Ãëàâíàÿ    Ex Libris    Êíèãè    Æóðíàëû    Ñòàòüè    Ñåðèè    Êàòàëîã    Wanted    Çàãðóçêà    ÕóäËèò    Ñïðàâêà    Ïîèñê ïî èíäåêñàì    Ïîèñê    Ôîðóì   
Ìåõìàòÿíàì
square Ïåðâûé êóðñ

square Âòîðîé êóðñ

square Òðåòèé êóðñ

square ×åòâåðòûé êóðñ

square Ïÿòûé êóðñ
blank
Àâòîðèçàöèÿ

       
blank
Ïîèñê ïî óêàçàòåëÿì

blank
Êðàñîòà
blank
blank
Áûñòðûé ïåðåõîä
Ïî íàçâàíèþ:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z À Á Â Ã Ä Å ¨ Æ Ç È É Ê Ë Ì Í Î Ï Ð Ñ Ò Ó Ô Õ Ö × Ø Ù Û Ý Þ ß
Ïî àâòîðó:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ¨ À Á Â Ã Ä Å Æ Ç È É Ê Ë Ì Í Î Ï Ð Ñ Ò Ó Ô Õ Ö × Ø Ù Û Ý Þ ß
blank
Âñå ðåñóðñû
Ñîðòèðîâêà:

ID asc desc pic Àâòîðû asc desc Íàçâàíèå asc desc Ãîä asc desc Äîï.
191017 Sander T. Security and Privacy in Digital Rights Management: ACM CCS-8 Workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001. Revised Papers 2002
135931 Fischer-Hubner S. Security and Privacy in Dynamic Environments 2006
135627 Lian S. Security and Privacy in Mobile Information and Communication Systems 2009
173985 Lian S., Schmidt A. Security and Privacy in Mobile Information and Communication Systems 2009
178299 Schmidt F., Russello G., Lioy A. Security and Privacy in Mobile Information and Communication Systems (LNICST, 47) 2010
55586 Adomi E.E. Security and Software for Cybercafes 2008
184091 Delakouridis C., Anagnostopoulos C., Accorsi R. Security and Trust Management: 9th International Workshop, STM 2013, Egham, UK, September 12-13, 2013. Proceedings 2013
24828 Cranor L.F., Garfinkel S. Security and Usability: Designing Secure Systems that People Can Use 2005
23162 Dykstra T., Fuller E., Miles G. Security Assessment: Case Studies for Implementing the NSA IAM 2004
76478 Rogers R., Miles G., Fuller E. Security Assessment: Case Studies for Implementing the NSA IAM 2004
217275 Lunkeit A., Zimmer W. Security by Design: Security Engineering informationstechnischer Systeme n/a
75533 Sennewald C. A. Security Consulting 2004
13945 Brewer D.C. Security Controls for Sarbanes-Oxley Section 404 IT Compliance: Authorization, Authentication, and Access 2006
143772 Herrmann D. Security Engineering and Information Assurance 2002
183361 Chen J., Miyaji A., Cuzzocrea A. Security Engineering and Intelligence Informatics: CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings 2013
79109 Schumacher M. Security Engineering with Patterns. Origins, Theoretical Model, and New Applications (Lecture Notes in Computer Science) 2003
22961 Robinson E., Bond M.J. Security for Microsoft Visual Basic .NET 2003
172553 Rountree D. Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts 2010
133348 Aissi S., Dabbous N., Prasad A. Security for Mobile Networks and Platforms 2006
80260 Bertino E., Martino L.M., Paci F. Security for web services and service-oriented architectures 2010
29601 Anjum F., Mouchtaris P. Security for Wireless Ad-hoc Networks 2007
196308 V. Hassler Security Fundamentals for E-Commerce (Artech House Computer Security Series) 2002
141123 Cimato S., Galdi C., Persiano G. Security in Communication Networks 2003
78427 Blundo C., Cimato S. Security in Communication Networks, 4 conf., SCN 2004 2005
17420 Pfleeger C.P., Pfleeger S.L. Security in Computing 2006
19503 Pfleeger C.P., Pfleeger S.L. Security in Computing 2002
186924 Fan C., Thampi S., Atrey P. Security in Computing and Communications: International Symposium, SSCC 2013, Mysore, India, August 22-24, 2013. Proceedings 2013
26400 Xiao Y. Security in Distributed, Grid, Mobile, and Pervasive Computing 2007
28372 Weippl E.R. Security in e-learning 2005
146052 Dieter Hutter, Stephan W. Security in Pervasive Computing: First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers 2004
160005 Hutter D., Ullmann M. Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings 2005
167640 Clark I., Paige R., Polack F. Security in Pervasive Computing: Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings 2006
60556 Yang Xiao Security in Sensor Networks 2007
24829 Hardjono Th., Dondeti L.R. Security in Wireless LANs and MANs 2005
132054 Gal C.S., Kantor P.B. Security Informatics and Terrorism 2007
191999 Miller D., Harris S., Harper A. Security Information and Event Management (SIEM) Implementation (Network Pro Library) 2011
140775 Miller D., Harris S., Harper A. Security Information and Event Management Implementation 2010
29394 Butler C., Fuller E., Rogers J.A. Security Interviews Exposed: Secrets to Landing Your Next Information Security Job 2007
31415 Butler Ch., Rogers R., Hurley Ch. Security Interviews Exposed: Secrets to Landing Your Next Information Security Job 2007
24830 Babbin J., Carter E.F. Security Log Management: Identifying Patterns in the Chaos 2006
56788 Duffie D. Security Markets. Stochastic Models 1988
136026 Gerald L. Kovacich, Edward Halibozek Security Metrics Management: How to Manage the Costs of an Assets Protection Program 2005
139364 Kovacich G., Halibozek E. Security Metrics Management: How to Manage the Costs of an Assets Protection Program 2006
58695 Jaquith A. Security Metrics: Replacing Fear, Uncertainty, and Doubt 2007
29606 Jaquith A. Security Metrics: Replacing Fear, Uncertainty, and Doubt (Symantec Press Series) 2007
133783 Tsai J., Ma L. Security Modeling And Analysis of Mobile Agent Systems 2006
139590 Tsai J., Ma L. Security Modeling And Analysis of Mobile Agent Systems 2006
166434 Tsai J., Ma L. Security Modeling and Analysis of Mobile Agent Systems (Electrical and Computer Engineering) 2006
80683 Halleen G., Kellogg G. Security Monitoring with Cisco Security MARS 2007
195994 M. Obaidat, N.Boudriga Security of e-Systems and Computer Networks 2007


blank
HR
@Mail.ru
© Ýëåêòðîííàÿ áèáëèîòåêà ïîïå÷èòåëüñêîãî ñîâåòà ìåõìàòà ÌÃÓ, 2004-2025
Ýëåêòðîííàÿ áèáëèîòåêà ìåõìàòà ÌÃÓ | Valid HTML 4.01!| Valid CSS! Î ïðîåêòå