Ãëàâíàÿ    Ex Libris    Êíèãè    Æóðíàëû    Ñòàòüè    Ñåðèè    Êàòàëîã    Wanted    Çàãðóçêà    ÕóäËèò    Ñïðàâêà    Ïîèñê ïî èíäåêñàì    Ïîèñê    Ôîðóì   
Ìåõìàòÿíàì
square Ïåðâûé êóðñ

square Âòîðîé êóðñ

square Òðåòèé êóðñ

square ×åòâåðòûé êóðñ

square Ïÿòûé êóðñ
blank
Àâòîðèçàöèÿ

       
blank
Ïîèñê ïî óêàçàòåëÿì

blank
Êðàñîòà
blank
blank
Áûñòðûé ïåðåõîä
Ïî íàçâàíèþ:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z À Á Â Ã Ä Å ¨ Æ Ç È É Ê Ë Ì Í Î Ï Ð Ñ Ò Ó Ô Õ Ö × Ø Ù Û Ý Þ ß
Ïî àâòîðó:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ¨ À Á Â Ã Ä Å Æ Ç È É Ê Ë Ì Í Î Ï Ð Ñ Ò Ó Ô Õ Ö × Ø Ù Û Ý Þ ß
blank
Âñå ðåñóðñû
Ñîðòèðîâêà:

ID asc desc pic Àâòîðû asc desc Íàçâàíèå asc desc Ãîä asc desc Äîï.
134352 Rannenberg K. (ed.), Varadharajan V. (ed.), Weber C. (ed.) Security Privacy - Silver Linings in the Cloud 2010
30073 Bryan B., Killion D., Lynn M. Security Power Tools 2007
27476 Maiwald E., Sieglein W. Security Planning and Disaster Recovery 2002
24302 Schumacher M., Fernandez-Buglioni E., Hybertson D. Security Patterns Integrating Security and Systems Engineering 2006
127041 Poweski B., Raphael D. Security on Rails (The Pragmatic Programmers) 2009
189392 Poweski B., Raphael D. Security on Rails 2009
153316 Cabrera E., Vela A. Security of Water Supply Systems 2006
165297 Hetland J., Gochitashvili T. Security of Natural Gas Supply through Transit Countries (NATO Science Series II: Mathematics, Physics and Chemistry) 2004
195994 M. Obaidat, N.Boudriga Security of e-Systems and Computer Networks 2007
80683 Halleen G., Kellogg G. Security Monitoring with Cisco Security MARS 2007
166434 Tsai J., Ma L. Security Modeling and Analysis of Mobile Agent Systems (Electrical and Computer Engineering) 2006
133783 Tsai J., Ma L. Security Modeling And Analysis of Mobile Agent Systems 2006
139590 Tsai J., Ma L. Security Modeling And Analysis of Mobile Agent Systems 2006
29606 Jaquith A. Security Metrics: Replacing Fear, Uncertainty, and Doubt (Symantec Press Series) 2007
58695 Jaquith A. Security Metrics: Replacing Fear, Uncertainty, and Doubt 2007
136026 Gerald L. Kovacich, Edward Halibozek Security Metrics Management: How to Manage the Costs of an Assets Protection Program 2005
139364 Kovacich G., Halibozek E. Security Metrics Management: How to Manage the Costs of an Assets Protection Program 2006
56788 Duffie D. Security Markets. Stochastic Models 1988
24830 Babbin J., Carter E.F. Security Log Management: Identifying Patterns in the Chaos 2006
29394 Butler C., Fuller E., Rogers J.A. Security Interviews Exposed: Secrets to Landing Your Next Information Security Job 2007
31415 Butler Ch., Rogers R., Hurley Ch. Security Interviews Exposed: Secrets to Landing Your Next Information Security Job 2007
140775 Miller D., Harris S., Harper A. Security Information and Event Management Implementation 2010
191999 Miller D., Harris S., Harper A. Security Information and Event Management (SIEM) Implementation (Network Pro Library) 2011
132054 Gal C.S., Kantor P.B. Security Informatics and Terrorism 2007
24829 Hardjono Th., Dondeti L.R. Security in Wireless LANs and MANs 2005
60556 Yang Xiao Security in Sensor Networks 2007
167640 Clark I., Paige R., Polack F. Security in Pervasive Computing: Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings 2006
160005 Hutter D., Ullmann M. Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings 2005
146052 Dieter Hutter, Stephan W. Security in Pervasive Computing: First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers 2004
28372 Weippl E.R. Security in e-learning 2005
26400 Xiao Y. Security in Distributed, Grid, Mobile, and Pervasive Computing 2007
186924 Fan C., Thampi S., Atrey P. Security in Computing and Communications: International Symposium, SSCC 2013, Mysore, India, August 22-24, 2013. Proceedings 2013
17420 Pfleeger C.P., Pfleeger S.L. Security in Computing 2006
19503 Pfleeger C.P., Pfleeger S.L. Security in Computing 2002
78427 Blundo C., Cimato S. Security in Communication Networks, 4 conf., SCN 2004 2005
141123 Cimato S., Galdi C., Persiano G. Security in Communication Networks 2003
196308 V. Hassler Security Fundamentals for E-Commerce (Artech House Computer Security Series) 2002
29601 Anjum F., Mouchtaris P. Security for Wireless Ad-hoc Networks 2007
80260 Bertino E., Martino L.M., Paci F. Security for web services and service-oriented architectures 2010
133348 Aissi S., Dabbous N., Prasad A. Security for Mobile Networks and Platforms 2006
172553 Rountree D. Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts 2010
22961 Robinson E., Bond M.J. Security for Microsoft Visual Basic .NET 2003
79109 Schumacher M. Security Engineering with Patterns. Origins, Theoretical Model, and New Applications (Lecture Notes in Computer Science) 2003
183361 Chen J., Miyaji A., Cuzzocrea A. Security Engineering and Intelligence Informatics: CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings 2013
143772 Herrmann D. Security Engineering and Information Assurance 2002
13945 Brewer D.C. Security Controls for Sarbanes-Oxley Section 404 IT Compliance: Authorization, Authentication, and Access 2006
75533 Sennewald C. A. Security Consulting 2004
23162 Dykstra T., Fuller E., Miles G. Security Assessment: Case Studies for Implementing the NSA IAM 2004
76478 Rogers R., Miles G., Fuller E. Security Assessment: Case Studies for Implementing the NSA IAM 2004
24828 Cranor L.F., Garfinkel S. Security and Usability: Designing Secure Systems that People Can Use 2005


blank
HR
@Mail.ru
© Ýëåêòðîííàÿ áèáëèîòåêà ïîïå÷èòåëüñêîãî ñîâåòà ìåõìàòà ÌÃÓ, 2004-2024
Ýëåêòðîííàÿ áèáëèîòåêà ìåõìàòà ÌÃÓ | Valid HTML 4.01!| Valid CSS! Î ïðîåêòå