Перейти к основному содержанию
Мемориальная библиотека А.П. Ершова
Toggle navigation
Издания
Журналы
Новые поступления
Вы здесь
Главная
защита
Связанные издания:
Methods to Securely Realize Caller-Authenticated and Callee-Specified Telephone Calls
Microsoft SQL Server: контрольная по безопасности
Microsoft Windows NT 4.0 Security, Audit, and Control
MiSFIT: Constructing Safe Extensible Systems
Mobile Agent Security Based on Payment
Modeling Multilevel Entities Using Single Level Objects
M S: A Machine for Multilevel Security
MS-DOS 6.2: DoubleGuard для DoubleSpace
Network Security in a Heterogeneous Environment
Networks Security Under Siege: The Timing Attack
Neural Information Processing, Part II: Proc./16th International Conference, ICONIP 2009, Bangkok, Thailand, December 2009
Neural Information Processing, Part I: Proc./16th International Conference, ICONIP 2009, Bangkok, Thailand, December 2009
New Phase 1 Exchange Mode for IKE Framework
Non-interference through Determinism
Object-oriented software for auditing information systems security
Off-Line Electronic Cash Based on Secret-Key Certificates
Omnia mea mecum porto - все свое ношу с собой
On the Chinese Wall Model
On the Design and Administration of Secure Database Transactions
On the Meaning of Safety and Security
On the Security of Three-Party Criptographic Protocols
On Transaction Processing for Multilevel Secure Replicated Databases
Outlook 2002 из Office XP: что нового?
Overload Behaviour and Protection of Event-Driven Web Services
Ownership Types for Flexible Alias Protection
Passive and Active Network Measurement: Proc./10th International Conference, PAM 2009. Seoul, Korea, April 2009
Perfectly Secure Message Transmission
Performance Evaluation of a Distributed Scheme for Protection against Single and Double Faults for MPLS
Personalization and Privacy
Pervasive Computing: Proc./7th International Conference, Pervasive 2009, Nara, Japan, May 2009
PGP на страже электронной корреспонденции
Policy Enforcement in Stub Autonomous Domains
Polyinstantiation for Cover Stories
Practical Aspects of Declarative Languages: Proc./12th International Symposium, PADL 2010, Madrid, Spain, January 2010
Principles of Practice in Multi-Agent Systems: Proc./12th International Conference, PRIMA 2009, Nagoya, Japan, December 2009
Privacy in e-Commerce: Stated Preferences vs. Actual Behavior
Privacy Interfaces for Information Management
Privilege Graph: An Extension to the Typed Access Matrix Model
Programming Languages and Systems: Proc./14th European Symposium on Programming, ESOP 2005, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2005. Edinburgh, UK, April 2005
Prophylaxis for "virus" propagation and general computer security policy
Proposal of an Automatic Signature Scheme using a Compiler
Proposed Security Mechanisms in the "New" Internet
Protected Kernels and Ada 9X Real-Time Facilities
Protected Records in Ada 9X
Protecting Digital Media Content
Protecting Intellectual Proprietary Rights through Secure Interactive Contract Negotiation
Protecting Telecommunications Privacy in Japan
Protection of Information in the IT Era
Protection Traps and Alternatives for Memory Management of an Object-Oriented Language
Protect Yourself Online
« первая
‹ предыдущая
1
2
3
4
5
6
7
8
9
…
следующая ›
последняя »