Ãëàâíàÿ    Ex Libris    Êíèãè    Æóðíàëû    Ñòàòüè    Ñåðèè    Êàòàëîã    Wanted    Çàãðóçêà    ÕóäËèò    Ñïðàâêà    Ïîèñê ïî èíäåêñàì    Ïîèñê    Ôîðóì   
Ìåõìàòÿíàì
square Ïåðâûé êóðñ

square Âòîðîé êóðñ

square Òðåòèé êóðñ

square ×åòâåðòûé êóðñ

square Ïÿòûé êóðñ
blank
Àâòîðèçàöèÿ

       
blank
Ïîèñê ïî óêàçàòåëÿì

blank
Êðàñîòà
blank
blank
Áûñòðûé ïåðåõîä
Ïî íàçâàíèþ:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z À Á Â Ã Ä Å ¨ Æ Ç È É Ê Ë Ì Í Î Ï Ð Ñ Ò Ó Ô Õ Ö × Ø Ù Û Ý Þ ß
Ïî àâòîðó:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ¨ À Á Â Ã Ä Å Æ Ç È É Ê Ë Ì Í Î Ï Ð Ñ Ò Ó Ô Õ Ö × Ø Ù Û Ý Þ ß
blank
Âñå ðåñóðñû
Ñîðòèðîâêà:

ID asc desc pic Àâòîðû asc desc Íàçâàíèå asc desc Ãîä asc desc Äîï.
10181 Securing data on the Web 2001
142565 Lukszo Z., Deconinck G., Weijnen M. Securing Electricity Supply in the Cyber Age: Exploring the Risks of Information and Communication Technology in Tomorrow's Electricity Infrastructure (Topics in Safety, Risk, Reliability and Quality) 2010
76131 Piccard P.L. Securing IM and P2P Applications for the Enterprise 2005
152846 Furnell S., Katsikas S., Lopez J. Securing Information and Communications Systems: Principles, Technologies, and Applications (Information Security & Privacy) 2008
176725 Furnell S., Katsikas S., Lopez J. Securing Information and Communications Systems: Principles, Technologies, and Applications (Information Security & Privacy) 2008
27172 Brotzman L. (Ed), Ranch D. (Ed) Securing Linux Step by Step 1999
24827 Koconis D., Murray J. Securing Linux: A Survival Guide for Linux Security 2003
12484 Krutz R.L. Securing SCADA Systems 2005
55304 Kizza F.M. Securing the Information Infrastructure 2007
166109 Kizza J., Kizza F. Securing the Information Infrastructure 2008
58051 Ness L. Securing Utility and Energy Infrastructures 2006
29589 Thermos P., Takanen A. Securing VoIP Networks: Threats, Vulnerabilities, Countermeasures 2007
22962 Rosenberg J., Remy D. Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption 2004
26602 Shawgo J. Securing Windows 2000 Step-by-Step, Vol. 5 2001
19457 Danseglio M. Securing Windows Server 2003 2004
152503 Liu R., Trappe W. Securing Wireless Communications at the Physical Layer 2009
24022 Held J. Securing Wireless LANs: A Practical Guide for Network Managers, LAN Administrators and the Home Office User 2003
13287 Abelar G. Securing Your Business with Cisco ASA and PIX Firewalls 2005
29673 Miller D.R., Gregg M. Security Administrator Street Smarts: A Real World Guide to CompTIA Security+ Skills 2007
198286 Graham B., Dodd D. Security Analysis 1996
164867 Graham B., Dodd D. Security Analysis: Principles and Technique, Second Edition 1934
192345 Hawker A. Security and Control in Information Systems: A Guide for Business and Accounting 2000
211035 Verhagen H.L.E. Security and Credit in Roman Law: The Historical Evolution of Pignus and Hypotheca 2022
80456 Ostrovsky R.(ed.), Prisco R.(ed.), Visconti I.(ed.) Security and Cryptography for Networks 6th International Conference, SCN 2008 Amalfi, Italy, September 10-12, 2008 Proceedings 2008
169630 De Prisco R., Yung M. Security and Cryptography for Networks: 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006, Proceedings 2006
190750 Ostrovsky R., Prisco R., Visconti I. Security and Cryptography for Networks: 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008, Proceedings (Lecture Notes in Computer Science) 2008
169349 Serpanos D.N., Giladi R. Security and Embedded Systems: Volume 2 NATO Security through Science Series: Information and Communication Security (Nato Security Through Science) 2006
158864 Security and HackingHave You Locked the Castle Gate. Home and Small Business Computer Security n/a
156994 Henriques M., Khachani M. Security And Migrations in the Mediterranean: Playing With Fire (NATO Science Series: Science & Technology Policy) (Nato Science Series: Science & Technology Policy) 2006
79209 Stajano F. (ed.), Meadows C. (ed.), Capkun S. (ed.) Security and Privacy in Ad-hoc and Sensor Networks. 4th European Workshop, ESAS 2007 Cambridge, UK, July 2-3, 2007 Proceedings 2007
144243 Molva R., Tsudik G., Westhoff D. Security and Privacy in Ad-hoc and Sensor Networks: Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005. Revised Selected Papers 2005
153377 Buttyan L., Gligor V., Westhoff D. Security and Privacy in Ad-Hoc and Sensor Networks: Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected 2006
177661 Jajodia S., Zhou J. Security and privacy in communication networks 2010
28870 Feigenbaum J. (Ed) Security and Privacy in Digital Rights Management 2003
191017 Sander T. Security and Privacy in Digital Rights Management: ACM CCS-8 Workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001. Revised Papers 2002
135931 Fischer-Hubner S. Security and Privacy in Dynamic Environments 2006
135627 Lian S. Security and Privacy in Mobile Information and Communication Systems 2009
173985 Lian S., Schmidt A. Security and Privacy in Mobile Information and Communication Systems 2009
178299 Schmidt F., Russello G., Lioy A. Security and Privacy in Mobile Information and Communication Systems (LNICST, 47) 2010
55586 Adomi E.E. Security and Software for Cybercafes 2008
184091 Delakouridis C., Anagnostopoulos C., Accorsi R. Security and Trust Management: 9th International Workshop, STM 2013, Egham, UK, September 12-13, 2013. Proceedings 2013
24828 Cranor L.F., Garfinkel S. Security and Usability: Designing Secure Systems that People Can Use 2005
23162 Dykstra T., Fuller E., Miles G. Security Assessment: Case Studies for Implementing the NSA IAM 2004
76478 Rogers R., Miles G., Fuller E. Security Assessment: Case Studies for Implementing the NSA IAM 2004
75533 Sennewald C. A. Security Consulting 2004
13945 Brewer D.C. Security Controls for Sarbanes-Oxley Section 404 IT Compliance: Authorization, Authentication, and Access 2006
143772 Herrmann D. Security Engineering and Information Assurance 2002
183361 Chen J., Miyaji A., Cuzzocrea A. Security Engineering and Intelligence Informatics: CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings 2013
79109 Schumacher M. Security Engineering with Patterns. Origins, Theoretical Model, and New Applications (Lecture Notes in Computer Science) 2003
22961 Robinson E., Bond M.J. Security for Microsoft Visual Basic .NET 2003


blank
HR
@Mail.ru
© Ýëåêòðîííàÿ áèáëèîòåêà ïîïå÷èòåëüñêîãî ñîâåòà ìåõìàòà ÌÃÓ, 2004-2024
Ýëåêòðîííàÿ áèáëèîòåêà ìåõìàòà ÌÃÓ | Valid HTML 4.01!| Valid CSS! Î ïðîåêòå