skip to content
Détermination de la robustesse des contrôles de périmètre. : ITSP. 80.032. Preview this item
ClosePreview this item
Checking...

Détermination de la robustesse des contrôles de périmètre. : ITSP. 80.032.

Author: Bibliothèque numérique canadienne (Firme),
Publisher: Ottawa, ON, CA : Centre de la sécurité des telecommunications, 2019.
Series: Série praticiens, conseils en matière de sécurité des technologies de l'information (Centre de la sécurité des télécommunications (Canada))
Edition/Format:   eBook : Document : National government publication : French
Summary:
"Un des principaux défis pour les praticiens de la sécurité est de s'assurer que le niveau de robustesse est le même pour tous les mécanismes de sécurité protégeant un périmètre donné du domaine de sécurité. Le présent document d'orientation vise à remédier à la situation en fournissant les critères de sélection des exigences relatives à l'assurance et à la force des mécanismes de sécurité  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Livres électroniques
Material Type: Document, Government publication, National government publication, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Bibliothèque numérique canadienne (Firme),
OCLC Number: 1099532991
Description: 1 ressource en ligne (32 pages)
Series Title: Série praticiens, conseils en matière de sécurité des technologies de l'information (Centre de la sécurité des télécommunications (Canada))
More information:

Abstract:

"Un des principaux défis pour les praticiens de la sécurité est de s'assurer que le niveau de robustesse est le même pour tous les mécanismes de sécurité protégeant un périmètre donné du domaine de sécurité. Le présent document d'orientation vise à remédier à la situation en fournissant les critères de sélection des exigences relatives à l'assurance et à la force des mécanismes de sécurité cryptographiques, interdomaines et d'authentification. On recommande aux organismes de mettre en pratique ces conseils au moment de considérer ou de développer des solutions pour les systèmes d'information interconnectés dans différents domaines de sécurité, particulièrement si l'un ou plusieurs de ces domaines sont classifiés "--Aperçu, page 3.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


\n\n

Primary Entity<\/h3>\n
<http:\/\/www.worldcat.org\/oclc\/1099532991<\/a>> # D\u00E9termination de la robustesse des contr\u00F4les de p\u00E9rim\u00E8tre. : ITSP. 80.032.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:MediaObject<\/a>, schema:Book<\/a>, schema:CreativeWork<\/a> ;\u00A0\u00A0\u00A0\nlibrary:oclcnum<\/a> \"1099532991<\/span>\" ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/id.loc.gov\/vocabulary\/countries\/onc<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/crime_law_and_justice_crime_computer_crime<\/a>> ; # Crime, law and justice--Crime--Computer crime<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/science_and_technology<\/a>> ; # Science and technology<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/economy_business_and_finance_economic_sector_computing_and_information_technology_software<\/a>> ; # Economy, business and finance--Economic sector--Computing and information technology--Software<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/securite<\/a>> ; # S\u00E9curit\u00E9<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/safety<\/a>> ; # Safety<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/classifiee<\/a>> ; # Classifi\u00E9e<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/society_values_ethics<\/a>> ; # Society--Values--Ethics<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/habilitation<\/a>> ; # Habilitation<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/habilitation_de_securite<\/a>> ; # Habilitation de s\u00E9curit\u00E9<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/health<\/a>> ; # Health<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/information<\/a>> ; # Information<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/crime_law_and_justice_crime<\/a>> ; # Crime, law and justice--Crime<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/computing<\/a>> ; # Computing<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/science_and_technology_technology_and_engineering_it_computer_sciences<\/a>> ; # Science and technology--Technology and engineering--It\/computer sciences<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/common_criteria<\/a>> ; # Common criteria<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/economy_business_and_finance_economic_sector_computing_and_information_technology<\/a>> ; # Economy, business and finance--Economic sector--Computing and information technology<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/cybersecurite<\/a>> ; # Cybers\u00E9curit\u00E9<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/economy_business_and_finance_economic_sector_computing_and_information_technology_computer_security<\/a>> ; # Economy, business and finance--Economic sector--Computing and information technology--Computer security<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/risk<\/a>> ; # Risk<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/national_security<\/a>> ; # National security<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/prevention<\/a>> ; # Prevention<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/computer_security<\/a>> ; # Computer security<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/zachman<\/a>> ; # Zachman<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/classifie<\/a>> ; # Classifi\u00E9<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/conflicts_war_and_peace<\/a>> ; # Conflicts, war and peace<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/criteres_communs<\/a>> ; # Crit\u00E8res communs<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/classified_information<\/a>> ; # Classified information<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/centre_de_la_securite_des_telecommunications<\/a>> ; # Centre de la s\u00E9curit\u00E9 des t\u00E9l\u00E9communications<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/human_activities<\/a>> ; # Human activities<\/span>\n\u00A0\u00A0\u00A0\nschema:bookFormat<\/a> schema:EBook<\/a> ;\u00A0\u00A0\u00A0\nschema:contributor<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Organization\/bibliotheque_numerique_canadienne_firme<\/a>> ; # Biblioth\u00E8que num\u00E9rique canadienne (Firme),<\/span>\n\u00A0\u00A0\u00A0\nschema:datePublished<\/a> \"2019<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"\"Un des principaux d\u00E9fis pour les praticiens de la s\u00E9curit\u00E9 est de s\'assurer que le niveau de robustesse est le m\u00EAme pour tous les m\u00E9canismes de s\u00E9curit\u00E9 prot\u00E9geant un p\u00E9rim\u00E8tre donn\u00E9 du domaine de s\u00E9curit\u00E9. Le pr\u00E9sent document d\'orientation vise \u00E0 rem\u00E9dier \u00E0 la situation en fournissant les crit\u00E8res de s\u00E9lection des exigences relatives \u00E0 l\'assurance et \u00E0 la force des m\u00E9canismes de s\u00E9curit\u00E9 cryptographiques, interdomaines et d\'authentification. On recommande aux organismes de mettre en pratique ces conseils au moment de consid\u00E9rer ou de d\u00E9velopper des solutions pour les syst\u00E8mes d\'information interconnect\u00E9s dans diff\u00E9rents domaines de s\u00E9curit\u00E9, particuli\u00E8rement si l\'un ou plusieurs de ces domaines sont classifi\u00E9s \"--Aper\u00E7u, page 3.<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\nschema:exampleOfWork<\/a> <http:\/\/worldcat.org\/entity\/work\/id\/9079226437<\/a>> ;\u00A0\u00A0\u00A0\nschema:genre<\/a> \"National government publication<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:genre<\/a> \"Livres \u00E9lectroniques<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\nschema:genre<\/a> \"Government publication<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:inLanguage<\/a> \"fr<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isPartOf<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Series\/<\/a>> ; # <\/span>\n\u00A0\u00A0\u00A0\nschema:isPartOf<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Series\/serie_praticiens_conseils_en_matiere_de_securite_des_technologies_de_l_information_centre_de_la_securite_des_telecommunications_canada<\/a>> ; # S\u00E9rie praticiens, conseils en mati\u00E8re de s\u00E9curit\u00E9 des technologies de l\'information (Centre de la s\u00E9curit\u00E9 des t\u00E9l\u00E9communications (Canada))<\/span>\n\u00A0\u00A0\u00A0\nschema:name<\/a> \"D\u00E9termination de la robustesse des contr\u00F4les de p\u00E9rim\u00E8tre. : ITSP. 80.032.<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\nschema:productID<\/a> \"1099532991<\/span>\" ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/www.deslibris.ca\/ID\/10100113<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/publications.gc.ca\/collections\/collection_2019\/cstc-csec\/D97-3-80-32-2019-fra.pdf<\/a>> ;\u00A0\u00A0\u00A0\nwdrs:describedby<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/1099532991<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Related Entities<\/h3>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Organization\/bibliotheque_numerique_canadienne_firme<\/a>> # Biblioth\u00E8que num\u00E9rique canadienne (Firme),<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Organization<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Biblioth\u00E8que num\u00E9rique canadienne (Firme),<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Series\/<\/a>> # <\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:PublicationSeries<\/a> ;\u00A0\u00A0\u00A0\nschema:hasPart<\/a> <http:\/\/www.worldcat.org\/oclc\/1099532991<\/a>> ; # D\u00E9termination de la robustesse des contr\u00F4les de p\u00E9rim\u00E8tre. : ITSP. 80.032.<\/span>\n\u00A0\u00A0\u00A0\nschema:name<\/a> \"\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Series\/serie_praticiens_conseils_en_matiere_de_securite_des_technologies_de_l_information_centre_de_la_securite_des_telecommunications_canada<\/a>> # S\u00E9rie praticiens, conseils en mati\u00E8re de s\u00E9curit\u00E9 des technologies de l\'information (Centre de la s\u00E9curit\u00E9 des t\u00E9l\u00E9communications (Canada))<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:PublicationSeries<\/a> ;\u00A0\u00A0\u00A0\nschema:hasPart<\/a> <http:\/\/www.worldcat.org\/oclc\/1099532991<\/a>> ; # D\u00E9termination de la robustesse des contr\u00F4les de p\u00E9rim\u00E8tre. : ITSP. 80.032.<\/span>\n\u00A0\u00A0\u00A0\nschema:name<\/a> \"S\u00E9rie praticiens, conseils en mati\u00E8re de s\u00E9curit\u00E9 des technologies de l\'information (Centre de la s\u00E9curit\u00E9 des t\u00E9l\u00E9communications (Canada))<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/centre_de_la_securite_des_telecommunications<\/a>> # Centre de la s\u00E9curit\u00E9 des t\u00E9l\u00E9communications<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Centre de la s\u00E9curit\u00E9 des t\u00E9l\u00E9communications<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/classifie<\/a>> # Classifi\u00E9<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Classifi\u00E9<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/classified_information<\/a>> # Classified information<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Classified information<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/classifiee<\/a>> # Classifi\u00E9e<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Classifi\u00E9e<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/common_criteria<\/a>> # Common criteria<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Common criteria<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/computer_security<\/a>> # Computer security<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer security<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/computing<\/a>> # Computing<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computing<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/conflicts_war_and_peace<\/a>> # Conflicts, war and peace<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Conflicts, war and peace<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/crime_law_and_justice_crime<\/a>> # Crime, law and justice--Crime<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Crime, law and justice--Crime<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/crime_law_and_justice_crime_computer_crime<\/a>> # Crime, law and justice--Crime--Computer crime<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Crime, law and justice--Crime--Computer crime<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/criteres_communs<\/a>> # Crit\u00E8res communs<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Crit\u00E8res communs<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/cybersecurite<\/a>> # Cybers\u00E9curit\u00E9<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Cybers\u00E9curit\u00E9<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/economy_business_and_finance_economic_sector_computing_and_information_technology<\/a>> # Economy, business and finance--Economic sector--Computing and information technology<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Economy, business and finance--Economic sector--Computing and information technology<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/economy_business_and_finance_economic_sector_computing_and_information_technology_computer_security<\/a>> # Economy, business and finance--Economic sector--Computing and information technology--Computer security<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Economy, business and finance--Economic sector--Computing and information technology--Computer security<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/economy_business_and_finance_economic_sector_computing_and_information_technology_software<\/a>> # Economy, business and finance--Economic sector--Computing and information technology--Software<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Economy, business and finance--Economic sector--Computing and information technology--Software<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/habilitation<\/a>> # Habilitation<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Habilitation<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/habilitation_de_securite<\/a>> # Habilitation de s\u00E9curit\u00E9<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Habilitation de s\u00E9curit\u00E9<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/health<\/a>> # Health<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Health<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/human_activities<\/a>> # Human activities<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Human activities<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/information<\/a>> # Information<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Information<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/national_security<\/a>> # National security<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"National security<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/prevention<\/a>> # Prevention<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Prevention<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/risk<\/a>> # Risk<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Risk<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/safety<\/a>> # Safety<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Safety<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/science_and_technology<\/a>> # Science and technology<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Science and technology<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/science_and_technology_technology_and_engineering_it_computer_sciences<\/a>> # Science and technology--Technology and engineering--It\/computer sciences<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Science and technology--Technology and engineering--It\/computer sciences<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/securite<\/a>> # S\u00E9curit\u00E9<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"S\u00E9curit\u00E9<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/society_values_ethics<\/a>> # Society--Values--Ethics<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Society--Values--Ethics<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9079226437#Topic\/zachman<\/a>> # Zachman<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Zachman<\/span>\"@fr<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.loc.gov\/vocabulary\/countries\/onc<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\ndcterms:identifier<\/a> \"onc<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/title\/-\/oclc\/1099532991<\/a>>\u00A0\u00A0\u00A0\u00A0a \ngenont:InformationResource<\/a>, genont:ContentTypeGenericResource<\/a> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/www.worldcat.org\/oclc\/1099532991<\/a>> ; # D\u00E9termination de la robustesse des contr\u00F4les de p\u00E9rim\u00E8tre. : ITSP. 80.032.<\/span>\n\u00A0\u00A0\u00A0\nschema:dateModified<\/a> \"2019-09-21<\/span>\" ;\u00A0\u00A0\u00A0\nvoid:inDataset<\/a> <http:\/\/purl.oclc.org\/dataset\/WorldCat<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Content-negotiable representations<\/p>\n