Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Kurt Peray. Investing in Mutual Funds Using Fuzzy Logic. – М.: , 0. – 0 с.
  2. Syed Mahbubur Rahman. Interactive Multimedia Systems. – М.: , 0. – 0 с.
  3. CIM Coursebook 02/03: Strategic Marketing Management: Planning and Control. – М.: , 0. – 0 с.
  4. James Michael Stewart, Ed Tittel, Mike Chapple. CISSP: Certified Information Systems Security Professional Study Guide. – М.: , 2008. – 841 с.
  5. Gerard Honey. Electronic Access Control. – М.: , 2010. – 240 с.
  6. Shaikh Salim and Shankar Nawale. Secure Access of RFID System. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  7. Ramoni Adeogun. Microcontroler Based Counting and Temperature Monitoring System Design. – М.: LAP Lambert Academic Publishing, 2013. – 84 с.
  8. Shilpa Sanwlani Arora and Matthew F. Doty. Optical Spectroscopy of InAs GaAs Quantum Dot Molecules. – М.: LAP Lambert Academic Publishing, 2011. – 72 с.
  9. Andreas Haber. Remote service discovery and control. – М.: LAP Lambert Academic Publishing, 2011. – 156 с.
  10. Daniel Caragata,Safwan El Assad and Alexandru Serbanescu. Development of some encryption algorithms using chaotic functions. – М.: LAP Lambert Academic Publishing, 2011. – 88 с.
  11. Simion Pruna. Public Health Tools to Control Diabetes Care: Advanced Data Analysis. – М.: LAP Lambert Academic Publishing, 2014. – 368 с.
  12. Viswanatha Subramaniam and RAMARAJ RAVI. Cyber crime control techno-legal network. – М.: LAP Lambert Academic Publishing, 2011. – 60 с.
  13. Oxford English Dictionary for Schools. – М.: Oxford University Press, 2012. – 928 с.
  14. Susan Rennie. Oxford English Thesaurus for Schools. – М.: Oxford University Press, 2015. – 704 с.

Дополнительные результаты

  1. Data Privacy Management and Autonomous Spontaneus Security: 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, ... Computer Science / Security and Cryptology). – М.: , 2012. – 334 с.
  2. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с.
  3. Marilyn Greenstein, Todd M. Feinman. Electronic Commerce: Security Risk Management and Control. – М.: , 0. – 0 с.
  4. James F. Cox, Michael S. Spencer, James F., Iii Cox, American Production and Inventory Control Society. The Constraints Management Handbook. – М.: , 0. – 0 с.
  5. Thomas Petruzzellis. STAMP 2 Communications and Control Projects. – М.: McGraw-Hill/TAB Electronics, 2003. – 362 с.
  6. Barry Hollembeak. Automotive Electricity, Electronics and Computer Controls. – М.: , 0. – 0 с.
  7. Power Electronic Control in Electrical Systems. – М.: , 0. – 0 с.
  8. Ifip Tc11 Wg11.5 Working Conference on Integrity and Internal Control, Michael Gertz, Erik Guldentops, Leon Strous. Integrity, Internal Control and Security in Information Systems: Connecting Governance and Technology (International Federation for Information Processing). – М.: , 0. – 0 с.
  9. Ifip Tc11 Wg11.5 Working Conference on Integrity and Internal Control, Michael Gertz. Integrity and Internal Control in Information Systems V: Ifip Tc11/Wg11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (Iicis), November 11-12, 2002, Bonn, Germany (International Federation for Information Processing. – М.: , 0. – 0 с.
  10. Robert B. Gelman, Gelman, Stanton McCandlish, Electronic Frontier Foundation. Protecting Yourself Online: The Definitive Resource on Safety, Freedom, and Privacy in Cyberspace. – М.: , 0. – 0 с.
  11. Ifip Tc11 Wg11.5 Working Conference on Integrity and Internal Control, Sushil Jajodia, Leon Strous, Leon A. M. Strous. Integrity And Internal Control In Information Systems Vi: Ifip Tc11/Wg11.5 Sixth Working Conference on Integrity and Internal Control in Information S ... tional Federation for Information Processing). – М.: , 0. – 0 с.
  12. Kurt Bauknecht, Sanjay Kumar Madria, Gunther Pernul, G. Pernul, International Conference on Electronic Commerce and Web Technologies 2. Electronic Commerce and Web Technologies: First International Conference, Ec-Web 2000, London, Uk, September 4-6, 2000 Proceedings (Lecture Notes in Computer Science, 1875). – М.: , 0. – 0 с.
  13. David F. Ferraiolo, D. Richard Kuhn, Ramaswamy Chandramouli. Role-Based Access Control. – М.: , 0. – 0 с.
  14. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с.
  15. W. Bolton. Programmable Logic Controllers, Fourth Edition. – М.: , 2006. – 304 с.
  16. Rebecca S. Busch. Electronic Health Records: An Audit and Internal Control Guide. – М.: , 2008. – 228 с.
  17. James Michael Stewart, Ed Tittel, Mike Chapple. CISSP: Certified Information Systems Security Professional Study Guide. – М.: , 2008. – 841 с.
  18. Andy Walker. Windows Lockdown!: Your XP and Vista Guide Against Hacks, Attacks, and Other Internet Mayhem (Absolute Beginner's Guide). – М.: , 2008. – 480 с.
  19. Trust, Privacy and Security in Digital Business: 5th International Conference, TrustBus 2008 Turin, Italy, September 1-5, 2008, Proceedings (Lecture Notes in Computer Science). – М.: , 2008. – 205 с.
  20. Daniel Clark. Network Access Control 100 Success Secrets - 100 Most Asked NAC Questions on Implementation and Deployment of unify endpoint security technology, user ... and network security enforcement. – М.: , 2008. – 180 с.
  21. Michael E. Whitman, Herbert J. Mattord. Management of Information Security. – М.: , 2010. – 592 с.
  22. Marie-luise Leitner. Business Impacts of Web Accessibility: A Holistic Approach (Electronic Business). – М.: , 2010. – 226 с.
  23. Elen Ferrari. Access Control in Data Management Systems (Synthesis Lectures on Data Management). – М.: , 2010. – 118 с.
  24. Robert A. Wilson, Frank Keil. The MIT Encyclopedia of the Cognitive Sciences (MITECS). – М.: The MIT Press, 1999. – 1096 с.
  25. Klaus W. Grewlich. Governance in "Cyberspace: Access and Public Interest in Global Communications (Law and Electronic Commerce, V. 9). – М.: , 0. – 0 с.
  26. Bradford P. Smith. Large Animal Internal Medicine - Text and VETERINARY CONSULT Package. – М.: , 2008. – 0 с.
  27. Stanley Jablonski. Jablonski's Dictionary of Medical Acronyms and Abbreviations with CD-ROM (Dictionary of Medical Acronyms and Abbreviations (Jablonski)). – М.: , 2008. – 544 с.
  28. Dawn E. Christenson. Veterinary Medical Terminology - Text and VETERINARY CONSULT Package. – М.: Saunders Ltd., 2008. – 0 с.
  29. VANET Vehicular Applications and Inter-Networking Technologies (Intelligent Transport Systems). – М.: , 2010. – 466 с.
  30. Advances in the Physics of Particles and Nuclei Volume 30. – М.: , 2010. – 140 с.
  31. Gerard Honey. Electronic Access Control. – М.: , 2010. – 240 с.
  32. Author Unknown. NANOTECHNOLOGY AND NANO-INTERFACE CONTROLLED ELECTRONIC DEVICES. – М.: , 2010. – 528 с.
  33. BISHOP. Understand Electronic Control Systems. – М.: , 2010. – 208 с.
  34. Enrique Acha. Power Electronic Control in Electrical Systems. – М.: , 2010. – 464 с.
  35. Marian P. Kazmierkowski. Control in Power Electronics. – М.: , 2010. – 544 с.
  36. Ronald J. Deibert. Access Controlled – The Shaping of Power, Rights, and Rule in Cyberspace. – М.: , 2010. – 656 с.
  37. V MARTIN. Martin Electronic & ?microprocessor? Controlled Security Projects (paper Only). – М.: , 1985. – 236 с.
  38. TJ SOKIRA. Sokira: ?brushless? Dc Motors: Electronic Commutat Ion & Controls (pr Only). – М.: , 1990. – 272 с.
  39. Jay Kelley. Network Access Control For Dummies®. – М.: , 2009. – 336 с.
  40. M SS NEWMAN. Newman ?industrial? Electronics & Controls (cloth). – М.: , 1986. – 450 с.
  41. Katherine Sierra, Bert Bates. Scjp Sun Certified Programmer For Java 6 Study Guide (+ CD-ROM). – М.: McGraw-Hill, 2011. – 888 с.
  42. Shon Harris. CISSP All-in-One Exam Guide (+ CD-ROM). – М.: McGraw-Hill Companies, 2010. – 1216 с.
  43. Master Locksmithing. – М.: , 2011. – 416 с.
  44. Comptia Security+ All-In-One Exam Guide, Second Edition (Exam Sy0-201). – М.: , 2011. – 0 с.
  45. Oca Oracle Database Sql Certified Expert Exam Guide (Exam 1Z0-047). – М.: , 2011. – 0 с.
  46. Cissp Practice Exams. – М.: , 2011. – 414 с.
  47. Ocp Java Se 6 Programmer Practice Exams (Exam 310-065). – М.: , 2011. – 448 с.
  48. Jan L. Harrington. Ethernet Networking for the Small Office and Professional Home Office. – М.: , 2007. – 352 с.
  49. Ido Dubrawsky. CompTIA Security+ Certification Study Guide, Third Edition: Exam SYO-201 3E. – М.: , 2009. – 752 с.
  50. Eduardo Fernandez-Buglioni. Security Patterns in Practice: Designing Secure Architectures Using Software Patterns. – М.: Wiley, 2013. – 582 с.
  51. Nelson C.N. Chu. Access Control for Grid Computing. – М.: Scholars Press, 2013. – 128 с.
  52. Samayita Bhattacharya and Kalyani Mali. Importance of Fingerprints. – М.: LAP Lambert Academic Publishing, 2013. – 132 с.
  53. Priyadarshini Sabut. An Enhanced Medium Access Control Protocol for Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2013. – 60 с.
  54. Md. Mahmudul Hasan Rafee and Sharmin Akter Lima. Proximity Based Access Control (PBAC). – М.: LAP Lambert Academic Publishing, 2012. – 160 с.
  55. Surajit Das Barman,Abrar Hussain and Toufiq Ahmed. Speed Control of DC Motor Using PWM Technique. – М.: LAP Lambert Academic Publishing, 2012. – 56 с.
  56. Ajit Danti and Hiremath P. S. Face Detection & Recognition. – М.: LAP Lambert Academic Publishing, 2012. – 140 с.
  57. Shaikh Salim and Shankar Nawale. Secure Access of RFID System. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  58. Hamidou Tembine. Population games in large-scale networks. – М.: LAP Lambert Academic Publishing, 2010. – 260 с.
  59. Ramoni Adeogun. Microcontroler Based Counting and Temperature Monitoring System Design. – М.: LAP Lambert Academic Publishing, 2013. – 84 с.
  60. Eliana Arango,Javier Calvente and Roberto Giral. Asymmetric interleaved DC-DC switching converters. – М.: LAP Lambert Academic Publishing, 2010. – 160 с.
  61. BENEDITO BONATTO and Hermann W. Dommel. EMTP Modelling of Control and Power Electronic Devices. – М.: LAP Lambert Academic Publishing, 2010. – 196 с.
  62. Sampath V.P. FPGA Based Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  63. Joke Badejo and Tunji Ibiyemi. Automatic Speaker and Speech Recognition. – М.: LAP Lambert Academic Publishing, 2013. – 172 с.
  64. Mariam Kaynia. Performance of Wireless Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2011. – 212 с.
  65. Ajay Kulkarni. Development of Efficient wireless access schemes for wireless LANs. – М.: LAP Lambert Academic Publishing, 2011. – 108 с.
  66. Anukrishnan Menon. Car Ignition Access Control System Based on Face Recognition. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  67. Anshul Sharma and Sunil Agrawal. Filters In Halftone Visual Cryptography Via Error Diffusion. – М.: LAP Lambert Academic Publishing, 2013. – 108 с.
  68. Mohammed Abd-Elnaby,Mohamed Rizk and Sami El-Dolil. Medium Access Control for Multimedia Wireless Systems. – М.: LAP Lambert Academic Publishing, 2013. – 148 с.
  69. Manuel Madrigal. Modelling of Power Electronics Controllers for Harmonic Analysis. – М.: LAP Lambert Academic Publishing, 2012. – 236 с.
  70. Saeed Ur Rehman. Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 132 с.
  71. Chafic Jaber. High-level SOC Modeling and Performance Estimation. – М.: LAP Lambert Academic Publishing, 2012. – 152 с.
  72. Elham Moradi. Characterization Of Embroidered Dipole-type RFID Tag Antennas. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  73. Smit Tripathi and Mehul Shah. Dynamic Opportunistic Spectrum Access MAC Protocol for Cognitive Radio. – М.: LAP Lambert Academic Publishing, 2014. – 64 с.
  74. Danijel Pavkovic and Josko Deur. Modeling and Control of Electronic Throttle Drive. – М.: LAP Lambert Academic Publishing, 2011. – 188 с.
  75. Alphan Ulusoy,Ozgur Gurbuz and Ahmet Onat. Cooperative Wireless Model Based Predictive Networked Control Systems. – М.: LAP Lambert Academic Publishing, 2010. – 92 с.
  76. Dr. Mustafa Shakir. Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2011. – 148 с.
  77. Asutosh Kumarjha. Multimedia Transport Over LTE. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  78. S. Dhanavandan. ICT Infrastructures in Academic Libraries. – М.: LAP Lambert Academic Publishing, 2011. – 308 с.
  79. Getrude Sithole. Forest resources. – М.: LAP Lambert Academic Publishing, 2014. – 112 с.
  80. Cajethan Nwosu. Back-to-Back Power Electronic Converter Control for Active Damping. – М.: LAP Lambert Academic Publishing, 2012. – 112 с.
  81. Fayu Wan. Automotive Electronics EMC Controlling. – М.: Scholars' Press, 2014. – 192 с.
  82. Annabella Habinka Basaza Ejiri. Access Control To Classified Facilities. – М.: LAP Lambert Academic Publishing, 2013. – 116 с.
  83. Manzur Ashraf. Channel Based Medium Access Control for Ad Hoc Wireless Networks. – М.: LAP Lambert Academic Publishing, 2010. – 168 с.
  84. Verena Mauch. Achieving accessible and sustainable tuberculosis control. – М.: LAP Lambert Academic Publishing, 2014. – 244 с.
  85. Nguyen Duc Chinh,Truong Thi Thanh Huyen and Nguyen Do Phan. Barriers in accessing TB control in Sonla and Gialai, Vietnam. – М.: LAP Lambert Academic Publishing, 2015. – 76 с.
  86. Sushma Jaiswal. Automatic 3D Face Recognition And Modeling From 2D Images. – М.: LAP Lambert Academic Publishing, 2011. – 208 с.
  87. Nada Najeel Kamal and Loay E. George. License Plate Recognition Using a Set of Classifiers. – М.: LAP Lambert Academic Publishing, 2013. – 188 с.
  88. Pradeep Sadanand. Implementation of GSTRBAC using .NET framework. – М.: LAP Lambert Academic Publishing, 2012. – 56 с.
  89. Hasan N. Qunoo. Automated Verification of Dynamic Access Control Policies. – М.: LAP Lambert Academic Publishing, 2012. – 192 с.
  90. Filip Hofer. Platform-Based Authorization Technologies. – М.: LAP Lambert Academic Publishing, 2010. – 96 с.
  91. Faraz Fatemi Moghaddam. Secure Cloud Computing with Client-Based Control System. – М.: LAP Lambert Academic Publishing, 2013. – 100 с.
  92. Swapan Debbarma,Madhumita Debbarma and Amit Debnath. Energy Efficient Management MAC. – М.: LAP Lambert Academic Publishing, 2013. – 88 с.
  93. Ayman Wazwaz. Medium Access and Routing In Multi Hop Wireless Infrastructures. – М.: LAP Lambert Academic Publishing, 2011. – 100 с.
  94. Mohammad Ghouse and Praveen D. Efficient and Salable Communication in WSN through XLP. – М.: LAP Lambert Academic Publishing, 2013. – 92 с.
  95. Hasan Shahid Ferdous. Enhanced IEEE 802.11 by Integrating Multiuser Dynamic OFDMA. – М.: LAP Lambert Academic Publishing, 2012. – 112 с.
  96. Mohammad AlAhmad. Security threats of finger print biometric in network system. – М.: LAP Lambert Academic Publishing, 2014. – 88 с.
  97. Vivek Jain and Dharma P. Agrawal. On-Demand Medium Access in Heterogeneous Multihop Wireless Networks. – М.: LAP Lambert Academic Publishing, 2011. – 136 с.
  98. Andreas Haber. Remote service discovery and control. – М.: LAP Lambert Academic Publishing, 2011. – 156 с.
  99. Fernando Pereniguez Garcia. Enabling Seamless Handoff for Next Generation Networks. – М.: LAP Lambert Academic Publishing, 2012. – 260 с.
  100. Hong Yu. A Protocol for Multimedia Transmission over Wireless Networks. – М.: LAP Lambert Academic Publishing, 2012. – 272 с.
  101. Himanshu Singh. High Level Abstractions for Configuration of Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 136 с.
  102. Marimuthu Kanagaraj and Eswari Venkatachalam. Multifactor Authentication Protocol for a Secured WSN. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  103. Oussama Habachi,Yezekael Hayel and Rachid El-Azouzi. Optimization of Partially Observable Systems in Wireless Networks. – М.: LAP Lambert Academic Publishing, 2013. – 188 с.
  104. Rawlson King. The Dialectical Nature of Control Upon Electronic Networks. – М.: LAP Lambert Academic Publishing, 2010. – 140 с.
  105. Xiaolong Li. Modeling and Performance Analysis of Mobile Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 120 с.
  106. Elmabruk Laias. Performance Analysis and Enhancement of QoS for Fixed WiMAX Networks. – М.: LAP Lambert Academic Publishing, 2011. – 152 с.
  107. Ali Alsahag Alkazmi and Mohamed Othman. Greedy Behavior in Wireless Network Hotspots. – М.: LAP Lambert Academic Publishing, 2011. – 128 с.
  108. Mahendra Kumar. Steganography and Steganalysis of JPEG Images. – М.: LAP Lambert Academic Publishing, 2011. – 148 с.
  109. B. Menaka Balasubramanian. Remote Database Controller. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  110. Seyed Mohamed Buhari. Optimizing access control lists Search for IP packet filtering. – М.: LAP Lambert Academic Publishing, 2012. – 300 с.
  111. Rabi Yousif. WDM Optical Multicasting. – М.: LAP Lambert Academic Publishing, 2012. – 136 с.
  112. Navnath Nehe,Vishal Pande and Nandini Bhandari. RFID in Access Control System. – М.: LAP Lambert Academic Publishing, 2011. – 88 с.
  113. Faisal Karim Bhutta. Smartphone based Authentication & Authorization Protocol for SPACS. – М.: LAP Lambert Academic Publishing, 2014. – 56 с.
  114. Abd El-Aziz Ahmed Abd El-Aziz. Algorithms for mapping of XACML policies into temporal relations. – М.: LAP Lambert Academic Publishing, 2014. – 200 с.
  115. Kun Ma. Advances in Multi-tenant Architecture. – М.: LAP Lambert Academic Publishing, 2014. – 96 с.
  116. Paolo Medagliani and Gianluigi Ferrari. Performance Optimization in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2011. – 212 с.
  117. Vishwas Patil,Rudrapatna Shyamasundar and Alessandro Mei. Access Control for a Collaborative, Distributed Business Environment. – М.: LAP Lambert Academic Publishing, 2012. – 220 с.
  118. Tiwalade O. Majekodunmi,Tunji S. Ibiyemi and Aderemi A. Atayero. Development of a Web-Based Brown-Eyed Iris Corpus. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  119. A. S. N. Chakravarthy. Password Authentication Using Associative Memories. – М.: LAP Lambert Academic Publishing, 2012. – 188 с.
  120. Sivapathalingham Sivavakeesar. Quality of Service Support in Mobile Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 288 с.
  121. Cyrus Abanti Makori,Jane Onsongo and Lusiba Badru. ICT Security Applications. – М.: LAP Lambert Academic Publishing, 2012. – 112 с.
  122. Amit Phadikar. Data Hiding Techniques and Application Specific Designs. – М.: LAP Lambert Academic Publishing, 2012. – 328 с.
  123. Sean Policarpio. An Answer Set Programming Based Formal Language for XML Authorisations. – М.: LAP Lambert Academic Publishing, 2012. – 196 с.
  124. Saeed Khorashadizadeh. An Improved Hough Transform Algorithm in Iris Recognition System. – М.: LAP Lambert Academic Publishing, 2014. – 140 с.
  125. Dhanavandan S. Perception of E-Resources. – М.: LAP Lambert Academic Publishing, 2011. – 108 с.
  126. Bhavesh Pandya,Vinayak Bharadi and Hemchandra Kekre. Multimodal Fusion of Iris and Fingerprint. – М.: LAP Lambert Academic Publishing, 2014. – 104 с.
  127. Francesco Iervolino. Support XACML Policies within an advanced architecture for UserPrivacy. – М.: LAP Lambert Academic Publishing, 2013. – 152 с.
  128. Daniel Caragata,Safwan El Assad and Alexandru Serbanescu. Development of some encryption algorithms using chaotic functions. – М.: LAP Lambert Academic Publishing, 2011. – 88 с.
  129. Mohamed Khalefa Sarrab. Runtime Verification of Information flow. – М.: LAP Lambert Academic Publishing, 2011. – 288 с.
  130. Abanti Cyrus Makori and Lusiba Badru. Biometric Based Access Control of Information Systems. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  131. Nelson Msagati. Access and Use of Scholarly Electronic Journals by Faculty Members. – М.: LAP Lambert Academic Publishing, 2014. – 124 с.
  132. Shada Al-Salamah. Towards Information Sharing in Virtual Organisations. – М.: LAP Lambert Academic Publishing, 2010. – 312 с.
  133. Simion Pruna. Public Health Tools to Control Diabetes Care: Advanced Data Analysis. – М.: LAP Lambert Academic Publishing, 2014. – 368 с.
  134. Marcos Ortega Hortas. Biometric authentication using the retinal vessel tree. – М.: LAP Lambert Academic Publishing, 2011. – 184 с.
  135. S. Dhanavandan. Web Based Resources and Tools. – М.: LAP Lambert Academic Publishing, 2011. – 84 с.
  136. Khandakar Entenam Unayes Ahmed. IDENTITY AND ACCESS MANAGEMENT IN CLOUD COMPUTING. – М.: LAP Lambert Academic Publishing, 2011. – 172 с.
  137. Viswanatha Subramaniam and RAMARAJ RAVI. Cyber crime control techno-legal network. – М.: LAP Lambert Academic Publishing, 2011. – 60 с.
  138. Alaa Al-Deen Mohammed Hassan. Information Security Management. – М.: LAP Lambert Academic Publishing, 2013. – 188 с.
  139. Ban Mustafa and Najla Aldabagh. Building an Ontology Based Access Control Model for Multi-Agent System. – М.: , 2015. – 120 с.
  140. Топливные насосы высокого давления распределительного типа. Учебное пособие. – М.: Легион-Автодата, 2011. – 132 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Как создать базу данных регистрации трудовых договоров и дополнительных соглашений к ним в MS Access 2007. А. Лобанова, "Кадровик. Кадровое делопроизводство", N 7, 8, июль, август 2011 г.
  2. He посмертная" отчетность, а предвидение...". интервью с Е. Агеевой, финансовым директором Golder Electronics/TM Vitek. С. Крылосов, "Консультант", N 13, июль 2010 г.
  3. Формирование базы данных персонального учета сотрудников с использованием Microsoft Access. Е. Гурова, "Кадровик. Кадровое делопроизводство", № 6, июнь 2009.

Образцы работ

Тема и предметТип и объем работы
Выбор системы управления базами данных туризма
Информатика
Реферат
11 стр.
Информатика
Информатика
Реферат
12 стр.
Информатика
Информатика
Реферат
16 стр.
Информатика
Информатика
Реферат
18 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Юрий
Спасибо вам за консультации по диплому. Я вчера защитился на 5 баллов! Буду вас всем рекомендовать!!! :) Всего Вам хорошего !!!