Ãëàâíàÿ    Ex Libris    Êíèãè    Æóðíàëû    Ñòàòüè    Ñåðèè    Êàòàëîã    Wanted    Çàãðóçêà    ÕóäËèò    Ñïðàâêà    Ïîèñê ïî èíäåêñàì    Ïîèñê    Ôîðóì   
Ìåõìàòÿíàì
square Ïåðâûé êóðñ

square Âòîðîé êóðñ

square Òðåòèé êóðñ

square ×åòâåðòûé êóðñ

square Ïÿòûé êóðñ
blank
Àâòîðèçàöèÿ

       
blank
Ïîèñê ïî óêàçàòåëÿì

blank
Êðàñîòà
blank
blank
Áûñòðûé ïåðåõîä
Ïî íàçâàíèþ:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z À Á Â Ã Ä Å ¨ Æ Ç È É Ê Ë Ì Í Î Ï Ð Ñ Ò Ó Ô Õ Ö × Ø Ù Û Ý Þ ß
Ïî àâòîðó:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ¨ À Á Â Ã Ä Å Æ Ç È É Ê Ë Ì Í Î Ï Ð Ñ Ò Ó Ô Õ Ö × Ø Ù Û Ý Þ ß
blank
Âñå ðåñóðñû
Ñîðòèðîâêà:

ID asc desc pic Àâòîðû asc desc Íàçâàíèå asc desc Ãîä asc desc Äîï.
132986 Allen J.R. Sedimentary Structures. Their Character and Physical Basis 1982
133334 Allen J.R. Sedimentary structures. Their character and physical basis 1982
51264 Tucker M.E. Sedimentary Rocks in the Field 2003
84192 Friend P.F., Nichols G., Williams E. Sedimentary processes, environments, and basins. A tribute to Peter Friend 2007
162109 Gyr A., Hoyer K. Sediment transport a geophysical phenomenon 2006
41103 Jones S.J. (Ed) Sediment Flux to Basins: Causes, Controls and Consequences 2002
40948 Kusuda T. (Ed), Yamanishi H. Sediment and Ecohydraulics: INTERCOH 2005, Vol. 9 2007
24303 Robbins A. sed & awk Pocket Reference 2002
183767 Schaumont P., Aysu A., Gierlichs B. Security, Privacy, and Applied Cryptography Engineering: Third International Conference, SPACE 2013, Kharagpur, India, October 19-23, 2013. Proceedings 2013
30085 Petkovic M. (Ed), Jonker W. (Ed) Security, Privacy and Trust in Modern Data Management 2007
76726 Dulaney E., Pastore M. Security+, Study Guide 2004
26956 Crayton C.A., Dubrawsky I., Cross M. Security+ Study Guide and DVD Training System 2007
29592 Dubrawsky I., Faircloth J. Security+ Study Guide 2007
75667 Crayton C.A., Dubrawsky I., Cross M. Security+ Study Guide 2003
19528 Hausman K., Barrett D., Weiss M. Security+ Exam Cram 2 (Exam SYO-101) 2003
26098 Microsoft Corporation, Hudson K., Ruth A. Security+ Certification Training Kit 2003
22627 Peikari C., Chuvakin A. Security Warrior 2004
149032 Fang W., Khan M., Arnett K. Security Technology, Disaster Recovery and Business Continuity 2010
175636 Coon J. Security Technology in U.S. Public Schools (Criminal Justice) 2007
155802 Dominik Slezak, Tai-Hoon Kim, Wai-chi Fang Security Technology (Communications in Computer and Information Science, 58) 2010
24500 Oppliger R. Security Technologies for the World Wide Web 2003
24831 Andres S., Kenyon B. Security Sage's Guide to Hardening the Network Infrastructure 2004
132100 Lomas M. Security Protocols: International Workshop Cambridge, United Kingdom April 10-12, 1996 Proceedings 1997
78944 Christianson B., Crispo B. Security Protocols: 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers 2005
80452 Bruce Christianson B.(ed.), Bruno Crispo B.(ed.), Malcolm J.A.(ed.) Security Protocols 7th International Workshop Cambridge, UK, April 19-21, 1999 Proceedings 2000
80551 Christianson B.(ed.), Crispo B.(ed.), Malcom J.A.(ed.) Security Protocols 13th International Workshop Cambridge, UK, April 20-22, 2005 Revised Selected Papers 2007
80549 Christianson B.(ed.), Crispo B.(ed.), Malcolm J.A.(ed.) Security Protocols 10th International Workshop Cambridge, UK, April 17-19, 2002 Revised Papers 2004
158310 Christianson B., Crispo B., Malcolm J. Security Protocols 2010
134352 Rannenberg K. (ed.), Varadharajan V. (ed.), Weber C. (ed.) Security Privacy - Silver Linings in the Cloud 2010
30073 Bryan B., Killion D., Lynn M. Security Power Tools 2007
27476 Maiwald E., Sieglein W. Security Planning and Disaster Recovery 2002
24302 Schumacher M., Fernandez-Buglioni E., Hybertson D. Security Patterns Integrating Security and Systems Engineering 2006
127041 Poweski B., Raphael D. Security on Rails (The Pragmatic Programmers) 2009
189392 Poweski B., Raphael D. Security on Rails 2009
153316 Cabrera E., Vela A. Security of Water Supply Systems 2006
165297 Hetland J., Gochitashvili T. Security of Natural Gas Supply through Transit Countries (NATO Science Series II: Mathematics, Physics and Chemistry) 2004
195994 M. Obaidat, N.Boudriga Security of e-Systems and Computer Networks 2007
80683 Halleen G., Kellogg G. Security Monitoring with Cisco Security MARS 2007
166434 Tsai J., Ma L. Security Modeling and Analysis of Mobile Agent Systems (Electrical and Computer Engineering) 2006
133783 Tsai J., Ma L. Security Modeling And Analysis of Mobile Agent Systems 2006
139590 Tsai J., Ma L. Security Modeling And Analysis of Mobile Agent Systems 2006
29606 Jaquith A. Security Metrics: Replacing Fear, Uncertainty, and Doubt (Symantec Press Series) 2007
58695 Jaquith A. Security Metrics: Replacing Fear, Uncertainty, and Doubt 2007
136026 Gerald L. Kovacich, Edward Halibozek Security Metrics Management: How to Manage the Costs of an Assets Protection Program 2005
139364 Kovacich G., Halibozek E. Security Metrics Management: How to Manage the Costs of an Assets Protection Program 2006
56788 Duffie D. Security Markets. Stochastic Models 1988
24830 Babbin J., Carter E.F. Security Log Management: Identifying Patterns in the Chaos 2006
29394 Butler C., Fuller E., Rogers J.A. Security Interviews Exposed: Secrets to Landing Your Next Information Security Job 2007
31415 Butler Ch., Rogers R., Hurley Ch. Security Interviews Exposed: Secrets to Landing Your Next Information Security Job 2007
140775 Miller D., Harris S., Harper A. Security Information and Event Management Implementation 2010


blank
HR
@Mail.ru
© Ýëåêòðîííàÿ áèáëèîòåêà ïîïå÷èòåëüñêîãî ñîâåòà ìåõìàòà ÌÃÓ, 2004-2024
Ýëåêòðîííàÿ áèáëèîòåêà ìåõìàòà ÌÃÓ | Valid HTML 4.01!| Valid CSS! Î ïðîåêòå