Перейти к основному содержанию
Мемориальная библиотека А.П. Ершова
Toggle navigation
Издания
Журналы
Новые поступления
Вы здесь
Главная
защита
Связанные издания:
Data Management in Grid and Peer-to-Peer Systems: Proc./2nd International Conference, Globe 2009, Linz, Austria, September 2009
Data Security for Distributed Meeting Systems
Dealing with Security Requirements During the Development of Information Systems
Declarative Foundations of Secure Deductive Databases
Decomposition of Multilevel Objects in an Object-Oriented Database
Defense Applications of Multi-Agent Systems: Revised and Invited Papers: International Workshop, DAMAS 2005. Utrecht, The Netherlands, July 2005
Denial of Service: An Example
Detection of Intrusions and Malware & Vulnerability Assessment: Proc./Third International Conference, DIMVA 2006. Berlin, Germany, July 2006
Detection of Intrusions and Malware, and Vulnerability Assessmant: Proc./12th International Conference, DIMVA 2015, Milan, Italy, July 2015
Detection of Intrusions and Malware, and Vulnerability Assessment: Proc./13th International Conference, DIMVA 2016, San Sebastian, Spain, July 2016
Detection of Intrusions and Malware, and Vulnerability Assessment: Proc./6th International Conference, DIMVA 2009. Como, Italy, July 2009
Development of Secure Medical Database Systems
Digital-Forensics and Watermarking: Revised Selected Papers/13th International Workshop, IWDW 2014, Taipei, Taiwan, October 2014
Digital Heritage: Progress in Cultural Heritage: Documentation, Preservation, and Protection, Part I: Proc./6th International Conference, EuroMed 2016, Nicosia, Cyprus, October 2016
Digital Rights Management: Technologies, Issues, Challenges and Systems: Revised Selected Papers/First International Conference, DRMTICS 2005. Sydney, Australia, October/November 2005
Digital Watermarking: Proc./8th International Workshop, IWDW 2009, Guildford, UK, August 2009
Digital Watermarking: Proc./First Intern. Workshop, IWDW 2002, Seoul, Korea, November 2002
Digital Watermarking: Revised Selected Papers/Third International Workshop, IWDW 2004. Seoul, South Korea, October/November 2004
Distributed Computing and Networking: Proc./11th International Conference, ICDCN 2010, Kolkata, India, January 2010
Distributed File System over a Multilevel Secure Architecture Problems and Solutions
Distributed Timestamp Generation in Planar Lattice Networks
Electronic Participation: Proc./First International Conference, ePart 2009, Linz, Austria, September 2009
Emerging Network Security Standards in an OSI Environment
ESPRIT BRA 3104: Provably Correct Systems ProCos Interim Deliverable
Euro-Par 2008 Workshops - Parallel Processing: Revised Selected Papers/ VHPC 2008, UNICODE 2008, HPPC 2008, SGS 2008, PROPER 2008, ROIA 2008, and DPA 2008, Las Palmas de Gran Canada, Spain, August 2008
Evoluting of Messaging Standards
Experiences Using Lightweight Formal Methods for Requirements Modeling
Experimental Algorithms: Proc./9th International Symposium, SEA 2010, Ischia Islend, Naples, Italy, May 2010
Fast Software Encryption: Proc./Cambridge Security Workshop. Cambridge, U.K., December 9-11, 1993
Fields of Logic and Computation: Essays Dedicated to Yuri Gurevich on the Occasion of His 70th Birthday
Fighting Spam with Reputation Systems
Fine Grained Object Protection in UNIX
Firewalls for Sale
Formal Aspects in Security and Trust: Revised Selected Papers/5th International Workshop, FAST 2008, Malaga, Spain, October 2008
Formal Description Techniques and Security Standard Conformance Testing
Formal Description Techniques in Data Security: An Evaluation and Comparison
Formal Methods: Foundations and Applicationas: Revised Selected Papers/12th Brazilian Symposium, SBMF 2009, Gramado Brazil, August 2009
Formal Methods in IT Security Standards - Scope for Usage
Formal methods, structured techniques, and security - A unified methodology
Formal Techniques for Systems Specification and Verification
Free Agents
Freshness Assurance of Authentication Protocols
Futere Generation Information Technology: Proc./1st International Conference, FGIT 2009, Jedu Island, Korea, December 2009
GDoM a Multilevel Document Manager
Grid Resource Management: On-demand Provisioning Advance Reservation, and Capacity Planning of Grid Resources
Handling Algebraic Properties in Automatic Analysis of Security Protocols
Honeynet Project: ловушка для хакеров
How to Break Fraud-Detectable Key Recovery
How to Securely Replicate Services
Human Interactive Proofs: Proc./Second International Workshop, HIP 2005. Bethlehem, PA, USA, May 2005
« первая
‹ предыдущая
1
2
3
4
5
6
7
8
9
…
следующая ›
последняя »