Search Results for - Narrowed by: Computer security. - French SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dLANGUAGE$002509Language$002509FRE$002509French$0026ps$003d300? 2024-05-26T05:40:26Z Cybers&eacute;curit&eacute; et RGPD : prot&eacute;gez votre PME : guide pratique pour s&eacute;curiser votre syst&egrave;me informatique et vous conformer au RGPD ent://SD_ILS/0/SD_ILS:2156542 2024-05-26T05:40:26Z 2024-05-26T05:40:26Z by&#160;Ejzyn, Alain, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5496488">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des installations industrielles. Chapitre I, Mythes et r&eacute;alit&eacute;s de la cybers&eacute;curit&eacute; des syst&egrave;mes num&eacute;riques industriels : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:2123689 2024-05-26T05:40:26Z 2024-05-26T05:40:26Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709836">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des Installations Industrielles : Chapitre XII Panorama de l'offre Technologique Pour la Cybers&eacute;curit&eacute; Industrielle ent://SD_ILS/0/SD_ILS:2123695 2024-05-26T05:40:26Z 2024-05-26T05:40:26Z by&#160;Fourastier, Yannick, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709845">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des Installations Industrielles. Chapter V, Des bus de terrain a l'Industrial Ethernet ent://SD_ILS/0/SD_ILS:2123677 2024-05-26T05:40:26Z 2024-05-26T05:40:26Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709821">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des installations industrielles. Chapitre II, Typologie des installations industrielles : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:2123683 2024-05-26T05:40:26Z 2024-05-26T05:40:26Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709828">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des Installations Industrielles ent://SD_ILS/0/SD_ILS:2123700 2024-05-26T05:40:26Z 2024-05-26T05:40:26Z by&#160;Fourastier, Yannick, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709851">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des installations industrielles. Chapter VI, Analyse des risques : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:2123688 2024-05-26T05:40:26Z 2024-05-26T05:40:26Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709834">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des installations industrielles. Chapitre X, S&eacute;curit&eacute; des R&eacute;seaux Industriels &eacute;tendus : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:2123679 2024-05-26T05:40:26Z 2024-05-26T05:40:26Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709824">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des installations industrielles. Chapitre XIV, R&eacute;glementation de la Cybers&eacute;curit&eacute; et R&eacute;gime Juridique des Syst&egrave;mes Num&eacute;riques Industriels : une &eacute;tude des Dispositions R&eacute;glementaires en Cybers&eacute;curit&eacute; en France et Aux &Eacute;tats-Unis : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:2123680 2024-05-26T05:40:26Z 2024-05-26T05:40:26Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709825">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des installations industrielles. Chapitre II, Typologie des installations industrielles : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:2123684 2024-05-26T05:40:26Z 2024-05-26T05:40:26Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709829">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des installations industrielles. Chapter IV, Malveillance num&eacute;rique sur les syst&egrave;mes industriels : histoire de la menace, &eacute;v&eacute;nements embl&eacute;matiques, tendances et perspectives : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:2123685 2024-05-26T05:40:26Z 2024-05-26T05:40:26Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709831">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des installations industrielles : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:2123668 2024-05-26T05:40:26Z 2024-05-26T05:40:26Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709810">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des installations industrielles. Chapitre XIII, &Eacute;tat des Lieux des R&eacute;f&eacute;rentiels en S&eacute;curit&eacute; des Syst&egrave;mes Num&eacute;riques Industriels : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:2123669 2024-05-26T05:40:26Z 2024-05-26T05:40:26Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709811">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybers&eacute;curit&eacute; des installations industrielles : d&eacute;fendre ses syst&egrave;mes num&eacute;riques ent://SD_ILS/0/SD_ILS:2123670 2024-05-26T05:40:26Z 2024-05-26T05:40:26Z by&#160;Fourastier, Yannick, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5709812">Click to View</a><br/>Format:&#160;Electronic Resources<br/> S&eacute;curit&eacute; informatique : principes et m&eacute;thodes ent://SD_ILS/0/SD_ILS:2310796 2024-05-26T05:40:26Z 2024-05-26T05:40:26Z by&#160;Bloch, Laurent, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9782212012941/?ar">https://go.oreilly.com/library-access/library/view/-/9782212012941/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9782212012941/?ar">https://learning.oreilly.com/library/view/~/9782212012941/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9782212012941">https://learning.oreilly.com/library/view/~/9782212012941</a><br/>Format:&#160;Electronic Resources<br/> Elsevier's dictionary of information security in English, German, French and Russian ent://SD_ILS/0/SD_ILS:2283476 2024-05-26T05:40:26Z 2024-05-26T05:40:26Z by&#160;Manoilov, G.<br/><a href="https://learning.oreilly.com/library/view/~/9780080488806">https://learning.oreilly.com/library/view/~/9780080488806</a> <a href="https://learning.oreilly.com/library/view/~/9780080488806/?ar">https://learning.oreilly.com/library/view/~/9780080488806/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780080488806/?ar">https://go.oreilly.com/library-access/library/view/-/9780080488806/?ar</a><br/>Format:&#160;Electronic Resources<br/>