Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. John Chirillo. Hack Attacks Revealed. – М.: , 2001. – 960 с.
  2. Hacking Exposed Web 2.0: Web 2.0 Security Secrets And Solutions. – М.: , 2011. – 258 с.
  3. Johnny Cache, Joshua Wright, Vincent Liu. Hacking Exposed: Wireless. – М.: McGraw-Hill, 2010. – 512 с.
  4. Chris Prosise, Kevin Mandia, Matt Pepe. Incident Response & Computer Forensics. – М.: McGraw-Hill/Osborne, 2003. – 508 с.

Дополнительные результаты

  1. Victor Cheng. Case Interview Secrets: A Former McKinsey Interviewer Reveals How to Get Multiple Job Offers in Consulting. – М.: Innovation Press, 2012. – 292 с.
  2. Martin Kaplan. What the IRS Doesn't Want You to Know : A CPA Reveals the Tricks of the Trade (What the IRS Doesn't Want You to Know). – М.: , 0. – 0 с.
  3. David M. Levy. How the Dismal Science Got Its Name : Classical Economics and the Ur-Text of Racial Politics. – М.: , 0. – 0 с.
  4. Price M. Cobbs, Judith L. Turnock. Cracking the Corporate Code: The Revealing Success Stories of 32 African-American Executives. – М.: , 0. – 0 с.
  5. Brad Henson. Heart Attack Survivor: A Field Guide. – М.: , 0. – 0 с.
  6. G. William Dauphinais. Straight from the Ceo: The World's Top Business Leaders Reveal Ideas That Every Manager Can Use. – М.: , 0. – 0 с.
  7. Information Warfare : corporate attack and defence in a digital world (Computer Weekly Professional (Paperback)). – М.: , 0. – 0 с.
  8. David M. Levy. How the Dismal Science Got Its Name : Classical Economics and the Ur-Text of Racial Politics. – М.: , 0. – 0 с.
  9. Inside the Minds Staff, Inside the Minds staff. Building a $1,000,000 Nest Egg: Leading Financial Minds Reveal the Simple, Proven Ways for Anyone to Build a $1,000,000 Nest Egg On Your Own Terms. – М.: , 0. – 0 с.
  10. George D. Hack. Site Selection for Growing Companies. – М.: , 0. – 0 с.
  11. Eric Dezenhall. Nail 'Em!: Confronting High-Profile Attacks on Celebrities & Businesses. – М.: , 0. – 0 с.
  12. Jay Conrad Levinson. Guerrilla Marketing Attack: New Strategies, Tactics, and Weapons for Winning Big Profits for Your Small Business. – М.: Houghton Mifflin Co, 1989. – 208 с.
  13. T. F. Peterson. Nightwork: A History of Hacks and Pranks at MIT. – М.: The MIT Press, 2003. – 190 с.
  14. Paul Bausch. Amazon Hacks: 100 Industrial-Strength Tips and Tools. – М.: O'Reilly, 0. – 304 с.
  15. Bonnie Biafore. Online Investing Hacks (Hacks). – М.: , 0. – 0 с.
  16. Питер Лилли. Грязные сделки. Тайная правда о мировой практике отмывания денег, международной преступности и терроризме. – Ростов-на-Дону: Феникс, 2005. – 400 с.
  17. Richard Hack. Clash of the Titans: How the Unbridled Ambition of Ted Turner and Rupert Murdoch Has Created Global Empires that Control What We Read and Watch Each Day. – М.: , 2003. – 0 с.
  18. The Arab World Competitiveness Report 2002-2003 (Economics). – М.: , 2003. – 0 с.
  19. William C. Moore. Wall Street: Its Mysteries Revealed-its Secrets Exposed. – М.: , 2005. – 0 с.
  20. Randolph J. Trappey. Brand Choice : Revealing Customers' Unconscious-Automatic and Strategic Thinking Process. – М.: , 2005. – 0 с.
  21. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с.
  22. Hadley Stern. iPod and iTunes Hacks : Tips and Tools for Ripping, Mixing and Burning (Hacks). – М.: O'Reilly Media, 2004. – 456 с.
  23. John Perkins. Confessions of an Economic Hit Man. – М.: , 2004. – 264 с.
  24. Hugh Burkitt, John Zealley. Marketing Excellence: Winning Companies Reveal the Secrets of Their Success. – М.: , 2007. – 388 с.
  25. Dan Seidman. Sales Autopsy: 50 Postmortems Reveal What Killed the Sale (and what might have saved it). – М.: , 2006. – 192 с.
  26. Annalee Newitz. Pretend We're Dead: Capitalist Monsters in American Pop Culture. – М.: , 2006. – 223 с.
  27. David Fischman. The Secret of the Seven Seeds: A Parable of Leadership and Life. – М.: , 2006. – 208 с.
  28. Liza Siegel. Suite Success: The Psychologist from the Apprentice Reveals What It Really Takes to Excel-in the Boardroom And in Life. – М.: , 2006. – 238 с.
  29. Robert Pollin. Contours of Descent: U.S. Economic Fractures and the Landscape of Global Austerity. – М.: , 2005. – 270 с.
  30. The Economic Impacts of Terrorist Attacks. – М.: , 2006. – 315 с.
  31. Wayne Madsen. Jaded Tasks: Brass Plates, Black Ops & Big Oil-The Blood Politics of George Bush & Co. – М.: , 2006. – 384 с.
  32. Richard Hack. Hughes: The Private Diaries, Memos and Letters; The Definitive Biography of the First American Billionaire. – М.: , 2006. – 456 с.
  33. Rachel Bridge. My Big Idea: 30 Successful Entrepreneurs Reveal How They Found Inspiration. – М.: , 2006. – 192 с.
  34. Joseph W. Koletar. The FBI Career Guide: Inside Information on Getting Chosen for And Succeeding in One of the Toughest Most Prestigious Jobs in the World. – М.: , 2006. – 207 с.
  35. Paul Szatkowski. The Secret Revealed. – М.: , 2008. – 72 с.
  36. Garrett Sutton. Rich Dad's Advisors: Own Your Own Corporation: Why the Rich Own Their Own Companies and Everyone Else Works for Them (Rich Dad's Advisors). – М.: , 2008. – 272 с.
  37. Daniel Gardner. The Science of Fear: Why We Fear the Things We Shouldn't--and Put Ourselves in Greater Danger. – М.: , 2008. – 352 с.
  38. Rachel Bronson. Thicker Than Oil: America's Uneasy Partnership with Saudi Arabia. – М.: , 2008. – 384 с.
  39. Andy Walker. Windows Lockdown!: Your XP and Vista Guide Against Hacks, Attacks, and Other Internet Mayhem (Absolute Beginner's Guide). – М.: , 2008. – 480 с.
  40. Ken Dunham, Jim Melnick. Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet. – М.: , 2008. – 168 с.
  41. Gregory Berns. Iconoclast: A Neuroscientist Reveals How to Think Differently. – М.: , 2008. – 224 с.
  42. Ibp Usa. Global Terrorism Attacks Encyclopedic Handbook. – М.: , 2008. – 300 с.
  43. Sean Tully, Richard Bassett. Restoring Confidence in the Financial System: See-through-leverage: A powerful new tool for revealing and managing risk. – М.: , 2010. – 167 с.
  44. Rachel Bridge. How I Made It: 40 Successful Entrepreneurs Reveal How They Made Millions. – М.: , 2010. – 256 с.
  45. Brently Clemantin. How To Start A Successful Online Business Even If You Have A Limited Budget & Have No Experience!: Secrets To Making Your Dream Of Owning A Business A ... It At A Very Low Cost Revealed (Volume 1). – М.: , 2010. – 122 с.
  46. Francis T. Cullen. Corporate Crime Under Attack. – М.: , 2010. – 350 с.
  47. Bill Jensen and Josh Klein. Hacking Work: Breaking Stupid Rules for Smart Results. – М.: Viking penguin, 2010. – 224 с.
  48. Ewen Southby -Tailyour. BLONDIE : The Life of Lieutenant-Colonel HG Hasler DSO, OBE, RM, founder of the SBS and Modern Single-handed Ocean Racing. – М.: , 2003. – 432 с.
  49. Autobiography of a Yankee Mariner: Christopher Prince and the American Revolution. – М.: , 2003. – 272 с.
  50. Graeme D. Ruxton, Thomas N. Sherratt, Michael P. Speed. Avoiding Attack: The Evolutionary Ecology of Crypsis, Warning Signals and Mimicry. – М.: Oxford University Press, 2005. – 260 с.
  51. Thomas B. Allen. Shark Attacks: Their Causes and Avoidance. – М.: The Lyons Press, 2001. – 312 с.
  52. John M. Butler. Forensic DNA Typing, Second Edition: Biology, Technology, and Genetics of STR Markers. – М.: Academic Press, 2005. – 688 с.
  53. Zaharina Velikova. A Lattice Attack on the McEliece Public Key Cryptosystem: Lattice Basis Reduction Algorithms in Cryptography. – М.: , 2008. – 132 с.
  54. Joseph Menn. Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet. – М.: PublicAffairs, 2010. – 304 с.
  55. Kevin D. Mitnick. The Art of Intrusion. – М.: , 2005. – 270 с.
  56. Martin C. Brown. Hacking Google® Maps and Google® Earth. – М.: , 2006. – 408 с.
  57. Markus Jakobsson. Phishing and Countermeasures. – М.: , 2007. – 736 с.
  58. Colin Bentley. PRINCE2в„ў Revealed. – М.: , 2010. – 304 с.
  59. Joe Grand. Game Console Hacking. – М.: , 2010. – 512 с.
  60. Lee Barken. Wireless Hacking: Projects for Wi-Fi Enthusiasts. – М.: , 2010. – 416 с.
  61. Jay Beale. Hacking and Penetration Testing Ultimate CD. – М.: , 2010. – 1 с.
  62. Johnny Long. No Tech Hacking. – М.: , 2010. – 384 с.
  63. Russ Rogers. Hacking a Terror Network: The Silent Threat of Covert Channels. – М.: , 2010. – 448 с.
  64. Michael Gregg. Hack the Stack. – М.: , 2010. – 0 с.
  65. Chris Hurley. InfoSec Career Hacking: Sell Your Skillz, Not Your Soul. – М.: , 2010. – 448 с.
  66. Rob Kraus. Seven Deadliest Microsoft Attacks. – М.: , 2010. – 192 с.
  67. Mike Shema. Seven Deadliest Web Application Attacks. – М.: , 2010. – 192 с.
  68. Frank Thornton. Kismet Hacking. – М.: , 2010. – 272 с.
  69. Thomas Wilhelm. Ninja Hacking. – М.: , 2010. – 450 с.
  70. Jayson E Street. Dissecting the Hack: The F0rb1dd3n Network, Revised Edition. – М.: , 2010. – 360 с.
  71. Ken Dunham. Mobile Malware Attacks and Defense. – М.: , 2010. – 440 с.
  72. Syngress. Hack Proofing Linux. – М.: , 2010. – 512 с.
  73. Edward Amoroso. Cyber Attacks. – М.: , 2010. – 336 с.
  74. Seth Fogie. XSS Attacks. – М.: , 2010. – 480 с.
  75. Lisa K. Simone. If I Only Changed the Software, Why is the Phone on Fire?: Embedded Debugging Methods Revealed. – М.: , 2010. – 304 с.
  76. Joe Grand. Hardware Hacking. – М.: , 2010. – 448 с.
  77. Syngress. Hack Proofing Sun Solaris 8. – М.: , 2010. – 608 с.
  78. Syngress. Hack Proofing ColdFusion. – М.: , 2010. – 0 с.
  79. Syngress. Hack Proofing Your Network 2E. – М.: , 2010. – 704 с.
  80. Justin Clarke. SQL Injection Attacks and Defense. – М.: , 2010. – 496 с.
  81. Herbert Thomson. The Mezonic Agenda: Hacking the Presidency. – М.: , 2010. – 488 с.
  82. Syngress. Hack Proofing Your Identity In The Information Age. – М.: , 2010. – 512 с.
  83. Mark Kostich. Beyond Attack. – М.: , 2010. – 96 с.
  84. W Lowrie. Attack Upon Christendom (Paper). – М.: , 1992. – 304 с.
  85. Eric Faulkner. Home Hacking Projects for Geeks. – М.: , 2005. – 336 с.
  86. Richard Af Falkenrath. America?s Achilles? Heel – Nuclear, Biological & Chemical Terrorism & Convert Attack. – М.: , 1998. – 384 с.
  87. Damian Zynda. Archbishop Oscar Romero – A Disciple Who Revealed the Glory of God. – М.: , 2010. – 200 с.
  88. Gray. Angle of Attack. – М.: , 2007. – 304 с.
  89. Ephraim Kam. Surprise Attack – The Victim?s Perspective. – М.: , 2004. – 304 с.
  90. Danny Briere. Wireless Network Hacks & Mods For Dummies®. – М.: , 2005. – 360 с.
  91. Sara Miles. How to Hack a Party Line – The Democrats & Silicon Valley Updated edition. – М.: , 2002. – 270 с.
  92. Hf Pitkin. Attack of the Blob – Hannah Arendt?s Concept of the Social. – М.: , 2000. – 366 с.
  93. Gabriella Coleman. Coding Freedom – The Pleasures and Ethics of Hacking. – М.: , 2011. – 0 с.
  94. Ncta. The 9/11 Commission Report – The Attack from Planning to Aftermath – Shorter Edition. – М.: , 2011. – 0 с.
  95. David Vespremi. Car Hacks & Mods For Dummies®. – М.: , 2004. – 384 с.
  96. Tim Jordan. Hacking. – М.: , 2008. – 200 с.
  97. David Mcneill. Hand & Mind – What Gestures Reveal about Thought (Paper). – М.: , 1996. – 428 с.
  98. Auri Rahimzadeh. Hacking the PSPTM. – М.: , 2006. – 378 с.
  99. Chris Kohler. Retro Gaming Hacks. – М.: , 2005. – 502 с.
  100. Jono Bacon. Linux Desktop Hacks. – М.: , 2005. – 342 с.
  101. Herve This. Kitchen Mysteries – Revealing the Science of Cooking. – М.: , 2010. – 232 с.
  102. Nitesh Dhanjani. Hacking – The Next Generation. – М.: , 2009. – 296 с.
  103. Preston Gralla. Windows XP Hacks 2e. – М.: , 2005. – 600 с.
  104. Michael Juntao Yuan. Nokia Smartphone Hacks. – М.: , 2005. – 256 с.
  105. Danny O?brien. Life Hacks. – М.: , 2005. – 340 с.
  106. Nigel Mcfarlane. Firefox Hacks. – М.: , 2005. – 398 с.
  107. Joshua Paul. Digital Video Hacks. – М.: , 2005. – 426 с.
  108. Paul Bausch. Yahoo! Hacks. – М.: , 2005. – 488 с.
  109. Steve Fritz. Hidden Alcatraz – The Fortress Revealed. – М.: , 2011. – 120 с.
  110. Steve Fritz. Hidden Alcatraz – The Fortress Revealed. – М.: , 2011. – 120 с.
  111. Hadley Stern. iPod and iTunes Hacks. – М.: , 2004. – 456 с.
  112. Sam Palatnik. The King in Jeopardy – The Best Techniques for Attack & Defense Rev. – М.: , 1999. – 256 с.
  113. Nightwork: A History of Hacks and Pranks at MIT. – М.: The MIT Press, 2011. – 248 с.
  114. Shannon Sofield. PayPal Hacks. – М.: , 2004. – 368 с.
  115. James Avery. Visual Studio Hacks. – М.: , 2005. – 500 с.
  116. Ian Hacking. The Social Construction of What ?. – М.: , 1999. – 270 с.
  117. Ian Hacking. Rewriting the Soul – Multiple Personality & The Sciences of Memory (Paper). – М.: , 1998. – 346 с.
  118. Ian Hacking. Mad Travelers – Reflections on the Reality of Transient Mental Illnesses (COBE). – М.: , 2002. – 256 с.
  119. John Chirillo. Hack Attacks Encyclopedia. – М.: , 2001. – 960 с.
  120. John Chirillo. Hack Attacks Denied. – М.: , 2001. – 512 с.
  121. John Chirillo. Hack Attacks Revealed. – М.: , 2001. – 960 с.
  122. Ian Hacking. Historical Ontology. – М.: , 2002. – 320 с.
  123. John Chirillo. Hack Attacks Testing. – М.: , 2003. – 560 с.
  124. Ian Hacking. The Social Construction of What?. – М.: , 2000. – 272 с.
  125. Hacking Exposed Windows: Microsoft Windows Security Secrets And Solutions, Third Edition. – М.: , 2011. – 451 с.
  126. Hacking Exposed Web 2.0: Web 2.0 Security Secrets And Solutions. – М.: , 2011. – 258 с.
  127. Hacking Exposed Malware And Rootkits. – М.: , 2011. – 400 с.
  128. Aaron Philipp, David Cowen, Chris Davis. Hacking Exposed: Computer Forensics. – М.: McGraw-Hill, 2010. – 544 с.
  129. Gray Hat Hacking The Ethical Hackers Handbook, 3Rd Edition. – М.: , 2011. – 720 с.
  130. Johnny Cache, Joshua Wright, Vincent Liu. Hacking Exposed: Wireless. – М.: McGraw-Hill, 2010. – 512 с.
  131. Hacking Exposed Web Applications, 3Rd Edition. – М.: , 2011. – 482 с.
  132. David Endler, Mark Collier. Hacking Exposed VoIP: Voice Over Ip Security Secrets & Solutions. – М.: McGraw-Hill Osborne Media, 2006. – 574 с.
  133. Hacking Exposed Cisco Networks. – М.: , 2011. – 400 с.
  134. Hacking Exposed Linux. – М.: , 2011. – 813 с.
  135. Chris Prosise, Kevin Mandia, Matt Pepe. Incident Response & Computer Forensics. – М.: McGraw-Hill/Osborne, 2003. – 508 с.
  136. Ben Jackson, Champ Clark. Asterisk Hacking. – М.: , 2007. – 272 с.
  137. Jefferson Hack. Another Fashion Book. – М.: , 2009. – 272 с.
  138. Mohamed Abd El-Hack,Ali Askar and Khalid Mahrose. Heat stress alleviation in laying hens using antioxidants. – М.: LAP Lambert Academic Publishing, 2011. – 192 с.
  139. Saghar Estehghari. Impact of Client-side Vulnerabilities on Web-based E-voting Systems. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  140. Johnny Long. Google Hacking for Penetration Testers, Volume 2. – М.: Syngress, 2007. – 448 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

Ничего не найдено

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Александр
Лилия, благодарю за столь быстрое решение этого вопроса:) Буду ждать звонка... Если что, то сразу к вам:*)