Ãëàâíàÿ    Ex Libris    Êíèãè    Æóðíàëû    Ñòàòüè    Ñåðèè    Êàòàëîã    Wanted    Çàãðóçêà    ÕóäËèò    Ñïðàâêà    Ïîèñê ïî èíäåêñàì    Ïîèñê    Ôîðóì   
Ìåõìàòÿíàì
square Ïåðâûé êóðñ

square Âòîðîé êóðñ

square Òðåòèé êóðñ

square ×åòâåðòûé êóðñ

square Ïÿòûé êóðñ
blank
Àâòîðèçàöèÿ

       
blank
Ïîèñê ïî óêàçàòåëÿì

blank
Êðàñîòà
blank
blank
Áûñòðûé ïåðåõîä
Ïî íàçâàíèþ:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z À Á Â Ã Ä Å ¨ Æ Ç È É Ê Ë Ì Í Î Ï Ð Ñ Ò Ó Ô Õ Ö × Ø Ù Û Ý Þ ß
Ïî àâòîðó:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ¨ À Á Â Ã Ä Å Æ Ç È É Ê Ë Ì Í Î Ï Ð Ñ Ò Ó Ô Õ Ö × Ø Ù Û Ý Þ ß
blank
Âñå ðåñóðñû
Ñîðòèðîâêà:

ID asc desc pic Àâòîðû asc desc Íàçâàíèå asc desc Ãîä asc desc Äîï.
154812 Markowitch O., Bilas A., Hoepman J. Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks: Third IFIP WG 11.2 International Workshop, WISTP 2009 ... Computer Science Security and Cryptology) 2009
139685 Markowitch O., Bilas A., Hoepman J. Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks: Third IFIP WG 11.2 International Workshop, WISTP ... Computer Science Security and Cryptology) 2009
127993 Peltier T.R. Information Security Risk Analysis 2005
180400 Peltier T. Information Security Risk Analysis 2001
14396 Stamp M. Information Security Principles and Practice 2005
166148 Dawson E., Wong D.S. Information Security Practice and Experience: Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings (Lecture Notes in Computer Science Security and Cryptology) 2007
137750 Dawson E. (ed.), Wong D.S. (ed.) Information Security Practice and Experience: Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings 2007
176803 Deng R., Bao F., Pang H. Information Security Practice and Experience: First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings 2005
166992 Chen L., Mu J., Susilo W. Information Security Practice and Experience: 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings 2008
140446 Bao F., Li H., Wang G. Information Security Practice and Experience, 5 conf., ISPEC 2009 2009
197045 K. Chen, R.Deng, X. Lai, J. Zhou Information Security Practice and Experience 2006
132752 Peltier T.R. Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management 2001
170500 Peltier T.R. Information Security Policies and Procedures: A Practitioner's Reference, Second Edition 2004
127359 Chorafas D.N. Information Security Policies and Procedures: A Practitioner's Reference 1998
140194 Peltier T. Information Security Policies and Procedures: A Practitioner's Reference 1998
143136 Peltier T. Information Security Policies and Procedures: A Practitioner's Reference 1999
25123 Fugini M., Bellettini C. (eds.) Information Security Policies and Actions in Modern Integrated Systems 2004
197169 Y. Deswarte Information Security Management, Education and Privacy (IFIP International Federation for Information Processing) 2004
29382 Krause M. Information Security Management Handbook, Volume 3 2006
178076 Tipton H., Krause M. Information Security Management Handbook, Sixth Edition, Volume 2 2008
167237 Tipton H., Krause M. Information Security Management Handbook, Fourth Edition, Volume II 2001
173751 Tipton H., Krause M. Information Security Management Handbook, Fourth Edition, Volume 4 2003
155559 Tipton H.F. Information Security Management Handbook Online access for BTH 2003
27611 Tipton H.F. (Ed), Krause M. (Ed) Information Security Management Handbook 2003
29051 Tipton H.F., Krause M. Information Security Management Handbook 2006
149952 Tipton H., Krause M. Information Security Management Handbook 2001
160046 Solomon M., Chapple M. Information Security Illuminated 2005
166532 Brotby K. Information Security Governance (Wiley Series in Systems Engineering and Management) 2009
150525 Solms S.H., Solms R. Information Security Governance 2008
189223 Peltier T., Peltier J., Blackley J. Information Security FUNDAMENTALS 2005
204246 Ableson W.F. Information Security for the Busy Entrepreneur or Manager 2017
136276 Bazavan I.V., Lim I. Information Security Cost Management 2006
176456 Stefanek G. Information Security Best Practices: 205 Basic Rules 2002
152877 Killmeyer J. Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition 2006
136047 Kim Sehun, Moti Yung, Hyung-Woo Lee Information Security Applications: 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology) 2008
139396 Sehun K., Yung M., Lee H. Information Security Applications: 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology) 2007
160592 Sehun K., Yung M., Lee H. Information Security Applications: 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers 2007
170156 Song J., Kwon T., Yung M. Information Security Applications: 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers 2006
151810 Yung M., Lim C. Information Security Applications: 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers 2005
167873 Chae K., Yung M. Information Security Applications: 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers (Lecture Notes in Computer Science) 2004
176484 Chae K., Yung M. Information Security Applications: 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers 2004
166954 Youm H., Yung M. Information Security Applications: 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers (Lecture Notes in Computer Science Security and Cryptology) 2009
147402 Chung K.-I., Sohn K., Yung M. Information Security Applications, 9 conf., WISA 2008 2009
80534 Lee J.-K.(ed.), Yi O.(ed.), Yung M.(ed.) Information Security Applications 7th International Workshop, WISA 2006 Jeju Island, Korea, August 28-30, 2006 Revised Selected Papers 2007
142669 Boyd C. Information Security and Privacy: 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings (Lecture Notes in Computer Science Security and Cryptology) 2009
127020 Huaxiong Wang, Josef Pieprzyk Information Security and Privacy, 9 conf., ACISP 2004 2004
155213 Rei Safavi-Naini, Jennifer Seberry Information Security and Privacy, 8 conf., ACISP 2003 2003
163576 Batten L., Seberry J. Information Security and Privacy, 7 conf., ACISP 2002 2002
147327 Mu Y. Information Security and Privacy, 6 conf., ACISP 2001 2001
156796 Pieprzyk J., Safavi-Naini R., Seberry J. Information Security and Privacy, 4 conf., ACISP'99 1999


blank
HR
@Mail.ru
© Ýëåêòðîííàÿ áèáëèîòåêà ïîïå÷èòåëüñêîãî ñîâåòà ìåõìàòà ÌÃÓ, 2004-2024
Ýëåêòðîííàÿ áèáëèîòåêà ìåõìàòà ÌÃÓ | Valid HTML 4.01!| Valid CSS! Î ïðîåêòå