Books on the topic 'Sécurité ordinateur'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Sécurité ordinateur.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Charles, Miller. Microcomputer and LAN security =: La sécurité des micro-ordinateurs et des réseaux locaux. Minister of Government Services Canada = Ministre des services gouvernementaux Canada, 1993.
Find full text1962-, Jonker Willem, and Petković Milan, eds. Secure data management: Second VLDB workshop, SDM 2005, Trondheim, Norway, September 2-3, 2005 : proceedings. Springer, 2005.
Find full textCanada, Gendarmerie royale du. Norme de sécurité technique dans le domaine de la technologie de l'information (NSTTI). Gendarmerie royale du Canada, 1992.
Find full textTanenbaum, Andrew S. Modern operating systems. École des traducteurs et interprètes, Université Laurentienne, 1993.
Find full textTanenbaum, Andrew S. Modern operating systems. 3rd ed. Pearson/Prentice Hall, 2008.
Find full textLin, Zhengxi. Les effets des ordinateurs sur le stress au travail, la sécurité d'emploi et l'intérêt que présente le travail au Canada: Rapport final. Direction générale de la recherche appliquée, Développement des ressources humaines Canada, 2002.
Find full textClaviez, Jacques. Informatique et techniques associées: Les bases : préparation aux examens et concours : veille technologique. 7th ed. Éditions JCI, 2001.
Find full textEuropean Symposium on Research in Computer Security (3rd 1994 Brighton, England). Computer security: ESORICS 94 : third European Symposium on Research in Computer Security, Brighton, United Kingdom, November 7-9, 1994 : proceedings. Springer-Verlag, 1994.
Find full textPolice, Royal Canadian Mounted. Technical security standards for information technology (TSSIT) =: Normes de sécurité technique dans le domaine de la technologie de l'information. Royal Canadian Mounted Police = Gendarmerie royale du Canada, 1992.
Find full textRaouf, Boutaba, ed. Intrusion detection networks: A key to collaborative security. Taylor & Francis/CRC, 2014.
Find full textTanenbaum, Andrew S. Modern operating systems. 2nd ed. Prentice Hall International, 2001.
Find full textTanenbaum, Andrew S. Modern Operating Systems: Second Edition. 2nd ed. Prentice Hall, 2001.
Find full textTanenbaum, Andrew S. Modern operating systems. 3rd ed. Pearson-Prentice International, 2009.
Find full textManish, Chaitanya, ed. Architecting secure software systems. CRC Press/Taylor & Francis Group, 2008.
Find full textRussia) EUROCRYPT (Conference) (25th 2006 Saint Petersburg. Advances in cryptology -- EUROCRYPT 2006: 24th annual International Conference on the Theory and Applications of Cryptographic Techniques,St Petersburg, Russia, May 28-June 1, 2006 : proceedings. Springer, 2006.
Find full text1945-, Clark Andrew, and Lynas David 1964-, eds. Enterprise security architecture: A business-driven approach. CMP Books, 2005.
Find full textIFIP TC11 International Conference on Information Security (11th 1995 Cape Town, South Africa). Information security-the next decade: Proceedings of the IFIP TC11 Eleventh International Conference on Information Security, IFIP/Sec '95. Chapman & Hall on behalf of the IFIP, 1995.
Find full textJ, Simmons Gustavus, and Institute of Electrical and Electronics Engineers., eds. Contemporary cryptology: The science of information integrity. IEEE Press, 1992.
Find full textHUGUES, Tanguy. Protéger Mon Ordinateur: Manuel de Sécurité Informatique. Lulu Press, Inc., 2010.
Find full textBooks, Stefan Steven. Garde-Corps - Garde-Corps - Sécurité: DIN A5 Cadeau de Sécurité Pour Ordinateur Portable Avec 120 Pages. Independently Published, 2022.
Find full textMultilevel modeling of secure systems in QoP-ML. CRC Press/Taylor & Francis Group, 2016.
Find full textMordue, Stefan, and Roland Finch. BIM for Construction Health and Safety. RIBA Publications, 2019.
Find full textMordue, Stefan, and Roland Finch. BIM for Construction Health and Safety. RIBA Publications, 2019.
Find full textNussbaumer, Henri. Informatique industrielle, tome 4. Commande numérique, téléinformatique, sécurité, sûreté, fiabilité. Presses Polytechniques et, 1987.
Find full textTanenbaum, Andrew S., and Herbert Bos. Modern Operating Systems: Global Edition. Pearson Education, Limited, 2015.
Find full textTanenbaum, Andrew S., and Herbert Bos. Moderne Betriebssysteme. Pearson Studium, 2016.
Find full textS, Tanenbaum E. Modern operating systems. (Ed 3) / Sovremennye operatsionnye sistemy.(izd 3). Piter, 2010.
Find full textMaximum Linux security: A hacker's guide to protecting your Linux server and workstation. Sams, 2000.
Find full textMalcolm, James A., Michael Roe, Bruno Crispo, and Bruce Christianson. Security Protocols: 9th International Workshop, Cambridge, UK, April 25-27, 2001 Revised Papers. Springer London, Limited, 2003.
Find full textLippmann, Richard, Christopher Kruegel, and Clark Andrew. Recent Advances in Intrusion Detection: 10th International Symposium, RAID 2007, Gold Coast, Australia, September 5-7, 2007, Proceedings. Springer London, Limited, 2007.
Find full textBoutaba, Raouf, and Carol Fung. Intrusion Detection Networks: A Key to Collaborative Security. Auerbach Publishers, Incorporated, 2013.
Find full textBoutaba, Raouf, and Carol Fung. Intrusion Detection Networks: A Key to Collaborative Security. Auerbach Publishers, Incorporated, 2013.
Find full textBoutaba, Raouf, and Carol Fung. Intrusion Detection Networks: A Key to Collaborative Security. Taylor & Francis Group, 2013.
Find full text