|
|
Áûñòðûé ïåðåõîä |
Ïî íàçâàíèþ: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z À Á Â Ã Ä Å ¨ Æ Ç È É Ê Ë Ì Í Î Ï Ð Ñ Ò Ó Ô Õ Ö × Ø Ù Û Ý Þ ß Ïî àâòîðó: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ¨ À Á Â Ã Ä Å Æ Ç È É Ê Ë Ì Í Î Ï Ð Ñ Ò Ó Ô Õ Ö × Ø Ù Û Ý Þ ß
|
|
Âñå ðåñóðñû |
Ñîðòèðîâêà:
176456 |
|
Stefanek G. |
Information Security Best Practices: 205 Basic Rules |
2002 | •• |
136276 |
|
Bazavan I.V., Lim I. |
Information Security Cost Management |
2006 | •• |
204246 |
|
Ableson W.F. |
Information Security for the Busy Entrepreneur or Manager |
2017 | •• |
189223 |
|
Peltier T., Peltier J., Blackley J. |
Information Security FUNDAMENTALS |
2005 | •• |
150525 |
|
Solms S.H., Solms R. |
Information Security Governance |
2008 | •• |
166532 |
|
Brotby K. |
Information Security Governance (Wiley Series in Systems Engineering and Management) |
2009 | •• |
160046 |
|
Solomon M., Chapple M. |
Information Security Illuminated |
2005 | •• |
27611 |
|
Tipton H.F. (Ed), Krause M. (Ed) |
Information Security Management Handbook |
2003 • | •• |
29051 |
|
Tipton H.F., Krause M. |
Information Security Management Handbook |
2006 • | •• |
149952 |
|
Tipton H., Krause M. |
Information Security Management Handbook |
2001 • | •• |
155559 |
|
Tipton H.F. |
Information Security Management Handbook Online access for BTH |
2003 • | •• |
173751 |
|
Tipton H., Krause M. |
Information Security Management Handbook, Fourth Edition, Volume 4 |
2003 • | •• |
167237 |
|
Tipton H., Krause M. |
Information Security Management Handbook, Fourth Edition, Volume II |
2001 • | •• |
178076 |
|
Tipton H., Krause M. |
Information Security Management Handbook, Sixth Edition, Volume 2 |
2008 • | •• |
29382 |
|
Krause M. |
Information Security Management Handbook, Volume 3 |
2006 • | •• |
197169 |
|
Y. Deswarte |
Information Security Management, Education and Privacy (IFIP International Federation for Information Processing) |
2004 | •• |
25123 |
|
Fugini M., Bellettini C. (eds.) |
Information Security Policies and Actions in Modern Integrated Systems |
2004 | •• |
127359 |
|
Chorafas D.N. |
Information Security Policies and Procedures: A Practitioner's Reference |
1998 | •• |
140194 |
|
Peltier T. |
Information Security Policies and Procedures: A Practitioner's Reference |
1998 | •• |
143136 |
|
Peltier T. |
Information Security Policies and Procedures: A Practitioner's Reference |
1999 | •• |
170500 |
|
Peltier T.R. |
Information Security Policies and Procedures: A Practitioner's Reference, Second Edition |
2004 • | •• |
132752 |
|
Peltier T.R. |
Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management |
2001 | •• |
197045 |
|
K. Chen, R.Deng, X. Lai, J. Zhou |
Information Security Practice and Experience |
2006 | •• |
140446 |
|
Bao F., Li H., Wang G. |
Information Security Practice and Experience, 5 conf., ISPEC 2009 |
2009 | •• |
166992 |
|
Chen L., Mu J., Susilo W. |
Information Security Practice and Experience: 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings |
2008 | •• |
176803 |
|
Deng R., Bao F., Pang H. |
Information Security Practice and Experience: First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings |
2005 | •• |
137750 |
|
Dawson E. (ed.), Wong D.S. (ed.) |
Information Security Practice and Experience: Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings |
2007 | •• |
166148 |
|
Dawson E., Wong D.S. |
Information Security Practice and Experience: Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings (Lecture Notes in Computer Science Security and Cryptology) |
2007 • | •• |
14396 |
|
Stamp M. |
Information Security Principles and Practice |
2005 | •• |
127993 |
|
Peltier T.R. |
Information Security Risk Analysis |
2005 • | •• |
180400 |
|
Peltier T. |
Information Security Risk Analysis |
2001 | •• |
139685 |
|
Markowitch O., Bilas A., Hoepman J. |
Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks: Third IFIP WG 11.2 International Workshop, WISTP ... Computer Science Security and Cryptology) |
2009 | •• |
154812 |
|
Markowitch O., Bilas A., Hoepman J. |
Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks: Third IFIP WG 11.2 International Workshop, WISTP 2009 ... Computer Science Security and Cryptology) |
2009 | •• |
181612 |
|
Sauveron D., Markantonakis K., Bilas A. |
Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems: First IFIP TC6 / WG 8.8 / WG 11.2 International |
2007 | •• |
163659 |
|
Onieva J.A., Sauveron D. |
Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP |
2008 | •• |
168749 |
|
Samarati P., Tunstall M., Posegga J. |
Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices: 4th IFIP WG 11.2 International Workshop, WISTP ... Computer Science Security and Cryptology) |
2010 | •• |
151222 |
|
Kwak J., Deng R., Wang G. |
Information Security, Practice and Experience: 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010, Proceedings (Lecture Notes in Computer Science Security and Cryptology) |
2010 | •• |
196301 |
|
J. A. Garay |
Information Security: 10th International Conference, ISC 2007, Valparaiso, Chile, October 9-12, 2007, Proceedings |
2007 | •• |
144353 |
|
Davida G.I., Frankel Y. |
Information Security: 4th International Conference, ISC 2001 Malaga, Spain, October 1-3, 2001 Proceedings |
2001 | •• |
170658 |
|
Boyd C., Mao W. |
Information Security: 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings |
2003 | •• |
148630 |
|
Kan Zhang, Yuliang Zheng |
Information Security: 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings |
2004 • | •• |
150653 |
|
Zhang K., Zheng Y. |
Information Security: 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings (Lecture Notes in Computer Science) |
2005 | •• |
148942 |
|
Zhou J., Lopez J., Deng R. |
Information Security: 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings |
2005 | •• |
146488 |
|
Katsikas S.K., Lopez J. |
Information Security: 9th International Conference; ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings |
2006 | •• |
179341 |
|
Alexander P. |
Information Security: A Manager's Guide to Thwarting Data Thieves and Hackers (PSI Business Security) |
2008 | •• |
152507 |
|
Layton T. |
Information Security: Design, Implementation, Measurement, and Compliance |
2007 | •• |
141011 |
|
0 |
Information Security: Keeping Data Safe |
2002 | •• |
137531 |
|
Detmar W. Straub, Seymour Goodman, Richard Baskerville |
Information Security: Policy, Processes, and Practices |
2008 | •• |
193743 |
|
Mambo M., Zheng Y. |
Information Security: Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 6-7, 1999 Proceedings |
1999 | •• |
143193 |
|
Pieprzyk J., Okamoto E., Seberry J. |
Information Security: Third International Workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000. Proceedings |
2000 | •• |
|
|