Ãëàâíàÿ    Ex Libris    Êíèãè    Æóðíàëû    Ñòàòüè    Ñåðèè    Êàòàëîã    Wanted    Çàãðóçêà    ÕóäËèò    Ñïðàâêà    Ïîèñê ïî èíäåêñàì    Ïîèñê    Ôîðóì   
Ìåõìàòÿíàì
square Ïåðâûé êóðñ

square Âòîðîé êóðñ

square Òðåòèé êóðñ

square ×åòâåðòûé êóðñ

square Ïÿòûé êóðñ
blank
Àâòîðèçàöèÿ

       
blank
Ïîèñê ïî óêàçàòåëÿì

blank
Êðàñîòà
blank
blank
Áûñòðûé ïåðåõîä
Ïî íàçâàíèþ:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z À Á Â Ã Ä Å ¨ Æ Ç È É Ê Ë Ì Í Î Ï Ð Ñ Ò Ó Ô Õ Ö × Ø Ù Û Ý Þ ß
Ïî àâòîðó:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ¨ À Á Â Ã Ä Å Æ Ç È É Ê Ë Ì Í Î Ï Ð Ñ Ò Ó Ô Õ Ö × Ø Ù Û Ý Þ ß
blank
Âñå ðåñóðñû
Ñîðòèðîâêà:

ID asc desc pic Àâòîðû asc desc Íàçâàíèå asc desc Ãîä asc desc Äîï.
197045 K. Chen, R.Deng, X. Lai, J. Zhou Information Security Practice and Experience 2006
132752 Peltier T.R. Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management 2001
170500 Peltier T.R. Information Security Policies and Procedures: A Practitioner's Reference, Second Edition 2004
127359 Chorafas D.N. Information Security Policies and Procedures: A Practitioner's Reference 1998
140194 Peltier T. Information Security Policies and Procedures: A Practitioner's Reference 1998
143136 Peltier T. Information Security Policies and Procedures: A Practitioner's Reference 1999
25123 Fugini M., Bellettini C. (eds.) Information Security Policies and Actions in Modern Integrated Systems 2004
197169 Y. Deswarte Information Security Management, Education and Privacy (IFIP International Federation for Information Processing) 2004
29382 Krause M. Information Security Management Handbook, Volume 3 2006
178076 Tipton H., Krause M. Information Security Management Handbook, Sixth Edition, Volume 2 2008
167237 Tipton H., Krause M. Information Security Management Handbook, Fourth Edition, Volume II 2001
173751 Tipton H., Krause M. Information Security Management Handbook, Fourth Edition, Volume 4 2003
155559 Tipton H.F. Information Security Management Handbook Online access for BTH 2003
27611 Tipton H.F. (Ed), Krause M. (Ed) Information Security Management Handbook 2003
29051 Tipton H.F., Krause M. Information Security Management Handbook 2006
149952 Tipton H., Krause M. Information Security Management Handbook 2001
160046 Solomon M., Chapple M. Information Security Illuminated 2005
166532 Brotby K. Information Security Governance (Wiley Series in Systems Engineering and Management) 2009
150525 Solms S.H., Solms R. Information Security Governance 2008
189223 Peltier T., Peltier J., Blackley J. Information Security FUNDAMENTALS 2005
204246 Ableson W.F. Information Security for the Busy Entrepreneur or Manager 2017
136276 Bazavan I.V., Lim I. Information Security Cost Management 2006
176456 Stefanek G. Information Security Best Practices: 205 Basic Rules 2002
152877 Killmeyer J. Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition 2006
136047 Kim Sehun, Moti Yung, Hyung-Woo Lee Information Security Applications: 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology) 2008
139396 Sehun K., Yung M., Lee H. Information Security Applications: 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology) 2007
160592 Sehun K., Yung M., Lee H. Information Security Applications: 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers 2007
170156 Song J., Kwon T., Yung M. Information Security Applications: 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers 2006
151810 Yung M., Lim C. Information Security Applications: 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers 2005
167873 Chae K., Yung M. Information Security Applications: 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers (Lecture Notes in Computer Science) 2004
176484 Chae K., Yung M. Information Security Applications: 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers 2004
166954 Youm H., Yung M. Information Security Applications: 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers (Lecture Notes in Computer Science Security and Cryptology) 2009
147402 Chung K.-I., Sohn K., Yung M. Information Security Applications, 9 conf., WISA 2008 2009
80534 Lee J.-K.(ed.), Yi O.(ed.), Yung M.(ed.) Information Security Applications 7th International Workshop, WISA 2006 Jeju Island, Korea, August 28-30, 2006 Revised Selected Papers 2007
142669 Boyd C. Information Security and Privacy: 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings (Lecture Notes in Computer Science Security and Cryptology) 2009
127020 Huaxiong Wang, Josef Pieprzyk Information Security and Privacy, 9 conf., ACISP 2004 2004
155213 Rei Safavi-Naini, Jennifer Seberry Information Security and Privacy, 8 conf., ACISP 2003 2003
163576 Batten L., Seberry J. Information Security and Privacy, 7 conf., ACISP 2002 2002
147327 Mu Y. Information Security and Privacy, 6 conf., ACISP 2001 2001
156796 Pieprzyk J., Safavi-Naini R., Seberry J. Information Security and Privacy, 4 conf., ACISP'99 1999
146867 Boyd C., Dawson E. Information Security and Privacy, 3 conf., ACISP'98 1998
184349 Varadharajan V., Pieprzyk J., Mu Y. Information Security and Privacy, 2 conf., ACISP'97 1997
182343 Mu Y., Susilo W., Seberry J. Information Security and Privacy, 13 conf., ACISP 2008 2008
129304 Batten B., Safavi-Naini R. Information Security and Privacy, 11 conf., ACISP 2006 2006
159898 Pieprzyk J., Seberry J. Information Security and Privacy, 1 conf., ACISP'96 1996
188163 Boyd C., Nieto J. Information security and privacy 14th Australasian conference; proceedings ACISP <14. 2009. Brisbane> 2009
127334 Pieprzyk J. Information Security and Privacy 2007
127704 Dawson E., Clark A., Boyd C. Information Security and Privacy 2000
135145 Boyd C., Nieto J.M.G. Information Security and Privacy 2005
29041 Quigley M. (Ed) Information Security and Ethics: Social and Organizational Issues 2004


blank
HR
@Mail.ru
© Ýëåêòðîííàÿ áèáëèîòåêà ïîïå÷èòåëüñêîãî ñîâåòà ìåõìàòà ÌÃÓ, 2004-2024
Ýëåêòðîííàÿ áèáëèîòåêà ìåõìàòà ÌÃÓ | Valid HTML 4.01!| Valid CSS! Î ïðîåêòå