|
|
Áûñòðûé ïåðåõîä |
Ïî íàçâàíèþ: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z À Á Â Ã Ä Å ¨ Æ Ç È É Ê Ë Ì Í Î Ï Ð Ñ Ò Ó Ô Õ Ö × Ø Ù Û Ý Þ ß Ïî àâòîðó: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ¨ À Á Â Ã Ä Å Æ Ç È É Ê Ë Ì Í Î Ï Ð Ñ Ò Ó Ô Õ Ö × Ø Ù Û Ý Þ ß
|
|
Âñå ðåñóðñû |
Ñîðòèðîâêà:
180057 |
|
Willcocks L., Lacity M. |
Information Systems and Outsourcing: Studies in Theory and Practice |
2009 | •• |
133943 |
|
Rada R. |
Information Systems and Healthcare Enterprises |
2007 | •• |
160905 |
|
Kaschek R., Kop C., Steinberger C. |
Information Systems and e-Business Technologies: 2nd International United Information Systems Conference, UNISCON 2008, Klagenfurt, Austria, April 22-25, ... Notes in Business Information Processing) |
2008 | •• |
158892 |
|
Bhalla S. |
Information Systems and Data Management: 6th International Conference, CISMOD '95, Bombay, India, November 15-17, 1995. Proceedings |
1995 | •• |
74064 |
|
Seidler J. A. |
Information Systems and Data Compression |
1997 | •• |
179311 |
|
Karagiannis D. |
Information Systems and Artificial Intelligence: Integration Aspects: First Workshop, Ulm, FRG, March 19-21, 1990. Proceedings |
1991 | •• |
156359 |
|
Ned Kock |
Information Systems Action Research: An Applied View of Emerging Concepts and Methods (Integrated Series in Information Systems) |
2006 • | •• |
23974 |
|
Fortune J., Peters G. |
Information Systems Achieving Success by Avoiding Failure |
2005 | •• |
130303 |
|
Davis W., Yen D. |
Information System Consultants Handbook. Systems Analysis And Design |
1999 | •• |
193689 |
|
Zimmermann M., Fery C. |
Information Structure: Theoretical, Typological, and Experimental Perspectives |
2010 | •• |
180012 |
|
Erteschik-Shir N. |
Information Structure: The Syntax-Discourse Interface (Oxford Surveys in Syntax & Morphology) |
2007 | •• |
166843 |
|
Hinterholzl R., Petrova S. |
Information Structure and Language Change: New Approaches to Word Order Variation in Germanic (Trends in Linguistics. Studies and Monographs) |
2009 | •• |
170320 |
|
Hinterhozl R., Petrova S. |
Information Structure and Language Change: New Approaches to Word Order Variation in Germanic |
2009 | •• |
131281 |
|
Mereu L. |
Information Structure and its Interfaces |
2009 | •• |
166694 |
|
Arquilla J., Borer D. |
Information Strategy and Warfare: A Guide to Theory and Practice (Contemporary Security Studies) |
2007 | •• |
162318 |
|
Kowalski G.J., Maybury M.T. |
Information Storage and Retrieval Systems: Theory and Implementation (The Information Retrieval Series, Volume 8) |
2000 • | •• |
172908 |
|
Somasundaram G., Shrivastava A. |
Information Storage and Management: Storing, Managing, and Protecting Digital Information |
2009 | •• |
172331 |
|
Adams S. |
Information Sources in Patents (Guides to Information Sources) |
2006 • | •• |
131330 |
|
Heiskanen T. |
Information Society and the Workplace: Spaces, Boundaries and Agencies |
2003 | •• |
196560 |
|
|
Information Sharing, Liquidity And Transaction Costs In Floor-Based Trading Systems |
2001 | •• |
161294 |
|
Stuckenschmidt H., Harmelen F. |
Information Sharing on the Semantic Web (Advanced Information and Knowledge Processing) |
2005 | •• |
138709 |
|
Stuckenschmidt H., van Harmelen F. |
Information Sharing on the Semantic Web |
2010 | •• |
144630 |
|
Gary Marchionini |
Information Seeking in Electronic Environments |
1997 | •• |
143193 |
|
Pieprzyk J., Okamoto E., Seberry J. |
Information Security: Third International Workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000. Proceedings |
2000 | •• |
193743 |
|
Mambo M., Zheng Y. |
Information Security: Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 6-7, 1999 Proceedings |
1999 | •• |
137531 |
|
Detmar W. Straub, Seymour Goodman, Richard Baskerville |
Information Security: Policy, Processes, and Practices |
2008 | •• |
141011 |
|
0 |
Information Security: Keeping Data Safe |
2002 | •• |
152507 |
|
Layton T. |
Information Security: Design, Implementation, Measurement, and Compliance |
2007 | •• |
179341 |
|
Alexander P. |
Information Security: A Manager's Guide to Thwarting Data Thieves and Hackers (PSI Business Security) |
2008 | •• |
146488 |
|
Katsikas S.K., Lopez J. |
Information Security: 9th International Conference; ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings |
2006 | •• |
148942 |
|
Zhou J., Lopez J., Deng R. |
Information Security: 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings |
2005 | •• |
150653 |
|
Zhang K., Zheng Y. |
Information Security: 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings (Lecture Notes in Computer Science) |
2005 | •• |
148630 |
|
Kan Zhang, Yuliang Zheng |
Information Security: 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings |
2004 • | •• |
170658 |
|
Boyd C., Mao W. |
Information Security: 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings |
2003 | •• |
144353 |
|
Davida G.I., Frankel Y. |
Information Security: 4th International Conference, ISC 2001 Malaga, Spain, October 1-3, 2001 Proceedings |
2001 | •• |
196301 |
|
J. A. Garay |
Information Security: 10th International Conference, ISC 2007, Valparaiso, Chile, October 9-12, 2007, Proceedings |
2007 | •• |
151222 |
|
Kwak J., Deng R., Wang G. |
Information Security, Practice and Experience: 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010, Proceedings (Lecture Notes in Computer Science Security and Cryptology) |
2010 | •• |
168749 |
|
Samarati P., Tunstall M., Posegga J. |
Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices: 4th IFIP WG 11.2 International Workshop, WISTP ... Computer Science Security and Cryptology) |
2010 | •• |
163659 |
|
Onieva J.A., Sauveron D. |
Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP |
2008 | •• |
181612 |
|
Sauveron D., Markantonakis K., Bilas A. |
Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems: First IFIP TC6 / WG 8.8 / WG 11.2 International |
2007 | •• |
154812 |
|
Markowitch O., Bilas A., Hoepman J. |
Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks: Third IFIP WG 11.2 International Workshop, WISTP 2009 ... Computer Science Security and Cryptology) |
2009 | •• |
139685 |
|
Markowitch O., Bilas A., Hoepman J. |
Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks: Third IFIP WG 11.2 International Workshop, WISTP ... Computer Science Security and Cryptology) |
2009 | •• |
127993 |
|
Peltier T.R. |
Information Security Risk Analysis |
2005 • | •• |
180400 |
|
Peltier T. |
Information Security Risk Analysis |
2001 | •• |
14396 |
|
Stamp M. |
Information Security Principles and Practice |
2005 | •• |
166148 |
|
Dawson E., Wong D.S. |
Information Security Practice and Experience: Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings (Lecture Notes in Computer Science Security and Cryptology) |
2007 • | •• |
137750 |
|
Dawson E. (ed.), Wong D.S. (ed.) |
Information Security Practice and Experience: Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings |
2007 | •• |
176803 |
|
Deng R., Bao F., Pang H. |
Information Security Practice and Experience: First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings |
2005 | •• |
166992 |
|
Chen L., Mu J., Susilo W. |
Information Security Practice and Experience: 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings |
2008 | •• |
140446 |
|
Bao F., Li H., Wang G. |
Information Security Practice and Experience, 5 conf., ISPEC 2009 |
2009 | •• |
|
|