Listing 1 - 5 of 5 |
Sort by
|
Choose an application
Nous vivons dans des sociétés de plus en plus numérisées où presque toutes les activités humaines dépendent du bon fonctionnement des technologies de l'information, en particulier d'Internet. Les Etats, les entreprises, les forces armées, les activistes, le crime organisé et même les particuliers apprécient l'avantage stratégique de l'arme numérique pour capter des données ou de l'argent, déstabiliser une organisation ou attenter à sa réputation. Tous sont ainsi irrigués par une informatique vulnérable aux cyberattaques. Nos vies personnelles et professionnelles se trouvent dorénavant menacées par ces nouvelles formes d'affrontement et dépendent de la cybersécurité. Laissée sans contraintes, celle-ci peut néanmoins aboutir au cauchemar d'une société de la surveillance totale. A chacun le devoir de s'informer sur les enjeux de la sécurité numérique.
Choose an application
Programming --- cryptografie --- Computer security --- Cryptography --- Telecommunication --- Sécurité informatique --- Cryptographie --- Télécommunications --- Security measures --- Sécurité --- Mesures --- 621.391.7 --- 681.3*E --- -Cryptography --- 384.0 --- 653 --- AA / International- internationaal --- 004.056.55 --- coderen --- computernetwerken --- computerveiligheid --- encryptie --- software --- 005.82 --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Secret systems of electrical communication --- Data --- Telecommunicatie: algemeenheden. --- Handelscorrespondentie : briefwisseling, fax en e-mailverkeer. Telefoon- en telegraafcodes. --- data-encryptie --- Computer security. --- Cryptography. --- Security measures. --- 681.3*E Data --- 621.391.7 Secret systems of electrical communication --- Cyber security --- Cybersecurity --- Sécurité informatique --- Télécommunications --- Sécurité --- Protection of computer systems --- Protection --- Telecommunicatie: algemeenheden --- Handelscorrespondentie : briefwisseling, fax en e-mailverkeer. Telefoon- en telegraafcodes --- Telecommunication - Security measures --- Telecommunication. Security measures
Choose an application
Programming --- cryptografie --- Computer security --- Cryptography --- Telecommunication --- Sécurité informatique --- Cryptographie --- Télécommunications --- Security measures --- Sécurité --- Mesures --- -Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- -Security measures --- Computer security. --- Sécurité informatique --- Télécommunications --- Sécurité --- Cryptography. --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection --- Telecommunication - Security measures
Choose an application
Ergodic theory. Information theory --- cryptografie --- Cryptography. --- Computer security. --- Telecommunication --- Cryptographie --- Sécurité informatique --- Télécommunications --- Security measures. --- Sécurité --- Mesures --- Cryptography --- Computer security --- Security measures --- -#TCPW T1.0 --- 519.7 --- 681.3*E3 --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Mathematical cybernetics --- Data encryption: data encryption standard; DES; public key cryptosystems --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- 519.7 Mathematical cybernetics --- Cyber security --- Cybersecurity --- Sécurité informatique --- Télécommunications --- Sécurité --- Protection of computer systems --- Protection --- #TCPW T1.0 --- Telecommunication - Security measures
Choose an application
Telecommunication --- Data encryption (Computer science) --- Cryptography --- Télécommunications --- Chiffrement (Informatique) --- Cryptographie --- Security measures --- Congresses. --- Sécurité --- Mesures --- Congrès --- Cryptography -- Congresses. --- Data encryption (Computer science) -- Congresses. --- Electronic books. -- local. --- Telecommunication -- Security measures -- Congresses. --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Computer Science --- Congresses --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Computers and civilization. --- Management information systems. --- Computer Science. --- Computer Communication Networks. --- Data Encryption. --- Systems and Data Security. --- Information Systems Applications (incl. Internet). --- Computers and Society. --- Management of Computing and Information Systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Protection --- Distributed processing --- Communication --- Information theory --- Telecommuting --- Information Systems. --- Cryptology. --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Computer networks. --- Cryptography. --- Data protection. --- Electronic data processing—Management. --- Data and Information Security. --- Computer and Information Systems Applications. --- IT Operations. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers
Listing 1 - 5 of 5 |
Sort by
|