Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Jose Nazario, Nazario. Defense and Detection Strategies against Internet Worms. – М.: , 0. – 0 с. Deniz Akkaya and Fabien Thalgott. Honeypots in Network Security. – М.: LAP Lambert Academic Publishing, 2012. – 64 с. Danish Jamil. Designing and Evaluating the honeypots using virtual machine. – М.: LAP Lambert Academic Publishing, 2012. – 164 с. Kamrul Hasan. An Investigation into Botnet Detection System. – М.: LAP Lambert Academic Publishing, 2013. – 120 с. Mohamed Nassar. Voice over IP Networks Monitoring. – М.: LAP Lambert Academic Publishing, 2009. – 172 с. Дополнительные результаты Mark Yarnell, Rene Reid Yarnell. Your First Year in Network Marketing: Overcome Your Fears, Experience Success, and Achieve Your Dreams!. – М.: Prima Lifestyles, 1998. – 304 с. Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с. Data Privacy Management and Autonomous Spontaneus Security: 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, ... Computer Science / Security and Cryptology). – М.: , 2012. – 334 с. Security and Privacy in Mobile Information and Communication Systems: Third International ICST Conference, MOBISEC 2011, Aalborg, Denmark, May 17-19, ... and Telecommunications Engineering). – М.: , 2012. – 195 с. Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – М.: , 2012. – 283 с. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с. Martin S. Feldstein, Horst Siebert. Social Security Pension Reform in Europe. – М.: , 0. – 0 с. Rattan Lal, David Hansen, Norman Uphoff, Steven Slack, Rattan Lal. Food Security and Environmental Quality in the Developing World. – М.: , 0. – 0 с. Leigh Wade. Careers in Private Security: How to Get Started, How to Get Ahead. – М.: , 0. – 0 с. Gilbert Paquette, M. David Merrill. Instructional Engineering in Networked Environments (Tech Training Series). – М.: , 0. – 0 с. Richard Poe. Wave Three: The New Era in Network Marketing. – М.: , 0. – 0 с. Mary Christensen, Wayne Christensen. Make Your First Million in Network Marketing: Proven Techniques You Can Use to Achieve Financial Success. – М.: , 0. – 0 с. Niels Ploug, Jon Kvist. Social Security in Europe: Development or Dismantlement? (Kluwer Sovac Series on Social Security, Vol 3). – М.: , 0. – 0 с. Roberta Bragg. MCSE Training Guide (70-220): Windows 2000 Network Security Design, Second Edition. – М.: , 0. – 0 с. Anna Nagurney, June Dong. Supernetworks: Decision-Making for the Information Age (New Dimensions in Networks). – М.: , 0. – 0 с. Michal Pioro, Deepankar Medhi. Routing, Flow, and Capacity Design in Communication and Computer Networks. – М.: Elsevier Digital Press, 0. – 794 с. Costas Courcoubetis. Pricing Communication Networks : Economics, Technology and Modelling (Wiley Interscience Series in Systems and Optimization). – М.: , 2003. – 0 с. Innovations in Financial and Economic Networks (New Dimensions in Networks). – М.: , 2003. – 0 с. Swords and Sustenance : The Economics of Security in Belarus and Ukraine (American Academy Studies in Global Security). – М.: , 2004. – 0 с. Florian Steiner. Formation and Early Growth of Business Webs : Modular Product Systems in Network Markets (Information Age Economy). – М.: , 2004. – 0 с. Peter R., MBA Ramsaroop. Securing Business Intelligence: Knowledge and CyberSecurity in the Post 9/11 World. – М.: , 2004. – 0 с. Aden Hogan. Infrastructure Security Planning in an Unstable World: : A Public Officials' Guide to Security. – М.: , 2005. – 0 с. Economics of Information Security (Advances in Information Security). – М.: , 2004. – 0 с. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с. Rickland Hollar. Enterprise Web Services Security (Internet Series). – М.: , 2005. – 432 с. Ron Ben Natan. Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase. – М.: , 2005. – 432 с. Joe Rubino, John Terhune. 15 Secrets Every Network Marketer Must Know: Essential Elements and Skills Required to Achieve 6- and 7-Figure Success in Network Marketing. – М.: Wiley, 2006. – 240 с. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с. Stephen G. Brooks. Producing Security: Multinational Corporations, Globalization, and the Changing Calculus of Conflict (Princeton Studies in International History and Politics). – М.: , 2005. – 336 с. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с. Patrick Traynor, Patrick McDaniel, Thomas La Porta. Security for Telecommunications Networks (Advances in Information Security). – М.: , 2008. – 182 с. Network Security. – М.: , 2008. – 370 с. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с. Jonathan Street. The Secrets to Succeeding in Network Marketing Offline and Online: How to Achieve Financial Success Selling Network Marketing Products & Services. – М.: , 2008. – 288 с. Daniel Clark. Network Access Control 100 Success Secrets - 100 Most Asked NAC Questions on Implementation and Deployment of unify endpoint security technology, user ... and network security enforcement. – М.: , 2008. – 180 с. Hamid R. Nemati. Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues (Advances in Information Security and Privacy). – М.: , 2009. – 414 с. Bel G. Raggad. Information Security Management: Concepts and Practice. – М.: , 2010. – 871 с. Brently Clemantin. How To Make Money With Network Marketing, Build Huge Downlines, And Succeed In MLM Simply & Easily!: Network Marketing & MLM Secrets You Can Use To Quit ... Living The Life You Deserve! (Volume 1). – М.: , 2010. – 106 с. Jeff Crume. Inside Internet Security: What Hackers Don't Want You To Know. – М.: , 0. – 0 с. Panos Pardalos, Don Grundel, Robert Murphey, Oleg Prokopyev. Cooperative Networks: Control and Optimization (New Dimensions in Networks Series). – М.: , 2008. – 384 с. Global Perspectives In Information Security. – М.: , 2008. – 896 с. Bill Ferguson. CompTIA Network+ Review Guide. – М.: , 2009. – 264 с. Rob Cameron. Juniper(r) Networks Secure Access SSL VPN Configuration Guide. – М.: , 2010. – 656 с. Owen Poole. Network Security. – М.: , 2010. – 224 с. James Joshi. Network Security: Know It All. – М.: , 2010. – 368 с. Steve Manzuik. Network Security Assessment: From Vulnerability to Patch. – М.: , 2010. – 500 с. Jan L. Harrington. Network Security. – М.: , 2010. – 384 с. Russ Rogers. Network Security Evaluation Using the NSA IEM. – М.: , 2010. – 450 с. Brien Posey. GFI Network Security and PCI Compliance Power Tools. – М.: , 2010. – 488 с. Lou Sepulveda. Surviving in the Security Alarm Business. – М.: , 2010. – 256 с. Syngress. Managing Cisco Network Security 2E. – М.: , 2010. – 752 с. Bill English. MCSA/MCSE: Windows® 2000 Network Security Administration Study Guide. – М.: , 2003. – 574 с. Russ Kaufman. MCSA/MCSE: Windows® Server 2003 Network Security Administration Study Guide. – М.: , 2004. – 560 с. Nitesh Dhanjani. Network Security Tools. – М.: , 2005. – 340 с. Thomas W. Madron. Network Security in the 90?s. – М.: , 1992. – 304 с. Microsoft. MCSE Training Kit (Exam 70–220) – Designing Microsoft Windows 2000 Network Security. – М.: , 2001. – 864 с. Andrew Lockhart. Network Security Hacks. – М.: , 2004. – 316 с. DAN. Network Security In A Mixed Environment. – М.: , 1998. – 456 с. Jiannong Cao. Mobile Agents in Networking and Distributed Computing. – М.: , 2012. – 450 с. Roderick. Finding Jobs in the Securities Industry: In Manage ment Consulting, Investment Banking, and Securitie s Trading. – М.: , 2000. – 256 с. Matthew Strebe. Network Security JumpStartTM. – М.: , 2002. – 384 с. David Joselit. States of Form – The Object in Networks. – М.: , 2012. – 0 с. Pawan K Bhardwaj. A+. Network+, Security+ Exams in a Nutshell. – М.: , 2007. – 812 с. Eric Cole. Network Security Bible. – М.: , 2005. – 694 с. Lr Ford. Flows in Networks. – М.: , 2010. – 208 с. Richard S. Dale. Risk and Regulation in Global Securities Markets. – М.: , 1996. – 352 с. Eric Cole. Wiley Pathways Network Security Fundamentals Project Manual. – М.: , 2008. – 312 с. Andrew Lockhart. Network Security Hacks 2e. – М.: , 2006. – 352 с. Chris Mcnab. Network Security Assessment 2e. – М.: , 2007. – 464 с. Cryptography & Network Security. – М.: , 2007. – 0 с. Securing Global Transportation Networks. – М.: , 2011. – 312 с. Shon Harris. CISSP All-in-One Exam Guide (+ CD-ROM). – М.: McGraw-Hill Companies, 2010. – 1216 с. Comptia Security+ All-In-One Exam Guide, Second Edition (Exam Sy0-201). – М.: , 2011. – 0 с. Wireless Network Security A Beginners Guide. – М.: , 2011. – 400 с. Networking, A Beginner'S Guide, Fifth Edition. – М.: , 2011. – 448 с. Principles Of Computer Security Comptia Security+ And Beyond Lab Manual, Second Edition. – М.: , 2011. – 352 с. Network Security: The Complete Reference. – М.: , 2011. – 896 с. Fundamentals Of Network Security. – М.: , 2011. – 672 с. Samir Nanavati, Michael Thieme, Raj Nanavati. Biometrics: Identity Verification in a Networked World. – М.: Wiley, 2002. – 320 с. Greg Holden. Guide to Firewalls and Network Security: Intrusion Detection and VPNs. – М.: Course Technology, 2003. – 512 с. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . – с. James D. McCabe. Network Analysis, Architecture, and Design, Third Edition (The Morgan Kaufmann Series in Networking). – М.: , 2007. – 496 с. Dave Tyson. Security Convergence: Managing Enterprise Security Risk. – М.: , 2007. – 232 с. Michael Gregg, Eric Seagren, Angela Orebaugh, Matt Jonkman, Raffael Marty. How to Cheat at Configuring Open Source Security Tools (How to Cheat) (How to Cheat). – М.: , 2007. – 528 с. Adrian Farrel, Igor Bryskin. GMPLS: Architecture and Applications (The Morgan Kaufmann Series in Networking). – М.: , 2005. – 400 с. Pei Zheng, Lionel Ni. Smart Phone and Next Generation Mobile Computing (Morgan Kaufmann Series in Networking (Paperback)). – М.: , 2005. – 350 с. Susan Snedaker. Syngress IT Security Project Management Handbook. – М.: Syngress, 2006. – 612 с. Yi Qian, James Joshi, David Tipper, Prashant Krishnamurthy. Information Assurance: Dependability and Security in Networked Systems. – М.: Morgan Kaufmann, 2007. – 576 с. Ido Dubrawsky. How to Cheat at Securing Your Network. – М.: Syngress, 2007. – 432 с. XiPeng Xiao. Technical, Commercial and Regulatory Challenges of QoS: An Internet Service Model Perspective (The Morgan Kaufmann Series in Networking). – М.: , 2008. – 296 с. Anup Bhange and Manmeet Kaur Marhas. Anomaly Detection in Network Traffic; A Statistical Approach. – М.: LAP Lambert Academic Publishing, 2012. – 92 с. Shaek Rana Mohammad Baki Billah and Mohammad Hafizur Rahman. Design & Development of Network Security System using IP Tables. – М.: LAP Lambert Academic Publishing, 2013. – 164 с. Asrani Hj Lit. Network Partitioning & IP Placement in Network-on-Chip (NoC). – М.: LAP Lambert Academic Publishing, 2012. – 68 с. Nurbaizura Ramji and Asrani Lit. Performance Optimization in Network-on-Chip (NoC) Architecture. – М.: LAP Lambert Academic Publishing, 2014. – 88 с. Kulvir Kaur. Shortest path routing problem in networks and optimization algorithms. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Xiangqian Chen. DEFENSE AGAINST NODE COMPROMISE IN SENSOR NETWORK SECURITY. – М.: LAP Lambert Academic Publishing, 2009. – 108 с. M. Sadiq Ali Khan and S. M. Aqil Burney. Recent Trends in Intrusion Detection System & Network Monitoring. – М.: LAP Lambert Academic Publishing, 2012. – 120 с. Messay Mulugeta. Resettlement and food security nexus in ETHIOPIA. – М.: LAP Lambert Academic Publishing, 2012. – 352 с. Olukemi Asemota. HIV/AIDS MANAGEMENT IN THE WORKPLACE: FOCUS ON SECURITY FORCES. – М.: LAP Lambert Academic Publishing, 2010. – 240 с. Kamalika Hajra (Basu). Space Time Dependent Phenomena in Networks. – М.: LAP Lambert Academic Publishing, 2010. – 132 с. Anne Aswani. The role of home gardening in household food security. – М.: LAP Lambert Academic Publishing, 2012. – 104 с. Philip Attuquayefio. Human Security in the Post-Conflict Development of Liberia. – М.: LAP Lambert Academic Publishing, 2013. – 128 с. Joseph Adero Ngala. Globalization and Peace Security in Africa. – М.: LAP Lambert Academic Publishing, 2010. – 320 с. Kwang Ho Chun. Democratic Peace Building and Security in East Asia. – М.: LAP Lambert Academic Publishing, 2011. – 288 с. Dessalegn Workineh. The post 1991 Resettlement in food security Lens in Ethiopia. – М.: LAP Lambert Academic Publishing, 2011. – 100 с. Ankur Gupta and Bhupendra Gupta. Random Networks and its Applications. – М.: LAP Lambert Academic Publishing, 2013. – 100 с. Franck Kalala Mutombo. Long Range Interactions in Complex Networks. – М.: Scholars' Press, 2013. – 264 с. Alexei Vazquez. Degree correlations and clustering hierarchy in networks. – М.: LAP Lambert Academic Publishing, 2011. – 140 с. Xiaodong He. Automated intrusion prevention mechanism in enhancing network security. – М.: Scholars' Press, 2014. – 128 с. Elliot Attipoe. Securing the Public Wireless Network. – М.: LAP Lambert Academic Publishing, 2013. – 92 с. Ramandeep Kaur. Packet dropping attack in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2014. – 52 с. Sushant Sudhakar Bahekar and Prashant Panse. Energy Efficient Mechanism for Detection of Wormhole Attacks. – М.: LAP Lambert Academic Publishing, 2014. – 72 с. Mohammad AlAhmad. Security threats of finger print biometric in network system. – М.: LAP Lambert Academic Publishing, 2014. – 88 с. Nirbhay Chaubey. Securing AODV Routing Protocol in design of Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2015. – 132 с. Aditya Kumar. Cryptography and Chaos a New Approach in Network Security. – М.: LAP Lambert Academic Publishing, 2015. – 80 с. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с. Marimuthu Kanagaraj and Eswari Venkatachalam. Multifactor Authentication Protocol for a Secured WSN. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Gurpreet juneja. Security:MPLS VPN Network. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Omid Mahdi Ebadati E.,Harleen Kaur M. Afshar Alam and Kaebeh Yaeghoobi. Micro-Firewalls for Dynamic Network Security Framework. – М.: LAP Lambert Academic Publishing, 2012. – 292 с. Wisam Elmasry. Securing WBAODV Routing Protocol in MANETs. – М.: LAP Lambert Academic Publishing, 2013. – 100 с. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с. Vincent Omollo. Enhanced Network Security. – М.: LAP Lambert Academic Publishing, 2013. – 76 с. Firkhan Ali Hamid Ali. Vulnerability Analysis on the Computer Network Security. – М.: LAP Lambert Academic Publishing, 2010. – 72 с. Sunil Kumar Senapati and Prof. Pabitra Mohan Khilar. SECURING FSR PROTOCOL AGAINST DATA PACKET DROPPING IN MANET. – М.: LAP Lambert Academic Publishing, 2010. – 64 с. Imran Sohail and Sikandar Hayat. Network Security and DDoS. – М.: LAP Lambert Academic Publishing, 2010. – 64 с. Christian Chetachi Umunna. Distributed Intrusion Detection System in Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 104 с. ANNADURAI P and Dr. V. PALANISAMY. Impact of Black Hole Attack on Multicast in Ad hoc Network (IBAMA). – М.: LAP Lambert Academic Publishing, 2011. – 84 с. Deniz Akkaya and Fabien Thalgott. Honeypots in Network Security. – М.: LAP Lambert Academic Publishing, 2012. – 64 с. Mohammad Faisal. Networks Security and Communication. – М.: LAP Lambert Academic Publishing, 2012. – 56 с. Rajit Nair and Preeti Sharma Nair. Encryption Approach for Maximizing Avalanche Effect for Cryptography. – М.: LAP Lambert Academic Publishing, 2013. – 68 с. Tanveer Zia. A Security Framework for Wireless Sensor Networks (WSN). – М.: LAP Lambert Academic Publishing, 2013. – 160 с. Dirk Lessner. Network Security for Embedded Systems. – М.: LAP Lambert Academic Publishing, 2009. – 232 с. Stephen Murove,S. B. Mangena and B. Jones. Firewall Evaluation:Models for Major Decisions in Computer Security. – М.: LAP Lambert Academic Publishing, 2014. – 236 с. Mohamed Nassar. Voice over IP Networks Monitoring. – М.: LAP Lambert Academic Publishing, 2009. – 172 с. Nathan Darmawan. Shielding Your Company with a Better Network Security Design. – М.: LAP Lambert Academic Publishing, 2010. – 180 с. Faeiz Alserhani,Irfan Awan and Monis Akhlaq. Correlation and Aggregation of Security Alerts in Networks. – М.: LAP Lambert Academic Publishing, 2012. – 256 с. Palanivel Kodeswaran. On the Use of Context and Policies in Declarative Networked Systems. – М.: LAP Lambert Academic Publishing, 2012. – 112 с. Mark Yarnell. Your First Year in Network Marketing. – М.: , 2015. – 304 с. Лучшие результаты Ничего не найдено Дополнительные результаты Наука человековедения. интервью с Д. Уолтоном, профессором London Metropolitan University, экспертом CIPD. Chartered Institute of Personnel and Development, автором программы Master of Arts in Human Resource Strategies. И. Смирнова, "Кадровый менеджмент", № 5, июль-август 2007. Trade-in как способ обмена автомобиля. С.Н. Гордеева, "Торговля: бухгалтерский учет и налогообложение", N 2, февраль 2011 г. Проблемы применения универсальной юрисдикции in absentia. Г.А. Королев, "Журнал российского права", № 10, октябрь 2009. Тонкости trade-in. С.А.Королев, "НДС. Проблемы и решения", № 8, август 2009. Основной арсенал "охотника" - его network: кого он знает на рынке и качество этих отношений. С. Плетнева, "Управление персоналом", № 12, июнь 2009. In-store banking - новая модель банковского бизнеса. А. Пятков, "Банковское обозрение", № 11, ноябрь 2008. Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Светка, 19.02 Диплом защитила на отл! Спасибо Вам, Марина Михайловна, огромное! :)