{"version":"1.0","provider_name":"Tutoriels et Cours","provider_url":"https:\/\/bocciolesi.fr\/tutoriels-et-cours","author_name":"Michel BOCCIOLESI","author_url":"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/author\/michel\/","title":"Chiffrement Informatique et S\u00e9curit\u00e9 Informatique - Tutoriels et Cours","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"roFG8gGFAj\"><a href=\"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/chiffrement-informatique\/\">Chiffrement Informatique et S\u00e9curit\u00e9 Informatique<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/chiffrement-informatique\/embed\/#?secret=roFG8gGFAj\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Chiffrement Informatique et S\u00e9curit\u00e9 Informatique\u00a0\u00bb &#8212; Tutoriels et Cours\" data-secret=\"roFG8gGFAj\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/bocciolesi.fr\/tutoriels-et-cours\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/bocciolesi.fr\/tutoriels-et-cours\/wp-content\/uploads\/2016\/11\/Fotolia_111288675_XS.jpg","thumbnail_width":435,"thumbnail_height":276,"description":"I\u25ba Dans cet article, nous allons aborder le chiffrement ou encryptage des donn\u00e9es Informatiques. Le chiffrement Informatique permet de rendre illisible un document informatique quelque soit son format. Afin de ..."}