Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Timothy Braithwaite. Securing E-Business Systems: A Guide for Managers and Executives. – М.: , 0. – 0 с.
  2. Lech Janczewski. Managerial Guide for Handling Cyber-Terrorism and Information Warfare. – М.: , 2005. – 0 с.
  3. Andy Walker. Windows Lockdown!: Your XP and Vista Guide Against Hacks, Attacks, and Other Internet Mayhem (Absolute Beginner's Guide). – М.: , 2008. – 480 с.
  4. Ken Dunham, Jim Melnick. Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet. – М.: , 2008. – 168 с.
  5. National Safety Council. Accident Prevention Manual: Security Management 2nd Edition. – М.: , 2010. – 407 с.
  6. Joseph Menn. Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet. – М.: PublicAffairs, 2010. – 304 с.
  7. Edward Amoroso. Cyber Attacks. – М.: , 2010. – 336 с.
  8. Rob Shein. Zero-Day Exploit: Countdown to Darkness. – М.: Syngress, 2008. – 364 с.
  9. Sudarshan Ranpise. Cyber Crime Prevention. – М.: LAP Lambert Academic Publishing, 2013. – 268 с.
  10. Olivia Tan Swee Leng,Shereen Khan and Reza Mohamad Hossein. Cybercrime and Cyber Terrorism: The Security Measures in Malaysia. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  11. Lane Thames. Advancing Cyber Security. – М.: LAP Lambert Academic Publishing, 2013. – 256 с.
  12. Narayan Ranjan Chakraborty. Analysis of Web security attacks: Bangladesh perspective. – М.: LAP Lambert Academic Publishing, 2012. – 124 с.
  13. Vikas Pareek. Cyber Crime in Indian Context. – М.: LAP Lambert Academic Publishing, 2013. – 56 с.
  14. Lamek Ronoh. Security Concern of Cloud Computing Models. – М.: LAP Lambert Academic Publishing, 2014. – 88 с.
  15. Mitko Bogdanoski,Aleksandar Risteski and Marjan Bogdanoski. Cyber operations - a permanent part of the global conflict. – М.: LAP Lambert Academic Publishing, 2014. – 60 с.
  16. Stephen Schiavone,Lalit Garg and Kelly Summers. Information Security in Enterprises - an Ontological Perspective. – М.: LAP Lambert Academic Publishing, 2014. – 232 с.
  17. Christopher Beggs. Safeguarding Infrastructure Assets from Cyber-terrorism. – М.: LAP Lambert Academic Publishing, 2010. – 348 с.
  18. Julien Shabani. Information Security for RFID Systems. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.
  19. Predrag Tasevski. Interactive Cyber Security Awareness Program. – М.: LAP Lambert Academic Publishing, 2012. – 184 с.
  20. Adam Hudaib. Social Media Cyber Crimes And XKeyscore Espionage Technologies. – М.: LAP Lambert Academic Publishing, 2015. – 108 с.
  21. Irfan Syamsuddin. Guidelines for Computer Forensics Investigations in Developing Country. – М.: LAP Lambert Academic Publishing, 2011. – 104 с.
  22. Hossein Rouhani Zeidanloo and Sahar Rouhani. Botnet Detection by Monitoring Common Network Behaviors. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  23. Kane Bignell. Authentication Strategies for Internet Banking. – М.: LAP Lambert Academic Publishing, 2010. – 164 с.
  24. Georgia Weidman. Penetration Testing: A Hands-On Introduction to Hacking. – М.: No Starch Press, 2014. – 528 с.
  25. Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks. – М.: , . –  с.

Дополнительные результаты

  1. agendaCPS: Integrierte Forschungsagenda Cyber-Physical Systems (acatech STUDIE) (German Edition). – М.: , 2012. – 297 с.
  2. Brad Henson. Heart Attack Survivor: A Field Guide. – М.: , 0. – 0 с.
  3. Christopher Barnatt. Cyber Business : Mindsets for a Wired Age. – М.: , 0. – 0 с.
  4. Information Warfare : corporate attack and defence in a digital world (Computer Weekly Professional (Paperback)). – М.: , 0. – 0 с.
  5. Timothy Braithwaite. Securing E-Business Systems: A Guide for Managers and Executives. – М.: , 0. – 0 с.
  6. Eric Dezenhall. Nail 'Em!: Confronting High-Profile Attacks on Celebrities & Businesses. – М.: , 0. – 0 с.
  7. Jay Conrad Levinson. Guerrilla Marketing Attack: New Strategies, Tactics, and Weapons for Winning Big Profits for Your Small Business. – М.: Houghton Mifflin Co, 1989. – 208 с.
  8. Lech Janczewski. Managerial Guide for Handling Cyber-Terrorism and Information Warfare. – М.: , 2005. – 0 с.
  9. Sung-Chi Chu. 4th Party Cyber Logistics for Air Cargo (International Series in Operations Research & Management Science). – М.: , 2004. – 0 с.
  10. The Economic Impacts of Terrorist Attacks. – М.: , 2006. – 315 с.
  11. Andy Walker. Windows Lockdown!: Your XP and Vista Guide Against Hacks, Attacks, and Other Internet Mayhem (Absolute Beginner's Guide). – М.: , 2008. – 480 с.
  12. Ken Dunham, Jim Melnick. Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet. – М.: , 2008. – 168 с.
  13. Ibp Usa. Global Terrorism Attacks Encyclopedic Handbook. – М.: , 2008. – 300 с.
  14. Operations Research and Cyber-Infrastructure (Operations Research/Computer Science Interfaces Series). – М.: , 2009. – 462 с.
  15. Shaheen Shariff. Confronting Cyber-Bullying. – М.: Cambridge University Press, 2009. – 296 с.
  16. National Safety Council. Accident Prevention Manual: Security Management 2nd Edition. – М.: , 2010. – 407 с.
  17. Francis T. Cullen. Corporate Crime Under Attack. – М.: , 2010. – 350 с.
  18. Kurt Rohner. Marketing in the Cyber Age. – М.: , 1998. – 240 с.
  19. Graeme D. Ruxton, Thomas N. Sherratt, Michael P. Speed. Avoiding Attack: The Evolutionary Ecology of Crypsis, Warning Signals and Mimicry. – М.: Oxford University Press, 2005. – 260 с.
  20. Thomas B. Allen. Shark Attacks: Their Causes and Avoidance. – М.: The Lyons Press, 2001. – 312 с.
  21. Zaharina Velikova. A Lattice Attack on the McEliece Public Key Cryptosystem: Lattice Basis Reduction Algorithms in Cryptography. – М.: , 2008. – 132 с.
  22. Joseph Menn. Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet. – М.: PublicAffairs, 2010. – 304 с.
  23. Rob Kraus. Seven Deadliest Microsoft Attacks. – М.: , 2010. – 192 с.
  24. Mike Shema. Seven Deadliest Web Application Attacks. – М.: , 2010. – 192 с.
  25. Ken Dunham. Mobile Malware Attacks and Defense. – М.: , 2010. – 440 с.
  26. Edward Amoroso. Cyber Attacks. – М.: , 2010. – 336 с.
  27. Seth Fogie. XSS Attacks. – М.: , 2010. – 480 с.
  28. Anthony Reyes. Cyber Crime Investigations. – М.: , 2010. – 432 с.
  29. Justin Clarke. SQL Injection Attacks and Defense. – М.: , 2010. – 496 с.
  30. Anthony Reyes. 2008 Cyber Crime Investigator's Professional CD. – М.: , 2010. – 3078 с.
  31. Rob Shein. Zero-Day Exploit: Countdown to Darkness. – М.: Syngress, 2008. – 364 с.
  32. Tom Parker. Cyber Adversary Characterization. – М.: , 2010. – 512 с.
  33. Mark Kostich. Beyond Attack. – М.: , 2010. – 96 с.
  34. W Lowrie. Attack Upon Christendom (Paper). – М.: , 1992. – 304 с.
  35. Richard Af Falkenrath. America?s Achilles? Heel – Nuclear, Biological & Chemical Terrorism & Convert Attack. – М.: , 1998. – 384 с.
  36. Gray. Angle of Attack. – М.: , 2007. – 304 с.
  37. Ephraim Kam. Surprise Attack – The Victim?s Perspective. – М.: , 2004. – 304 с.
  38. Mike Godwin. Cyber Rights – Defending Free Speech in the Digital Age. – М.: , 2003. – 416 с.
  39. Hf Pitkin. Attack of the Blob – Hannah Arendt?s Concept of the Social. – М.: , 2000. – 366 с.
  40. Ncta. The 9/11 Commission Report – The Attack from Planning to Aftermath – Shorter Edition. – М.: , 2011. – 0 с.
  41. G. Jack Bologna. Avoiding Cyber Fraud in Small Businesses. – М.: , 2000. – 256 с.
  42. Sam Palatnik. The King in Jeopardy – The Best Techniques for Attack & Defense Rev. – М.: , 1999. – 256 с.
  43. Robert P Flood. Speculative Bubbles, Speculative Attacks & Policy Switching. – М.: , 1994. – 506 с.
  44. Joanie Farley–gillispi. Cyber Rules – What You Really Need to Know About the Internet The Essential Guide for Clinicians, Educators and Parents. – М.: , 2007. – 304 с.
  45. OCMA. Ocma ?elec 4 Underground? Armoured Cable Protected Against Solvent Penet & Corros Attack. – М.: , 1974. – 0 с.
  46. David L. Brown. Cyber–Investing. – М.: , 1995. – 286 с.
  47. David L. Brown. Cyber–Investing. – М.: , 1995. – 286 с.
  48. John Chirillo. Hack Attacks Encyclopedia. – М.: , 2001. – 960 с.
  49. Coombs. Attacking Rural Poverty. – М.: , 1974. – 0 с.
  50. Richard Hooker. The Folger Library Edition of The Works of Richard Hooker – Of the Laws of Ecclesiastical Polity Attack & Response V 4. – М.: , 1990. – 332 с.
  51. Coombs. Attacking Rural Poverty. – М.: , 1974. – 0 с.
  52. Jeffrey Carr. Inside Cyber Warfare. – М.: , 2010. – 232 с.
  53. A Moghadam. The Globalization of Martyrdom – Al Qaeda, Salafi Jihad, and the Diffusion of Suicide Attacks. – М.: , 2009. – 360 с.
  54. National Commis. 9/11 Commission Report – The Full Final Report of the National Commission on Terrorist Attacks Upon the United States (spiral and indexed). – М.: , 2004. – 0 с.
  55. John Chirillo. Hack Attacks Denied. – М.: , 2001. – 512 с.
  56. John Chirillo. Hack Attacks Revealed. – М.: , 2001. – 960 с.
  57. Jr Pusey. Wu Han – Attacking the Present through the Past. – М.: , 1974. – 94 с.
  58. Greg Michalowski. Attacking Currency Trends. – М.: , 2011. – 304 с.
  59. David L. Brown. Cyber–Investing. – М.: , 1997. – 310 с.
  60. David L. Brown. Cyber–Investing. – М.: , 1997. – 336 с.
  61. Bruce Ackerman. Before the Next Attack – Protecting Civil Liberties in an Age of Terrorism. – М.: , 2006. – 224 с.
  62. Joseph Scalia. Intimate Violence – Attacks Upon Psychic Interiority. – М.: , 2002. – 176 с.
  63. John Chirillo. Hack Attacks Testing. – М.: , 2003. – 560 с.
  64. Christopher Barnatt. Cyber Business. – М.: , 1995. – 256 с.
  65. E Kam. Surprise Attack – The Victims Perspective. – М.: , 1988. – 304 с.
  66. Richard H. Buskirk. Frontal Attack, Divide and Conquer, The Fait Accompli and 118 Other Tactics Managers Must Know. – М.: , 1989. – 244 с.
  67. Nancy E. Willard. Cyber–Safe Kids, Cyber–Savvy Teens. – М.: , 2007. – 336 с.
  68. Joseph Mason. Let My Heart Attack Save Your Life. – М.: , 1998. – 240 с.
  69. Mike Gray. Angle of Attack – Harrison Storms & the Race to the Moon. – М.: , 1993. – 304 с.
  70. Paul Kligfield. The Cardiac Recovery Handbook – The Complete Guide to Life After Heart Attack or Heart Surgery. – М.: , 2006. – 296 с.
  71. Assaf Moghadam. The Globalization of Martyrdom – Al Qaeda, Salafi Jihad, and the Diffusion of Suicide Attacks. – М.: , 2011. – 360 с.
  72. Advising the Householder on Protection Against Nuclear Attack. – М.: V&A Publications, 2008. – 24 с.
  73. Eric D. Knapp, Raj Samani. Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure. – М.: Syngress, 2013. – 228 с.
  74. Herbert Puchta, Jeff Stranks, Gunter Gerngross, Christian Holzmann, Peter Lewis-Jones. More! Level 4: Student's Book with Cyber Homework (+ CD-ROM). – М.: Cambridge University Press, 2012. – 128 с.
  75. Herbert Puchta, Jeff Stranks, Gunter Gerngross, Christian Holzmann, Peter Lewis-Jones. More! Level 3: Student's Book: With Cyber Homework and Online Resources. – М.: Cambridge University Press, Helbling Languages, 2014. – 128 с.
  76. More! Level 1: Student's Book with Cyber Homework and Online Resources. – М.: Cambridge University Press, Helbling Languages, 2014. – 144 с.
  77. More! Level 2: Student's Book with Cyber Homework and Online Resources. – М.: Cambridge University Press, Helbling Languages, 2014. – 128 с.
  78. Lesley Thompson. Zombie Attack! Starter. – М.: Oxford University Press, 2013. – 40 с.
  79. Subi Khan and R.P. Mahapatra. SQL Injection Attack and Countermeasures. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  80. Saad Idrees. Portable Heart Attack Monitoring System with Dedicated Optical Network. – М.: LAP Lambert Academic Publishing, 2011. – 68 с.
  81. Luca Giancane. Side-Channel Attacks and Countermeasures. – М.: LAP Lambert Academic Publishing, 2012. – 172 с.
  82. Farukh Bashir. US Attack on Afghanistan and Public Response in Pakistan. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  83. Mustafa Taha. Cyber campaigns: Internet use in the 2000 U.S. presidential election. – М.: LAP Lambert Academic Publishing, 2011. – 296 с.
  84. Khalid Sultan and Kohir Stevenson. Cyber Media in Oman. – М.: LAP Lambert Academic Publishing, 2012. – 128 с.
  85. Sakshi Ojha. Framing Breaking News: The Mumbai Terror Attacks of 2008. – М.: LAP Lambert Academic Publishing, 2010. – 96 с.
  86. Dr.M. NEELAMALAR. MEDIA COVERAGE OF 26/11 MUMBAI TERROR ATTACKS:. – М.: LAP Lambert Academic Publishing, 2010. – 184 с.
  87. Hafeez-ur- Rahman,M. Ahsan Khan and Mirza Abdul Qayyum. Bt-cotton characters & metrological factors effects on Jassid attack. – М.: LAP Lambert Academic Publishing, 2011. – 96 с.
  88. Mohammad Ruhul Amin. Spatial Analysis of Suicide Attack Incidences in Kabul City. – М.: LAP Lambert Academic Publishing, 2012. – 100 с.
  89. Bushra Rehman,Mansoor Ahmad Siddiqui and Kavita Parihar. Meloidogyne incognita attacking Chickpea. – М.: LAP Lambert Academic Publishing, 2012. – 136 с.
  90. Nyasha Madzokere. Amos'' attack of Affluent Classes:. – М.: LAP Lambert Academic Publishing, 2011. – 68 с.
  91. Charlotte Heath-Kelly. What Motivated the Terrorist Attacks of September 11th, 2001?. – М.: LAP Lambert Academic Publishing, 2010. – 76 с.
  92. Ayyaswamy Kathirvel,Srinivasan Rengaramanujam and Mohanambal Kathirvel. Prevention of attacks usign umpiring security model for manets. – М.: LAP Lambert Academic Publishing, 2012. – 192 с.
  93. Sudarshan Ranpise. Cyber Crime Prevention. – М.: LAP Lambert Academic Publishing, 2013. – 268 с.
  94. Olivia Tan Swee Leng,Shereen Khan and Reza Mohamad Hossein. Cybercrime and Cyber Terrorism: The Security Measures in Malaysia. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  95. Henry Osborn Quarshie. Cyber crime in a world without borders. – М.: LAP Lambert Academic Publishing, 2012. – 320 с.
  96. Akash Rattan Singh Cheema. Cyber Crimes And Bulging Dimensions. – М.: LAP Lambert Academic Publishing, 2013. – 80 с.
  97. Gurmanpreet Kaur,Anand Pawar and Simranpreet Kaur. Cyber Terrorism and Law. – М.: LAP Lambert Academic Publishing, 2012. – 128 с.
  98. Vaibhav Priyadarshi. GLOBAL ANALYSIS OF LAWS RELATED TO CYBER SQUATTING. – М.: LAP Lambert Academic Publishing, 2011. – 84 с.
  99. Md. Abul Hasnat and Mainul Hasan Rawshani. Cyber Crime. – М.: LAP Lambert Academic Publishing, 2011. – 192 с.
  100. Akatukunda Joel Kakuru. The Cyber revolution and copyright infringement in Uganda. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  101. Ade Irma Junida and Didi Sukyadi. A Semiotic Analysis of Cyber Emoticons. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  102. Vishal Vora. Implementation and Analysis of Various Attacks on Digital Images. – М.: LAP Lambert Academic Publishing, 2012. – 112 с.
  103. Nisarg Gandhewar and Rahila Sheikh. Performance Valuation of AODV Under Sinkhole Attack In MANET Using NS2. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  104. Mohamed Amine Ferrag. Study of Attacks in Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  105. Cong Hoan Vu and Adeyinka Soneye. Collaborative Attacks on MANETs. – М.: LAP Lambert Academic Publishing, 2010. – 76 с.
  106. Kundan Munjal,Shilpa Verma and Namita Munjal. Cooperative Black Hole Attack Detection by Modifying AODV. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  107. Lane Thames. Advancing Cyber Security. – М.: LAP Lambert Academic Publishing, 2013. – 256 с.
  108. Ulya Sabeel and Nidhi Chandra. ADLS: Attack Detection & Localization Scheme in WSN. – М.: LAP Lambert Academic Publishing, 2014. – 68 с.
  109. Sushant Sudhakar Bahekar and Prashant Panse. Energy Efficient Mechanism for Detection of Wormhole Attacks. – М.: LAP Lambert Academic Publishing, 2014. – 72 с.
  110. Ali Modirkhazeni. Mitigation of Passive Wormhole Attack in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2015. – 112 с.
  111. Madhav P. Namdev. Phishing Attacks and Detection. – М.: LAP Lambert Academic Publishing, 2015. – 68 с.
  112. Amol Zade. A New Cluster Approach for Wormhole Attack Removal in MANET using NS2. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  113. Narayan Ranjan Chakraborty. Analysis of Web security attacks: Bangladesh perspective. – М.: LAP Lambert Academic Publishing, 2012. – 124 с.
  114. Anup Parkash Singh Virk. Direct Collaborative Attacks on MANET. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  115. Prashant Kumar Singh and Avimanyou Kumar Vatsa. Taxonomy Based Intrusion Attacks and Detection Scheme in P2P Network. – М.: LAP Lambert Academic Publishing, 2012. – 56 с.
  116. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  117. Pallavi Kaliyar and Gagan Singla. A secure routing protocol for MANETs against byzantine attacks. – М.: LAP Lambert Academic Publishing, 2013. – 84 с.
  118. E.O. Ibidunmoye and B.K. Alese. Game-Theoretic Analysis of Network Attack-Defense Interactions. – М.: LAP Lambert Academic Publishing, 2013. – 108 с.
  119. ANNADURAI P and Dr. V. PALANISAMY. Impact of Black Hole Attack on Multicast in Ad hoc Network (IBAMA). – М.: LAP Lambert Academic Publishing, 2011. – 84 с.
  120. Sivaraju Sharmila and U. Mamaheshwari G. Detection Schemes for Selective Forward Attack in WSN. – М.: LAP Lambert Academic Publishing, 2012. – 72 с.
  121. Shanmugam Bharathy Dhivya. A Study of Foiling Vehicles from Sybil Attack Using Pseudonyms. – М.: LAP Lambert Academic Publishing, 2012. – 100 с.
  122. Natarajan Meghanathan,DeShante C. Johnson and Alexander R. Geoghegan. An Analysis of Software Security Attacks and Mitigation Controls. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  123. Vikas Pareek. Cyber Crime in Indian Context. – М.: LAP Lambert Academic Publishing, 2013. – 56 с.
  124. Jayeeta Majumder and Gargi Saha. SQL Injection Attacks and possible Remedies. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  125. Lamek Ronoh. Security Concern of Cloud Computing Models. – М.: LAP Lambert Academic Publishing, 2014. – 88 с.
  126. Mitko Bogdanoski,Aleksandar Risteski and Marjan Bogdanoski. Cyber operations - a permanent part of the global conflict. – М.: LAP Lambert Academic Publishing, 2014. – 60 с.
  127. Ajeet Singh Poonia. Investigation and Prevention of Cyber Crime. – М.: LAP Lambert Academic Publishing, 2014. – 116 с.
  128. Samuel Mbuguah and Franklin Wabwoba. Attackability Metrics Model For Secure Service Oriented Architecture. – М.: LAP Lambert Academic Publishing, 2014. – 164 с.
  129. Poonam Kumar. The Perpetration and Prevention of Cyber Crime and Cyber Terrorism. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  130. Stephen Schiavone,Lalit Garg and Kelly Summers. Information Security in Enterprises - an Ontological Perspective. – М.: LAP Lambert Academic Publishing, 2014. – 232 с.
  131. Christopher Beggs. Safeguarding Infrastructure Assets from Cyber-terrorism. – М.: LAP Lambert Academic Publishing, 2010. – 348 с.
  132. Julien Shabani. Information Security for RFID Systems. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.
  133. Mohammed Firdos Alam Sheikh. Improving Web Security by Blocking SQL Injection Attack(SQLIA). – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  134. Georgiana Lucan. Computer-Based Attacks on Governments. – М.: LAP Lambert Academic Publishing, 2010. – 76 с.
  135. Akram Hossain,A. K. M. Zaidi Satter and Shibli Shahriar. Side Channel Attack Prevention. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  136. Edmond K. Machie. Network Attack Traceback And React. – М.: LAP Lambert Academic Publishing, 2013. – 208 с.
  137. Predrag Tasevski. Interactive Cyber Security Awareness Program. – М.: LAP Lambert Academic Publishing, 2012. – 184 с.
  138. Hossein Rouhani Zeidanloo and Sahar Rouhani. Botnet Detection by Monitoring Common Network Behaviors. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  139. Georgia Weidman. Penetration Testing: A Hands-On Introduction to Hacking. – М.: No Starch Press, 2014. – 528 с.
  140. Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks. – М.: , . –  с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

Ничего не найдено

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Наталья
Хотела сообщить что мой куратор приняла диплом после вашего сопровождения на отлично и я смогла защитить квалификационную работу после вашего сопровождения на отлично. СПАСИБО ОГРОМНОЕ за Вашу не оценимую помощь. Всем знакомым буду Вас советовать. СПАСИБО