Your search returned 11 results. Subscribe to this search

|
1.  Monographies, textes Applied cryptography [] : protocols, algorithms, and source code in C / Bruce SchneierPublication : New York : Wiley, cop. 1996Description : 1 vol. (xxiii-758 p.) : ill. ; 24 cmAvailability: Copies available for loan: Bib. Paris[EMP 113.107] (1). Copies available for reference: Centre de recherche en informatique[EM AI CI200-2383] (1).
2. Congrès CCS 2002 [Texte imprimé] : Proceedings of the 9th ACM Conference on Computer and Communications Security : Washington, DC, USA, November 18-22, 2002 / edited by Vijay Atluri ; sponsored by ACM SIGSACPublication : New York : ACM Press, cop. 2002Description : VIII-276 p. ; 28 cmAvailability: Copies available for loan: Centre de recherche en informatique[WAS 02] (1).
3. Congrès CCS 2003 [Texte imprimé] : Proceedings of the 10th ACM Conference on Computer and Communications Security : Washington, DC, USA, October 27-31, 2003 / edited by Vijay Atluri & Peng Liu ; sponsored by ACM SIGSAC ... [et al.]Publication : New York : ACM Press, cop. 2003Description : X-366 p. : ill. ; 28 cmAvailability: Copies available for loan: Centre de recherche en informatique[WAS 03] (1).
4. Congrès CCS 2004 [Texte imprimé] : Proceedings of the 11th ACM Conference on Computer and Communications Security : Washington, DC, USA, Oct. 25-29, 2004 / Ed. by Birgit Pfitzmann & Peng Liu ; Sponsored by ACM SIGSAC, ...Publication : New York : Association for Computing Machinery, cop. 2004Description : X-366 p. : ill. ; 28 cmAvailability: Copies available for loan: Centre de recherche en informatique[WAS 04] (1).
5.  Monographies, textes Computer security basics [] / Deborah Russell and G. T. Gangemi SrPublication : Sebastopol (Calif.) : O'Reilly, 1992Description : xx-448 p. ; 23 cmAvailability: Copies available for reference: Centre de recherche en informatique[RUS] (1).
6. Congrès Cryptography and data protection : proceedings of a symposium at the Royal Netherlands Academy of Arts and Sciences on 19th December 1990 / J.H. van Lint, R. Tijdeman, editorsPublication : Amsterdam, New York : North-Holland, 1992Description : vii, 104 p. : ill. ; 24 cmAvailability: Copies available for loan: Bib. Fontainebleau[EMF 20097-8] (1).
7.  Monographies, textes Design of hashing algorithms / Josef Pieprzyk, Babak SadeghiyanPublication : Berlin, New York : Springer-Verlag, c1993Description : xiii, 194 p. : ill. ; 24 cmAvailability: Copies available for reference: Centre de recherche en informatique[EM AI CI200-1431] (1).
8.  Monographies, textes La fracture cryptographique [] / Serge VaudenayPublication : Lausanne : Presses polytechniques et universitaires romandes, cop. 2011Description : 1 vol. (XII-202 p.) : ill., couv. ill. en coul. ; 23 cmAvailability: Copies available for loan: Bib. Paris[323.4 VAU f] (1).
9.  Monographies, textes Network and internetwork security [] : principles and practice / William StallingsPublication : Englewood Cliffs, NJ : Prentice Hall, New York : IEEE Press, c1995Description : XIII-462 p. : ill. ; 25 cmAvailability: Copies available for loan: Centre de recherche en informatique[STA] (1).
10. Congrès Proceedings of the 8th ACM Conference on Computer and Communications Security [Texte imprimé] : (CCS-8) : November 5-8, 2001, Philadelphia, Pennsylvania, USA / edited by Pierangela Samarati ; sponsored by ACM SIGSAC...Publication : New York, N.Y. : ACM Press, cop. 2001Description : VIII-265 p. : fig. ; 28 cmAvailability: Copies available for reference: Centre de recherche en informatique[PHI 01] (2).
11.  Monographies, textes Web security, privacy and commerce [] / Simson Garfinkel ; with Gene SpaffordPublication : Cambridge (Mass.), Sébastopol (Ca.), Paris [etc.] : O'Reilly, cop. 2002Description : 1 vol. (XXVIII-756 p.) : ill ; 24cmAvailability: Copies available for reference: Centre de recherche en informatique[GAR] (1).

Powered by Koha