Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Ronald Hall. Biometrics 100 Most asked Questions on Physiological (face, fingerprint, hand, iris, DNA) and Behavioral (keystroke, signature, voice) Biometrics Technologies, ... Implementation and Performance evaluation. – М.: , 2008. – 176 с. John Chirillo. Implementing Biometric Security. – М.: , 2003. – 432 с. Comptia Security+ All-In-One Exam Guide, Second Edition (Exam Sy0-201). – М.: , 2011. – 0 с. Samir Nanavati, Michael Thieme, Raj Nanavati. Biometrics: Identity Verification in a Networked World. – М.: Wiley, 2002. – 320 с. Papri Ghosh and Ritam Dutta. Adaptive Approach towards Biometric Authentication System. – М.: LAP Lambert Academic Publishing, 2012. – 88 с. Satyendra Singh Thakur and Dr. Manish Manoria. Secure Cryptosystem for Biometric Information using RSA. – М.: LAP Lambert Academic Publishing, 2011. – 92 с. GAURAV SHARMA. Implementation and analysis of DES algorithm. – М.: LAP Lambert Academic Publishing, 2014. – 76 с. Sofana Alfuhaid,Salha Abdullah and Norah Alshahrani. Class Attendance System Using Fingerprint Technique. – М.: LAP Lambert Academic Publishing, 2013. – 204 с. Kumar Rakesh,Subhangi Dutta and Kumara Shama. Handbook on Implementing Gender Recognition. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Mohammad AlAhmad. Security threats of finger print biometric in network system. – М.: LAP Lambert Academic Publishing, 2014. – 88 с. Marimuthu Kanagaraj and Eswari Venkatachalam. Multifactor Authentication Protocol for a Secured WSN. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Seifedine Kadry and Firas Hazzaa. Web-based Voting System Using Fingerprint. – М.: LAP Lambert Academic Publishing, 2013. – 80 с. Govind Singh Tanwar,Chitreshh Banerjee and Ajeet Singh Poonia. Enhanced & Generalised E-Governance Security Framework (EG)2SF. – М.: LAP Lambert Academic Publishing, 2014. – 88 с. Kiran Bala B. Digital Image processing. – М.: LAP Lambert Academic Publishing, 2012. – 56 с. Mohd Nazri Ismail,Mohd Afizi Shukran and Megat Farez Azril. VoIP over IP with fingerprint authentication and digital signature. – М.: LAP Lambert Academic Publishing, 2014. – 84 с. Adebayo Omotosho and Justice Emuoyibofarhe. Development of a Secure Intelligent Electronic Prescription System. – М.: LAP Lambert Academic Publishing, 2012. – 156 с. Bhavesh Pandya,Vinayak Bharadi and Hemchandra Kekre. Multimodal Fusion of Iris and Fingerprint. – М.: LAP Lambert Academic Publishing, 2014. – 104 с. Francisco Canovas Valles,Zaneta Babko and Olga Bzdawka. FingerPal: Biometric Payment System. – М.: LAP Lambert Academic Publishing, 2010. – 108 с. Bijan Soleymani. Social Authentication for Mobile Phones. – М.: LAP Lambert Academic Publishing, 2010. – 100 с. Vinayak Bharadi and Hemchandra Kekre. Biometric Authentication Systems. – М.: LAP Lambert Academic Publishing, 2012. – 364 с. Nirmalya Kar,Ashim Saha and Mrinal Kanti Debbarma. Biometric Based Attendance System. – М.: LAP Lambert Academic Publishing, 2012. – 64 с. Taranpreet Singh Ruprah. Face Recognition using PCA &LDA Algorithm. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Tarachand Verma,Piyusha Tyagi and Somya Arya. Biometric Template Security in Iris Based Systems: A Novel Approach. – М.: LAP Lambert Academic Publishing, 2012. – 96 с. Dilloo Lubna. Face Recognition. – М.: , 2011. – 88 с. Дополнительные результаты William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 515 с. Smart Card Research and Advanced Applications: 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, ... Computer Science / Security and Cryptology). – М.: , 2012. – 357 с. Securities Compliance Index. Securities Compliance Index, Second Edition: A Topical Guide To U.S. Securities Regulation. – М.: , 2012. – 512 с. Martin S. Feldstein, Horst Siebert. Social Security Pension Reform in Europe. – М.: , 0. – 0 с. Global Portfolio Diversification : Risk Management, Market Microstructure, and Implementation Issues. – М.: , 0. – 0 с. John B. Shoven. Administrative Aspects of Investment-Based Social Security Reform (Conference Report (National Bureau of Economic Research).). – М.: , 0. – 0 с. Safety and the Security Professional : A Guide to Occupational Safety and Health Strategies. – М.: , 0. – 0 с. Alexis Gutzman. Unforeseen Circumstances : Strategies and Technologies for Protecting Your Business and Your People in a Less Secure World. – М.: , 0. – 0 с. Protecting Business Information : A Manager's Guide. – М.: , 0. – 0 с. Jessica Keyes. Securities Technology Handbook. – М.: , 0. – 0 с. Julia Lowell, C. R. Neu, Daochi Tong, National Defense Research Institute, National Security Research Institute. Financial Crises and Contagion in Emerging Market Countries. – М.: , 0. – 0 с. T. W. Epps. Pricing Derivative Securities. – М.: , 0. – 0 с. Gerald L. Kovacich, Edward P. Halibozek. The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, First Edition. – М.: , 0. – 0 с. Roxannee. Burkey, Charles V. Breakfield. Designing a Total Data Solution: Technology, Implementation, and Deployment. – М.: , 0. – 0 с. Marko Nordquist. Towards Improved Security Management Practice: Designing an Organizational Model Procedure for the Implementation of Information Security Management in Heterogeneous Information Management. – М.: , 0. – 0 с. Steve Purser. A Practical Guide to Managing Information Security (Artech House Technology Management Library). – М.: , 0. – 0 с. Retail Security and Loss Prevention. – М.: , 0. – 0 с. Physical Security and the Inspection Process. – М.: , 0. – 0 с. Risk Analysis and the Security Survey. – М.: , 0. – 0 с. Joseph S. Nye, William A. Owens, James R. Schlesinger, R. James Woolsey, James A. Lewis, Joseph S., Jr. Nye, James Andrew Lewis, Erin Schlather, Csis Commission on Technology Security in the Twenty-First Century. Computer Exports and National Security: New Tools for a New Century : A Report of the Csis Commission on Technology Security in the 21St-Century (Csis Panel Reports.). – М.: , 0. – 0 с. Joseph Fried. How Social Security Picks Your Pocket: A Story of Waste, Fraud, and Inequities. – М.: , 0. – 0 с. Juanita Ellis, Tim Speed. The Internet Security Guidebook: From Planning to Deployment. – М.: , 0. – 0 с. Peter Varhol. Implementing a World Wide Web Site for Your Organization. – М.: , 0. – 0 с. Charles Carrington, Timothy Speed, Juanita Ellis, Steffano Korper. Enterprise Directory and Security Implementation Guide: Designing and Implementing Directories in Your Organization (The Korper and Ellis E-Commerce Books Series). – М.: , 0. – 0 с. Jonathan S. Held, John R. Bowers. Securing E-Business Applications and Communications. – М.: , 0. – 0 с. Tony Redmond. Microsoft Exchange Server V5.5: Planning, Design and Implementation. – М.: , 0. – 0 с. Vesna Hassler. Security Fundamentals for E-Commerce (Artech House Computer Security Series). – М.: , 0. – 0 с. The Security Economy (Safety Standards Series:). – М.: , 2004. – 0 с. Aspatore Books. Corporate Security in the Information Age: Industry Leaders from Bose Corporation, Dow Jones, and more on Security Options, Protecting Assets, & Implementing a Strategy (Inside the Minds). – М.: , 2005. – 0 с. Joseph Fried. How Social Security Picks Your Pocket: A Story of Waste, Fraud, and Inequities. – М.: , 2003. – 0 с. Advances in Security and Payment Methods for Mobile Commerce. – М.: , 2004. – 0 с. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с. Rickland Hollar. Enterprise Web Services Security (Internet Series). – М.: , 2005. – 432 с. Ron Ben Natan. Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase. – М.: , 2005. – 432 с. Jim Stewart. SAP Security: SAP Security Essentials. – М.: Equity Press, 2005. – 136 с. Committee on Federal Regulation of Securities Committee. The Fund Director's Guidebook: Third Edition (Fund Director's Guidebook). – М.: , 2006. – 128 с. Timothy P. Layton. Information Security. – М.: , 2006. – 222 с. Michael Khairallah. Physical Security Systems Handbook: The Design and Implementation of Electronic Security Systems. – М.: , 2005. – 312 с. Michael Gentile, Ron Collette, Tom August. The Ciso Handbook: A Practical Guide to Securing Your Company. – М.: , 2005. – 352 с. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с. Bill Griffith Jr. CFP. Securing a Retirement Income for Life. – М.: , 2006. – 212 с. Aaron Newman, Jeremy Thomas. ENTERPRISE 2.0 IMPLEMENTATION. – М.: , 2008. – 406 с. Vincenzo Galasso. The Political Future of Social Security in Aging Societies. – М.: , 2008. – 280 с. Prospectus for the Public Offering of Securities in Europe: Volume 1: European and National Legislation in the Member States of the European Economic Area (Law Practitioner Series). – М.: , 2008. – 514 с. Joseph Howse. Silk Road, Silver Lining: Can Micro-lending in Central Asia Counteract Criminal Influence in the Financial Sector?. – М.: , 2008. – 204 с. The Editors of Apartment Building Management Insider. Apartment Management Compliance and Profitability Guide. – М.: , 2008. – 716 с. Meridian Securities Market. World Stock Exchange Fact Book. – М.: , 2008. – 0 с. Gerard Blokdijk, Ivanka Menken. Information Security Management Best Practice Workbook: Implementation and Management Roadmap for Threats, Challenges and Solutions - Ready to use supporting documents bringing Theory into Practice. – М.: , 2008. – 124 с. Daniel Clark. Network Access Control 100 Success Secrets - 100 Most Asked NAC Questions on Implementation and Deployment of unify endpoint security technology, user ... and network security enforcement. – М.: , 2008. – 180 с. Ronald Hall. Biometrics 100 Most asked Questions on Physiological (face, fingerprint, hand, iris, DNA) and Behavioral (keystroke, signature, voice) Biometrics Technologies, ... Implementation and Performance evaluation. – М.: , 2008. – 176 с. CompTIA Security+: Certification Kit (комплект из 3 книг + 2 CD-ROM). – М.: Sybex, 2009. – 1440 с. brian Honan. Implementing ISO27001 in a Windows® Environment. – М.: , 2009. – 316 с. W. Krag Brotby. Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement. – М.: Auerbach Publications, 2009. – 200 с. Alan Calder. Information Security based on ISO 27001/ISO 27002: A Management Guide. – М.: , 2009. – 83 с. John Rittinghouse, James Ransome. Cloud Computing: Implementation, Management, and Security. – М.: CRC Press, 2009. – 340 с. Stephen Hardison, David Byrd, Gary Wood, Tim Speed, Michael Martin, Suzanne Livingston, Jason Moore. IBM Lotus Connections 2.5: Planning and Implementing Social Software for Your Enterprise. – М.: , 2010. – 456 с. Robert C. Seacord. The CERT C Secure Coding Standard. – М.: Addison-Wesley Professional, 2008. – 720 с. Alan Calder, Steve G Watkins. Information Security Risk Management for ISO27001 / ISO27002. – М.: , 2010. – 198 с. Michael Erbschloe. Implementing Homeland Security for Enterprise IT. – М.: , 2010. – 299 с. S.Y. Kung, M.W. Mak, S.H. Lin. Biometric Authentication: A Machine Learning Approach (Prentice Hall Information and System Sciences Series). – М.: , 2010. – 496 с. Handbook of Information and Communication Security. – М.: , 2010. – 800 с. Helen Toner, Elspeth Guild, Anneliese Baldaccini. Whose Freedom, Security and Justice?. – М.: Hart Publishing, 2007. – 550 с. Dan Forsberg, Gunther Horn, Wolf-Dietrich Moeller, Valtteri Niemi. LTE Security. – М.: John Wiley and Sons, Ltd, 2010. – 304 с. John Paul Mueller. NET Development Security SolutionsTM. – М.: , 2003. – 472 с. Ron Ben Natan. Implementing Database Security and Auditing. – М.: , 2010. – 432 с. Tony Flick, Justin Morehouse. Securing the Smart Grid: Next Generation Power Grid Security. – М.: Рид Элсивер, 2011. – 320 с. Joey Hirao, Mimi Choi, Perry Cox, Steven Passer, Jeanmarie Hirao. SAP Security Configuration and Deployment. – М.: Syngress, 2009. – 392 с. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с. Charles Carrington. Enterprise Directory and Security Implementation Guide. – М.: , 2010. – 272 с. John Chirillo. Implementing Biometric Security. – М.: , 2003. – 432 с. Orin Thomas. MCSA/MCSE Self–Paced Training Kit (Exam 70–350) – Implementing Microsoft Internet Security and Acceleration Server 2004. – М.: , 2005. – 1104 с. Microsoft. Web Services Security – Scenarios, Patterns and Implementation Guidance for Web Service Enhancements (WSE) 3.0. – М.: , 2006. – 384 с. Microsoft Official Academic Course. 70–299 Implementing and Administering Security in a Microsoft® Windows ServerTM 2003 Network Package. – М.: , 2005. – 836 с. Helen Toner, Elspeth Guild and Anneliese Baldaccini. Whose Freedom, Security and Justice?. – М.: , 2011. – 582 с. Construction Site Security. – М.: , 2006. – 438 с. Oracle Enterprise Manager 10G Grid Control Implementation Guide. – М.: , 2011. – 768 с. Enterprise 2.0 Implementation. – М.: , 2011. – 406 с. Vmware Vsphere 4 Implementation. – М.: , 2011. – 682 с. Comptia Security+ All-In-One Exam Guide, Second Edition (Exam Sy0-201). – М.: , 2011. – 0 с. Linux Administration: A Beginner'S Guide, Fifth Edition. – М.: , 2011. – 662 с. Microsoft Sql Server 2008 A Beginner'S Guide 4/E. – М.: , 2011. – 709 с. Virtualization, A Beginner'S Guide. – М.: , 2011. – 464 с. Oracle Database Administration For Microsoft Sql Server Dbas. – М.: , 2011. – 352 с. Wireless Network Security A Beginners Guide. – М.: , 2011. – 400 с. Security Information And Event Management (Siem) Implementation. – М.: , 2011. – 464 с. Mobile Application Security. – М.: , 2011. – 432 с. David Endler, Mark Collier. Hacking Exposed VoIP: Voice Over Ip Security Secrets & Solutions. – М.: McGraw-Hill Osborne Media, 2006. – 574 с. It Security Metrics: A Practical Framework For Measuring Security & Protecting Data. – М.: , 2011. – 396 с. Web Services Security. – М.: , 2011. – 312 с. Fundamentals Of Network Security. – М.: , 2011. – 672 с. Samir Nanavati, Michael Thieme, Raj Nanavati. Biometrics: Identity Verification in a Networked World. – М.: Wiley, 2002. – 320 с. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . – с. Dave Tyson. Security Convergence: Managing Enterprise Security Risk. – М.: , 2007. – 232 с. Michael Gregg, Eric Seagren, Angela Orebaugh, Matt Jonkman, Raffael Marty. How to Cheat at Configuring Open Source Security Tools (How to Cheat) (How to Cheat). – М.: , 2007. – 528 с. Timothy Stapko. Practical Embedded Security: Building Secure Resource-Constrained Systems. – М.: Newnes, 2007. – 480 с. Eduardo Fernandez-Buglioni. Security Patterns in Practice: Designing Secure Architectures Using Software Patterns. – М.: Wiley, 2013. – 582 с. Eric D. Knapp, Raj Samani. Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure. – М.: Syngress, 2013. – 228 с. M. Taylan Das and L. Canan Dulger. Implementation of Biometric Recognition Using Off-Line Signature. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Abhishek Roy,Sunil Karforma and Subhadeep Banik. Implementation Of Authentication In E-Governance–an Uml Based Approach. – М.: LAP Lambert Academic Publishing, 2013. – 116 с. Wenhua Wang and Yu Lei. Web Application Testing And Security Testing Techniques Design. – М.: LAP Lambert Academic Publishing, 2011. – 96 с. Papri Ghosh and Ritam Dutta. Adaptive Approach towards Biometric Authentication System. – М.: LAP Lambert Academic Publishing, 2012. – 88 с. Vinav Keshari. Secure Web Service:Encryption. – М.: LAP Lambert Academic Publishing, 2012. – 72 с. George S. Oreku. ENHANCING E-COMMERCE SECURITY. – М.: LAP Lambert Academic Publishing, 2011. – 212 с. Satyendra Singh Thakur and Dr. Manish Manoria. Secure Cryptosystem for Biometric Information using RSA. – М.: LAP Lambert Academic Publishing, 2011. – 92 с. Ryan Quint. Implementation of a Security-Dependability Adaptive Voting Scheme. – М.: LAP Lambert Academic Publishing, 2012. – 140 с. Shaek Rana Mohammad Baki Billah and Mohammad Hafizur Rahman. Design & Development of Network Security System using IP Tables. – М.: LAP Lambert Academic Publishing, 2013. – 164 с. Nitin Kanzariya and Ashish Nimavat. Security of Digital Image Using Hybrid Steganography. – М.: LAP Lambert Academic Publishing, 2013. – 84 с. Tasnuva Ahmed,Rabiul Hossain and Dipesh Barua. Security System Using Ultrasound. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Divya Sharma and Kamal Kant. Embedded Linux Porting on ARM & RFID Implementation Using ARM SoC. – М.: LAP Lambert Academic Publishing, 2013. – 84 с. Ronan O'Driscoll. Internet Controlled Security Robot. – М.: LAP Lambert Academic Publishing, 2014. – 52 с. Arindam Sarkar and J. K. Mandal. Artificial Neural Network Guided Secured Communication Techniques. – М.: LAP Lambert Academic Publishing, 2012. – 128 с. A.S.M. Mukter Zaman,Aryuanto Soetedjo and Md. Shabiul Islam. Embedded Smart Security System. – М.: LAP Lambert Academic Publishing, 2012. – 128 с. Suhas S. Chate. Human Palm:Biometric Recognition and Challenges. – М.: LAP Lambert Academic Publishing, 2013. – 132 с. Rabia Bilal and Bilal Muhammad Khan. Implementation Of Speech Scrambling Using DSP TMS320c6711 And LabView. – М.: LAP Lambert Academic Publishing, 2014. – 80 с. Mehmet Oztemel. A Secure RFID ID-Card System Via Robust Image Hashing. – М.: LAP Lambert Academic Publishing, 2011. – 64 с. A. C. Suthar,D. D. Shah and G. R. Kulkarni. Implementation of Secured Color Image Authentication and Protection. – М.: LAP Lambert Academic Publishing, 2011. – 92 с. Mohammad A. Dabbah. Secure Biometric Face Recognition. – М.: LAP Lambert Academic Publishing, 2010. – 144 с. Nooruldeen Qader and Loay George. Design and Implement a Secure Database Using Multi Level Security. – М.: LAP Lambert Academic Publishing, 2014. – 124 с. Kumar Rakesh,Subhangi Dutta and Kumara Shama. Handbook on Implementing Gender Recognition. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Garima Verma. Implementation of Authentication and Transaction Security. – М.: LAP Lambert Academic Publishing, 2013. – 60 с. Prasad Lokulwar,Vivek Shelkhe and Mangesh Ghonge. Security Aware Routing protocol for MANET. – М.: LAP Lambert Academic Publishing, 2012. – 84 с. Mohammad AlAhmad. Security threats of finger print biometric in network system. – М.: LAP Lambert Academic Publishing, 2014. – 88 с. Marimuthu Kanagaraj and Eswari Venkatachalam. Multifactor Authentication Protocol for a Secured WSN. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Keshava Munegowda. Design and Implementation of WLAN Authentication and Security. – М.: LAP Lambert Academic Publishing, 2010. – 124 с. Ajit Regmi. IT in Nepalese Banks. – М.: LAP Lambert Academic Publishing, 2010. – 120 с. Martin Drahansky. Biometric Cryptography Based on Fingerprints. – М.: LAP Lambert Academic Publishing, 2010. – 160 с. Govind Singh Tanwar,Chitreshh Banerjee and Ajeet Singh Poonia. Enhanced & Generalised E-Governance Security Framework (EG)2SF. – М.: LAP Lambert Academic Publishing, 2014. – 88 с. Kiran Bala B. Digital Image processing. – М.: LAP Lambert Academic Publishing, 2012. – 56 с. Aliyu Onipede. Biometrics as a tool for Information Security in Aviation industry. – М.: LAP Lambert Academic Publishing, 2012. – 88 с. Cyrus Abanti Makori,Jane Onsongo and Lusiba Badru. ICT Security Applications. – М.: LAP Lambert Academic Publishing, 2012. – 112 с. Adebayo Omotosho and Justice Emuoyibofarhe. Development of a Secure Intelligent Electronic Prescription System. – М.: LAP Lambert Academic Publishing, 2012. – 156 с. Komunte Mary and Prof Venansius Baryamureeba. Web Security. – М.: LAP Lambert Academic Publishing, 2010. – 140 с. Francisco Canovas Valles,Zaneta Babko and Olga Bzdawka. FingerPal: Biometric Payment System. – М.: LAP Lambert Academic Publishing, 2010. – 108 с. Vinayak Bharadi and Hemchandra Kekre. Biometric Authentication Systems. – М.: LAP Lambert Academic Publishing, 2012. – 364 с. Khalid Hussain and Waqas Ahmed. Sub Table Access Based Model For OLAP tools. – М.: LAP Lambert Academic Publishing, 2012. – 96 с. Jakub Hemerka. Benefits of TQM in SME providing services. – М.: LAP Lambert Academic Publishing, 2011. – 84 с. Tarachand Verma,Piyusha Tyagi and Somya Arya. Biometric Template Security in Iris Based Systems: A Novel Approach. – М.: LAP Lambert Academic Publishing, 2012. – 96 с. S. V. S. Kishore Kumar. Information Systems Audit And Security In Banking. – М.: LAP Lambert Academic Publishing, 2013. – 476 с.
Лучшие результаты Ничего не найдено Дополнительные результаты Ничего не найдено Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Misha Здравствуйте Марина. С Вашей помощью мы всё сдали на отлично. Большое Вам спасибо.