Normalisation en matière de sûreté de fonctionnement des logiciels. TI Techniques de l'Ingénieur. Paper bibtex @article{
title = {Normalisation en matière de sûreté de fonctionnement des logiciels},
type = {article},
pages = {1-8},
id = {acc506b2-5cf6-38ea-bf80-5754b2e04c61},
created = {2011-12-15T13:48:48.000Z},
file_attached = {true},
profile_id = {181202e9-9e14-3446-b699-8df37a3580b5},
group_id = {36e61195-3063-323c-b879-d6d31394db8a},
last_modified = {2017-03-14T14:39:23.619Z},
tags = {Technologies logicielles,sécurité gestion risque},
read = {false},
starred = {false},
authored = {false},
confirmed = {true},
hidden = {false},
citation_key = {TIboq},
folder_uuids = {d535fce9-1075-4517-8e29-b9ebb3e52afb},
private_publication = {false},
bibtype = {article},
author = {TI, undefined},
journal = {Techniques de l'Ingénieur}
}
Downloads: 0
{"_id":"nrYHCYeXvspTQNkdP","bibbaseid":"ti-normalisationenmatiredesretdefonctionnementdeslogiciels","downloads":0,"creationDate":"2017-10-18T08:27:05.166Z","title":"Normalisation en matière de sûreté de fonctionnement des logiciels","author_short":["TI"],"year":null,"bibtype":"article","biburl":null,"bibdata":{"title":"Normalisation en matière de sûreté de fonctionnement des logiciels","type":"article","pages":"1-8","id":"acc506b2-5cf6-38ea-bf80-5754b2e04c61","created":"2011-12-15T13:48:48.000Z","file_attached":"true","profile_id":"181202e9-9e14-3446-b699-8df37a3580b5","group_id":"36e61195-3063-323c-b879-d6d31394db8a","last_modified":"2017-03-14T14:39:23.619Z","tags":"Technologies logicielles,sécurité gestion risque","read":false,"starred":false,"authored":false,"confirmed":"true","hidden":false,"citation_key":"TIboq","folder_uuids":"d535fce9-1075-4517-8e29-b9ebb3e52afb","private_publication":false,"bibtype":"article","author":"TI, undefined","journal":"Techniques de l'Ingénieur","bibtex":"@article{\n title = {Normalisation en matière de sûreté de fonctionnement des logiciels},\n type = {article},\n pages = {1-8},\n id = {acc506b2-5cf6-38ea-bf80-5754b2e04c61},\n created = {2011-12-15T13:48:48.000Z},\n file_attached = {true},\n profile_id = {181202e9-9e14-3446-b699-8df37a3580b5},\n group_id = {36e61195-3063-323c-b879-d6d31394db8a},\n last_modified = {2017-03-14T14:39:23.619Z},\n tags = {Technologies logicielles,sécurité gestion risque},\n read = {false},\n starred = {false},\n authored = {false},\n confirmed = {true},\n hidden = {false},\n citation_key = {TIboq},\n folder_uuids = {d535fce9-1075-4517-8e29-b9ebb3e52afb},\n private_publication = {false},\n bibtype = {article},\n author = {TI, undefined},\n journal = {Techniques de l'Ingénieur}\n}","author_short":["TI"],"urls":{"Paper":"https://bibbase.org/service/mendeley/25bd5b32-29aa-37df-a206-ab5dc511be68/file/4fcc6099-bbf4-e6d9-200e-500ce9130261/Normalisation_en_matire_de_sret_de_fonctionnement_des_logiciels.pdf.pdf"},"bibbaseid":"ti-normalisationenmatiredesretdefonctionnementdeslogiciels","role":"author","downloads":0,"html":""},"search_terms":["normalisation","mati","ret","fonctionnement","des","logiciels","ti"],"keywords":[],"authorIDs":[]}