Books on the topic 'Systèmes informatiques – Mesures de sûreté – Offuscation (informatique)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 17 books for your research on the topic 'Systèmes informatiques – Mesures de sûreté – Offuscation (informatique).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Jan, Christophe. La sécurité informatique. Paris: Eyrolles, 1989.
Bauer, Friedrich Ludwig. Decrypted secrets: Methods and maxims of cryptology. Berlin: Springer, 1997.
Hansteen, Peter N. M. Le livre de PF: Packet filter. Paris: Eyrolles, 2009.
Paget, François. Vers & virus: Classification, lutte anti-virale et perspectives. Paris: Dunod, 2005.
Schneier, Bruce. E-mail security: How to keep your electronic messages private. New York: Wiley, 1995.
N.S.W.) Australian National Health Informatics Conference (20th 2012 Sydney. Health Informatics: Building a healthcare future through trusted information ; selected papers from the 20th Australian National Health Informatics Conference (HIC 2012). Amsterdam: IOS Press Inc., 2012.
Jaworski, Jamie. Java sécurité. Paris: CampusPress, 2001.
IH 2009 (2009 Darmstadt, Germany). Information hiding: 11th international workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009 : revised selected papers. Berlin: Springer, 2009.
Garfinkel, Simson. Practical UNIX and Internet Security. 2nd ed. Bonn: O'Reilly & Associates, 1996.
Garfinkel, Simson. Practical UNIX and Internet security. 3rd ed. Beijing: O'Reilly, 2003.
sais-je?, Que, Serge Lhoste, and Éric Léopold. La Sécurité informatique. Presses Universitaires de France - PUF, 2003.
Cranor, Lorrie Faith, and Simson Garfinkel. Security and Usability: Designing Secure Systems that People Can Use. O'Reilly Media, Inc., 2005.
Faith, Cranor Lorrie, and Garfinkel Simson, eds. Security and Usability: Designing Secure Systems That People Can Use. Beijing: O'Reilly, 2005.
(Editor), Bart Preneel, Rene Govaerts (Editor), and Joos Vandewalle (Editor), eds. Computer Security and Industrial Cryptography: State of the Art and Evolution. ESAT Course, Leuven, Belgium, May 21-23, 1991 (Lecture Notes in Computer Science). Springer, 1993.
Butow, Eric. Windows Vista Quick Reference. Addison Wesley Publishing Company, 2007.
Bruce, Christianson, and International Workshop on Security Protocols (8th : 2000 : Cambridge, England), eds. Security protocols: 8th international workshop, Cambridge, UK, April 3-5, 2000 : revised papers. Berlin: Springer-Verlag, 2001.
Giovanni, Vigna, ed. Mobile agents and security. Berlin: Springer, 1998.