Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Alex Jauch. Why We Fail: or how an architect learned to stop worrying and love the cloud. – М.: , 2012. – 52 с. Barry Bloom. Deploying and Managing Microsoft .NET Web Farms. – М.: , 0. – 0 с. Thomas J. Parenty. Digital Defense: What You Should Know About Protecting Your Company's Assets. – М.: , 0. – 0 с. Peter G. W. Keen, Craigg Ballance. On-Line Profits: A Manager's Guide to Electronic Commerce. – М.: , 0. – 0 с. James Russell. Screen & Stage Marketing Secrets. – М.: , 0. – 0 с. John Vacca, Pete Loshin, Paul Murphy. Electronic Commerce (Networking Series). – М.: , 0. – 0 с. John Roland, Mark J. Newcomb. CCSP Cisco Secure VPN Exam Certification Guide (CCSP Self-Study). – М.: , 0. – 0 с. Juanita Ellis, Tim Speed. The Internet Security Guidebook: From Planning to Deployment. – М.: , 0. – 0 с. Sean Geer. Essential Internet. – М.: , 0. – 0 с. Paul Piccard, Jeremy Faircloth. Combating Spyware in the Enterprise. – М.: , 2006. – 386 с. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с. John R. Vacca. Firewalls. – М.: , 2010. – 448 с. О.Р. Лапонина. Межсетевое экранирование. – М.: Интернет-университет информационных технологий, Бином. Лаборатория знаний, 2007. – 344 с. Mark A. Franklin, Patrick Crowley, Haldun Hadimioglu, Peter Z. Onufryk. Network Processor Design: Issues and Practices, Volume 1. – М.: Morgan Kaufmann, 2002. – 338 с. Douglas E. Comer. Network Systems Design Using Network Processors: Intel 2XXX Version. – М.: Prentice Hall, 2005. – 600 с. Fergus Strachan. Integrating ISA Server 2006 with Microsoft Exchange 2007. – М.: Syngress, 2008. – 376 с. Rob Scrimger, Paul LaSalle, Mridula Parihar, Meeta Gupta. TCP/IP Bible. – М.: John Wiley and Sons, Ltd, 2002. – 624 с. Chandra Kopparapu. Load Balancing Servers, Firewalls, and Caches. – М.: , 2002. – 224 с. Syngress. Cisco Security Specialists Guide to PIX Firewall. – М.: , 2010. – 608 с. Syngress. Firewall Policies and VPN Configurations. – М.: , 2010. – 550 с. Rob Cameron. Configuring NetScreen Firewalls. – М.: , 2010. – 600 с. Andrew Hay. Nokia Firewall, VPN, and IPSO Configuration Guide. – М.: , 2010. – 488 с. Anne Hemni. 2008 Firewall Administration Professional CD. – М.: , 2010. – 0 с. Dan Bendell. Configuring SonicWALL Firewalls. – М.: , 2010. – 600 с. Lawrence E Walsh. Firewall – The Iran–Contra Conspiracy & Cover–Up (Paper). – М.: , 1999. – 560 с. Elizabeth D Zwicky. Building Internet Firewalls 2e. – М.: , 2000. – 896 с. Jacek Artymiak. Firewall Warrior. – М.: , 2007. – 600 с. Brian Komar. Firewalls For Dummies®. – М.: , 2001. – 408 с. Lawrence E Walsh. Firewall – The Full Story of the Iran–Contra Conspiracy & Cover Up. – М.: , 1997. – 560 с. Brian Komar. Firewalls For Dummies®. – М.: , 2003. – 432 с. Mr Joe Phillips LCSW. The Firewall Sedition: A novel about a dangerous idea. – М.: , 2011. – 612 с. Hacking Exposed Malware And Rootkits. – М.: , 2011. – 400 с. How To Do Everything Netbook. – М.: , 2011. – 320 с. Citrix Xenapp Platinum Edition For Windows: The Official Guide. – М.: , 2011. – 576 с. Mike Meyers' Comptia Network+ Guide To Managing And Troubleshooting Networks Lab Manual, Second Edition. – М.: , 2011. – 352 с. Mac Os X System Administration. – М.: , 2011. – 528 с. Cisco: A Beginner'S Guide, Fourth Edition. – М.: , 2011. – 696 с. How To Do Everything With Windows Xp, Third Edition. – М.: , 2011. – 480 с. Fundamentals Of Network Security. – М.: , 2011. – 672 с. Greg Holden. Guide to Firewalls and Network Security: Intrusion Detection and VPNs. – М.: Course Technology, 2003. – 512 с. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . – с. Robert Stephens. Configuring Check Point NGX VPN-1/Firewall-1. – М.: , 2005. – 608 с. Thomas Porter, Jan Kanclirz Jr. Practical VoIP Security. – М.: Syngress, 2006. – 564 с. Michael Gregg, Eric Seagren, Angela Orebaugh, Matt Jonkman, Raffael Marty. How to Cheat at Configuring Open Source Security Tools (How to Cheat) (How to Cheat). – М.: , 2007. – 528 с. Thomas W. Shinder. The Best Damn Firewall Book Period. – М.: Syngress, 2007. – 1000 с. Rob Cameron. Configuring Juniper Networks NetScreen & SSG Firewalls. – М.: , 2010. – 512 с. Eduardo Fernandez-Buglioni. Security Patterns in Practice: Designing Secure Architectures Using Software Patterns. – М.: Wiley, 2013. – 582 с. Anup Bhange and Manmeet Kaur Marhas. Anomaly Detection in Network Traffic; A Statistical Approach. – М.: LAP Lambert Academic Publishing, 2012. – 92 с. Sudarshan Ranpise. Cyber Crime Prevention. – М.: LAP Lambert Academic Publishing, 2013. – 268 с. Владислав Юров. Elastix - общайтесь свободно!. – М.: ЭКОМ Паблишерз, 2015. – 286 с. Nazmi Taslac?. Beyond Classroom Firewalls. – М.: LAP Lambert Academic Publishing, 2010. – 76 с. Ahmad A. Hassan. Firewalls: Modeling and Management. – М.: LAP Lambert Academic Publishing, 2012. – 100 с. Hanafy M. Ali. Peer-to-Peer Networks. – М.: LAP Lambert Academic Publishing, 2010. – 176 с. Ahmad Mudhar. The CSF Firewall. – М.: LAP Lambert Academic Publishing, 2013. – 52 с. V. G. Shelake and R. K. Kamat. A Monogram On Design And Development Of FPGA Based Firewall. – М.: LAP Lambert Academic Publishing, 2014. – 100 с. Rakesh Jha. Security Issues In AD-HOC And Infrastructure (WLAN) Networks. – М.: LAP Lambert Academic Publishing, 2011. – 124 с. Omid Mahdi Ebadati E.,Harleen Kaur M. Afshar Alam and Kaebeh Yaeghoobi. Micro-Firewalls for Dynamic Network Security Framework. – М.: LAP Lambert Academic Publishing, 2012. – 292 с. Peter Kemei. Framework for Monitoring Hardware Firewall Functionality Using NIDS. – М.: LAP Lambert Academic Publishing, 2013. – 176 с. Vincent Omollo. Enhanced Network Security. – М.: LAP Lambert Academic Publishing, 2013. – 76 с. Necati Demir and Gokhan Dalk?l?c. Design and Implementation of an Embedded Firewall. – М.: LAP Lambert Academic Publishing, 2011. – 108 с. Kefa Rabah. Mastering Securing ICT Infrastructure for Corporate Network. – М.: LAP Lambert Academic Publishing, 2014. – 360 с. Prakash Prasad. Intrusion Detection System: Findings. – М.: LAP Lambert Academic Publishing, 2011. – 104 с. Bibi Masoomeh Aslahi Shahri. Intrusion Detection System Using Hybrid Gsa-kmeans. – М.: LAP Lambert Academic Publishing, 2014. – 128 с. Kamrul Hasan. An Investigation into Botnet Detection System. – М.: LAP Lambert Academic Publishing, 2013. – 120 с. Omar Zakaria. Information Security Culture. – М.: LAP Lambert Academic Publishing, 2013. – 248 с. Stephen Murove,S. B. Mangena and B. Jones. Firewall Evaluation:Models for Major Decisions in Computer Security. – М.: LAP Lambert Academic Publishing, 2014. – 236 с. Benjamin Okike. Some New Encryption Techniques Using Firewalls and Random Generators. – М.: LAP Lambert Academic Publishing, 2012. – 180 с. Prisilla Jayanthi. Sans Signatures. – М.: LAP Lambert Academic Publishing, 2012. – 104 с. Pankaj Bhambri. Roadmaps to E-Business. – М.: LAP Lambert Academic Publishing, 2013. – 152 с. Mohamed Khalefa Sarrab. Runtime Verification of Information flow. – М.: LAP Lambert Academic Publishing, 2011. – 288 с. Michael Lee. Pushpluspull. – М.: LAP Lambert Academic Publishing, 2012. – 172 с. М.Фленов. Linux глазами хакера. – СПб.: БХВ-Петербург, 2018. – 432 с. Дополнительные результаты Alex Jauch. Why We Fail: or how an architect learned to stop worrying and love the cloud. – М.: , 2012. – 52 с. Barry Bloom. Deploying and Managing Microsoft .NET Web Farms. – М.: , 0. – 0 с. Thomas J. Parenty. Digital Defense: What You Should Know About Protecting Your Company's Assets. – М.: , 0. – 0 с. Peter G. W. Keen, Craigg Ballance. On-Line Profits: A Manager's Guide to Electronic Commerce. – М.: , 0. – 0 с. James Russell. Screen & Stage Marketing Secrets. – М.: , 0. – 0 с. John Vacca, Pete Loshin, Paul Murphy. Electronic Commerce (Networking Series). – М.: , 0. – 0 с. John Roland, Mark J. Newcomb. CCSP Cisco Secure VPN Exam Certification Guide (CCSP Self-Study). – М.: , 0. – 0 с. Juanita Ellis, Tim Speed. The Internet Security Guidebook: From Planning to Deployment. – М.: , 0. – 0 с. Sean Geer. Essential Internet. – М.: , 0. – 0 с. Paul Piccard, Jeremy Faircloth. Combating Spyware in the Enterprise. – М.: , 2006. – 386 с. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с. John R. Vacca. Firewalls. – М.: , 2010. – 448 с. О.Р. Лапонина. Межсетевое экранирование. – М.: Интернет-университет информационных технологий, Бином. Лаборатория знаний, 2007. – 344 с. Mark A. Franklin, Patrick Crowley, Haldun Hadimioglu, Peter Z. Onufryk. Network Processor Design: Issues and Practices, Volume 1. – М.: Morgan Kaufmann, 2002. – 338 с. Douglas E. Comer. Network Systems Design Using Network Processors: Intel 2XXX Version. – М.: Prentice Hall, 2005. – 600 с. Fergus Strachan. Integrating ISA Server 2006 with Microsoft Exchange 2007. – М.: Syngress, 2008. – 376 с. Rob Scrimger, Paul LaSalle, Mridula Parihar, Meeta Gupta. TCP/IP Bible. – М.: John Wiley and Sons, Ltd, 2002. – 624 с. Chandra Kopparapu. Load Balancing Servers, Firewalls, and Caches. – М.: , 2002. – 224 с. Syngress. Cisco Security Specialists Guide to PIX Firewall. – М.: , 2010. – 608 с. Syngress. Firewall Policies and VPN Configurations. – М.: , 2010. – 550 с. Rob Cameron. Configuring NetScreen Firewalls. – М.: , 2010. – 600 с. Andrew Hay. Nokia Firewall, VPN, and IPSO Configuration Guide. – М.: , 2010. – 488 с. Anne Hemni. 2008 Firewall Administration Professional CD. – М.: , 2010. – 0 с. Dan Bendell. Configuring SonicWALL Firewalls. – М.: , 2010. – 600 с. Lawrence E Walsh. Firewall – The Iran–Contra Conspiracy & Cover–Up (Paper). – М.: , 1999. – 560 с. Elizabeth D Zwicky. Building Internet Firewalls 2e. – М.: , 2000. – 896 с. Jacek Artymiak. Firewall Warrior. – М.: , 2007. – 600 с. Brian Komar. Firewalls For Dummies®. – М.: , 2001. – 408 с. Lawrence E Walsh. Firewall – The Full Story of the Iran–Contra Conspiracy & Cover Up. – М.: , 1997. – 560 с. Brian Komar. Firewalls For Dummies®. – М.: , 2003. – 432 с. Mr Joe Phillips LCSW. The Firewall Sedition: A novel about a dangerous idea. – М.: , 2011. – 612 с. Hacking Exposed Malware And Rootkits. – М.: , 2011. – 400 с. How To Do Everything Netbook. – М.: , 2011. – 320 с. Citrix Xenapp Platinum Edition For Windows: The Official Guide. – М.: , 2011. – 576 с. Mike Meyers' Comptia Network+ Guide To Managing And Troubleshooting Networks Lab Manual, Second Edition. – М.: , 2011. – 352 с. Mac Os X System Administration. – М.: , 2011. – 528 с. Cisco: A Beginner'S Guide, Fourth Edition. – М.: , 2011. – 696 с. How To Do Everything With Windows Xp, Third Edition. – М.: , 2011. – 480 с. Fundamentals Of Network Security. – М.: , 2011. – 672 с. Greg Holden. Guide to Firewalls and Network Security: Intrusion Detection and VPNs. – М.: Course Technology, 2003. – 512 с. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . – с. Robert Stephens. Configuring Check Point NGX VPN-1/Firewall-1. – М.: , 2005. – 608 с. Thomas Porter, Jan Kanclirz Jr. Practical VoIP Security. – М.: Syngress, 2006. – 564 с. Michael Gregg, Eric Seagren, Angela Orebaugh, Matt Jonkman, Raffael Marty. How to Cheat at Configuring Open Source Security Tools (How to Cheat) (How to Cheat). – М.: , 2007. – 528 с. Thomas W. Shinder. The Best Damn Firewall Book Period. – М.: Syngress, 2007. – 1000 с. Rob Cameron. Configuring Juniper Networks NetScreen & SSG Firewalls. – М.: , 2010. – 512 с. Eduardo Fernandez-Buglioni. Security Patterns in Practice: Designing Secure Architectures Using Software Patterns. – М.: Wiley, 2013. – 582 с. Anup Bhange and Manmeet Kaur Marhas. Anomaly Detection in Network Traffic; A Statistical Approach. – М.: LAP Lambert Academic Publishing, 2012. – 92 с. Sudarshan Ranpise. Cyber Crime Prevention. – М.: LAP Lambert Academic Publishing, 2013. – 268 с. Владислав Юров. Elastix - общайтесь свободно!. – М.: ЭКОМ Паблишерз, 2015. – 286 с. Nazmi Taslac?. Beyond Classroom Firewalls. – М.: LAP Lambert Academic Publishing, 2010. – 76 с. Ahmad A. Hassan. Firewalls: Modeling and Management. – М.: LAP Lambert Academic Publishing, 2012. – 100 с. Hanafy M. Ali. Peer-to-Peer Networks. – М.: LAP Lambert Academic Publishing, 2010. – 176 с. Ahmad Mudhar. The CSF Firewall. – М.: LAP Lambert Academic Publishing, 2013. – 52 с. V. G. Shelake and R. K. Kamat. A Monogram On Design And Development Of FPGA Based Firewall. – М.: LAP Lambert Academic Publishing, 2014. – 100 с. Rakesh Jha. Security Issues In AD-HOC And Infrastructure (WLAN) Networks. – М.: LAP Lambert Academic Publishing, 2011. – 124 с. Omid Mahdi Ebadati E.,Harleen Kaur M. Afshar Alam and Kaebeh Yaeghoobi. Micro-Firewalls for Dynamic Network Security Framework. – М.: LAP Lambert Academic Publishing, 2012. – 292 с. Peter Kemei. Framework for Monitoring Hardware Firewall Functionality Using NIDS. – М.: LAP Lambert Academic Publishing, 2013. – 176 с. Vincent Omollo. Enhanced Network Security. – М.: LAP Lambert Academic Publishing, 2013. – 76 с. Necati Demir and Gokhan Dalk?l?c. Design and Implementation of an Embedded Firewall. – М.: LAP Lambert Academic Publishing, 2011. – 108 с. Kefa Rabah. Mastering Securing ICT Infrastructure for Corporate Network. – М.: LAP Lambert Academic Publishing, 2014. – 360 с. Prakash Prasad. Intrusion Detection System: Findings. – М.: LAP Lambert Academic Publishing, 2011. – 104 с. Bibi Masoomeh Aslahi Shahri. Intrusion Detection System Using Hybrid Gsa-kmeans. – М.: LAP Lambert Academic Publishing, 2014. – 128 с. Kamrul Hasan. An Investigation into Botnet Detection System. – М.: LAP Lambert Academic Publishing, 2013. – 120 с. Omar Zakaria. Information Security Culture. – М.: LAP Lambert Academic Publishing, 2013. – 248 с. Stephen Murove,S. B. Mangena and B. Jones. Firewall Evaluation:Models for Major Decisions in Computer Security. – М.: LAP Lambert Academic Publishing, 2014. – 236 с. Benjamin Okike. Some New Encryption Techniques Using Firewalls and Random Generators. – М.: LAP Lambert Academic Publishing, 2012. – 180 с. Prisilla Jayanthi. Sans Signatures. – М.: LAP Lambert Academic Publishing, 2012. – 104 с. Pankaj Bhambri. Roadmaps to E-Business. – М.: LAP Lambert Academic Publishing, 2013. – 152 с. Mohamed Khalefa Sarrab. Runtime Verification of Information flow. – М.: LAP Lambert Academic Publishing, 2011. – 288 с. Michael Lee. Pushpluspull. – М.: LAP Lambert Academic Publishing, 2012. – 172 с. М.Фленов. Linux глазами хакера. – СПб.: БХВ-Петербург, 2018. – 432 с.
Лучшие результаты Ничего не найдено Дополнительные результаты Ничего не найдено Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Вера, 11.06 Вера! Работа в целом пойдет. Антиплагиат нормальный.