Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Jose Nazario, Nazario. Defense and Detection Strategies against Internet Worms. – М.: , 0. – 0 с.
  2. Deniz Akkaya and Fabien Thalgott. Honeypots in Network Security. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  3. Danish Jamil. Designing and Evaluating the honeypots using virtual machine. – М.: LAP Lambert Academic Publishing, 2012. – 164 с.
  4. Kamrul Hasan. An Investigation into Botnet Detection System. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  5. Mohamed Nassar. Voice over IP Networks Monitoring. – М.: LAP Lambert Academic Publishing, 2009. – 172 с.

Дополнительные результаты

  1. Mark Yarnell, Rene Reid Yarnell. Your First Year in Network Marketing: Overcome Your Fears, Experience Success, and Achieve Your Dreams!. – М.: Prima Lifestyles, 1998. – 304 с.
  2. Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с.
  3. Data Privacy Management and Autonomous Spontaneus Security: 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, ... Computer Science / Security and Cryptology). – М.: , 2012. – 334 с.
  4. Security and Privacy in Mobile Information and Communication Systems: Third International ICST Conference, MOBISEC 2011, Aalborg, Denmark, May 17-19, ... and Telecommunications Engineering). – М.: , 2012. – 195 с.
  5. Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  6. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с.
  7. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с.
  8. Martin S. Feldstein, Horst Siebert. Social Security Pension Reform in Europe. – М.: , 0. – 0 с.
  9. Rattan Lal, David Hansen, Norman Uphoff, Steven Slack, Rattan Lal. Food Security and Environmental Quality in the Developing World. – М.: , 0. – 0 с.
  10. Leigh Wade. Careers in Private Security: How to Get Started, How to Get Ahead. – М.: , 0. – 0 с.
  11. Gilbert Paquette, M. David Merrill. Instructional Engineering in Networked Environments (Tech Training Series). – М.: , 0. – 0 с.
  12. Richard Poe. Wave Three: The New Era in Network Marketing. – М.: , 0. – 0 с.
  13. Mary Christensen, Wayne Christensen. Make Your First Million in Network Marketing: Proven Techniques You Can Use to Achieve Financial Success. – М.: , 0. – 0 с.
  14. Niels Ploug, Jon Kvist. Social Security in Europe: Development or Dismantlement? (Kluwer Sovac Series on Social Security, Vol 3). – М.: , 0. – 0 с.
  15. Roberta Bragg. MCSE Training Guide (70-220): Windows 2000 Network Security Design, Second Edition. – М.: , 0. – 0 с.
  16. Anna Nagurney, June Dong. Supernetworks: Decision-Making for the Information Age (New Dimensions in Networks). – М.: , 0. – 0 с.
  17. Michal Pioro, Deepankar Medhi. Routing, Flow, and Capacity Design in Communication and Computer Networks. – М.: Elsevier Digital Press, 0. – 794 с.
  18. Costas Courcoubetis. Pricing Communication Networks : Economics, Technology and Modelling (Wiley Interscience Series in Systems and Optimization). – М.: , 2003. – 0 с.
  19. Innovations in Financial and Economic Networks (New Dimensions in Networks). – М.: , 2003. – 0 с.
  20. Swords and Sustenance : The Economics of Security in Belarus and Ukraine (American Academy Studies in Global Security). – М.: , 2004. – 0 с.
  21. Florian Steiner. Formation and Early Growth of Business Webs : Modular Product Systems in Network Markets (Information Age Economy). – М.: , 2004. – 0 с.
  22. Peter R., MBA Ramsaroop. Securing Business Intelligence: Knowledge and CyberSecurity in the Post 9/11 World. – М.: , 2004. – 0 с.
  23. Aden Hogan. Infrastructure Security Planning in an Unstable World: : A Public Officials' Guide to Security. – М.: , 2005. – 0 с.
  24. Economics of Information Security (Advances in Information Security). – М.: , 2004. – 0 с.
  25. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с.
  26. Rickland Hollar. Enterprise Web Services Security (Internet Series). – М.: , 2005. – 432 с.
  27. Ron Ben Natan. Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase. – М.: , 2005. – 432 с.
  28. Joe Rubino, John Terhune. 15 Secrets Every Network Marketer Must Know: Essential Elements and Skills Required to Achieve 6- and 7-Figure Success in Network Marketing. – М.: Wiley, 2006. – 240 с.
  29. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с.
  30. Stephen G. Brooks. Producing Security: Multinational Corporations, Globalization, and the Changing Calculus of Conflict (Princeton Studies in International History and Politics). – М.: , 2005. – 336 с.
  31. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с.
  32. Patrick Traynor, Patrick McDaniel, Thomas La Porta. Security for Telecommunications Networks (Advances in Information Security). – М.: , 2008. – 182 с.
  33. Network Security. – М.: , 2008. – 370 с.
  34. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с.
  35. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с.
  36. Jonathan Street. The Secrets to Succeeding in Network Marketing Offline and Online: How to Achieve Financial Success Selling Network Marketing Products & Services. – М.: , 2008. – 288 с.
  37. Daniel Clark. Network Access Control 100 Success Secrets - 100 Most Asked NAC Questions on Implementation and Deployment of unify endpoint security technology, user ... and network security enforcement. – М.: , 2008. – 180 с.
  38. Hamid R. Nemati. Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues (Advances in Information Security and Privacy). – М.: , 2009. – 414 с.
  39. Bel G. Raggad. Information Security Management: Concepts and Practice. – М.: , 2010. – 871 с.
  40. Brently Clemantin. How To Make Money With Network Marketing, Build Huge Downlines, And Succeed In MLM Simply & Easily!: Network Marketing & MLM Secrets You Can Use To Quit ... Living The Life You Deserve! (Volume 1). – М.: , 2010. – 106 с.
  41. Jeff Crume. Inside Internet Security: What Hackers Don't Want You To Know. – М.: , 0. – 0 с.
  42. Panos Pardalos, Don Grundel, Robert Murphey, Oleg Prokopyev. Cooperative Networks: Control and Optimization (New Dimensions in Networks Series). – М.: , 2008. – 384 с.
  43. Global Perspectives In Information Security. – М.: , 2008. – 896 с.
  44. Bill Ferguson. CompTIA Network+ Review Guide. – М.: , 2009. – 264 с.
  45. Rob Cameron. Juniper(r) Networks Secure Access SSL VPN Configuration Guide. – М.: , 2010. – 656 с.
  46. Owen Poole. Network Security. – М.: , 2010. – 224 с.
  47. James Joshi. Network Security: Know It All. – М.: , 2010. – 368 с.
  48. Steve Manzuik. Network Security Assessment: From Vulnerability to Patch. – М.: , 2010. – 500 с.
  49. Jan L. Harrington. Network Security. – М.: , 2010. – 384 с.
  50. Russ Rogers. Network Security Evaluation Using the NSA IEM. – М.: , 2010. – 450 с.
  51. Brien Posey. GFI Network Security and PCI Compliance Power Tools. – М.: , 2010. – 488 с.
  52. Lou Sepulveda. Surviving in the Security Alarm Business. – М.: , 2010. – 256 с.
  53. Syngress. Managing Cisco Network Security 2E. – М.: , 2010. – 752 с.
  54. Bill English. MCSA/MCSE: Windows® 2000 Network Security Administration Study Guide. – М.: , 2003. – 574 с.
  55. Russ Kaufman. MCSA/MCSE: Windows® Server 2003 Network Security Administration Study Guide. – М.: , 2004. – 560 с.
  56. Nitesh Dhanjani. Network Security Tools. – М.: , 2005. – 340 с.
  57. Thomas W. Madron. Network Security in the 90?s. – М.: , 1992. – 304 с.
  58. Microsoft. MCSE Training Kit (Exam 70–220) – Designing Microsoft Windows 2000 Network Security. – М.: , 2001. – 864 с.
  59. Andrew Lockhart. Network Security Hacks. – М.: , 2004. – 316 с.
  60. DAN. Network Security In A Mixed Environment. – М.: , 1998. – 456 с.
  61. Jiannong Cao. Mobile Agents in Networking and Distributed Computing. – М.: , 2012. – 450 с.
  62. Roderick. Finding Jobs in the Securities Industry: In Manage ment Consulting, Investment Banking, and Securitie s Trading. – М.: , 2000. – 256 с.
  63. Matthew Strebe. Network Security JumpStartTM. – М.: , 2002. – 384 с.
  64. David Joselit. States of Form – The Object in Networks. – М.: , 2012. – 0 с.
  65. Pawan K Bhardwaj. A+. Network+, Security+ Exams in a Nutshell. – М.: , 2007. – 812 с.
  66. Eric Cole. Network Security Bible. – М.: , 2005. – 694 с.
  67. Lr Ford. Flows in Networks. – М.: , 2010. – 208 с.
  68. Richard S. Dale. Risk and Regulation in Global Securities Markets. – М.: , 1996. – 352 с.
  69. Eric Cole. Wiley Pathways Network Security Fundamentals Project Manual. – М.: , 2008. – 312 с.
  70. Andrew Lockhart. Network Security Hacks 2e. – М.: , 2006. – 352 с.
  71. Chris Mcnab. Network Security Assessment 2e. – М.: , 2007. – 464 с.
  72. Cryptography & Network Security. – М.: , 2007. – 0 с.
  73. Securing Global Transportation Networks. – М.: , 2011. – 312 с.
  74. Shon Harris. CISSP All-in-One Exam Guide (+ CD-ROM). – М.: McGraw-Hill Companies, 2010. – 1216 с.
  75. Comptia Security+ All-In-One Exam Guide, Second Edition (Exam Sy0-201). – М.: , 2011. – 0 с.
  76. Wireless Network Security A Beginners Guide. – М.: , 2011. – 400 с.
  77. Networking, A Beginner'S Guide, Fifth Edition. – М.: , 2011. – 448 с.
  78. Principles Of Computer Security Comptia Security+ And Beyond Lab Manual, Second Edition. – М.: , 2011. – 352 с.
  79. Network Security: The Complete Reference. – М.: , 2011. – 896 с.
  80. Fundamentals Of Network Security. – М.: , 2011. – 672 с.
  81. Samir Nanavati, Michael Thieme, Raj Nanavati. Biometrics: Identity Verification in a Networked World. – М.: Wiley, 2002. – 320 с.
  82. Greg Holden. Guide to Firewalls and Network Security: Intrusion Detection and VPNs. – М.: Course Technology, 2003. – 512 с.
  83. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . –  с.
  84. James D. McCabe. Network Analysis, Architecture, and Design, Third Edition (The Morgan Kaufmann Series in Networking). – М.: , 2007. – 496 с.
  85. Dave Tyson. Security Convergence: Managing Enterprise Security Risk. – М.: , 2007. – 232 с.
  86. Michael Gregg, Eric Seagren, Angela Orebaugh, Matt Jonkman, Raffael Marty. How to Cheat at Configuring Open Source Security Tools (How to Cheat) (How to Cheat). – М.: , 2007. – 528 с.
  87. Adrian Farrel, Igor Bryskin. GMPLS: Architecture and Applications (The Morgan Kaufmann Series in Networking). – М.: , 2005. – 400 с.
  88. Pei Zheng, Lionel Ni. Smart Phone and Next Generation Mobile Computing (Morgan Kaufmann Series in Networking (Paperback)). – М.: , 2005. – 350 с.
  89. Susan Snedaker. Syngress IT Security Project Management Handbook. – М.: Syngress, 2006. – 612 с.
  90. Yi Qian, James Joshi, David Tipper, Prashant Krishnamurthy. Information Assurance: Dependability and Security in Networked Systems. – М.: Morgan Kaufmann, 2007. – 576 с.
  91. Ido Dubrawsky. How to Cheat at Securing Your Network. – М.: Syngress, 2007. – 432 с.
  92. XiPeng Xiao. Technical, Commercial and Regulatory Challenges of QoS: An Internet Service Model Perspective (The Morgan Kaufmann Series in Networking). – М.: , 2008. – 296 с.
  93. Anup Bhange and Manmeet Kaur Marhas. Anomaly Detection in Network Traffic; A Statistical Approach. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  94. Shaek Rana Mohammad Baki Billah and Mohammad Hafizur Rahman. Design & Development of Network Security System using IP Tables. – М.: LAP Lambert Academic Publishing, 2013. – 164 с.
  95. Asrani Hj Lit. Network Partitioning & IP Placement in Network-on-Chip (NoC). – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  96. Nurbaizura Ramji and Asrani Lit. Performance Optimization in Network-on-Chip (NoC) Architecture. – М.: LAP Lambert Academic Publishing, 2014. – 88 с.
  97. Kulvir Kaur. Shortest path routing problem in networks and optimization algorithms. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  98. Xiangqian Chen. DEFENSE AGAINST NODE COMPROMISE IN SENSOR NETWORK SECURITY. – М.: LAP Lambert Academic Publishing, 2009. – 108 с.
  99. M. Sadiq Ali Khan and S. M. Aqil Burney. Recent Trends in Intrusion Detection System & Network Monitoring. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  100. Messay Mulugeta. Resettlement and food security nexus in ETHIOPIA. – М.: LAP Lambert Academic Publishing, 2012. – 352 с.
  101. Olukemi Asemota. HIV/AIDS MANAGEMENT IN THE WORKPLACE: FOCUS ON SECURITY FORCES. – М.: LAP Lambert Academic Publishing, 2010. – 240 с.
  102. Kamalika Hajra (Basu). Space Time Dependent Phenomena in Networks. – М.: LAP Lambert Academic Publishing, 2010. – 132 с.
  103. Anne Aswani. The role of home gardening in household food security. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  104. Philip Attuquayefio. Human Security in the Post-Conflict Development of Liberia. – М.: LAP Lambert Academic Publishing, 2013. – 128 с.
  105. Joseph Adero Ngala. Globalization and Peace Security in Africa. – М.: LAP Lambert Academic Publishing, 2010. – 320 с.
  106. Kwang Ho Chun. Democratic Peace Building and Security in East Asia. – М.: LAP Lambert Academic Publishing, 2011. – 288 с.
  107. Dessalegn Workineh. The post 1991 Resettlement in food security Lens in Ethiopia. – М.: LAP Lambert Academic Publishing, 2011. – 100 с.
  108. Ankur Gupta and Bhupendra Gupta. Random Networks and its Applications. – М.: LAP Lambert Academic Publishing, 2013. – 100 с.
  109. Franck Kalala Mutombo. Long Range Interactions in Complex Networks. – М.: Scholars' Press, 2013. – 264 с.
  110. Alexei Vazquez. Degree correlations and clustering hierarchy in networks. – М.: LAP Lambert Academic Publishing, 2011. – 140 с.
  111. Xiaodong He. Automated intrusion prevention mechanism in enhancing network security. – М.: Scholars' Press, 2014. – 128 с.
  112. Elliot Attipoe. Securing the Public Wireless Network. – М.: LAP Lambert Academic Publishing, 2013. – 92 с.
  113. Ramandeep Kaur. Packet dropping attack in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2014. – 52 с.
  114. Sushant Sudhakar Bahekar and Prashant Panse. Energy Efficient Mechanism for Detection of Wormhole Attacks. – М.: LAP Lambert Academic Publishing, 2014. – 72 с.
  115. Mohammad AlAhmad. Security threats of finger print biometric in network system. – М.: LAP Lambert Academic Publishing, 2014. – 88 с.
  116. Nirbhay Chaubey. Securing AODV Routing Protocol in design of Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2015. – 132 с.
  117. Aditya Kumar. Cryptography and Chaos a New Approach in Network Security. – М.: LAP Lambert Academic Publishing, 2015. – 80 с.
  118. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  119. Marimuthu Kanagaraj and Eswari Venkatachalam. Multifactor Authentication Protocol for a Secured WSN. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  120. Gurpreet juneja. Security:MPLS VPN Network. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  121. Omid Mahdi Ebadati E.,Harleen Kaur M. Afshar Alam and Kaebeh Yaeghoobi. Micro-Firewalls for Dynamic Network Security Framework. – М.: LAP Lambert Academic Publishing, 2012. – 292 с.
  122. Wisam Elmasry. Securing WBAODV Routing Protocol in MANETs. – М.: LAP Lambert Academic Publishing, 2013. – 100 с.
  123. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  124. Vincent Omollo. Enhanced Network Security. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  125. Firkhan Ali Hamid Ali. Vulnerability Analysis on the Computer Network Security. – М.: LAP Lambert Academic Publishing, 2010. – 72 с.
  126. Sunil Kumar Senapati and Prof. Pabitra Mohan Khilar. SECURING FSR PROTOCOL AGAINST DATA PACKET DROPPING IN MANET. – М.: LAP Lambert Academic Publishing, 2010. – 64 с.
  127. Imran Sohail and Sikandar Hayat. Network Security and DDoS. – М.: LAP Lambert Academic Publishing, 2010. – 64 с.
  128. Christian Chetachi Umunna. Distributed Intrusion Detection System in Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 104 с.
  129. ANNADURAI P and Dr. V. PALANISAMY. Impact of Black Hole Attack on Multicast in Ad hoc Network (IBAMA). – М.: LAP Lambert Academic Publishing, 2011. – 84 с.
  130. Deniz Akkaya and Fabien Thalgott. Honeypots in Network Security. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  131. Mohammad Faisal. Networks Security and Communication. – М.: LAP Lambert Academic Publishing, 2012. – 56 с.
  132. Rajit Nair and Preeti Sharma Nair. Encryption Approach for Maximizing Avalanche Effect for Cryptography. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  133. Tanveer Zia. A Security Framework for Wireless Sensor Networks (WSN). – М.: LAP Lambert Academic Publishing, 2013. – 160 с.
  134. Dirk Lessner. Network Security for Embedded Systems. – М.: LAP Lambert Academic Publishing, 2009. – 232 с.
  135. Stephen Murove,S. B. Mangena and B. Jones. Firewall Evaluation:Models for Major Decisions in Computer Security. – М.: LAP Lambert Academic Publishing, 2014. – 236 с.
  136. Mohamed Nassar. Voice over IP Networks Monitoring. – М.: LAP Lambert Academic Publishing, 2009. – 172 с.
  137. Nathan Darmawan. Shielding Your Company with a Better Network Security Design. – М.: LAP Lambert Academic Publishing, 2010. – 180 с.
  138. Faeiz Alserhani,Irfan Awan and Monis Akhlaq. Correlation and Aggregation of Security Alerts in Networks. – М.: LAP Lambert Academic Publishing, 2012. – 256 с.
  139. Palanivel Kodeswaran. On the Use of Context and Policies in Declarative Networked Systems. – М.: LAP Lambert Academic Publishing, 2012. – 112 с.
  140. Mark Yarnell. Your First Year in Network Marketing. – М.: , 2015. – 304 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Наука человековедения. интервью с Д. Уолтоном, профессором London Metropolitan University, экспертом CIPD. Chartered Institute of Personnel and Development, автором программы Master of Arts in Human Resource Strategies. И. Смирнова, "Кадровый менеджмент", № 5, июль-август 2007.
  2. Trade-in как способ обмена автомобиля. С.Н. Гордеева, "Торговля: бухгалтерский учет и налогообложение", N 2, февраль 2011 г.
  3. Проблемы применения универсальной юрисдикции in absentia. Г.А. Королев, "Журнал российского права", № 10, октябрь 2009.
  4. Тонкости trade-in. С.А.Королев, "НДС. Проблемы и решения", № 8, август 2009.
  5. Основной арсенал "охотника" - его network: кого он знает на рынке и качество этих отношений. С. Плетнева, "Управление персоналом", № 12, июнь 2009.
  6. In-store banking - новая модель банковского бизнеса. А. Пятков, "Банковское обозрение", № 11, ноябрь 2008.

Образцы работ

Тема и предметТип и объем работы
Последствия операции НАТО
Политология
Диплом
80 стр.
Понятие и история брендинга. Анализ создания и стратегия продвижения бренда ***
Электроснабжение городов и промышленных предприятий
Другое
72 стр.
Математические модели океанических течений
Переводоведение (теория перевода)
Курсовая работа
42 стр.
Комплекс маркетинговых коммуникаций в продвижении цифровых СМИ
Маркетинг
Диплом
74 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Светка, 19.02
Диплом защитила на отл! Спасибо Вам, Марина Михайловна, огромное! :)