Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Alex Jauch. Why We Fail: or how an architect learned to stop worrying and love the cloud. – М.: , 2012. – 52 с.
  2. Barry Bloom. Deploying and Managing Microsoft .NET Web Farms. – М.: , 0. – 0 с.
  3. Thomas J. Parenty. Digital Defense: What You Should Know About Protecting Your Company's Assets. – М.: , 0. – 0 с.
  4. Peter G. W. Keen, Craigg Ballance. On-Line Profits: A Manager's Guide to Electronic Commerce. – М.: , 0. – 0 с.
  5. James Russell. Screen & Stage Marketing Secrets. – М.: , 0. – 0 с.
  6. John Vacca, Pete Loshin, Paul Murphy. Electronic Commerce (Networking Series). – М.: , 0. – 0 с.
  7. John Roland, Mark J. Newcomb. CCSP Cisco Secure VPN Exam Certification Guide (CCSP Self-Study). – М.: , 0. – 0 с.
  8. Juanita Ellis, Tim Speed. The Internet Security Guidebook: From Planning to Deployment. – М.: , 0. – 0 с.
  9. Sean Geer. Essential Internet. – М.: , 0. – 0 с.
  10. Paul Piccard, Jeremy Faircloth. Combating Spyware in the Enterprise. – М.: , 2006. – 386 с.
  11. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с.
  12. John R. Vacca. Firewalls. – М.: , 2010. – 448 с.
  13. О.Р. Лапонина. Межсетевое экранирование. – М.: Интернет-университет информационных технологий, Бином. Лаборатория знаний, 2007. – 344 с.
  14. Mark A. Franklin, Patrick Crowley, Haldun Hadimioglu, Peter Z. Onufryk. Network Processor Design: Issues and Practices, Volume 1. – М.: Morgan Kaufmann, 2002. – 338 с.
  15. Douglas E. Comer. Network Systems Design Using Network Processors: Intel 2XXX Version. – М.: Prentice Hall, 2005. – 600 с.
  16. Fergus Strachan. Integrating ISA Server 2006 with Microsoft Exchange 2007. – М.: Syngress, 2008. – 376 с.
  17. Rob Scrimger, Paul LaSalle, Mridula Parihar, Meeta Gupta. TCP/IP Bible. – М.: John Wiley and Sons, Ltd, 2002. – 624 с.
  18. Chandra Kopparapu. Load Balancing Servers, Firewalls, and Caches. – М.: , 2002. – 224 с.
  19. Syngress. Cisco Security Specialists Guide to PIX Firewall. – М.: , 2010. – 608 с.
  20. Syngress. Firewall Policies and VPN Configurations. – М.: , 2010. – 550 с.
  21. Rob Cameron. Configuring NetScreen Firewalls. – М.: , 2010. – 600 с.
  22. Andrew Hay. Nokia Firewall, VPN, and IPSO Configuration Guide. – М.: , 2010. – 488 с.
  23. Anne Hemni. 2008 Firewall Administration Professional CD. – М.: , 2010. – 0 с.
  24. Dan Bendell. Configuring SonicWALL Firewalls. – М.: , 2010. – 600 с.
  25. Lawrence E Walsh. Firewall – The Iran–Contra Conspiracy & Cover–Up (Paper). – М.: , 1999. – 560 с.
  26. Elizabeth D Zwicky. Building Internet Firewalls 2e. – М.: , 2000. – 896 с.
  27. Jacek Artymiak. Firewall Warrior. – М.: , 2007. – 600 с.
  28. Brian Komar. Firewalls For Dummies®. – М.: , 2001. – 408 с.
  29. Lawrence E Walsh. Firewall – The Full Story of the Iran–Contra Conspiracy & Cover Up. – М.: , 1997. – 560 с.
  30. Brian Komar. Firewalls For Dummies®. – М.: , 2003. – 432 с.
  31. Mr Joe Phillips LCSW. The Firewall Sedition: A novel about a dangerous idea. – М.: , 2011. – 612 с.
  32. Hacking Exposed Malware And Rootkits. – М.: , 2011. – 400 с.
  33. How To Do Everything Netbook. – М.: , 2011. – 320 с.
  34. Citrix Xenapp Platinum Edition For Windows: The Official Guide. – М.: , 2011. – 576 с.
  35. Mike Meyers' Comptia Network+ Guide To Managing And Troubleshooting Networks Lab Manual, Second Edition. – М.: , 2011. – 352 с.
  36. Mac Os X System Administration. – М.: , 2011. – 528 с.
  37. Cisco: A Beginner'S Guide, Fourth Edition. – М.: , 2011. – 696 с.
  38. How To Do Everything With Windows Xp, Third Edition. – М.: , 2011. – 480 с.
  39. Fundamentals Of Network Security. – М.: , 2011. – 672 с.
  40. Greg Holden. Guide to Firewalls and Network Security: Intrusion Detection and VPNs. – М.: Course Technology, 2003. – 512 с.
  41. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . –  с.
  42. Robert Stephens. Configuring Check Point NGX VPN-1/Firewall-1. – М.: , 2005. – 608 с.
  43. Thomas Porter, Jan Kanclirz Jr. Practical VoIP Security. – М.: Syngress, 2006. – 564 с.
  44. Michael Gregg, Eric Seagren, Angela Orebaugh, Matt Jonkman, Raffael Marty. How to Cheat at Configuring Open Source Security Tools (How to Cheat) (How to Cheat). – М.: , 2007. – 528 с.
  45. Thomas W. Shinder. The Best Damn Firewall Book Period. – М.: Syngress, 2007. – 1000 с.
  46. Rob Cameron. Configuring Juniper Networks NetScreen & SSG Firewalls. – М.: , 2010. – 512 с.
  47. Eduardo Fernandez-Buglioni. Security Patterns in Practice: Designing Secure Architectures Using Software Patterns. – М.: Wiley, 2013. – 582 с.
  48. Anup Bhange and Manmeet Kaur Marhas. Anomaly Detection in Network Traffic; A Statistical Approach. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  49. Sudarshan Ranpise. Cyber Crime Prevention. – М.: LAP Lambert Academic Publishing, 2013. – 268 с.
  50. Владислав Юров. Elastix - общайтесь свободно!. – М.: ЭКОМ Паблишерз, 2015. – 286 с.
  51. Nazmi Taslac?. Beyond Classroom Firewalls. – М.: LAP Lambert Academic Publishing, 2010. – 76 с.
  52. Ahmad A. Hassan. Firewalls: Modeling and Management. – М.: LAP Lambert Academic Publishing, 2012. – 100 с.
  53. Hanafy M. Ali. Peer-to-Peer Networks. – М.: LAP Lambert Academic Publishing, 2010. – 176 с.
  54. Ahmad Mudhar. The CSF Firewall. – М.: LAP Lambert Academic Publishing, 2013. – 52 с.
  55. V. G. Shelake and R. K. Kamat. A Monogram On Design And Development Of FPGA Based Firewall. – М.: LAP Lambert Academic Publishing, 2014. – 100 с.
  56. Rakesh Jha. Security Issues In AD-HOC And Infrastructure (WLAN) Networks. – М.: LAP Lambert Academic Publishing, 2011. – 124 с.
  57. Omid Mahdi Ebadati E.,Harleen Kaur M. Afshar Alam and Kaebeh Yaeghoobi. Micro-Firewalls for Dynamic Network Security Framework. – М.: LAP Lambert Academic Publishing, 2012. – 292 с.
  58. Peter Kemei. Framework for Monitoring Hardware Firewall Functionality Using NIDS. – М.: LAP Lambert Academic Publishing, 2013. – 176 с.
  59. Vincent Omollo. Enhanced Network Security. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  60. Necati Demir and Gokhan Dalk?l?c. Design and Implementation of an Embedded Firewall. – М.: LAP Lambert Academic Publishing, 2011. – 108 с.
  61. Kefa Rabah. Mastering Securing ICT Infrastructure for Corporate Network. – М.: LAP Lambert Academic Publishing, 2014. – 360 с.
  62. Prakash Prasad. Intrusion Detection System: Findings. – М.: LAP Lambert Academic Publishing, 2011. – 104 с.
  63. Bibi Masoomeh Aslahi Shahri. Intrusion Detection System Using Hybrid Gsa-kmeans. – М.: LAP Lambert Academic Publishing, 2014. – 128 с.
  64. Kamrul Hasan. An Investigation into Botnet Detection System. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  65. Omar Zakaria. Information Security Culture. – М.: LAP Lambert Academic Publishing, 2013. – 248 с.
  66. Stephen Murove,S. B. Mangena and B. Jones. Firewall Evaluation:Models for Major Decisions in Computer Security. – М.: LAP Lambert Academic Publishing, 2014. – 236 с.
  67. Benjamin Okike. Some New Encryption Techniques Using Firewalls and Random Generators. – М.: LAP Lambert Academic Publishing, 2012. – 180 с.
  68. Prisilla Jayanthi. Sans Signatures. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  69. Pankaj Bhambri. Roadmaps to E-Business. – М.: LAP Lambert Academic Publishing, 2013. – 152 с.
  70. Mohamed Khalefa Sarrab. Runtime Verification of Information flow. – М.: LAP Lambert Academic Publishing, 2011. – 288 с.
  71. Michael Lee. Pushpluspull. – М.: LAP Lambert Academic Publishing, 2012. – 172 с.
  72. М.Фленов. Linux глазами хакера. – СПб.: БХВ-Петербург, 2018. – 432 с.

Дополнительные результаты

  1. Alex Jauch. Why We Fail: or how an architect learned to stop worrying and love the cloud. – М.: , 2012. – 52 с.
  2. Barry Bloom. Deploying and Managing Microsoft .NET Web Farms. – М.: , 0. – 0 с.
  3. Thomas J. Parenty. Digital Defense: What You Should Know About Protecting Your Company's Assets. – М.: , 0. – 0 с.
  4. Peter G. W. Keen, Craigg Ballance. On-Line Profits: A Manager's Guide to Electronic Commerce. – М.: , 0. – 0 с.
  5. James Russell. Screen & Stage Marketing Secrets. – М.: , 0. – 0 с.
  6. John Vacca, Pete Loshin, Paul Murphy. Electronic Commerce (Networking Series). – М.: , 0. – 0 с.
  7. John Roland, Mark J. Newcomb. CCSP Cisco Secure VPN Exam Certification Guide (CCSP Self-Study). – М.: , 0. – 0 с.
  8. Juanita Ellis, Tim Speed. The Internet Security Guidebook: From Planning to Deployment. – М.: , 0. – 0 с.
  9. Sean Geer. Essential Internet. – М.: , 0. – 0 с.
  10. Paul Piccard, Jeremy Faircloth. Combating Spyware in the Enterprise. – М.: , 2006. – 386 с.
  11. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с.
  12. John R. Vacca. Firewalls. – М.: , 2010. – 448 с.
  13. О.Р. Лапонина. Межсетевое экранирование. – М.: Интернет-университет информационных технологий, Бином. Лаборатория знаний, 2007. – 344 с.
  14. Mark A. Franklin, Patrick Crowley, Haldun Hadimioglu, Peter Z. Onufryk. Network Processor Design: Issues and Practices, Volume 1. – М.: Morgan Kaufmann, 2002. – 338 с.
  15. Douglas E. Comer. Network Systems Design Using Network Processors: Intel 2XXX Version. – М.: Prentice Hall, 2005. – 600 с.
  16. Fergus Strachan. Integrating ISA Server 2006 with Microsoft Exchange 2007. – М.: Syngress, 2008. – 376 с.
  17. Rob Scrimger, Paul LaSalle, Mridula Parihar, Meeta Gupta. TCP/IP Bible. – М.: John Wiley and Sons, Ltd, 2002. – 624 с.
  18. Chandra Kopparapu. Load Balancing Servers, Firewalls, and Caches. – М.: , 2002. – 224 с.
  19. Syngress. Cisco Security Specialists Guide to PIX Firewall. – М.: , 2010. – 608 с.
  20. Syngress. Firewall Policies and VPN Configurations. – М.: , 2010. – 550 с.
  21. Rob Cameron. Configuring NetScreen Firewalls. – М.: , 2010. – 600 с.
  22. Andrew Hay. Nokia Firewall, VPN, and IPSO Configuration Guide. – М.: , 2010. – 488 с.
  23. Anne Hemni. 2008 Firewall Administration Professional CD. – М.: , 2010. – 0 с.
  24. Dan Bendell. Configuring SonicWALL Firewalls. – М.: , 2010. – 600 с.
  25. Lawrence E Walsh. Firewall – The Iran–Contra Conspiracy & Cover–Up (Paper). – М.: , 1999. – 560 с.
  26. Elizabeth D Zwicky. Building Internet Firewalls 2e. – М.: , 2000. – 896 с.
  27. Jacek Artymiak. Firewall Warrior. – М.: , 2007. – 600 с.
  28. Brian Komar. Firewalls For Dummies®. – М.: , 2001. – 408 с.
  29. Lawrence E Walsh. Firewall – The Full Story of the Iran–Contra Conspiracy & Cover Up. – М.: , 1997. – 560 с.
  30. Brian Komar. Firewalls For Dummies®. – М.: , 2003. – 432 с.
  31. Mr Joe Phillips LCSW. The Firewall Sedition: A novel about a dangerous idea. – М.: , 2011. – 612 с.
  32. Hacking Exposed Malware And Rootkits. – М.: , 2011. – 400 с.
  33. How To Do Everything Netbook. – М.: , 2011. – 320 с.
  34. Citrix Xenapp Platinum Edition For Windows: The Official Guide. – М.: , 2011. – 576 с.
  35. Mike Meyers' Comptia Network+ Guide To Managing And Troubleshooting Networks Lab Manual, Second Edition. – М.: , 2011. – 352 с.
  36. Mac Os X System Administration. – М.: , 2011. – 528 с.
  37. Cisco: A Beginner'S Guide, Fourth Edition. – М.: , 2011. – 696 с.
  38. How To Do Everything With Windows Xp, Third Edition. – М.: , 2011. – 480 с.
  39. Fundamentals Of Network Security. – М.: , 2011. – 672 с.
  40. Greg Holden. Guide to Firewalls and Network Security: Intrusion Detection and VPNs. – М.: Course Technology, 2003. – 512 с.
  41. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . –  с.
  42. Robert Stephens. Configuring Check Point NGX VPN-1/Firewall-1. – М.: , 2005. – 608 с.
  43. Thomas Porter, Jan Kanclirz Jr. Practical VoIP Security. – М.: Syngress, 2006. – 564 с.
  44. Michael Gregg, Eric Seagren, Angela Orebaugh, Matt Jonkman, Raffael Marty. How to Cheat at Configuring Open Source Security Tools (How to Cheat) (How to Cheat). – М.: , 2007. – 528 с.
  45. Thomas W. Shinder. The Best Damn Firewall Book Period. – М.: Syngress, 2007. – 1000 с.
  46. Rob Cameron. Configuring Juniper Networks NetScreen & SSG Firewalls. – М.: , 2010. – 512 с.
  47. Eduardo Fernandez-Buglioni. Security Patterns in Practice: Designing Secure Architectures Using Software Patterns. – М.: Wiley, 2013. – 582 с.
  48. Anup Bhange and Manmeet Kaur Marhas. Anomaly Detection in Network Traffic; A Statistical Approach. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  49. Sudarshan Ranpise. Cyber Crime Prevention. – М.: LAP Lambert Academic Publishing, 2013. – 268 с.
  50. Владислав Юров. Elastix - общайтесь свободно!. – М.: ЭКОМ Паблишерз, 2015. – 286 с.
  51. Nazmi Taslac?. Beyond Classroom Firewalls. – М.: LAP Lambert Academic Publishing, 2010. – 76 с.
  52. Ahmad A. Hassan. Firewalls: Modeling and Management. – М.: LAP Lambert Academic Publishing, 2012. – 100 с.
  53. Hanafy M. Ali. Peer-to-Peer Networks. – М.: LAP Lambert Academic Publishing, 2010. – 176 с.
  54. Ahmad Mudhar. The CSF Firewall. – М.: LAP Lambert Academic Publishing, 2013. – 52 с.
  55. V. G. Shelake and R. K. Kamat. A Monogram On Design And Development Of FPGA Based Firewall. – М.: LAP Lambert Academic Publishing, 2014. – 100 с.
  56. Rakesh Jha. Security Issues In AD-HOC And Infrastructure (WLAN) Networks. – М.: LAP Lambert Academic Publishing, 2011. – 124 с.
  57. Omid Mahdi Ebadati E.,Harleen Kaur M. Afshar Alam and Kaebeh Yaeghoobi. Micro-Firewalls for Dynamic Network Security Framework. – М.: LAP Lambert Academic Publishing, 2012. – 292 с.
  58. Peter Kemei. Framework for Monitoring Hardware Firewall Functionality Using NIDS. – М.: LAP Lambert Academic Publishing, 2013. – 176 с.
  59. Vincent Omollo. Enhanced Network Security. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  60. Necati Demir and Gokhan Dalk?l?c. Design and Implementation of an Embedded Firewall. – М.: LAP Lambert Academic Publishing, 2011. – 108 с.
  61. Kefa Rabah. Mastering Securing ICT Infrastructure for Corporate Network. – М.: LAP Lambert Academic Publishing, 2014. – 360 с.
  62. Prakash Prasad. Intrusion Detection System: Findings. – М.: LAP Lambert Academic Publishing, 2011. – 104 с.
  63. Bibi Masoomeh Aslahi Shahri. Intrusion Detection System Using Hybrid Gsa-kmeans. – М.: LAP Lambert Academic Publishing, 2014. – 128 с.
  64. Kamrul Hasan. An Investigation into Botnet Detection System. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  65. Omar Zakaria. Information Security Culture. – М.: LAP Lambert Academic Publishing, 2013. – 248 с.
  66. Stephen Murove,S. B. Mangena and B. Jones. Firewall Evaluation:Models for Major Decisions in Computer Security. – М.: LAP Lambert Academic Publishing, 2014. – 236 с.
  67. Benjamin Okike. Some New Encryption Techniques Using Firewalls and Random Generators. – М.: LAP Lambert Academic Publishing, 2012. – 180 с.
  68. Prisilla Jayanthi. Sans Signatures. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  69. Pankaj Bhambri. Roadmaps to E-Business. – М.: LAP Lambert Academic Publishing, 2013. – 152 с.
  70. Mohamed Khalefa Sarrab. Runtime Verification of Information flow. – М.: LAP Lambert Academic Publishing, 2011. – 288 с.
  71. Michael Lee. Pushpluspull. – М.: LAP Lambert Academic Publishing, 2012. – 172 с.
  72. М.Фленов. Linux глазами хакера. – СПб.: БХВ-Петербург, 2018. – 432 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

Ничего не найдено

Образцы работ

Тема и предметТип и объем работы
Гражданско-правовые способы защиты авторских прав в сети Интернет
Финансовое право
Другое
99 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Вера, 11.06
Вера! Работа в целом пойдет. Антиплагиат нормальный.