|
1.
|
Le secret des fichiers / par Françoise Gallouedec-Genuys et Herbert Maisl Publication : Paris : Éditions Cujas, DL 1976, cop. 1976Availability : Items available for loan : BU Centre[J1019/13]
(1). On order (2).
|
|
2.
|
La sécurité informatique : approche méthodologique / par Jean-Marc Lamère Publication : Paris : Dunod, 1985Availability : Items available for loan : IUT de Lannion[005.8 LAM]
(1).
|
|
3.
|
|
|
4.
|
Computer security-ESORICS 92 : second European symposium on research in computer security, Toulouse, France, November 23-25, 1992 proceedings / Y. Deswarte, G. Eizenberg, J.-J. Quisquater, ed Publication : Berlin [etc.] : Springer-Verlag, 1992Availability : Items available for loan : ENSSAT (1).
|
|
5.
|
|
|
6.
|
Design of hashing algorithms / Josef Pieprzyk, Babak Sadeghiyan Publication : Berlin : Springer-Verlag, cop. 1993Availability : Items available for loan : BU Beaulieu[Y60070]
(1).
|
|
7.
|
|
|
8.
|
Computer security / David K. Hsiao, Douglas S. Kerr, Stuart E. Madnick Publication : New York : Academic Press, 1979Availability : Items available for loan : BU Beaulieu[Y58206]
(1).
|
|
9.
|
Building a secure computer system [Texte imprimé] / Morrie Gasser Publication : New York : Van Nostrand Reinhold Co., cop. 1988Availability : Items available for loan : BU Beaulieu[B5135]
(1).
|
|
10.
|
Practical UNIX security / Simson Garfinkel and Gene Spafford Edition : Apr. 1992: minor correctionsPublication : Sebastopol, CA : O'Reilly & Associates, cop. 1991Availability : Items available for loan : ENSSAT[J 1.]
(1), BU Beaulieu[Y60032]
(1).
|
|
11.
|
Cryptography : a primer / Alan G. Konheim Publication : New York : John Wiley & Sons, copyright 1981Availability :
No items available
Withdrawn (1).
|
|
12.
|
ESORICS 90 : European Symposium on Research in Computer Security : October 24-26, 1990, Toulouse, France / organized by AFCET... [et al.] Publication : [Toulouse, France] : [AFCET], [1990?]Availability : Items available for loan : ENSSAT[N 2.]
(1).
|
|
13.
|
Practical UNIX and Internet security / Simson Garfinkel and Gene Spafford Edition : 2nd ed., expanded & updatedPublication : Bonn : O'Reilly & Associates, cop. 1996Availability : Items available for loan : INSA[005.8]
(1).
|
|
14.
|
Digital signature schemes : general framework and fail-stop signatures / Birgit Pfitzmann Publication : New York : Springer, copyright 1996Availability : Items available for loan : BU Beaulieu[Y59124]
(1).
|
|
15.
|
Decrypted secrets : methods and maxims of cryptology / Friedrich L. Bauer Publication : Berlin : Springer, copyright 1997Availability :
No items available
On order (1).
|
|
16.
|
|
|
17.
|
Database security, II : status and prospects : results of the IFIP WG 11.3 Workshop on Database Security, Kingston, Ontario, Canada, 5-7 October 1988 / edited by Carl E. Landwehr Publication : Amsterdam : North-Holland, 1989Availability : Items available for loan : ENSSAT (1).
|
|
18.
|
Computer safety, reliability, and security : 18th international conference, SAFECOMP '99, Toulouse, France, September 27-29, 1999 : proceedings / Massimo Felici, Karama Kanoun, Alberto Pasquini (eds.) Publication : New York : SpringerPublication : C 1999Availability : Items available for loan : ENSSAT[D 2.]
(1).
|
|
19.
|
Elliptic curves in cryptography / I.F. Blake,..., G. Seroussi,..., N.P. Smart,... Publication : Cambridge : Cambridge University Press, 1999Note : Autres tirages : 2000, 2001, 2002, 2004, 2006Availability :
No items available
On order (1).
|
|
20.
|
Decrypted secrets : methods and maxims of cryptology / Friedrich L. Bauer Edition : 2nd revised and extended editionPublication : New York : Springer, copyright 2000Availability : Items available for loan : ENSSAT[C 1.]
(1), BU Beaulieu[Y60065]
(1).
|