Искать
Отображаемые элементы 1-10 из 184
Film Translation: to Be or Not to Be
(Сибирский федеральный университет. Siberian Federal University., 2014-02)
. The problem of rendering substandard vocabulary and obscene words remains one
of the most acute problems of translation. This problem is considered by studying Eric Rochant’s
Mobius (2013, France) which is interesting not only because French actors speak...
» (Eric Rochant, 2013) 815 comments were left on the website http://www. allocine.fr/film/fichefilm-197303/critiques/ spectateurs/. 105 viewers commented on the cultural linguistic aspect of the film, 30 of them noted the international background...
» (Eric Rochant, 2013) 815 comments were left on the website http://www. allocine.fr/film/fichefilm-197303/critiques/ spectateurs/. 105 viewers commented on the cultural linguistic aspect of the film, 30 of them noted the international background...
A reference genome sequence for the European silver fir (Abies alba Mill.): a community-generated genomic resource
(2019-07)
, Christian Rellstab 4, 8
Eric Bazin 5, Sabine Brodbeck 4, Katalin Csilléry 4,6, Bruno Fady 7, Matthias Fladung 8, Barbara 9
Fussi 9, Dušan Gömöry 10, Santiago C. González-Martínez 11, Delphine Grivet 12, Marta Gut 2, 10
13, Ole Kim Hansen 14, Katrin Heer...
Б1.В.ОД.3 Методы оценки безопасности компьютерных систем
информационными рисками /
А. Астахов – М.: ДМК-Пресс, 2009.
Дополнительная литература:
1. Jones, A. Risk management for computer security / A. Jones, D.
Ashenden – Elsevier Butterworth-Heinemann, 2005. – 297 p.
2. Eric Johnson, M. Managing information...
security (part 2) / M. Eric Johnson – Springer, 2011. – 302 p. 3. Tipton, H.F. Information security management handbook / H.F. Tipton,M. Krause – 6 ed. - Auerbach Publications, 2007. - 3280 p. 7 Перечень ресурсов информационно...
security (part 2) / M. Eric Johnson – Springer, 2011. – 302 p. 3. Tipton, H.F. Information security management handbook / H.F. Tipton,M. Krause – 6 ed. - Auerbach Publications, 2007. - 3280 p. 7 Перечень ресурсов информационно...
Б1.В.ОД.3 Методы оценки безопасности компьютерных систем
-Heinemann, 2005. – 297 p.
2. Eric Johnson, M. Managing information security (part 2) / M. Eric
Johnson – Springer, 2011. – 302 p.
3. Tipton, H.F. Information security management handbook / H.F.
Tipton,M. Krause – 6 ed. - Auerbach Publications, 2007. - 3280 p...
Анализ экспертных мнений проекта «Столетнее исследование искусственного интеллекта (AI100) 2021 г.»
(Journal of Siberian Federal University. Сибирский федеральный университет, 2024-08)
technologies, developing today at Stanford University,
has been carried out. The initiator and one of the sponsors of the project is Eric Horwitz,
professor of computer science at Stanford. The AI100 project committee forms an expert
community that, once every...
Compact Radar System Safe Helicopter Landing
(Сибирский федеральный университет. Siberian Federal University, 2019-11)
ntenna.
main requ
ovide a cer
used as re
he E-plane
use the ir
rmulas θ2 0
y antennas
the ratio:
verse probl
tor
erical fron
of reflecto
o0 get a f
operating
ge width A
use a weak
rical wave
irements f
tain «inter
flectors MP...
antennas the ratio: verse probl tor erical fron of reflecto o0 get a f operating ge width A use a weak rical wave irements f tain «inter flectors MP is , and in radiator (F а Н , λ 665 = a Fig. 3. Mi according θ2 em, 2=зL 0 =D t MPA in t r...
antennas the ratio: verse probl tor erical fron of reflecto o0 get a f operating ge width A use a weak rical wave irements f tain «inter flectors MP is , and in radiator (F а Н , λ 665 = a Fig. 3. Mi according θ2 em, 2=зL 0 =D t MPA in t r...
HISTORY OF NANOTECHNOLOGY
(Сибирский федеральный университет, 2011)
manipulation as inevitable, “a development which I
think cannot be avoided.”
Eric Drexler, who began to develop these theories even before he’d heard of
Feynman’s lecture, first published his ideas in a 1981 journal article. Five years later, he
brought...
Б1.Б.19 Управление информационной безопасностью
– Elsevier Butterworth-Heinemann, 2005. – 297 p.
2. Eric Johnson, M. Managing information security (part 2) / M. Eric
Johnson – Springer, 2011. – 302 p.
3. Tipton, H.F. Information security management handbook / H.F.
Tipton,M. Krause – 6 ed. - Auerbach...
Б1.Б.19 Управление информационной безопасностью
.
Дополнительная литература:
1. Jones, A. Risk management for computer security / A. Jones, D.
Ashenden – Elsevier Butterworth-Heinemann, 2005. – 297 p.
2. Eric Johnson, M. Managing information security (part 2) / M. Eric
Johnson – Springer, 2011. – 302 p.
3...
Б1.Б.19 Управление информационной безопасностью
.
Дополнительная литература:
1. Jones, A. Risk management for computer security / A. Jones, D.
Ashenden – Elsevier Butterworth-Heinemann, 2005. – 297 p.
2. Eric Johnson, M. Managing information security (part 2) / M. Eric
Johnson – Springer, 2011. – 302 p.
3...