Перейти к основному содержанию
Мемориальная библиотека А.П. Ершова
Toggle navigation
Издания
Журналы
Новые поступления
Вы здесь
Главная
защита
Связанные издания:
Separating the Specification and Implementation Phases in Cryptology
Separation and Information Hiding
Server-Process Restrictiveness in HOL
Service-Oriented Computing: Revised Selected Papers/ International Workshops, ICSOC/ServiceWave 2009, Stockholm, Sweden, November 2009
Shared Pseudo-Random Secret Generation Protocols
Small Computers and Security - An Oxymoron?
Smart Card Research and Advanced Application: Proc./9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 2010
Smart Card Research and Advanced Applications: Proc./7th IFIP WG 8.8/11.2 International Conference, Cardis 2006. Terragona, Spain, April 2006
Smart Card Research and Applications: Proc./Third Intern. Conf., CARDIS 98, Louvain-la-Neuve, Belgium, September 1998
Smart Spaces and Next Generation Wired/Wireless Networking: Proc./9th International Conference, NEW2AN 2009 and ruSMART 2009, St.Petersburg, Russia, September 2009
SOAP и вопросы безопасности
Software Metrics and Security Standard Conformance Testing
Software Metrics and the Conformance Testing of Data Security Standards
Software Piracy and Software Security in Business School: An Ethical Perspective
SpamPal: охотник за мясными консервами
Specification and Analysis of a Security Management System
Specification and Validation of a Security Policy Model
Standards and conformance testing in data security: Results of initial programme of investigation
Supporting Object-based High-assurance Write-up in Multilevel Databases for the Replicated Architecture
Surviving a Computer Disaster
Systemes d exploitation des ordinateurs: Principes de conception
Technical Approaches to Thwart Computer Fraud
Testability of data security standards
Test Suite Structure and Test Purposes for the Security Features of the X.435 Protocol
The Active Badge Location System
The aplication of quality assurance procedures to security evaluation
The DGSA: Unmet Information Security Challenges for Operating System Designers
The Domino Effect of Password Reuse
The Emperor s Old Clothes
The ESPRIT Project CAFE - High Security Digital Payment Systems
The MaStA I/O Cost Model and its Validation Strategy
The Representation of Data Security Standards in SDL
The Requirements for a Methodology to Test Secure Open Systems
The results of the New Approach consultation exercise
The Secure Conferencing User Agent: A Tool to Provide Secure Conferencing with MBONE Multimedia Conferencing Applications
The Semantic Web - ISWC 2009: Proc./8th International Conference, ISWC 2009, Chantilly, VA, USA, October 2009
The Sibling Intractable Function Family (SIFF): Notion, Construction and Applications
The Use of Formal Methods in Data Security Standards
The Yaksha Security System
Tightly Secure Transaction Scheduler in Multi-Level Secure Database Management Systems
TMN Security: An Evolutionary Approach
Touch Memory - новый электронный идентификатор
Towards Development of Secure Systems Using UMLsec
Towards Security in an Open Systems Federation
Towards Trustworthy Elections: New Directions in Electronic Voting
Transactions on Computational Science IV: Special Issue on Security in Computing
Transactions on Computational Science VII
Trends in Distributed Systems: Towards a Universal Service Market: Proc./Third Intern. IFIP/GI Working Conf., USM 2000, Munich, Cermany, September 2000
Trust and Trunsworthy Computing: Proc./Third International Conference, TRUST 2010, Berlin, Germany, June 2010
Trusted Products Evaluation
« первая
‹ предыдущая
…
3
4
5
6
7
8
9
10
11
…
следующая ›
последняя »