Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Heba Fathy Eid. Computational Intelligence in Network Intrusion Detection System. – М.: Scholars' Press, 2014. – 164 с. Janakiraman S. Distributed Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 164 с. Jabarweer Singh,Krishan Kumar and Gulshan Kumar. Intrusion detection using artificial intelligence based ensembles. – М.: LAP Lambert Academic Publishing, 2014. – 116 с. Дополнительные результаты Mark Yarnell, Rene Reid Yarnell. Your First Year in Network Marketing: Overcome Your Fears, Experience Success, and Achieve Your Dreams!. – М.: Prima Lifestyles, 1998. – 304 с. Anuradha Sharma, Neelu Rohmetra. Emotional Intelligence in Telecom Sector in India: Strategy,communication,motivation connect. – М.: , 2012. – 208 с. Robert K. Cooper, Ayman Sawaf. Executive Eq: Emotional Intelligence in Leadership and Organization. – М.: Perigee Trade, 1998. – 328 с. Anantha Kumar Duraiappah. Computational Models in the Economics of Environment and Development (Economy & Environment, 27). – М.: , 0. – 0 с. Robert Mundell, Armand Clesse. The Euro As a Stabilizer in the International Economic System. – М.: , 0. – 0 с. Cary Cherniss, Daniel Goleman. The Emotionally Intelligent Workplace: How to Select For, Measure, and Improve Emotional Intelligence in Individuals, Groups, and Organizations. – М.: , 0. – 0 с. Safe Schools: A Security and Loss Prevention Plan. – М.: , 0. – 0 с. Carol L. Covin. The Best Computer Jobs in America: 20 Minutes from Home. – М.: , 0. – 0 с. Anantha Kumar Duraiappah. Computational Models in the Economics of Environment and Development (Economy & Environment, ?27). – М.: , 0. – 0 с. Giovanni Arrighi, Beverly J. Silver, Iftikhar Ahmad. Chaos and Governance in the Modern World System. – М.: University of Minnesota Press, 1999. – 320 с. Zhengxin Chen. Computational Intelligence for Decision Support. – М.: , 0. – 0 с. Masoud Mohammadian, Ruhul Amin Sarker, Xin Yao, Ruhul Amin. Computational Intelligence in Control. – М.: , 0. – 0 с. Cary Cherniss, Mitchel Adler. Promoting Emotional Intelligence in Organizations. – М.: , 0. – 0 с. Gilbert Paquette, M. David Merrill. Instructional Engineering in Networked Environments (Tech Training Series). – М.: , 0. – 0 с. Mary Christensen, Wayne Christensen. Make Your First Million in Network Marketing: Proven Techniques You Can Use to Achieve Financial Success. – М.: , 0. – 0 с. Dorothy E. Denning, Peter J. Denning. Internet Besieged. – М.: , 0. – 0 с. A. F. Shapiro, L. C. Jain. Intelligent and Other Computational Techniques in Insurance: Theory and Applications (Series on Innovative Intelligence, 6). – М.: , 0. – 0 с. G. David Garson, G. David Information Technology and Computer Applications in Garson. Public Information Technology: Policy and Management Issues. – М.: , 0. – 0 с. Shu-Heng Chen, Paul P. Wang. Computational Intelligence in Economics and Finance (Advanced Information Processing). – М.: , 0. – 0 с. J.M. Binner. Applications of Artificial Intelligence in Finance and Economics, Volume 19 (Advances in Econometrics). – М.: , 2005. – 0 с. Innovations in Financial and Economic Networks (New Dimensions in Networks). – М.: , 2003. – 0 с. New Tools of Economic Dynamics (Lecture Notes in Economics and Mathematical Systems). – М.: , 2005. – 0 с. Joe Rubino, John Terhune. 15 Secrets Every Network Marketer Must Know: Essential Elements and Skills Required to Achieve 6- and 7-Figure Success in Network Marketing. – М.: Wiley, 2006. – 240 с. Paul Piccard, Jeremy Faircloth. Combating Spyware in the Enterprise. – М.: , 2006. – 386 с. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с. Hisashi Tanizaki. Computational Methods in Statistics and Econometrics (Statistics, a Series of Textbooks and Monographs). – М.: , 2004. – 528 с. Dipak Laha & Purnendu Mandal. Handbook of Computational Intelligence in Manufacturing and Production Management. – М.: Idea Group Reference, 2007. – 516 с. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с. Lean Yu, Shouyang Wang, Kin Keung Lai, Ligang Zhou. Bio-Inspired Credit Risk Analysis: Computational Intelligence with Support Vector Machines. – М.: , 2008. – 244 с. Anthony Brabazon. Natural Computing in Computational Finance: Volume 2 (Studies in Computational Intelligence). – М.: , 2009. – 250 с. Advances in Statistical Control, Algebraic Systems Theory, and Dynamic Systems Characteristics: A Tribute to Michael K. Sain (Systems & Control: Foundations & Applications). – М.: , 2008. – 386 с. Brian G., M.D. Orr. A Pediatrician's Journal: Caring for Children in a Broken Medical System. – М.: , 2008. – 288 с. Computational Intelligence in Biomedicine and Bioinformatics: Current Trends and Applications (Studies in Computational Intelligence). – М.: , 2008. – 432 с. Reiner Onken, Axel Schulte. System-Ergonomic Design of Cognitive Automation: Dual-Mode Cognitive Design of Vehicle Guidance and Control Work Systems (Studies in Computational Intelligence). – М.: , 2010. – 384 с. Brain-Inspired Information Technology (Studies in Computational Intelligence). – М.: , 2010. – 182 с. Biomedical Informatics: Computer Applications in Health Care and Biomedicine (Health Informatics). – М.: , 2010. – 1037 с. Rory Bray. OSSEC Host-Based Intrusion Detection Guide. – М.: , 2010. – 416 с. Clifford Headley. Raman Amplification in Fiber Optical Communication Systems. – М.: , 2010. – 392 с. GARSON. ADVS SOC SCI & COMPUT V2Advances in Social Science & Computers (ASCO). – М.: , 2010. – 0 с. Syngress. Snort Intrusion Detection 2.0. – М.: , 2010. – 550 с. W. Fred Ramirez. Computational Methods in Process Simulation. – М.: , 2010. – 512 с. Christopher Tong. Artificial Intelligence in Engineering Design,3. – М.: , 2010. – 388 с. Anatoli Torokhti. Computational Methods for Modeling of Nonlinear Systems,212. – М.: , 2010. – 322 с. Amir Khoei. Computational Plasticity in Powder Forming Processes. – М.: , 2010. – 0 с. PONS. COMPUTER APPLICATIONS IN BIOTECHNOLOGY 2004IFAC PROCEEDINGS VOLUME (IPV). – М.: , 2010. – 608 с. P. Ladeveze. Advances in Adaptive Computational Methods in Mechanics,7. – М.: , 2010. – 0 с. +б. Kozak. New Trends in Design of Control Systems 1997. – М.: , 2010. – 0 с. L. Boullart. Application of Artificial Intelligence in Process Control. – М.: , 2010. – 0 с. Carel Jan van Oss. The Properties of Water and their Role in Colloidal and Biological Systems,16. – М.: , 2010. – 236 с. Brian Caswell. Snort Intrusion Detection and Prevention Toolkit. – М.: , 2010. – 768 с. JOHNSON. ADVANCES IN ARTIFICIAL INTELLIGENCE IN ECONOMICS, FINANCE ANDMANAGEMENT VOLUME 1Advances in Artificial Intelligence in (AAIE). – М.: , 2010. – 0 с. Philippe G. Ciarlet. Essential Computational Modeling in Chemistry. – М.: , 2010. – 424 с. I. Farkas. Artificial Intelligence in Agriculture 2001. – М.: , 2010. – 132 с. F.Y. Cheng. Computational Mechanics in Structural Engineering. – М.: , 2010. – 0 с. S.L. Salzberg. Computational Methods in Molecular Biology,32. – М.: , 2010. – 0 с. Russell C. Eberhart. Computational Intelligence. – М.: , 2010. – 496 с. Y.H. Pao. Artificial Intelligence in Real-Time Control 1998. – М.: , 2010. – 0 с. Robert Barnard. Intrusion Detection Systems. – М.: , 2010. – 480 с. Author Unknown. Clays and clay minerals in natural and synthetic systems,21. – М.: , 2010. – 0 с. Gary W Flake. The Computational Beauty of Nature – Computer Explorations of Fractals, Chaos, Complex Systems & Adaption (Paper). – М.: , 2000. – 420 с. Peter Dayan. Theoretical Neuroscience – Computational and Mathematical Modeling of Neural Systems. – М.: , 2005. – 576 с. Michael I Jordan. Advances in Neural Information Processing Systems – Proceeding of the First 12 Conferences CD. – М.: , 2002. – 0 с. George F. Luger. Computation & Intelligence – Collective Readings. – М.: , 1995. – 750 с. Sara A Solla. Advances in Nerual Information Processing Systems 12. – М.: , 2000. – 2002 с. Toba Schwaber Kerson. Boundary Spanning – An Ecological Reinterpretation of Social Work Practice in Health & Mental Health Systems. – М.: , 2002. – 478 с. Emil Simiu. Chaotic Transitions in Deterministic & Stochastic Dynamical System – Applications of Melnikov Processes in Engineering, Physics & Neuroscience. – М.: , 2009. – 246 с. Jost Heintzenberg. Clouds in the Perturbed Climate System – Their Relationship to Energy Balance, Atmospheric Dynamics, and Precipitation. – М.: , 2009. – 576 с. Dominic Man Kit Lam. Regeneration & Plasticity in the Mammalian Visual System. – М.: , 1992. – 262 с. Robert J Jeffers. Computational Intelligence in Design and Manufacturing. – М.: , 1982. – 222 с. Jiannong Cao. Mobile Agents in Networking and Distributed Computing. – М.: , 2012. – 450 с. James M Beshers. Computer Methods in the Analysis of Large–Scale Social Systems 2e. – М.: , 2003. – 276 с. Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky. Cisco Security Professional's Guide to Secure Intrusion Detection Systems. – М.: , . – с. Michael Lesk. Understanding Digital Libraries, Second Edition (The Morgan Kaufmann Series in Multimedia and Information Systems). – М.: Morgan Kaufmann, 2004. – 456 с. Tienfuan Kerh. Seismic Data Analysis by Using Computational Intelligence. – М.: LAP Lambert Academic Publishing, 2010. – 136 с. David Zumoffen and Marta Basualdo. Fault Detection Systems Integrated to Fault-Tolerant Control. – М.: LAP Lambert Academic Publishing, 2012. – 236 с. Anup Bhange and Manmeet Kaur Marhas. Anomaly Detection in Network Traffic; A Statistical Approach. – М.: LAP Lambert Academic Publishing, 2012. – 92 с. Gulshan Kumar. Effective Intrusion Detection using Genetic Algorithms. – М.: LAP Lambert Academic Publishing, 2014. – 100 с. Tanmoy Hazra. Application of PCA in IDS. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Yatish Choudhary. Neural Network Based Power System Stabilizer. – М.: LAP Lambert Academic Publishing, 2012. – 68 с. Saifur Sabuj. Microcontroller Based Friend or Foe (FoF) Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 52 с. Nurbaizura Ramji and Asrani Lit. Performance Optimization in Network-on-Chip (NoC) Architecture. – М.: LAP Lambert Academic Publishing, 2014. – 88 с. Congzhi Huang and Yan Bai. Modeling, Analysis, and Synthesis of Networked Cascade Control Systems. – М.: LAP Lambert Academic Publishing, 2011. – 176 с. Hua Ouyang. Networked Predictive Control Systems. – М.: LAP Lambert Academic Publishing, 2010. – 164 с. Huang-Chun Roan. Network Intrusion Detection Based on Shift-OR Circuit. – М.: LAP Lambert Academic Publishing, 2011. – 60 с. M. Sadiq Ali Khan and S. M. Aqil Burney. Recent Trends in Intrusion Detection System & Network Monitoring. – М.: LAP Lambert Academic Publishing, 2012. – 120 с. Cruceru Madalina. Radiation Detection Systems With Applications in High Energy Physics. – М.: LAP Lambert Academic Publishing, 2012. – 84 с. Mahmood A. Mahdavi and Yen-Han Lin. Computational Approaches In Systems Biology. – М.: LAP Lambert Academic Publishing, 2010. – 124 с. Yi Xin. Mid-IR-based Gas Detection System Analysis Model. – М.: LAP Lambert Academic Publishing, 2011. – 136 с. Vyacheslav Abramov. Queueing systems, networks and telecommunication systems. – М.: LAP Lambert Academic Publishing, 2010. – 164 с. Sheelam Raji Reddy. Computational Techniques in Transient Magneto-hydro Dynamic Flows. – М.: LAP Lambert Academic Publishing, 2014. – 112 с. Zol Bahri Razali. Practical Intelligence in Engineering Laboratory:PhD Pilot Instrument. – М.: LAP Lambert Academic Publishing, 2013. – 64 с. Abhay Nath Singh. Honeypot Based Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 68 с. Shahnawaz Husain,S. C. Gupta and R. C. Joshi. Intrusion Detection Engine for Adhoc Environment. – М.: LAP Lambert Academic Publishing, 2013. – 120 с. Sumaya Saad Sulaiman and Sarab M. Hameed. A Fuzzy Based Clustering for Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 120 с. Shubha Puthran and Ketan Shah. Intrusion Detection System using datamining techniques. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Mohammad S. I. Mamun. Intrusion Detection System Architecture in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Heba Fathy Eid. Computational Intelligence in Network Intrusion Detection System. – М.: Scholars' Press, 2014. – 164 с. Janakiraman S. Distributed Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 164 с. Yogesh Kumar,Krishan Kumar and Gulshan Kumar. Feature Selection For Intrusion Detection Systems. – М.: LAP Lambert Academic Publishing, 2014. – 100 с. Syed Zahidur Rashid. Computer Network Security Monitoring. – М.: Scholars' Press, 2015. – 284 с. Lanier Watkins. Resource Discovery: Using Network Traffic To Infer CPU And Memory Load. – М.: LAP Lambert Academic Publishing, 2014. – 96 с. Gulshan Kumar. Effective Intrusion Detection using Feature Selection. – М.: LAP Lambert Academic Publishing, 2014. – 92 с. Mrutyunjaya Panda and Manas Ranjan Patra. A Data Mining Approach to Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2015. – 216 с. Mohammad AlAhmad. Security threats of finger print biometric in network system. – М.: LAP Lambert Academic Publishing, 2014. – 88 с. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с. Mueen Uddin. Dynamic Multi Layer Signature based IDS System using Mobile Agents. – М.: LAP Lambert Academic Publishing, 2011. – 72 с. Ivano Malavolta. A tamper resistant Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2011. – 144 с. Shaffali Gupta and Sanmeet Kaur. A GUI Framework for detecting Intrusions using Bro IDS. – М.: LAP Lambert Academic Publishing, 2013. – 76 с. Mahmoud Jazzar. Computer Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 240 с. Siva S. Sivatha Sindhu,S. Geetha and S. Selvakumar. Network Intrusion Detection System using Machine Learning Techniques. – М.: LAP Lambert Academic Publishing, 2013. – 80 с. Vincent Omollo. Enhanced Network Security. – М.: LAP Lambert Academic Publishing, 2013. – 76 с. Nasim Beigi-Mohammadi. Smart Meter Networks: Intrusion Detection System by Design. – М.: LAP Lambert Academic Publishing, 2014. – 136 с. Christian Chetachi Umunna. Distributed Intrusion Detection System in Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 104 с. Iftikhar Ahmad. Feature Subset Selection in Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 220 с. Saima Munawar. Detection and Classification Of Normal and Anomaly IP Packet. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Jabarweer Singh,Krishan Kumar and Gulshan Kumar. Intrusion detection using artificial intelligence based ensembles. – М.: LAP Lambert Academic Publishing, 2014. – 116 с. Govind Sreekar Shenoy. Architecture Support for Intrusion Detection systems. – М.: LAP Lambert Academic Publishing, 2014. – 160 с. Esther Scheurmann. COMPUTATIONAL INTELLIGENCE IN LENDING. – М.: LAP Lambert Academic Publishing, 2010. – 100 с. Latha Parthiban. Computational Intelligence in Computer Aided Medical Diagnosis. – М.: LAP Lambert Academic Publishing, 2010. – 248 с. Monis Akhlaq,Irfan Awan and Faeiz Alserhani. Improved Performance High Speed Network Intrusion Detection Systems. – М.: LAP Lambert Academic Publishing, 2011. – 132 с. Prakash Prasad. Intrusion Detection System: Findings. – М.: LAP Lambert Academic Publishing, 2011. – 104 с. Homam El-Taj and Omar Amer. Network Alert Management System For IDS False Positive Reduction. – М.: LAP Lambert Academic Publishing, 2013. – 156 с. Bibi Masoomeh Aslahi Shahri. Intrusion Detection System Using Hybrid Gsa-kmeans. – М.: LAP Lambert Academic Publishing, 2014. – 128 с. Tigabu Dagne Akal. Constructing Predictive Model for Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 160 с. Negm Eldin Mohamed Shawky,El-Sayed Mostafaa Saad and Abd Elrahman Elbardawiny. Advanced data association techniques in multi-target tracking system. – М.: LAP Lambert Academic Publishing, 2012. – 212 с. Kamaruzaman Maskat and Mohd Afizi Mohd Shukran. Agent Based Snort In Distributed Environment. – М.: LAP Lambert Academic Publishing, 2013. – 112 с. Kamrul Hasan. An Investigation into Botnet Detection System. – М.: LAP Lambert Academic Publishing, 2013. – 120 с. Rupali Pathak. Recent Advances In Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 72 с. Hannah Inbarani. Web Personalization Models using Computational Intelligence. – М.: LAP Lambert Academic Publishing, 2013. – 200 с. Gabriella Carrozza. Software Faults Diagnosis in Complex Mission Critical Systems. – М.: LAP Lambert Academic Publishing, 2015. – 168 с. Al-Sakib Khan Pathan. Securing WSN with Lightweight Resource-Efficient Schemes. – М.: LAP Lambert Academic Publishing, 2011. – 116 с. Alpay Doruk. Security Review Program Requirements for Intrusion Management Systems. – М.: LAP Lambert Academic Publishing, 2010. – 88 с. Sathish Kumar. Intrusion Detection and Response Techniques for Mobile Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 200 с. Richard Rimiru. Exploring Immune System's Concepts for the Design of Novel AIS Models. – М.: LAP Lambert Academic Publishing, 2012. – 164 с. Telmo Menezes. Evolutionary Computational Intelligence. – М.: LAP Lambert Academic Publishing, 2011. – 264 с. Khandakar Entenam Unayes Ahmed. IDENTITY AND ACCESS MANAGEMENT IN CLOUD COMPUTING. – М.: LAP Lambert Academic Publishing, 2011. – 172 с. Adriana Agapie. Computational Intelligence Techniques in Econometric Modeling. – М.: LAP Lambert Academic Publishing, 2009. – 124 с. HARIKANTH DUMPETI,NARESH REDDY G and SAISHARAN K. COMPUTER APPLICATION IN BUSINESS. – М.: LAP Lambert Academic Publishing, 2010. – 452 с. Kazeem Osuolale. A Study Of Computer Software In Secondary School Mathematics. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Nadim Al-Mosawi and Frida Ohlson. Occupant Detection System. – М.: , 2015. – 64 с. Лучшие результаты Ничего не найдено Дополнительные результаты Наука человековедения. интервью с Д. Уолтоном, профессором London Metropolitan University, экспертом CIPD. Chartered Institute of Personnel and Development, автором программы Master of Arts in Human Resource Strategies. И. Смирнова, "Кадровый менеджмент", № 5, июль-август 2007. Банковское отделение будущего. интервью с Камероном МакКворри. Cameron MacQuarrie, менеджером по развитию бизнеса компании Cisco Systems в области корпоративных финансов в регионе EMEA. Европа, Ближний Восток, Африка. Н.Ф. Колюшенко, "Расчеты и операционная работа в коммерческом банке", № 2, февраль 2006. Инвестиции в Business Intelligence - прибыльный бизнес. Д. Красюков, "Финансовая газета", № 38, сентябрь 2005. Ловушка для пирата. интервью с И. Слабых, руководителем отдела противодействия интеллектуальному пиратству в России и СНГ Adobe Systems. И. Голова, "Расчет", N 9, сентябрь 2012 г. Business Intelligence и Business Performance Management: основные термины и концепции. Ю.В. Амириди, "Управление в кредитной организации", N 5, сентябрь-октябрь 2011 г. Trade-in как способ обмена автомобиля. С.Н. Гордеева, "Торговля: бухгалтерский учет и налогообложение", N 2, февраль 2011 г. Проблемы применения универсальной юрисдикции in absentia. Г.А. Королев, "Журнал российского права", № 10, октябрь 2009. Тонкости trade-in. С.А.Королев, "НДС. Проблемы и решения", № 8, август 2009. Основной арсенал "охотника" - его network: кого он знает на рынке и качество этих отношений. С. Плетнева, "Управление персоналом", № 12, июнь 2009. Кто владеет информацией... Business Intelligence - ещё один путь к успеху. Н. Шестопалова, "Бухгалтерия и банки", № 2, февраль 2009. In-store banking - новая модель банковского бизнеса. А. Пятков, "Банковское обозрение", № 11, ноябрь 2008. Я воспринимаю персонального помощника как напарника червяк должен нравиться рыбке, а не рыбаку. интервью с П.А. Черкашиным, руководителем российского представительства компании Adobe Systems. "Управление персоналом", № 20, октябрь 2008. Система управленческой отчетности для руководителей на платформе Oracle Business Intelligence SE One. О. Морозова, "Бухгалтерия и банки", № 4, апрель 2008. Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Aleksandr, 26.01 Здравствуйте,Юля. Спасибо вам еще раз за диплом.. все сдал на отлично.. оч доволен, буду рекомендовать другим)