Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Larry L. Peterson. Computer Networks ISE. – М.: , 2010. – 848 с.
  2. Kwabena Doku-Amponsah. Basic information theory, thermo-limits for network structures. – М.: LAP Lambert Academic Publishing, 2012. – 184 с.
  3. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.

Дополнительные результаты

  1. Passive and Active Measurement: 13th International Conference, PAM 2012, Vienna, Austria, March 12-14, 2012, Proceedings (Lecture Notes in Computer ... Networks and Telecommunications). – М.: , 2012. – 290 с.
  2. Constance S. Hawke, Constance S. Hawke. Computer and Internet Use on Campus: A Legal Guide to Issues of Intellectual Property, Free Speech, and Privacy. – М.: , 0. – 0 с.
  3. Margaret Wheatley, Paula Griffin, Kristine Quade, National OD Network. Organization Development at Work: Conversations on the Values, Applications, and Future of OD (J-B O-D (Organizational Development)). – М.: Pfeiffer, 2003. – 224 с.
  4. Structural Adjustment Participatory Review International Network. Structural Adjustment, the Sapri Report: The Policy Roots of Economic Crisis, Poverty and Inequality. – М.: , 0. – 0 с.
  5. John K. Waters, John K. Waters. John Chambers and the Cisco Way: Navigating Through Volatility. – М.: , 0. – 0 с.
  6. Carl Bergquist. Guide to Electronic Surveillance Devices. – М.: Prompt (DPI - 8/01), 2002. – 280 с.
  7. Kenneth C. Mansfield, James L. Antonakos. Introduction to Computers for Engineering and Technology. – М.: , 0. – 0 с.
  8. Ilkka Tuomi. Networks of Innovation: Change and Meaning in the Age of the Internet. – М.: , 2003. – 0 с.
  9. Ifip Working Conference on Infrastructures for Virtual Organizations 2, Hamideh Afsarmanesh, Richardo J. Rabelo, Luis M. Camarinha-Matos, Luis Camarinha-Matos, Ricardo J. Rabelo. E-Business and Virtual Enterprises - Managing Business-to-Business Cooperation (International Federation For Information Processing Volume 184). – М.: , 0. – 0 с.
  10. Business Women's Network, WorkingWoman Network. Business Women's Network 2001 International Directory. – М.: , 0. – 0 с.
  11. John Ross, John A. Ross. Computer Networks for Small Business. – М.: , 0. – 0 с.
  12. Martin Kenney. Understanding Silicon Valley: The Anatomy of an Entrepreneurial Region. – М.: Stanford Business Books, 2000. – 304 с.
  13. Roland Traunmuller, R. Traunmuller, Quebec) Ifip World Computer Congress 2002 Montreal. Information Systems: The E-Business Challenge (International Federation for Information Processing, 95). – М.: , 0. – 0 с.
  14. Janet G. Butler. Enterprisewide Network Management. – М.: , 0. – 0 с.
  15. Peter Varhol. Network-Centric Computing: Preparing the Enterprise for the Next Millennium. – М.: , 0. – 0 с.
  16. Paul Fortier, Howard Michel. Computer Systems Performance Evaluation and Prediction. – М.: , 0. – 0 с.
  17. Michal Pioro, Deepankar Medhi. Routing, Flow, and Capacity Design in Communication and Computer Networks. – М.: Elsevier Digital Press, 0. – 794 с.
  18. John W Farber. Essential Electronics For PC Technicians (Electrical and Computer Engineering Series). – М.: , 2004. – 0 с.
  19. Xiaoqiang Cai, Dan Sha, C.K. Wong. Time-Varying Network Optimization (International Series in Operations Research & Management Science). – М.: , 2007. – 248 с.
  20. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с.
  21. The Transition Network, Gail Rentsch. Smart Women Don't Retire -- They Break Free: From Working Full-Time to Living Full-Time. – М.: , 2008. – 272 с.
  22. Computer & Network Procedures to Manage IT Systems. – М.: , 2008. – 720 с.
  23. Innovation in Complex Social Systems (Routledge Studies in Global Competition). – М.: , 2010. – 352 с.
  24. И.С. Башмакова. Английский язык для студентов технических вузов (+ 2 CD-ROM). – М.: Омега-Л, Филоматис, 2010. – 456 с.
  25. Jeff Crume. Inside Internet Security: What Hackers Don't Want You To Know. – М.: , 0. – 0 с.
  26. Broadband Satellite Communication Systems and the Challenges of Mobility : IFIP TC6 Workshops on Broadband Satellite Communication Systems and Challenges ... Federation for Information Processing). – М.: , 2005. – 247 с.
  27. Handbook of Information and Communication Security. – М.: , 2010. – 800 с.
  28. Advancing Computing, Communication, Control and Management (Lecture Notes in Electrical Engineering). – М.: , 2010. – 294 с.
  29. Jan Kola?. Global Indexing of Topographic Surface: A discrete global grid indexing of topographic surface suitable for 3D visualization and analysis. – М.: , 2010. – 244 с.
  30. Jeanna Matthews. Computer Networking. – М.: , 2005. – 288 с.
  31. Food Network Kitchens. Food Network Favorites. – М.: , 2009. – 264 с.
  32. Larry L. Peterson. Computer Networks ISE. – М.: , 2010. – 848 с.
  33. Larry L. Peterson. Computer Networks. – М.: , 2010. – 848 с.
  34. Emad Aboelela. Computer networks bundle. – М.: , 2010. – 0 с.
  35. Graham King. Understanding and Designing Computer Networks. – М.: , 2010. – 224 с.
  36. Constance S. Hawke. Computer and Internet Use on Campus. – М.: , 2000. – 192 с.
  37. Robert M. Clark. Intelligence Analysis: A Target-Centric Approach. – М.: CQ Press, 2009. – 360 с.
  38. TL LOQUERY. Laquey: The Users Directory Of Computer ?networks? (pr Only). – М.: , 1990. – 646 с.
  39. JS QUARTERMAN. Quarterman: The ?matrix?: Computer Networks & Conferencing Systems Worldwid (pr Only). – М.: , 1989. – 752 с.
  40. Gerald D. Cole. Computer Networking for Systems Programmers. – М.: , 1990. – 242 с.
  41. David Claiborne. Mathematical Preliminaries for Computer Networking. – М.: , 1990. – 180 с.
  42. S MUFTIC. Muftic: ?security? Mechanisms For Computer Network S. – М.: , 1989. – 196 с.
  43. R COMPUTERS. Dehaene Computers In Radiology. – М.: , 1971. – 0 с.
  44. COMPUTER. Computer School ?mastering? Multiplan Tm (paper On Ly). – М.: , 1984. – 0 с.
  45. COMPUTER PART. Computer Partners: Handbook Of Cobol Techniques & Programming Standards 3ed (pr Only). – М.: , 1993. – 0 с.
  46. Pascale Vicat–Blanc Primet. Cluster and Computing Networks. – М.: , 2011. – 0 с.
  47. Computer Networks: A Top Down Approach. – М.: , 2011. – 0 с.
  48. Computer Networks: An Open Source Approach. – М.: , 2011. – 0 с.
  49. Schaum'S Outline Of Computer Networking. – М.: , 2002. – 304 с.
  50. Cea-Comptia Dhti+ Digital Home Technology Integrator All-In-One Exam Guide, Second Edition. – М.: , 2011. – 0 с.
  51. Eoghan Casey. Digital Evidence and Computer Crime. – М.: , . –  с.
  52. A. Heck, R. Boyd. Intelligent Information Retrieval: The Case of Astronomy and Related Space Sciences (Astrophysics and Space Science Library). – М.: Springer, 2002. – 224 с.
  53. Ben Jackson, Champ Clark. Asterisk Hacking. – М.: , 2007. – 272 с.
  54. Natalia Olifer, Victor Olifer. Computer Networks: Principles, Technologies and Protocols for Network Design. – М.: , 2006. – 1000 с.
  55. Ido Dubrawsky. How to Cheat at Securing Your Network. – М.: Syngress, 2007. – 432 с.
  56. FOOD NETWORK KITCHEN. CHOPPED COOKBOOK, THE. – М.: Clarkson Potter Publishers, 2014. –  с.
  57. Gurpreet Singh Saini and Manoj Kumar. Applications of Fuzzy Logic in Computer Network theory. – М.: LAP Lambert Academic Publishing, 2013. – 60 с.
  58. Shaek Rana Mohammad Baki Billah and Mohammad Hafizur Rahman. Design & Development of Network Security System using IP Tables. – М.: LAP Lambert Academic Publishing, 2013. – 164 с.
  59. Aitizaz Ali. Techniques for enhancing cooperative communication. – М.: LAP Lambert Academic Publishing, 2014. – 76 с.
  60. Mohammad Arif Hossain. A Dual-Rate Model Predictive Controller for Fieldbus Based DCS. – М.: LAP Lambert Academic Publishing, 2015. – 152 с.
  61. Theodoros Kostis. ISAR Simulators as Software-defined Countermeasure Systems. – М.: LAP Lambert Academic Publishing, 2010. – 228 с.
  62. Md. Nazmul Hasan and Sudeb Som. Analysis and Design of Backbone Network. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  63. Papori Rani Barooah. William Gibson’s Neuromancer As Cyberpunk: A Thematic Study. – М.: LAP Lambert Academic Publishing, 2013. – 340 с.
  64. Muhammad Zakaullah. Design of 20 G router on NETFPGA. – М.: LAP Lambert Academic Publishing, 2011. – 72 с.
  65. Mohammed Siham Rasheed and Akram N. Mohammed. Design of a Laser Based Free Space Communication System. – М.: LAP Lambert Academic Publishing, 2012. – 132 с.
  66. Ahmed Bayomy Zaky Ahmed,Hala Helmy Zayed and May Salama. Enhancing Video on Demand over Computer Networks. – М.: LAP Lambert Academic Publishing, 2013. – 128 с.
  67. Deepak Gupta and Payal Singla. Network of Scheduling Problems. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  68. Najmeh Malekmohammadi and Mahboubeh Farid. The Application of Data Envelopment Analysis to Queuing System. – М.: LAP Lambert Academic Publishing, 2014. – 60 с.
  69. Sudarshan Ranpise. Cyber Crime Prevention. – М.: LAP Lambert Academic Publishing, 2013. – 268 с.
  70. Charles Hays. Plaid Kilts and Black Leather Jackets. – М.: LAP Lambert Academic Publishing, 2010. – 180 с.
  71. Enrico Schiattarella. High-Performance Packet Switching Architectures. – М.: LAP Lambert Academic Publishing, 2011. – 140 с.
  72. Ashit Kumar Dutta and Abdul Rahaman Wahab Sait. Computer Networks from Scratch. – М.: LAP Lambert Academic Publishing, 2013. – 324 с.
  73. Swapan Debbarma,Madhumita Debbarma and Amit Debnath. Energy Efficient Management MAC. – М.: LAP Lambert Academic Publishing, 2013. – 88 с.
  74. Anil Kumar V. and Prasad E. Dynamic Broadcast Routing With Security Enhancement. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  75. Meftah Ur Rahman,Md. Imran Hossain and Sheikh Neyamat. A Comparative Analysis among Different Routing Protocols with QoS. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  76. Ahmad A. Hassan. Firewalls: Modeling and Management. – М.: LAP Lambert Academic Publishing, 2012. – 100 с.
  77. Janakiraman S. Distributed Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 164 с.
  78. Mohamed Rasslan,Yasser Dakroury and Heba Aslan. Group Key Distribution in Computer Networks. – М.: LAP Lambert Academic Publishing, 2012. – 212 с.
  79. Ammisetty Veeraswamy and Ammisetty Mahesh Babu. Introduction to Computer Networks. – М.: LAP Lambert Academic Publishing, 2012. – 208 с.
  80. Torruam Japheth Terande. Introduction to computer networking. – М.: LAP Lambert Academic Publishing, 2012. – 144 с.
  81. Mazen Mohammed,Alaa Eldin Rohiem and Ali El-moghazy. CSRTP. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  82. Mitul Choksi. Network Performance Tuning Techniques. – М.: LAP Lambert Academic Publishing, 2011. – 56 с.
  83. Seyi Osunade. Java-Based Mobile Agent Systems. – М.: LAP Lambert Academic Publishing, 2012. – 156 с.
  84. Syed Zahidur Rashid. Computer Network Security Monitoring. – М.: Scholars' Press, 2015. – 284 с.
  85. Sanjeev Karmakar and Manoj K. Kowar. A Comprehensive Lecture Notes on RSA-1024 Cryptography. – М.: LAP Lambert Academic Publishing, 2013. – 160 с.
  86. Mrutyunjaya Panda and Manas Ranjan Patra. A Data Mining Approach to Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2015. – 216 с.
  87. Chakchai So-In. Resource Allocation and Management in Computer Networks. – М.: LAP Lambert Academic Publishing, 2011. – 212 с.
  88. Mehmud Abliz. Denial of Service in Computer Networks. – М.: LAP Lambert Academic Publishing, 2011. – 84 с.
  89. Aaron Tureau. Evaluations of Synchronization Loss Equations on High-Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 60 с.
  90. Asad Mehmood. 20 Gbps NetFPGA Router. – М.: LAP Lambert Academic Publishing, 2012. – 52 с.
  91. Qutaiba Ibrahim and Ina'am Khudher. Network Simulation Guide. – М.: LAP Lambert Academic Publishing, 2011. – 340 с.
  92. Miguel A. Erazo. Leveraging Symbiotic Relationships for Emulation of Computer Networks. – М.: Scholars' Press, 2013. – 164 с.
  93. Trunal Patel. Computer Network. – М.: LAP Lambert Academic Publishing, 2012. – 572 с.
  94. Hanaa Abd Alaziz. Data Hiding and Applications. – М.: LAP Lambert Academic Publishing, 2013. – 172 с.
  95. Adil Adil Nazir Malik. Modeling and Simulation of computer Network Using OPNET. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  96. Shaffali Gupta and Sanmeet Kaur. A GUI Framework for detecting Intrusions using Bro IDS. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  97. Mahmoud Jazzar. Computer Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 240 с.
  98. Peter Kemei. Framework for Monitoring Hardware Firewall Functionality Using NIDS. – М.: LAP Lambert Academic Publishing, 2013. – 176 с.
  99. Asger Ali Syed and Sudip Mahajan. Concept of Networking. – М.: LAP Lambert Academic Publishing, 2013. – 180 с.
  100. Manish Gupta and Dharmendra Kumar. Design and Implementation of Digital Watermarking. – М.: LAP Lambert Academic Publishing, 2014. – 172 с.
  101. Firkhan Ali Hamid Ali. Vulnerability Analysis on the Computer Network Security. – М.: LAP Lambert Academic Publishing, 2010. – 72 с.
  102. Necati Demir and Gokhan Dalk?l?c. Design and Implementation of an Embedded Firewall. – М.: LAP Lambert Academic Publishing, 2011. – 108 с.
  103. Er. Preet Kanwal Singh,Er. Gurkamal Singh and Dr. Ripudaman Singh. Data Communication. – М.: LAP Lambert Academic Publishing, 2011. – 56 с.
  104. Jawahar Thakur. Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2011. – 84 с.
  105. Er. Surajit Borah. A Study Of Computer Networking At IOCL(AOD), Digboi(India). – М.: LAP Lambert Academic Publishing, 2011. – 64 с.
  106. Iftikhar Ahmad. Feature Subset Selection in Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 220 с.
  107. Sharmin Rashid Linta and Md.Ridgewan Khan Neuton. Today’s Impact on Communication System by IP Spoofing. – М.: LAP Lambert Academic Publishing, 2012. – 72 с.
  108. Firas Abdullah Thweny Al-Saedi and Ali Hadi Mohammed Al-Yasiri. DESIGN AND IMPLEMENTATION OF PSO BASED PID CONTROLLER FOR MA2000 ROBOT. – М.: LAP Lambert Academic Publishing, 2013. – 140 с.
  109. Paul Santi-Jones. Fractional FPGA Neural Networks. – М.: LAP Lambert Academic Publishing, 2009. – 228 с.
  110. Kirat Pal Singh. MIPS Pipeline Cryptoprocessor. – М.: LAP Lambert Academic Publishing, 2012. – 480 с.
  111. Kefa Rabah. ICT Technical Training to Address Unemployment in Kenya - Book II. – М.: LAP Lambert Academic Publishing, 2014. – 352 с.
  112. Syed Muntasir Husain Bokhari. Teaching. – М.: LAP Lambert Academic Publishing, 2009. – 80 с.
  113. Lotfi Ben Romdhane. Computational Networks and Competition-Based Models. – М.: LAP Lambert Academic Publishing, 2010. – 208 с.
  114. Arvind Maheshwari,Umesh Kumar Singh and Sumit Jain. Basic Computer Engineering. – М.: LAP Lambert Academic Publishing, 2012. – 376 с.
  115. Dongqing Yuan. Developing and Evaluating an Open Source Network. – М.: LAP Lambert Academic Publishing, 2012. – 148 с.
  116. Jerry Bent. Design and Simulation of a Secured and Robust Campus Area Network. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  117. Victoria Hodge. Outlier and Anomaly Detection. – М.: LAP Lambert Academic Publishing, 2011. – 112 с.
  118. Nick-Naser Manochehri. Web-Based Learning(WBL) vs Traditional Instructor-Based Learning(IBL). – М.: LAP Lambert Academic Publishing, 2012. – 132 с.
  119. Dalibor Dobrilovic. Modeling virtual network laboratory based on virtualization technology. – М.: LAP Lambert Academic Publishing, 2012. – 236 с.
  120. Pankaj Bhambri and Sukhjit Singh. Fundamentals of Information Technology. – М.: LAP Lambert Academic Publishing, 2013. – 252 с.
  121. Shuyuan Mary Ho. Cyber Insider Threat: Trustworthiness in Virtual Organizations. – М.: LAP Lambert Academic Publishing, 2014. – 436 с.
  122. MD UDDIN. COMPUTER NETWORKING AND MANAGEMENT. – М.: LAP Lambert Academic Publishing, 2010. – 44 с.
  123. Ayankunle Adegbite Taiwo. Performance Modeling of a wired Local Area Network. – М.: LAP Lambert Academic Publishing, 2012. – 100 с.
  124. Dhanavandan S. Bibliometric Analysis of Information Systems. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  125. Josphat Kyalo. Management Structures. – М.: LAP Lambert Academic Publishing, 2013. – 88 с.
  126. Jan Kolar. Global Indexing of Topographic Surface. – М.: LAP Lambert Academic Publishing, 2010. – 244 с.
  127. Radu Mardare. Logical Analysis of Complex Concurrent Systems. – М.: LAP Lambert Academic Publishing, 2010. – 244 с.
  128. SUBRAMANIAM ARUNACHALAM and Tom Page. An Application of Data Mining Techniques in Data Warehousing. – М.: LAP Lambert Academic Publishing, 2010. – 84 с.
  129. Jakub Tomczak. Algorithms for Knowledge Extraction Using Relation Identification. – М.: LAP Lambert Academic Publishing, 2010. – 100 с.
  130. FARAZ ZAIDI. Analysis, Structure and Organization of Complex Networks. – М.: LAP Lambert Academic Publishing, 2011. – 156 с.
  131. Mustafa Khan and Muhammad Irfan Younas Mughal. Content Distribution Network''s Technology (CDN). – М.: LAP Lambert Academic Publishing, 2010. – 88 с.
  132. Otto Dostal. ICT Systems Monitoring. – М.: LAP Lambert Academic Publishing, 2012. – 176 с.
  133. Navneet kaur Bajwa. Sanitization of Data in Computer Network. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  134. Chandran Velmurugan and M. Kannan. Nambatya Prosscoviainternet Based Resources for School Libraries. – М.: LAP Lambert Academic Publishing, 2014. – 152 с.
  135. Palanivel Kodeswaran. On the Use of Context and Policies in Declarative Networked Systems. – М.: LAP Lambert Academic Publishing, 2012. – 112 с.
  136. Vadim Tarasov. Economic Security: Case of Russia. – М.: LAP Lambert Academic Publishing, 2013. – 112 с.
  137. Gustav Cepciansky and Ladislav Schwartz. Stochastic processes with discrete states. – М.: LAP Lambert Academic Publishing, 2013. – 116 с.
  138. Marcellin Mugabe. The Total Cost of Ownership (TCO) of Computer Networks in Colleges. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  139. KELVIN UKOIMA and GRAHAM-DOUGLAS MAC-DONNEL. An E-Commerce Application With Internet SMS. – М.: , 2011. – 108 с.
  140. Asrani Lit,Fariza Mahyan and Termimi Hidayat Mahyan. Delay Aware Topology Generation for Network on Chip. – М.: , 2015. – 72 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Основной арсенал "охотника" - его network: кого он знает на рынке и качество этих отношений. С. Плетнева, "Управление персоналом", № 12, июнь 2009.

Образцы работ

Тема и предметТип и объем работы
Понятие и история брендинга. Анализ создания и стратегия продвижения бренда ***
Электроснабжение городов и промышленных предприятий
Другое
72 стр.
Математические модели океанических течений
Переводоведение (теория перевода)
Курсовая работа
42 стр.
Комплекс маркетинговых коммуникаций в продвижении цифровых СМИ
Маркетинг
Диплом
74 стр.
Продвижение брендов в шоу-бизнесе
Электроснабжение городов и промышленных предприятий
Диплом
79 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Юля, 20.02
Большое Вам спасибо. Я посмотрела работу - мне очень понравилось!!! Еще раз СПАСИБО!