Ãëàâíàÿ    Ex Libris    Êíèãè    Æóðíàëû    Ñòàòüè    Ñåðèè    Êàòàëîã    Wanted    Çàãðóçêà    ÕóäËèò    Ñïðàâêà    Ïîèñê ïî èíäåêñàì    Ïîèñê    Ôîðóì   
Ìåõìàòÿíàì
square Ïåðâûé êóðñ

square Âòîðîé êóðñ

square Òðåòèé êóðñ

square ×åòâåðòûé êóðñ

square Ïÿòûé êóðñ
blank
Àâòîðèçàöèÿ

       
blank
Ïîèñê ïî óêàçàòåëÿì

blank
Êðàñîòà
blank
blank
Áûñòðûé ïåðåõîä
Ïî íàçâàíèþ:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z À Á Â Ã Ä Å ¨ Æ Ç È É Ê Ë Ì Í Î Ï Ð Ñ Ò Ó Ô Õ Ö × Ø Ù Û Ý Þ ß
Ïî àâòîðó:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ¨ À Á Â Ã Ä Å Æ Ç È É Ê Ë Ì Í Î Ï Ð Ñ Ò Ó Ô Õ Ö × Ø Ù Û Ý Þ ß
blank
Âñå ðåñóðñû
Ñîðòèðîâêà:

ID asc desc pic Àâòîðû asc desc Íàçâàíèå asc desc Ãîä asc desc Äîï.
156796 Pieprzyk J., Safavi-Naini R., Seberry J. Information Security and Privacy, 4 conf., ACISP'99 1999
147327 Mu Y. Information Security and Privacy, 6 conf., ACISP 2001 2001
163576 Batten L., Seberry J. Information Security and Privacy, 7 conf., ACISP 2002 2002
155213 Rei Safavi-Naini, Jennifer Seberry Information Security and Privacy, 8 conf., ACISP 2003 2003
127020 Huaxiong Wang, Josef Pieprzyk Information Security and Privacy, 9 conf., ACISP 2004 2004
142669 Boyd C. Information Security and Privacy: 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings (Lecture Notes in Computer Science Security and Cryptology) 2009
80534 Lee J.-K.(ed.), Yi O.(ed.), Yung M.(ed.) Information Security Applications 7th International Workshop, WISA 2006 Jeju Island, Korea, August 28-30, 2006 Revised Selected Papers 2007
147402 Chung K.-I., Sohn K., Yung M. Information Security Applications, 9 conf., WISA 2008 2009
166954 Youm H., Yung M. Information Security Applications: 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers (Lecture Notes in Computer Science Security and Cryptology) 2009
176484 Chae K., Yung M. Information Security Applications: 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers 2004
167873 Chae K., Yung M. Information Security Applications: 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers (Lecture Notes in Computer Science) 2004
151810 Yung M., Lim C. Information Security Applications: 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers 2005
170156 Song J., Kwon T., Yung M. Information Security Applications: 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers 2006
160592 Sehun K., Yung M., Lee H. Information Security Applications: 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers 2007
136047 Kim Sehun, Moti Yung, Hyung-Woo Lee Information Security Applications: 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology) 2008
139396 Sehun K., Yung M., Lee H. Information Security Applications: 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology) 2007
152877 Killmeyer J. Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition 2006
176456 Stefanek G. Information Security Best Practices: 205 Basic Rules 2002
136276 Bazavan I.V., Lim I. Information Security Cost Management 2006
204246 Ableson W.F. Information Security for the Busy Entrepreneur or Manager 2017
189223 Peltier T., Peltier J., Blackley J. Information Security FUNDAMENTALS 2005
150525 Solms S.H., Solms R. Information Security Governance 2008
166532 Brotby K. Information Security Governance (Wiley Series in Systems Engineering and Management) 2009
160046 Solomon M., Chapple M. Information Security Illuminated 2005
27611 Tipton H.F. (Ed), Krause M. (Ed) Information Security Management Handbook 2003
29051 Tipton H.F., Krause M. Information Security Management Handbook 2006
149952 Tipton H., Krause M. Information Security Management Handbook 2001
155559 Tipton H.F. Information Security Management Handbook Online access for BTH 2003
173751 Tipton H., Krause M. Information Security Management Handbook, Fourth Edition, Volume 4 2003
167237 Tipton H., Krause M. Information Security Management Handbook, Fourth Edition, Volume II 2001
178076 Tipton H., Krause M. Information Security Management Handbook, Sixth Edition, Volume 2 2008
29382 Krause M. Information Security Management Handbook, Volume 3 2006
197169 Y. Deswarte Information Security Management, Education and Privacy (IFIP International Federation for Information Processing) 2004
25123 Fugini M., Bellettini C. (eds.) Information Security Policies and Actions in Modern Integrated Systems 2004
127359 Chorafas D.N. Information Security Policies and Procedures: A Practitioner's Reference 1998
140194 Peltier T. Information Security Policies and Procedures: A Practitioner's Reference 1998
143136 Peltier T. Information Security Policies and Procedures: A Practitioner's Reference 1999
170500 Peltier T.R. Information Security Policies and Procedures: A Practitioner's Reference, Second Edition 2004
132752 Peltier T.R. Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management 2001
197045 K. Chen, R.Deng, X. Lai, J. Zhou Information Security Practice and Experience 2006
140446 Bao F., Li H., Wang G. Information Security Practice and Experience, 5 conf., ISPEC 2009 2009
166992 Chen L., Mu J., Susilo W. Information Security Practice and Experience: 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings 2008
176803 Deng R., Bao F., Pang H. Information Security Practice and Experience: First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings 2005
137750 Dawson E. (ed.), Wong D.S. (ed.) Information Security Practice and Experience: Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings 2007
166148 Dawson E., Wong D.S. Information Security Practice and Experience: Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings (Lecture Notes in Computer Science Security and Cryptology) 2007
14396 Stamp M. Information Security Principles and Practice 2005
127993 Peltier T.R. Information Security Risk Analysis 2005
180400 Peltier T. Information Security Risk Analysis 2001
139685 Markowitch O., Bilas A., Hoepman J. Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks: Third IFIP WG 11.2 International Workshop, WISTP ... Computer Science Security and Cryptology) 2009
154812 Markowitch O., Bilas A., Hoepman J. Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks: Third IFIP WG 11.2 International Workshop, WISTP 2009 ... Computer Science Security and Cryptology) 2009


blank
HR
@Mail.ru
© Ýëåêòðîííàÿ áèáëèîòåêà ïîïå÷èòåëüñêîãî ñîâåòà ìåõìàòà ÌÃÓ, 2004-2024
Ýëåêòðîííàÿ áèáëèîòåêà ìåõìàòà ÌÃÓ | Valid HTML 4.01!| Valid CSS! Î ïðîåêòå