Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с.
  2. Data Privacy Management and Autonomous Spontaneus Security: 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, ... Computer Science / Security and Cryptology). – М.: , 2012. – 334 с.
  3. Passive and Active Measurement: 13th International Conference, PAM 2012, Vienna, Austria, March 12-14, 2012, Proceedings (Lecture Notes in Computer ... Networks and Telecommunications). – М.: , 2012. – 290 с.
  4. Frontiers in Algorithmics and Algorithmic Aspects in Information and Management: Joint International Conference, FAW-AAIM 2012, Beijing, China, May ... Computer Science and General Issues). – М.: , 2012. – 400 с.
  5. Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  6. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с.
  7. Traffic Monitoring and Analysis: 4th International Workshop, TMA 2012, Vienna, Austria, March 12, 2012, Proceedings (Lecture Notes in Computer Science ... Networks and Telecommunications). – М.: , 2012. – 200 с.
  8. Technological Innovation for Value Creation: Third IFIP WG 5.5/SOCOLNET Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS ... in Information and Communication Technology). – М.: , 2012. – 607 с.
  9. Constance S. Hawke, Constance S. Hawke. Computer and Internet Use on Campus: A Legal Guide to Issues of Intellectual Property, Free Speech, and Privacy. – М.: , 0. – 0 с.
  10. Markov Networks in Evolutionary Computation (Adaptation, Learning, and Optimization). – М.: , 2012. – 264 с.
  11. Anna Nagurney, Anna Nugurney. Sustainable Transportation Networks. – М.: , 0. – 0 с.
  12. Anna Nagurney. Network Economics: A Variational Inequality Approach (Advances in Computational Economics, V. 10). – М.: , 0. – 0 с.
  13. Thomas Brenner. Computational Techniques for Modelling Learning in Economics (Advances in Computational Economics, V. 11). – М.: , 0. – 0 с.
  14. Alessandro Lomi, Erik R. Larsen. Dynamics of Organizations: Computational Modeling and Organizational Theories. – М.: AAAI Press, 2001. – 352 с.
  15. Peter R. Monge, Noshir S. Contractor. Theories of Communication Networks. – М.: , 0. – 0 с.
  16. Peter Meyer. Getting Started in Computer Consulting. – М.: , 0. – 0 с.
  17. John K. Waters, John K. Waters. John Chambers and the Cisco Way: Navigating Through Volatility. – М.: , 0. – 0 с.
  18. Knowledge Networking: Creating the Collaborative Enterprise. – М.: , 0. – 0 с.
  19. Carl Bergquist. Guide to Electronic Surveillance Devices. – М.: Prompt (DPI - 8/01), 2002. – 280 с.
  20. Kenneth C. Mansfield, James L. Antonakos. Introduction to Computers for Engineering and Technology. – М.: , 0. – 0 с.
  21. A. D. Zapranis, Apostolos-Paul Refenes. Principles of Neural Model Identification, Selection and Adequacy: With Applications in Financial Econometrics (Perspectives in Neural Computing). – М.: , 0. – 0 с.
  22. Oz Shy. The Economics of Network Industries. – М.: , 0. – 0 с.
  23. Boris Kovalerchuk, Evgenii Vityaev. Data Mining in Finance: Advances in Relational and Hybrid Methods (Kluwer International Series in Engineering and Computer Science, 547). – М.: , 0. – 0 с.
  24. Robert B. Harris. Precedence and Arrow Networking Techniques for Construction. – М.: , 0. – 0 с.
  25. Seymour Bosworth, Michel E. Kabay. Computer Security Handbook. – М.: , 0. – 0 с.
  26. Ilkka Tuomi. Networks of Innovation: Change and Meaning in the Age of the Internet. – М.: , 2003. – 0 с.
  27. Computer-Managed Maintenance Systems. – М.: , 0. – 0 с.
  28. Ifip Working Conference on Infrastructures for Virtual Organizations 2, Hamideh Afsarmanesh, Richardo J. Rabelo, Luis M. Camarinha-Matos, Luis Camarinha-Matos, Ricardo J. Rabelo. E-Business and Virtual Enterprises - Managing Business-to-Business Cooperation (International Federation For Information Processing Volume 184). – М.: , 0. – 0 с.
  29. G. David Garson. Computer Technology and Social Issues. – М.: , 0. – 0 с.
  30. Simonetta Balsamo, Vittoria De Nitto Persone, Raif Onvural, Raif O. Onvural. Analysis of Queueing Networks with Blocking (International Series in Operations Research and Management Science Volume 31). – М.: , 0. – 0 с.
  31. Xiuli Chao, Masakiyo Miyazawa, Michael Pinedo. Queueing Networks: Customers, Signals and Product Form Solutions. – М.: , 0. – 0 с.
  32. John Locke. Open Source Solutions for Small Business Problems (Networking Series). – М.: , 0. – 0 с.
  33. John Ross, John A. Ross. Computer Networks for Small Business. – М.: , 0. – 0 с.
  34. Henry J. Gambino. Salons & Computers: A Starters Guide for Success. – М.: , 0. – 0 с.
  35. Martin Kenney. Understanding Silicon Valley: The Anatomy of an Entrepreneurial Region. – М.: Stanford Business Books, 2000. – 304 с.
  36. A. F. Shapiro, L. C. Jain. Intelligent and Other Computational Techniques in Insurance: Theory and Applications (Series on Innovative Intelligence, 6). – М.: , 0. – 0 с.
  37. Jim Banister. Word of Mouse : The New Age of Networked Media. – М.: , 0. – 0 с.
  38. Amjad Umar. E-Business and Distributed Systems Handbook: Networks Module. – М.: , 0. – 0 с.
  39. Vesna Hassler. Security Fundamentals for E-Commerce (Artech House Computer Security Series). – М.: , 0. – 0 с.
  40. Shu-Heng Chen, Paul P. Wang. Computational Intelligence in Economics and Finance (Advanced Information Processing). – М.: , 0. – 0 с.
  41. Janet G. Butler. Enterprisewide Network Management. – М.: , 0. – 0 с.
  42. Anna Nagurney, June Dong. Supernetworks: Decision-Making for the Information Age (New Dimensions in Networks). – М.: , 0. – 0 с.
  43. Peter Varhol. Network-Centric Computing: Preparing the Enterprise for the Next Millennium. – М.: , 0. – 0 с.
  44. Paul Fortier, Howard Michel. Computer Systems Performance Evaluation and Prediction. – М.: , 0. – 0 с.
  45. Michal Pioro, Deepankar Medhi. Routing, Flow, and Capacity Design in Communication and Computer Networks. – М.: Elsevier Digital Press, 0. – 794 с.
  46. John W Farber. Essential Electronics For PC Technicians (Electrical and Computer Engineering Series). – М.: , 2004. – 0 с.
  47. Innovations in Financial and Economic Networks (New Dimensions in Networks). – М.: , 2003. – 0 с.
  48. Financial Cryptography : 8th International Conference, FC 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers (Lecture Notes in Computer Science). – М.: , 2004. – 0 с.
  49. Geoffrey Elliott. Mobile Commerce and Wireless Computing Systems. – М.: , 2003. – 0 с.
  50. Jaime Gil-Aluja. Fuzzy Sets in the Management of Uncertainty (Studies in Fuzziness and Soft Computing). – М.: , 2004. – 0 с.
  51. Network Analysis : Methodological Foundations (Lecture Notes in Computer Science). – М.: , 2005. – 0 с.
  52. Leigh Tesfatsion, Kenneth L. Judd. Handbook of Computational Economics, Volume 2: Agent-Based Computational Economics (Handbook of Computational Economics). – М.: North Holland, 2006. – 904 с.
  53. Internet and Network Economics: First International Workshop, WINE 2005, Hong Kong, China, December 15-17, 2005, Proceedings (Lecture Notes in Computer Science). – М.: , 2006. – 1106 с.
  54. Xiaoqiang Cai, Dan Sha, C.K. Wong. Time-Varying Network Optimization (International Series in Operations Research & Management Science). – М.: , 2007. – 248 с.
  55. Soumitra Dutta, Irene Mia. Global Information Technology Report 2006-2007: Connecting to the Networked Economy (Global Information Technology Report). – М.: , 2007. – 320 с.
  56. Simulation Approaches in Transportation Analysis: Recent Advances and Challenges (Operations Research/Computer Science Interfaces Series). – М.: , 2005. – 400 с.
  57. Paul D. McNelis. Neural Networks in Finance: Gaining Predictive Edge in the Market (Academic Press Advanced Finance Series). – М.: , 2004. – 256 с.
  58. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с.
  59. Soumitra Dutta, Irene Mia. The Global Information Technology Report 2007-2008: Fostering Innovation through Networked Readiness (Global Information Technology Report). – М.: , 2008. – 376 с.
  60. Jack Bastide, Diane Walker. Navigating the World of Network Marketing: Third Edition. – М.: , 2008. – 288 с.
  61. Ahmed Yassin Al-Dubai. Towards QoS Aware Collective Communications: From Theory to Practice: Design & Analysis of HighlyParallel Multicast & Broadcast Algorithms forInterconnection Networks. – М.: , 2008. – 168 с.
  62. Connectivity and Knowledge Management in Virtual Organizations: Networking and Developing Interactive Communications (Premier Reference Source). – М.: , 2008. – 450 с.
  63. Daniel Harris. Web 2.0 Evolution into The Intelligent Web 3.0: 100 Most Asked Questions on Transformation, Ubiquitous Connectivity, Network Computing, Open Technologies, ... Databases and Intelligent Applications. – М.: , 2008. – 152 с.
  64. Computer & Network Procedures to Manage IT Systems. – М.: , 2008. – 720 с.
  65. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с.
  66. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с.
  67. Algorithmic Aspects in Information and Management: 4th International Conference, AAIM 2008, Shanghai, China, June 23-25, 2008, Proceedings (Lecture Notes in Computer Science). – М.: , 2008. – 350 с.
  68. Towards Sustainable Society on Ubiquitous Networks: The 8th IFIP Conference on e-Business, e-Services, and e-Society (I3E 2008), September 24 - 26, 2008, ... Federation for Information Processing). – М.: , 2008. – 366 с.
  69. Advancing Computing, Communication, Control and Management (Lecture Notes in Electrical Engineering). – М.: , 2010. – 294 с.
  70. Jeanna Matthews. Computer Networking. – М.: , 2005. – 288 с.
  71. Larry L. Peterson. Computer Networks ISE. – М.: , 2010. – 848 с.
  72. Larry L. Peterson. Computer Networks. – М.: , 2010. – 848 с.
  73. Emad Aboelela. Computer networks bundle. – М.: , 2010. – 0 с.
  74. Graham King. Understanding and Designing Computer Networks. – М.: , 2010. – 224 с.
  75. Constance S. Hawke. Computer and Internet Use on Campus. – М.: , 2000. – 192 с.
  76. TL LOQUERY. Laquey: The Users Directory Of Computer ?networks? (pr Only). – М.: , 1990. – 646 с.
  77. JS QUARTERMAN. Quarterman: The ?matrix?: Computer Networks & Conferencing Systems Worldwid (pr Only). – М.: , 1989. – 752 с.
  78. Gerald D. Cole. Computer Networking for Systems Programmers. – М.: , 1990. – 242 с.
  79. David Claiborne. Mathematical Preliminaries for Computer Networking. – М.: , 1990. – 180 с.
  80. S MUFTIC. Muftic: ?security? Mechanisms For Computer Network S. – М.: , 1989. – 196 с.
  81. Pascale Vicat–Blanc Primet. Cluster and Computing Networks. – М.: , 2011. – 0 с.
  82. Computer Networks: A Top Down Approach. – М.: , 2011. – 0 с.
  83. Computer Networks: An Open Source Approach. – М.: , 2011. – 0 с.
  84. Eoghan Casey. Digital Evidence and Computer Crime. – М.: , . –  с.
  85. Natalia Olifer, Victor Olifer. Computer Networks: Principles, Technologies and Protocols for Network Design. – М.: , 2006. – 1000 с.
  86. Ido Dubrawsky. How to Cheat at Securing Your Network. – М.: Syngress, 2007. – 432 с.
  87. Gurpreet Singh Saini and Manoj Kumar. Applications of Fuzzy Logic in Computer Network theory. – М.: LAP Lambert Academic Publishing, 2013. – 60 с.
  88. Shaek Rana Mohammad Baki Billah and Mohammad Hafizur Rahman. Design & Development of Network Security System using IP Tables. – М.: LAP Lambert Academic Publishing, 2013. – 164 с.
  89. Md. Nazmul Hasan and Sudeb Som. Analysis and Design of Backbone Network. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  90. Ahmed Bayomy Zaky Ahmed,Hala Helmy Zayed and May Salama. Enhancing Video on Demand over Computer Networks. – М.: LAP Lambert Academic Publishing, 2013. – 128 с.
  91. Deepak Gupta and Payal Singla. Network of Scheduling Problems. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  92. Ashit Kumar Dutta and Abdul Rahaman Wahab Sait. Computer Networks from Scratch. – М.: LAP Lambert Academic Publishing, 2013. – 324 с.
  93. Ammisetty Veeraswamy and Ammisetty Mahesh Babu. Introduction to Computer Networks. – М.: LAP Lambert Academic Publishing, 2012. – 208 с.
  94. Torruam Japheth Terande. Introduction to computer networking. – М.: LAP Lambert Academic Publishing, 2012. – 144 с.
  95. Mitul Choksi. Network Performance Tuning Techniques. – М.: LAP Lambert Academic Publishing, 2011. – 56 с.
  96. Syed Zahidur Rashid. Computer Network Security Monitoring. – М.: Scholars' Press, 2015. – 284 с.
  97. Mrutyunjaya Panda and Manas Ranjan Patra. A Data Mining Approach to Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2015. – 216 с.
  98. Chakchai So-In. Resource Allocation and Management in Computer Networks. – М.: LAP Lambert Academic Publishing, 2011. – 212 с.
  99. Mehmud Abliz. Denial of Service in Computer Networks. – М.: LAP Lambert Academic Publishing, 2011. – 84 с.
  100. Aaron Tureau. Evaluations of Synchronization Loss Equations on High-Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 60 с.
  101. Qutaiba Ibrahim and Ina'am Khudher. Network Simulation Guide. – М.: LAP Lambert Academic Publishing, 2011. – 340 с.
  102. Miguel A. Erazo. Leveraging Symbiotic Relationships for Emulation of Computer Networks. – М.: Scholars' Press, 2013. – 164 с.
  103. Trunal Patel. Computer Network. – М.: LAP Lambert Academic Publishing, 2012. – 572 с.
  104. Adil Adil Nazir Malik. Modeling and Simulation of computer Network Using OPNET. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  105. Mahmoud Jazzar. Computer Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 240 с.
  106. Asger Ali Syed and Sudip Mahajan. Concept of Networking. – М.: LAP Lambert Academic Publishing, 2013. – 180 с.
  107. Firkhan Ali Hamid Ali. Vulnerability Analysis on the Computer Network Security. – М.: LAP Lambert Academic Publishing, 2010. – 72 с.
  108. Jawahar Thakur. Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2011. – 84 с.
  109. Er. Surajit Borah. A Study Of Computer Networking At IOCL(AOD), Digboi(India). – М.: LAP Lambert Academic Publishing, 2011. – 64 с.
  110. Paul Santi-Jones. Fractional FPGA Neural Networks. – М.: LAP Lambert Academic Publishing, 2009. – 228 с.
  111. Lotfi Ben Romdhane. Computational Networks and Competition-Based Models. – М.: LAP Lambert Academic Publishing, 2010. – 208 с.
  112. Arvind Maheshwari,Umesh Kumar Singh and Sumit Jain. Basic Computer Engineering. – М.: LAP Lambert Academic Publishing, 2012. – 376 с.
  113. Dongqing Yuan. Developing and Evaluating an Open Source Network. – М.: LAP Lambert Academic Publishing, 2012. – 148 с.
  114. Jerry Bent. Design and Simulation of a Secured and Robust Campus Area Network. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  115. Dalibor Dobrilovic. Modeling virtual network laboratory based on virtualization technology. – М.: LAP Lambert Academic Publishing, 2012. – 236 с.
  116. MD UDDIN. COMPUTER NETWORKING AND MANAGEMENT. – М.: LAP Lambert Academic Publishing, 2010. – 44 с.
  117. Ayankunle Adegbite Taiwo. Performance Modeling of a wired Local Area Network. – М.: LAP Lambert Academic Publishing, 2012. – 100 с.
  118. FARAZ ZAIDI. Analysis, Structure and Organization of Complex Networks. – М.: LAP Lambert Academic Publishing, 2011. – 156 с.
  119. Mustafa Khan and Muhammad Irfan Younas Mughal. Content Distribution Network''s Technology (CDN). – М.: LAP Lambert Academic Publishing, 2010. – 88 с.
  120. Navneet kaur Bajwa. Sanitization of Data in Computer Network. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  121. Palanivel Kodeswaran. On the Use of Context and Policies in Declarative Networked Systems. – М.: LAP Lambert Academic Publishing, 2012. – 112 с.
  122. Marcellin Mugabe. The Total Cost of Ownership (TCO) of Computer Networks in Colleges. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  123. Asrani Lit,Fariza Mahyan and Termimi Hidayat Mahyan. Delay Aware Topology Generation for Network on Chip. – М.: , 2015. – 72 с.

Дополнительные результаты

  1. Passive and Active Measurement: 13th International Conference, PAM 2012, Vienna, Austria, March 12-14, 2012, Proceedings (Lecture Notes in Computer ... Networks and Telecommunications). – М.: , 2012. – 290 с.
  2. Constance S. Hawke, Constance S. Hawke. Computer and Internet Use on Campus: A Legal Guide to Issues of Intellectual Property, Free Speech, and Privacy. – М.: , 0. – 0 с.
  3. Margaret Wheatley, Paula Griffin, Kristine Quade, National OD Network. Organization Development at Work: Conversations on the Values, Applications, and Future of OD (J-B O-D (Organizational Development)). – М.: Pfeiffer, 2003. – 224 с.
  4. Structural Adjustment Participatory Review International Network. Structural Adjustment, the Sapri Report: The Policy Roots of Economic Crisis, Poverty and Inequality. – М.: , 0. – 0 с.
  5. John K. Waters, John K. Waters. John Chambers and the Cisco Way: Navigating Through Volatility. – М.: , 0. – 0 с.
  6. Carl Bergquist. Guide to Electronic Surveillance Devices. – М.: Prompt (DPI - 8/01), 2002. – 280 с.
  7. Kenneth C. Mansfield, James L. Antonakos. Introduction to Computers for Engineering and Technology. – М.: , 0. – 0 с.
  8. Ilkka Tuomi. Networks of Innovation: Change and Meaning in the Age of the Internet. – М.: , 2003. – 0 с.
  9. Ifip Working Conference on Infrastructures for Virtual Organizations 2, Hamideh Afsarmanesh, Richardo J. Rabelo, Luis M. Camarinha-Matos, Luis Camarinha-Matos, Ricardo J. Rabelo. E-Business and Virtual Enterprises - Managing Business-to-Business Cooperation (International Federation For Information Processing Volume 184). – М.: , 0. – 0 с.
  10. Business Women's Network, WorkingWoman Network. Business Women's Network 2001 International Directory. – М.: , 0. – 0 с.
  11. John Ross, John A. Ross. Computer Networks for Small Business. – М.: , 0. – 0 с.
  12. Martin Kenney. Understanding Silicon Valley: The Anatomy of an Entrepreneurial Region. – М.: Stanford Business Books, 2000. – 304 с.
  13. Roland Traunmuller, R. Traunmuller, Quebec) Ifip World Computer Congress 2002 Montreal. Information Systems: The E-Business Challenge (International Federation for Information Processing, 95). – М.: , 0. – 0 с.
  14. Janet G. Butler. Enterprisewide Network Management. – М.: , 0. – 0 с.
  15. Peter Varhol. Network-Centric Computing: Preparing the Enterprise for the Next Millennium. – М.: , 0. – 0 с.
  16. Paul Fortier, Howard Michel. Computer Systems Performance Evaluation and Prediction. – М.: , 0. – 0 с.
  17. Michal Pioro, Deepankar Medhi. Routing, Flow, and Capacity Design in Communication and Computer Networks. – М.: Elsevier Digital Press, 0. – 794 с.
  18. John W Farber. Essential Electronics For PC Technicians (Electrical and Computer Engineering Series). – М.: , 2004. – 0 с.
  19. Xiaoqiang Cai, Dan Sha, C.K. Wong. Time-Varying Network Optimization (International Series in Operations Research & Management Science). – М.: , 2007. – 248 с.
  20. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с.
  21. The Transition Network, Gail Rentsch. Smart Women Don't Retire -- They Break Free: From Working Full-Time to Living Full-Time. – М.: , 2008. – 272 с.
  22. Computer & Network Procedures to Manage IT Systems. – М.: , 2008. – 720 с.
  23. Innovation in Complex Social Systems (Routledge Studies in Global Competition). – М.: , 2010. – 352 с.
  24. И.С. Башмакова. Английский язык для студентов технических вузов (+ 2 CD-ROM). – М.: Омега-Л, Филоматис, 2010. – 456 с.
  25. Jeff Crume. Inside Internet Security: What Hackers Don't Want You To Know. – М.: , 0. – 0 с.
  26. Broadband Satellite Communication Systems and the Challenges of Mobility : IFIP TC6 Workshops on Broadband Satellite Communication Systems and Challenges ... Federation for Information Processing). – М.: , 2005. – 247 с.
  27. Handbook of Information and Communication Security. – М.: , 2010. – 800 с.
  28. Advancing Computing, Communication, Control and Management (Lecture Notes in Electrical Engineering). – М.: , 2010. – 294 с.
  29. Jan Kola?. Global Indexing of Topographic Surface: A discrete global grid indexing of topographic surface suitable for 3D visualization and analysis. – М.: , 2010. – 244 с.
  30. Jeanna Matthews. Computer Networking. – М.: , 2005. – 288 с.
  31. Food Network Kitchens. Food Network Favorites. – М.: , 2009. – 264 с.
  32. Larry L. Peterson. Computer Networks ISE. – М.: , 2010. – 848 с.
  33. Larry L. Peterson. Computer Networks. – М.: , 2010. – 848 с.
  34. Emad Aboelela. Computer networks bundle. – М.: , 2010. – 0 с.
  35. Graham King. Understanding and Designing Computer Networks. – М.: , 2010. – 224 с.
  36. Constance S. Hawke. Computer and Internet Use on Campus. – М.: , 2000. – 192 с.
  37. Robert M. Clark. Intelligence Analysis: A Target-Centric Approach. – М.: CQ Press, 2009. – 360 с.
  38. TL LOQUERY. Laquey: The Users Directory Of Computer ?networks? (pr Only). – М.: , 1990. – 646 с.
  39. JS QUARTERMAN. Quarterman: The ?matrix?: Computer Networks & Conferencing Systems Worldwid (pr Only). – М.: , 1989. – 752 с.
  40. Gerald D. Cole. Computer Networking for Systems Programmers. – М.: , 1990. – 242 с.
  41. David Claiborne. Mathematical Preliminaries for Computer Networking. – М.: , 1990. – 180 с.
  42. S MUFTIC. Muftic: ?security? Mechanisms For Computer Network S. – М.: , 1989. – 196 с.
  43. R COMPUTERS. Dehaene Computers In Radiology. – М.: , 1971. – 0 с.
  44. COMPUTER. Computer School ?mastering? Multiplan Tm (paper On Ly). – М.: , 1984. – 0 с.
  45. COMPUTER PART. Computer Partners: Handbook Of Cobol Techniques & Programming Standards 3ed (pr Only). – М.: , 1993. – 0 с.
  46. Pascale Vicat–Blanc Primet. Cluster and Computing Networks. – М.: , 2011. – 0 с.
  47. Computer Networks: A Top Down Approach. – М.: , 2011. – 0 с.
  48. Computer Networks: An Open Source Approach. – М.: , 2011. – 0 с.
  49. Schaum'S Outline Of Computer Networking. – М.: , 2002. – 304 с.
  50. Cea-Comptia Dhti+ Digital Home Technology Integrator All-In-One Exam Guide, Second Edition. – М.: , 2011. – 0 с.
  51. Eoghan Casey. Digital Evidence and Computer Crime. – М.: , . –  с.
  52. A. Heck, R. Boyd. Intelligent Information Retrieval: The Case of Astronomy and Related Space Sciences (Astrophysics and Space Science Library). – М.: Springer, 2002. – 224 с.
  53. Ben Jackson, Champ Clark. Asterisk Hacking. – М.: , 2007. – 272 с.
  54. Natalia Olifer, Victor Olifer. Computer Networks: Principles, Technologies and Protocols for Network Design. – М.: , 2006. – 1000 с.
  55. Ido Dubrawsky. How to Cheat at Securing Your Network. – М.: Syngress, 2007. – 432 с.
  56. FOOD NETWORK KITCHEN. CHOPPED COOKBOOK, THE. – М.: Clarkson Potter Publishers, 2014. –  с.
  57. Gurpreet Singh Saini and Manoj Kumar. Applications of Fuzzy Logic in Computer Network theory. – М.: LAP Lambert Academic Publishing, 2013. – 60 с.
  58. Shaek Rana Mohammad Baki Billah and Mohammad Hafizur Rahman. Design & Development of Network Security System using IP Tables. – М.: LAP Lambert Academic Publishing, 2013. – 164 с.
  59. Aitizaz Ali. Techniques for enhancing cooperative communication. – М.: LAP Lambert Academic Publishing, 2014. – 76 с.
  60. Mohammad Arif Hossain. A Dual-Rate Model Predictive Controller for Fieldbus Based DCS. – М.: LAP Lambert Academic Publishing, 2015. – 152 с.
  61. Theodoros Kostis. ISAR Simulators as Software-defined Countermeasure Systems. – М.: LAP Lambert Academic Publishing, 2010. – 228 с.
  62. Md. Nazmul Hasan and Sudeb Som. Analysis and Design of Backbone Network. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  63. Papori Rani Barooah. William Gibson’s Neuromancer As Cyberpunk: A Thematic Study. – М.: LAP Lambert Academic Publishing, 2013. – 340 с.
  64. Muhammad Zakaullah. Design of 20 G router on NETFPGA. – М.: LAP Lambert Academic Publishing, 2011. – 72 с.
  65. Mohammed Siham Rasheed and Akram N. Mohammed. Design of a Laser Based Free Space Communication System. – М.: LAP Lambert Academic Publishing, 2012. – 132 с.
  66. Ahmed Bayomy Zaky Ahmed,Hala Helmy Zayed and May Salama. Enhancing Video on Demand over Computer Networks. – М.: LAP Lambert Academic Publishing, 2013. – 128 с.
  67. Deepak Gupta and Payal Singla. Network of Scheduling Problems. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  68. Najmeh Malekmohammadi and Mahboubeh Farid. The Application of Data Envelopment Analysis to Queuing System. – М.: LAP Lambert Academic Publishing, 2014. – 60 с.
  69. Sudarshan Ranpise. Cyber Crime Prevention. – М.: LAP Lambert Academic Publishing, 2013. – 268 с.
  70. Charles Hays. Plaid Kilts and Black Leather Jackets. – М.: LAP Lambert Academic Publishing, 2010. – 180 с.
  71. Enrico Schiattarella. High-Performance Packet Switching Architectures. – М.: LAP Lambert Academic Publishing, 2011. – 140 с.
  72. Ashit Kumar Dutta and Abdul Rahaman Wahab Sait. Computer Networks from Scratch. – М.: LAP Lambert Academic Publishing, 2013. – 324 с.
  73. Swapan Debbarma,Madhumita Debbarma and Amit Debnath. Energy Efficient Management MAC. – М.: LAP Lambert Academic Publishing, 2013. – 88 с.
  74. Anil Kumar V. and Prasad E. Dynamic Broadcast Routing With Security Enhancement. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  75. Meftah Ur Rahman,Md. Imran Hossain and Sheikh Neyamat. A Comparative Analysis among Different Routing Protocols with QoS. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  76. Ahmad A. Hassan. Firewalls: Modeling and Management. – М.: LAP Lambert Academic Publishing, 2012. – 100 с.
  77. Janakiraman S. Distributed Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 164 с.
  78. Mohamed Rasslan,Yasser Dakroury and Heba Aslan. Group Key Distribution in Computer Networks. – М.: LAP Lambert Academic Publishing, 2012. – 212 с.
  79. Ammisetty Veeraswamy and Ammisetty Mahesh Babu. Introduction to Computer Networks. – М.: LAP Lambert Academic Publishing, 2012. – 208 с.
  80. Torruam Japheth Terande. Introduction to computer networking. – М.: LAP Lambert Academic Publishing, 2012. – 144 с.
  81. Mazen Mohammed,Alaa Eldin Rohiem and Ali El-moghazy. CSRTP. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  82. Mitul Choksi. Network Performance Tuning Techniques. – М.: LAP Lambert Academic Publishing, 2011. – 56 с.
  83. Seyi Osunade. Java-Based Mobile Agent Systems. – М.: LAP Lambert Academic Publishing, 2012. – 156 с.
  84. Syed Zahidur Rashid. Computer Network Security Monitoring. – М.: Scholars' Press, 2015. – 284 с.
  85. Sanjeev Karmakar and Manoj K. Kowar. A Comprehensive Lecture Notes on RSA-1024 Cryptography. – М.: LAP Lambert Academic Publishing, 2013. – 160 с.
  86. Mrutyunjaya Panda and Manas Ranjan Patra. A Data Mining Approach to Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2015. – 216 с.
  87. Chakchai So-In. Resource Allocation and Management in Computer Networks. – М.: LAP Lambert Academic Publishing, 2011. – 212 с.
  88. Mehmud Abliz. Denial of Service in Computer Networks. – М.: LAP Lambert Academic Publishing, 2011. – 84 с.
  89. Aaron Tureau. Evaluations of Synchronization Loss Equations on High-Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 60 с.
  90. Asad Mehmood. 20 Gbps NetFPGA Router. – М.: LAP Lambert Academic Publishing, 2012. – 52 с.
  91. Qutaiba Ibrahim and Ina'am Khudher. Network Simulation Guide. – М.: LAP Lambert Academic Publishing, 2011. – 340 с.
  92. Miguel A. Erazo. Leveraging Symbiotic Relationships for Emulation of Computer Networks. – М.: Scholars' Press, 2013. – 164 с.
  93. Trunal Patel. Computer Network. – М.: LAP Lambert Academic Publishing, 2012. – 572 с.
  94. Hanaa Abd Alaziz. Data Hiding and Applications. – М.: LAP Lambert Academic Publishing, 2013. – 172 с.
  95. Adil Adil Nazir Malik. Modeling and Simulation of computer Network Using OPNET. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  96. Shaffali Gupta and Sanmeet Kaur. A GUI Framework for detecting Intrusions using Bro IDS. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  97. Mahmoud Jazzar. Computer Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 240 с.
  98. Peter Kemei. Framework for Monitoring Hardware Firewall Functionality Using NIDS. – М.: LAP Lambert Academic Publishing, 2013. – 176 с.
  99. Asger Ali Syed and Sudip Mahajan. Concept of Networking. – М.: LAP Lambert Academic Publishing, 2013. – 180 с.
  100. Manish Gupta and Dharmendra Kumar. Design and Implementation of Digital Watermarking. – М.: LAP Lambert Academic Publishing, 2014. – 172 с.
  101. Firkhan Ali Hamid Ali. Vulnerability Analysis on the Computer Network Security. – М.: LAP Lambert Academic Publishing, 2010. – 72 с.
  102. Necati Demir and Gokhan Dalk?l?c. Design and Implementation of an Embedded Firewall. – М.: LAP Lambert Academic Publishing, 2011. – 108 с.
  103. Er. Preet Kanwal Singh,Er. Gurkamal Singh and Dr. Ripudaman Singh. Data Communication. – М.: LAP Lambert Academic Publishing, 2011. – 56 с.
  104. Jawahar Thakur. Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2011. – 84 с.
  105. Er. Surajit Borah. A Study Of Computer Networking At IOCL(AOD), Digboi(India). – М.: LAP Lambert Academic Publishing, 2011. – 64 с.
  106. Iftikhar Ahmad. Feature Subset Selection in Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 220 с.
  107. Sharmin Rashid Linta and Md.Ridgewan Khan Neuton. Today’s Impact on Communication System by IP Spoofing. – М.: LAP Lambert Academic Publishing, 2012. – 72 с.
  108. Firas Abdullah Thweny Al-Saedi and Ali Hadi Mohammed Al-Yasiri. DESIGN AND IMPLEMENTATION OF PSO BASED PID CONTROLLER FOR MA2000 ROBOT. – М.: LAP Lambert Academic Publishing, 2013. – 140 с.
  109. Paul Santi-Jones. Fractional FPGA Neural Networks. – М.: LAP Lambert Academic Publishing, 2009. – 228 с.
  110. Kirat Pal Singh. MIPS Pipeline Cryptoprocessor. – М.: LAP Lambert Academic Publishing, 2012. – 480 с.
  111. Kefa Rabah. ICT Technical Training to Address Unemployment in Kenya - Book II. – М.: LAP Lambert Academic Publishing, 2014. – 352 с.
  112. Syed Muntasir Husain Bokhari. Teaching. – М.: LAP Lambert Academic Publishing, 2009. – 80 с.
  113. Lotfi Ben Romdhane. Computational Networks and Competition-Based Models. – М.: LAP Lambert Academic Publishing, 2010. – 208 с.
  114. Arvind Maheshwari,Umesh Kumar Singh and Sumit Jain. Basic Computer Engineering. – М.: LAP Lambert Academic Publishing, 2012. – 376 с.
  115. Dongqing Yuan. Developing and Evaluating an Open Source Network. – М.: LAP Lambert Academic Publishing, 2012. – 148 с.
  116. Jerry Bent. Design and Simulation of a Secured and Robust Campus Area Network. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  117. Victoria Hodge. Outlier and Anomaly Detection. – М.: LAP Lambert Academic Publishing, 2011. – 112 с.
  118. Nick-Naser Manochehri. Web-Based Learning(WBL) vs Traditional Instructor-Based Learning(IBL). – М.: LAP Lambert Academic Publishing, 2012. – 132 с.
  119. Dalibor Dobrilovic. Modeling virtual network laboratory based on virtualization technology. – М.: LAP Lambert Academic Publishing, 2012. – 236 с.
  120. Pankaj Bhambri and Sukhjit Singh. Fundamentals of Information Technology. – М.: LAP Lambert Academic Publishing, 2013. – 252 с.
  121. Shuyuan Mary Ho. Cyber Insider Threat: Trustworthiness in Virtual Organizations. – М.: LAP Lambert Academic Publishing, 2014. – 436 с.
  122. MD UDDIN. COMPUTER NETWORKING AND MANAGEMENT. – М.: LAP Lambert Academic Publishing, 2010. – 44 с.
  123. Ayankunle Adegbite Taiwo. Performance Modeling of a wired Local Area Network. – М.: LAP Lambert Academic Publishing, 2012. – 100 с.
  124. Dhanavandan S. Bibliometric Analysis of Information Systems. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  125. Josphat Kyalo. Management Structures. – М.: LAP Lambert Academic Publishing, 2013. – 88 с.
  126. Jan Kolar. Global Indexing of Topographic Surface. – М.: LAP Lambert Academic Publishing, 2010. – 244 с.
  127. Radu Mardare. Logical Analysis of Complex Concurrent Systems. – М.: LAP Lambert Academic Publishing, 2010. – 244 с.
  128. SUBRAMANIAM ARUNACHALAM and Tom Page. An Application of Data Mining Techniques in Data Warehousing. – М.: LAP Lambert Academic Publishing, 2010. – 84 с.
  129. Jakub Tomczak. Algorithms for Knowledge Extraction Using Relation Identification. – М.: LAP Lambert Academic Publishing, 2010. – 100 с.
  130. FARAZ ZAIDI. Analysis, Structure and Organization of Complex Networks. – М.: LAP Lambert Academic Publishing, 2011. – 156 с.
  131. Mustafa Khan and Muhammad Irfan Younas Mughal. Content Distribution Network''s Technology (CDN). – М.: LAP Lambert Academic Publishing, 2010. – 88 с.
  132. Otto Dostal. ICT Systems Monitoring. – М.: LAP Lambert Academic Publishing, 2012. – 176 с.
  133. Navneet kaur Bajwa. Sanitization of Data in Computer Network. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  134. Chandran Velmurugan and M. Kannan. Nambatya Prosscoviainternet Based Resources for School Libraries. – М.: LAP Lambert Academic Publishing, 2014. – 152 с.
  135. Palanivel Kodeswaran. On the Use of Context and Policies in Declarative Networked Systems. – М.: LAP Lambert Academic Publishing, 2012. – 112 с.
  136. Vadim Tarasov. Economic Security: Case of Russia. – М.: LAP Lambert Academic Publishing, 2013. – 112 с.
  137. Gustav Cepciansky and Ladislav Schwartz. Stochastic processes with discrete states. – М.: LAP Lambert Academic Publishing, 2013. – 116 с.
  138. Marcellin Mugabe. The Total Cost of Ownership (TCO) of Computer Networks in Colleges. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  139. KELVIN UKOIMA and GRAHAM-DOUGLAS MAC-DONNEL. An E-Commerce Application With Internet SMS. – М.: , 2011. – 108 с.
  140. Asrani Lit,Fariza Mahyan and Termimi Hidayat Mahyan. Delay Aware Topology Generation for Network on Chip. – М.: , 2015. – 72 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Основной арсенал "охотника" - его network: кого он знает на рынке и качество этих отношений. С. Плетнева, "Управление персоналом", № 12, июнь 2009.

Образцы работ

Тема и предметТип и объем работы
Понятие и история брендинга. Анализ создания и стратегия продвижения бренда ***
Электроснабжение городов и промышленных предприятий
Другое
72 стр.
Математические модели океанических течений
Переводоведение (теория перевода)
Курсовая работа
42 стр.
Комплекс маркетинговых коммуникаций в продвижении цифровых СМИ
Маркетинг
Диплом
74 стр.
Продвижение брендов в шоу-бизнесе
Электроснабжение городов и промышленных предприятий
Диплом
79 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Валентина
Хочу сказать вам огромное спасибо за помощь и сопровождение диплома! Диплом после вашего сопровождения я защитила, все хорошо.