Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Kurt Peray. Investing in Mutual Funds Using Fuzzy Logic. – М.: , 0. – 0 с. Syed Mahbubur Rahman. Interactive Multimedia Systems. – М.: , 0. – 0 с. CIM Coursebook 02/03: Strategic Marketing Management: Planning and Control. – М.: , 0. – 0 с. James Michael Stewart, Ed Tittel, Mike Chapple. CISSP: Certified Information Systems Security Professional Study Guide. – М.: , 2008. – 841 с. Gerard Honey. Electronic Access Control. – М.: , 2010. – 240 с. Shaikh Salim and Shankar Nawale. Secure Access of RFID System. – М.: LAP Lambert Academic Publishing, 2012. – 96 с. Ramoni Adeogun. Microcontroler Based Counting and Temperature Monitoring System Design. – М.: LAP Lambert Academic Publishing, 2013. – 84 с. Shilpa Sanwlani Arora and Matthew F. Doty. Optical Spectroscopy of InAs GaAs Quantum Dot Molecules. – М.: LAP Lambert Academic Publishing, 2011. – 72 с. Andreas Haber. Remote service discovery and control. – М.: LAP Lambert Academic Publishing, 2011. – 156 с. Daniel Caragata,Safwan El Assad and Alexandru Serbanescu. Development of some encryption algorithms using chaotic functions. – М.: LAP Lambert Academic Publishing, 2011. – 88 с. Simion Pruna. Public Health Tools to Control Diabetes Care: Advanced Data Analysis. – М.: LAP Lambert Academic Publishing, 2014. – 368 с. Viswanatha Subramaniam and RAMARAJ RAVI. Cyber crime control techno-legal network. – М.: LAP Lambert Academic Publishing, 2011. – 60 с. Oxford English Dictionary for Schools. – М.: Oxford University Press, 2012. – 928 с. Susan Rennie. Oxford English Thesaurus for Schools. – М.: Oxford University Press, 2015. – 704 с. Дополнительные результаты Data Privacy Management and Autonomous Spontaneus Security: 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, ... Computer Science / Security and Cryptology). – М.: , 2012. – 334 с. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с. Marilyn Greenstein, Todd M. Feinman. Electronic Commerce: Security Risk Management and Control. – М.: , 0. – 0 с. James F. Cox, Michael S. Spencer, James F., Iii Cox, American Production and Inventory Control Society. The Constraints Management Handbook. – М.: , 0. – 0 с. Thomas Petruzzellis. STAMP 2 Communications and Control Projects. – М.: McGraw-Hill/TAB Electronics, 2003. – 362 с. Barry Hollembeak. Automotive Electricity, Electronics and Computer Controls. – М.: , 0. – 0 с. Power Electronic Control in Electrical Systems. – М.: , 0. – 0 с. Ifip Tc11 Wg11.5 Working Conference on Integrity and Internal Control, Michael Gertz, Erik Guldentops, Leon Strous. Integrity, Internal Control and Security in Information Systems: Connecting Governance and Technology (International Federation for Information Processing). – М.: , 0. – 0 с. Ifip Tc11 Wg11.5 Working Conference on Integrity and Internal Control, Michael Gertz. Integrity and Internal Control in Information Systems V: Ifip Tc11/Wg11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (Iicis), November 11-12, 2002, Bonn, Germany (International Federation for Information Processing. – М.: , 0. – 0 с. Robert B. Gelman, Gelman, Stanton McCandlish, Electronic Frontier Foundation. Protecting Yourself Online: The Definitive Resource on Safety, Freedom, and Privacy in Cyberspace. – М.: , 0. – 0 с. Ifip Tc11 Wg11.5 Working Conference on Integrity and Internal Control, Sushil Jajodia, Leon Strous, Leon A. M. Strous. Integrity And Internal Control In Information Systems Vi: Ifip Tc11/Wg11.5 Sixth Working Conference on Integrity and Internal Control in Information S ... tional Federation for Information Processing). – М.: , 0. – 0 с. Kurt Bauknecht, Sanjay Kumar Madria, Gunther Pernul, G. Pernul, International Conference on Electronic Commerce and Web Technologies 2. Electronic Commerce and Web Technologies: First International Conference, Ec-Web 2000, London, Uk, September 4-6, 2000 Proceedings (Lecture Notes in Computer Science, 1875). – М.: , 0. – 0 с. David F. Ferraiolo, D. Richard Kuhn, Ramaswamy Chandramouli. Role-Based Access Control. – М.: , 0. – 0 с. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с. W. Bolton. Programmable Logic Controllers, Fourth Edition. – М.: , 2006. – 304 с. Rebecca S. Busch. Electronic Health Records: An Audit and Internal Control Guide. – М.: , 2008. – 228 с. James Michael Stewart, Ed Tittel, Mike Chapple. CISSP: Certified Information Systems Security Professional Study Guide. – М.: , 2008. – 841 с. Andy Walker. Windows Lockdown!: Your XP and Vista Guide Against Hacks, Attacks, and Other Internet Mayhem (Absolute Beginner's Guide). – М.: , 2008. – 480 с. Trust, Privacy and Security in Digital Business: 5th International Conference, TrustBus 2008 Turin, Italy, September 1-5, 2008, Proceedings (Lecture Notes in Computer Science). – М.: , 2008. – 205 с. Daniel Clark. Network Access Control 100 Success Secrets - 100 Most Asked NAC Questions on Implementation and Deployment of unify endpoint security technology, user ... and network security enforcement. – М.: , 2008. – 180 с. Michael E. Whitman, Herbert J. Mattord. Management of Information Security. – М.: , 2010. – 592 с. Marie-luise Leitner. Business Impacts of Web Accessibility: A Holistic Approach (Electronic Business). – М.: , 2010. – 226 с. Elen Ferrari. Access Control in Data Management Systems (Synthesis Lectures on Data Management). – М.: , 2010. – 118 с. Robert A. Wilson, Frank Keil. The MIT Encyclopedia of the Cognitive Sciences (MITECS). – М.: The MIT Press, 1999. – 1096 с. Klaus W. Grewlich. Governance in "Cyberspace: Access and Public Interest in Global Communications (Law and Electronic Commerce, V. 9). – М.: , 0. – 0 с. Bradford P. Smith. Large Animal Internal Medicine - Text and VETERINARY CONSULT Package. – М.: , 2008. – 0 с. Stanley Jablonski. Jablonski's Dictionary of Medical Acronyms and Abbreviations with CD-ROM (Dictionary of Medical Acronyms and Abbreviations (Jablonski)). – М.: , 2008. – 544 с. Dawn E. Christenson. Veterinary Medical Terminology - Text and VETERINARY CONSULT Package. – М.: Saunders Ltd., 2008. – 0 с. VANET Vehicular Applications and Inter-Networking Technologies (Intelligent Transport Systems). – М.: , 2010. – 466 с. Advances in the Physics of Particles and Nuclei Volume 30. – М.: , 2010. – 140 с. Gerard Honey. Electronic Access Control. – М.: , 2010. – 240 с. Author Unknown. NANOTECHNOLOGY AND NANO-INTERFACE CONTROLLED ELECTRONIC DEVICES. – М.: , 2010. – 528 с. BISHOP. Understand Electronic Control Systems. – М.: , 2010. – 208 с. Enrique Acha. Power Electronic Control in Electrical Systems. – М.: , 2010. – 464 с. Marian P. Kazmierkowski. Control in Power Electronics. – М.: , 2010. – 544 с. Ronald J. Deibert. Access Controlled – The Shaping of Power, Rights, and Rule in Cyberspace. – М.: , 2010. – 656 с. V MARTIN. Martin Electronic & ?microprocessor? Controlled Security Projects (paper Only). – М.: , 1985. – 236 с. TJ SOKIRA. Sokira: ?brushless? Dc Motors: Electronic Commutat Ion & Controls (pr Only). – М.: , 1990. – 272 с. Jay Kelley. Network Access Control For Dummies®. – М.: , 2009. – 336 с. M SS NEWMAN. Newman ?industrial? Electronics & Controls (cloth). – М.: , 1986. – 450 с. Katherine Sierra, Bert Bates. Scjp Sun Certified Programmer For Java 6 Study Guide (+ CD-ROM). – М.: McGraw-Hill, 2011. – 888 с. Shon Harris. CISSP All-in-One Exam Guide (+ CD-ROM). – М.: McGraw-Hill Companies, 2010. – 1216 с. Master Locksmithing. – М.: , 2011. – 416 с. Comptia Security+ All-In-One Exam Guide, Second Edition (Exam Sy0-201). – М.: , 2011. – 0 с. Oca Oracle Database Sql Certified Expert Exam Guide (Exam 1Z0-047). – М.: , 2011. – 0 с. Cissp Practice Exams. – М.: , 2011. – 414 с. Ocp Java Se 6 Programmer Practice Exams (Exam 310-065). – М.: , 2011. – 448 с. Jan L. Harrington. Ethernet Networking for the Small Office and Professional Home Office. – М.: , 2007. – 352 с. Ido Dubrawsky. CompTIA Security+ Certification Study Guide, Third Edition: Exam SYO-201 3E. – М.: , 2009. – 752 с. Eduardo Fernandez-Buglioni. Security Patterns in Practice: Designing Secure Architectures Using Software Patterns. – М.: Wiley, 2013. – 582 с. Nelson C.N. Chu. Access Control for Grid Computing. – М.: Scholars Press, 2013. – 128 с. Samayita Bhattacharya and Kalyani Mali. Importance of Fingerprints. – М.: LAP Lambert Academic Publishing, 2013. – 132 с. Priyadarshini Sabut. An Enhanced Medium Access Control Protocol for Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2013. – 60 с. Md. Mahmudul Hasan Rafee and Sharmin Akter Lima. Proximity Based Access Control (PBAC). – М.: LAP Lambert Academic Publishing, 2012. – 160 с. Surajit Das Barman,Abrar Hussain and Toufiq Ahmed. Speed Control of DC Motor Using PWM Technique. – М.: LAP Lambert Academic Publishing, 2012. – 56 с. Ajit Danti and Hiremath P. S. Face Detection & Recognition. – М.: LAP Lambert Academic Publishing, 2012. – 140 с. Shaikh Salim and Shankar Nawale. Secure Access of RFID System. – М.: LAP Lambert Academic Publishing, 2012. – 96 с. Hamidou Tembine. Population games in large-scale networks. – М.: LAP Lambert Academic Publishing, 2010. – 260 с. Ramoni Adeogun. Microcontroler Based Counting and Temperature Monitoring System Design. – М.: LAP Lambert Academic Publishing, 2013. – 84 с. Eliana Arango,Javier Calvente and Roberto Giral. Asymmetric interleaved DC-DC switching converters. – М.: LAP Lambert Academic Publishing, 2010. – 160 с. BENEDITO BONATTO and Hermann W. Dommel. EMTP Modelling of Control and Power Electronic Devices. – М.: LAP Lambert Academic Publishing, 2010. – 196 с. Sampath V.P. FPGA Based Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 120 с. Joke Badejo and Tunji Ibiyemi. Automatic Speaker and Speech Recognition. – М.: LAP Lambert Academic Publishing, 2013. – 172 с. Mariam Kaynia. Performance of Wireless Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2011. – 212 с. Ajay Kulkarni. Development of Efficient wireless access schemes for wireless LANs. – М.: LAP Lambert Academic Publishing, 2011. – 108 с. Anukrishnan Menon. Car Ignition Access Control System Based on Face Recognition. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Anshul Sharma and Sunil Agrawal. Filters In Halftone Visual Cryptography Via Error Diffusion. – М.: LAP Lambert Academic Publishing, 2013. – 108 с. Mohammed Abd-Elnaby,Mohamed Rizk and Sami El-Dolil. Medium Access Control for Multimedia Wireless Systems. – М.: LAP Lambert Academic Publishing, 2013. – 148 с. Manuel Madrigal. Modelling of Power Electronics Controllers for Harmonic Analysis. – М.: LAP Lambert Academic Publishing, 2012. – 236 с. Saeed Ur Rehman. Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 132 с. Chafic Jaber. High-level SOC Modeling and Performance Estimation. – М.: LAP Lambert Academic Publishing, 2012. – 152 с. Elham Moradi. Characterization Of Embroidered Dipole-type RFID Tag Antennas. – М.: LAP Lambert Academic Publishing, 2012. – 88 с. Smit Tripathi and Mehul Shah. Dynamic Opportunistic Spectrum Access MAC Protocol for Cognitive Radio. – М.: LAP Lambert Academic Publishing, 2014. – 64 с. Danijel Pavkovic and Josko Deur. Modeling and Control of Electronic Throttle Drive. – М.: LAP Lambert Academic Publishing, 2011. – 188 с. Alphan Ulusoy,Ozgur Gurbuz and Ahmet Onat. Cooperative Wireless Model Based Predictive Networked Control Systems. – М.: LAP Lambert Academic Publishing, 2010. – 92 с. Dr. Mustafa Shakir. Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2011. – 148 с. Asutosh Kumarjha. Multimedia Transport Over LTE. – М.: LAP Lambert Academic Publishing, 2012. – 104 с. S. Dhanavandan. ICT Infrastructures in Academic Libraries. – М.: LAP Lambert Academic Publishing, 2011. – 308 с. Getrude Sithole. Forest resources. – М.: LAP Lambert Academic Publishing, 2014. – 112 с. Cajethan Nwosu. Back-to-Back Power Electronic Converter Control for Active Damping. – М.: LAP Lambert Academic Publishing, 2012. – 112 с. Fayu Wan. Automotive Electronics EMC Controlling. – М.: Scholars' Press, 2014. – 192 с. Annabella Habinka Basaza Ejiri. Access Control To Classified Facilities. – М.: LAP Lambert Academic Publishing, 2013. – 116 с. Manzur Ashraf. Channel Based Medium Access Control for Ad Hoc Wireless Networks. – М.: LAP Lambert Academic Publishing, 2010. – 168 с. Verena Mauch. Achieving accessible and sustainable tuberculosis control. – М.: LAP Lambert Academic Publishing, 2014. – 244 с. Nguyen Duc Chinh,Truong Thi Thanh Huyen and Nguyen Do Phan. Barriers in accessing TB control in Sonla and Gialai, Vietnam. – М.: LAP Lambert Academic Publishing, 2015. – 76 с. Sushma Jaiswal. Automatic 3D Face Recognition And Modeling From 2D Images. – М.: LAP Lambert Academic Publishing, 2011. – 208 с. Nada Najeel Kamal and Loay E. George. License Plate Recognition Using a Set of Classifiers. – М.: LAP Lambert Academic Publishing, 2013. – 188 с. Pradeep Sadanand. Implementation of GSTRBAC using .NET framework. – М.: LAP Lambert Academic Publishing, 2012. – 56 с. Hasan N. Qunoo. Automated Verification of Dynamic Access Control Policies. – М.: LAP Lambert Academic Publishing, 2012. – 192 с. Filip Hofer. Platform-Based Authorization Technologies. – М.: LAP Lambert Academic Publishing, 2010. – 96 с. Faraz Fatemi Moghaddam. Secure Cloud Computing with Client-Based Control System. – М.: LAP Lambert Academic Publishing, 2013. – 100 с. Swapan Debbarma,Madhumita Debbarma and Amit Debnath. Energy Efficient Management MAC. – М.: LAP Lambert Academic Publishing, 2013. – 88 с. Ayman Wazwaz. Medium Access and Routing In Multi Hop Wireless Infrastructures. – М.: LAP Lambert Academic Publishing, 2011. – 100 с. Mohammad Ghouse and Praveen D. Efficient and Salable Communication in WSN through XLP. – М.: LAP Lambert Academic Publishing, 2013. – 92 с. Hasan Shahid Ferdous. Enhanced IEEE 802.11 by Integrating Multiuser Dynamic OFDMA. – М.: LAP Lambert Academic Publishing, 2012. – 112 с. Mohammad AlAhmad. Security threats of finger print biometric in network system. – М.: LAP Lambert Academic Publishing, 2014. – 88 с. Vivek Jain and Dharma P. Agrawal. On-Demand Medium Access in Heterogeneous Multihop Wireless Networks. – М.: LAP Lambert Academic Publishing, 2011. – 136 с. Andreas Haber. Remote service discovery and control. – М.: LAP Lambert Academic Publishing, 2011. – 156 с. Fernando Pereniguez Garcia. Enabling Seamless Handoff for Next Generation Networks. – М.: LAP Lambert Academic Publishing, 2012. – 260 с. Hong Yu. A Protocol for Multimedia Transmission over Wireless Networks. – М.: LAP Lambert Academic Publishing, 2012. – 272 с. Himanshu Singh. High Level Abstractions for Configuration of Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 136 с. Marimuthu Kanagaraj and Eswari Venkatachalam. Multifactor Authentication Protocol for a Secured WSN. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Oussama Habachi,Yezekael Hayel and Rachid El-Azouzi. Optimization of Partially Observable Systems in Wireless Networks. – М.: LAP Lambert Academic Publishing, 2013. – 188 с. Rawlson King. The Dialectical Nature of Control Upon Electronic Networks. – М.: LAP Lambert Academic Publishing, 2010. – 140 с. Xiaolong Li. Modeling and Performance Analysis of Mobile Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 120 с. Elmabruk Laias. Performance Analysis and Enhancement of QoS for Fixed WiMAX Networks. – М.: LAP Lambert Academic Publishing, 2011. – 152 с. Ali Alsahag Alkazmi and Mohamed Othman. Greedy Behavior in Wireless Network Hotspots. – М.: LAP Lambert Academic Publishing, 2011. – 128 с. Mahendra Kumar. Steganography and Steganalysis of JPEG Images. – М.: LAP Lambert Academic Publishing, 2011. – 148 с. B. Menaka Balasubramanian. Remote Database Controller. – М.: LAP Lambert Academic Publishing, 2012. – 104 с. Seyed Mohamed Buhari. Optimizing access control lists Search for IP packet filtering. – М.: LAP Lambert Academic Publishing, 2012. – 300 с. Rabi Yousif. WDM Optical Multicasting. – М.: LAP Lambert Academic Publishing, 2012. – 136 с. Navnath Nehe,Vishal Pande and Nandini Bhandari. RFID in Access Control System. – М.: LAP Lambert Academic Publishing, 2011. – 88 с. Faisal Karim Bhutta. Smartphone based Authentication & Authorization Protocol for SPACS. – М.: LAP Lambert Academic Publishing, 2014. – 56 с. Abd El-Aziz Ahmed Abd El-Aziz. Algorithms for mapping of XACML policies into temporal relations. – М.: LAP Lambert Academic Publishing, 2014. – 200 с. Kun Ma. Advances in Multi-tenant Architecture. – М.: LAP Lambert Academic Publishing, 2014. – 96 с. Paolo Medagliani and Gianluigi Ferrari. Performance Optimization in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2011. – 212 с. Vishwas Patil,Rudrapatna Shyamasundar and Alessandro Mei. Access Control for a Collaborative, Distributed Business Environment. – М.: LAP Lambert Academic Publishing, 2012. – 220 с. Tiwalade O. Majekodunmi,Tunji S. Ibiyemi and Aderemi A. Atayero. Development of a Web-Based Brown-Eyed Iris Corpus. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. A. S. N. Chakravarthy. Password Authentication Using Associative Memories. – М.: LAP Lambert Academic Publishing, 2012. – 188 с. Sivapathalingham Sivavakeesar. Quality of Service Support in Mobile Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 288 с. Cyrus Abanti Makori,Jane Onsongo and Lusiba Badru. ICT Security Applications. – М.: LAP Lambert Academic Publishing, 2012. – 112 с. Amit Phadikar. Data Hiding Techniques and Application Specific Designs. – М.: LAP Lambert Academic Publishing, 2012. – 328 с. Sean Policarpio. An Answer Set Programming Based Formal Language for XML Authorisations. – М.: LAP Lambert Academic Publishing, 2012. – 196 с. Saeed Khorashadizadeh. An Improved Hough Transform Algorithm in Iris Recognition System. – М.: LAP Lambert Academic Publishing, 2014. – 140 с. Dhanavandan S. Perception of E-Resources. – М.: LAP Lambert Academic Publishing, 2011. – 108 с. Bhavesh Pandya,Vinayak Bharadi and Hemchandra Kekre. Multimodal Fusion of Iris and Fingerprint. – М.: LAP Lambert Academic Publishing, 2014. – 104 с. Francesco Iervolino. Support XACML Policies within an advanced architecture for UserPrivacy. – М.: LAP Lambert Academic Publishing, 2013. – 152 с. Daniel Caragata,Safwan El Assad and Alexandru Serbanescu. Development of some encryption algorithms using chaotic functions. – М.: LAP Lambert Academic Publishing, 2011. – 88 с. Mohamed Khalefa Sarrab. Runtime Verification of Information flow. – М.: LAP Lambert Academic Publishing, 2011. – 288 с. Abanti Cyrus Makori and Lusiba Badru. Biometric Based Access Control of Information Systems. – М.: LAP Lambert Academic Publishing, 2012. – 84 с. Nelson Msagati. Access and Use of Scholarly Electronic Journals by Faculty Members. – М.: LAP Lambert Academic Publishing, 2014. – 124 с. Shada Al-Salamah. Towards Information Sharing in Virtual Organisations. – М.: LAP Lambert Academic Publishing, 2010. – 312 с. Simion Pruna. Public Health Tools to Control Diabetes Care: Advanced Data Analysis. – М.: LAP Lambert Academic Publishing, 2014. – 368 с. Marcos Ortega Hortas. Biometric authentication using the retinal vessel tree. – М.: LAP Lambert Academic Publishing, 2011. – 184 с. S. Dhanavandan. Web Based Resources and Tools. – М.: LAP Lambert Academic Publishing, 2011. – 84 с. Khandakar Entenam Unayes Ahmed. IDENTITY AND ACCESS MANAGEMENT IN CLOUD COMPUTING. – М.: LAP Lambert Academic Publishing, 2011. – 172 с. Viswanatha Subramaniam and RAMARAJ RAVI. Cyber crime control techno-legal network. – М.: LAP Lambert Academic Publishing, 2011. – 60 с. Alaa Al-Deen Mohammed Hassan. Information Security Management. – М.: LAP Lambert Academic Publishing, 2013. – 188 с. Ban Mustafa and Najla Aldabagh. Building an Ontology Based Access Control Model for Multi-Agent System. – М.: , 2015. – 120 с. Топливные насосы высокого давления распределительного типа. Учебное пособие. – М.: Легион-Автодата, 2011. – 132 с. Лучшие результаты Ничего не найдено Дополнительные результаты Как создать базу данных регистрации трудовых договоров и дополнительных соглашений к ним в MS Access 2007. А. Лобанова, "Кадровик. Кадровое делопроизводство", N 7, 8, июль, август 2011 г. He посмертная" отчетность, а предвидение...". интервью с Е. Агеевой, финансовым директором Golder Electronics/TM Vitek. С. Крылосов, "Консультант", N 13, июль 2010 г. Формирование базы данных персонального учета сотрудников с использованием Microsoft Access. Е. Гурова, "Кадровик. Кадровое делопроизводство", № 6, июнь 2009. Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Юрий Спасибо вам за консультации по диплому. Я вчера защитился на 5 баллов! Буду вас всем рекомендовать!!! :) Всего Вам хорошего !!!