Books on the topic 'Sécurité des données routières'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Sécurité des données routières.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Burkina Faso. Ministère du travail et de la sécurité sociale. Travail et sécurité sociale: Analyse des données. Ministère du Travail et de la Sécurité Sociale, Secrétariat Général, 2008.
Find full textEkoni, Gérard Ekoni. Sécurité routière: L'Afrique, face à la récurrence des tragédies routières, peut-elles s'en sortir? Éditions Cheikh Anta Diop, 2020.
Find full textCanada, Canada Santé. Pour la sécurité des jeunes canadiens: Des données statistiques aux mesures préventives. Santé Canada, 1997.
Find full textCanada. Human Resources Development Canada., ed. Social security in Canada ; background facts =: La sécurité sociale au Canada ; données documentaires. Human Resources Development Canada, 1994.
Find full textCanada. Human Resources Development Canada., ed. Social security in Canada: Background facts = La sécurité sociale au Canada : données documentaires. Human Resources Development Canada, 1994.
Find full textmédicaments, Canada Direction des. Gestion des données cliniques sur l'innocuité des médicaments: Définitions et normes relatives à la déclaration rapide. Direction générale de la protection de la santé, Santé Canada, 1995.
Find full textGodefroy, Thierry. Les coûts du crime en France: Les dépenses de sécurité, données pour 1988 à 1991. CESDIP, 1993.
Find full textCanada, Gendarmerie royale du. Norme de sécurité technique dans le domaine de la technologie de l'information (NSTTI). Gendarmerie royale du Canada, 1992.
Find full textFaragallah, Osama S. Multilevel security for relational databases. Taylor & Francis, CRC Press, 2015.
Find full textDordoigne, José. Réseaux informatiques: Notions fondamentales : protocoles, architectures, réseaux sans fil, virtualisation, sécurité, IP v6 ... 6th ed. Éd. ENI, 2015.
Find full textEuropean Symposium on Research in Computer Security (3rd 1994 Brighton, England). Computer security: ESORICS 94 : third European Symposium on Research in Computer Security, Brighton, United Kingdom, November 7-9, 1994 : proceedings. Springer-Verlag, 1994.
Find full textFréchet, Guy. Les personnes moyennement scolarisées et la précarité de l'emploi: Une analyse des données de l'Enquête sur l'activité. Institut québécois de recherche sur la culture, 1991.
Find full textBauer, Friedrich Ludwig. Decrypted secrets: Methods and maxims of cryptology. Springer, 1997.
Find full textPolice, Royal Canadian Mounted. Technical security standards for information technology (TSSIT) =: Normes de sécurité technique dans le domaine de la technologie de l'information. Royal Canadian Mounted Police = Gendarmerie royale du Canada, 1992.
Find full text1962-, Jonker Willem, and Petković Milan, eds. Secure data management: Second VLDB workshop, SDM 2005, Trondheim, Norway, September 2-3, 2005 : proceedings. Springer, 2005.
Find full textRussia) EUROCRYPT (Conference) (25th 2006 Saint Petersburg. Advances in cryptology -- EUROCRYPT 2006: 24th annual International Conference on the Theory and Applications of Cryptographic Techniques,St Petersburg, Russia, May 28-June 1, 2006 : proceedings. Springer, 2006.
Find full text1947-, Young Curtis W., ed. Mastering SQL Server 2000 security. Wiley Computer Pub., 2002.
Find full textBen-Natan, Ron. Implementing database security and auditing: A guide for DBAs, information security administrators and auditors. Elsevier Digital Press, 2005.
Find full textIFIP TC11 International Conference on Information Security (11th 1995 Cape Town, South Africa). Information security-the next decade: Proceedings of the IFIP TC11 Eleventh International Conference on Information Security, IFIP/Sec '95. Chapman & Hall on behalf of the IFIP, 1995.
Find full textMcCumber, John. Assessing and managing security risk in IT systems: A structured methodology. Auerbach Publications, 2005.
Find full textEuropean Commission. Directorate General XV, Internal Market and Financial Services, ed. IDA: Protection des données : secteurs de la santé de la sécurité sociale : annexe au rapport annuel 1998 (XV D/5047/98) du groupe de travail établi par l'article 29 de la directive 95/46/CE. Office des publications officielles des Communautés européennes, 1999.
Find full textSauveur, Paula. La protection du secret commercial dans les nuages publics de l'infonuagique (cloud computing). Éditions Y. Blais, 2013.
Find full textInternational Conference for Occupational Health, Safety and Hygiene Information Specialists (1989 Luxembourg). Industrial health and safety: International conference for occupational health, safety and hygiene information specialists. Commission of the European Communities, Directorate-General, Telecommunications, Information Industries and Innovation, 1990.
Find full textQuality, American Society for, ed. Data integrity and compliance: A primer for medical product manufacturers. ASQ Quality Press, 2019.
Find full textLacey, David. Managing the Human Factor in Information Security. John Wiley & Sons, Ltd., 2009.
Find full textJavier, López, Yeo Sang-Soo, Shon Taeshik, Taniar David, and SpringerLink (Online service), eds. Secure and Trust Computing, Data Management and Applications: 8th FIRA International Conference, STA 2011, Loutraki, Greece, June 28-30, 2011. Proceedings. Springer-Verlag GmbH Berlin Heidelberg, 2011.
Find full textIcove, David, Karl Seger, and William VonStorch. Computer Crime: A Crimefighter's Handbook. O'Reilly, 1995.
Find full text1940-, Seger Karl A., and VonStorch William R, eds. Computer Crime: A Crimefighter's Handbook. O'Reilly & Associates, 1995.
Find full textVitalis, Nadine. PEUT-ON CONCILIER L’INTERNET DES OBJETS ET LA SÉCURITÉ DES DONNÉES PERSONNELLES ? Independently Published, 2019.
Find full textIdentifiants and Mots de Passe: Pour la Sécurité de Vos Données, Soyez Prudent ! Independently Published, 2020.
Find full textMultilevel Security for Relational Databases. Auerbach Publishers, Incorporated, 2014.
Find full textEl-Samie, Fathi E. Abd, El-Sayed M. El-Rabaie, Osama S. Faragallah, Ahmed I. Sallam, and Hala S. El-Sayed. Multilevel Security for Relational Databases. Auerbach Publishers, Incorporated, 2014.
Find full textEl-Rabaie, El-Sayed M., Osama S. Faragallah, and Fathi E. El-Samie. Multilevel Security for Relational Databases. Taylor & Francis Group, 2015.
Find full textDatabase and Applications Security: Integrating Information Security and Data Management. AUERBACH, 2005.
Find full textThuraisingham, Bhavani. Database and Applications Security: Integrating Information Security and Data Management. Auerbach Publishers, Incorporated, 2005.
Find full textThuraisingham, Bhavani. Database and Applications Security: Integrating Information Security and Data Management. Auerbach Publishers, Incorporated, 2005.
Find full textSavas, Onur, and Julia Deng. Big Data Analytics in Cybersecurity. Taylor & Francis Group, 2021.
Find full textHu, Fei. Big Data: Storage, Sharing, and Security. Auerbach Publishers, Incorporated, 2016.
Find full textHu, Fei. Big Data: Storage, Sharing, and Security. Auerbach Publishers, Incorporated, 2016.
Find full textYu, Philip S., Ke Wang, Benjamin C. M. Fung, and Ada Wai-Chee Fu. Introduction to Privacy-Preserving Data Publishing: Concepts and Techniques. Taylor & Francis Group, 2010.
Find full text