{"id":632,"date":"2017-07-28T15:22:01","date_gmt":"2017-07-28T13:22:01","guid":{"rendered":"https:\/\/iste.yhello.co\/product\/techniques-de-securisation-des-applications-a-base-de-logiciel\/"},"modified":"2024-01-03T13:41:07","modified_gmt":"2024-01-03T13:41:07","slug":"techniques-de-securisation-des-applications-a-base-de-logiciel","status":"publish","type":"product","link":"https:\/\/www.istegroup.com\/en\/produit\/techniques-de-securisation-des-applications-a-base-de-logiciel\/","title":{"rendered":"Techniques de s\u00e9curisation des applications \u00e0 base de logiciel"},"content":{"rendered":"<p>L\u2019informatisation de syst\u00e8mes courants, tels que les transports ou l\u2019\u00e9lectronique de confort, implique l\u2019identification des risques potentiels sur la vie des personnes, sur les biens et sur l\u2019environnement. D\u00e8s la conception, il est indispensable de d\u00e9terminer les cadres normatifs et l\u00e9gislatifs ainsi que les outils essentiels \u00e0 l\u2019optimisation de la s\u00fbret\u00e9 de ces syst\u00e8mes.<\/p>\n<p><em>Techniques de s\u00e9curisation des applications \u00e0 base de logiciel<\/em>\u00a0pr\u00e9sente les principes g\u00e9n\u00e9raux pour l\u2019\u00e9laboration d\u2019un syst\u00e8me \u00e0 base d\u2019\u00e9lectronique programmable garantissant la s\u00fbret\u00e9 de fonctionnement. Il d\u00e9finit les concepts de base et d\u00e9taille leurs mises en place, puis \u00e9tudie les normes et les m\u00e9thodes d\u2019analyse de la s\u00e9curit\u00e9. Afin de maximiser la ma\u00eetrise de la s\u00fbret\u00e9 d\u2019un syst\u00e8me, cet ouvrage dresse \u00e9galement un panorama des techniques de s\u00e9curisation de l\u2019\u00e9lectronique (diversit\u00e9, redondance, architecture nOOm, etc.) et des techniques de d\u00e9veloppement d\u2019applications logicielles.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Version papier \u00e9puis\u00e9e<\/p>\n","protected":false},"featured_media":633,"template":"","meta":{"_acf_changed":false,"_links_to":"","_links_to_target":""},"product_brand":[],"product_cat":[667],"product_tag":[2350,2351,31,196,2352,197,198,199,21,200,22,113,201,203,204,63,25,172,209,430,2353,212,38,192,145,28,42,1595,1680,2354,2355],"class_list":{"0":"post-632","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-informatique-12506482","7":"product_tag-aplications","8":"product_tag-certification","9":"product_tag-ebook","10":"product_tag-ebooks","11":"product_tag-informatisation","12":"product_tag-iste","13":"product_tag-iste-edition","14":"product_tag-iste-editions","15":"product_tag-iste-group","16":"product_tag-isteedition","17":"product_tag-istegroup","18":"product_tag-jean-louis-boulanger","19":"product_tag-kindle","20":"product_tag-liseuse","21":"product_tag-livre","22":"product_tag-livre-electronique","23":"product_tag-livre-numerique","24":"product_tag-livre-scientifique","25":"product_tag-livres-scientifiques","26":"product_tag-logiciels","27":"product_tag-materiel","28":"product_tag-ouvrage","29":"product_tag-ouvrage-numerique","30":"product_tag-ouvrage-science","31":"product_tag-ouvrage-scientifique","32":"product_tag-ouvrage-scientifique-francais","33":"product_tag-risque","34":"product_tag-securite","35":"product_tag-systeme","36":"product_tag-techniques-de-securisation","37":"product_tag-techniques-de-securisation-des-applications-a-base-de-logiciel","39":"first","40":"instock","41":"shipping-taxable","42":"purchasable","43":"product-type-variable"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Techniques de s\u00e9curisation des applications \u00e0 base de logiciel - ISTE Group<\/title>\n<meta name=\"description\" content=\"Techniques de s\u00e9curisation des applications \u00e0 base de logiciel\u00a0pr\u00e9sente les principes g\u00e9n\u00e9raux pour l\u2019\u00e9laboration d\u2019un syst\u00e8me \u00e0 base d\u2019\u00e9lectronique programmable garantissant la s\u00fbret\u00e9 de fonctionnement.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.istegroup.com\/fr\/produit\/techniques-de-securisation-des-applications-a-base-de-logiciel\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Techniques de s\u00e9curisation des applications \u00e0 base de logiciel - ISTE Group\" \/>\n<meta property=\"og:description\" content=\"Techniques de s\u00e9curisation des applications \u00e0 base de logiciel\u00a0pr\u00e9sente les principes g\u00e9n\u00e9raux pour l\u2019\u00e9laboration d\u2019un syst\u00e8me \u00e0 base d\u2019\u00e9lectronique programmable garantissant la s\u00fbret\u00e9 de fonctionnement.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.istegroup.com\/fr\/produit\/techniques-de-securisation-des-applications-a-base-de-logiciel\/\" \/>\n<meta property=\"og:site_name\" content=\"ISTE Group\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-03T13:41:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.istegroup.com\/wp-content\/uploads\/2017\/07\/1284575932_449397644-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"451\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.istegroup.com\/fr\/produit\/techniques-de-securisation-des-applications-a-base-de-logiciel\/\",\"url\":\"https:\/\/www.istegroup.com\/fr\/produit\/techniques-de-securisation-des-applications-a-base-de-logiciel\/\",\"name\":\"Techniques de s\u00e9curisation des applications \u00e0 base de logiciel - ISTE Group\",\"isPartOf\":{\"@id\":\"https:\/\/www.istegroup.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.istegroup.com\/fr\/produit\/techniques-de-securisation-des-applications-a-base-de-logiciel\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.istegroup.com\/fr\/produit\/techniques-de-securisation-des-applications-a-base-de-logiciel\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.istegroup.com\/wp-content\/uploads\/2017\/07\/1284575932_449397644-1.jpg\",\"datePublished\":\"2017-07-28T13:22:01+00:00\",\"dateModified\":\"2024-01-03T13:41:07+00:00\",\"description\":\"Techniques de s\u00e9curisation des applications \u00e0 base de logiciel\u00a0pr\u00e9sente les principes g\u00e9n\u00e9raux pour l\u2019\u00e9laboration d\u2019un syst\u00e8me \u00e0 base d\u2019\u00e9lectronique programmable garantissant la s\u00fbret\u00e9 de fonctionnement.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.istegroup.com\/fr\/produit\/techniques-de-securisation-des-applications-a-base-de-logiciel\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.istegroup.com\/fr\/produit\/techniques-de-securisation-des-applications-a-base-de-logiciel\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.istegroup.com\/fr\/produit\/techniques-de-securisation-des-applications-a-base-de-logiciel\/#primaryimage\",\"url\":\"https:\/\/www.istegroup.com\/wp-content\/uploads\/2017\/07\/1284575932_449397644-1.jpg\",\"contentUrl\":\"https:\/\/www.istegroup.com\/wp-content\/uploads\/2017\/07\/1284575932_449397644-1.jpg\",\"width\":300,\"height\":451,\"caption\":\"Techniques de s\u00e9curisation des applications \u00e0 base de logiciel\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.istegroup.com\/fr\/produit\/techniques-de-securisation-des-applications-a-base-de-logiciel\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.istegroup.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Shop\",\"item\":\"https:\/\/www.istegroup.com\/fr\/nouveautes\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Techniques de s\u00e9curisation des applications \u00e0 base de logiciel\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.istegroup.com\/#website\",\"url\":\"https:\/\/www.istegroup.com\/\",\"name\":\"ISTE Group\",\"description\":\"Publishing Knowledge\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.istegroup.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Techniques de s\u00e9curisation des applications \u00e0 base de logiciel - ISTE Group","description":"Techniques de s\u00e9curisation des applications \u00e0 base de logiciel\u00a0pr\u00e9sente les principes g\u00e9n\u00e9raux pour l\u2019\u00e9laboration d\u2019un syst\u00e8me \u00e0 base d\u2019\u00e9lectronique programmable garantissant la s\u00fbret\u00e9 de fonctionnement.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.istegroup.com\/fr\/produit\/techniques-de-securisation-des-applications-a-base-de-logiciel\/","og_locale":"en_US","og_type":"article","og_title":"Techniques de s\u00e9curisation des applications \u00e0 base de logiciel - ISTE Group","og_description":"Techniques de s\u00e9curisation des applications \u00e0 base de logiciel\u00a0pr\u00e9sente les principes g\u00e9n\u00e9raux pour l\u2019\u00e9laboration d\u2019un syst\u00e8me \u00e0 base d\u2019\u00e9lectronique programmable garantissant la s\u00fbret\u00e9 de fonctionnement.","og_url":"https:\/\/www.istegroup.com\/fr\/produit\/techniques-de-securisation-des-applications-a-base-de-logiciel\/","og_site_name":"ISTE Group","article_modified_time":"2024-01-03T13:41:07+00:00","og_image":[{"width":300,"height":451,"url":"https:\/\/www.istegroup.com\/wp-content\/uploads\/2017\/07\/1284575932_449397644-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.istegroup.com\/fr\/produit\/techniques-de-securisation-des-applications-a-base-de-logiciel\/","url":"https:\/\/www.istegroup.com\/fr\/produit\/techniques-de-securisation-des-applications-a-base-de-logiciel\/","name":"Techniques de s\u00e9curisation des applications \u00e0 base de logiciel - ISTE Group","isPartOf":{"@id":"https:\/\/www.istegroup.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.istegroup.com\/fr\/produit\/techniques-de-securisation-des-applications-a-base-de-logiciel\/#primaryimage"},"image":{"@id":"https:\/\/www.istegroup.com\/fr\/produit\/techniques-de-securisation-des-applications-a-base-de-logiciel\/#primaryimage"},"thumbnailUrl":"https:\/\/www.istegroup.com\/wp-content\/uploads\/2017\/07\/1284575932_449397644-1.jpg","datePublished":"2017-07-28T13:22:01+00:00","dateModified":"2024-01-03T13:41:07+00:00","description":"Techniques de s\u00e9curisation des applications \u00e0 base de logiciel\u00a0pr\u00e9sente les principes g\u00e9n\u00e9raux pour l\u2019\u00e9laboration d\u2019un syst\u00e8me \u00e0 base d\u2019\u00e9lectronique programmable garantissant la s\u00fbret\u00e9 de fonctionnement.","breadcrumb":{"@id":"https:\/\/www.istegroup.com\/fr\/produit\/techniques-de-securisation-des-applications-a-base-de-logiciel\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.istegroup.com\/fr\/produit\/techniques-de-securisation-des-applications-a-base-de-logiciel\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.istegroup.com\/fr\/produit\/techniques-de-securisation-des-applications-a-base-de-logiciel\/#primaryimage","url":"https:\/\/www.istegroup.com\/wp-content\/uploads\/2017\/07\/1284575932_449397644-1.jpg","contentUrl":"https:\/\/www.istegroup.com\/wp-content\/uploads\/2017\/07\/1284575932_449397644-1.jpg","width":300,"height":451,"caption":"Techniques de s\u00e9curisation des applications \u00e0 base de logiciel"},{"@type":"BreadcrumbList","@id":"https:\/\/www.istegroup.com\/fr\/produit\/techniques-de-securisation-des-applications-a-base-de-logiciel\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.istegroup.com\/"},{"@type":"ListItem","position":2,"name":"Shop","item":"https:\/\/www.istegroup.com\/fr\/nouveautes\/"},{"@type":"ListItem","position":3,"name":"Techniques de s\u00e9curisation des applications \u00e0 base de logiciel"}]},{"@type":"WebSite","@id":"https:\/\/www.istegroup.com\/#website","url":"https:\/\/www.istegroup.com\/","name":"ISTE Group","description":"Publishing Knowledge","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.istegroup.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.istegroup.com\/en\/wp-json\/wp\/v2\/product\/632","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.istegroup.com\/en\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/www.istegroup.com\/en\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.istegroup.com\/en\/wp-json\/wp\/v2\/media\/633"}],"wp:attachment":[{"href":"https:\/\/www.istegroup.com\/en\/wp-json\/wp\/v2\/media?parent=632"}],"wp:term":[{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/www.istegroup.com\/en\/wp-json\/wp\/v2\/product_brand?post=632"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/www.istegroup.com\/en\/wp-json\/wp\/v2\/product_cat?post=632"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/www.istegroup.com\/en\/wp-json\/wp\/v2\/product_tag?post=632"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}