Refine your search


Your search returned 278 results.

1.
Le secret des fichiers / par Françoise Gallouedec-Genuys et Herbert MaislPublication : Paris : Éditions Cujas, DL 1976, cop. 1976Availability : Items available for loan : BU Centre[J1019/13] (1). On order (2).
2.
La sécurité informatique : approche méthodologique / par Jean-Marc LamèrePublication : Paris : Dunod, 1985Availability : Items available for loan : IUT de Lannion[005.8 LAM] (1).
3.
Menaces sur les autoroutes de l'information / Jean-Marc Lamère, Philippe RoséPublication : Paris : L'Harmattan, DL 1996Availability : Items available for loan : INSA[MAG 07844] (1).
4.
Computer security-ESORICS 92 : second European symposium on research in computer security, Toulouse, France, November 23-25, 1992 proceedings / Y. Deswarte, G. Eizenberg, J.-J. Quisquater, edPublication : Berlin [etc.] : Springer-Verlag, 1992Availability : Items available for loan : ENSSAT (1).
5.
Computer security and protection structures / Bruce J. Walker, Ian F. BlakePublication : Stroudsburg, Pa. : Dowden, Hutchinson & Ross, c1977Availability : Items available for loan : BU Beaulieu[Y58520] (1).
6.
Design of hashing algorithms / Josef Pieprzyk, Babak SadeghiyanPublication : Berlin : Springer-Verlag, cop. 1993Availability : Items available for loan : BU Beaulieu[Y60070] (1).
7.
Privacy, security, and the information processing industry / prepared by the Ombudsman Committee on Privacy, Los Angeles Chapter, Association for Computing MachineryPublication : New York : ACM, c1976Availability : Items available for loan : BU Beaulieu[Y58187] (1).
8.
Computer security / David K. Hsiao, Douglas S. Kerr, Stuart E. MadnickPublication : New York : Academic Press, 1979Availability : Items available for loan : BU Beaulieu[Y58206] (1).
9.
Building a secure computer system [Texte imprimé] / Morrie GasserPublication : New York : Van Nostrand Reinhold Co., cop. 1988Availability : Items available for loan : BU Beaulieu[B5135] (1).
10.
Practical UNIX security / Simson Garfinkel and Gene SpaffordEdition : Apr. 1992: minor correctionsPublication : Sebastopol, CA : O'Reilly & Associates, cop. 1991Availability : Items available for loan : ENSSAT[J 1.] (1), BU Beaulieu[Y60032] (1).
11.
Cryptography : a primer / Alan G. KonheimPublication : New York : John Wiley & Sons, copyright 1981Availability : No items available Withdrawn (1).
12.
ESORICS 90 : European Symposium on Research in Computer Security : October 24-26, 1990, Toulouse, France / organized by AFCET... [et al.]Publication : [Toulouse, France] : [AFCET], [1990?]Availability : Items available for loan : ENSSAT[N 2.] (1).
13.
Practical UNIX and Internet security / Simson Garfinkel and Gene SpaffordEdition : 2nd ed., expanded & updatedPublication : Bonn : O'Reilly & Associates, cop. 1996Availability : Items available for loan : INSA[005.8] (1).
14.
Digital signature schemes : general framework and fail-stop signatures / Birgit PfitzmannPublication : New York : Springer, copyright 1996Availability : Items available for loan : BU Beaulieu[Y59124] (1).
15.
Decrypted secrets : methods and maxims of cryptology / Friedrich L. BauerPublication : Berlin : Springer, copyright 1997Availability : No items available On order (1).
16.
Modern cryptography, probabilistic proofs and pseudorandomness [Texte imprimé] / Oded GoldreichPublication : Berlin : Springer, cop. 1999Note : Autre tirage : 2010Availability : No items available On order (1).
17.
Database security, II : status and prospects : results of the IFIP WG 11.3 Workshop on Database Security, Kingston, Ontario, Canada, 5-7 October 1988 / edited by Carl E. LandwehrPublication : Amsterdam : North-Holland, 1989Availability : Items available for loan : ENSSAT (1).
18.
Computer safety, reliability, and security : 18th international conference, SAFECOMP '99, Toulouse, France, September 27-29, 1999 : proceedings / Massimo Felici, Karama Kanoun, Alberto Pasquini (eds.)Publication : New York : SpringerPublication : C 1999Availability : Items available for loan : ENSSAT[D 2.] (1).
19.
Elliptic curves in cryptography / I.F. Blake,..., G. Seroussi,..., N.P. Smart,...Publication : Cambridge : Cambridge University Press, 1999Note : Autres tirages : 2000, 2001, 2002, 2004, 2006Availability : No items available On order (1).
20.
Decrypted secrets : methods and maxims of cryptology / Friedrich L. BauerEdition : 2nd revised and extended editionPublication : New York : Springer, copyright 2000Availability : Items available for loan : ENSSAT[C 1.] (1), BU Beaulieu[Y60065] (1).

 

Powered by Koha