Bases bibliographiques Pascal et Francis

Aide

Résultats de votre recherche

Votre recherche

cc.\*:("790-H04")

Type de document [dt]

A-Z Z-A Fréquence ↓ Fréquence ↑
Export CSV

Année de publication [py]

A-Z Z-A Fréquence ↓ Fréquence ↑
Export CSV

Discipline (document) [di]

A-Z Z-A Fréquence ↓ Fréquence ↑
Export CSV

Langue

A-Z Z-A Fréquence ↓ Fréquence ↑
Export CSV

Pays auteur

A-Z Z-A Fréquence ↓ Fréquence ↑
Export CSV

Résultats 1 à 25 sur 84

  • Page / 4
Export

Sélection :

  • et

Towards a Digital Spine: The Technological Methods that UK and US Publishers are Using to Tackle the Growing Challenge of E-Book PiracyBLANKFIELD, Sarah; STEVENSON, Iain.Publishing research quarterly. 2012, Vol 28, Num 2, pp 79-92, issn 1053-8801, 14 p.Article

European digital libraries: web security vulnerabilitiesKUZMA, Joanne.Library hi tech. 2010, Vol 28, Num 3, pp 402-413, issn 0737-8831, 12 p.Article

Towards automatic service generation and scheduling in the OpenCF projectSANTOS, A; ALMEIDA, F; BLANCO, V et al.International journal of web and grid services (Print). 2008, Vol 4, Num 4, pp 367-378, issn 1741-1106, 12 p.Article

CYBERSQUATTING : Gives the Web a Bad Name AgainKOEHLER, Wallace.Searcher (Medford, N.J). 2008, Vol 16, Num 8, issn 1070-4795, 12-15, 61 [5 p.]Article

An economic modelling approach to information security risk managementBOJANC, Rok; JERMAN-BLAZIC, Borka.International journal of information management. 2008, Vol 28, Num 5, pp 413-422, issn 0268-4012, 10 p.Article

Process-variance models in information security awareness researchTSOHOU, Angeliki; KOKOLAKIS, Spyros; KARYDA, Maria et al.Information management & computer security. 2008, Vol 16, Num 3, pp 271-287, issn 0968-5227, 17 p.Article

Danger is in the eye of the beholders : Social representations of information Systems security in healthcareVAAST, Emmanuelle.Journal of strategic information systems. 2007, Vol 16, Num 2, pp 130-152, issn 0963-8687, 23 p.Article

Who Searches the Searchers? Community Privacy in the Age of Monolithic Search EnginesPORITZ, Jonathan A.The Information society. 2007, Vol 23, Num 5, pp 383-389, issn 0197-2243, 7 p.Article

L'authentification dans les réseaux ad hoc = Autentification in mobile adhoc networksALIOUANE, Lynda; BADACHE, Nadjib.RIST. 2006, Vol 16, Num 1, issn 1111-0015, 4-5, 8-9, 65-82 [22 p.]Article

Bien gérer ses mots de passeDELENGAIGNE, Xavier.Archimag (Vincennes). 2012, Num 251, pp 30-31, issn 0769-0975, 2 p.Article

Droit: le référentiel général de sécuritéTHOMAS, Michel.Archimag (Vincennes). 2012, Num 257, pp 36-37, issn 0769-0975, 2 p.Article

Planning the Taiwan Access Management Federation based on ShibbolethNAICHENG CHANG; LIMEI CHEN; HOPKINSON, Alan et al.Libri (Copenhagen). 2011, Vol 61, Num 2, pp 154-164, issn 0024-2667, 11 p.Article

Protect your library's computersZIMERMAN, Martin.New library world. 2010, Vol 111, Num 1272-3, pp 203-212, issn 0307-4803, 10 p.Article

The psychology of password management: a tradeoff between security and convenienceTAM, L; GLASSMAN, M; VANDENWAUVER, M et al.Behaviour & information technology (Print). 2010, Vol 29, Num 3, pp 233-244, issn 0144-929X, 12 p.Article

Creating Safe, Collaborative Cultures in a Web 2.0 WorldMCCLURE, Marji.EContent (Wilton, Conn.). 2009, Vol 32, Num 5, issn 1525-2531, 3, 22-26 [6 p.]Article

The information security policy unpacked: A critical study of the content of university policiesDOHERTY, Neil Francis; ANASTASAKIS, Leonidas; FULFORD, Heather et al.International journal of information management. 2009, Vol 29, Num 6, pp 449-457, issn 0268-4012, 9 p.Article

Risky Business : The Importance of Data Audits for Content SecurityMARQUETTE POREMBA, Sue.EContent (Wilton, Conn.). 2008, Vol 31, Num 8, issn 1525-2531, 6, 32-36 [5 p.]Article

How well are information risks being communicated to your computer end-users?PATTINSON, Malcolm R; ANDERSON, Grantley.Information management & computer security. 2007, Vol 15, Num 5, pp 362-371, issn 0968-5227, 10 p.Conference Paper

The application of signature recognition to transparent handwriting verification for mobile devicesCLARKE, N. L; MEKALA, A. R.Information management & computer security. 2007, Vol 15, Num 2-3, pp 214-225, issn 0968-5227, 12 p.Article

Risques du cloud ouvrir le parapluieNUTTIN, Guillaume.Archimag (Vincennes). 2012, Num 251, pp 22-24, issn 0769-0975, 3 p.Article

Library blogs and user participation: a survey about comment spam in library blogsOGUZ, Fatih; HOLT, Michael.Library hi tech. 2011, Vol 29, Num 1, pp 173-188, issn 0737-8831, 16 p.Article

Authentication and Access: Accommodating Public Users in an Academic WorldWEBER, Lynne; LAWRENCE, Peg.Information technology and libraries. 2010, Vol 29, Num 3, pp 128-140, issn 0730-9295, 13 p.Article

Social Construction of Authorized Users in the Digital AgeXIAOHUA ZHU; ESCHENFELDER, Kristin R.College & research libraries. 2010, Vol 71, Num 6, pp 548-568, issn 0010-0870, 21 p.Article

la Cnil encadre l'usage des données biométriquesFERAL-SCHUHL, Christiane.Archimag (Vincennes). 2008, Num 214, pp 42-43, issn 0769-0975, 2 p.Article

RFID, privacy and the perception of risk : A strategic frameworkTHIESSE, Frédéric.Journal of strategic information systems. 2007, Vol 16, Num 2, pp 214-232, issn 0963-8687, 19 p.Article

  • Page / 4