, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Commission, Canadian Nuclear Safety. Strategic plan 2002-2007 and corporate plan 2002-2004 =: Plan stratégique 2002-2007 et plan directeur 2002-2004. Canadian Nuclear Safety Commission = Commission canadienne de sûreté nucléaire, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Commission, Canadian Nuclear Safety. Strategic plan 2002-2007 and corporate plan 2002-2004. Canadian Nuclear Safety Commission, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Commission, Canadian Nuclear Safety. Canadian national report for the Convention on Nuclear Safety: Second review meeting. Canadian Nuclear Safety Commission, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Jaworski, Jamie. Java sécurité. CampusPress, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Charles, Miller. Microcomputer and LAN security =: La sécurité des micro-ordinateurs et des réseaux locaux. Minister of Government Services Canada = Ministre des services gouvernementaux Canada, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Canada. Dept. of Foreign Affairs and International Trade. Nuclear : Joint convention on the safety of spent fuel management and on the safety of radioactive waste management, Vienna, September 5, 1997, signed by Canada May 7, 1998, ratified by Canada May 7, 1998, in force June 18, 2001, in force for Canada June 18, 2001 =: Nucléaire : convention commune sur la sûreté de la gestion du combustile usé et sur la sûreté de la gestion des déchets radioactifs, Vienne le 5 septembre 1997, signé par le Canada le 7 mai 1998, ratification du Canada le 7 mai 1998, en vigueur le 18 juin 2001, en vigueur pour le Canada le 18 juin 2001. Minister of Public Works and Government Services Canada = Ministre des travaux publics et services gouvernementaux Canada, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Buchanan, Sally. Disaster planning: Preparedness and recovery for libraries and archives. General Information Programme and UNISIST, United Nations Educational, Scientific, and Cultural Organization, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Anthony, Maeder, and Martin-Sanchez Fernando J, eds. Health Informatics: Building a healthcare future through trusted information ; selected papers from the 20th Australian National Health Informatics Conference (HIC 2012). IOS Press Inc., 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Tim, Ambrose, and Runyard Sue, eds. Forward planning: A handbook of business, corporate and development planning for museums and galleries. Museums & Galleries Commission in conjunction with Routledge, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Symposium, on Disaster Contingency Planning for Information Managers in Archives Libraries and Record Centres (1985 Toronto Ont ). Proceedings of An ounce of Prevention: A symposium on Disaster Contingency Planning for Information Managers in Archives, Libraries and Record Centres, Toronto, March 7 and 8, 1985. Toronto Area Archivists Group Education Foundation, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Icove, David, Karl Seger, and William VonStorch. Computer Crime: A Crimefighter's Handbook. O'Reilly, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

1940-, Seger Karl A., and VonStorch William R, eds. Computer Crime: A Crimefighter's Handbook. O'Reilly & Associates, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Programme for International Student Assessment. and Organisation for Economic Co-operation and Development., eds. PISA 2003 data analysis manual: SAS users. OECD, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

1970-, Amyot Daniel, and Williams Alan W, eds. System analysis and modeling: 4th international SDL and MSC workshop, SAM 2004, Ottawa, Canada, June 1-4, 2004 : revised selected papers. Springer, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Garfinkel, Simson. Practical UNIX and Internet security. 3rd ed. O'Reilly, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Garfinkel, Simson. Practical UNIX Security. O'Reilly & Associates, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Garfinkel, Simson. Practical UNIX and Internet Security. 2nd ed. O'Reilly & Associates, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Cranor, Lorrie Faith, and Simson Garfinkel. Security and Usability: Designing Secure Systems that People Can Use. O'Reilly Media, Inc., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Cranor, Lorrie Faith, and Simson Garfinkel. Security and Usability: Designing Secure Systems That People Can Use. O'Reilly Media, Incorporated, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Cranor, Lorrie Faith, and Simson Garfinkel. Security and Usability: Designing Secure Systems That People Can Use. O'Reilly Media, Incorporated, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Cranor, Lorrie Faith, and Simson Garfinkel. Security and Usability: Designing Secure Systems That People Can Use. O'Reilly Media, Incorporated, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Secrets and lies: Digital security in a networked world. John Wiley, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Vigna, Giovanni. Mobile Agents and Security. Springer London, Limited, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

L' entreprise aux aguets: Information, surveillance de l'environnement, propriété et protection industrielles, espionnage et contre-espionnage au service de la compétitivité. Masson, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Health and safety in the workplace - a model program. CCH Canadian Ltd, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Stephens, Brian, and Eric Larson. Administrating Web Servers, Security, & Maintenance Interactive Workbook. Prentice Hall PTR, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!