Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Xiaodong He. Automated intrusion prevention mechanism in enhancing network security. – М.: Scholars' Press, 2014. – 128 с.

Дополнительные результаты

  1. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с.
  2. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с.
  3. Stephen P. Bradley, Richard L. Nolan. Sense & Respond: Capturing Value in the Network Era. – М.: , 0. – 0 с.
  4. Jeffrey C. Shuman, Janice Twombly, David Rottenberg. Collaborative Communities: Partnering for Profit in the Networked Economy. – М.: , 0. – 0 с.
  5. Peter J. van Baalen, Lars T. Moratis. Management Education in the Network Economy: Its Context, Content, and Organization. – М.: Springer, 2001. – 200 с.
  6. Susan Echaore-McDavid. Career Opportunities in Law Enforcement, Security, and Protective Services (The Career Opportunities Series). – М.: , 0. – 0 с.
  7. Don Tapscott. Creating Value in the Network Economy. – М.: , 0. – 0 с.
  8. Frank J. Fabozzi. Investing in Asset-Backed Securities (Frank J. Fabozzi Series). – М.: , 0. – 0 с.
  9. Charles Cresson Wood. Best Practices In Internet Commerce Security. – М.: , 0. – 0 с.
  10. Intellectual Property Rights in a Networked World: : Theory and Practice. – М.: , 2004. – 0 с.
  11. Gary Strumeyer. Investing in Fixed Income Securities : Understanding the Bond Market (Wiley Finance). – М.: , 2005. – 0 с.
  12. Edward J. CPA, CAE McMillan. Preventing Fraud in Nonprofit Organizations. – М.: , 2006. – 240 с.
  13. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с.
  14. Susan Echaore-McDavid. Career Opportunities In Law Enforcement, Security And Protective Services (Career Opportunities). – М.: , 2005. – 272 с.
  15. Network Security. – М.: , 2008. – 370 с.
  16. Daniel Clark. Network Access Control 100 Success Secrets - 100 Most Asked NAC Questions on Implementation and Deployment of unify endpoint security technology, user ... and network security enforcement. – М.: , 2008. – 180 с.
  17. Molecular Mechanisms in Spermatogenesis (Advances in Experimental Medicine and Biology). – М.: , 2008. – 292 с.
  18. Emma Donaldson–Feilder. Preventing Stress in Organizations – How to Develop Positive Managers. – М.: , 2011. – 256 с.
  19. Emma Donaldson–Feilder. Preventing Stress in Organizations – How to Develop Positive Managers. – М.: , 2011. – 256 с.
  20. Debabrata (Debu) Chakrava. Regulatory Mechanisms in Transcriptional Signaling,87. – М.: , 2010. – 416 с.
  21. Rob Cameron. Juniper(r) Networks Secure Access SSL VPN Configuration Guide. – М.: , 2010. – 656 с.
  22. Owen Poole. Network Security. – М.: , 2010. – 224 с.
  23. Michael Rash. Intrusion Prevention and Active Response. – М.: , 2010. – 550 с.
  24. S. Ted Oyama. Mechanisms in Homogeneous and Heterogeneous Epoxidation Catalysis. – М.: , 2010. – 528 с.
  25. James Joshi. Network Security: Know It All. – М.: , 2010. – 368 с.
  26. Steve Manzuik. Network Security Assessment: From Vulnerability to Patch. – М.: , 2010. – 500 с.
  27. Jan L. Harrington. Network Security. – М.: , 2010. – 384 с.
  28. J. Grimshaw. Electrochemical Reactions and Mechanisms in Organic Chemistry. – М.: , 2010. – 416 с.
  29. D.G. Stavenga. Molecular Mechanisms in Visual Transduction,3. – М.: , 2010. – 596 с.
  30. Russ Rogers. Network Security Evaluation Using the NSA IEM. – М.: , 2010. – 450 с.
  31. D. Caillard. Thermally Activated Mechanisms in Crystal Plasticity,8. – М.: , 2010. – 452 с.
  32. D.C. Wunsch II. Advances in Neural Network Research: IJCNN 2003. – М.: , 2010. – 434 с.
  33. Brien Posey. GFI Network Security and PCI Compliance Power Tools. – М.: , 2010. – 488 с.
  34. F.Y. Cheng. Computational Mechanics in Structural Engineering. – М.: , 2010. – 0 с.
  35. Syngress. Managing Cisco Network Security 2E. – М.: , 2010. – 752 с.
  36. Audrey Miller. Writing Reaction Mechanisms in Organic Chemistry. – М.: , 2010. – 471 с.
  37. Author Unknown. TRANSDUCTION AND CELLULAR MECHANISM IN SENSORY RECEPTORS,74. – М.: , 2010. – 0 с.
  38. Henry K. Hebeler. Getting Started in A Financially Secure Retirement. – М.: , 2007. – 268 с.
  39. Lee Sproull. Connections – New Ways of Working in the Networked Organization (Paper). – М.: , 1992. – 228 с.
  40. Bill English. MCSA/MCSE: Windows® 2000 Network Security Administration Study Guide. – М.: , 2003. – 574 с.
  41. Russ Kaufman. MCSA/MCSE: Windows® Server 2003 Network Security Administration Study Guide. – М.: , 2004. – 560 с.
  42. Morse. Behavioural Mechanisms in Ecology (Paper). – М.: , 1990. – 391 с.
  43. Dh Morse. Behavioural Mechanisms in Ecology. – М.: , 1980. – 392 с.
  44. R L Reid. Back Home Again – Indiana in the Farm Security Administration Photographs 1935–1943. – М.: , 1987. – 158 с.
  45. Nitesh Dhanjani. Network Security Tools. – М.: , 2005. – 340 с.
  46. Disney. Traffic Processes in Queueing Networks. – М.: , 1987. – 0 с.
  47. Thomas W. Madron. Network Security in the 90?s. – М.: , 1992. – 304 с.
  48. Microsoft. MCSE Training Kit (Exam 70–220) – Designing Microsoft Windows 2000 Network Security. – М.: , 2001. – 864 с.
  49. Mehran Mesbahi. Graph Theoretic Methods in MultiAgent Networks. – М.: , 2010. – 413 с.
  50. Andrew Lockhart. Network Security Hacks. – М.: , 2004. – 316 с.
  51. VJ MECHANISMS. Mcgovern Pigment Cell: Mechanism In Pigmentation. – М.: , 1973. – 0 с.
  52. Lorna A Rhodes. Total Confinement – Madness and Reason in the Maximum Security Prison. – М.: , 2004. – 330 с.
  53. DAN. Network Security In A Mixed Environment. – М.: , 1998. – 456 с.
  54. W OSSWALD. Osswald Problems Of Adrenergic Mechanisms In ?blood Vessels? (paper Only). – М.: , 1984. – 50 с.
  55. AM NEURAL. Granda Neural Mechanisms In Animal Behavior. – М.: , 1973. – 0 с.
  56. Christine L Borgman. From Gutenberg to the Global Information Infrastructure – Access to Information in the Networked World. – М.: , 2003. – 344 с.
  57. H MUSAPH. Musaph Mechanisms In System Formation. – М.: , 1974. – 0 с.
  58. Matthew Strebe. Network Security JumpStartTM. – М.: , 2002. – 384 с.
  59. Gerald D Mahan. Quantum Mechanics in a Nutshell. – М.: , 2009. – 414 с.
  60. Hans Berger. Automating with STEP 7 in LAD and FBD. – М.: , 2008. – 440 с.
  61. Pawan K Bhardwaj. A+. Network+, Security+ Exams in a Nutshell. – М.: , 2007. – 812 с.
  62. Luca Peliti. Statistical Mechanics in a Nutshell. – М.: , 2011. – 0 с.
  63. Robert Gilmore. Elementary Quantum Mechanics in One Dimension. – М.: , 2004. – 256 с.
  64. Robert Gilmore. Elementary Quantum Mechanics in One Dimension. – М.: , 2004. – 256 с.
  65. Eric Cole. Network Security Bible. – М.: , 2005. – 694 с.
  66. Richard K. Betts. Enemies of Intelligence – Knowledge and Power in American National Security. – М.: , 2009. – 264 с.
  67. Richard K Betts. Enemies of Intelligence – Knowledge and Power in American National Security. – М.: , 2007. – 240 с.
  68. S MUFTIC. Muftic: ?security? Mechanisms For Computer Network S. – М.: , 1989. – 196 с.
  69. HZ ANAPHYLAX. Movat Cellular And Humoral Mechanisms In Anaphylax Is And Allergy. – М.: , 1971. – 0 с.
  70. Bender. East Europe in Search of Security. – М.: , 1972. – 0 с.
  71. Bender. East Europe in Search of Security. – М.: , 1972. – 0 с.
  72. Real. Behavioral Mechanisms in Evolutionary Ecology (Paper). – М.: , 1983. – 134 с.
  73. Eric Cole. Wiley Pathways Network Security Fundamentals Project Manual. – М.: , 2008. – 312 с.
  74. Andrew Lockhart. Network Security Hacks 2e. – М.: , 2006. – 352 с.
  75. Christine Borgman. From Gutenburg to the Global Information Infrastructure – Access to Information in the Networked World. – М.: , 2000. – 350 с.
  76. R L Reid. Back Home Again – Indiana in the Farm Security Administration Photographs 1935–1943 (Paper). – М.: , 1987. – 158 с.
  77. Chris Mcnab. Network Security Assessment 2e. – М.: , 2007. – 464 с.
  78. Cryptography & Network Security. – М.: , 2007. – 0 с.
  79. Wireless Network Security A Beginners Guide. – М.: , 2011. – 400 с.
  80. Network Security: The Complete Reference. – М.: , 2011. – 896 с.
  81. Fundamentals Of Network Security. – М.: , 2011. – 672 с.
  82. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . –  с.
  83. William Bratton, Zachary Tumin. Collaborate or Perish!: Reaching Across Boundaries in a Networked World. – М.: , 2012. – 352 с.
  84. Hakan Umit. Decision Making in Internet Networks. – М.: LAP Lambert Academic Publishing, 2010. – 160 с.
  85. Muhammad Yamin. Status of Farm Mechanization in Punjab, Pakistan. – М.: LAP Lambert Academic Publishing, 2012. – 100 с.
  86. Filipe Soares. Integration of Electric Vehicles in Distribution Networks. – М.: LAP Lambert Academic Publishing, 2012. – 288 с.
  87. Shaek Rana Mohammad Baki Billah and Mohammad Hafizur Rahman. Design & Development of Network Security System using IP Tables. – М.: LAP Lambert Academic Publishing, 2013. – 164 с.
  88. Anand Kannan. Evaluation of the Security Mechanisms in Cloud Networks. – М.: LAP Lambert Academic Publishing, 2013. – 192 с.
  89. Ratnmala Bhimanpallewar and Pravin Metkewar. Aggregation Query Processing in P2P Networks. – М.: LAP Lambert Academic Publishing, 2012. – 196 с.
  90. M. Ranga Swamy and M.S. Prasanthi. Congestion detection in WDM Networks. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  91. Malka N Halgamuge. Resource Allocation in Wireless Networks. – М.: LAP Lambert Academic Publishing, 2009. – 268 с.
  92. Reza Sirjani,Azah Mohamed and Hussain Shareef. Optimal Placement of Var Compensators in Transmission Networks. – М.: LAP Lambert Academic Publishing, 2013. – 128 с.
  93. Xiangqian Chen. DEFENSE AGAINST NODE COMPROMISE IN SENSOR NETWORK SECURITY. – М.: LAP Lambert Academic Publishing, 2009. – 108 с.
  94. XUNQI YU. Forward Error Correction (FEC) Coding in Video Network Transmission. – М.: LAP Lambert Academic Publishing, 2010. – 124 с.
  95. KS HUI. Use of Zeolite Materials in Enhancing Methane Combustion Performance. – М.: LAP Lambert Academic Publishing, 2011. – 160 с.
  96. Erick Flores and Tristan Jenkin. Integrating Environmental Costs in Logistics Network Management. – М.: LAP Lambert Academic Publishing, 2011. – 144 с.
  97. A. Chaturvedi. Link Prediction Analysis in Social Networks. – М.: LAP Lambert Academic Publishing, 2013. – 60 с.
  98. Goshu Wolde Tefera. Women’s Participation in Ensuring Food Security at household level. – М.: LAP Lambert Academic Publishing, 2014. – 100 с.
  99. Yasin Mohammed Ali. Traditional Conflict Resolution Mechanism in North East Ethiopia. – М.: LAP Lambert Academic Publishing, 2011. – 112 с.
  100. Regina Ogot and Francis Kerongo. Effects of Urban Agricuture in enhancing poverty reduction. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  101. Neetha M.S.,Vriti Vasudevan and Harish Nair. Influence of Movies in Enhancing Life skills. – М.: LAP Lambert Academic Publishing, 2012. – 168 с.
  102. Patrick Nsamba Oshabe. Effectiveness of Decentralization in Enhancing Community Participation. – М.: LAP Lambert Academic Publishing, 2013. – 108 с.
  103. Muhammad Naveed Qaisar. Pakistan''s Security Policy after 9/11. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  104. Elif Ekin Cayhan. ADR Mechanisms in European Union Maritime Law. – М.: LAP Lambert Academic Publishing, 2010. – 96 с.
  105. Darbaz Awla. Signaling And Adhesive Mechanisms In Acute Pancreatitis. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  106. Manpreet S. Khurmi and Priyanka Singh. HIV Prevention Programmes in Developing Countries. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  107. Bruno Astuto Arouche Nunes. Characterizing User Mobility In Wireless Networks. – М.: Scholars' Press, 2013. – 112 с.
  108. Juan Daniel Machin Mastromatteo. Exploring Users' Information Behavior in Social Networks. – М.: LAP Lambert Academic Publishing, 2011. – 136 с.
  109. Umar Rashid. Optimal Resource Allocation in Wireless Networks. – М.: Scholars' Press, 2014. – 164 с.
  110. Nidhi Sharma. A Novel Mechanism for Enhancing Security in Quantum Cryptography. – М.: LAP Lambert Academic Publishing, 2012. – 100 с.
  111. Xiaodong He. Automated intrusion prevention mechanism in enhancing network security. – М.: Scholars' Press, 2014. – 128 с.
  112. Ming-Chin Chuang. Authentication and Mobility Management Mechanisms in VANETs. – М.: Scholars' Press, 2014. – 96 с.
  113. Syed Zahidur Rashid. Computer Network Security Monitoring. – М.: Scholars' Press, 2015. – 284 с.
  114. Chinmay Chakraborty. PSTN-IP Telephony Gateway for Ensuring QoS in Heterogeneous Networks. – М.: LAP Lambert Academic Publishing, 2014. – 68 с.
  115. A. F. M. Shahen Shah,Md. Shariful Islam and Mohammad Shah Alam. Cooperative Communication In Wireless Networks. – М.: LAP Lambert Academic Publishing, 2013. – 80 с.
  116. Premalatha Natarajan. Mitigating congestion and collision in adhoc networks. – М.: LAP Lambert Academic Publishing, 2014. – 200 с.
  117. Ajoy Kumar Khan and Shounak Chakraborty. Wireless Sensor Network Routing Protocol and Disaster Mitigation Usage. – М.: LAP Lambert Academic Publishing, 2014. – 92 с.
  118. Nirbhay Chaubey. Securing AODV Routing Protocol in design of Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2015. – 132 с.
  119. Chakchai So-In. Resource Allocation and Management in Computer Networks. – М.: LAP Lambert Academic Publishing, 2011. – 212 с.
  120. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  121. Srikanthreddy Arimanda and Manojkumar Kolli. Performance Study Of Security Mechanismsm For Mobile Agent Domain. – М.: LAP Lambert Academic Publishing, 2011. – 84 с.
  122. Xiangfei Zhu. Bandwidth-sharing Mechanisms in Dynamic Circuit Networks. – М.: LAP Lambert Academic Publishing, 2012. – 132 с.
  123. Anshu Chaturvedi. Cross Layer Design in Adhoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 164 с.
  124. Yi Ren. Security Mechanisms in Unattended Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2013. – 164 с.
  125. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  126. Rob Juffermans. Diverse routing in SRLG networks. – М.: LAP Lambert Academic Publishing, 2013. – 64 с.
  127. Oussama Habachi,Yezekael Hayel and Rachid El-Azouzi. Optimization of Partially Observable Systems in Wireless Networks. – М.: LAP Lambert Academic Publishing, 2013. – 188 с.
  128. Vincent Omollo. Enhanced Network Security. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  129. Firkhan Ali Hamid Ali. Vulnerability Analysis on the Computer Network Security. – М.: LAP Lambert Academic Publishing, 2010. – 72 с.
  130. Sunil Kumar Senapati and Prof. Pabitra Mohan Khilar. SECURING FSR PROTOCOL AGAINST DATA PACKET DROPPING IN MANET. – М.: LAP Lambert Academic Publishing, 2010. – 64 с.
  131. Imran Sohail and Sikandar Hayat. Network Security and DDoS. – М.: LAP Lambert Academic Publishing, 2010. – 64 с.
  132. Christian Chetachi Umunna. Distributed Intrusion Detection System in Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 104 с.
  133. Saruchi Singla. Performance analysis of QoS Scheduling in WiMAX Network. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  134. Saeed Haddadi Makhsous. Semantic Web mechanisms in Cloud Environment. – М.: LAP Lambert Academic Publishing, 2014. – 72 с.
  135. Jagdish Chandra Patni and Mahendra Singh Aswal. An Approach for Deadlock Handling in Torus Network. – М.: LAP Lambert Academic Publishing, 2014. – 84 с.
  136. Muna Elsadig Mohamed Ahmed Elsheik. Bio Inspired Intrusion Prevention and Self healing System for Networks. – М.: LAP Lambert Academic Publishing, 2012. – 256 с.
  137. Benjamin Eze. Policy-based Data Sharing for Event-driven Services in B2B Networks. – М.: LAP Lambert Academic Publishing, 2011. – 148 с.
  138. Amos Omamo. The effectiveness of IDPS's in enhancing database security. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  139. Nathan Darmawan. Shielding Your Company with a Better Network Security Design. – М.: LAP Lambert Academic Publishing, 2010. – 180 с.
  140. David Lara Arango. Capacity mechanisms in electricity markets. – М.: LAP Lambert Academic Publishing, 2014. – 72 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Наука человековедения. интервью с Д. Уолтоном, профессором London Metropolitan University, экспертом CIPD. Chartered Institute of Personnel and Development, автором программы Master of Arts in Human Resource Strategies. И. Смирнова, "Кадровый менеджмент", № 5, июль-август 2007.
  2. Trade-in как способ обмена автомобиля. С.Н. Гордеева, "Торговля: бухгалтерский учет и налогообложение", N 2, февраль 2011 г.
  3. Проблемы применения универсальной юрисдикции in absentia. Г.А. Королев, "Журнал российского права", № 10, октябрь 2009.
  4. Тонкости trade-in. С.А.Королев, "НДС. Проблемы и решения", № 8, август 2009.
  5. Основной арсенал "охотника" - его network: кого он знает на рынке и качество этих отношений. С. Плетнева, "Управление персоналом", № 12, июнь 2009.
  6. In-store banking - новая модель банковского бизнеса. А. Пятков, "Банковское обозрение", № 11, ноябрь 2008.

Образцы работ

Тема и предметТип и объем работы
Последствия операции НАТО
Политология
Диплом
80 стр.
Правовое регулирование и проблемы гражданско-правовой ответственности в современном гражданском праве
Гражданское право
Диплом
59 стр.
Понятие и история брендинга. Анализ создания и стратегия продвижения бренда ***
Электроснабжение городов и промышленных предприятий
Другое
72 стр.
Продвижение брендов в шоу-бизнесе
Электроснабжение городов и промышленных предприятий
Диплом
79 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Тарас
Спасибо за оперативность!