Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Timothy Braithwaite. Securing E-Business Systems: A Guide for Managers and Executives. – М.: , 0. – 0 с. Lech Janczewski. Managerial Guide for Handling Cyber-Terrorism and Information Warfare. – М.: , 2005. – 0 с. Andy Walker. Windows Lockdown!: Your XP and Vista Guide Against Hacks, Attacks, and Other Internet Mayhem (Absolute Beginner's Guide). – М.: , 2008. – 480 с. Ken Dunham, Jim Melnick. Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet. – М.: , 2008. – 168 с. National Safety Council. Accident Prevention Manual: Security Management 2nd Edition. – М.: , 2010. – 407 с. Joseph Menn. Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet. – М.: PublicAffairs, 2010. – 304 с. Edward Amoroso. Cyber Attacks. – М.: , 2010. – 336 с. Rob Shein. Zero-Day Exploit: Countdown to Darkness. – М.: Syngress, 2008. – 364 с. Sudarshan Ranpise. Cyber Crime Prevention. – М.: LAP Lambert Academic Publishing, 2013. – 268 с. Olivia Tan Swee Leng,Shereen Khan and Reza Mohamad Hossein. Cybercrime and Cyber Terrorism: The Security Measures in Malaysia. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Lane Thames. Advancing Cyber Security. – М.: LAP Lambert Academic Publishing, 2013. – 256 с. Narayan Ranjan Chakraborty. Analysis of Web security attacks: Bangladesh perspective. – М.: LAP Lambert Academic Publishing, 2012. – 124 с. Vikas Pareek. Cyber Crime in Indian Context. – М.: LAP Lambert Academic Publishing, 2013. – 56 с. Lamek Ronoh. Security Concern of Cloud Computing Models. – М.: LAP Lambert Academic Publishing, 2014. – 88 с. Mitko Bogdanoski,Aleksandar Risteski and Marjan Bogdanoski. Cyber operations - a permanent part of the global conflict. – М.: LAP Lambert Academic Publishing, 2014. – 60 с. Stephen Schiavone,Lalit Garg and Kelly Summers. Information Security in Enterprises - an Ontological Perspective. – М.: LAP Lambert Academic Publishing, 2014. – 232 с. Christopher Beggs. Safeguarding Infrastructure Assets from Cyber-terrorism. – М.: LAP Lambert Academic Publishing, 2010. – 348 с. Julien Shabani. Information Security for RFID Systems. – М.: LAP Lambert Academic Publishing, 2011. – 92 с. Predrag Tasevski. Interactive Cyber Security Awareness Program. – М.: LAP Lambert Academic Publishing, 2012. – 184 с. Adam Hudaib. Social Media Cyber Crimes And XKeyscore Espionage Technologies. – М.: LAP Lambert Academic Publishing, 2015. – 108 с. Irfan Syamsuddin. Guidelines for Computer Forensics Investigations in Developing Country. – М.: LAP Lambert Academic Publishing, 2011. – 104 с. Hossein Rouhani Zeidanloo and Sahar Rouhani. Botnet Detection by Monitoring Common Network Behaviors. – М.: LAP Lambert Academic Publishing, 2012. – 104 с. Kane Bignell. Authentication Strategies for Internet Banking. – М.: LAP Lambert Academic Publishing, 2010. – 164 с. Georgia Weidman. Penetration Testing: A Hands-On Introduction to Hacking. – М.: No Starch Press, 2014. – 528 с. Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks. – М.: , . – с. Дополнительные результаты agendaCPS: Integrierte Forschungsagenda Cyber-Physical Systems (acatech STUDIE) (German Edition). – М.: , 2012. – 297 с. Brad Henson. Heart Attack Survivor: A Field Guide. – М.: , 0. – 0 с. Christopher Barnatt. Cyber Business : Mindsets for a Wired Age. – М.: , 0. – 0 с. Information Warfare : corporate attack and defence in a digital world (Computer Weekly Professional (Paperback)). – М.: , 0. – 0 с. Timothy Braithwaite. Securing E-Business Systems: A Guide for Managers and Executives. – М.: , 0. – 0 с. Eric Dezenhall. Nail 'Em!: Confronting High-Profile Attacks on Celebrities & Businesses. – М.: , 0. – 0 с. Jay Conrad Levinson. Guerrilla Marketing Attack: New Strategies, Tactics, and Weapons for Winning Big Profits for Your Small Business. – М.: Houghton Mifflin Co, 1989. – 208 с. Lech Janczewski. Managerial Guide for Handling Cyber-Terrorism and Information Warfare. – М.: , 2005. – 0 с. Sung-Chi Chu. 4th Party Cyber Logistics for Air Cargo (International Series in Operations Research & Management Science). – М.: , 2004. – 0 с. The Economic Impacts of Terrorist Attacks. – М.: , 2006. – 315 с. Andy Walker. Windows Lockdown!: Your XP and Vista Guide Against Hacks, Attacks, and Other Internet Mayhem (Absolute Beginner's Guide). – М.: , 2008. – 480 с. Ken Dunham, Jim Melnick. Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet. – М.: , 2008. – 168 с. Ibp Usa. Global Terrorism Attacks Encyclopedic Handbook. – М.: , 2008. – 300 с. Operations Research and Cyber-Infrastructure (Operations Research/Computer Science Interfaces Series). – М.: , 2009. – 462 с. Shaheen Shariff. Confronting Cyber-Bullying. – М.: Cambridge University Press, 2009. – 296 с. National Safety Council. Accident Prevention Manual: Security Management 2nd Edition. – М.: , 2010. – 407 с. Francis T. Cullen. Corporate Crime Under Attack. – М.: , 2010. – 350 с. Kurt Rohner. Marketing in the Cyber Age. – М.: , 1998. – 240 с. Graeme D. Ruxton, Thomas N. Sherratt, Michael P. Speed. Avoiding Attack: The Evolutionary Ecology of Crypsis, Warning Signals and Mimicry. – М.: Oxford University Press, 2005. – 260 с. Thomas B. Allen. Shark Attacks: Their Causes and Avoidance. – М.: The Lyons Press, 2001. – 312 с. Zaharina Velikova. A Lattice Attack on the McEliece Public Key Cryptosystem: Lattice Basis Reduction Algorithms in Cryptography. – М.: , 2008. – 132 с. Joseph Menn. Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet. – М.: PublicAffairs, 2010. – 304 с. Rob Kraus. Seven Deadliest Microsoft Attacks. – М.: , 2010. – 192 с. Mike Shema. Seven Deadliest Web Application Attacks. – М.: , 2010. – 192 с. Ken Dunham. Mobile Malware Attacks and Defense. – М.: , 2010. – 440 с. Edward Amoroso. Cyber Attacks. – М.: , 2010. – 336 с. Seth Fogie. XSS Attacks. – М.: , 2010. – 480 с. Anthony Reyes. Cyber Crime Investigations. – М.: , 2010. – 432 с. Justin Clarke. SQL Injection Attacks and Defense. – М.: , 2010. – 496 с. Anthony Reyes. 2008 Cyber Crime Investigator's Professional CD. – М.: , 2010. – 3078 с. Rob Shein. Zero-Day Exploit: Countdown to Darkness. – М.: Syngress, 2008. – 364 с. Tom Parker. Cyber Adversary Characterization. – М.: , 2010. – 512 с. Mark Kostich. Beyond Attack. – М.: , 2010. – 96 с. W Lowrie. Attack Upon Christendom (Paper). – М.: , 1992. – 304 с. Richard Af Falkenrath. America?s Achilles? Heel – Nuclear, Biological & Chemical Terrorism & Convert Attack. – М.: , 1998. – 384 с. Gray. Angle of Attack. – М.: , 2007. – 304 с. Ephraim Kam. Surprise Attack – The Victim?s Perspective. – М.: , 2004. – 304 с. Mike Godwin. Cyber Rights – Defending Free Speech in the Digital Age. – М.: , 2003. – 416 с. Hf Pitkin. Attack of the Blob – Hannah Arendt?s Concept of the Social. – М.: , 2000. – 366 с. Ncta. The 9/11 Commission Report – The Attack from Planning to Aftermath – Shorter Edition. – М.: , 2011. – 0 с. G. Jack Bologna. Avoiding Cyber Fraud in Small Businesses. – М.: , 2000. – 256 с. Sam Palatnik. The King in Jeopardy – The Best Techniques for Attack & Defense Rev. – М.: , 1999. – 256 с. Robert P Flood. Speculative Bubbles, Speculative Attacks & Policy Switching. – М.: , 1994. – 506 с. Joanie Farley–gillispi. Cyber Rules – What You Really Need to Know About the Internet The Essential Guide for Clinicians, Educators and Parents. – М.: , 2007. – 304 с. OCMA. Ocma ?elec 4 Underground? Armoured Cable Protected Against Solvent Penet & Corros Attack. – М.: , 1974. – 0 с. David L. Brown. Cyber–Investing. – М.: , 1995. – 286 с. David L. Brown. Cyber–Investing. – М.: , 1995. – 286 с. John Chirillo. Hack Attacks Encyclopedia. – М.: , 2001. – 960 с. Coombs. Attacking Rural Poverty. – М.: , 1974. – 0 с. Richard Hooker. The Folger Library Edition of The Works of Richard Hooker – Of the Laws of Ecclesiastical Polity Attack & Response V 4. – М.: , 1990. – 332 с. Coombs. Attacking Rural Poverty. – М.: , 1974. – 0 с. Jeffrey Carr. Inside Cyber Warfare. – М.: , 2010. – 232 с. A Moghadam. The Globalization of Martyrdom – Al Qaeda, Salafi Jihad, and the Diffusion of Suicide Attacks. – М.: , 2009. – 360 с. National Commis. 9/11 Commission Report – The Full Final Report of the National Commission on Terrorist Attacks Upon the United States (spiral and indexed). – М.: , 2004. – 0 с. John Chirillo. Hack Attacks Denied. – М.: , 2001. – 512 с. John Chirillo. Hack Attacks Revealed. – М.: , 2001. – 960 с. Jr Pusey. Wu Han – Attacking the Present through the Past. – М.: , 1974. – 94 с. Greg Michalowski. Attacking Currency Trends. – М.: , 2011. – 304 с. David L. Brown. Cyber–Investing. – М.: , 1997. – 310 с. David L. Brown. Cyber–Investing. – М.: , 1997. – 336 с. Bruce Ackerman. Before the Next Attack – Protecting Civil Liberties in an Age of Terrorism. – М.: , 2006. – 224 с. Joseph Scalia. Intimate Violence – Attacks Upon Psychic Interiority. – М.: , 2002. – 176 с. John Chirillo. Hack Attacks Testing. – М.: , 2003. – 560 с. Christopher Barnatt. Cyber Business. – М.: , 1995. – 256 с. E Kam. Surprise Attack – The Victims Perspective. – М.: , 1988. – 304 с. Richard H. Buskirk. Frontal Attack, Divide and Conquer, The Fait Accompli and 118 Other Tactics Managers Must Know. – М.: , 1989. – 244 с. Nancy E. Willard. Cyber–Safe Kids, Cyber–Savvy Teens. – М.: , 2007. – 336 с. Joseph Mason. Let My Heart Attack Save Your Life. – М.: , 1998. – 240 с. Mike Gray. Angle of Attack – Harrison Storms & the Race to the Moon. – М.: , 1993. – 304 с. Paul Kligfield. The Cardiac Recovery Handbook – The Complete Guide to Life After Heart Attack or Heart Surgery. – М.: , 2006. – 296 с. Assaf Moghadam. The Globalization of Martyrdom – Al Qaeda, Salafi Jihad, and the Diffusion of Suicide Attacks. – М.: , 2011. – 360 с. Advising the Householder on Protection Against Nuclear Attack. – М.: V&A Publications, 2008. – 24 с. Eric D. Knapp, Raj Samani. Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure. – М.: Syngress, 2013. – 228 с. Herbert Puchta, Jeff Stranks, Gunter Gerngross, Christian Holzmann, Peter Lewis-Jones. More! Level 4: Student's Book with Cyber Homework (+ CD-ROM). – М.: Cambridge University Press, 2012. – 128 с. Herbert Puchta, Jeff Stranks, Gunter Gerngross, Christian Holzmann, Peter Lewis-Jones. More! Level 3: Student's Book: With Cyber Homework and Online Resources. – М.: Cambridge University Press, Helbling Languages, 2014. – 128 с. More! Level 1: Student's Book with Cyber Homework and Online Resources. – М.: Cambridge University Press, Helbling Languages, 2014. – 144 с. More! Level 2: Student's Book with Cyber Homework and Online Resources. – М.: Cambridge University Press, Helbling Languages, 2014. – 128 с. Lesley Thompson. Zombie Attack! Starter. – М.: Oxford University Press, 2013. – 40 с. Subi Khan and R.P. Mahapatra. SQL Injection Attack and Countermeasures. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Saad Idrees. Portable Heart Attack Monitoring System with Dedicated Optical Network. – М.: LAP Lambert Academic Publishing, 2011. – 68 с. Luca Giancane. Side-Channel Attacks and Countermeasures. – М.: LAP Lambert Academic Publishing, 2012. – 172 с. Farukh Bashir. US Attack on Afghanistan and Public Response in Pakistan. – М.: LAP Lambert Academic Publishing, 2012. – 84 с. Mustafa Taha. Cyber campaigns: Internet use in the 2000 U.S. presidential election. – М.: LAP Lambert Academic Publishing, 2011. – 296 с. Khalid Sultan and Kohir Stevenson. Cyber Media in Oman. – М.: LAP Lambert Academic Publishing, 2012. – 128 с. Sakshi Ojha. Framing Breaking News: The Mumbai Terror Attacks of 2008. – М.: LAP Lambert Academic Publishing, 2010. – 96 с. Dr.M. NEELAMALAR. MEDIA COVERAGE OF 26/11 MUMBAI TERROR ATTACKS:. – М.: LAP Lambert Academic Publishing, 2010. – 184 с. Hafeez-ur- Rahman,M. Ahsan Khan and Mirza Abdul Qayyum. Bt-cotton characters & metrological factors effects on Jassid attack. – М.: LAP Lambert Academic Publishing, 2011. – 96 с. Mohammad Ruhul Amin. Spatial Analysis of Suicide Attack Incidences in Kabul City. – М.: LAP Lambert Academic Publishing, 2012. – 100 с. Bushra Rehman,Mansoor Ahmad Siddiqui and Kavita Parihar. Meloidogyne incognita attacking Chickpea. – М.: LAP Lambert Academic Publishing, 2012. – 136 с. Nyasha Madzokere. Amos'' attack of Affluent Classes:. – М.: LAP Lambert Academic Publishing, 2011. – 68 с. Charlotte Heath-Kelly. What Motivated the Terrorist Attacks of September 11th, 2001?. – М.: LAP Lambert Academic Publishing, 2010. – 76 с. Ayyaswamy Kathirvel,Srinivasan Rengaramanujam and Mohanambal Kathirvel. Prevention of attacks usign umpiring security model for manets. – М.: LAP Lambert Academic Publishing, 2012. – 192 с. Sudarshan Ranpise. Cyber Crime Prevention. – М.: LAP Lambert Academic Publishing, 2013. – 268 с. Olivia Tan Swee Leng,Shereen Khan and Reza Mohamad Hossein. Cybercrime and Cyber Terrorism: The Security Measures in Malaysia. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Henry Osborn Quarshie. Cyber crime in a world without borders. – М.: LAP Lambert Academic Publishing, 2012. – 320 с. Akash Rattan Singh Cheema. Cyber Crimes And Bulging Dimensions. – М.: LAP Lambert Academic Publishing, 2013. – 80 с. Gurmanpreet Kaur,Anand Pawar and Simranpreet Kaur. Cyber Terrorism and Law. – М.: LAP Lambert Academic Publishing, 2012. – 128 с. Vaibhav Priyadarshi. GLOBAL ANALYSIS OF LAWS RELATED TO CYBER SQUATTING. – М.: LAP Lambert Academic Publishing, 2011. – 84 с. Md. Abul Hasnat and Mainul Hasan Rawshani. Cyber Crime. – М.: LAP Lambert Academic Publishing, 2011. – 192 с. Akatukunda Joel Kakuru. The Cyber revolution and copyright infringement in Uganda. – М.: LAP Lambert Academic Publishing, 2012. – 92 с. Ade Irma Junida and Didi Sukyadi. A Semiotic Analysis of Cyber Emoticons. – М.: LAP Lambert Academic Publishing, 2012. – 92 с. Vishal Vora. Implementation and Analysis of Various Attacks on Digital Images. – М.: LAP Lambert Academic Publishing, 2012. – 112 с. Nisarg Gandhewar and Rahila Sheikh. Performance Valuation of AODV Under Sinkhole Attack In MANET Using NS2. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Mohamed Amine Ferrag. Study of Attacks in Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 84 с. Cong Hoan Vu and Adeyinka Soneye. Collaborative Attacks on MANETs. – М.: LAP Lambert Academic Publishing, 2010. – 76 с. Kundan Munjal,Shilpa Verma and Namita Munjal. Cooperative Black Hole Attack Detection by Modifying AODV. – М.: LAP Lambert Academic Publishing, 2012. – 64 с. Lane Thames. Advancing Cyber Security. – М.: LAP Lambert Academic Publishing, 2013. – 256 с. Ulya Sabeel and Nidhi Chandra. ADLS: Attack Detection & Localization Scheme in WSN. – М.: LAP Lambert Academic Publishing, 2014. – 68 с. Sushant Sudhakar Bahekar and Prashant Panse. Energy Efficient Mechanism for Detection of Wormhole Attacks. – М.: LAP Lambert Academic Publishing, 2014. – 72 с. Ali Modirkhazeni. Mitigation of Passive Wormhole Attack in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2015. – 112 с. Madhav P. Namdev. Phishing Attacks and Detection. – М.: LAP Lambert Academic Publishing, 2015. – 68 с. Amol Zade. A New Cluster Approach for Wormhole Attack Removal in MANET using NS2. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Narayan Ranjan Chakraborty. Analysis of Web security attacks: Bangladesh perspective. – М.: LAP Lambert Academic Publishing, 2012. – 124 с. Anup Parkash Singh Virk. Direct Collaborative Attacks on MANET. – М.: LAP Lambert Academic Publishing, 2012. – 96 с. Prashant Kumar Singh and Avimanyou Kumar Vatsa. Taxonomy Based Intrusion Attacks and Detection Scheme in P2P Network. – М.: LAP Lambert Academic Publishing, 2012. – 56 с. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с. Pallavi Kaliyar and Gagan Singla. A secure routing protocol for MANETs against byzantine attacks. – М.: LAP Lambert Academic Publishing, 2013. – 84 с. E.O. Ibidunmoye and B.K. Alese. Game-Theoretic Analysis of Network Attack-Defense Interactions. – М.: LAP Lambert Academic Publishing, 2013. – 108 с. ANNADURAI P and Dr. V. PALANISAMY. Impact of Black Hole Attack on Multicast in Ad hoc Network (IBAMA). – М.: LAP Lambert Academic Publishing, 2011. – 84 с. Sivaraju Sharmila and U. Mamaheshwari G. Detection Schemes for Selective Forward Attack in WSN. – М.: LAP Lambert Academic Publishing, 2012. – 72 с. Shanmugam Bharathy Dhivya. A Study of Foiling Vehicles from Sybil Attack Using Pseudonyms. – М.: LAP Lambert Academic Publishing, 2012. – 100 с. Natarajan Meghanathan,DeShante C. Johnson and Alexander R. Geoghegan. An Analysis of Software Security Attacks and Mitigation Controls. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Vikas Pareek. Cyber Crime in Indian Context. – М.: LAP Lambert Academic Publishing, 2013. – 56 с. Jayeeta Majumder and Gargi Saha. SQL Injection Attacks and possible Remedies. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Lamek Ronoh. Security Concern of Cloud Computing Models. – М.: LAP Lambert Academic Publishing, 2014. – 88 с. Mitko Bogdanoski,Aleksandar Risteski and Marjan Bogdanoski. Cyber operations - a permanent part of the global conflict. – М.: LAP Lambert Academic Publishing, 2014. – 60 с. Ajeet Singh Poonia. Investigation and Prevention of Cyber Crime. – М.: LAP Lambert Academic Publishing, 2014. – 116 с. Samuel Mbuguah and Franklin Wabwoba. Attackability Metrics Model For Secure Service Oriented Architecture. – М.: LAP Lambert Academic Publishing, 2014. – 164 с. Poonam Kumar. The Perpetration and Prevention of Cyber Crime and Cyber Terrorism. – М.: LAP Lambert Academic Publishing, 2012. – 64 с. Stephen Schiavone,Lalit Garg and Kelly Summers. Information Security in Enterprises - an Ontological Perspective. – М.: LAP Lambert Academic Publishing, 2014. – 232 с. Christopher Beggs. Safeguarding Infrastructure Assets from Cyber-terrorism. – М.: LAP Lambert Academic Publishing, 2010. – 348 с. Julien Shabani. Information Security for RFID Systems. – М.: LAP Lambert Academic Publishing, 2011. – 92 с. Mohammed Firdos Alam Sheikh. Improving Web Security by Blocking SQL Injection Attack(SQLIA). – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Georgiana Lucan. Computer-Based Attacks on Governments. – М.: LAP Lambert Academic Publishing, 2010. – 76 с. Akram Hossain,A. K. M. Zaidi Satter and Shibli Shahriar. Side Channel Attack Prevention. – М.: LAP Lambert Academic Publishing, 2012. – 104 с. Edmond K. Machie. Network Attack Traceback And React. – М.: LAP Lambert Academic Publishing, 2013. – 208 с. Predrag Tasevski. Interactive Cyber Security Awareness Program. – М.: LAP Lambert Academic Publishing, 2012. – 184 с. Hossein Rouhani Zeidanloo and Sahar Rouhani. Botnet Detection by Monitoring Common Network Behaviors. – М.: LAP Lambert Academic Publishing, 2012. – 104 с. Georgia Weidman. Penetration Testing: A Hands-On Introduction to Hacking. – М.: No Starch Press, 2014. – 528 с. Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks. – М.: , . – с.
Лучшие результаты Ничего не найдено Дополнительные результаты Ничего не найдено
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Наталья Хотела сообщить что мой куратор приняла диплом после вашего сопровождения на отлично и я смогла защитить квалификационную работу после вашего сопровождения на отлично. СПАСИБО ОГРОМНОЕ за Вашу не оценимую помощь. Всем знакомым буду Вас советовать. СПАСИБО