aller au contenu
Covid-19 virus
Ressources pour le COVID-19

Des informations fiables sur le coronavirus (COVID-19) sont publiées par l’Organisation mondiale de la Santé (situation actuelle, voyageurs internationaux). Plusieurs ressources fréquemment mises à jour sont disponibles avec cette recherche dans WorldCat.org. Le site WebJunction d’OCLC a rassemblé des informations et des ressources pour aider le personnel des bibliothèques dans la planification des mesures à prendre pour gérer les problèmes liés au coronavirus dans leur communauté.

Image provided by: CDC/ Alissa Eckert, MS; Dan Higgins, MAM
Cryptographie appliquée : protocoles, algorithmes et codes sources en C Aperçu de cet ouvrage
FermerAperçu de cet ouvrage
Vérification...

Cryptographie appliquée : protocoles, algorithmes et codes sources en C

Auteur : Bruce Schneier; Laurent Viennot
Éditeur: Paris : Vuibert, ©2001.
Édition/format:   Livre imprimé : Français : 2e édVoir toutes les éditions et tous les formats
Évaluation:

(pas encore évalué) 0 avec des critiques - Soyez le premier.

Sujets
Plus comme ceci

Trouver un exemplaire dans la bibliothèque

&AllPage.SpinnerRetrieving; Recherche de bibliothèques qui possèdent cet ouvrage...

Détails

Type de document: Livre
Tous les auteurs / collaborateurs: Bruce Schneier; Laurent Viennot
ISBN: 2711786765 9782711786763
Numéro OCLC: 46592374
Notes: Traduction de : Applied cryptography.
Description: xvii, 846 pages ; 24 cm
Autres titres: Applied cryptography, second edition.
Responsabilité: Bruce Schneier ; trad. de Laurent Viennot.
Plus d’informations:

Critiques

Critiques d’utilisateurs
Récupération des critiques de GoodReads...
Récuperation des critiques DOGObooks…

Marqueurs

Soyez le premier.
Confirmez cette demande

Vous avez peut-être déjà demandé cet ouvrage. Veuillez sélectionner OK si vous voulez poursuivre avec cette demande quand même.

Données liées


\n\n

Primary Entity<\/h3>\n
<http:\/\/www.worldcat.org\/oclc\/46592374<\/a>> # Cryptographie appliqu\u00E9e : protocoles, algorithmes et codes sources en C<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:CreativeWork<\/a>, schema:Book<\/a> ;\u00A0\u00A0\u00A0\nbgn:translationOfWork<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/46592374#CreativeWork\/unidentifiedOriginalWork<\/a>> ; # Applied cryptography, second edition.<\/span>\n\u00A0\u00A0\u00A0\nlibrary:oclcnum<\/a> \"46592374<\/span>\" ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/id.loc.gov\/vocabulary\/countries\/fr<\/a>> ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/3901765882#Place\/paris<\/a>> ; # Paris<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/3901765882#Topic\/telecommunication<\/a>> ; # TELECOMMUNICATION<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/3901765882#Topic\/signature_electronique<\/a>> ; # SIGNATURE ELECTRONIQUE<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/3901765882#Topic\/rsa<\/a>> ; # RSA<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/3901765882#Topic\/protocoles_de_reseaux_d_ordinateurs_mesures_de_surete<\/a>> ; # Protocoles de r\u00E9seaux d\'ordinateurs--Mesures de s\u00FBret\u00E9<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/3901765882#Topic\/systemes_informatises_mesures_de_surete<\/a>> ; # Syst\u00E8mes informatis\u00E9s--Mesures de s\u00FBret\u00E9<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/3901765882#Topic\/computer_security<\/a>> ; # Computer security<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/3901765882#Topic\/algorithme_chiffrement<\/a>> ; # algorithme chiffrement<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/3901765882#Topic\/cryptography<\/a>> ; # Cryptography<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/3901765882#Topic\/securite_informatique<\/a>> ; # S\u00E9curit\u00E9 informatique<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/3901765882#Topic\/bloc_chiffre<\/a>> ; # BLOC CHIFFRE<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/3901765882#Topic\/telecommunications_securite_mesures<\/a>> ; # T\u00E9l\u00E9communications--S\u00E9curit\u00E9--Mesures<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/3901765882#Topic\/dsa<\/a>> ; # DSA<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/3901765882#Topic\/cryptographie<\/a>> ; # Cryptographie<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/3901765882#Topic\/cle_acces<\/a>> ; # cle acces<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/3901765882#Topic\/authentification<\/a>> ; # authentification<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/3901765882#Topic\/protocole<\/a>> ; # protocole<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/3901765882#Topic\/telecommunication_security_measures<\/a>> ; # Telecommunication--Security measures<\/span>\n\u00A0\u00A0\u00A0\nschema:bookEdition<\/a> \"2e \u00E9d.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:bookFormat<\/a> bgn:PrintBook<\/a> ;\u00A0\u00A0\u00A0\nschema:contributor<\/a> <http:\/\/viaf.org\/viaf\/46874538<\/a>> ; # Laurent Viennot<\/span>\n\u00A0\u00A0\u00A0\nschema:copyrightYear<\/a> \"2001<\/span>\" ;\u00A0\u00A0\u00A0\nschema:creator<\/a> <http:\/\/viaf.org\/viaf\/24690424<\/a>> ; # Bruce Schneier<\/span>\n\u00A0\u00A0\u00A0\nschema:datePublished<\/a> \"2001<\/span>\" ;\u00A0\u00A0\u00A0\nschema:exampleOfWork<\/a> <http:\/\/worldcat.org\/entity\/work\/id\/3901765882<\/a>> ; # Applied cryptography, second edition.<\/span>\n\u00A0\u00A0\u00A0\nschema:inLanguage<\/a> \"fr<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Cryptographie appliqu\u00E9e : protocoles, algorithmes et codes sources en C<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\nschema:productID<\/a> \"46592374<\/span>\" ;\u00A0\u00A0\u00A0\nschema:publication<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/46592374#PublicationEvent\/paris_vuibert_2001<\/a>> ;\u00A0\u00A0\u00A0\nschema:publisher<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/3901765882#Agent\/vuibert<\/a>> ; # Vuibert<\/span>\n\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9782711786763<\/a>> ;\u00A0\u00A0\u00A0\nwdrs:describedby<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/46592374<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Related Entities<\/h3>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/3901765882#Agent\/vuibert<\/a>> # Vuibert<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:Agent<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Vuibert<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/3901765882#Place\/paris<\/a>> # Paris<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Paris<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/3901765882#Topic\/algorithme_chiffrement<\/a>> # algorithme chiffrement<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"algorithme chiffrement<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/3901765882#Topic\/authentification<\/a>> # authentification<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"authentification<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/3901765882#Topic\/bloc_chiffre<\/a>> # BLOC CHIFFRE<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"BLOC CHIFFRE<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/3901765882#Topic\/cle_acces<\/a>> # cle acces<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"cle acces<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/3901765882#Topic\/computer_security<\/a>> # Computer security<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer security<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/3901765882#Topic\/cryptographie<\/a>> # Cryptographie<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Cryptographie<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"cryptographie<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/3901765882#Topic\/cryptography<\/a>> # Cryptography<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Cryptography<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/3901765882#Topic\/dsa<\/a>> # DSA<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"DSA<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/3901765882#Topic\/protocole<\/a>> # protocole<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"protocole<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/3901765882#Topic\/protocoles_de_reseaux_d_ordinateurs_mesures_de_surete<\/a>> # Protocoles de r\u00E9seaux d\'ordinateurs--Mesures de s\u00FBret\u00E9<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Protocoles de r\u00E9seaux d\'ordinateurs--Mesures de s\u00FBret\u00E9<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/3901765882#Topic\/rsa<\/a>> # RSA<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"RSA<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/3901765882#Topic\/securite_informatique<\/a>> # S\u00E9curit\u00E9 informatique<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"S\u00E9curit\u00E9 informatique<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"SECURITE INFORMATIQUE<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/3901765882#Topic\/signature_electronique<\/a>> # SIGNATURE ELECTRONIQUE<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"SIGNATURE ELECTRONIQUE<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/3901765882#Topic\/systemes_informatises_mesures_de_surete<\/a>> # Syst\u00E8mes informatis\u00E9s--Mesures de s\u00FBret\u00E9<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Syst\u00E8mes informatis\u00E9s--Mesures de s\u00FBret\u00E9<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/3901765882#Topic\/telecommunication<\/a>> # TELECOMMUNICATION<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"TELECOMMUNICATION<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/3901765882#Topic\/telecommunication_security_measures<\/a>> # Telecommunication--Security measures<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Telecommunication--Security measures<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/3901765882#Topic\/telecommunications_securite_mesures<\/a>> # T\u00E9l\u00E9communications--S\u00E9curit\u00E9--Mesures<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"T\u00E9l\u00E9communications--S\u00E9curit\u00E9--Mesures<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.loc.gov\/vocabulary\/countries\/fr<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\ndcterms:identifier<\/a> \"fr<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/viaf.org\/viaf\/24690424<\/a>> # Bruce Schneier<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:birthDate<\/a> \"1963<\/span>\" ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Schneier<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Bruce<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Bruce Schneier<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/viaf.org\/viaf\/46874538<\/a>> # Laurent Viennot<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Viennot<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Laurent<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Laurent Viennot<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/entity\/work\/id\/3901765882<\/a>> # Applied cryptography, second edition.<\/span>\n\u00A0\u00A0\u00A0\nschema:name<\/a> \"Applied cryptography, second edition.<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9782711786763<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"2711786765<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9782711786763<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/title\/-\/oclc\/46592374<\/a>>\u00A0\u00A0\u00A0\u00A0a \ngenont:InformationResource<\/a>, genont:ContentTypeGenericResource<\/a> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/www.worldcat.org\/oclc\/46592374<\/a>> ; # Cryptographie appliqu\u00E9e : protocoles, algorithmes et codes sources en C<\/span>\n\u00A0\u00A0\u00A0\nschema:dateModified<\/a> \"2020-03-04<\/span>\" ;\u00A0\u00A0\u00A0\nvoid:inDataset<\/a> <http:\/\/purl.oclc.org\/dataset\/WorldCat<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/title\/-\/oclc\/46592374#CreativeWork\/unidentifiedOriginalWork<\/a>> # Applied cryptography, second edition.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:CreativeWork<\/a> ;\u00A0\u00A0\u00A0\nschema:inLanguage<\/a> \"en<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Applied cryptography, second edition.<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n