Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Rob Cameron. Configuring Juniper Networks NetScreen & SSG Firewalls. – М.: , 2010. – 512 с.

Дополнительные результаты

  1. Mark Yarnell, Rene Reid Yarnell. Your First Year in Network Marketing: Overcome Your Fears, Experience Success, and Achieve Your Dreams!. – М.: Prima Lifestyles, 1998. – 304 с.
  2. Martha M. Roggenkamp, Lila Barrera-Hernandez, Donald N. Zillman, Inigo del Guayo. Energy Networks and the Law: Innovative Solutions in Changing Markets. – М.: , 2012. – 500 с.
  3. Elizabeth Friesen. Challenging Global Finance: Civil Society and Transnational Networks (International Political Economy). – М.: , 2012. – 232 с.
  4. Andrej Fatur. EU Competition Law and the Information and Communication Technology Network Industries: Economic versus Legal Concepts in Pursuit of (Consumer) Welfare (Hart Studies in Competition Law). – М.: , 2012. – 312 с.
  5. African Conflicts and Informal Power: Big Men and Networks (Africa Now). – М.: , 2012. – 288 с.
  6. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с.
  7. Traffic Monitoring and Analysis: 4th International Workshop, TMA 2012, Vienna, Austria, March 12, 2012, Proceedings (Lecture Notes in Computer Science ... Networks and Telecommunications). – М.: , 2012. – 200 с.
  8. Nick Davies. How to Be Great at The Stuff You Hate: The Straight-Talking Guide to Networking, Persuading and Selling. – М.: , 2012. – 204 с.
  9. Ad Hoc Networks: Third International ICST Conference, ADHOCNETS 2011, Paris, France, September 21-23, 2011, Revised Selected Papers (Lecture Notes of ... and Telecommunications Engineering). – М.: , 2012. – 247 с.
  10. Sidney E Fuchs. Get Off The Bench: Unleashing The Power of Strategic Networking Through Relationships. – М.: , 2012. – 174 с.
  11. Business Networks in Clusters and Industrial Districts: The Governance of the Global Value Chain. – М.: , 2012. – 418 с.
  12. Paul Hill. The Panic Free Job Search: Unleash the Power of the Web and Social Networking to Get Hired. – М.: , 2012. – 256 с.
  13. April Kelly. Spaghetti on the Wall: Branding and Networking Methods that Stick. – М.: , 2012. – 216 с.
  14. Gerald Faulhaber, Gary Madden, Jeffrey Petchey. Regulation and the Performance of Communication and Information Networks. – М.: , 2012. – 384 с.
  15. Clusters in Automotive and Information & Communication Technology: Innovation, Multinationalization and Networking Dynamics. – М.: , 2012. – 308 с.
  16. Helen Lawton-Smith. Universities, Innovation and the Economy (Routledge Studies in Business Organizations and Networks). – М.: , 2012. – 256 с.
  17. Markov Networks in Evolutionary Computation (Adaptation, Learning, and Optimization). – М.: , 2012. – 264 с.
  18. Michael S Strauss-Cassel. The Money Making Social Media Network: How to Build a Social Media Network that makes Money (Volume 1). – М.: , 2012. – 194 с.
  19. J. Forbes Munro. Maritime Enterprise and Empire : Sir William Mackinnon and His Business Network, 1823-1893. – М.: , 0. – 0 с.
  20. Mark Ebers. The Formation of Inter-Organizational Networks. – М.: , 0. – 0 с.
  21. Anna Nagurney, Anna Nugurney. Sustainable Transportation Networks. – М.: , 0. – 0 с.
  22. Ann D. Bagchi. Making Connections: A Study of Networking Among Immigrant Professionals. – М.: , 0. – 0 с.
  23. Bennett Harrison, Marcus Weiss, Marcus S. Weiss. Workforce Development Networks: Community-Based Organizations and Regional Alliances. – М.: , 0. – 0 с.
  24. Diane Darling. The Networking Survival Guide: Get the Success You Want By Tapping Into the People You Know. – М.: , 0. – 0 с.
  25. Michael Salmon. Supernetworking: Reach the Right People, Build Your Career Network, and Land Your Dream Job-- Now. – М.: , 0. – 0 с.
  26. Margaret Wheatley, Paula Griffin, Kristine Quade, National OD Network. Organization Development at Work: Conversations on the Values, Applications, and Future of OD (J-B O-D (Organizational Development)). – М.: Pfeiffer, 2003. – 224 с.
  27. Structural Adjustment Participatory Review International Network. Structural Adjustment, the Sapri Report: The Policy Roots of Economic Crisis, Poverty and Inequality. – М.: , 0. – 0 с.
  28. John Mahoney, Elizabeth Vallance, Jack Mahoney, European Business Ethics Network. Business Ethics in a New Europe (Issues in Business Ethics, Vol 3). – М.: , 0. – 0 с.
  29. Sheryl Garrett, Marie Swift, The Garrett Planning Network. Just Give Me the Answer$ : Expert Advisors Address Your Most Pressing Financial Questions. – М.: , 0. – 0 с.
  30. Business Women's Network, WorkingWoman Network. Business Women's Network 2001 International Directory. – М.: , 0. – 0 с.
  31. John Roland, Mark J. Newcomb. CCSP Cisco Secure VPN Exam Certification Guide (CCSP Self-Study). – М.: , 0. – 0 с.
  32. Roberta Bragg, Jim Cooper, Dennis T. Maione. MCSE Training Guide (70-244): Supporting and Maintaining a Windows NT Server 4 Network. – М.: , 0. – 0 с.
  33. Dave Bixler. MCSE/MCSA Training Guide (70-216): Windows 2000 Network Infrastructure, Second Edition. – М.: , 0. – 0 с.
  34. V Anand. Cisco IP Routing Protocols: Trouble Shooting Techniques (Networking Series). – М.: , 2004. – 0 с.
  35. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с.
  36. 3I Network. India Infrastructure Report 2007 (Hindi) Rural Infrastructure. – М.: , 2007. – 360 с.
  37. The Transition Network, Gail Rentsch. Smart Women Don't Retire -- They Break Free: From Working Full-Time to Living Full-Time. – М.: , 2008. – 272 с.
  38. Matt Walker, Angela Walker. CCENT Cisco Certified Entry Networking Technician Study Guide (Exam 640-822) (Study Guide Book & CD). – М.: , 2008. – 512 с.
  39. Mark A. Franklin, Patrick Crowley, Haldun Hadimioglu, Peter Z. Onufryk. Network Processor Design: Issues and Practices, Volume 1. – М.: Morgan Kaufmann, 2002. – 338 с.
  40. Douglas E. Comer. Network Systems Design Using Network Processors: Intel 2XXX Version. – М.: Prentice Hall, 2005. – 600 с.
  41. Rob Scrimger, Paul LaSalle, Mridula Parihar, Meeta Gupta. TCP/IP Bible. – М.: John Wiley and Sons, Ltd, 2002. – 624 с.
  42. Food Network Kitchens. Food Network Favorites. – М.: , 2009. – 264 с.
  43. Steve Suehring. Wiley Pathways Windows Network Administration Project Manual. – М.: , 2007. – 404 с.
  44. Martin Jacobsson. Personal Networks. – М.: , 2010. – 228 с.
  45. Rob Cameron. Juniper(r) Networks Secure Access SSL VPN Configuration Guide. – М.: , 2010. – 656 с.
  46. Susan Snedaker, Jeffery Martin, John Karnay, Ira Herman, Dustin Hannifin, Shawn Tooley. The Real MCTS/MCITP Windows Server 2008: Configuring Network Infrastructure: Exam 70-642 (+ DVD-ROM). – М.: Syngress, 2008. – 576 с.
  47. Syngress. Firewall Policies and VPN Configurations. – М.: , 2010. – 550 с.
  48. Rob Cameron. Configuring NetScreen Firewalls. – М.: , 2010. – 600 с.
  49. Andrew Hay. Nokia Firewall, VPN, and IPSO Configuration Guide. – М.: , 2010. – 488 с.
  50. Syngress. Configuring Cisco Network Services for Active Directory Adobe Edition. – М.: , 2010. – 608 с.
  51. Dan Bendell. Configuring SonicWALL Firewalls. – М.: , 2010. – 600 с.
  52. Juniper Ellis. Tattooing the World – Pacific Designs in Print and Skin. – М.: , 2008. – 304 с.
  53. Juniper Ellis. Tattooing the World – Pacific Designs in Print and Skin. – М.: , 2008. – 304 с.
  54. Food Network Kitchens. How to Boil Water. – М.: , 2009. – 256 с.
  55. Coopers & Lybrand International Tax Network. 1992 International Tax Summaries. – М.: , 1992. – 1248 с.
  56. Coopers & Lybrand International Tax Network. 1994 International Tax Summaries. – М.: , 1994. – 1140 с.
  57. Daniel Steinberg. Zero Configuration Networking: The Definitive Guide. – М.: , 2006. – 256 с.
  58. Coopers & Lybrand Global Tax Network. 1998 International Tax Summaries. – М.: , 1998. – 1376 с.
  59. Coopers & Lybrand Global Tax Network. 1997 International Tax Summaries. – М.: , 1997. – 1280 с.
  60. Richard Deal. CCNA Cisco Certified Network Associate Security Study Guide: Exam 640-553 (+ CD-ROM). – М.: McGraw-Hill Osborne Media, 2009. – 832 с.
  61. Richard Deal. CCNA Cisco Certified Network Associate: Study Guide (+ CD-ROM). – М.: McGraw-Hill, 2011. – 1040 с.
  62. Richard A. Deal. Cisco Asa Configuration. – М.: McGraw-Hill, 2009. – 752 с.
  63. How To Do Everything Netbook. – М.: , 2011. – 320 с.
  64. Mike Meyers' Comptia Network+ Guide To Managing And Troubleshooting Networks, Second Edition. – М.: , 2011. – 0 с.
  65. Mike Meyers' Comptia Network+ Guide To Managing And Troubleshooting Networks Lab Manual, Second Edition. – М.: , 2011. – 352 с.
  66. Wireless Network Administration A Beginner'S Guide. – М.: , 2011. – 336 с.
  67. Networking, A Beginner'S Guide, Fifth Edition. – М.: , 2011. – 448 с.
  68. Cisco: A Beginner'S Guide, Fourth Edition. – М.: , 2011. – 696 с.
  69. Fundamentals Of Network Security. – М.: , 2011. – 672 с.
  70. Configuring IPv6 for Cisco IOS. – М.: Syngress, 2002. – 608 с.
  71. Greg Holden. Guide to Firewalls and Network Security: Intrusion Detection and VPNs. – М.: Course Technology, 2003. – 512 с.
  72. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . –  с.
  73. Robert Stephens. Configuring Check Point NGX VPN-1/Firewall-1. – М.: , 2005. – 608 с.
  74. Michael Gregg, Eric Seagren, Angela Orebaugh, Matt Jonkman, Raffael Marty. How to Cheat at Configuring Open Source Security Tools (How to Cheat) (How to Cheat). – М.: , 2007. – 528 с.
  75. Edward Ramsden. Hall-Effect Sensors, Second Edition: Theory and Application. – М.: , 2006. – 272 с.
  76. Yi Qian, James Joshi, David Tipper, Prashant Krishnamurthy. Information Assurance: Dependability and Security in Networked Systems. – М.: Morgan Kaufmann, 2007. – 576 с.
  77. Thomas W. Shinder. The Best Damn Firewall Book Period. – М.: Syngress, 2007. – 1000 с.
  78. Rob Cameron. Configuring Juniper Networks NetScreen & SSG Firewalls. – М.: , 2010. – 512 с.
  79. Peter Southwick, Doug Marschke, Harry Reynolds. Junos Enterprise Routing. – М.: O'Reilly Media, 2011. – 776 с.
  80. FOOD NETWORK KITCHEN. CHOPPED COOKBOOK, THE. – М.: Clarkson Potter Publishers, 2014. –  с.
  81. Anup Bhange and Manmeet Kaur Marhas. Anomaly Detection in Network Traffic; A Statistical Approach. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  82. Shaek Rana Mohammad Baki Billah and Mohammad Hafizur Rahman. Design & Development of Network Security System using IP Tables. – М.: LAP Lambert Academic Publishing, 2013. – 164 с.
  83. Sharup Barua and Ratan Chandra Mondal. Impact of Node Mobility on the Voice Quality in Mobile Ad-hoc Network. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  84. Sungjoon Park and Wayne Stark. System Design for Cooperative Diversity Wireless Networks. – М.: Scholars' Press, 2014. – 168 с.
  85. Syed Zahidur Rashid. OSPF Network Routing. – М.: Scholars' Press, 2015. – 324 с.
  86. SUSMITA DAS. Design of Adaptive Equaliser Structures in Neural Network Paradigm. – М.: LAP Lambert Academic Publishing, 2009. – 216 с.
  87. Moazzam Tiwana. Automated RRM Optimization of LTE networks using Statistical Learning. – М.: LAP Lambert Academic Publishing, 2012. – 152 с.
  88. Md. Zahirul Islam and Md. Mohiuddin Ahmed. Performance Analysis of MPLS and Non-MPLS Network. – М.: LAP Lambert Academic Publishing, 2011. – 76 с.
  89. Mousumi Paul,M.B. Manoj Kumar and Debabrata Samanta. Some Research on Network Simulator. – М.: Scholars' Press, 2014. – 104 с.
  90. Neeta Singh. Traffic Management Models For Wireless Communication Network. – М.: LAP Lambert Academic Publishing, 2015. – 232 с.
  91. Md. Monzur Morshed,Md. Habibur Rahman and Md. Rezaur Rahman Mazumder. QoS Analysis of AdHoc On-Demand Distance Vector Routing Protocol. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  92. Sushanta Sahu. Closed Queuing Networks with Multiple-server Stations. – М.: LAP Lambert Academic Publishing, 2012. – 288 с.
  93. Lih Chieh Png. Morphological Shared-Weight Neural Network for Face Recognition. – М.: LAP Lambert Academic Publishing, 2013. – 176 с.
  94. Anand Sreenivasan. Performance Monitoring of Network Systems. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  95. Jobin Thomas. Boot Software for PXA270 Board. – М.: LAP Lambert Academic Publishing, 2012. – 72 с.
  96. Suyog Man Singh Adhikari and Saroj Sharan Regmi. Network Performance analysis of HTML5 Web applications in Smartphones. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  97. Rizwan Ahmed Khan. Performance Evaluation of AODV and DSR for Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  98. Ali Pesaranghader and Esmaeel Marjani. Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2013. – 108 с.
  99. Marwan Aziz Mohammed Alkakay and Athota Kavitha. Distributed Spanner Base Channel Assignment in Wireless Mesh Network. – М.: LAP Lambert Academic Publishing, 2014. – 92 с.
  100. Kriti Jaiswal. Simulation of MANET using GloMoSim Network Simulator. – М.: LAP Lambert Academic Publishing, 2014. – 140 с.
  101. Rudy Deca. Meta-CLI Configuration Model for Network Device Management. – М.: LAP Lambert Academic Publishing, 2010. – 148 с.
  102. Gursimranjit Singh and Kamaljeet Kaur. Performance Evaluation of MANET (Mobile Ad-hoc Network) Metrics. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  103. Ahmad A. Hassan. Firewalls: Modeling and Management. – М.: LAP Lambert Academic Publishing, 2012. – 100 с.
  104. Hanafy M. Ali. Peer-to-Peer Networks. – М.: LAP Lambert Academic Publishing, 2010. – 176 с.
  105. Xiaodong He. Automated intrusion prevention mechanism in enhancing network security. – М.: Scholars' Press, 2014. – 128 с.
  106. Ghassan Abed. TCP Fundamentals and Implementation using Network Simulator 2. – М.: Scholars' Press, 2015. – 120 с.
  107. V. G. Shelake and R. K. Kamat. A Monogram On Design And Development Of FPGA Based Firewall. – М.: LAP Lambert Academic Publishing, 2014. – 100 с.
  108. M. Scott Kingsley. Benefit Analysis of Optimization Models for Network Recovery Design. – М.: LAP Lambert Academic Publishing, 2014. – 172 с.
  109. Marco Fotino. Energy Behavior of Routing Protocols for Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2014. – 144 с.
  110. Akinchan Das,Pinaki Satpathy and Banibrata Bag. Effect of Network topology on Routing Protocol's Efficiency. – М.: LAP Lambert Academic Publishing, 2015. – 84 с.
  111. Tuncay Ercan. Wireless Networks for Corporations. – М.: LAP Lambert Academic Publishing, 2010. – 120 с.
  112. Rakesh Jha. Security Issues In AD-HOC And Infrastructure (WLAN) Networks. – М.: LAP Lambert Academic Publishing, 2011. – 124 с.
  113. Nuno M. Garcia. Architectures and Algorithms for IP Optical Burst Switching Networks. – М.: Scholars' Press, 2013. – 304 с.
  114. Haroon Shan. Picocell And DAS configuration in HSPA Evolution. – М.: LAP Lambert Academic Publishing, 2012. – 112 с.
  115. Himanshu Singh. High Level Abstractions for Configuration of Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 136 с.
  116. Omid Mahdi Ebadati E.,Harleen Kaur M. Afshar Alam and Kaebeh Yaeghoobi. Micro-Firewalls for Dynamic Network Security Framework. – М.: LAP Lambert Academic Publishing, 2012. – 292 с.
  117. Adil Adil Nazir Malik. Modeling and Simulation of computer Network Using OPNET. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  118. Vincent Omollo. Enhanced Network Security. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  119. Nur Arzilawati Md. Yunus,Mohamed Othman and Zurina Mohd Hanapi. Shuffle Exchange Multistage Interconnection Network. – М.: LAP Lambert Academic Publishing, 2014. – 124 с.
  120. Ali Okhamila Yusuf. Determination of Optimal Power for Wireless Sensor Networks (WSNs). – М.: LAP Lambert Academic Publishing, 2015. – 76 с.
  121. Necati Demir and Gokhan Dalk?l?c. Design and Implementation of an Embedded Firewall. – М.: LAP Lambert Academic Publishing, 2011. – 108 с.
  122. Einar Petana and SANJEEV KUMAR. EKG monitoring over Wireless Sensor Networks & DDoS vulnerabilities. – М.: LAP Lambert Academic Publishing, 2011. – 116 с.
  123. Moslem Amiri. Wireless sensor networks. – М.: LAP Lambert Academic Publishing, 2011. – 60 с.
  124. Mamun Kabir and Mohammad Rashed. Multi-Level Client Server Network and Its Performance Analysis. – М.: LAP Lambert Academic Publishing, 2012. – 124 с.
  125. Xinyu Tan. 2.4GHz Self-Organized Sensor Network. – М.: LAP Lambert Academic Publishing, 2010. – 64 с.
  126. Kefa Rabah. Mastering Securing ICT Infrastructure for Corporate Network. – М.: LAP Lambert Academic Publishing, 2014. – 360 с.
  127. Zeinab Movahedi. Autonomic Network Management Fundamentals. – М.: LAP Lambert Academic Publishing, 2014. – 140 с.
  128. Paolo Medagliani and Gianluigi Ferrari. Performance Optimization in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2011. – 212 с.
  129. Shokoufeh Mirzaei. Supply Chain Network Configuration: Dynamicity and Sustainability. – М.: LAP Lambert Academic Publishing, 2013. – 140 с.
  130. Zahid Nawaz. Teaching Core Skills of Troubleshooting, in Network & System Problems. – М.: LAP Lambert Academic Publishing, 2015. – 92 с.
  131. Barack Wanjawa. A Neural Network Model for Predicting Stock Market Prices. – М.: LAP Lambert Academic Publishing, 2014. – 200 с.
  132. Stephen Murove,S. B. Mangena and B. Jones. Firewall Evaluation:Models for Major Decisions in Computer Security. – М.: LAP Lambert Academic Publishing, 2014. – 236 с.
  133. Amit Choudhary. Routing Security Issues in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2014. – 80 с.
  134. Rajasvaran Logeswaran. Predictive Artificial Neural Networks. – М.: LAP Lambert Academic Publishing, 2010. – 216 с.
  135. Tabbasum Naz and , Juergen Dorn. Configurable Meta-search in the Human Resource Domain. – М.: LAP Lambert Academic Publishing, 2009. – 168 с.
  136. Palanivel Kodeswaran. On the Use of Context and Policies in Declarative Networked Systems. – М.: LAP Lambert Academic Publishing, 2012. – 112 с.
  137. Ali Nazari. Neural Networks to predict Impact energy of functionally graded steels. – М.: LAP Lambert Academic Publishing, 2011. – 56 с.
  138. Robert Biscontri. An Exploration of Approaches to Forecasting Company Earnings using the Neural Network Paradigm. – М.: LAP Lambert Academic Publishing, 2010. – 232 с.
  139. M. CHITHIK RAJA,A. Jayaprakash and C. P. Rajesh. JAVA Programming for Beginner's. – М.: , 2011. – 348 с.
  140. Craig Zacker. Exam Ref 70-410: Installing and Configuring Windows Server 2012 R2. – М.: Microsoft Press, 2014. – 416 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Основной арсенал "охотника" - его network: кого он знает на рынке и качество этих отношений. С. Плетнева, "Управление персоналом", № 12, июнь 2009.

Образцы работ

Тема и предметТип и объем работы
Понятие и история брендинга. Анализ создания и стратегия продвижения бренда ***
Электроснабжение городов и промышленных предприятий
Другое
72 стр.
Комплекс маркетинговых коммуникаций в продвижении цифровых СМИ
Маркетинг
Диплом
74 стр.
Продвижение брендов в шоу-бизнесе
Электроснабжение городов и промышленных предприятий
Диплом
79 стр.
Гражданско-правовые способы защиты авторских прав в сети Интернет
Финансовое право
Другое
99 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
МаринаК., 27.12
В прошлом году Вы мне написали диплом, все замечательно и хорошо, защитилась на пять, огромное Вам спасибо!