Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Gulshan Kumar. Effective Intrusion Detection using Feature Selection. – М.: LAP Lambert Academic Publishing, 2014. – 92 с.

Дополнительные результаты

  1. Ken Geiser. Materials Matter: Toward a Sustainable Materials Policy (Urban and Industrial Environments). – М.: , 0. – 0 с.
  2. Safe Schools: A Security and Loss Prevention Plan. – М.: , 0. – 0 с.
  3. Ben A. Munk. Frequency Selective Surfaces: Theory and Design. – М.: , 0. – 0 с.
  4. Jeanette Smith. The New Publicity Kit. – М.: , 0. – 0 с.
  5. Paul Gerrard, Neil Thompson. Risk Based E-Business Testing. – М.: , 0. – 0 с.
  6. Moira Green. NOT! The Same Old Activities For Early Childhood. – М.: , 0. – 0 с.
  7. Joe Habraken. 10 Minute Guide to Microsoft Office XP. – М.: , 0. – 0 с.
  8. Dorothy E. Denning, Peter J. Denning. Internet Besieged. – М.: , 0. – 0 с.
  9. Joe Habraken. Microsoft Office XP 10 Minute Guide Bundle. – М.: , 0. – 0 с.
  10. William R. Pasewark. ClarisWorks 4.0 Macintosh: Tutorial and Applications. – М.: , 0. – 0 с.
  11. Steven R. Daugherty. Getting A's: Secrets Expert Learners Use To Get Straight A's. – М.: , 2004. – 0 с.
  12. Noel Llopis. C++ For Game Programmers (Game Development Series). – М.: , 2003. – 412 с.
  13. David R. Anderson, Dennis J. Sweeney, Thomas A. Williams. Essentials of Statistics for Business and Economics (with CD-ROM and InfoTrac). – М.: , 2005. – 672 с.
  14. Paul Piccard, Jeremy Faircloth. Combating Spyware in the Enterprise. – М.: , 2006. – 386 с.
  15. Kenneth A Kim, John R. Nofsinger. Corporate Governance. – М.: , 2006. – 192 с.
  16. Jeffrey T. Frederick. Mastering Voir Dire and Jury Selection, Second Edition: Gain an Edge in Questioning and Selecting Your Jury. – М.: , 2005. – 313 с.
  17. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с.
  18. Tom Graves. SEMPER and SCORE: enhancing enterprise effectiveness. – М.: , 2008. – 140 с.
  19. Trust, Privacy and Security in Digital Business: 5th International Conference, TrustBus 2008 Turin, Italy, September 1-5, 2008, Proceedings (Lecture Notes in Computer Science). – М.: , 2008. – 205 с.
  20. Professor Susanna Hornig Priest. Doing Media Research: An Introduction. – М.: , 2009. – 272 с.
  21. Harvard Business School Press. Managing Projects: Expert Solutions to Everyday Challenges (Pocket Mentor). – М.: , 2006. – 100 с.
  22. Mark A. Franklin, Patrick Crowley, Haldun Hadimioglu, Peter Z. Onufryk. Network Processor Design, Volume 3: Issues and Practices. – М.: Morgan Kaufmann, 2005. – 336 с.
  23. Graeme D. Ruxton, Thomas N. Sherratt, Michael P. Speed. Avoiding Attack: The Evolutionary Ecology of Crypsis, Warning Signals and Mimicry. – М.: Oxford University Press, 2005. – 260 с.
  24. Random Effect and Latent Variable Model Selection (Lecture Notes in Statistics). – М.: , 2008. – 174 с.
  25. Spencer Drate, Judith Salavetz. VFX Artistry: A Visual Tour of How the Studios Create Their Magic. – М.: Focal Press, 2010. – 192 с.
  26. Rory Bray. OSSEC Host-Based Intrusion Detection Guide. – М.: , 2010. – 416 с.
  27. Syngress. Snort Intrusion Detection 2.0. – М.: , 2010. – 550 с.
  28. Jeffrey K. Aronson. Meyler's Side Effects of Drugs Used in Anesthesia. – М.: , 2010. – 320 с.
  29. Brian Caswell. Snort Intrusion Detection and Prevention Toolkit. – М.: , 2010. – 768 с.
  30. David Hoyle. ISO 9000 Quality Systems Handbook: Using the Standards as a Framework for Business Improvement. – М.: Butterworth-Heinemann, 2010. – 824 с.
  31. Robert Barnard. Intrusion Detection Systems. – М.: , 2010. – 480 с.
  32. Terry Escamilla. Intrusion Detection. – М.: , 1998. – 368 с.
  33. Hacking Exposed Malware And Rootkits. – М.: , 2011. – 400 с.
  34. Tips And Traps For Writing An Effective Business Plan. – М.: , 2011. – 368 с.
  35. Oracle Database 11G Sql. – М.: , 2011. – 656 с.
  36. Gray Hat Hacking The Ethical Hackers Handbook, 3Rd Edition. – М.: , 2011. – 720 с.
  37. Fundamentals Of Network Security. – М.: , 2011. – 672 с.
  38. Greg Holden. Guide to Firewalls and Network Security: Intrusion Detection and VPNs. – М.: Course Technology, 2003. – 512 с.
  39. Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky. Cisco Security Professional's Guide to Secure Intrusion Detection Systems. – М.: , . –  с.
  40. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . –  с.
  41. Ido Dubrawsky. How to Cheat at Securing Your Network. – М.: Syngress, 2007. – 432 с.
  42. Seiwert. Effective Time Management: Using Microsoft Outlook to Organize Your Work and Personal Life. – М.: , 2011. –  с.
  43. MESHANKO. THE RESPECT EFFECT: HOW TO USE THE SCIENCE OF NEUROLEADERSHIP TO INSPIRE A MORE LOYAL AND PRODUCTIVE WORKPLACE. – М.: , 2013. –  с.
  44. Mary Berry. Mary Berry: Cooks The Perfect: Step by Step. – М.: Дорлинг Киндерсли, 2014. – 352 с.
  45. Saroj Dhakal. Study on Vacant Frequency Bands in Cognitive Radio. – М.: LAP Lambert Academic Publishing, 2014. – 60 с.
  46. Kevin Freedman. Seizure Detection Using A Support Vector Machine Algorithm. – М.: LAP Lambert Academic Publishing, 2010. – 76 с.
  47. Jianbo Yang. Feature selection and model selection in supervised learning. – М.: LAP Lambert Academic Publishing, 2015. – 160 с.
  48. Burcu Aytekin. Intelligent Vehicles for Increasing Driving Safety. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  49. Anup Bhange and Manmeet Kaur Marhas. Anomaly Detection in Network Traffic; A Statistical Approach. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  50. Benjamin Berwick. Calibration of AASHTO LRFD Bridge Design Specifications. – М.: LAP Lambert Academic Publishing, 2013. – 128 с.
  51. Amit Satpathy. Feature and Classifier Development. – М.: LAP Lambert Academic Publishing, 2014. – 120 с.
  52. Preeti Chaurasia,Rashi Kohli and Anchal Garg. Biometrics Minutiae Detection and Feature Extraction. – М.: LAP Lambert Academic Publishing, 2014. – 80 с.
  53. Gulshan Kumar. Effective Intrusion Detection using Genetic Algorithms. – М.: LAP Lambert Academic Publishing, 2014. – 100 с.
  54. Codrin Daranga. POLYMER MODIFIED ASPHALT CEMENTS. – М.: LAP Lambert Academic Publishing, 2010. – 104 с.
  55. Edward Sazonov. AUTOMATED DAMAGE DETECTION. – М.: LAP Lambert Academic Publishing, 2010. – 208 с.
  56. Tanmoy Hazra. Application of PCA in IDS. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  57. Mansour Tahernezhadi. Pilot-Assisted Channel Estimation for Multipath DS-CDMA Systems. – М.: LAP Lambert Academic Publishing, 2009. – 92 с.
  58. Atti Ur Rehman and Muhammad Asif. Spectrum Sensing Techniques: Comparative Analysis. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  59. Jeff Fortuna. ICA FEATURE EXTRACTION AND SUPPORT VECTOR MACHINE IMAGE CLASSIFICATION. – М.: LAP Lambert Academic Publishing, 2010. – 184 с.
  60. Suvadip Batabyal. Road Traffic Congestion Detection using Active RFID and GSM Technology. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  61. Majid Naghmash and Faeza A. Abid. Wireless Communication System Based Coded OFDM Transceiver. – М.: LAP Lambert Academic Publishing, 2014. – 96 с.
  62. Behnaz Ghoraani and Sridhar Krishnan. Time-frequency Feature Analysis. – М.: LAP Lambert Academic Publishing, 2011. – 328 с.
  63. Kuldeep Singh and Sunil Agrawal. Internet Traffic Classification. – М.: LAP Lambert Academic Publishing, 2011. – 100 с.
  64. Gunter Reise. MIMO receivers using soft information. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  65. Abhishek R.,Ashrith N. and Arjun N. Phase Angle Measurement using a PLL. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  66. Dina A. Ragab. Breast Cancer Detection Using Image Processing and Electromagnetics. – М.: LAP Lambert Academic Publishing, 2014. – 140 с.
  67. Nida Aziz. Control of a Virtual Hand Using a Brain-Computer Interface System. – М.: LAP Lambert Academic Publishing, 2011. – 104 с.
  68. Mohd Ariffanan Mohd Basri. Medical Image Classification and Symptoms Detection Using Neuro Fuzzy. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  69. Harsimranjit Singh Gill. Eliminate the effect of MAI using different techniques. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  70. Huang-Chun Roan. Network Intrusion Detection Based on Shift-OR Circuit. – М.: LAP Lambert Academic Publishing, 2011. – 60 с.
  71. Jian Qu. Diagnostics and Prognostics. – М.: LAP Lambert Academic Publishing, 2011. – 164 с.
  72. Ahmed M. Aboulfotoh. Improvement Of Anaerobic Digesters Using Pre-selected Micro-organisms. – М.: LAP Lambert Academic Publishing, 2013. – 228 с.
  73. Heba Abu Samra. Feature Selection. – М.: LAP Lambert Academic Publishing, 2013. – 64 с.
  74. G. Chenchu Krishnaiah,T.Jayachandra Prasad and M.N.Giri Prasad. Effective Image Compression using Evolved Wavelets. – М.: LAP Lambert Academic Publishing, 2012. – 232 с.
  75. M. Sadiq Ali Khan and S. M. Aqil Burney. Recent Trends in Intrusion Detection System & Network Monitoring. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  76. Ramya Neelagandan. High-performance Face Detection Using Mct and Adaboost Algorithm. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  77. Mary Strand. The Mere Exposure Effect and In-Game Advertising. – М.: LAP Lambert Academic Publishing, 2013. – 152 с.
  78. Anjum Ara M. K. Ahmad. Effect of Female Literacy on Select Economic and Demographic Variables. – М.: LAP Lambert Academic Publishing, 2014. – 312 с.
  79. Olimpia Budriga. Laser assisted K-shell Compton effect. – М.: Scholars' Press, 2014. – 120 с.
  80. Abiyot Yismaw. Forest Cover Change Detection Using Remote Sensing and GIS Techniques. – М.: LAP Lambert Academic Publishing, 2011. – 100 с.
  81. Waheed Babatunde Yahya. Genes Selection and Tumour Classifications in Cancer Research. – М.: LAP Lambert Academic Publishing, 2012. – 252 с.
  82. Asmaa Mohamed el shafey. Physical chemistry principles of paper banknotes' security features. – М.: LAP Lambert Academic Publishing, 2012. – 268 с.
  83. Moses Esilaba. Effect of wildlife on forage selection by cattle in a semi-arid lands. – М.: LAP Lambert Academic Publishing, 2014. – 200 с.
  84. D. Lavanya and K. Usha Rani. Decision Trees and Hybrid Approaches. – М.: Scholars' Press, 2014. – 96 с.
  85. Ali G. Mahmoud. Plot-Based Land-Cover and Soil-Moisture Mapping Using SAR Data. – М.: LAP Lambert Academic Publishing, 2014. – 216 с.
  86. Zeinab Bakhshipour. Detection of Geotechnical Problems Using Resistivity Methods. – М.: LAP Lambert Academic Publishing, 2011. – 192 с.
  87. Vijaya Kumar Anumolu,Krishnaiah Nelapati and Venkteswara Rao Lakkineni. Detection of Salmonella Typhimurium in livestock products by PCR assay. – М.: LAP Lambert Academic Publishing, 2012. – 112 с.
  88. Vittal Mogasale. Cost-effectiveness of Selected Immunisation Programs in Australia. – М.: LAP Lambert Academic Publishing, 2011. – 128 с.
  89. Shaheen Ahmed. Feature Selection and Segmentation for Posterior fossa tumors. – М.: LAP Lambert Academic Publishing, 2011. – 140 с.
  90. Paul Mupa and Raphinos Alexander Chabaya. Effect of class size on students'' opportunity to learn. – М.: LAP Lambert Academic Publishing, 2011. – 112 с.
  91. Abhay Nath Singh. Honeypot Based Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  92. Shahnawaz Husain,S. C. Gupta and R. C. Joshi. Intrusion Detection Engine for Adhoc Environment. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  93. Sumaya Saad Sulaiman and Sarab M. Hameed. A Fuzzy Based Clustering for Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  94. Shubha Puthran and Ketan Shah. Intrusion Detection System using datamining techniques. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  95. Mohammad S. I. Mamun. Intrusion Detection System Architecture in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  96. Heba Fathy Eid. Computational Intelligence in Network Intrusion Detection System. – М.: Scholars' Press, 2014. – 164 с.
  97. Janakiraman S. Distributed Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 164 с.
  98. Yogesh Kumar,Krishan Kumar and Gulshan Kumar. Feature Selection For Intrusion Detection Systems. – М.: LAP Lambert Academic Publishing, 2014. – 100 с.
  99. Syed Zahidur Rashid. Computer Network Security Monitoring. – М.: Scholars' Press, 2015. – 284 с.
  100. Lanier Watkins. Resource Discovery: Using Network Traffic To Infer CPU And Memory Load. – М.: LAP Lambert Academic Publishing, 2014. – 96 с.
  101. Gulshan Kumar. Effective Intrusion Detection using Feature Selection. – М.: LAP Lambert Academic Publishing, 2014. – 92 с.
  102. Mrutyunjaya Panda and Manas Ranjan Patra. A Data Mining Approach to Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2015. – 216 с.
  103. Glenn Wilkinson. Identification of Hostile TCP Traffic using Support Vector Machines. – М.: LAP Lambert Academic Publishing, 2010. – 80 с.
  104. Mueen Uddin. Dynamic Multi Layer Signature based IDS System using Mobile Agents. – М.: LAP Lambert Academic Publishing, 2011. – 72 с.
  105. Ivano Malavolta. A tamper resistant Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2011. – 144 с.
  106. Shaffali Gupta and Sanmeet Kaur. A GUI Framework for detecting Intrusions using Bro IDS. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  107. Mahmoud Jazzar. Computer Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 240 с.
  108. Siva S. Sivatha Sindhu,S. Geetha and S. Selvakumar. Network Intrusion Detection System using Machine Learning Techniques. – М.: LAP Lambert Academic Publishing, 2013. – 80 с.
  109. Gaurav Mishra and Gulshan Ahuja. Classification of data mining techniques in intrusion detection. – М.: LAP Lambert Academic Publishing, 2013. – 52 с.
  110. Nasim Beigi-Mohammadi. Smart Meter Networks: Intrusion Detection System by Design. – М.: LAP Lambert Academic Publishing, 2014. – 136 с.
  111. Christian Chetachi Umunna. Distributed Intrusion Detection System in Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 104 с.
  112. Sivaraju Sharmila and U. Mamaheshwari G. Detection Schemes for Selective Forward Attack in WSN. – М.: LAP Lambert Academic Publishing, 2012. – 72 с.
  113. Iftikhar Ahmad. Feature Subset Selection in Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 220 с.
  114. Saima Munawar. Detection and Classification Of Normal and Anomaly IP Packet. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  115. Jabarweer Singh,Krishan Kumar and Gulshan Kumar. Intrusion detection using artificial intelligence based ensembles. – М.: LAP Lambert Academic Publishing, 2014. – 116 с.
  116. Govind Sreekar Shenoy. Architecture Support for Intrusion Detection systems. – М.: LAP Lambert Academic Publishing, 2014. – 160 с.
  117. Monis Akhlaq,Irfan Awan and Faeiz Alserhani. Improved Performance High Speed Network Intrusion Detection Systems. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  118. Mohammed S. Khalil. Fingerprint Authentication Based on Statistical Features. – М.: LAP Lambert Academic Publishing, 2012. – 180 с.
  119. Bibi Masoomeh Aslahi Shahri. Intrusion Detection System Using Hybrid Gsa-kmeans. – М.: LAP Lambert Academic Publishing, 2014. – 128 с.
  120. Amanpreet Chauhan. Survey on data mining techniques in intrusion detection. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  121. Tigabu Dagne Akal. Constructing Predictive Model for Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 160 с.
  122. Kamrul Hasan. An Investigation into Botnet Detection System. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  123. Subramanian Appavu alias Balamurugan. Feature Selection Methods Best Practices. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  124. Subramanian Appavu alias Balamurugan. Feature Selection for Knowledge Discovery and Data Mining. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  125. Shady S. Al-Atrash and Ibrahim Abuhaiba. Robust Face Recognition. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  126. Rupali Pathak. Recent Advances In Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  127. Fadel O. Shaban. Spyware Detection. – М.: LAP Lambert Academic Publishing, 2013. – 92 с.
  128. Sait Can Yucebas. A Hybrid Feature Selection Model For Genome Wide Association Studies. – М.: LAP Lambert Academic Publishing, 2014. – 232 с.
  129. Barnali Sahu and Debahuti Mishra. Feature Selection for Cancer Classification. – М.: LAP Lambert Academic Publishing, 2012. – 140 с.
  130. Peter Kan. Automatic image-based 3D head modeling. – М.: LAP Lambert Academic Publishing, 2010. – 56 с.
  131. Thibault Helleputte. Stable Feature Selection in Empty Spaces. – М.: LAP Lambert Academic Publishing, 2011. – 268 с.
  132. Senthamarai Kannan Subramanian. Hybrid Methods in Feature Selection: A Data Classification Perspective. – М.: LAP Lambert Academic Publishing, 2011. – 64 с.
  133. B. Sarojini and N. Ramaraj. Dimensionality Reduction Techniques in Medical Informatics. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  134. Sathish Kumar. Intrusion Detection and Response Techniques for Mobile Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 200 с.
  135. Debdoot Sheet,Ajoy Kumar Ray and Jyotirmoy Chatterjee. Feature Usability Index. – М.: LAP Lambert Academic Publishing, 2011. – 84 с.
  136. Richard Rimiru. Exploring Immune System's Concepts for the Design of Novel AIS Models. – М.: LAP Lambert Academic Publishing, 2012. – 164 с.
  137. Mesfin Tadesse Bekalo. Landuse Change Detection Using GIS, Remote Sensing and Spatial Metrics. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  138. Peter Raab. Hardware-Fault-Tolerant Data Processing. – М.: Scholars' Press, 2014. – 96 с.
  139. Jacob Gjesdahl. Viewshed Modelling for Effects of Land Use on Property Values. – М.: LAP Lambert Academic Publishing, 2014. – 80 с.
  140. Dilek Y?ld?z. A Multi-Factor Model of Use Value for Enclosed Outdoor Spaces. – М.: LAP Lambert Academic Publishing, 2012. – 188 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Служба безопасности - надежная опора бизнеса. интервью с С. Бугримовым, директором по корпоративной безопасности ОАО "Комстар-ОТС", Д. Зенкиным, директором по маркетингу, компания Perimetrix, группа компаний "Компью-Линк", К. Борисовым, управляющим директором Morgan Hunt Selection. "Управление персоналом", № 7, апрель 2009.

Образцы работ

Тема и предметТип и объем работы
Многостороннее регулирование внешней торговли
Международные экономические отношения
Диплом
154 стр.
Последствия операции НАТО
Политология
Диплом
80 стр.
Слияния и поглощения Мировая и Российская практика
Мировая экономика
Диплом
99 стр.
Привлекательности труда в организации
Психология
Курсовая работа
35 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Людмила
Здравствуйте! Спасибо за помощь))!!! Защитилась,4.