Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с.
  2. Ido Dubrawsky. How to Cheat at Securing Your Network. – М.: Syngress, 2007. – 432 с.
  3. Anup Bhange and Manmeet Kaur Marhas. Anomaly Detection in Network Traffic; A Statistical Approach. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  4. Tanmoy Hazra. Application of PCA in IDS. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  5. M. Sadiq Ali Khan and S. M. Aqil Burney. Recent Trends in Intrusion Detection System & Network Monitoring. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  6. Sumaya Saad Sulaiman and Sarab M. Hameed. A Fuzzy Based Clustering for Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  7. Heba Fathy Eid. Computational Intelligence in Network Intrusion Detection System. – М.: Scholars' Press, 2014. – 164 с.
  8. Janakiraman S. Distributed Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 164 с.
  9. Yogesh Kumar,Krishan Kumar and Gulshan Kumar. Feature Selection For Intrusion Detection Systems. – М.: LAP Lambert Academic Publishing, 2014. – 100 с.
  10. Syed Zahidur Rashid. Computer Network Security Monitoring. – М.: Scholars' Press, 2015. – 284 с.
  11. K. Shaila and K. R. Venugopal. Secure Data Communication in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2014. – 240 с.
  12. Mrutyunjaya Panda and Manas Ranjan Patra. A Data Mining Approach to Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2015. – 216 с.
  13. Glenn Wilkinson. Identification of Hostile TCP Traffic using Support Vector Machines. – М.: LAP Lambert Academic Publishing, 2010. – 80 с.
  14. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  15. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  16. Shaffali Gupta and Sanmeet Kaur. A GUI Framework for detecting Intrusions using Bro IDS. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  17. Mahmoud Jazzar. Computer Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 240 с.
  18. Nasim Beigi-Mohammadi. Smart Meter Networks: Intrusion Detection System by Design. – М.: LAP Lambert Academic Publishing, 2014. – 136 с.
  19. Iftikhar Ahmad. Feature Subset Selection in Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 220 с.
  20. Saima Munawar. Detection and Classification Of Normal and Anomaly IP Packet. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  21. Jabarweer Singh,Krishan Kumar and Gulshan Kumar. Intrusion detection using artificial intelligence based ensembles. – М.: LAP Lambert Academic Publishing, 2014. – 116 с.
  22. Homam El-Taj and Omar Amer. Network Alert Management System For IDS False Positive Reduction. – М.: LAP Lambert Academic Publishing, 2013. – 156 с.
  23. Muna Elsadig Mohamed Ahmed Elsheik. Bio Inspired Intrusion Prevention and Self healing System for Networks. – М.: LAP Lambert Academic Publishing, 2012. – 256 с.
  24. Tigabu Dagne Akal. Constructing Predictive Model for Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 160 с.
  25. Kamrul Hasan. An Investigation into Botnet Detection System. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  26. Rupali Pathak. Recent Advances In Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  27. Joao Antunes. Network Attack Injection. – М.: Scholars' Press, 2013. – 268 с.
  28. Sathish Kumar. Intrusion Detection and Response Techniques for Mobile Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 200 с.
  29. Khandakar Entenam Unayes Ahmed. IDENTITY AND ACCESS MANAGEMENT IN CLOUD COMPUTING. – М.: LAP Lambert Academic Publishing, 2011. – 172 с.

Дополнительные результаты

  1. Passive and Active Measurement: 13th International Conference, PAM 2012, Vienna, Austria, March 12-14, 2012, Proceedings (Lecture Notes in Computer ... Networks and Telecommunications). – М.: , 2012. – 290 с.
  2. Constance S. Hawke, Constance S. Hawke. Computer and Internet Use on Campus: A Legal Guide to Issues of Intellectual Property, Free Speech, and Privacy. – М.: , 0. – 0 с.
  3. John K. Waters, John K. Waters. John Chambers and the Cisco Way: Navigating Through Volatility. – М.: , 0. – 0 с.
  4. Safe Schools: A Security and Loss Prevention Plan. – М.: , 0. – 0 с.
  5. Kenneth C. Mansfield, James L. Antonakos. Introduction to Computers for Engineering and Technology. – М.: , 0. – 0 с.
  6. Ilkka Tuomi. Networks of Innovation: Change and Meaning in the Age of the Internet. – М.: , 2003. – 0 с.
  7. John Ross, John A. Ross. Computer Networks for Small Business. – М.: , 0. – 0 с.
  8. Dorothy E. Denning, Peter J. Denning. Internet Besieged. – М.: , 0. – 0 с.
  9. Janet G. Butler. Enterprisewide Network Management. – М.: , 0. – 0 с.
  10. Peter Varhol. Network-Centric Computing: Preparing the Enterprise for the Next Millennium. – М.: , 0. – 0 с.
  11. Paul Fortier, Howard Michel. Computer Systems Performance Evaluation and Prediction. – М.: , 0. – 0 с.
  12. Michal Pioro, Deepankar Medhi. Routing, Flow, and Capacity Design in Communication and Computer Networks. – М.: Elsevier Digital Press, 0. – 794 с.
  13. John W Farber. Essential Electronics For PC Technicians (Electrical and Computer Engineering Series). – М.: , 2004. – 0 с.
  14. Xiaoqiang Cai, Dan Sha, C.K. Wong. Time-Varying Network Optimization (International Series in Operations Research & Management Science). – М.: , 2007. – 248 с.
  15. Paul Piccard, Jeremy Faircloth. Combating Spyware in the Enterprise. – М.: , 2006. – 386 с.
  16. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с.
  17. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с.
  18. Computer & Network Procedures to Manage IT Systems. – М.: , 2008. – 720 с.
  19. Trust, Privacy and Security in Digital Business: 5th International Conference, TrustBus 2008 Turin, Italy, September 1-5, 2008, Proceedings (Lecture Notes in Computer Science). – М.: , 2008. – 205 с.
  20. Mark A. Franklin, Patrick Crowley, Haldun Hadimioglu, Peter Z. Onufryk. Network Processor Design, Volume 3: Issues and Practices. – М.: Morgan Kaufmann, 2005. – 336 с.
  21. Advancing Computing, Communication, Control and Management (Lecture Notes in Electrical Engineering). – М.: , 2010. – 294 с.
  22. Jeanna Matthews. Computer Networking. – М.: , 2005. – 288 с.
  23. Rory Bray. OSSEC Host-Based Intrusion Detection Guide. – М.: , 2010. – 416 с.
  24. Syngress. Snort Intrusion Detection 2.0. – М.: , 2010. – 550 с.
  25. Larry L. Peterson. Computer Networks ISE. – М.: , 2010. – 848 с.
  26. Larry L. Peterson. Computer Networks. – М.: , 2010. – 848 с.
  27. Brian Caswell. Snort Intrusion Detection and Prevention Toolkit. – М.: , 2010. – 768 с.
  28. Emad Aboelela. Computer networks bundle. – М.: , 2010. – 0 с.
  29. Graham King. Understanding and Designing Computer Networks. – М.: , 2010. – 224 с.
  30. Robert Barnard. Intrusion Detection Systems. – М.: , 2010. – 480 с.
  31. Constance S. Hawke. Computer and Internet Use on Campus. – М.: , 2000. – 192 с.
  32. Terry Escamilla. Intrusion Detection. – М.: , 1998. – 368 с.
  33. TL LOQUERY. Laquey: The Users Directory Of Computer ?networks? (pr Only). – М.: , 1990. – 646 с.
  34. JS QUARTERMAN. Quarterman: The ?matrix?: Computer Networks & Conferencing Systems Worldwid (pr Only). – М.: , 1989. – 752 с.
  35. Gerald D. Cole. Computer Networking for Systems Programmers. – М.: , 1990. – 242 с.
  36. David Claiborne. Mathematical Preliminaries for Computer Networking. – М.: , 1990. – 180 с.
  37. S MUFTIC. Muftic: ?security? Mechanisms For Computer Network S. – М.: , 1989. – 196 с.
  38. Pascale Vicat–Blanc Primet. Cluster and Computing Networks. – М.: , 2011. – 0 с.
  39. Computer Networks: A Top Down Approach. – М.: , 2011. – 0 с.
  40. Computer Networks: An Open Source Approach. – М.: , 2011. – 0 с.
  41. Gray Hat Hacking The Ethical Hackers Handbook, 3Rd Edition. – М.: , 2011. – 720 с.
  42. Principles Of Computer Security Comptia Security+ And Beyond Lab Manual, Second Edition. – М.: , 2011. – 352 с.
  43. Fundamentals Of Network Security. – М.: , 2011. – 672 с.
  44. Eoghan Casey. Digital Evidence and Computer Crime. – М.: , . –  с.
  45. Greg Holden. Guide to Firewalls and Network Security: Intrusion Detection and VPNs. – М.: Course Technology, 2003. – 512 с.
  46. Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky. Cisco Security Professional's Guide to Secure Intrusion Detection Systems. – М.: , . –  с.
  47. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . –  с.
  48. Natalia Olifer, Victor Olifer. Computer Networks: Principles, Technologies and Protocols for Network Design. – М.: , 2006. – 1000 с.
  49. Ido Dubrawsky. How to Cheat at Securing Your Network. – М.: Syngress, 2007. – 432 с.
  50. Gurpreet Singh Saini and Manoj Kumar. Applications of Fuzzy Logic in Computer Network theory. – М.: LAP Lambert Academic Publishing, 2013. – 60 с.
  51. Anup Bhange and Manmeet Kaur Marhas. Anomaly Detection in Network Traffic; A Statistical Approach. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  52. Gulshan Kumar. Effective Intrusion Detection using Genetic Algorithms. – М.: LAP Lambert Academic Publishing, 2014. – 100 с.
  53. Tanmoy Hazra. Application of PCA in IDS. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  54. Shaek Rana Mohammad Baki Billah and Mohammad Hafizur Rahman. Design & Development of Network Security System using IP Tables. – М.: LAP Lambert Academic Publishing, 2013. – 164 с.
  55. Ayman A. El-Saleh. Multi-Objective Evolutionary Algorithms for Cognitive Radio Networks. – М.: Scholars' Press, 2013. – 208 с.
  56. Sampath V.P. FPGA Based Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  57. Huang-Chun Roan. Network Intrusion Detection Based on Shift-OR Circuit. – М.: LAP Lambert Academic Publishing, 2011. – 60 с.
  58. M. Sadiq Ali Khan and S. M. Aqil Burney. Recent Trends in Intrusion Detection System & Network Monitoring. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  59. Md. Nazmul Hasan and Sudeb Som. Analysis and Design of Backbone Network. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  60. Ahmed Bayomy Zaky Ahmed,Hala Helmy Zayed and May Salama. Enhancing Video on Demand over Computer Networks. – М.: LAP Lambert Academic Publishing, 2013. – 128 с.
  61. Deepak Gupta and Payal Singla. Network of Scheduling Problems. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  62. Linan Zhong,Hao Zhao and Wenhuai Shen. Computation of the Stable Homotopy Groups of Spheres. – М.: LAP Lambert Academic Publishing, 2014. – 96 с.
  63. Abhay Nath Singh. Honeypot Based Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  64. Ashit Kumar Dutta and Abdul Rahaman Wahab Sait. Computer Networks from Scratch. – М.: LAP Lambert Academic Publishing, 2013. – 324 с.
  65. Shahnawaz Husain,S. C. Gupta and R. C. Joshi. Intrusion Detection Engine for Adhoc Environment. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  66. Sumaya Saad Sulaiman and Sarab M. Hameed. A Fuzzy Based Clustering for Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  67. Shubha Puthran and Ketan Shah. Intrusion Detection System using datamining techniques. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  68. Mohammad S. I. Mamun. Intrusion Detection System Architecture in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  69. Heba Fathy Eid. Computational Intelligence in Network Intrusion Detection System. – М.: Scholars' Press, 2014. – 164 с.
  70. Janakiraman S. Distributed Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 164 с.
  71. Ammisetty Veeraswamy and Ammisetty Mahesh Babu. Introduction to Computer Networks. – М.: LAP Lambert Academic Publishing, 2012. – 208 с.
  72. Torruam Japheth Terande. Introduction to computer networking. – М.: LAP Lambert Academic Publishing, 2012. – 144 с.
  73. Yogesh Kumar,Krishan Kumar and Gulshan Kumar. Feature Selection For Intrusion Detection Systems. – М.: LAP Lambert Academic Publishing, 2014. – 100 с.
  74. Srikanth Hariharan,Ness B. Shroff and Saurabh Bagchi. Secure Neighbor Discovery in Wireless Networks. – М.: LAP Lambert Academic Publishing, 2011. – 52 с.
  75. Saad Usman. Spatio Temporal Anomaly Detector. – М.: LAP Lambert Academic Publishing, 2011. – 84 с.
  76. Mitul Choksi. Network Performance Tuning Techniques. – М.: LAP Lambert Academic Publishing, 2011. – 56 с.
  77. Syed Zahidur Rashid. Computer Network Security Monitoring. – М.: Scholars' Press, 2015. – 284 с.
  78. K. Shaila and K. R. Venugopal. Secure Data Communication in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2014. – 240 с.
  79. Lanier Watkins. Resource Discovery: Using Network Traffic To Infer CPU And Memory Load. – М.: LAP Lambert Academic Publishing, 2014. – 96 с.
  80. Gulshan Kumar. Effective Intrusion Detection using Feature Selection. – М.: LAP Lambert Academic Publishing, 2014. – 92 с.
  81. Mrutyunjaya Panda and Manas Ranjan Patra. A Data Mining Approach to Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2015. – 216 с.
  82. Glenn Wilkinson. Identification of Hostile TCP Traffic using Support Vector Machines. – М.: LAP Lambert Academic Publishing, 2010. – 80 с.
  83. Chakchai So-In. Resource Allocation and Management in Computer Networks. – М.: LAP Lambert Academic Publishing, 2011. – 212 с.
  84. Mehmud Abliz. Denial of Service in Computer Networks. – М.: LAP Lambert Academic Publishing, 2011. – 84 с.
  85. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  86. Aaron Tureau. Evaluations of Synchronization Loss Equations on High-Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 60 с.
  87. Ivano Malavolta. A tamper resistant Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2011. – 144 с.
  88. Qutaiba Ibrahim and Ina'am Khudher. Network Simulation Guide. – М.: LAP Lambert Academic Publishing, 2011. – 340 с.
  89. Miguel A. Erazo. Leveraging Symbiotic Relationships for Emulation of Computer Networks. – М.: Scholars' Press, 2013. – 164 с.
  90. Trunal Patel. Computer Network. – М.: LAP Lambert Academic Publishing, 2012. – 572 с.
  91. Adil Adil Nazir Malik. Modeling and Simulation of computer Network Using OPNET. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  92. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  93. Shaffali Gupta and Sanmeet Kaur. A GUI Framework for detecting Intrusions using Bro IDS. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  94. Mahmoud Jazzar. Computer Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 240 с.
  95. Siva S. Sivatha Sindhu,S. Geetha and S. Selvakumar. Network Intrusion Detection System using Machine Learning Techniques. – М.: LAP Lambert Academic Publishing, 2013. – 80 с.
  96. Asger Ali Syed and Sudip Mahajan. Concept of Networking. – М.: LAP Lambert Academic Publishing, 2013. – 180 с.
  97. Vincent Omollo. Enhanced Network Security. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  98. Nasim Beigi-Mohammadi. Smart Meter Networks: Intrusion Detection System by Design. – М.: LAP Lambert Academic Publishing, 2014. – 136 с.
  99. Firkhan Ali Hamid Ali. Vulnerability Analysis on the Computer Network Security. – М.: LAP Lambert Academic Publishing, 2010. – 72 с.
  100. Christian Chetachi Umunna. Distributed Intrusion Detection System in Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 104 с.
  101. Jawahar Thakur. Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2011. – 84 с.
  102. Er. Surajit Borah. A Study Of Computer Networking At IOCL(AOD), Digboi(India). – М.: LAP Lambert Academic Publishing, 2011. – 64 с.
  103. Iftikhar Ahmad. Feature Subset Selection in Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 220 с.
  104. Sharmin Rashid Linta and Md.Ridgewan Khan Neuton. Today’s Impact on Communication System by IP Spoofing. – М.: LAP Lambert Academic Publishing, 2012. – 72 с.
  105. Saima Munawar. Detection and Classification Of Normal and Anomaly IP Packet. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  106. Jabarweer Singh,Krishan Kumar and Gulshan Kumar. Intrusion detection using artificial intelligence based ensembles. – М.: LAP Lambert Academic Publishing, 2014. – 116 с.
  107. Paul Santi-Jones. Fractional FPGA Neural Networks. – М.: LAP Lambert Academic Publishing, 2009. – 228 с.
  108. Govind Sreekar Shenoy. Architecture Support for Intrusion Detection systems. – М.: LAP Lambert Academic Publishing, 2014. – 160 с.
  109. Lotfi Ben Romdhane. Computational Networks and Competition-Based Models. – М.: LAP Lambert Academic Publishing, 2010. – 208 с.
  110. Arvind Maheshwari,Umesh Kumar Singh and Sumit Jain. Basic Computer Engineering. – М.: LAP Lambert Academic Publishing, 2012. – 376 с.
  111. Monis Akhlaq,Irfan Awan and Faeiz Alserhani. Improved Performance High Speed Network Intrusion Detection Systems. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  112. Prakash Prasad. Intrusion Detection System: Findings. – М.: LAP Lambert Academic Publishing, 2011. – 104 с.
  113. Homam El-Taj and Omar Amer. Network Alert Management System For IDS False Positive Reduction. – М.: LAP Lambert Academic Publishing, 2013. – 156 с.
  114. Dongqing Yuan. Developing and Evaluating an Open Source Network. – М.: LAP Lambert Academic Publishing, 2012. – 148 с.
  115. Sultan H. Aljahdali and Mohd. Junedul Haque. Intelligent Approaches to Data Management. – М.: LAP Lambert Academic Publishing, 2013. – 116 с.
  116. Jerry Bent. Design and Simulation of a Secured and Robust Campus Area Network. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  117. Bibi Masoomeh Aslahi Shahri. Intrusion Detection System Using Hybrid Gsa-kmeans. – М.: LAP Lambert Academic Publishing, 2014. – 128 с.
  118. M. Elena Martinez-Perez. Computer Analysis of the Geometry of the Retinal Vasculature. – М.: LAP Lambert Academic Publishing, 2011. – 192 с.
  119. Victoria Hodge. Outlier and Anomaly Detection. – М.: LAP Lambert Academic Publishing, 2011. – 112 с.
  120. Tigabu Dagne Akal. Constructing Predictive Model for Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 160 с.
  121. Dalibor Dobrilovic. Modeling virtual network laboratory based on virtualization technology. – М.: LAP Lambert Academic Publishing, 2012. – 236 с.
  122. Kamrul Hasan. An Investigation into Botnet Detection System. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  123. MD UDDIN. COMPUTER NETWORKING AND MANAGEMENT. – М.: LAP Lambert Academic Publishing, 2010. – 44 с.
  124. Ayankunle Adegbite Taiwo. Performance Modeling of a wired Local Area Network. – М.: LAP Lambert Academic Publishing, 2012. – 100 с.
  125. Rupali Pathak. Recent Advances In Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  126. Josphat Kyalo. Management Structures. – М.: LAP Lambert Academic Publishing, 2013. – 88 с.
  127. Aftab Yaseen,S. M. Zakariya and M. Q. Rafiq. Association Rules Mining for AIS based Classification. – М.: LAP Lambert Academic Publishing, 2013. – 100 с.
  128. Mohamed Nassar. Voice over IP Networks Monitoring. – М.: LAP Lambert Academic Publishing, 2009. – 172 с.
  129. vudasreenivasa rao. DISTRIBUTED DATA MINING AND MINING MULTI-AGENT DATA. – М.: LAP Lambert Academic Publishing, 2011. – 152 с.
  130. Al-Sakib Khan Pathan. Securing WSN with Lightweight Resource-Efficient Schemes. – М.: LAP Lambert Academic Publishing, 2011. – 116 с.
  131. Sathish Kumar. Intrusion Detection and Response Techniques for Mobile Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 200 с.
  132. Richard Rimiru. Exploring Immune System's Concepts for the Design of Novel AIS Models. – М.: LAP Lambert Academic Publishing, 2012. – 164 с.
  133. FARAZ ZAIDI. Analysis, Structure and Organization of Complex Networks. – М.: LAP Lambert Academic Publishing, 2011. – 156 с.
  134. Mustafa Khan and Muhammad Irfan Younas Mughal. Content Distribution Network''s Technology (CDN). – М.: LAP Lambert Academic Publishing, 2010. – 88 с.
  135. Khandakar Entenam Unayes Ahmed. IDENTITY AND ACCESS MANAGEMENT IN CLOUD COMPUTING. – М.: LAP Lambert Academic Publishing, 2011. – 172 с.
  136. Navneet kaur Bajwa. Sanitization of Data in Computer Network. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  137. Palanivel Kodeswaran. On the Use of Context and Policies in Declarative Networked Systems. – М.: LAP Lambert Academic Publishing, 2012. – 112 с.
  138. Marcellin Mugabe. The Total Cost of Ownership (TCO) of Computer Networks in Colleges. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  139. Kishor Shrestha,Pramen Shrestha and Evangelos Yfantis. Framework Development for Construction Safety Visualization. – М.: LAP Lambert Academic Publishing, 2014. – 60 с.
  140. Asrani Lit,Fariza Mahyan and Termimi Hidayat Mahyan. Delay Aware Topology Generation for Network on Chip. – М.: , 2015. – 72 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Основной арсенал "охотника" - его network: кого он знает на рынке и качество этих отношений. С. Плетнева, "Управление персоналом", № 12, июнь 2009.

Образцы работ

Тема и предметТип и объем работы
Коммерческие банки как субъект кредитного рынка, их операции и сделки
Банковский менеджмент
Диплом
87 стр.
Понятие и история брендинга. Анализ создания и стратегия продвижения бренда ***
Электроснабжение городов и промышленных предприятий
Другое
72 стр.
Математические модели океанических течений
Переводоведение (теория перевода)
Курсовая работа
42 стр.
Комплекс маркетинговых коммуникаций в продвижении цифровых СМИ
Маркетинг
Диплом
74 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Ирина, 04.06
Марина, здравствуйте! Мы защитились!!!! На 5!!! СПАСИБО БОЛЬШОЕ!!!!!!!! От меня и от Жени.