Ãëàâíàÿ    Ex Libris    Êíèãè    Æóðíàëû    Ñòàòüè    Ñåðèè    Êàòàëîã    Wanted    Çàãðóçêà    ÕóäËèò    Ñïðàâêà    Ïîèñê ïî èíäåêñàì    Ïîèñê    Ôîðóì   
Ìåõìàòÿíàì
square Ïåðâûé êóðñ

square Âòîðîé êóðñ

square Òðåòèé êóðñ

square ×åòâåðòûé êóðñ

square Ïÿòûé êóðñ
blank
Àâòîðèçàöèÿ

       
blank
Ïîèñê ïî óêàçàòåëÿì

blank
Êðàñîòà
blank
blank
Áûñòðûé ïåðåõîä
Ïî íàçâàíèþ:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z À Á Â Ã Ä Å ¨ Æ Ç È É Ê Ë Ì Í Î Ï Ð Ñ Ò Ó Ô Õ Ö × Ø Ù Û Ý Þ ß
Ïî àâòîðó:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ¨ À Á Â Ã Ä Å Æ Ç È É Ê Ë Ì Í Î Ï Ð Ñ Ò Ó Ô Õ Ö × Ø Ù Û Ý Þ ß
blank
Âñå ðåñóðñû
Ñîðòèðîâêà:

ID asc desc pic Àâòîðû asc desc Íàçâàíèå asc desc Ãîä asc desc Äîï.
176456 Stefanek G. Information Security Best Practices: 205 Basic Rules 2002
136276 Bazavan I.V., Lim I. Information Security Cost Management 2006
204246 Ableson W.F. Information Security for the Busy Entrepreneur or Manager 2017
189223 Peltier T., Peltier J., Blackley J. Information Security FUNDAMENTALS 2005
150525 Solms S.H., Solms R. Information Security Governance 2008
166532 Brotby K. Information Security Governance (Wiley Series in Systems Engineering and Management) 2009
160046 Solomon M., Chapple M. Information Security Illuminated 2005
27611 Tipton H.F. (Ed), Krause M. (Ed) Information Security Management Handbook 2003
29051 Tipton H.F., Krause M. Information Security Management Handbook 2006
149952 Tipton H., Krause M. Information Security Management Handbook 2001
155559 Tipton H.F. Information Security Management Handbook Online access for BTH 2003
173751 Tipton H., Krause M. Information Security Management Handbook, Fourth Edition, Volume 4 2003
167237 Tipton H., Krause M. Information Security Management Handbook, Fourth Edition, Volume II 2001
178076 Tipton H., Krause M. Information Security Management Handbook, Sixth Edition, Volume 2 2008
29382 Krause M. Information Security Management Handbook, Volume 3 2006
197169 Y. Deswarte Information Security Management, Education and Privacy (IFIP International Federation for Information Processing) 2004
25123 Fugini M., Bellettini C. (eds.) Information Security Policies and Actions in Modern Integrated Systems 2004
127359 Chorafas D.N. Information Security Policies and Procedures: A Practitioner's Reference 1998
140194 Peltier T. Information Security Policies and Procedures: A Practitioner's Reference 1998
143136 Peltier T. Information Security Policies and Procedures: A Practitioner's Reference 1999
170500 Peltier T.R. Information Security Policies and Procedures: A Practitioner's Reference, Second Edition 2004
132752 Peltier T.R. Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management 2001
197045 K. Chen, R.Deng, X. Lai, J. Zhou Information Security Practice and Experience 2006
140446 Bao F., Li H., Wang G. Information Security Practice and Experience, 5 conf., ISPEC 2009 2009
166992 Chen L., Mu J., Susilo W. Information Security Practice and Experience: 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings 2008
176803 Deng R., Bao F., Pang H. Information Security Practice and Experience: First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings 2005
137750 Dawson E. (ed.), Wong D.S. (ed.) Information Security Practice and Experience: Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings 2007
166148 Dawson E., Wong D.S. Information Security Practice and Experience: Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings (Lecture Notes in Computer Science Security and Cryptology) 2007
14396 Stamp M. Information Security Principles and Practice 2005
127993 Peltier T.R. Information Security Risk Analysis 2005
180400 Peltier T. Information Security Risk Analysis 2001
139685 Markowitch O., Bilas A., Hoepman J. Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks: Third IFIP WG 11.2 International Workshop, WISTP ... Computer Science Security and Cryptology) 2009
154812 Markowitch O., Bilas A., Hoepman J. Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks: Third IFIP WG 11.2 International Workshop, WISTP 2009 ... Computer Science Security and Cryptology) 2009
181612 Sauveron D., Markantonakis K., Bilas A. Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems: First IFIP TC6 / WG 8.8 / WG 11.2 International 2007
163659 Onieva J.A., Sauveron D. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008
168749 Samarati P., Tunstall M., Posegga J. Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices: 4th IFIP WG 11.2 International Workshop, WISTP ... Computer Science Security and Cryptology) 2010
151222 Kwak J., Deng R., Wang G. Information Security, Practice and Experience: 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010, Proceedings (Lecture Notes in Computer Science Security and Cryptology) 2010
196301 J. A. Garay Information Security: 10th International Conference, ISC 2007, Valparaiso, Chile, October 9-12, 2007, Proceedings 2007
144353 Davida G.I., Frankel Y. Information Security: 4th International Conference, ISC 2001 Malaga, Spain, October 1-3, 2001 Proceedings 2001
170658 Boyd C., Mao W. Information Security: 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings 2003
148630 Kan Zhang, Yuliang Zheng Information Security: 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings 2004
150653 Zhang K., Zheng Y. Information Security: 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings (Lecture Notes in Computer Science) 2005
148942 Zhou J., Lopez J., Deng R. Information Security: 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings 2005
146488 Katsikas S.K., Lopez J. Information Security: 9th International Conference; ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings 2006
179341 Alexander P. Information Security: A Manager's Guide to Thwarting Data Thieves and Hackers (PSI Business Security) 2008
152507 Layton T. Information Security: Design, Implementation, Measurement, and Compliance 2007
141011 0 Information Security: Keeping Data Safe 2002
137531 Detmar W. Straub, Seymour Goodman, Richard Baskerville Information Security: Policy, Processes, and Practices 2008
193743 Mambo M., Zheng Y. Information Security: Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 6-7, 1999 Proceedings 1999
143193 Pieprzyk J., Okamoto E., Seberry J. Information Security: Third International Workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000. Proceedings 2000


blank
HR
@Mail.ru
© Ýëåêòðîííàÿ áèáëèîòåêà ïîïå÷èòåëüñêîãî ñîâåòà ìåõìàòà ÌÃÓ, 2004-2024
Ýëåêòðîííàÿ áèáëèîòåêà ìåõìàòà ÌÃÓ | Valid HTML 4.01!| Valid CSS! Î ïðîåêòå