Бази даних

Наукова електронна бібліотека - результати пошуку

Mozilla Firefox Для швидкої роботи та реалізації всіх функціональних можливостей пошукової системи використовуйте браузер
"Mozilla Firefox"

Вид пошуку
у знайденому
Сортувати знайдені документи за:
авторомназвоюроком видання
Формат представлення знайдених документів:
повнийстислий
 Знайдено в інших БД:Віртуальна довідка (98)Тематичний інтернет-навігатор (13)Автореферати дисертацій (3283)Реферативна база даних (21500)Книжкові видання та компакт-диски (5278)Журнали та продовжувані видання (170)
Пошуковий запит: (<.>K=ЗАХИСТ$<.>+<.>K=ФІГУРИ$<.>)
Загальна кількість знайдених документів : 315
Представлено документи з 1 до 20
...

   Тип видання:   методичний посібник   
1.


Abwehr englischer gangster-methoden "Silent killing" [Electronic resource]. - [S. l. : s. n.]. - 52 S.
Переклад назви: Захист від англійських гангстерських прийомів "Тихе вбивство"

Рубрики:

Географічні рубрики:

  Повний текст доступний у читальних залах НБУВ




Кл.слова:
німецька армія -- рукопашний бій

   Тип видання:   наукове видання   
2.

Alt, B. L.
Fleecing grandma and grandpa [Electronic resource] : protecting Against Scams, Cons, and Frauds / B. L. Alt, S. K. Wells. - Westport : Praeger Publishers, 2004. - 167 p.
Переклад назви: Оббираючи бабусь і дідусів: захист від шахрайства

Рубрики:

Географічні рубрики:

  Повний текст доступний у читальних залах НБУВ


Falling for a scam or con is humiliating for anyone, and can have terrible consequences. But for the elderly, being the victim of fraud can be disastrous, and they are the most common and vulnerable targets of everyday scams, cons, and frauds. From identity theft to gambling scams, from power of attorney issues to pyramid schemes, there is no dearth of creativity in the ways some criminals will relieve the elderly from their money and their homes. Here, Alt and Wells describe the most common scams, offer the stories of actual victims, and detail ways to protect yourself and your family from becoming easy targets. What makes the elderly such easy marks for con artists? How can they avoid the common traps? Knowing about them is one place to start, and this book helps readers to understand and identify the most common scams perpetrated against the elderly. Because such cons are so hard to prosecute, it is important to know the methods criminals employ to separate innocents from their hard-earned money. This lively, vivid account of one of the most insidious forms of crime will help families and individuals protect themselves and their loved ones from the machinations of those who view them as easy marks.



Кл.слова:
соціологія -- шахрайство

   Тип видання:   методичний посібник   
3.

Arata, M. J.
Identity theft for dummies [Electronic resource] / M. J. Arata. - Hoboken : Wiley Publishing, 2010. - 291 p.
Переклад назви: Крадіжки персональних даних для чайників

Рубрики:

  Повний текст доступний у читальних залах НБУВ


In this book, I tell you how to prevent identity theft and what to do if you’re a victim. If you’re wondering what sort of information is vulnerable and should be shredded, or how to reclaim your credit if you’ve been a victim, this is the one-stop reference for you. Today, the name of the game is making yourself a hard target, and armed with this book, you’ll do exactly that.



Кл.слова:
захист інформації -- безпека інформації -- відновлення даних

   Тип видання:   науково-популярне видання   
4.
 


Atsctoy, Alex.
Самоучитель хакера [Електронний ресурс] / Alex Atsctoy. - М. : Лучшие книги, 2005. - 192 с.

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Что нового привносит в общий поток хакерской литературы эта небольшая книга? А то, что в ней вся необъятная тема хакинга рассмотрена в единственном, но самом важном аспекте - практическом. В книге рассмотрены темы Хакинг, Зашита Windows 2000/XP, Проникновение в систему, Сокрытие следов, Хакинг fyay, pofc Web, Деструкция почтового клиента, хакинг lCQ, Хакинг Web-сайтов, атаки DOS Хакинг компьютеров Windows 2000/XP, Хакинг коммутируемого доступа.



Кл.слова:
захист інформації -- інформатика -- інформаційна безпека -- хакінг

   Тип видання:   наукове видання   
5.

Barken, L.
How secure is your wireless network? Safeguarding your wi-fi LAN [Electronic resource] / L. Barken. - Upper Saddle River : Prentice Hall PTR, 2003. - 224 p.

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Now you can have the awesome benefits of wireless LANs without falling victim to their notorious security flaws. Leading wireless security expert Lee Barken shows you practical workarounds and fixes for the vulnerabilities in today's WLANs, introduces high-security wireless protocols new to the marketplace, and offers step-by-step instructions for protecting all your wireless information, from the home to the enterprise.This is the definitive and easy-to-use WLAN security book you've been searching for-whether you're a network administrator,security specialist, manager, or home user.



Кл.слова:
бездротові локальні мережі -- захист інформації

   Тип видання:   наукове видання   
6.

Bastien, G.
CCSP Cisco Secure PIX® Firewall advanced exam certification guide [Electronic resource] / G. Bastien, E. Carter, C. Degu. - 2th. ed.. - Indianapolis : Cisco Press, 2004. - 816 p.

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Becoming a CCSP distinguishes you as part of an exclusive group of experts, ready to take on today's most challenging security tasks. Administration of the Cisco PIX Firewall is a difficult and complex task, critical for protecting a network. Whether you are seeking a PIX-focused certification or the full-fledged CCSP certification, learning what you need to know to pass the Cisco Secure PIX Firewall Advanced (CSPFA) exam will qualify you to keep your company's network safe while meeting business needs.



Кл.слова:
адміністрування мереж -- захист мережі

   Тип видання:   методичний посібник   
7.

Bejtlich, R.
The Tao of network security monitoring. Beyond intrusion detection [Electronic resource] / R. Bejtlich. - Boston : Addison Wesley, 2004. - 832 p.

Рубрики:

  Повний текст доступний у читальних залах НБУВ


The book you are about to read will arm you with the knowledge you need to defend your network from attackers—both the obvious and the not so obvious....If you are new to network security, don't put this book back on the shelf! This is a great book for beginners and I wish I had access to it many years ago. If you've learned the basics of TCP/IP protocols and run an open source or commercial IDS, you may be asking "What's next?" If so, this book is for you.



Кл.слова:
мережа -- захист

   Тип видання:   методичний посібник   
8.

Bishop, M.
Introduction to computer security [Electronic resource] / M. Bishop. - New Jersey : Prentice Hall PTR, 2004. - 784 p.

Рубрики:

  Повний текст доступний у читальних залах НБУВ


In this authoritative book, widely respected practitioner and teacher Matt Bishop presents a clear and useful introduction to the art and science of information security. Bishop`s insights and realistic examples will help any practitioner or student understand the crucial links between security theory and the day-to-day security challenges of IT environments. Bishop explains the fundamentals of security: the different types of widely used policies, the mechanisms that implement these policies, the principles underlying both policies and mechanisms, and how attackers can subvert these tools - as well as how to defend against attackers. A practicum demonstrates how to apply these ideas and mechanisms to a realistic company.



Кл.слова:
захист -- адміністрування системи

   Тип видання:   методичний посібник   
9.

Bott, E.
Microsoft Windows security inside out for Windows XP and Windows 2000 [Electronic resource] / E. Bott, C. Siechert. - Redmond : Microsoft Press, 2003. - 800 p.

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Hey, you know your way around a desktop -- so now dig into the Windows operating system and really put its security features to work! Covering Windows XP Professional, Windows XP Home Edition, and Windows 2000 Professional, this supremely organized reference packs hundreds of timesaving solutions, checklists, troubleshooting tips, and workarounds -- all in concise, fast-answers format. Learn the essential tools and techniques for tightening up security on your personal computer or network, including ways to fend off viruses, hackers, spam, denial-of-service attacks, and other threats. Discover how to button up your Virtual Private Networks (VPNs), remote access, and wireless networking services. And take ultimate control of security with advanced solutions such as file encryption, port blocking, Internet Protocol Security, group policies, and tamper-proofing the Registry.



Кл.слова:
безпека системи -- захист інформації

   Тип видання:   методичний посібник   
10.

Chapman, D. B.
Building Internet firewalls [Electronic resource] / D. B. Chapman, E. D. Zwicky. - Sebastopol : O'Reilly, 1995. - 517 p.
Переклад назви: Побудова інтернет-фаєрволів

Рубрики:

  Повний текст доступний у читальних залах НБУВ


More than a million systems are now connected to the Internet, and something like 15 million people in 100 countries on all seven continents use Internet services. More than 100 million email messages are exchanged each day, along with countless files, documents, and audio and video images. Everyone is jumping on the Internet bandwagon. Once a haven for academicians and scientists, the Net is now reaching large and small businesses, government at all levels, school children, and senior citizens. The commercial world is rushing headlong into doing business on the Internet, barely pausing while technologies and policies catch up with their desire to go online. But, too few of the seekers after Internet wisdom and riches consider whether their businesses will be safe on the Net. What kinds of security risks are posed by the Internet? Some risks have been around since the early days of networking -- password attacks (guessing them or cracking them via password dictionaries and cracking programs), denial of service, and exploiting known security holes. Some risks are newer and even more dangerous -- packet sniffers, IP (Internet Protocol) forgery, and various types of hijacking attacks. Firewalls are a very effective way to protect your system from these Internet security threats. Firewalls in computer networks keep damage on one part of the network (e.g., eavesdropping, a worm program, file damage) from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down. What is a firewall? It's a hardware and/or software solution that restricts access from your internal network to the Internet -- and vice versa. A firewall may also be used to separate two or more parts of your local network (for example, protecting finance from R&D). The firewall is installed at the perimeter of the network, ordinarily where it connects to the Internet. You can think of a firewall as a checkpoint; all traffic, incoming and outgoing, is stopped at this point. Because it is, the firewall can make sure that it is acceptable. "Acceptable" means that whatever is passing through -- email, file transfers, remote logins, NFS mounts, etc. -- conforms to the security policy of the site. Building Internet Firewalls is a practical guide to building firewalls on the Internet. If your site is connected to the Internet, or if you're considering getting connected, you need this book. It describes a variety of firewall approaches and architectures and discusses how you can build packet filtering and proxying solutions at your site. It also contains a full discussion of how to configure Internet services (e.g., FTP, SMTP, Telnet) to work with a firewall. The book also includes a complete list of resources, including the location of many publicly available firewall construction tools. The book is divided into four parts: Part I discusses Internet threats, the benefits of firewalls, overall security strategies, and a summary of Internet services and their security risks. Part II describes possible firewall designs and general terms and concepts, how to protect the bastion host in your firewall configuration, how to build proxying and packet filtering firewalls, and how to configure Internet services to operate with a firewall. Part III describes how to maintain a firewall, develop a security policy, and respond to a security incident. Part IV contains appendic



Кл.слова:
мережа -- захист

   Тип видання:   методичний посібник   
11.
 


Chevallier, Andrew.
Herbal remedies [Electronic resource] / A. Chevallier. - London : Dorling Kindersley, 2007. - 290 p. - (Eyewitness companions)
Переклад назви: Лікувальні трави

Рубрики:

  Повний текст доступний у читальних залах НБУВ


For anyone who wants to learn more about medicinal plants and how to use them at home, Herbal Remedies provides essential information on how to safely use herbal medicines and shows you how to create your own remedies to target common ailments.



Кл.слова:
трави -- захист -- лікування

   Тип видання:   наукове видання   
12.

Chuvakin, A.
Security Warrior [Electronic resource] / A. Chuvakin, C. Peikari. - Sebastobol : O'Reilly, 2004. - 552 p.
Переклад назви: Війна за безпеку

Рубрики:

  Повний текст доступний у читальних залах НБУВ


What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, Security Warrior reveals how your systems can be attacked. Covering everything from reverse engineering to SQL attacks, and including topics like social engineering, antiforensics, and common attacks against UNIX and Windows systems, this book teaches you to know your enemy and how to be prepared to do battle



Кл.слова:
захист -- інформація

   Тип видання:   методичний посібник   
13.

Cobb, С.
Cryptography For Dummies [Electronic resource] / С. Cobb. - Indianapolis : John Wiley & Sons, 2004. - 336 p.
Переклад назви: Криптографія для чайників

Рубрики:

  Повний текст доступний у читальних залах НБУВ


This guide to keeping your data safe offers the latest security techniques and advice on choosing and using cryptography products. It covers terminology, specific encryption technologies, pros and cons of different implementations, and more.



Кл.слова:
інформація -- захист

   Тип видання:   наукове видання   
14.

Deal, R. A.
Cisco ASA Configuration [Electronic resource] / R. A. Deal. - New York : McGRAW-HILL, 2009. - 753 p. - (Networking Professional's Library)
Переклад назви: Конфігурація Cisco ASA

Рубрики:
  

  Повний текст доступний у читальних залах НБУВ


The Cisco ASA product replaces Cisco PIX Firewalls, and Cisco expert Richard Deal updates his bestselling book, Cisco PIX Firewalls, to cover ASA. This book shows you how to configure and maintain a Cisco ASA appliance to control traffic in the corporate network and protect the network from internal and external threats and attacks. Cisco ASA Configuration covers the latest features available in versions 8.0 and 8.1, and includes detailed examples of complex configurations and troubleshooting. Implement and manage this powerful multifunction network adaptive security appliance with help from this expert guide.



Кл.слова:
продукт -- захист мережі -- пристрій

   Тип видання:   наукове видання   
15.

Dubrawsky, I.
CCSP Self-Study CCSP CSI [Electronic resource] : exam Certification Guide / I. Dubrawsky, P. Grey. - 2-е вид.. - Indianapolis : Cisco Press, 2004. - 528 p.
Переклад назви: CCSP самовчитель CCSP CSI: Керівництво сертифікаційного іспиту

Рубрики:

  Повний текст доступний у читальних залах НБУВ


The official self-study test preparation guide for the CCSP CSI exam 642-541 This study guide helps you master all the topics on the CCSP CSI exam, including Classifying and mitigating network attacks Securing designs for small, medium-sized, remote-user, and enterprise networks Understanding the SAFE network modules Using Host IPS and the Cisco Security Agent Identifying security threats Securing a wireless network Applying the SAFE Blueprint to networks utilizing IP telephony Implementing appropriate security products to prevent or counteract vulnerabilities Defining a security policy Using the Cisco Secure product portfolio, including perimeter security, IDS, secure connectivity, security management, and Cisco AVVID Understanding the SAFE architectural overview CCSP CSI Exam Certification Guide, Second Edition, is a best-of-breed Cisco exam study guide that focuses specifically on the objectives for the CSI exam. Inside, you'll find preparation hints and test-taking tips to help you identify areas of weakness and improve both your conceptual and hands-on knowledge of network security. CCSP CSI Exam Certification Guide, Second Edition, presents you with an organized test preparation routine through the use of proven series elements and techniques. "Do I Know This Already?" quizzes open each chapter and allow you to decide how much time you need to spend on each section. Foundation Summary lists and tables make referencing easy and give you a quick refresher whenever you need it. Challenging chapter-ending review questions reinforce key concepts. An entire chapter of scenarios helps you place the exam objectives in real-world situations, thus increasing recall during exam time. New in this edition is coverage of wireless networks, IP telephony, Host Intrusion Prevention System (IPS), and enterprise networks. The companion CD-ROM contains a powerful testing engine that allows you to focus on individual topic areas or take a complete, timed exam. The assessment engine tracks your performance and provides feedback on a module-by-module basis, presenting links to the text for further review and helping you devise a complete study plan. Well-regarded for its level of detail, assessment features, challenging review questions, and hands-on exercises, this book helps you master the concepts and techniques that will enable you to succeed on the exam the first time. CCSP CSI Exam Certification Guide, Second Edition, is part of a recommended study program from Cisco Systems that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining. Companion CD-ROM The CD-ROM contains more than 200 practice questions for the CCSP CSI exam, including simulation-based questions. CD-ROM test engine powered by www.boson.com. Boson Software is a Cisco Learning Partner.



Кл.слова:
програмне забезпечення -- база даних -- електронний ресурс -- сервер -- захист даних -- CCSP CSI exam

   Тип видання:   наукове видання   
16.

Eekelaar, J.
Family Law Advocacy [Electronic resource] : how Barristers help the Victims of Family Failure / J. Eekelaar, M. Maclean. - Portland : Hart Publishing, 2009. - 132 p.
Переклад назви: Захист сімейного права: як адвокати допомогають жертвам сімейних відмов

Рубрики:

Географічні рубрики:

  Повний текст доступний у читальних залах НБУВ


The role of the law in settling family disputes has been a matter of particular debate over the past 25 years. In keeping with the general public perception, the media has been largely critical about the role of lawyers in family law matters, sustaining a general lack of confidence in the legal profession, and a more specific feeling that, in family matters, lawyers aggravate conflict or even represent a female conspiracy. The climate in which family lawyers practice in England and Wales is a harsh one. The authors of this path-breaking study felt it was time to find out more about the contributions of barristers in family law cases in the UK. Much of the study is comprised of an in-depth examination of the day-to-day activity of members of the UK Family Law Bar through observation of individual barristers as they performed their role in the context of a court hearing. In answering questions, such as whether the family justice system is excessively adversarial, whether family barristers earn too much from human unhappiness, or indeed whether those working in the front line of child protection earn enough, the authors reach some surprising conclusions. "The barrister is both mentor and guide for the client" is how they begin their conclusion; "we hope that we have shown that society should value their contribution better" is how they finish.



Кл.слова:
сімейне право

   Тип видання:   енциклопедія   
Категорія: Соціологія   
17.


Encyclopedia of homelessness [Electronic resource] : in 2 vol. / ed. D. Levinson. - Thousand Oaks : Sage Publications, 2004. - 908 p.
Переклад назви: Енциклопедія безпритульності

Рубрики:

  Повний текст доступний у читальних залах НБУВ


There is nothing new about homelessness. There have been homeless people for some 10,000 years—from the time when humans built their first permanent homes in the first towns of the Fertile Crescent. The historical record, novels and poems, and sacred texts tell us the stories of beggars, wandering ascetics, penniless friars, displaced peasants, lost soldiers, street youths, vagrants, new arrivals in the city, and displaced workers. Homelessness has changed over the years. In the United States, during the late nineteenth century, it was hoboes and tramps who drew the attention of the public, the police, and then the social reformers of the Progressive Era. From the 1920s through the Great Depression, attention shifted to the skid rows, home to transient workers and retired single men. The decline of skid rows in the 1970s was followed by a new era of homelessness with many formerly institutionalized people—who had untreated or poorly treated emotional disorders—winding up on the streets of America. In the 1980s, the nature of homelessness changed again. Growing economic inequality, racism, a permanent decrease in the number of well-paid unskilled jobs, and a lack of affordable housing combined to make several million people—many of them African-American women and their children—homeless on America’s streets, in shelters, in motels, and in substandard and temporary apartments. This pattern continues in 2004. Homelessness is not just a U.S. problem, although when viewed cross-culturally, it becomes a more complex issue. In many developed nations, homeless families, many of them immigrants, are the major issue. In the developing nations of Asia, Africa, and Latin America, the homeless are often women and their children, youths, and migrants from rural areas who have come to cities looking for work and opportunity. The emergence of many cities in developing nations as major regional or global commercial centers has made the problem even worse, by increasing the appeal of cities as employment centers to the rural poor while at the same time providing less and less affordable housing and support services for immigrants. The goal of the Encyclopedia of Homelessness is to summarize our knowledge of homelessness. This includes describing the patterns of homelessness in the past, focusing on the recent and current situation in the United States, and sampling homelessness around the world. Entries cover causes; history; legal issues, advocacy, and policy; legislation and programs; lifestyle and health problems; organizations; research; services and service settings; size and perceptions; subpopulations and lifestyles; and world issues and perspectives. Descriptive articles cover homelessness today in eight major American cities and more than thirty cities and nations around the world. These entries allow for quick and easy comparisons.



Кл.слова:
безхатченко -- волоцюга -- вуличне життя -- соціальний захист

   Тип видання:   науково-популярне видання   
18.

Fairman, C. M.
Fuck [Electronic resource] : word taboo and protecting our First Amendment liberties / C. M. Fairman. - Naperville : Sphinx Publishing, 2009. - 250 p.
Переклад назви: Дідько: табуйоване слово і захист нашої свободи в Першій поправці

Рубрики:

Географічні рубрики:

  Повний текст доступний у читальних залах НБУВ


This entertaining read is about the word "fuck", the law, and the taboo. Whether you shout it out in the street or whisper it in the bedroom, deliberately plan a protest, or spontaneously blurt it out, if you say "fuck," someone wants to silence you, either with a dirty look across the room or by making a rule that you cannot say the word. When it's the government trying to cleanse your language, though, you should worry. Words are ideas. If the government controls the words we use, it can control what we think. To protect this liberty, we must first understand why the law's treatment of "fuck" puts that freedom at risk. This book examines the law surrounding the word and reveals both inconsistencies in its treatment and tension with other identifiable legal rights that the law simply doesn't answer. The power of taboo provides the framework to understand these uncertainties. It also explains why attempts to curtail the use of "fuck" through law are doomed to fail. Fundamentally, it persists because it is taboo; not in spite of it.



Кл.слова:
закон -- свобода слова -- обсценна лексика

   Тип видання:   наукове видання   
19.

Fields, N.
Rome's Saxon shore [Electronic resource] : coastal defences of Roman Britain AD 250-500 / N. Fields. - Oxford : Osprey Publishing, 2006. - 64 p.. - (Fortress)
Переклад назви: Саксонський берег Риму: прибережній захист римської Великобританії 250-500 н. е.

Рубрики:

Географічні рубрики:

  Повний текст доступний у читальних залах НБУВ


Although the exact dates of construction of the so-called Saxon Shore forts are uncertain, the development of the frontier system that ran form the Wash to the Solent on the south-east coast of Roman Britain was spread over at least a century and a half. Many of the new forts were notable for the superior strength of their defences, with thicker stone walls bristling with projecting curved bastions. These and other features were clearly designed to them more difficult to storm than old-style frontier forts with their classic playing-card shape and internal towers. Defense earlier in the Roman era had meant aggressive response in the open field or even offensive pre-emptive strikes into enemy territory. The new trend was to build stronger, the emphasis being on solid, more static defense, anticipating attack and absorbing it rather than going out to meet it. Most of the major harbours and estuaries of the east and south-east coasts of Britain were fortified in this manner. There was a similar series of military installations across the Channel in Gaul, extending along the northern coast as far as what is now Brittany. Whatever their precise tactical and strategic function, a continuing debate to which this book contributes, the construction of these stone forts represented a huge outlay of money, and commitment of manpower and materials. The Saxon Shore Forts are among the most impressive surviving monuments of Roman Britain. This book addresses a number ofthe fascinating questions they provoke - Who built these Forts? When and for what purposes? How were they built? How did they operate? Who garrisoned them, and for how long?



Кл.слова:
прикордонна система -- фортеця -- оборона

   Тип видання:   наукове видання   
Категорія: Соціологія   
20.

Goodin, R. E.
Protecting the vulnerable: a re-analysis of our social responsibilities [Electronic resource] / R. E. Goodin. - Chicago : The University of Chicago Press, 1985. - 235 p.
Переклад назви: Захист вразливих: повторний аналіз нашої соціальної відповідальності

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Our narrower obligations often blind us to larger social responsibilities. The moral claims arising out of special relationships—family, friends, colleagues, and so on—always seem to take priority. Strangers ordinarily get, and ordinarily are thought to deserve, only what is left over. Robert E. Goodin argues that this is morally mistaken. In Protecting the Vulnerable, he presents a comprehensive theory of responsibility based on the concept of vulnerability. Since the range of people vulnerable to our actions or choices extends beyond those to whom we have made specific commitments (promises, vows, contracts), we must recognize a much more extensive network of obligations and moral claims. State welfare services, for example, are morally on a par with the services we render to family and friends. The same principle widens our international, intergenerational, and interpersonal responsibilities as well as our duties toward animals and natural environments. This book, written with keen intelligence and unfailing common sense, opens up new perspectives on issues central to public policy and of critical concern to philosophers and social scientists as well as to politicians, lawyers and social workers.



Кл.слова:
соціальний захист
...
 

Всі права захищені © Національна бібліотека України імені В. І. Вернадського