Ãëàâíàÿ    Ex Libris    Êíèãè    Æóðíàëû    Ñòàòüè    Ñåðèè    Êàòàëîã    Wanted    Çàãðóçêà    ÕóäËèò    Ñïðàâêà    Ïîèñê ïî èíäåêñàì    Ïîèñê    Ôîðóì   
Ìåõìàòÿíàì
square Ïåðâûé êóðñ

square Âòîðîé êóðñ

square Òðåòèé êóðñ

square ×åòâåðòûé êóðñ

square Ïÿòûé êóðñ
blank
Àâòîðèçàöèÿ

       
blank
Ïîèñê ïî óêàçàòåëÿì

blank
Êðàñîòà
blank
blank
Áûñòðûé ïåðåõîä
Ïî íàçâàíèþ:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z À Á Â Ã Ä Å ¨ Æ Ç È É Ê Ë Ì Í Î Ï Ð Ñ Ò Ó Ô Õ Ö × Ø Ù Û Ý Þ ß
Ïî àâòîðó:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ¨ À Á Â Ã Ä Å Æ Ç È É Ê Ë Ì Í Î Ï Ð Ñ Ò Ó Ô Õ Ö × Ø Ù Û Ý Þ ß
blank
Âñå ðåñóðñû
Ñîðòèðîâêà:

ID asc desc pic Àâòîðû asc desc Íàçâàíèå asc desc Ãîä asc desc Äîï.
152877 Killmeyer J. Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition 2006
136047 Kim Sehun, Moti Yung, Hyung-Woo Lee Information Security Applications: 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology) 2008
139396 Sehun K., Yung M., Lee H. Information Security Applications: 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology) 2007
160592 Sehun K., Yung M., Lee H. Information Security Applications: 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers 2007
170156 Song J., Kwon T., Yung M. Information Security Applications: 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers 2006
151810 Yung M., Lim C. Information Security Applications: 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers 2005
167873 Chae K., Yung M. Information Security Applications: 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers (Lecture Notes in Computer Science) 2004
176484 Chae K., Yung M. Information Security Applications: 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers 2004
166954 Youm H., Yung M. Information Security Applications: 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers (Lecture Notes in Computer Science Security and Cryptology) 2009
147402 Chung K.-I., Sohn K., Yung M. Information Security Applications, 9 conf., WISA 2008 2009
80534 Lee J.-K.(ed.), Yi O.(ed.), Yung M.(ed.) Information Security Applications 7th International Workshop, WISA 2006 Jeju Island, Korea, August 28-30, 2006 Revised Selected Papers 2007
142669 Boyd C. Information Security and Privacy: 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings (Lecture Notes in Computer Science Security and Cryptology) 2009
127020 Huaxiong Wang, Josef Pieprzyk Information Security and Privacy, 9 conf., ACISP 2004 2004
155213 Rei Safavi-Naini, Jennifer Seberry Information Security and Privacy, 8 conf., ACISP 2003 2003
163576 Batten L., Seberry J. Information Security and Privacy, 7 conf., ACISP 2002 2002
147327 Mu Y. Information Security and Privacy, 6 conf., ACISP 2001 2001
156796 Pieprzyk J., Safavi-Naini R., Seberry J. Information Security and Privacy, 4 conf., ACISP'99 1999
146867 Boyd C., Dawson E. Information Security and Privacy, 3 conf., ACISP'98 1998
184349 Varadharajan V., Pieprzyk J., Mu Y. Information Security and Privacy, 2 conf., ACISP'97 1997
182343 Mu Y., Susilo W., Seberry J. Information Security and Privacy, 13 conf., ACISP 2008 2008
129304 Batten B., Safavi-Naini R. Information Security and Privacy, 11 conf., ACISP 2006 2006
159898 Pieprzyk J., Seberry J. Information Security and Privacy, 1 conf., ACISP'96 1996
188163 Boyd C., Nieto J. Information security and privacy 14th Australasian conference; proceedings ACISP <14. 2009. Brisbane> 2009
127334 Pieprzyk J. Information Security and Privacy 2007
127704 Dawson E., Clark A., Boyd C. Information Security and Privacy 2000
135145 Boyd C., Nieto J.M.G. Information Security and Privacy 2005
29041 Quigley M. (Ed) Information Security and Ethics: Social and Organizational Issues 2004
180905 Quigley M. Information Security and Ethics: Social and Organizational Issues 2005
64404 Hamid Nemati Information Security and Ethics: Concepts, Methodologies, Tools, and Applications. Volume I 2008
175023 Nemati H. Information Security and Ethics: Concepts, Methodologies, Tools and Applications 2008
141912 Mcilwraith A. Information Security And Employee Behaviour: How to Reduce Risk Through Employee Education, Training And Awareness 2006
143734 Weerasinghe D. Information Security and Digital Forensics: First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Selected Papers ... and Telecommunications Engineering) 2010
80803 Pil Joong Lee (Editor), Jung Hee Cheon (Editor) Information Security and Cryptoloy - ICISC 2008: 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers 2009
178357 Lee P., Cheon J. Information Security and Cryptoloy - ICISC 2008: 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers 2009
81678 Dingyi Pei (Editor) Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers 2008
138235 Helger Lipmaa, Moti Yung Information Security and Cryptology: Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings 2006
150062 Bao F., Yung M., Lin D. Information Security and Cryptology: 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers 2010
171018 Yung M., Liu P., Lin D. Information Security and Cryptology, 4 conf., Inscrypt 2008 2009
165302 Feng D., Lin D., Yung M. Information Security and Cryptology – First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings 2005
147425 Song J. Information Security and Cryptology - ICISC'99: Second International Conference Seoul, Korea, December 9-10, 1999 Proceedings 2000
167142 Lee D., Hong S. Information Security and Cryptology - ICISC 2009: 12th International Conference, Seoul, Korea, December 2-4. 2009. Revised Selected Papers (Lecture Notes in Computer Science Security and Cryptology) 2010
154384 Nam K., Rhee G. Information Security and Cryptology - ICISC 2007, 10 conf 2007
131601 Won D., Kim S. Information Security and Cryptology - ICISC 2005: 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers 2006
144460 Park C., Chee S. Information Security and Cryptology - ICISC 2004: 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers 2005
174880 Lim J., Lee D. Information Security and Cryptology - ICISC 2003: 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers (Lecture Notes in Computer Science) 2005
197678 Jong In Lim, Dong Hoon Lee Information Security and Cryptology - ICISC 2003 2004
143917 Lee P., Lim C. Information Security and Cryptology - ICISC 2002: 5th International Conference, Seoul, Korea, November 28-29, 2002, Revised Papers 2003
195418 Kim K. (Ed.) Information Security and Cryptology - ICISC 2001: 4th International Conference Seoul, Korea, December 6-7, 2001 Proceedings 2002
154652 Dongho Won Information Security and Cryptology - ICISC 2000: Third International Conference, Seoul, Korea, December 8-9, 2000, Proceedings 2001
168722 Rhee M., Lee B. Information Security and Cryptology ICISC 2006: 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings 2006


blank
HR
@Mail.ru
© Ýëåêòðîííàÿ áèáëèîòåêà ïîïå÷èòåëüñêîãî ñîâåòà ìåõìàòà ÌÃÓ, 2004-2025
Ýëåêòðîííàÿ áèáëèîòåêà ìåõìàòà ÌÃÓ | Valid HTML 4.01!| Valid CSS! Î ïðîåêòå