√лавна€    Ex Libris     ниги    ∆урналы    —татьи    —ерии     аталог    Wanted    «агрузка    ’удЋит    —правка    ѕоиск по индексам    ѕоиск    ‘орум   
ћехмат€нам
square ѕервый курс

square ¬торой курс

square “ретий курс

square „етвертый курс

square ѕ€тый курс
blank
јвторизаци€

       
blank
ѕоиск по указател€м

blank
 расота
blank
blank
Ѕыстрый переход
ѕо названию:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ј Ѕ ¬ ƒ ® « »   Ћ ћ Ќ ќ ѕ ÷ Ў ў Ё ё я
ѕо автору:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ® ј Ѕ ¬ ƒ « »   Ћ ћ Ќ ќ ѕ ÷ Ў ў џ Ё ё я
blank
¬се ресурсы
—ортировка:

ID asc desc pic јвторы asc desc Ќазвание asc desc √од asc desc ƒоп.
19503 Pfleeger C.P., Pfleeger S.L. Security in Computing 2002 ХХХ
186924 Fan C., Thampi S., Atrey P. Security in Computing and Communications: International Symposium, SSCC 2013, Mysore, India, August 22-24, 2013. Proceedings 2013ХХ
26400 Xiao Y. Security in Distributed, Grid, Mobile, and Pervasive Computing 2007ХХ
28372 Weippl E.R. Security in e-learning 2005ХХ
146052 Dieter Hutter, Stephan W. Security in Pervasive Computing: First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers 2004ХХ
160005 Hutter D., Ullmann M. Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings 2005ХХ
167640 Clark I., Paige R., Polack F. Security in Pervasive Computing: Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings 2006ХХ
60556 Yang Xiao Security in Sensor Networks 2007ХХ
24829 Hardjono Th., Dondeti L.R. Security in Wireless LANs and MANs 2005ХХ
132054 Gal C.S., Kantor P.B. Security Informatics and Terrorism 2007ХХ
191999 Miller D., Harris S., Harper A. Security Information and Event Management (SIEM) Implementation (Network Pro Library) 2011ХХ
140775 Miller D., Harris S., Harper A. Security Information and Event Management Implementation 2010ХХ
29394 Butler C., Fuller E., Rogers J.A. Security Interviews Exposed: Secrets to Landing Your Next Information Security Job 2007ХХ
31415 Butler Ch., Rogers R., Hurley Ch. Security Interviews Exposed: Secrets to Landing Your Next Information Security Job 2007ХХ
24830 Babbin J., Carter E.F. Security Log Management: Identifying Patterns in the Chaos 2006ХХ
56788 Duffie D. Security Markets. Stochastic Models 1988ХХ
136026 Gerald L. Kovacich, Edward Halibozek Security Metrics Management: How to Manage the Costs of an Assets Protection Program 2005 ХХХ
139364 Kovacich G., Halibozek E. Security Metrics Management: How to Manage the Costs of an Assets Protection Program 2006ХХ
58695 Jaquith A. Security Metrics: Replacing Fear, Uncertainty, and Doubt 2007ХХ
29606 Jaquith A. Security Metrics: Replacing Fear, Uncertainty, and Doubt (Symantec Press Series) 2007ХХ
133783 Tsai J., Ma L. Security Modeling And Analysis of Mobile Agent Systems 2006ХХ
139590 Tsai J., Ma L. Security Modeling And Analysis of Mobile Agent Systems 2006ХХ
166434 Tsai J., Ma L. Security Modeling and Analysis of Mobile Agent Systems (Electrical and Computer Engineering) 2006ХХ
80683 Halleen G., Kellogg G. Security Monitoring with Cisco Security MARS 2007ХХ
195994 M. Obaidat, N.Boudriga Security of e-Systems and Computer Networks 2007ХХ
165297 Hetland J., Gochitashvili T. Security of Natural Gas Supply through Transit Countries (NATO Science Series II: Mathematics, Physics and Chemistry) 2004ХХ
153316 Cabrera E., Vela A. Security of Water Supply Systems 2006ХХ
189392 Poweski B., Raphael D. Security on Rails 2009ХХ
127041 Poweski B., Raphael D. Security on Rails (The Pragmatic Programmers) 2009ХХ
24302 Schumacher M., Fernandez-Buglioni E., Hybertson D. Security Patterns Integrating Security and Systems Engineering 2006ХХ
27476 Maiwald E., Sieglein W. Security Planning and Disaster Recovery 2002ХХ
30073 Bryan B., Killion D., Lynn M. Security Power Tools 2007ХХ
134352 Rannenberg K. (ed.), Varadharajan V. (ed.), Weber C. (ed.) Security Privacy - Silver Linings in the Cloud 2010ХХ
158310 Christianson B., Crispo B., Malcolm J. Security Protocols 2010ХХ
80549 Christianson B.(ed.), Crispo B.(ed.), Malcolm J.A.(ed.) Security Protocols 10th International Workshop Cambridge, UK, April 17-19, 2002 Revised Papers 2004 ХХХ
80551 Christianson B.(ed.), Crispo B.(ed.), Malcom J.A.(ed.) Security Protocols 13th International Workshop Cambridge, UK, April 20-22, 2005 Revised Selected Papers 2007ХХ
80452 Bruce Christianson B.(ed.), Bruno Crispo B.(ed.), Malcolm J.A.(ed.) Security Protocols 7th International Workshop Cambridge, UK, April 19-21, 1999 Proceedings 2000 ХХХ
78944 Christianson B., Crispo B. Security Protocols: 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers 2005ХХ
132100 Lomas M. Security Protocols: International Workshop Cambridge, United Kingdom April 10-12, 1996 Proceedings 1997ХХ
24831 Andres S., Kenyon B. Security Sage's Guide to Hardening the Network Infrastructure 2004ХХ
24500 Oppliger R. Security Technologies for the World Wide Web 2003ХХ
155802 Dominik Slezak, Tai-Hoon Kim, Wai-chi Fang Security Technology (Communications in Computer and Information Science, 58) 2010 ХХХ
175636 Coon J. Security Technology in U.S. Public Schools (Criminal Justice) 2007ХХ
149032 Fang W., Khan M., Arnett K. Security Technology, Disaster Recovery and Business Continuity 2010ХХ
22627 Peikari C., Chuvakin A. Security Warrior 2004ХХ
26098 Microsoft Corporation, Hudson K., Ruth A. Security+ Certification Training Kit 2003ХХ
19528 Hausman K., Barrett D., Weiss M. Security+ Exam Cram 2 (Exam SYO-101) 2003ХХ
29592 Dubrawsky I., Faircloth J. Security+ Study Guide 2007 ХХХ
75667 Crayton C.A., Dubrawsky I., Cross M. Security+ Study Guide 2003ХХ
26956 Crayton C.A., Dubrawsky I., Cross M. Security+ Study Guide and DVD Training System 2007 ХХХ


blank
HR
@Mail.ru
© Ёлектронна€ библиотека попечительского совета мехмата ћ√”, 2004-2021
Ёлектронна€ библиотека мехмата ћ√” | Valid HTML 4.01!| Valid CSS! ќ проекте