2 402 202 книги
Поиск книг
Жанры
Книги
Категории и жанры
Лучшие книги
Библиотека
Помощь
Мобильная версия
Контакты
Как помочь?
libcats.org
Самая большая
электронная библиотека
рунета. Поиск книг и журналов
↓
Только точные совпадения
#1
Securing Intellectual Property: Protecting Trade Secrets and Other Information Assets (Information Security)
Information Security
1.85 Mb
#2
The Dynamics of Disability: Measuring and Monitoring Disability for Social Security Programs
Committee to Review the Social Security Administration's Disability Decision Process Research
,
National Research Council
Категория:
Общественные науки прочие
6.67 Mb
#3
Second review of a new data management system for the Social Security Administration a report to the Social Security Administration, Department of Health, Education and Welfare
by the Panel on Social Security Administration Data Management System
,
Board on Telecommunications--Computer Applications
,
Assembly of Engineering
,
National Research Council.
Категория:
Образование
537 Kb
#4
The 2000-2005 World Outlook for Security and Commodity Brokers, Dealers (Strategic Planning Series)
Research Group
,
The Security
,
Dealers Research Group Commodity Brokers
Категория:
История
9.78 Mb
#5
Balancing Scientific Openness and National Security Controls at the Nuclear Weapons Laboratories
Committee on Balancing Scientific Openness and National Security
,
National Academy of Sciences
,
National Academy of Engineering
,
Institute of Medicine
Категория:
Техника
,
Военная техника
,
Оружие
177 Kb
#6
Growing Vulnerability of the Public Switched Networks: Implications for National Security Emergency Preparedness
the Committee on Review of Switching
,
Synchronization and Network Control in National Security Telecommunications
,
Board on Telecommunications and Computer Applications
,
Commission on Engineering and Technical Systems
,
National Research Council.
Категория:
Компьютеры
,
Сети
545 Kb
#7
Setting the 21st Century Security Agenda: Proceedings of the 5th International Security Forum (Studies in Contemporary History and Security Policy)
Switzerland) International Security Forum 2002 Zurich
Категория:
История
593 Kb
#8
Balancing Scientific Openness and National Security Controls at the Nuclear Weapons Laboratories
Committee on Balancing Scientific Openness and National Security
,
National Academy of Sciences
,
National Academy of Engineering
,
Institute of Medicine
Категория:
Техника
,
Военная техника
,
Оружие
177 Kb
#9
Assessment of technologies deployed to improve aviation security.
Panel on Assessment of Technologies Deployed to Improve Aviation Security
,
National Materials Advisory Board
,
Commission on Engineering and Technical Systems
,
National Research Council.
695 Kb
#10
Future of the Nuclear Security Environment in 2015: Proceedings of a Russian-U.S. Workshop
Joint Committees on the Future of the Nuclear Security Environment in 2015
,
Russian Academy of Sciences
,
National Research Council
1.20 Mb
#11
English-Chinese, Chinese-English Nuclear Security Glossary
Committee on the U.S.-Chinese Glossary of Nuclear Security Terms
,
National Research Council
1.96 Mb
#12
Canadian Securities Course Volume 1
Canadian Securities Institute
1.80 Mb
#13
The Standard of Good Practice for Information Security
Information Security Forum (ISF)
3.22 Mb
#14
Beyond 'Fortress America': National Security Controls on Science and Technology in a Globalized World
Security
,
and Prosperity Committee on Science
,
Committee on Scientific Communication and National Security
,
National Research Council
1.03 Mb
#15
Assessment of the Bureau of Reclamation's Security Program
Committee to Assess the Bureau of Reclamation's Security Program
,
National Research Council
2.02 Mb
#16
HIV and Disability: Updating the Social Security Listings
Committee on Social Security HIV Disability Criteria
,
Board on the Health of Select Populations
,
Institute of Medicine
1.23 Mb
#17
The Standard of Good Practice for Information Security
ISF Information Security Forum
6.21 Mb
#18
Himalayan Glaciers: Climate Change, Water Resources, and Water Security
Hydrology
,
Climate Change
,
and Implications for Water Security Committee on Himalayan Glaciers
,
Board on Atmospheric Studies and Climate
,
Division on Earth and Life Studies
,
National Research Council
22.46 Mb
#19
Solaris 10 Security Essentials
Sun Microsystems Security Engineers
1.68 Mb
#20
Homeland Security Act of 2002
Committee on Homeland Security
,
U.S. House of Representatives
Категория:
fiction
829 Kb
#21
Microsoft Windows Security Resource Kit
Ben Smith
,
Corporation Microsoft Corporation
,
Brian Komar
,
Elliot Lewis
,
Members of the Microsoft Security Team
1.57 Mb
#22
Safety and Security of Commercial Spent Nuclear Fuel Storage: Public Report
Committee on the Safety and Security of Commercial Spent Nuclear Fuel Storage
,
National Research Council
9.01 Mb
#23
Social Security Administration Electronic Service Provision: A Strategic Assessment
Committee on the Social Security Administration's E-Government Strategy and Planning for the Future
,
National Research Council
,
Leon J. Osterweil
,
Lynette I. Millett
,
Joan D. Winston
1.25 Mb
#24
Information Assurance: Managing Organizational IT Security Risks
Joseph Boyce Employee of the Department of Defense
,
Daniel Jennings Information Systems Security Manager European Command (EUCOM)
1.03 Mb
#25
Biometrics for Network Security
Paul Reid
Категория:
Computer Science
,
Computer Security
,
Biometrics
1.11 Mb
#26
Biometrics, Computer Security Systems and Artificial Intelligence Applications
Khalid Saeed
,
Khalid Saeed;Jerzy Pejas;Romuald Mosdorf
Категория:
Computer Science
,
Computer Security
,
Biometrics
16.20 Mb
#27
High-rise security and fire life safety
Geoff Craighead
Категория:
'Skyscrapers -- Security measures.'
,
'Skyscrapers -- Fires and fire prevention.'
9.54 Mb
#28
Role Engineering for Enterprise Security Management (Information Security and Privacy)
Edward J. Coyne
,
John M. Davis
Категория:
Computer science
,
Computer Security
2.74 Mb
#29
Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
Joel Scambray
Категория:
Computer science
,
Computer Security
9.06 Mb
#30
Physical Security for IT
Michael Erbschloe
Категория:
Computer science
,
Computer Security
1.03 Mb
#31
Open Source Security Tools: Practical Guide to Security Applications, A
Tony Howlett
Категория:
Computer science
,
Computer Security
11.64 Mb
#32
Data Hiding Fundamentals and Applications: Content Security in Digital Multimedia
Husrev T. Sencar
,
Mahalingam Ramkumar
,
Ali N. Akansu
Категория:
Computer science
,
Computer Security
3.18 Mb
#33
Trust and Security in Collaborative Computing (Computer and Network Security)
Xukai Zou
,
Yuan-shun Dai
,
Yi Pan
Категория:
Computer science
,
Computer Security
2.41 Mb
#34
VizSEC 2007: Proceedings of the Workshop on Visualization for Computer Security (Mathematics and Visualization)
John R. Goodall
,
Gregory Conti
,
Kwan-Liu Ma
Категория:
Computer science
,
Computer Security
6.34 Mb
#35
Security for Mobile Networks and Platforms (Artech House Universal Personal Communications)
Selim Aissi
,
Nora Dabbous
,
Anand R. Prasad
Категория:
Computer science
,
Computer Security
1.84 Mb
#36
Access Control Systems: Security, Identity Management and Trust Models
Messaoud Benantar
Категория:
Computer science
,
Computer Security
13.33 Mb
#37
Security of Mobile Communications
Noureddine Boudriga
Категория:
Computer science
,
Computer Security
5.34 Mb
#38
How to Cheat at Configuring Open Source Security Tools
Michael Gregg
,
Eric Seagren
,
Angela Orebaugh
,
Matt Jonkman
,
Raffael Marty
Категория:
Computer science
,
Computer Security
7.64 Mb
#39
Defending the Digital Frontier: A Security Agenda
Ernst & Young LLP
,
Mark W. Doll
,
Sajai Rai
,
Jose Granado
Категория:
Computer science
,
Computer Security
3.03 Mb
#40
Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting
John Hoopes
Категория:
Computer science
,
Computer Security
7.93 Mb
#41
How to Develop and Implement a Security Master Plan
Timothy Giles
Категория:
Computer science
,
Computer Security
3.00 Mb
#42
Information Processing and Security Systems
Khalid Saeed
,
Jerzy Pejas
Категория:
Computer science
,
Computer Security
22.38 Mb
#43
Smart Cards, Tokens, Security and Applications
Keith Mayes
,
Konstantinos Markantonakis
Категория:
Computer science
,
Computer Security
8.50 Mb
#44
Applied Security Visualization
Raffael Marty
Категория:
Computer science
,
Computer Security
21.10 Mb
#45
Securing HP NonStop Servers in an Open Systems World: TCP/IP, OSS and SQL
XYPRO Technology Corp
Категория:
Computer science
,
Computer Security
5.43 Mb
#46
Malware Detection (Advances in Information Security)
Mihai Christodorescu
,
Somesh Jha
,
Douglas Maughan
,
Dawn Song
,
Cliff Wang
Категория:
Computer science
,
Computer Security
16.27 Mb
#47
Security Software Development: Assessing and Managing Security Risks
Douglas A. Ashbaugh CISSP
Категория:
Computer science
,
Computer Security
2.72 Mb
#48
Intrusion Detection Systems (Advances in Information Security)
Roberto Pietro
,
Luigi V. Mancini
Категория:
Computer science
,
Computer Security
3.07 Mb
#49
Security on Rails (The Pragmatic Programmers)
Ben Poweski
,
David Raphael
Категория:
Computer science
,
Computer Security
8.41 Mb
#50
Identifying Malicious Code Through Reverse Engineering (Advances in Information Security)
Abhishek Singh
Категория:
Computer science
,
Computer Security
6.23 Mb
#51
Auditing and Security: AS/400, NT, UNIX, Networks, and Disaster Recovery Plans
Yusufali F. Musaji
Категория:
Computer science
,
Computer Security
13.48 Mb
#52
Securing Biometrics Applications
Charles A. Shoniregun
,
Stephen Crosier
Категория:
Computer Science
,
Computer Security
,
Biometrics
9.90 Mb
#53
Firewalls and Internet Security: Repelling the Wily Hacker
William R. Cheswick
,
Steven M. Bellovin
,
Aviel D. Rubin
Категория:
Computers
,
Internet
,
Security
3.08 Mb
#54
International Security: Politics, Policy, Prospects
Michael E. Smith
Категория:
international security
,
political science
,
international relations
35.06 Mb
#55
Perils of Anarchy: Contemporary Realism and International Security
Brown
,
Michael E.; Lynn-Jones
,
Sean M.; Miller
,
Steven E.
Категория:
International Relations; International Security
2.87 Mb
#56
HUMAN SECURITY IN ISLAM
Zarina Othman
Категория:
HUMAN SECURITY IN ISLAM
,
Human
,
Islam
,
Muslims
,
Muslim
,
http:
481 Kb
#57
Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices
Jeremy Wittkop
Категория:
Security
9.51 Mb
#58
secure
chtorr5_files
537 b
#59
Lectures on data security: Modern cryptology in theory and practice
Ivan Damgard
Категория:
Computer science
,
Cryptography
2.95 Mb
#60
3D imaging for safety and security
Andreas Koschan
,
Marc Pollefeys
,
Mongi Abidi
Категория:
Computer science
,
Image processing
12.66 Mb
#61
Security markets: stochastic models
Darrell Duffie
Категория:
Mathematics
,
Probability
,
Stochastics in finance
3.48 Mb
#62
Options, futures, and other derivative securities
John Hull
Категория:
Mathematics
,
Probability
,
Stochastics in finance
6.49 Mb
#63
Fixed-income securities
Lionel Martellini
,
Philippe Priaulet
,
Stéphane Priaulet
Категория:
Mathematics
,
Probability
,
Stochastics in finance
5.17 Mb
#64
Mathematics of the Securities Industry
William Rini
Категория:
Mathematics
,
Probability
,
Stochastics in finance
829 Kb
#65
Securing Your Business with Cisco ASA and PIX Firewalls
Greg Abelar
4.75 Mb
#66
Handbook of Wireless Local Area Networks: Applications, Technology, Security, and Standards
Mohammad Ilyas
,
Syed A. Ahson
12.64 Mb
#67
Managing information security risks: the OCTAVE approach
Christopher Alberts
,
Audrey Dorofee
4.11 Mb
#68
php|architect's Guide to PHP Security
Ilia Alshanetsky
,
Rasmus Lerdorf
1.25 Mb
#69
Check Point Next Generation Security Administration
Syngress
8.27 Mb
#70
Maximum Security
Anonymous
2.92 Mb
#71
Current Security Management & Ethical Issues of Information Technology
Rasool Azari
2.65 Mb
#72
How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN
Lee Barken
3.13 Mb
#73
Linux Security Cookbook
Daniel J. Barrett
,
Richard E. Silverman
,
Robert G. Byrnes
657 Kb
#74
CCSP Cisco secure PIX® firewall advanced exam certification guide
Greg Bastien
,
Christian Degu
,
Earl Carter
11.47 Mb
#75
CCSP SECUR Exam Certification Guide (CCSP Self-Study, 642-501)
Greg Bastien
,
Christian Degu
8.74 Mb
#76
Building Secure Servers With Linux
Michael D. Bauer
1.16 Mb
#77
Linux Server Security
Michael Bauer D.
2.07 Mb
#78
Cisco Security Professional's Guide to Secure Intrusion Detection Systems
Baumrucker C.T.
,
Burton J.D.
,
Dentler S.
13.11 Mb
#79
MPLS VPN Security
Michael H. Behringer
,
Monique J. Morrow
5.29 Mb
#80
The Tao of network security monitoring beyond intrusion detection
Richard Bejtlich
15.47 Mb
#81
Introduction to computer security
Matt Bishop
2.77 Mb
#82
.NET Security
Pete Stromquist
,
Tom Fischer
,
Nathan Smith
,
Jason Bock
5.87 Mb
#83
Computer security handbook
Seymour Bosworth
,
Michel E. Kabay
10.54 Mb
#84
Microsoft Windows Security Inside Out for Windows XP and Windows 2000
Ed Bott
,
Carl Siechert
19.27 Mb
#85
MCSE Self-Paced Training Kit (Exam 70-298): Designing Security for a Microsoft Windows Server 2003 Network
Roberta Bragg
9.14 Mb
#86
Windows Server 2003 Security: A Technical Reference
Roberta Bragg
26.76 Mb
#87
Active Defense - A Comprehensive Guide to Network Security
Chris Brenton
,
Cameron Hunt
6.35 Mb
#88
Security Controls for Sarbanes-Oxley Section 404 IT Compliance: Authorization, Authentication, and Access
Dennis C. Brewer
5.30 Mb
#89
The .NET developer's guide to Windows security
Keith Brown
3.20 Mb
#90
Hacking the Code: ASP.NET Web Application Security
Mark Burnett
4.82 Mb
#91
Privacy Protection and Computer Forensics(Artech House Computer Security Series)
Michael A. Caloyannides
4.03 Mb
#92
Fundamentals of network security
John E. Canavan
4.64 Mb
#93
Cisco Access Control Security: AAA Administrative Services
Brandon James Carroll
15.54 Mb
#94
Cisco Secure Intrusion Detection System
Earl Carter
37.84 Mb
#95
CYA Securing IIS 6.0
Cheah Ch.H.
,
Schaefer K.
8.94 Mb
#96
Firewalls and Internet Security: Repelling the Wily Hacker
William R. Cheswick
,
Steven M. Bellovin
,
Aviel D. Rubin
57.27 Mb
#97
Network Security Tools
Nitesh Dhanjani
,
Justin Clarke
1.29 Mb
#98
Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures
Brian Contos
,
Dave Kleiman
6.30 Mb
#99
Network Security Architectures
Sean Convery
4.89 Mb
#100
Oracle Advanced Security Administrator's Guide
Cowan M.
3.31 Mb
Показаны далеко не все результаты, удовлетворяющие вашему запросу. Чтобы увидеть другие результаты, пожалуйста, уточните запрос.