Libros sobre el tema "Sécurité des applications"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores mejores libros para su investigación sobre el tema "Sécurité des applications".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore libros sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
A, Benwell-Morison Deirdre, and Canada. Direction de l'hygiène du milieu., eds. Principes d'utilisation des ultrasons: Partie II. Applications industrielles et commerciales. Direction de l'hygiène du milieu, 1991.
Buscar texto completoBly, Stephen Howard Perry. Principes d'utilisation des ultrasons: 1re partie. Applications médicales et paramédicales. Direction de l'hygiène du milieu, 1989.
Buscar texto completoAmerican Society of Safety Engineers, ed. The safety professionals handbook: Management applications. 2nd ed. American Society of Safety Engineers, 2012.
Buscar texto completo(Firm), BP, and Institution of Chemical Engineers (Great Britain), eds. Hazards of air and oxygen. 8th ed. IChemE, 2004.
Buscar texto completoScambray, Joel. Hacking exposed: Web applications. McGraw-Hill/Osborne, 2002.
Buscar texto completoMike, Shema, ed. Hacking exposed: Web applications. McGraw-Hill/Osborne, 2002.
Buscar texto completoBorivoje, Furht, and Kirovski Darko, eds. Multimedia encryption and authentication techniques and applications. Auerbach Publications, 2006.
Buscar texto completoSemakov, Sergei L. Crossings problems in random processes theory and their applications in aviation. Cambridge Scholars Publishing, 2019.
Buscar texto completo(Firm), BP, and Institution of Chemical Engineers (Great Britain), eds. Hazards of water. 8th ed. Institution of Chemical Engineers, 2004.
Buscar texto completo(Firm), BP, and Institution of Chemical Engineers (Great Britain), eds. Hazards of steam. 4th ed. Institution of Chemical Engineers, 2004.
Buscar texto completoDirectorate, Canada Environmental Health, ed. Radiation protection in dentistry: Recommended safety procedures for the use of dental X-ray equipment. Environmental Health Directorate, Health Protection Branch, 1994.
Buscar texto completoDirectorate, Canada Environmental Health. Radiation protection in dentistry: Recommended safety procedures for the use of dental X-ray equipment. Environmental Health Directorate, 2000.
Buscar texto completoCessna, Allan J. Les produits antiparasitaires et la sécurité. Agriculture Canada, 1988.
Buscar texto completoCessna, Allan J. Les produits antiparasitaires et la sécurité. Direction générale de la recherche, Agriculture Canada, 1987.
Buscar texto completoE, Hobbs Jill, and Canada. Agriculture et agroalimentaire Canada., eds. Vue d'ensemble de l'élaboration et des applications d'un cadre conceptuel permettant d'analyser les avantages et les coûts des programmes de salubrité des aliments à la ferme et des plans environnementaux des fermes. Agriculture et agroalimentaire Canada, 2005.
Buscar texto completoKim, Fowler, ed. Mission-critical and safety-critical systems handbook: Design and development for embedded applications. Newnes, 2010.
Buscar texto completoKim, Fowler, ed. Mission-critical and safety-critical systems handbook: Design and development for embedded applications. Newnes, 2010.
Buscar texto completoChaloner, Paul. Diagnostic X-ray equipment compliance and facility survey: Recommended procedures for equipment and facility testing. Environmental Health Directorate, Health Protection Branch, 1994.
Buscar texto completoNowakowski, Tomasz, Anna Jodejko-Pietruczuk, Marek Mlynczak, and Sylwia Werbinska-Wojciechowska. Safety and Reliability: Methodology and Applications. Taylor & Francis Group, 2014.
Buscar texto completoSafety and Reliability: Methodology and Applications. Taylor & Francis Group, 2014.
Buscar texto completoNowakowski, Tomasz, Anna Jodejko-Pietruczuk, Marek Mlynczak, and Sylwia Werbinska-Wojciechowska. Safety and Reliability: Methodology and Applications. Taylor & Francis Group, 2014.
Buscar texto completoNowakowski, Tomasz, Anna Jodejko-Pietruczuk, Marek Mlynczak, and Sylwia Werbinska-Wojciechowska. Safety and Reliability: Methodology and Applications. Taylor & Francis Group, 2014.
Buscar texto completoNowakowski, Tomasz, Anna Jodejko-Pietruczuk, and Marek Mlynczak. Safety and Reliability: Methodology and Applications. Taylor & Francis Group, 2014.
Buscar texto completoProcess Safety: Practical Applications for Safe and Reliable Operations. Taylor & Francis Group, 2017.
Buscar texto completoEl, Hami, and Bouchaïb Radi. Fiabilité et optimisation des systèmes. Théorie et applications. Cours et exercices corrigés. Sécurité. ELLIPSES, 2011.
Buscar texto completoDatabase and Applications Security: Integrating Information Security and Data Management. AUERBACH, 2005.
Buscar texto completoThuraisingham, Bhavani. Database and Applications Security: Integrating Information Security and Data Management. Auerbach Publishers, Incorporated, 2005.
Buscar texto completoThuraisingham, Bhavani. Database and Applications Security: Integrating Information Security and Data Management. Auerbach Publishers, Incorporated, 2005.
Buscar texto completoOnline Social Networks Security: Principles, Algorithm, Applications, and Perspectives. Taylor & Francis Group, 2021.
Buscar texto completoGupta, Brij B., and Somya Ranjan Sahoo. Online Social Networks Security: Principles, Algorithm, Applications, and Perspectives. Taylor & Francis Group, 2021.
Buscar texto completoGupta, Brij B., and Somya Ranjan Sahoo. Online Social Networks Security: Principles, Algorithm, Applications, and Perspectives. Taylor & Francis Group, 2021.
Buscar texto completoGupta, Brij B., and Somya Ranjan Sahoo. Online Social Networks Security: Principles, Algorithm, Applications, and Perspectives. Taylor & Francis Group, 2021.
Buscar texto completoSecuring E-Business Applications and Communications. Taylor and Francis, 2001.
Buscar texto completoDupont, R. Ryan, and Louis Theodore. Water Resource Management Issues: Basic Principles and Applications. Taylor & Francis Group, 2019.
Buscar texto completoDupont, R. Ryan, and Louis Theodore. Water Resource Management Issues: Basic Principles and Applications. Taylor & Francis Group, 2019.
Buscar texto completoDupont, R. Ryan, and Louis Theodore. Water Resource Management Issues: Basic Principles and Applications. Taylor & Francis Group, 2019.
Buscar texto completoWater Resource Management Issues: Basic Principles and Applications. Taylor & Francis Group, 2019.
Buscar texto completoIot Applications Security Threats and Countermeasures. Taylor & Francis Group, 2021.
Buscar texto completoNayak, Padmalaya, Niranjan K. Ray, and P. Ravichandran. IoT Applications, Security Threats, and Countermeasures. CRC Press LLC, 2021.
Buscar texto completoNayak, Padmalaya, P. Ravichandran, and Niranjan Ray. IoT Applications, Security Threats, and Countermeasures. Taylor & Francis Group, 2021.
Buscar texto completoBanafa, Ahmed. Blockchain Technology and Applications. River Publishers, 2022.
Buscar texto completoBanafa, Ahmed. Blockchain Technology and Applications. River Publishers, 2022.
Buscar texto completoGupta, Brij B. Cloud Security: Concepts, Applications and Perspectives. Taylor & Francis Group, 2021.
Buscar texto completoCloud Security: Concepts, Applications and Perspectives. Taylor & Francis Group, 2021.
Buscar texto completoGupta, Brij B. Cloud Security: Concepts, Applications and Perspectives. Taylor & Francis Group, 2021.
Buscar texto completoFurht, Borivoje, and Darko Kirovski. Multimedia Encryption and Authentication Techniques and Applications. Taylor & Francis Group, 2010.
Buscar texto completoWEB Hacking: Apprenez à Tester la Sécurité des Applications Web Comme un Hacker Pro Avec Kali Linux. Independently Published, 2020.
Buscar texto completo