Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Xiaodong He. Automated intrusion prevention mechanism in enhancing network security. – М.: Scholars' Press, 2014. – 128 с. Дополнительные результаты William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с. Stephen P. Bradley, Richard L. Nolan. Sense & Respond: Capturing Value in the Network Era. – М.: , 0. – 0 с. Jeffrey C. Shuman, Janice Twombly, David Rottenberg. Collaborative Communities: Partnering for Profit in the Networked Economy. – М.: , 0. – 0 с. Peter J. van Baalen, Lars T. Moratis. Management Education in the Network Economy: Its Context, Content, and Organization. – М.: Springer, 2001. – 200 с. Susan Echaore-McDavid. Career Opportunities in Law Enforcement, Security, and Protective Services (The Career Opportunities Series). – М.: , 0. – 0 с. Don Tapscott. Creating Value in the Network Economy. – М.: , 0. – 0 с. Frank J. Fabozzi. Investing in Asset-Backed Securities (Frank J. Fabozzi Series). – М.: , 0. – 0 с. Charles Cresson Wood. Best Practices In Internet Commerce Security. – М.: , 0. – 0 с. Intellectual Property Rights in a Networked World: : Theory and Practice. – М.: , 2004. – 0 с. Gary Strumeyer. Investing in Fixed Income Securities : Understanding the Bond Market (Wiley Finance). – М.: , 2005. – 0 с. Edward J. CPA, CAE McMillan. Preventing Fraud in Nonprofit Organizations. – М.: , 2006. – 240 с. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с. Susan Echaore-McDavid. Career Opportunities In Law Enforcement, Security And Protective Services (Career Opportunities). – М.: , 2005. – 272 с. Network Security. – М.: , 2008. – 370 с. Daniel Clark. Network Access Control 100 Success Secrets - 100 Most Asked NAC Questions on Implementation and Deployment of unify endpoint security technology, user ... and network security enforcement. – М.: , 2008. – 180 с. Molecular Mechanisms in Spermatogenesis (Advances in Experimental Medicine and Biology). – М.: , 2008. – 292 с. Emma Donaldson–Feilder. Preventing Stress in Organizations – How to Develop Positive Managers. – М.: , 2011. – 256 с. Emma Donaldson–Feilder. Preventing Stress in Organizations – How to Develop Positive Managers. – М.: , 2011. – 256 с. Debabrata (Debu) Chakrava. Regulatory Mechanisms in Transcriptional Signaling,87. – М.: , 2010. – 416 с. Rob Cameron. Juniper(r) Networks Secure Access SSL VPN Configuration Guide. – М.: , 2010. – 656 с. Owen Poole. Network Security. – М.: , 2010. – 224 с. Michael Rash. Intrusion Prevention and Active Response. – М.: , 2010. – 550 с. S. Ted Oyama. Mechanisms in Homogeneous and Heterogeneous Epoxidation Catalysis. – М.: , 2010. – 528 с. James Joshi. Network Security: Know It All. – М.: , 2010. – 368 с. Steve Manzuik. Network Security Assessment: From Vulnerability to Patch. – М.: , 2010. – 500 с. Jan L. Harrington. Network Security. – М.: , 2010. – 384 с. J. Grimshaw. Electrochemical Reactions and Mechanisms in Organic Chemistry. – М.: , 2010. – 416 с. D.G. Stavenga. Molecular Mechanisms in Visual Transduction,3. – М.: , 2010. – 596 с. Russ Rogers. Network Security Evaluation Using the NSA IEM. – М.: , 2010. – 450 с. D. Caillard. Thermally Activated Mechanisms in Crystal Plasticity,8. – М.: , 2010. – 452 с. D.C. Wunsch II. Advances in Neural Network Research: IJCNN 2003. – М.: , 2010. – 434 с. Brien Posey. GFI Network Security and PCI Compliance Power Tools. – М.: , 2010. – 488 с. F.Y. Cheng. Computational Mechanics in Structural Engineering. – М.: , 2010. – 0 с. Syngress. Managing Cisco Network Security 2E. – М.: , 2010. – 752 с. Audrey Miller. Writing Reaction Mechanisms in Organic Chemistry. – М.: , 2010. – 471 с. Author Unknown. TRANSDUCTION AND CELLULAR MECHANISM IN SENSORY RECEPTORS,74. – М.: , 2010. – 0 с. Henry K. Hebeler. Getting Started in A Financially Secure Retirement. – М.: , 2007. – 268 с. Lee Sproull. Connections – New Ways of Working in the Networked Organization (Paper). – М.: , 1992. – 228 с. Bill English. MCSA/MCSE: Windows® 2000 Network Security Administration Study Guide. – М.: , 2003. – 574 с. Russ Kaufman. MCSA/MCSE: Windows® Server 2003 Network Security Administration Study Guide. – М.: , 2004. – 560 с. Morse. Behavioural Mechanisms in Ecology (Paper). – М.: , 1990. – 391 с. Dh Morse. Behavioural Mechanisms in Ecology. – М.: , 1980. – 392 с. R L Reid. Back Home Again – Indiana in the Farm Security Administration Photographs 1935–1943. – М.: , 1987. – 158 с. Nitesh Dhanjani. Network Security Tools. – М.: , 2005. – 340 с. Disney. Traffic Processes in Queueing Networks. – М.: , 1987. – 0 с. Thomas W. Madron. Network Security in the 90?s. – М.: , 1992. – 304 с. Microsoft. MCSE Training Kit (Exam 70–220) – Designing Microsoft Windows 2000 Network Security. – М.: , 2001. – 864 с. Mehran Mesbahi. Graph Theoretic Methods in MultiAgent Networks. – М.: , 2010. – 413 с. Andrew Lockhart. Network Security Hacks. – М.: , 2004. – 316 с. VJ MECHANISMS. Mcgovern Pigment Cell: Mechanism In Pigmentation. – М.: , 1973. – 0 с. Lorna A Rhodes. Total Confinement – Madness and Reason in the Maximum Security Prison. – М.: , 2004. – 330 с. DAN. Network Security In A Mixed Environment. – М.: , 1998. – 456 с. W OSSWALD. Osswald Problems Of Adrenergic Mechanisms In ?blood Vessels? (paper Only). – М.: , 1984. – 50 с. AM NEURAL. Granda Neural Mechanisms In Animal Behavior. – М.: , 1973. – 0 с. Christine L Borgman. From Gutenberg to the Global Information Infrastructure – Access to Information in the Networked World. – М.: , 2003. – 344 с. H MUSAPH. Musaph Mechanisms In System Formation. – М.: , 1974. – 0 с. Matthew Strebe. Network Security JumpStartTM. – М.: , 2002. – 384 с. Gerald D Mahan. Quantum Mechanics in a Nutshell. – М.: , 2009. – 414 с. Hans Berger. Automating with STEP 7 in LAD and FBD. – М.: , 2008. – 440 с. Pawan K Bhardwaj. A+. Network+, Security+ Exams in a Nutshell. – М.: , 2007. – 812 с. Luca Peliti. Statistical Mechanics in a Nutshell. – М.: , 2011. – 0 с. Robert Gilmore. Elementary Quantum Mechanics in One Dimension. – М.: , 2004. – 256 с. Robert Gilmore. Elementary Quantum Mechanics in One Dimension. – М.: , 2004. – 256 с. Eric Cole. Network Security Bible. – М.: , 2005. – 694 с. Richard K. Betts. Enemies of Intelligence – Knowledge and Power in American National Security. – М.: , 2009. – 264 с. Richard K Betts. Enemies of Intelligence – Knowledge and Power in American National Security. – М.: , 2007. – 240 с. S MUFTIC. Muftic: ?security? Mechanisms For Computer Network S. – М.: , 1989. – 196 с. HZ ANAPHYLAX. Movat Cellular And Humoral Mechanisms In Anaphylax Is And Allergy. – М.: , 1971. – 0 с. Bender. East Europe in Search of Security. – М.: , 1972. – 0 с. Bender. East Europe in Search of Security. – М.: , 1972. – 0 с. Real. Behavioral Mechanisms in Evolutionary Ecology (Paper). – М.: , 1983. – 134 с. Eric Cole. Wiley Pathways Network Security Fundamentals Project Manual. – М.: , 2008. – 312 с. Andrew Lockhart. Network Security Hacks 2e. – М.: , 2006. – 352 с. Christine Borgman. From Gutenburg to the Global Information Infrastructure – Access to Information in the Networked World. – М.: , 2000. – 350 с. R L Reid. Back Home Again – Indiana in the Farm Security Administration Photographs 1935–1943 (Paper). – М.: , 1987. – 158 с. Chris Mcnab. Network Security Assessment 2e. – М.: , 2007. – 464 с. Cryptography & Network Security. – М.: , 2007. – 0 с. Wireless Network Security A Beginners Guide. – М.: , 2011. – 400 с. Network Security: The Complete Reference. – М.: , 2011. – 896 с. Fundamentals Of Network Security. – М.: , 2011. – 672 с. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . – с. William Bratton, Zachary Tumin. Collaborate or Perish!: Reaching Across Boundaries in a Networked World. – М.: , 2012. – 352 с. Hakan Umit. Decision Making in Internet Networks. – М.: LAP Lambert Academic Publishing, 2010. – 160 с. Muhammad Yamin. Status of Farm Mechanization in Punjab, Pakistan. – М.: LAP Lambert Academic Publishing, 2012. – 100 с. Filipe Soares. Integration of Electric Vehicles in Distribution Networks. – М.: LAP Lambert Academic Publishing, 2012. – 288 с. Shaek Rana Mohammad Baki Billah and Mohammad Hafizur Rahman. Design & Development of Network Security System using IP Tables. – М.: LAP Lambert Academic Publishing, 2013. – 164 с. Anand Kannan. Evaluation of the Security Mechanisms in Cloud Networks. – М.: LAP Lambert Academic Publishing, 2013. – 192 с. Ratnmala Bhimanpallewar and Pravin Metkewar. Aggregation Query Processing in P2P Networks. – М.: LAP Lambert Academic Publishing, 2012. – 196 с. M. Ranga Swamy and M.S. Prasanthi. Congestion detection in WDM Networks. – М.: LAP Lambert Academic Publishing, 2012. – 84 с. Malka N Halgamuge. Resource Allocation in Wireless Networks. – М.: LAP Lambert Academic Publishing, 2009. – 268 с. Reza Sirjani,Azah Mohamed and Hussain Shareef. Optimal Placement of Var Compensators in Transmission Networks. – М.: LAP Lambert Academic Publishing, 2013. – 128 с. Xiangqian Chen. DEFENSE AGAINST NODE COMPROMISE IN SENSOR NETWORK SECURITY. – М.: LAP Lambert Academic Publishing, 2009. – 108 с. XUNQI YU. Forward Error Correction (FEC) Coding in Video Network Transmission. – М.: LAP Lambert Academic Publishing, 2010. – 124 с. KS HUI. Use of Zeolite Materials in Enhancing Methane Combustion Performance. – М.: LAP Lambert Academic Publishing, 2011. – 160 с. Erick Flores and Tristan Jenkin. Integrating Environmental Costs in Logistics Network Management. – М.: LAP Lambert Academic Publishing, 2011. – 144 с. A. Chaturvedi. Link Prediction Analysis in Social Networks. – М.: LAP Lambert Academic Publishing, 2013. – 60 с. Goshu Wolde Tefera. Women’s Participation in Ensuring Food Security at household level. – М.: LAP Lambert Academic Publishing, 2014. – 100 с. Yasin Mohammed Ali. Traditional Conflict Resolution Mechanism in North East Ethiopia. – М.: LAP Lambert Academic Publishing, 2011. – 112 с. Regina Ogot and Francis Kerongo. Effects of Urban Agricuture in enhancing poverty reduction. – М.: LAP Lambert Academic Publishing, 2013. – 68 с. Neetha M.S.,Vriti Vasudevan and Harish Nair. Influence of Movies in Enhancing Life skills. – М.: LAP Lambert Academic Publishing, 2012. – 168 с. Patrick Nsamba Oshabe. Effectiveness of Decentralization in Enhancing Community Participation. – М.: LAP Lambert Academic Publishing, 2013. – 108 с. Muhammad Naveed Qaisar. Pakistan''s Security Policy after 9/11. – М.: LAP Lambert Academic Publishing, 2011. – 132 с. Elif Ekin Cayhan. ADR Mechanisms in European Union Maritime Law. – М.: LAP Lambert Academic Publishing, 2010. – 96 с. Darbaz Awla. Signaling And Adhesive Mechanisms In Acute Pancreatitis. – М.: LAP Lambert Academic Publishing, 2012. – 64 с. Manpreet S. Khurmi and Priyanka Singh. HIV Prevention Programmes in Developing Countries. – М.: LAP Lambert Academic Publishing, 2012. – 88 с. Bruno Astuto Arouche Nunes. Characterizing User Mobility In Wireless Networks. – М.: Scholars' Press, 2013. – 112 с. Juan Daniel Machin Mastromatteo. Exploring Users' Information Behavior in Social Networks. – М.: LAP Lambert Academic Publishing, 2011. – 136 с. Umar Rashid. Optimal Resource Allocation in Wireless Networks. – М.: Scholars' Press, 2014. – 164 с. Nidhi Sharma. A Novel Mechanism for Enhancing Security in Quantum Cryptography. – М.: LAP Lambert Academic Publishing, 2012. – 100 с. Xiaodong He. Automated intrusion prevention mechanism in enhancing network security. – М.: Scholars' Press, 2014. – 128 с. Ming-Chin Chuang. Authentication and Mobility Management Mechanisms in VANETs. – М.: Scholars' Press, 2014. – 96 с. Syed Zahidur Rashid. Computer Network Security Monitoring. – М.: Scholars' Press, 2015. – 284 с. Chinmay Chakraborty. PSTN-IP Telephony Gateway for Ensuring QoS in Heterogeneous Networks. – М.: LAP Lambert Academic Publishing, 2014. – 68 с. A. F. M. Shahen Shah,Md. Shariful Islam and Mohammad Shah Alam. Cooperative Communication In Wireless Networks. – М.: LAP Lambert Academic Publishing, 2013. – 80 с. Premalatha Natarajan. Mitigating congestion and collision in adhoc networks. – М.: LAP Lambert Academic Publishing, 2014. – 200 с. Ajoy Kumar Khan and Shounak Chakraborty. Wireless Sensor Network Routing Protocol and Disaster Mitigation Usage. – М.: LAP Lambert Academic Publishing, 2014. – 92 с. Nirbhay Chaubey. Securing AODV Routing Protocol in design of Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2015. – 132 с. Chakchai So-In. Resource Allocation and Management in Computer Networks. – М.: LAP Lambert Academic Publishing, 2011. – 212 с. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с. Srikanthreddy Arimanda and Manojkumar Kolli. Performance Study Of Security Mechanismsm For Mobile Agent Domain. – М.: LAP Lambert Academic Publishing, 2011. – 84 с. Xiangfei Zhu. Bandwidth-sharing Mechanisms in Dynamic Circuit Networks. – М.: LAP Lambert Academic Publishing, 2012. – 132 с. Anshu Chaturvedi. Cross Layer Design in Adhoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 164 с. Yi Ren. Security Mechanisms in Unattended Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2013. – 164 с. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с. Rob Juffermans. Diverse routing in SRLG networks. – М.: LAP Lambert Academic Publishing, 2013. – 64 с. Oussama Habachi,Yezekael Hayel and Rachid El-Azouzi. Optimization of Partially Observable Systems in Wireless Networks. – М.: LAP Lambert Academic Publishing, 2013. – 188 с. Vincent Omollo. Enhanced Network Security. – М.: LAP Lambert Academic Publishing, 2013. – 76 с. Firkhan Ali Hamid Ali. Vulnerability Analysis on the Computer Network Security. – М.: LAP Lambert Academic Publishing, 2010. – 72 с. Sunil Kumar Senapati and Prof. Pabitra Mohan Khilar. SECURING FSR PROTOCOL AGAINST DATA PACKET DROPPING IN MANET. – М.: LAP Lambert Academic Publishing, 2010. – 64 с. Imran Sohail and Sikandar Hayat. Network Security and DDoS. – М.: LAP Lambert Academic Publishing, 2010. – 64 с. Christian Chetachi Umunna. Distributed Intrusion Detection System in Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 104 с. Saruchi Singla. Performance analysis of QoS Scheduling in WiMAX Network. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Saeed Haddadi Makhsous. Semantic Web mechanisms in Cloud Environment. – М.: LAP Lambert Academic Publishing, 2014. – 72 с. Jagdish Chandra Patni and Mahendra Singh Aswal. An Approach for Deadlock Handling in Torus Network. – М.: LAP Lambert Academic Publishing, 2014. – 84 с. Muna Elsadig Mohamed Ahmed Elsheik. Bio Inspired Intrusion Prevention and Self healing System for Networks. – М.: LAP Lambert Academic Publishing, 2012. – 256 с. Benjamin Eze. Policy-based Data Sharing for Event-driven Services in B2B Networks. – М.: LAP Lambert Academic Publishing, 2011. – 148 с. Amos Omamo. The effectiveness of IDPS's in enhancing database security. – М.: LAP Lambert Academic Publishing, 2012. – 88 с. Nathan Darmawan. Shielding Your Company with a Better Network Security Design. – М.: LAP Lambert Academic Publishing, 2010. – 180 с. David Lara Arango. Capacity mechanisms in electricity markets. – М.: LAP Lambert Academic Publishing, 2014. – 72 с. Лучшие результаты Ничего не найдено Дополнительные результаты Наука человековедения. интервью с Д. Уолтоном, профессором London Metropolitan University, экспертом CIPD. Chartered Institute of Personnel and Development, автором программы Master of Arts in Human Resource Strategies. И. Смирнова, "Кадровый менеджмент", № 5, июль-август 2007. Trade-in как способ обмена автомобиля. С.Н. Гордеева, "Торговля: бухгалтерский учет и налогообложение", N 2, февраль 2011 г. Проблемы применения универсальной юрисдикции in absentia. Г.А. Королев, "Журнал российского права", № 10, октябрь 2009. Тонкости trade-in. С.А.Королев, "НДС. Проблемы и решения", № 8, август 2009. Основной арсенал "охотника" - его network: кого он знает на рынке и качество этих отношений. С. Плетнева, "Управление персоналом", № 12, июнь 2009. In-store banking - новая модель банковского бизнеса. А. Пятков, "Банковское обозрение", № 11, ноябрь 2008. Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Тарас Спасибо за оперативность!