Ãëàâíàÿ    Ex Libris    Êíèãè    Æóðíàëû    Ñòàòüè    Ñåðèè    Êàòàëîã    Wanted    Çàãðóçêà    ÕóäËèò    Ñïðàâêà    Ïîèñê ïî èíäåêñàì    Ïîèñê    Ôîðóì   
Ìåõìàòÿíàì
square Ïåðâûé êóðñ

square Âòîðîé êóðñ

square Òðåòèé êóðñ

square ×åòâåðòûé êóðñ

square Ïÿòûé êóðñ
blank
Àâòîðèçàöèÿ

       
blank
Ïîèñê ïî óêàçàòåëÿì

blank
Êðàñîòà
blank
blank
Áûñòðûé ïåðåõîä
Ïî íàçâàíèþ:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z À Á Â Ã Ä Å ¨ Æ Ç È É Ê Ë Ì Í Î Ï Ð Ñ Ò Ó Ô Õ Ö × Ø Ù Û Ý Þ ß
Ïî àâòîðó:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ¨ À Á Â Ã Ä Å Æ Ç È É Ê Ë Ì Í Î Ï Ð Ñ Ò Ó Ô Õ Ö × Ø Ù Û Ý Þ ß
blank
Âñå ðåñóðñû
Ñîðòèðîâêà:

ID asc desc pic Àâòîðû asc desc Íàçâàíèå asc desc Ãîä asc desc Äîï.
127566 Poovendran R., Wang C., Roy S. Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks 2007
30083 Robichaux P. Secure Messaging with Microsoft Exchange Server 2000 2003
23350 Robichaux R. Secure Messaging with Microsoft Exchange Server 2003 2004
160462 Burmester M., Yasinsac A. Secure Mobile Ad-hoc Networks and Sensors: First International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papers 2006
193251 Onieva J., Zhou J. Secure Multi-Party Non-Repudiation Protocols and Applications 2009
149554 Baumgart R. Secure Networking - CQRE (Secure) '99: International Exhibition and Congress D?sseldorf, Germany, November 30 - December 2, 1999, Proceedings 1999
23484 Kabir M.J. Secure PHP Development: Building 50 Practical Applications 2003
26967 Galic M. Secure Portal: Using Websphere Portal V5 and Tivoli Access Manager V4.1 2003
13930 Messier M., Viega J. Secure Programming Cookbook for C and C++ 2003
112164 Wheeler D.A. Secure Programming for Linux and Unix HOWTO 2003
152881 Wheeler D. Secure programming with Linux and Unix HOWTO 2003
26382 Chess B., West J., McGraw G. Secure Programming with Static Analysis 2007
26497 Goransson P., Greenlaw R. Secure Roaming in 802.11 Networks 2007
29587 Jurjens J. Secure Systems Development with UML 2004
77976 Chen Q. Secure Transaction Protocol Analysis: Models and Applications 2008
169524 Chen Q., Zhang C., Zhang S. Secure Transaction Protocol Analysis: Models and Applications (Lecture Notes in Computer Science / Programming and Software Engineering) 2008
20791 Eastlake D.E., Niles K. Secure XML: The New Syntax for Signatures and Encryption 2002
21475 Seagren E., Noonan W.J. (ed.) Secure Your Network for Free 2007
158158 Information Security Securing Intellectual Property: Protecting Trade Secrets and Other Information Assets (Information Security) 2008
30084 Wells Ch. Securing Ajax Applications: Ensuring the Safety of the Dynamic Web 2007
28370 Davis P.T. Securing and controlling Cisco routers 2002
27173 Mourani G. Securing and Optimizing Linux: A Hands on Guide for Linux Professionals, Redhat Edition 2000
26918 Mourani G. Securing and Optimizing Red Hat Linux 2000
14041 Securing Cisco IOS Networks 2004
29588 Macaulay T. Securing Converged IP Networks: New Requirements for ICT Security and Assurance 2006
10181 Securing data on the Web 2001
142565 Lukszo Z., Deconinck G., Weijnen M. Securing Electricity Supply in the Cyber Age: Exploring the Risks of Information and Communication Technology in Tomorrow's Electricity Infrastructure (Topics in Safety, Risk, Reliability and Quality) 2010
76131 Piccard P.L. Securing IM and P2P Applications for the Enterprise 2005
152846 Furnell S., Katsikas S., Lopez J. Securing Information and Communications Systems: Principles, Technologies, and Applications (Information Security & Privacy) 2008
176725 Furnell S., Katsikas S., Lopez J. Securing Information and Communications Systems: Principles, Technologies, and Applications (Information Security & Privacy) 2008
27172 Brotzman L. (Ed), Ranch D. (Ed) Securing Linux Step by Step 1999
24827 Koconis D., Murray J. Securing Linux: A Survival Guide for Linux Security 2003
12484 Krutz R.L. Securing SCADA Systems 2005
55304 Kizza F.M. Securing the Information Infrastructure 2007
166109 Kizza J., Kizza F. Securing the Information Infrastructure 2008
58051 Ness L. Securing Utility and Energy Infrastructures 2006
29589 Thermos P., Takanen A. Securing VoIP Networks: Threats, Vulnerabilities, Countermeasures 2007
22962 Rosenberg J., Remy D. Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption 2004
26602 Shawgo J. Securing Windows 2000 Step-by-Step, Vol. 5 2001
19457 Danseglio M. Securing Windows Server 2003 2004
152503 Liu R., Trappe W. Securing Wireless Communications at the Physical Layer 2009
24022 Held J. Securing Wireless LANs: A Practical Guide for Network Managers, LAN Administrators and the Home Office User 2003
13287 Abelar G. Securing Your Business with Cisco ASA and PIX Firewalls 2005
29673 Miller D.R., Gregg M. Security Administrator Street Smarts: A Real World Guide to CompTIA Security+ Skills 2007
198286 Graham B., Dodd D. Security Analysis 1996
164867 Graham B., Dodd D. Security Analysis: Principles and Technique, Second Edition 1934
192345 Hawker A. Security and Control in Information Systems: A Guide for Business and Accounting 2000
211035 Verhagen H.L.E. Security and Credit in Roman Law: The Historical Evolution of Pignus and Hypotheca 2022
80456 Ostrovsky R.(ed.), Prisco R.(ed.), Visconti I.(ed.) Security and Cryptography for Networks 6th International Conference, SCN 2008 Amalfi, Italy, September 10-12, 2008 Proceedings 2008
169630 De Prisco R., Yung M. Security and Cryptography for Networks: 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006, Proceedings 2006


blank
HR
@Mail.ru
© Ýëåêòðîííàÿ áèáëèîòåêà ïîïå÷èòåëüñêîãî ñîâåòà ìåõìàòà ÌÃÓ, 2004-2024
Ýëåêòðîííàÿ áèáëèîòåêà ìåõìàòà ÌÃÓ | Valid HTML 4.01!| Valid CSS! Î ïðîåêòå