Ãëàâíàÿ    Ex Libris    Êíèãè    Æóðíàëû    Ñòàòüè    Ñåðèè    Êàòàëîã    Wanted    Çàãðóçêà    ÕóäËèò    Ñïðàâêà    Ïîèñê ïî èíäåêñàì    Ïîèñê    Ôîðóì   
Ìåõìàòÿíàì
square Ïåðâûé êóðñ

square Âòîðîé êóðñ

square Òðåòèé êóðñ

square ×åòâåðòûé êóðñ

square Ïÿòûé êóðñ
blank
Àâòîðèçàöèÿ

       
blank
Ïîèñê ïî óêàçàòåëÿì

blank
Êðàñîòà
blank
blank
Áûñòðûé ïåðåõîä
Ïî íàçâàíèþ:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z À Á Â Ã Ä Å ¨ Æ Ç È É Ê Ë Ì Í Î Ï Ð Ñ Ò Ó Ô Õ Ö × Ø Ù Û Ý Þ ß
Ïî àâòîðó:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ¨ À Á Â Ã Ä Å Æ Ç È É Ê Ë Ì Í Î Ï Ð Ñ Ò Ó Ô Õ Ö × Ø Ù Û Ý Þ ß
blank
Âñå ðåñóðñû
Ñîðòèðîâêà:

ID asc desc pic Àâòîðû asc desc Íàçâàíèå asc desc Ãîä asc desc Äîï.
172553 Rountree D. Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts 2010
133348 Aissi S., Dabbous N., Prasad A. Security for Mobile Networks and Platforms 2006
80260 Bertino E., Martino L.M., Paci F. Security for web services and service-oriented architectures 2010
29601 Anjum F., Mouchtaris P. Security for Wireless Ad-hoc Networks 2007
196308 V. Hassler Security Fundamentals for E-Commerce (Artech House Computer Security Series) 2002
141123 Cimato S., Galdi C., Persiano G. Security in Communication Networks 2003
78427 Blundo C., Cimato S. Security in Communication Networks, 4 conf., SCN 2004 2005
17420 Pfleeger C.P., Pfleeger S.L. Security in Computing 2006
19503 Pfleeger C.P., Pfleeger S.L. Security in Computing 2002
186924 Fan C., Thampi S., Atrey P. Security in Computing and Communications: International Symposium, SSCC 2013, Mysore, India, August 22-24, 2013. Proceedings 2013
26400 Xiao Y. Security in Distributed, Grid, Mobile, and Pervasive Computing 2007
28372 Weippl E.R. Security in e-learning 2005
146052 Dieter Hutter, Stephan W. Security in Pervasive Computing: First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers 2004
160005 Hutter D., Ullmann M. Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings 2005
167640 Clark I., Paige R., Polack F. Security in Pervasive Computing: Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings 2006
60556 Yang Xiao Security in Sensor Networks 2007
24829 Hardjono Th., Dondeti L.R. Security in Wireless LANs and MANs 2005
132054 Gal C.S., Kantor P.B. Security Informatics and Terrorism 2007
191999 Miller D., Harris S., Harper A. Security Information and Event Management (SIEM) Implementation (Network Pro Library) 2011
140775 Miller D., Harris S., Harper A. Security Information and Event Management Implementation 2010
29394 Butler C., Fuller E., Rogers J.A. Security Interviews Exposed: Secrets to Landing Your Next Information Security Job 2007
31415 Butler Ch., Rogers R., Hurley Ch. Security Interviews Exposed: Secrets to Landing Your Next Information Security Job 2007
24830 Babbin J., Carter E.F. Security Log Management: Identifying Patterns in the Chaos 2006
56788 Duffie D. Security Markets. Stochastic Models 1988
136026 Gerald L. Kovacich, Edward Halibozek Security Metrics Management: How to Manage the Costs of an Assets Protection Program 2005
139364 Kovacich G., Halibozek E. Security Metrics Management: How to Manage the Costs of an Assets Protection Program 2006
58695 Jaquith A. Security Metrics: Replacing Fear, Uncertainty, and Doubt 2007
29606 Jaquith A. Security Metrics: Replacing Fear, Uncertainty, and Doubt (Symantec Press Series) 2007
133783 Tsai J., Ma L. Security Modeling And Analysis of Mobile Agent Systems 2006
139590 Tsai J., Ma L. Security Modeling And Analysis of Mobile Agent Systems 2006
166434 Tsai J., Ma L. Security Modeling and Analysis of Mobile Agent Systems (Electrical and Computer Engineering) 2006
80683 Halleen G., Kellogg G. Security Monitoring with Cisco Security MARS 2007
195994 M. Obaidat, N.Boudriga Security of e-Systems and Computer Networks 2007
165297 Hetland J., Gochitashvili T. Security of Natural Gas Supply through Transit Countries (NATO Science Series II: Mathematics, Physics and Chemistry) 2004
153316 Cabrera E., Vela A. Security of Water Supply Systems 2006
189392 Poweski B., Raphael D. Security on Rails 2009
127041 Poweski B., Raphael D. Security on Rails (The Pragmatic Programmers) 2009
24302 Schumacher M., Fernandez-Buglioni E., Hybertson D. Security Patterns Integrating Security and Systems Engineering 2006
27476 Maiwald E., Sieglein W. Security Planning and Disaster Recovery 2002
30073 Bryan B., Killion D., Lynn M. Security Power Tools 2007
134352 Rannenberg K. (ed.), Varadharajan V. (ed.), Weber C. (ed.) Security Privacy - Silver Linings in the Cloud 2010
158310 Christianson B., Crispo B., Malcolm J. Security Protocols 2010
80549 Christianson B.(ed.), Crispo B.(ed.), Malcolm J.A.(ed.) Security Protocols 10th International Workshop Cambridge, UK, April 17-19, 2002 Revised Papers 2004
80551 Christianson B.(ed.), Crispo B.(ed.), Malcom J.A.(ed.) Security Protocols 13th International Workshop Cambridge, UK, April 20-22, 2005 Revised Selected Papers 2007
80452 Bruce Christianson B.(ed.), Bruno Crispo B.(ed.), Malcolm J.A.(ed.) Security Protocols 7th International Workshop Cambridge, UK, April 19-21, 1999 Proceedings 2000
78944 Christianson B., Crispo B. Security Protocols: 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers 2005
132100 Lomas M. Security Protocols: International Workshop Cambridge, United Kingdom April 10-12, 1996 Proceedings 1997
24831 Andres S., Kenyon B. Security Sage's Guide to Hardening the Network Infrastructure 2004
24500 Oppliger R. Security Technologies for the World Wide Web 2003
155802 Dominik Slezak, Tai-Hoon Kim, Wai-chi Fang Security Technology (Communications in Computer and Information Science, 58) 2010


blank
HR
@Mail.ru
© Ýëåêòðîííàÿ áèáëèîòåêà ïîïå÷èòåëüñêîãî ñîâåòà ìåõìàòà ÌÃÓ, 2004-2024
Ýëåêòðîííàÿ áèáëèîòåêà ìåõìàòà ÌÃÓ | Valid HTML 4.01!| Valid CSS! Î ïðîåêòå