Ãëàâíàÿ    Ex Libris    Êíèãè    Æóðíàëû    Ñòàòüè    Ñåðèè    Êàòàëîã    Wanted    Çàãðóçêà    ÕóäËèò    Ñïðàâêà    Ïîèñê ïî èíäåêñàì    Ïîèñê    Ôîðóì   
Ìåõìàòÿíàì
square Ïåðâûé êóðñ

square Âòîðîé êóðñ

square Òðåòèé êóðñ

square ×åòâåðòûé êóðñ

square Ïÿòûé êóðñ
blank
Àâòîðèçàöèÿ

       
blank
Ïîèñê ïî óêàçàòåëÿì

blank
Êðàñîòà
blank
blank
Áûñòðûé ïåðåõîä
Ïî íàçâàíèþ:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z À Á Â Ã Ä Å ¨ Æ Ç È É Ê Ë Ì Í Î Ï Ð Ñ Ò Ó Ô Õ Ö × Ø Ù Û Ý Þ ß
Ïî àâòîðó:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ¨ À Á Â Ã Ä Å Æ Ç È É Ê Ë Ì Í Î Ï Ð Ñ Ò Ó Ô Õ Ö × Ø Ù Û Ý Þ ß
blank
Âñå ðåñóðñû
Ñîðòèðîâêà:

ID asc desc pic Àâòîðû asc desc Íàçâàíèå asc desc Ãîä asc desc Äîï.
180057 Willcocks L., Lacity M. Information Systems and Outsourcing: Studies in Theory and Practice 2009
133943 Rada R. Information Systems and Healthcare Enterprises 2007
160905 Kaschek R., Kop C., Steinberger C. Information Systems and e-Business Technologies: 2nd International United Information Systems Conference, UNISCON 2008, Klagenfurt, Austria, April 22-25, ... Notes in Business Information Processing) 2008
158892 Bhalla S. Information Systems and Data Management: 6th International Conference, CISMOD '95, Bombay, India, November 15-17, 1995. Proceedings 1995
74064 Seidler J. A. Information Systems and Data Compression 1997
179311 Karagiannis D. Information Systems and Artificial Intelligence: Integration Aspects: First Workshop, Ulm, FRG, March 19-21, 1990. Proceedings 1991
156359 Ned Kock Information Systems Action Research: An Applied View of Emerging Concepts and Methods (Integrated Series in Information Systems) 2006
23974 Fortune J., Peters G. Information Systems Achieving Success by Avoiding Failure 2005
130303 Davis W., Yen D. Information System Consultants Handbook. Systems Analysis And Design 1999
193689 Zimmermann M., Fery C. Information Structure: Theoretical, Typological, and Experimental Perspectives 2010
180012 Erteschik-Shir N. Information Structure: The Syntax-Discourse Interface (Oxford Surveys in Syntax & Morphology) 2007
166843 Hinterholzl R., Petrova S. Information Structure and Language Change: New Approaches to Word Order Variation in Germanic (Trends in Linguistics. Studies and Monographs) 2009
170320 Hinterhozl R., Petrova S. Information Structure and Language Change: New Approaches to Word Order Variation in Germanic 2009
131281 Mereu L. Information Structure and its Interfaces 2009
166694 Arquilla J., Borer D. Information Strategy and Warfare: A Guide to Theory and Practice (Contemporary Security Studies) 2007
162318 Kowalski G.J., Maybury M.T. Information Storage and Retrieval Systems: Theory and Implementation (The Information Retrieval Series, Volume 8) 2000
172908 Somasundaram G., Shrivastava A. Information Storage and Management: Storing, Managing, and Protecting Digital Information 2009
172331 Adams S. Information Sources in Patents (Guides to Information Sources) 2006
131330 Heiskanen T. Information Society and the Workplace: Spaces, Boundaries and Agencies 2003
196560 Information Sharing, Liquidity And Transaction Costs In Floor-Based Trading Systems 2001
161294 Stuckenschmidt H., Harmelen F. Information Sharing on the Semantic Web (Advanced Information and Knowledge Processing) 2005
138709 Stuckenschmidt H., van Harmelen F. Information Sharing on the Semantic Web 2010
144630 Gary Marchionini Information Seeking in Electronic Environments 1997
143193 Pieprzyk J., Okamoto E., Seberry J. Information Security: Third International Workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000. Proceedings 2000
193743 Mambo M., Zheng Y. Information Security: Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 6-7, 1999 Proceedings 1999
137531 Detmar W. Straub, Seymour Goodman, Richard Baskerville Information Security: Policy, Processes, and Practices 2008
141011 0 Information Security: Keeping Data Safe 2002
152507 Layton T. Information Security: Design, Implementation, Measurement, and Compliance 2007
179341 Alexander P. Information Security: A Manager's Guide to Thwarting Data Thieves and Hackers (PSI Business Security) 2008
146488 Katsikas S.K., Lopez J. Information Security: 9th International Conference; ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings 2006
148942 Zhou J., Lopez J., Deng R. Information Security: 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings 2005
150653 Zhang K., Zheng Y. Information Security: 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings (Lecture Notes in Computer Science) 2005
148630 Kan Zhang, Yuliang Zheng Information Security: 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings 2004
170658 Boyd C., Mao W. Information Security: 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings 2003
144353 Davida G.I., Frankel Y. Information Security: 4th International Conference, ISC 2001 Malaga, Spain, October 1-3, 2001 Proceedings 2001
196301 J. A. Garay Information Security: 10th International Conference, ISC 2007, Valparaiso, Chile, October 9-12, 2007, Proceedings 2007
151222 Kwak J., Deng R., Wang G. Information Security, Practice and Experience: 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010, Proceedings (Lecture Notes in Computer Science Security and Cryptology) 2010
168749 Samarati P., Tunstall M., Posegga J. Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices: 4th IFIP WG 11.2 International Workshop, WISTP ... Computer Science Security and Cryptology) 2010
163659 Onieva J.A., Sauveron D. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008
181612 Sauveron D., Markantonakis K., Bilas A. Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems: First IFIP TC6 / WG 8.8 / WG 11.2 International 2007
154812 Markowitch O., Bilas A., Hoepman J. Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks: Third IFIP WG 11.2 International Workshop, WISTP 2009 ... Computer Science Security and Cryptology) 2009
139685 Markowitch O., Bilas A., Hoepman J. Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks: Third IFIP WG 11.2 International Workshop, WISTP ... Computer Science Security and Cryptology) 2009
127993 Peltier T.R. Information Security Risk Analysis 2005
180400 Peltier T. Information Security Risk Analysis 2001
14396 Stamp M. Information Security Principles and Practice 2005
166148 Dawson E., Wong D.S. Information Security Practice and Experience: Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings (Lecture Notes in Computer Science Security and Cryptology) 2007
137750 Dawson E. (ed.), Wong D.S. (ed.) Information Security Practice and Experience: Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings 2007
176803 Deng R., Bao F., Pang H. Information Security Practice and Experience: First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings 2005
166992 Chen L., Mu J., Susilo W. Information Security Practice and Experience: 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings 2008
140446 Bao F., Li H., Wang G. Information Security Practice and Experience, 5 conf., ISPEC 2009 2009


blank
HR
@Mail.ru
© Ýëåêòðîííàÿ áèáëèîòåêà ïîïå÷èòåëüñêîãî ñîâåòà ìåõìàòà ÌÃÓ, 2004-2024
Ýëåêòðîííàÿ áèáëèîòåêà ìåõìàòà ÌÃÓ | Valid HTML 4.01!| Valid CSS! Î ïðîåêòå