√лавна€    Ex Libris     ниги    ∆урналы    —татьи    —ерии     аталог    Wanted    «агрузка    ’удЋит    —правка    ѕоиск по индексам    ѕоиск    ‘орум   
ћехмат€нам
square ѕервый курс

square ¬торой курс

square “ретий курс

square „етвертый курс

square ѕ€тый курс
blank
јвторизаци€

       
blank
ѕоиск по указател€м

blank
 расота
blank
blank
Ѕыстрый переход
ѕо названию:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ј Ѕ ¬ ƒ ® « »   Ћ ћ Ќ ќ ѕ ÷ Ў ў Ё ё я
ѕо автору:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ® ј Ѕ ¬ ƒ « »   Ћ ћ Ќ ќ ѕ ÷ Ў ў џ Ё ё я
blank
¬се ресурсы
—ортировка:

ID asc desc pic јвторы asc desc Ќазвание asc desc √од asc desc ƒоп.
23162 Dykstra T., Fuller E., Miles G. Security Assessment: Case Studies for Implementing the NSA IAM 2004ХХ
76478 Rogers R., Miles G., Fuller E. Security Assessment: Case Studies for Implementing the NSA IAM 2004 ХХХ
75533 Sennewald C. A. Security Consulting 2004 ХХХ
13945 Brewer D.C. Security Controls for Sarbanes-Oxley Section 404 IT Compliance: Authorization, Authentication, and Access 2006ХХ
143772 Herrmann D. Security Engineering and Information Assurance 2002ХХ
183361 Chen J., Miyaji A., Cuzzocrea A. Security Engineering and Intelligence Informatics: CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings 2013ХХ
79109 Schumacher M. Security Engineering with Patterns. Origins, Theoretical Model, and New Applications (Lecture Notes in Computer Science) 2003ХХ
22961 Robinson E., Bond M.J. Security for Microsoft Visual Basic .NET 2003ХХ
194513 Rountree D. Security for Microsoft Windows System Administrators 2011ХХ
164796 Rountree D. Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts 2010ХХ
172553 Rountree D. Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts 2010ХХ
181070 Rountree D. Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts 2011ХХ
133348 Aissi S., Dabbous N., Prasad A. Security for Mobile Networks and Platforms 2006ХХ
80260 Bertino E., Martino L.M., Paci F. Security for web services and service-oriented architectures 2010ХХ
29601 Anjum F., Mouchtaris P. Security for Wireless Ad-hoc Networks 2007ХХ
28371 Hassler V. Security Fundamentals for E-Commerce 2000ХХ
196308 V. Hassler Security Fundamentals for E-Commerce (Artech House Computer Security Series) 2002ХХ
141123 Cimato S., Galdi C., Persiano G. Security in Communication Networks 2003ХХ
78427 Blundo C., Cimato S. Security in Communication Networks, 4 conf., SCN 2004 2005 ХХХ
17420 Pfleeger C.P., Pfleeger S.L. Security in Computing 2006 ХХХ
19503 Pfleeger C.P., Pfleeger S.L. Security in Computing 2002 ХХХ
186924 Fan C., Thampi S., Atrey P. Security in Computing and Communications: International Symposium, SSCC 2013, Mysore, India, August 22-24, 2013. Proceedings 2013ХХ
26400 Xiao Y. Security in Distributed, Grid, Mobile, and Pervasive Computing 2007ХХ
28372 Weippl E.R. Security in e-learning 2005ХХ
146052 Dieter Hutter, Stephan W. Security in Pervasive Computing: First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers 2004ХХ
160005 Hutter D., Ullmann M. Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings 2005ХХ
167640 Clark I., Paige R., Polack F. Security in Pervasive Computing: Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings 2006ХХ
60556 Yang Xiao Security in Sensor Networks 2007ХХ
24829 Hardjono Th., Dondeti L.R. Security in Wireless LANs and MANs 2005ХХ
132054 Gal C.S., Kantor P.B. Security Informatics and Terrorism 2007ХХ
191999 Miller D., Harris S., Harper A. Security Information and Event Management (SIEM) Implementation (Network Pro Library) 2011ХХ
140775 Miller D., Harris S., Harper A. Security Information and Event Management Implementation 2010ХХ
29394 Butler C., Fuller E., Rogers J.A. Security Interviews Exposed: Secrets to Landing Your Next Information Security Job 2007ХХ
31415 Butler Ch., Rogers R., Hurley Ch. Security Interviews Exposed: Secrets to Landing Your Next Information Security Job 2007ХХ
24830 Babbin J., Carter E.F. Security Log Management: Identifying Patterns in the Chaos 2006ХХ
56788 Duffie D. Security Markets. Stochastic Models 1988ХХ
136026 Gerald L. Kovacich, Edward Halibozek Security Metrics Management: How to Manage the Costs of an Assets Protection Program 2005 ХХХ
139364 Kovacich G., Halibozek E. Security Metrics Management: How to Manage the Costs of an Assets Protection Program 2006ХХ
58695 Jaquith A. Security Metrics: Replacing Fear, Uncertainty, and Doubt 2007ХХ
29606 Jaquith A. Security Metrics: Replacing Fear, Uncertainty, and Doubt (Symantec Press Series) 2007ХХ
133783 Tsai J., Ma L. Security Modeling And Analysis of Mobile Agent Systems 2006ХХ
139590 Tsai J., Ma L. Security Modeling And Analysis of Mobile Agent Systems 2006ХХ
166434 Tsai J., Ma L. Security Modeling and Analysis of Mobile Agent Systems (Electrical and Computer Engineering) 2006ХХ
80683 Halleen G., Kellogg G. Security Monitoring with Cisco Security MARS 2007ХХ
195994 M. Obaidat, N.Boudriga Security of e-Systems and Computer Networks 2007ХХ
165297 Hetland J., Gochitashvili T. Security of Natural Gas Supply through Transit Countries (NATO Science Series II: Mathematics, Physics and Chemistry) 2004ХХ
153316 Cabrera E., Vela A. Security of Water Supply Systems 2006ХХ
189392 Poweski B., Raphael D. Security on Rails 2009ХХ
127041 Poweski B., Raphael D. Security on Rails (The Pragmatic Programmers) 2009ХХ
24302 Schumacher M., Fernandez-Buglioni E., Hybertson D. Security Patterns Integrating Security and Systems Engineering 2006ХХ


blank
HR
@Mail.ru
© Ёлектронна€ библиотека попечительского совета мехмата ћ√”, 2004-2020
Ёлектронна€ библиотека мехмата ћ√” | Valid HTML 4.01!| Valid CSS! ќ проекте