√лавна€    Ex Libris     ниги    ∆урналы    —татьи    —ерии     аталог    Wanted    «агрузка    ’удЋит    —правка    ѕоиск по индексам    ѕоиск    ‘орум   
ћехмат€нам
square ѕервый курс

square ¬торой курс

square “ретий курс

square „етвертый курс

square ѕ€тый курс
blank
јвторизаци€

       
blank
ѕоиск по указател€м

blank
 расота
blank
blank
Ѕыстрый переход
ѕо названию:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ј Ѕ ¬ ƒ ® « »   Ћ ћ Ќ ќ ѕ ÷ Ў ў Ё ё я
ѕо автору:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ® ј Ѕ ¬ ƒ « »   Ћ ћ Ќ ќ ѕ ÷ Ў ў џ Ё ё я
blank
¬се ресурсы
—ортировка:

ID asc desc pic јвторы asc desc Ќазвание asc desc √од asc desc ƒоп.
26382 Chess B., West J., McGraw G. Secure Programming with Static Analysis 2007ХХ
26497 Goransson P., Greenlaw R. Secure Roaming in 802.11 Networks 2007ХХ
29587 Jurjens J. Secure Systems Development with UML 2004ХХ
77976 Chen Q. Secure Transaction Protocol Analysis: Models and Applications 2008ХХ
169524 Chen Q., Zhang C., Zhang S. Secure Transaction Protocol Analysis: Models and Applications (Lecture Notes in Computer Science / Programming and Software Engineering) 2008ХХ
20791 Eastlake D.E., Niles K. Secure XML: The New Syntax for Signatures and Encryption 2002ХХ
21475 Seagren E., Noonan W.J. (ed.) Secure Your Network for Free 2007ХХ
158158 Information Security Securing Intellectual Property: Protecting Trade Secrets and Other Information Assets (Information Security) 2008ХХ
30084 Wells Ch. Securing Ajax Applications: Ensuring the Safety of the Dynamic Web 2007ХХ
28370 Davis P.T. Securing and controlling Cisco routers 2002ХХ
27173 Mourani G. Securing and Optimizing Linux: A Hands on Guide for Linux Professionals, Redhat Edition 2000ХХ
26918 Mourani G. Securing and Optimizing Red Hat Linux 2000ХХ
14041 Securing Cisco IOS Networks 2004ХХ
29588 Macaulay T. Securing Converged IP Networks: New Requirements for ICT Security and Assurance 2006ХХ
10181 Securing data on the Web 2001ХХ
142565 Lukszo Z., Deconinck G., Weijnen M. Securing Electricity Supply in the Cyber Age: Exploring the Risks of Information and Communication Technology in Tomorrow's Electricity Infrastructure (Topics in Safety, Risk, Reliability and Quality) 2010ХХ
76131 Piccard P.L. Securing IM and P2P Applications for the Enterprise 2005ХХ
152846 Furnell S., Katsikas S., Lopez J. Securing Information and Communications Systems: Principles, Technologies, and Applications (Information Security & Privacy) 2008ХХ
176725 Furnell S., Katsikas S., Lopez J. Securing Information and Communications Systems: Principles, Technologies, and Applications (Information Security & Privacy) 2008ХХ
27172 Brotzman L. (Ed), Ranch D. (Ed) Securing Linux Step by Step 1999ХХ
24827 Koconis D., Murray J. Securing Linux: A Survival Guide for Linux Security 2003ХХ
12484 Krutz R.L. Securing SCADA Systems 2005ХХ
55304 Kizza F.M. Securing the Information Infrastructure 2007ХХ
166109 Kizza J., Kizza F. Securing the Information Infrastructure 2008ХХ
58051 Ness L. Securing Utility and Energy Infrastructures 2006ХХ
29589 Thermos P., Takanen A. Securing VoIP Networks: Threats, Vulnerabilities, Countermeasures 2007ХХ
22962 Rosenberg J., Remy D. Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption 2004ХХ
26602 Shawgo J. Securing Windows 2000 Step-by-Step, Vol. 5 2001ХХ
19457 Danseglio M. Securing Windows Server 2003 2004ХХ
152503 Liu R., Trappe W. Securing Wireless Communications at the Physical Layer 2009ХХ
24022 Held J. Securing Wireless LANs: A Practical Guide for Network Managers, LAN Administrators and the Home Office User 2003ХХ
13287 Abelar G. Securing Your Business with Cisco ASA and PIX Firewalls 2005ХХ
29673 Miller D.R., Gregg M. Security Administrator Street Smarts: A Real World Guide to CompTIA Security+ Skills 2007ХХ
164867 Graham B., Dodd D. Security Analysis: Principles and Technique, Second Edition 1934ХХ
192345 Hawker A. Security and Control in Information Systems: A Guide for Business and Accounting 2000ХХ
80456 Ostrovsky R.(ed.), Prisco R.(ed.), Visconti I.(ed.) Security and Cryptography for Networks 6th International Conference, SCN 2008 Amalfi, Italy, September 10-12, 2008 Proceedings 2008ХХ
169630 De Prisco R., Yung M. Security and Cryptography for Networks: 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006, Proceedings 2006ХХ
190750 Ostrovsky R., Prisco R., Visconti I. Security and Cryptography for Networks: 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008, Proceedings (Lecture Notes in Computer Science) 2008ХХ
169349 Serpanos D.N., Giladi R. Security and Embedded Systems: Volume 2 NATO Security through Science Series: Information and Communication Security (Nato Security Through Science) 2006ХХ
158864 Security and HackingHave You Locked the Castle Gate. Home and Small Business Computer Security n/aХХ
156994 Henriques M., Khachani M. Security And Migrations in the Mediterranean: Playing With Fire (NATO Science Series: Science & Technology Policy) (Nato Science Series: Science & Technology Policy) 2006ХХ
79209 Stajano F. (ed.), Meadows C. (ed.), Capkun S. (ed.) Security and Privacy in Ad-hoc and Sensor Networks. 4th European Workshop, ESAS 2007 Cambridge, UK, July 2-3, 2007 Proceedings 2007ХХ
144243 Molva R., Tsudik G., Westhoff D. Security and Privacy in Ad-hoc and Sensor Networks: Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005. Revised Selected Papers 2005ХХ
153377 Buttyan L., Gligor V., Westhoff D. Security and Privacy in Ad-Hoc and Sensor Networks: Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected 2006ХХ
177661 Jajodia S., Zhou J. Security and privacy in communication networks 2010ХХ
28870 Feigenbaum J. (Ed) Security and Privacy in Digital Rights Management 2003ХХ
191017 Sander T. Security and Privacy in Digital Rights Management: ACM CCS-8 Workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001. Revised Papers 2002ХХ
135931 Fischer-Hubner S. Security and Privacy in Dynamic Environments 2006ХХ
135627 Lian S. Security and Privacy in Mobile Information and Communication Systems 2009ХХ
173985 Lian S., Schmidt A. Security and Privacy in Mobile Information and Communication Systems 2009ХХ


blank
HR
@Mail.ru
© Ёлектронна€ библиотека попечительского совета мехмата ћ√”, 2004-2020
Ёлектронна€ библиотека мехмата ћ√” | Valid HTML 4.01!| Valid CSS! ќ проекте