Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
Мехматянам
square Первый курс

square Второй курс

square Третий курс

square Четвертый курс

square Пятый курс
blank
Авторизация

       
blank
Поиск по указателям

blank
Красота
blank
blank
Поиск по фонду
Поиск*:
Где: Везде В названиях В авторах В описаниях В ISBN
Дополнительно: Учитывать регистр
Логика:
Язык:
FirefoxПользователям Mozilla доступен plugin для поиска

Переключиться в лайт-версию поиска.
blank
Результаты поиска
Вы искали: пїЅпїЅпїЅпїЅпїЅпїЅпїЅпїЅпїЅпїЅ пїЅпїЅпїЅпїЅпїЅпїЅпїЅпїЅпїЅпїЅпїЅпїЅпїЅпїЅпїЅпїЅ

Найденные книги: 214766

98701. Macaulay T. Securing Converged IP Networks: New Requirements for ICT Security and Assurance2006
blank
98702. Securing data on the Web2001
blank
98703. Lukszo Z. Deconinck G. Weijnen M. Securing Electricity Supply in the Cyber Age: Exploring the Risks of Information and Communication Technology in Tomorrow's Electricity Infrastructure (Topics in Safety, Risk, Reliability and Quality)2010
blank
98704. Piccard P.L. Securing IM and P2P Applications for the Enterprise2005
blank
98705. Furnell S. Katsikas S. Lopez J. Securing Information and Communications Systems: Principles, Technologies, and Applications (Information Security & Privacy)2008
blank
98706. Furnell S. Katsikas S. Lopez J. Securing Information and Communications Systems: Principles, Technologies, and Applications (Information Security & Privacy)2008
blank
98707. Brotzman L. (Ed) Ranch D. (Ed) Securing Linux Step by Step1999
blank
98708. Koconis D. Murray J. Securing Linux: A Survival Guide for Linux Security2003
blank
98709. Krutz R.L. Securing SCADA Systems2005
blank
98710. Kizza F.M. Securing the Information Infrastructure2007
blank
98711. Kizza J. Kizza F. Securing the Information Infrastructure2008
blank
98712. Ness L. Securing Utility and Energy Infrastructures2006
blank
98713. Thermos P. Takanen A. Securing VoIP Networks: Threats, Vulnerabilities, Countermeasures2007
blank
98714. Rosenberg J. Remy D. Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption2004
blank
98715. Shawgo J. Securing Windows 2000 Step-by-Step, Vol. 52001
blank
98716. Danseglio M. Securing Windows Server 20032004
blank
98717. Liu R. Trappe W. Securing Wireless Communications at the Physical Layer2009
blank
98718. Held J. Securing Wireless LANs: A Practical Guide for Network Managers, LAN Administrators and the Home Office User2003
blank
98719. Abelar G. Securing Your Business with Cisco ASA and PIX Firewalls2005
blank
98720. Miller D.R. Gregg M. Security Administrator Street Smarts: A Real World Guide to CompTIA Security+ Skills2007
blank
98721. Graham B. Dodd D. Security Analysis (1 edition)1996
blank
98722. Graham B. Dodd D. Security Analysis: Principles and Technique, Second Edition1934
blank
98723. Hawker A. Security and Control in Information Systems: A Guide for Business and Accounting2000
blank
98724. Verhagen H.L.E. Security and Credit in Roman Law: The Historical Evolution of Pignus and Hypotheca2022
blank
98725. Ostrovsky R.(ed.) Prisco R.(ed.) Visconti I.(ed.) Security and Cryptography for Networks 6th International Conference, SCN 2008 Amalfi, Italy, September 10-12, 2008 Proceedings2008
blank
98726. De Prisco R. Yung M. Security and Cryptography for Networks: 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006, Proceedings2006
blank
98727. Ostrovsky R. Prisco R. Visconti I. Security and Cryptography for Networks: 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008, Proceedings (Lecture Notes in Computer Science)2008
blank
98728. Serpanos D.N. Giladi R. Security and Embedded Systems: Volume 2 NATO Security through Science Series: Information and Communication Security (Nato Security Through Science)2006
blank
98729. Security and HackingHave You Locked the Castle Gate. Home and Small Business Computer Securityn/a
blank
98730. Raje G. Security and Microservice Architecture on AWS: Architecting and Implementing a Secured, Scalable Solution2021
blank
98731. Henriques M. Khachani M. Security And Migrations in the Mediterranean: Playing With Fire (NATO Science Series: Science & Technology Policy) (Nato Science Series: Science & Technology Policy)2006
blank
98732. Stajano F. (ed.) Meadows C. (ed.) Capkun S. (ed.) Security and Privacy in Ad-hoc and Sensor Networks. 4th European Workshop, ESAS 2007 Cambridge, UK, July 2-3, 2007 Proceedings2007
blank
98733. Molva R. Tsudik G. Westhoff D. Security and Privacy in Ad-hoc and Sensor Networks: Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005. Revised Selected Papers2005
blank
98734. Buttyan L. Gligor V. Westhoff D. Security and Privacy in Ad-Hoc and Sensor Networks: Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected2006
blank
98735. Jajodia S. Zhou J. Security and privacy in communication networks2010
blank
98736. Feigenbaum J. (Ed) Security and Privacy in Digital Rights Management2003
blank
98737. Sander T. Security and Privacy in Digital Rights Management: ACM CCS-8 Workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001. Revised Papers2002
blank
98738. Fischer-Hubner S. Security and Privacy in Dynamic Environments2006
blank
98739. Lian S. Security and Privacy in Mobile Information and Communication Systems2009
blank
98740. Lian S. Schmidt A. Security and Privacy in Mobile Information and Communication Systems2009
blank
98741. Schmidt F. Russello G. Lioy A. Security and Privacy in Mobile Information and Communication Systems (LNICST, 47)2010
blank
98742. Adomi E.E. Security and Software for Cybercafes2008
blank
98743. Delakouridis C. Anagnostopoulos C. Accorsi R. Security and Trust Management: 9th International Workshop, STM 2013, Egham, UK, September 12-13, 2013. Proceedings2013
blank
98744. Cranor L.F. Garfinkel S. Security and Usability: Designing Secure Systems that People Can Use2005
blank
98745. Dykstra T. Fuller E. Miles G. Security Assessment: Case Studies for Implementing the NSA IAM2004
blank
98746. Rogers R. Miles G. Fuller E. Security Assessment: Case Studies for Implementing the NSA IAM (1st edition)2004
blank
98747. Lunkeit A. Zimmer W. Security by Design: Security Engineering informationstechnischer Systemen/a
blank
98748. Sennewald C. A. Security Consulting (Third edition)2004
blank
98749. Brewer D.C. Security Controls for Sarbanes-Oxley Section 404 IT Compliance: Authorization, Authentication, and Access2006
blank
98750. Herrmann D. Security Engineering and Information Assurance2002
blank
98751. Chen J. Miyaji A. Cuzzocrea A. Security Engineering and Intelligence Informatics: CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings2013
blank
98752. Schumacher M. Security Engineering with Patterns. Origins, Theoretical Model, and New Applications (Lecture Notes in Computer Science)2003
blank
98753. Robinson E. Bond M.J. Security for Microsoft Visual Basic .NET2003
blank
98754. Rountree D. Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts2010
blank
98755. Aissi S. Dabbous N. Prasad A. Security for Mobile Networks and Platforms2006
blank
98756. Bertino E. Martino L.M. Paci F. Security for web services and service-oriented architectures2010
blank
98757. Anjum F. Mouchtaris P. Security for Wireless Ad-hoc Networks2007
blank
98758. V. Hassler Security Fundamentals for E-Commerce (Artech House Computer Security Series)2002
blank
98759. Cimato S. Galdi C. Persiano G. Security in Communication Networks2003
blank
98760. Blundo C. Cimato S. Security in Communication Networks, 4 conf., SCN 2004 (1 edition)2005
blank
98761. Pfleeger C.P. Pfleeger S.L. Security in Computing (4th edition)2006
blank
98762. Pfleeger C.P. Pfleeger S.L. Security in Computing (3rd edition)2002
blank
98763. Fan C. Thampi S. Atrey P. Security in Computing and Communications: International Symposium, SSCC 2013, Mysore, India, August 22-24, 2013. Proceedings2013
blank
98764. Xiao Y. Security in Distributed, Grid, Mobile, and Pervasive Computing2007
blank
98765. Weippl E.R. Security in e-learning2005
blank
98766. Dieter Hutter Stephan W. Security in Pervasive Computing: First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers2004
blank
98767. Hutter D. Ullmann M. Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings2005
blank
98768. Clark I. Paige R. Polack F. Security in Pervasive Computing: Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings2006
blank
98769. Yang Xiao Security in Sensor Networks2007
blank
98770. Hardjono Th. Dondeti L.R. Security in Wireless LANs and MANs2005
blank
98771. Gal C.S. Kantor P.B. Security Informatics and Terrorism2007
blank
98772. Miller D. Harris S. Harper A. Security Information and Event Management (SIEM) Implementation (Network Pro Library)2011
blank
98773. Miller D. Harris S. Harper A. Security Information and Event Management Implementation2010
blank
98774. Butler C. Fuller E. Rogers J.A. Security Interviews Exposed: Secrets to Landing Your Next Information Security Job2007
blank
98775. Butler Ch. Rogers R. Hurley Ch. Security Interviews Exposed: Secrets to Landing Your Next Information Security Job2007
blank
98776. Babbin J. Carter E.F. Security Log Management: Identifying Patterns in the Chaos2006
blank
98777. Duffie D. Security Markets. Stochastic Models1988
blank
98778. Gerald L. Kovacich Edward Halibozek Security Metrics Management: How to Manage the Costs of an Assets Protection Program (1 edition)2005
blank
98779. Kovacich G. Halibozek E. Security Metrics Management: How to Manage the Costs of an Assets Protection Program2006
blank
98780. Jaquith A. Security Metrics: Replacing Fear, Uncertainty, and Doubt2007
blank
98781. Jaquith A. Security Metrics: Replacing Fear, Uncertainty, and Doubt (Symantec Press Series)2007
blank
98782. Tsai J. Ma L. Security Modeling And Analysis of Mobile Agent Systems2006
blank
98783. Tsai J. Ma L. Security Modeling And Analysis of Mobile Agent Systems2006
blank
98784. Tsai J. Ma L. Security Modeling and Analysis of Mobile Agent Systems (Electrical and Computer Engineering)2006
blank
98785. Halleen G. Kellogg G. Security Monitoring with Cisco Security MARS2007
blank
98786. M. Obaidat N.Boudriga Security of e-Systems and Computer Networks2007
blank
98787. Hetland J. Gochitashvili T. Security of Natural Gas Supply through Transit Countries (NATO Science Series II: Mathematics, Physics and Chemistry)2004
blank
98788. Cabrera E. Vela A. Security of Water Supply Systems2006
blank
98789. Poweski B. Raphael D. Security on Rails2009
blank
98790. Poweski B. Raphael D. Security on Rails (The Pragmatic Programmers)2009
blank
98791. Schumacher M. Fernandez-Buglioni E. Hybertson D. Security Patterns Integrating Security and Systems Engineering2006
blank
98792. Maiwald E. Sieglein W. Security Planning and Disaster Recovery2002
blank
98793. Bryan B. Killion D. Lynn M. Security Power Tools2007
blank
98794. Rannenberg K. (ed.) Varadharajan V. (ed.) Weber C. (ed.) Security Privacy - Silver Linings in the Cloud2010
blank
98795. Christianson B. Crispo B. Malcolm J. Security Protocols2010
blank
98796. Christianson B.(ed.) Crispo B.(ed.) Malcolm J.A.(ed.) Security Protocols 10th International Workshop Cambridge, UK, April 17-19, 2002 Revised Papers (1 edition)2004
blank
98797. Christianson B.(ed.) Crispo B.(ed.) Malcom J.A.(ed.) Security Protocols 13th International Workshop Cambridge, UK, April 20-22, 2005 Revised Selected Papers2007
blank
98798. Bruce Christianson B.(ed.) Bruno Crispo B.(ed.) Malcolm J.A.(ed.) Security Protocols 7th International Workshop Cambridge, UK, April 19-21, 1999 Proceedings (1 edition)2000
blank
98799. Christianson B. Crispo B. Security Protocols: 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers2005
blank
98800. Lomas M. Security Protocols: International Workshop Cambridge, United Kingdom April 10-12, 1996 Proceedings1997
blank


blank
HR
@Mail.ru
© Электронная библиотека попечительского совета мехмата МГУ, 2004-2025
Электронная библиотека мехмата МГУ | Valid HTML 4.01!| Valid CSS! О проекте