Ãëàâíàÿ    Ex Libris    Êíèãè    Æóðíàëû    Ñòàòüè    Ñåðèè    Êàòàëîã    Wanted    Çàãðóçêà    ÕóäËèò    Ñïðàâêà    Ïîèñê ïî èíäåêñàì    Ïîèñê    Ôîðóì   
Ìåõìàòÿíàì
square Ïåðâûé êóðñ

square Âòîðîé êóðñ

square Òðåòèé êóðñ

square ×åòâåðòûé êóðñ

square Ïÿòûé êóðñ
blank
Àâòîðèçàöèÿ

       
blank
Ïîèñê ïî óêàçàòåëÿì

blank
Êðàñîòà
blank
blank
Áûñòðûé ïåðåõîä
Ïî íàçâàíèþ:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z À Á Â Ã Ä Å ¨ Æ Ç È É Ê Ë Ì Í Î Ï Ð Ñ Ò Ó Ô Õ Ö × Ø Ù Û Ý Þ ß
Ïî àâòîðó:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ¨ À Á Â Ã Ä Å Æ Ç È É Ê Ë Ì Í Î Ï Ð Ñ Ò Ó Ô Õ Ö × Ø Ù Û Ý Þ ß
blank
Âñå ðåñóðñû
Ñîðòèðîâêà:

ID asc desc pic Àâòîðû asc desc Íàçâàíèå asc desc Ãîä asc desc Äîï.
147402 Chung K.-I., Sohn K., Yung M. Information Security Applications, 9 conf., WISA 2008 2009
80534 Lee J.-K.(ed.), Yi O.(ed.), Yung M.(ed.) Information Security Applications 7th International Workshop, WISA 2006 Jeju Island, Korea, August 28-30, 2006 Revised Selected Papers 2007
142669 Boyd C. Information Security and Privacy: 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings (Lecture Notes in Computer Science Security and Cryptology) 2009
127020 Huaxiong Wang, Josef Pieprzyk Information Security and Privacy, 9 conf., ACISP 2004 2004
155213 Rei Safavi-Naini, Jennifer Seberry Information Security and Privacy, 8 conf., ACISP 2003 2003
163576 Batten L., Seberry J. Information Security and Privacy, 7 conf., ACISP 2002 2002
147327 Mu Y. Information Security and Privacy, 6 conf., ACISP 2001 2001
156796 Pieprzyk J., Safavi-Naini R., Seberry J. Information Security and Privacy, 4 conf., ACISP'99 1999
146867 Boyd C., Dawson E. Information Security and Privacy, 3 conf., ACISP'98 1998
184349 Varadharajan V., Pieprzyk J., Mu Y. Information Security and Privacy, 2 conf., ACISP'97 1997
182343 Mu Y., Susilo W., Seberry J. Information Security and Privacy, 13 conf., ACISP 2008 2008
129304 Batten B., Safavi-Naini R. Information Security and Privacy, 11 conf., ACISP 2006 2006
159898 Pieprzyk J., Seberry J. Information Security and Privacy, 1 conf., ACISP'96 1996
188163 Boyd C., Nieto J. Information security and privacy 14th Australasian conference; proceedings ACISP <14. 2009. Brisbane> 2009
127334 Pieprzyk J. Information Security and Privacy 2007
127704 Dawson E., Clark A., Boyd C. Information Security and Privacy 2000
135145 Boyd C., Nieto J.M.G. Information Security and Privacy 2005
29041 Quigley M. (Ed) Information Security and Ethics: Social and Organizational Issues 2004
180905 Quigley M. Information Security and Ethics: Social and Organizational Issues 2005
64404 Hamid Nemati Information Security and Ethics: Concepts, Methodologies, Tools, and Applications. Volume I 2008
175023 Nemati H. Information Security and Ethics: Concepts, Methodologies, Tools and Applications 2008
141912 Mcilwraith A. Information Security And Employee Behaviour: How to Reduce Risk Through Employee Education, Training And Awareness 2006
143734 Weerasinghe D. Information Security and Digital Forensics: First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Selected Papers ... and Telecommunications Engineering) 2010
80803 Pil Joong Lee (Editor), Jung Hee Cheon (Editor) Information Security and Cryptoloy - ICISC 2008: 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers 2009
178357 Lee P., Cheon J. Information Security and Cryptoloy - ICISC 2008: 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers 2009
81678 Dingyi Pei (Editor) Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers 2008
138235 Helger Lipmaa, Moti Yung Information Security and Cryptology: Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings 2006
150062 Bao F., Yung M., Lin D. Information Security and Cryptology: 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers 2010
171018 Yung M., Liu P., Lin D. Information Security and Cryptology, 4 conf., Inscrypt 2008 2009
165302 Feng D., Lin D., Yung M. Information Security and Cryptology – First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings 2005
147425 Song J. Information Security and Cryptology - ICISC'99: Second International Conference Seoul, Korea, December 9-10, 1999 Proceedings 2000
167142 Lee D., Hong S. Information Security and Cryptology - ICISC 2009: 12th International Conference, Seoul, Korea, December 2-4. 2009. Revised Selected Papers (Lecture Notes in Computer Science Security and Cryptology) 2010
154384 Nam K., Rhee G. Information Security and Cryptology - ICISC 2007, 10 conf 2007
131601 Won D., Kim S. Information Security and Cryptology - ICISC 2005: 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers 2006
144460 Park C., Chee S. Information Security and Cryptology - ICISC 2004: 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers 2005
174880 Lim J., Lee D. Information Security and Cryptology - ICISC 2003: 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers (Lecture Notes in Computer Science) 2005
197678 Jong In Lim, Dong Hoon Lee Information Security and Cryptology - ICISC 2003 2004
143917 Lee P., Lim C. Information Security and Cryptology - ICISC 2002: 5th International Conference, Seoul, Korea, November 28-29, 2002, Revised Papers 2003
195418 Kim K. (Ed.) Information Security and Cryptology - ICISC 2001: 4th International Conference Seoul, Korea, December 6-7, 2001 Proceedings 2002
154652 Dongho Won Information Security and Cryptology - ICISC 2000: Third International Conference, Seoul, Korea, December 8-9, 2000, Proceedings 2001
168722 Rhee M., Lee B. Information Security and Cryptology ICISC 2006: 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings 2006
144970 Bandyopadhyay S.K., Adi W. Information Security and Assurance: 4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010, Proceedings 2010
171940 Stamp M. Information Security : Principles and Practice 2006
161484 Parker P. Information Security (IS) Equipment and Services in India: A Strategic Reference, 2007 2007
172580 Chan A., Gligor V. Information Security 2002
187203 Steihaug T., Lent R., Gelenbe E. Information Sciences and Systems 2013: Proceedings of the 28th International Symposium on Computer and Information Sciences 2013
32537 Fiedler K. (Ed), Juslin P. (Ed) Information Sampling and Adaptive Cognition 2005
59593 Shapiro C., Varian H.R. Information Rules: A Strategic Guide to the Network Economy 1999
178352 Shapiro C., Varian H. Information Rules: A Strategic Guide to the Network Economy 1999
152767 Wolfrum P. Information Routing, Correspondence Finding, and Object Recognition in the Brain (Studies in Computational Intelligence, 316) 2010


blank
HR
@Mail.ru
© Ýëåêòðîííàÿ áèáëèîòåêà ïîïå÷èòåëüñêîãî ñîâåòà ìåõìàòà ÌÃÓ, 2004-2024
Ýëåêòðîííàÿ áèáëèîòåêà ìåõìàòà ÌÃÓ | Valid HTML 4.01!| Valid CSS! Î ïðîåêòå