Ãëàâíàÿ    Ex Libris    Êíèãè    Æóðíàëû    Ñòàòüè    Ñåðèè    Êàòàëîã    Wanted    Çàãðóçêà    ÕóäËèò    Ñïðàâêà    Ïîèñê ïî èíäåêñàì    Ïîèñê    Ôîðóì   
Ìåõìàòÿíàì
square Ïåðâûé êóðñ

square Âòîðîé êóðñ

square Òðåòèé êóðñ

square ×åòâåðòûé êóðñ

square Ïÿòûé êóðñ
blank
Àâòîðèçàöèÿ

       
blank
Ïîèñê ïî óêàçàòåëÿì

blank
Êðàñîòà
blank
blank
Áûñòðûé ïåðåõîä
Ïî íàçâàíèþ:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z À Á Â Ã Ä Å ¨ Æ Ç È É Ê Ë Ì Í Î Ï Ð Ñ Ò Ó Ô Õ Ö × Ø Ù Û Ý Þ ß
Ïî àâòîðó:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ¨ À Á Â Ã Ä Å Æ Ç È É Ê Ë Ì Í Î Ï Ð Ñ Ò Ó Ô Õ Ö × Ø Ù Û Ý Þ ß
blank
Âñå ðåñóðñû
Ñîðòèðîâêà:

ID asc desc pic Àâòîðû asc desc Íàçâàíèå asc desc Ãîä asc desc Äîï.
139364 Kovacich G., Halibozek E. Security Metrics Management: How to Manage the Costs of an Assets Protection Program 2006
56788 Duffie D. Security Markets. Stochastic Models 1988
24830 Babbin J., Carter E.F. Security Log Management: Identifying Patterns in the Chaos 2006
29394 Butler C., Fuller E., Rogers J.A. Security Interviews Exposed: Secrets to Landing Your Next Information Security Job 2007
31415 Butler Ch., Rogers R., Hurley Ch. Security Interviews Exposed: Secrets to Landing Your Next Information Security Job 2007
140775 Miller D., Harris S., Harper A. Security Information and Event Management Implementation 2010
191999 Miller D., Harris S., Harper A. Security Information and Event Management (SIEM) Implementation (Network Pro Library) 2011
132054 Gal C.S., Kantor P.B. Security Informatics and Terrorism 2007
24829 Hardjono Th., Dondeti L.R. Security in Wireless LANs and MANs 2005
60556 Yang Xiao Security in Sensor Networks 2007
167640 Clark I., Paige R., Polack F. Security in Pervasive Computing: Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings 2006
160005 Hutter D., Ullmann M. Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings 2005
146052 Dieter Hutter, Stephan W. Security in Pervasive Computing: First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers 2004
28372 Weippl E.R. Security in e-learning 2005
26400 Xiao Y. Security in Distributed, Grid, Mobile, and Pervasive Computing 2007
186924 Fan C., Thampi S., Atrey P. Security in Computing and Communications: International Symposium, SSCC 2013, Mysore, India, August 22-24, 2013. Proceedings 2013
17420 Pfleeger C.P., Pfleeger S.L. Security in Computing 2006
19503 Pfleeger C.P., Pfleeger S.L. Security in Computing 2002
78427 Blundo C., Cimato S. Security in Communication Networks, 4 conf., SCN 2004 2005
141123 Cimato S., Galdi C., Persiano G. Security in Communication Networks 2003
196308 V. Hassler Security Fundamentals for E-Commerce (Artech House Computer Security Series) 2002
29601 Anjum F., Mouchtaris P. Security for Wireless Ad-hoc Networks 2007
80260 Bertino E., Martino L.M., Paci F. Security for web services and service-oriented architectures 2010
133348 Aissi S., Dabbous N., Prasad A. Security for Mobile Networks and Platforms 2006
172553 Rountree D. Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts 2010
22961 Robinson E., Bond M.J. Security for Microsoft Visual Basic .NET 2003
79109 Schumacher M. Security Engineering with Patterns. Origins, Theoretical Model, and New Applications (Lecture Notes in Computer Science) 2003
183361 Chen J., Miyaji A., Cuzzocrea A. Security Engineering and Intelligence Informatics: CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings 2013
143772 Herrmann D. Security Engineering and Information Assurance 2002
13945 Brewer D.C. Security Controls for Sarbanes-Oxley Section 404 IT Compliance: Authorization, Authentication, and Access 2006
75533 Sennewald C. A. Security Consulting 2004
23162 Dykstra T., Fuller E., Miles G. Security Assessment: Case Studies for Implementing the NSA IAM 2004
76478 Rogers R., Miles G., Fuller E. Security Assessment: Case Studies for Implementing the NSA IAM 2004
24828 Cranor L.F., Garfinkel S. Security and Usability: Designing Secure Systems that People Can Use 2005
184091 Delakouridis C., Anagnostopoulos C., Accorsi R. Security and Trust Management: 9th International Workshop, STM 2013, Egham, UK, September 12-13, 2013. Proceedings 2013
55586 Adomi E.E. Security and Software for Cybercafes 2008
178299 Schmidt F., Russello G., Lioy A. Security and Privacy in Mobile Information and Communication Systems (LNICST, 47) 2010
135627 Lian S. Security and Privacy in Mobile Information and Communication Systems 2009
173985 Lian S., Schmidt A. Security and Privacy in Mobile Information and Communication Systems 2009
135931 Fischer-Hubner S. Security and Privacy in Dynamic Environments 2006
191017 Sander T. Security and Privacy in Digital Rights Management: ACM CCS-8 Workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001. Revised Papers 2002
28870 Feigenbaum J. (Ed) Security and Privacy in Digital Rights Management 2003
177661 Jajodia S., Zhou J. Security and privacy in communication networks 2010
153377 Buttyan L., Gligor V., Westhoff D. Security and Privacy in Ad-Hoc and Sensor Networks: Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected 2006
144243 Molva R., Tsudik G., Westhoff D. Security and Privacy in Ad-hoc and Sensor Networks: Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005. Revised Selected Papers 2005
79209 Stajano F. (ed.), Meadows C. (ed.), Capkun S. (ed.) Security and Privacy in Ad-hoc and Sensor Networks. 4th European Workshop, ESAS 2007 Cambridge, UK, July 2-3, 2007 Proceedings 2007
156994 Henriques M., Khachani M. Security And Migrations in the Mediterranean: Playing With Fire (NATO Science Series: Science & Technology Policy) (Nato Science Series: Science & Technology Policy) 2006
158864 Security and HackingHave You Locked the Castle Gate. Home and Small Business Computer Security n/a
169349 Serpanos D.N., Giladi R. Security and Embedded Systems: Volume 2 NATO Security through Science Series: Information and Communication Security (Nato Security Through Science) 2006
190750 Ostrovsky R., Prisco R., Visconti I. Security and Cryptography for Networks: 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008, Proceedings (Lecture Notes in Computer Science) 2008


blank
HR
@Mail.ru
© Ýëåêòðîííàÿ áèáëèîòåêà ïîïå÷èòåëüñêîãî ñîâåòà ìåõìàòà ÌÃÓ, 2004-2024
Ýëåêòðîííàÿ áèáëèîòåêà ìåõìàòà ÌÃÓ | Valid HTML 4.01!| Valid CSS! Î ïðîåêòå