|
|
Áûñòðûé ïåðåõîä |
Ïî íàçâàíèþ: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z À Á Â Ã Ä Å ¨ Æ Ç È É Ê Ë Ì Í Î Ï Ð Ñ Ò Ó Ô Õ Ö × Ø Ù Û Ý Þ ß Ïî àâòîðó: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ¨ À Á Â Ã Ä Å Æ Ç È É Ê Ë Ì Í Î Ï Ð Ñ Ò Ó Ô Õ Ö × Ø Ù Û Ý Þ ß
|
|
Âñå ðåñóðñû |
Ñîðòèðîâêà:
146867 |
|
Boyd C., Dawson E. |
Information Security and Privacy, 3 conf., ACISP'98 |
1998 | •• |
184349 |
|
Varadharajan V., Pieprzyk J., Mu Y. |
Information Security and Privacy, 2 conf., ACISP'97 |
1997 | •• |
182343 |
|
Mu Y., Susilo W., Seberry J. |
Information Security and Privacy, 13 conf., ACISP 2008 |
2008 | •• |
129304 |
|
Batten B., Safavi-Naini R. |
Information Security and Privacy, 11 conf., ACISP 2006 |
2006 • | •• |
159898 |
|
Pieprzyk J., Seberry J. |
Information Security and Privacy, 1 conf., ACISP'96 |
1996 | •• |
188163 |
|
Boyd C., Nieto J. |
Information security and privacy 14th Australasian conference; proceedings ACISP <14. 2009. Brisbane> |
2009 | •• |
127334 |
|
Pieprzyk J. |
Information Security and Privacy |
2007 | •• |
127704 |
|
Dawson E., Clark A., Boyd C. |
Information Security and Privacy |
2000 | •• |
135145 |
|
Boyd C., Nieto J.M.G. |
Information Security and Privacy |
2005 | •• |
29041 |
|
Quigley M. (Ed) |
Information Security and Ethics: Social and Organizational Issues |
2004 | •• |
180905 |
|
Quigley M. |
Information Security and Ethics: Social and Organizational Issues |
2005 | •• |
64404 |
|
Hamid Nemati |
Information Security and Ethics: Concepts, Methodologies, Tools, and Applications. Volume I |
2008 | •• |
175023 |
|
Nemati H. |
Information Security and Ethics: Concepts, Methodologies, Tools and Applications |
2008 | •• |
141912 |
|
Mcilwraith A. |
Information Security And Employee Behaviour: How to Reduce Risk Through Employee Education, Training And Awareness |
2006 | •• |
143734 |
|
Weerasinghe D. |
Information Security and Digital Forensics: First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Selected Papers ... and Telecommunications Engineering) |
2010 | •• |
80803 |
|
Pil Joong Lee (Editor), Jung Hee Cheon (Editor) |
Information Security and Cryptoloy - ICISC 2008: 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers |
2009 • | •• |
178357 |
|
Lee P., Cheon J. |
Information Security and Cryptoloy - ICISC 2008: 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers |
2009 | •• |
81678 |
|
Dingyi Pei (Editor) |
Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers |
2008 • | •• |
138235 |
|
Helger Lipmaa, Moti Yung |
Information Security and Cryptology: Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings |
2006 • | •• |
150062 |
|
Bao F., Yung M., Lin D. |
Information Security and Cryptology: 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers |
2010 | •• |
171018 |
|
Yung M., Liu P., Lin D. |
Information Security and Cryptology, 4 conf., Inscrypt 2008 |
2009 | •• |
165302 |
|
Feng D., Lin D., Yung M. |
Information Security and Cryptology – First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings |
2005 | •• |
147425 |
|
Song J. |
Information Security and Cryptology - ICISC'99: Second International Conference Seoul, Korea, December 9-10, 1999 Proceedings |
2000 | •• |
167142 |
|
Lee D., Hong S. |
Information Security and Cryptology - ICISC 2009: 12th International Conference, Seoul, Korea, December 2-4. 2009. Revised Selected Papers (Lecture Notes in Computer Science Security and Cryptology) |
2010 | •• |
154384 |
|
Nam K., Rhee G. |
Information Security and Cryptology - ICISC 2007, 10 conf |
2007 | •• |
131601 |
|
Won D., Kim S. |
Information Security and Cryptology - ICISC 2005: 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers |
2006 | •• |
144460 |
|
Park C., Chee S. |
Information Security and Cryptology - ICISC 2004: 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers |
2005 • | •• |
174880 |
|
Lim J., Lee D. |
Information Security and Cryptology - ICISC 2003: 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers (Lecture Notes in Computer Science) |
2005 | •• |
197678 |
|
Jong In Lim, Dong Hoon Lee |
Information Security and Cryptology - ICISC 2003 |
2004 • | •• |
143917 |
|
Lee P., Lim C. |
Information Security and Cryptology - ICISC 2002: 5th International Conference, Seoul, Korea, November 28-29, 2002, Revised Papers |
2003 | •• |
195418 |
|
Kim K. (Ed.) |
Information Security and Cryptology - ICISC 2001: 4th International Conference Seoul, Korea, December 6-7, 2001 Proceedings |
2002 • | •• |
154652 |
|
Dongho Won |
Information Security and Cryptology - ICISC 2000: Third International Conference, Seoul, Korea, December 8-9, 2000, Proceedings |
2001 • | •• |
168722 |
|
Rhee M., Lee B. |
Information Security and Cryptology ICISC 2006: 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings |
2006 | •• |
144970 |
|
Bandyopadhyay S.K., Adi W. |
Information Security and Assurance: 4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010, Proceedings |
2010 | •• |
171940 |
|
Stamp M. |
Information Security : Principles and Practice |
2006 | •• |
161484 |
|
Parker P. |
Information Security (IS) Equipment and Services in India: A Strategic Reference, 2007 |
2007 | •• |
172580 |
|
Chan A., Gligor V. |
Information Security |
2002 | •• |
187203 |
|
Steihaug T., Lent R., Gelenbe E. |
Information Sciences and Systems 2013: Proceedings of the 28th International Symposium on Computer and Information Sciences |
2013 | •• |
32537 |
|
Fiedler K. (Ed), Juslin P. (Ed) |
Information Sampling and Adaptive Cognition |
2005 | •• |
59593 |
|
Shapiro C., Varian H.R. |
Information Rules: A Strategic Guide to the Network Economy |
1999 | •• |
178352 |
|
Shapiro C., Varian H. |
Information Rules: A Strategic Guide to the Network Economy |
1999 | •• |
152767 |
|
Wolfrum P. |
Information Routing, Correspondence Finding, and Object Recognition in the Brain (Studies in Computational Intelligence, 316) |
2010 | •• |
175838 |
|
Ecker F. |
Information Risk and Long-Run Performance of Initial Public Offerings |
2008 | •• |
149298 |
|
Burkhart G. |
Information Revolution in the Middle East and North Africa |
2003 | •• |
25127 |
|
Davis J., Miller G.J., Russell A. |
Information Revolution : Using the Information Evolution Model to Grow Your Business |
2006 | •• |
144382 |
|
Clarke C.L.A., Cormack G.V. |
Information Retrieval: Implementing and Evaluating Search Engines |
2010 | •• |
19013 |
|
Frakes W., Baeza-Yates R. (ed.) |
Information Retrieval: Data Structures & Algorithms |
1992 | •• |
140769 |
|
Hersh W. |
Information Retrieval: A Health and Biomedical Perspective |
2008 • | •• |
159263 |
|
Ng H., Leong M., Kan M. |
Information Retrieval Technology: Third Asia Information Retrieval Symposium, AIRS 2006, Singapore, October 16-18, 2006, Proceedings |
2006 | •• |
166705 |
|
Lee G., Yamada A., Meng H. |
Information Retrieval Technology: Second Asia Information Retrieval Symposium, AIRS 2005, Jeju Island, Korea, October 13-15, 2005, Proceedings |
2005 | •• |
|
|