√лавна€    Ex Libris     ниги    ∆урналы    —татьи    —ерии     аталог    Wanted    «агрузка    ’удЋит    —правка    ѕоиск по индексам    ѕоиск    ‘орум   
ћехмат€нам
square ѕервый курс

square ¬торой курс

square “ретий курс

square „етвертый курс

square ѕ€тый курс
blank
јвторизаци€

       
blank
ѕоиск по указател€м

blank
 расота
blank
blank
Ѕыстрый переход
ѕо названию:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ј Ѕ ¬ ƒ ® « »   Ћ ћ Ќ ќ ѕ ÷ Ў ў Ё ё я
ѕо автору:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ® ј Ѕ ¬ ƒ « »   Ћ ћ Ќ ќ ѕ ÷ Ў ў џ Ё ё я
blank
¬се ресурсы
—ортировка:

ID asc desc pic јвторы asc desc Ќазвание asc desc √од asc desc ƒоп.
131000 Hill A.F. Prion Protein Protocols 2008ХХ
84080 Kitamoto T. Prions. Food and drug safety 2005ХХ
148199 Rabenau H.F., Cinatl J., Doerr H.W. Prions: A Challenge for Science, Medicine and Public Health System 2001ХХ
187879 Soto C. Prions: the new biology of proteins 2006ХХ
6336 Jaynes E.T. Prior information and ambiguity in inverse problems 1984ХХ
185234 Dickeson R. Prioritizing Academic Programs and Services: Reallocating Resources to Achieve Strategic Balance 2010ХХ
148524 Dickeson R.C. Prioritizing Academic Programs and Services: Reallocating Resources to Achieve Strategic Balance, Second Edition, Revised and Updated (Josse Bass Higher and Adult Education) 2010 ХХХ
26713 Nielsen J., Loranger H. Prioritizing Web Usability 2006ХХ
66812 Poundstone W. Prisoner's Dilemma 1993ХХ
12387 Pattakos A., Covey S.R. Prisoners of Our Thoughts: Viktor Frankl's Principles at Work 2004ХХ
152994 Jordi Nin, Javier Herranz Privacy and Anonymity in Information Management Systems (Advanced Information and Knowledge Processing) 2010 ХХХ
145145 Strandburg K., Raicu D.S. Privacy and Technologies of Identity: A Cross-Disciplinary Conversation 2006ХХ
27449 Bahadur G., Weber Ch., Chan W. Privacy Defended: Protecting Yourself Online 2002ХХ
78458 Borisov N., Golle P. Privacy Enhancing Technologies, 2007 2007 ХХХ
153840 Atallah M., Hopper N. Privacy Enhancing Technologies: 10th International Symposium, PETS 2010, July 21-23, 2010, Berlin, Germany, Proceedings (Lecture Notes in Computer Science Security and Cryptology) 2010ХХ
143846 Martin D., Serjantov A. Privacy Enhancing Technologies: 4th International Workshop, PET 2004, Toronto, Canada, May 26-28, 2004, Revised Selected Papers 1998ХХ
147593 Danezis G., Martin D. Privacy Enhancing Technologies: 5th International Workshop, PET 2005, Cavtat, Croatia, May 30 - June 1, 2005, Revised Selected Papers 2006ХХ
175419 Danezis G., Golle P. Privacy Enhancing Technologies: 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers 2006ХХ
175471 Goldberg I., Atallah M. Privacy Enhancing Technologies: 9th International Symposium, PETS 2009, Seattle, WA, USA, August 5-7, 2009, Proceedings (Lecture Notes in Computer Science Security and Cryptology) 2009ХХ
176232 Dingledine R., Syverson P. Privacy Enhancing Technologies: Second International Workshop, Pet 2002, San Francisco, Ca, Usa, April 2002 : Revised Papers 2003ХХ
135652 Dingledine R. Privacy Enhancing Technologies: Third International Workshop, PET 2003, Dresden, Germany, March 26-28, 2003, Revised Papers 2003ХХ
57890 Marcella A.J., Stucki C. Privacy Handbook: Guidelines, Exposures, Policy Implementation, and International Issues 2003ХХ
133843 Nissenbaum H. Privacy in Context: Technology, Policy, and the Integrity of Social Life 2009ХХ
147760 Bettini C., Jajodia S., Samarati P. Privacy in Location-Based Applications: Research Issues and Emerging Trends 2009ХХ
155116 Bettini C., Jajodia S., Samarati P. Privacy in Location-Based Applications: Research Issues and Emerging Trends (Lecture Notes in Computer Science Information Systems and Applications, incl. Internet Web, and HCI) 2009ХХ
162439 Domingo-Ferrer J., Franconi L. Privacy in Statistical Databases: CENEX-SDC Project International Conference, PSD 2006, Rome, Italy, December 13-15, 2006, Proceedings 2006 ХХХ
138134 Henderson H. Privacy in the Information Age 2006 ХХХ
147604 Silverman M. Privacy Matters: Leading CTOs and Lawyers on What Every Business Professional Should Know About Privacy, Technology & the Internet 2003 ХХХ
27691 Diffie W., Landau S. Privacy on the Line: The Politics of Wiretapping and Encryption 1998ХХ
29469 Vaidya J., Clifton Ch., Zhu M. Privacy Preserving Data Mining 2005ХХ
4073 Caloyannides Michael A. Privacy Protection and Computer Forensics(Artech House Computer Security Series) 2004 ХХХ
28306 Yee G. (ed.) Privacy Protection for E-Services 2006ХХ
147863 Beverley-Smith H., Ohly A., Lucas-Schloetter A. Privacy, Property and Personality: Civil Law Perspectives on Commercial Appropriation 2006ХХ
25165 Robinson P., Vogt H., Wagealla W. Privacy, Security and Trust within the Context of Pervasive Computing 2005ХХ
157444 Bonchi F., Ferrari E., Malin B. Privacy, Security, and Trust in KDD: First ACM SIGKDD International Workshop, PinKDD 2007, San Jose, CA, USA, August 12, 2007, Revised, Selected Papers 2008ХХ
127148 Flegel U. Privacy-respecting intrusion detection 2007ХХ
169066 Clark C., McGhee J. Private and Confidential?: Handling Personal Information in Social and Health Services 2008ХХ
69620 Slee R.T. Private Capital Markets: Valuation, Capitalization, and Transfer of Private Business Interests 2008ХХ
57040 Thomas Heberer Private entrepreneurs in China and Vietnam 2003 ХХХ
61068 Fraser-Sampson G. Private Equity as an Asset Class 2007ХХ
22886 Bierman J.H. Private Equity: Transforming Public Stock Into Private Equity to Create Value 2003ХХ
64563 World Bank Group Private Solutions for Infrastructure in Cambodia. Country Framework Report 2002ХХ
60741 Public-private infrastructure advisory facility, The World Bank Private Solutions for Infrastructure in Lesotho 2002ХХ
64564 World Bank Group Private Solutions for Infrastructure in Mexico. Country Framework Report 2003ХХ
138252 Akinci G. Private Tutor for SAT Math Success 2006 2006ХХ
139143 Kikeri S. Privatization and Labor: What Happens to Workers When Governments Divest? 1998ХХ
55349 Köthenbürger M. (ed.), Sinn H.-W. (ed.), Whalley J. (ed.) Privatization Experiences in the European Union 2006ХХ
57885 Newberry D.M. Privatization, Restructuring, and Regulation of Network Utilities 1999ХХ
28314 Curran D., Ferracchiati F.C., Gilani S.F. Pro .NET 1.1 Remoting, Reflection, and Threading 2005ХХ
15737 Horner M. Pro .NET 2.0 Code and Design Standards in C# 2005 ХХХ


blank
HR
@Mail.ru
© Ёлектронна€ библиотека попечительского совета мехмата ћ√”, 2004-2017
Ёлектронна€ библиотека мехмата ћ√” | Valid HTML 4.01!| Valid CSS! ќ проекте