√лавна€    Ex Libris     ниги    ∆урналы    —татьи    —ерии     аталог    Wanted    «агрузка    ’удЋит    —правка    ѕоиск по индексам    ѕоиск    ‘орум   
ћехмат€нам
square ѕервый курс

square ¬торой курс

square “ретий курс

square „етвертый курс

square ѕ€тый курс
blank
јвторизаци€

       
blank
ѕоиск по указател€м

blank
 расота
blank
blank
Ѕыстрый переход
ѕо названию:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ј Ѕ ¬ ƒ ® « »   Ћ ћ Ќ ќ ѕ ÷ Ў ў Ё ё я
ѕо автору:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ® ј Ѕ ¬ ƒ « »   Ћ ћ Ќ ќ ѕ ÷ Ў ў џ Ё ё я
blank
¬се ресурсы
—ортировка:

ID asc desc pic јвторы asc desc Ќазвание asc desc √од asc desc ƒоп.
8139 Cardinal S. Secrets of spectroscopy revealed 2002ХХ
64182 Barber H. Secrets of Swiss Banking: An Owner's Manual to Quietly Building a Fortune 2008ХХ
12669 Laramee F.D. Secrets of the Game Business 2003ХХ
27735 Breen Ch. Secrets of the iPod 2002ХХ
23018 Breen C. Secrets of the iPod and iTunes 2004 ХХХ
76513 Ashida Kim Secrets of the Ninja 1981ХХ
145302 Cahill J. Secrets of the Ninja: Their Training, Tools and Techniques 2003ХХ
32246 Bernstein J. Secrets of the Old One: Einstein 1905 2005ХХ
16280 Durham J. Secrets of the PlayStation Portable 2006ХХ
52724 Bouroudjian H.J. Secrets of the Trading Pros: Techniques and Tips That Pros Use to Beat the Market 2007 ХХХ
16279 Verdi M., Hodson R., Weynand D. Secrets of Videoblogging 2006ХХ
43395 Section operators n/aХХ
61123 Catalano V. Sectors and Styles: A New Approach to Outperforming the Market 2006ХХ
19456 Graff M.G. (ed.), Van Wyk K.R., Russell D. Secure Coding: Principles and Practices 2003ХХ
27736 Huth M.R. Secure Communicating Systems: Design, Analysis, and Implementation 2001ХХ
31471 Sutton R.J. Secure Communication: Applications and Management 2002ХХ
175882 Ye N. Secure Computer and Network Systems: Modeling, Analysis and Design 2008ХХ
142164 Jonker W., Petkovic M. Secure Data Management 2009ХХ
30082 Yu T. (Ed), Jajodia S. (Ed) Secure Data Management in Decentralized Systems 2006ХХ
195757 Ting Yu (Editor), Sushil Jajodia (Editor) Secure Data Management in Decentralized Systems (Advances in Information Security) 2006ХХ
85676 Jonker W., Petković M. Secure Data Management: 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007, Proceedings 2007ХХ
81681 Goos G. (Editor), Hartmanis J. (Editor), van Leeuwen J. (Editor) Secure Data Management: 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008, Proceedings 2008 ХХХ
163909 Jonker W., Petkovic M. Secure Data Management: 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008, Proceedings (Lecture Notes in Computer Science) 2008ХХ
159121 Jonker W., Petkovic M. Secure Data Management: 7th VLDB Workshop, SDM 2010 2010 ХХХ
133785 Jonker W., Petkovic M. Secure Data Management: 7th VLDB Workshop, SDM 2010, Singapore, September 17, 2010, Proceedings 2010ХХ
139591 Jonker W., Petkovic M. Secure Data Management: 7th VLDB Workshop, SDM 2010, Singapore, September 17, 2010, Proceedings (Lecture Notes in Computer Science Information Systems and Applications, incl. Internet Web, and HCI) 2010ХХ
169220 Jonker W., Petkovic M. Secure Data Management: Second VLDB Workshop, SDM 2005, Trondheim, Norway, August 30-September 2, 2005, Proceedings 2005ХХ
150162 Willem Jonker, Milan Petkovic Secure Data Management: Third VLDB Workshop, SDM 2006, Seoul, Korea, September 10-11, 2006, Proceedings 2006 ХХХ
191782 Jonker W., Petkovic M. Secure Data Management: VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings (Lecture Notes in Computer Science) 2005ХХ
187252 Ogiela M., Ogiela U. Secure Information Management Using Linguistic Threshold Approach 2014ХХ
180341 Vitek J., Jensen C. Secure Internet Programming 1999ХХ
186348 Taha S., Shen X. Secure IP Mobility Management for VANET 2013ХХ
188726 Nielson H., Gollmann D. Secure IT Systems: 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings 2013ХХ
133763 Choo R. Secure Key Establishment 2008ХХ
139560 Choo K. Secure Key Establishment 2009ХХ
127566 Poovendran R., Wang C., Roy S. Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks 2007ХХ
30083 Robichaux P. Secure Messaging with Microsoft Exchange Server 2000 2003 ХХХ
23350 Robichaux R. Secure Messaging with Microsoft Exchange Server 2003 2004ХХ
160462 Burmester M., Yasinsac A. Secure Mobile Ad-hoc Networks and Sensors: First International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papers 2006ХХ
193251 Onieva J., Zhou J. Secure Multi-Party Non-Repudiation Protocols and Applications 2009 ХХХ
149554 Baumgart R. Secure Networking - CQRE (Secure) '99: International Exhibition and Congress D?sseldorf, Germany, November 30 - December 2, 1999, Proceedings 1999ХХ
23484 Kabir M.J. Secure PHP Development: Building 50 Practical Applications 2003ХХ
26967 Galic M. Secure Portal: Using Websphere Portal V5 and Tivoli Access Manager V4.1 2003ХХ
13930 Messier M., Viega J. Secure Programming Cookbook for C and C++ 2003ХХ
112164 Wheeler D.A. Secure Programming for Linux and Unix HOWTO 2003ХХ
152881 Wheeler D. Secure programming with Linux and Unix HOWTO 2003ХХ
26382 Chess B., West J., McGraw G. Secure Programming with Static Analysis 2007ХХ
26497 Goransson P., Greenlaw R. Secure Roaming in 802.11 Networks 2007ХХ
29587 Jurjens J. Secure Systems Development with UML 2004ХХ
77976 Chen Q. Secure Transaction Protocol Analysis: Models and Applications 2008ХХ


blank
HR
@Mail.ru
© Ёлектронна€ библиотека попечительского совета мехмата ћ√”, 2004-2020
Ёлектронна€ библиотека мехмата ћ√” | Valid HTML 4.01!| Valid CSS! ќ проекте