Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Safe Schools: A Security and Loss Prevention Plan. – М.: , 0. – 0 с.
  2. Dorothy E. Denning, Peter J. Denning. Internet Besieged. – М.: , 0. – 0 с.
  3. Paul Piccard, Jeremy Faircloth. Combating Spyware in the Enterprise. – М.: , 2006. – 386 с.
  4. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с.
  5. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с.
  6. Trust, Privacy and Security in Digital Business: 5th International Conference, TrustBus 2008 Turin, Italy, September 1-5, 2008, Proceedings (Lecture Notes in Computer Science). – М.: , 2008. – 205 с.
  7. Mark A. Franklin, Patrick Crowley, Haldun Hadimioglu, Peter Z. Onufryk. Network Processor Design, Volume 3: Issues and Practices. – М.: Morgan Kaufmann, 2005. – 336 с.
  8. Rory Bray. OSSEC Host-Based Intrusion Detection Guide. – М.: , 2010. – 416 с.
  9. Syngress. Snort Intrusion Detection 2.0. – М.: , 2010. – 550 с.
  10. Brian Caswell. Snort Intrusion Detection and Prevention Toolkit. – М.: , 2010. – 768 с.
  11. Robert Barnard. Intrusion Detection Systems. – М.: , 2010. – 480 с.
  12. Terry Escamilla. Intrusion Detection. – М.: , 1998. – 368 с.
  13. Hacking Exposed Malware And Rootkits. – М.: , 2011. – 400 с.
  14. Gray Hat Hacking The Ethical Hackers Handbook, 3Rd Edition. – М.: , 2011. – 720 с.
  15. Fundamentals Of Network Security. – М.: , 2011. – 672 с.
  16. Greg Holden. Guide to Firewalls and Network Security: Intrusion Detection and VPNs. – М.: Course Technology, 2003. – 512 с.
  17. Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky. Cisco Security Professional's Guide to Secure Intrusion Detection Systems. – М.: , . –  с.
  18. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . –  с.
  19. Ido Dubrawsky. How to Cheat at Securing Your Network. – М.: Syngress, 2007. – 432 с.
  20. Anup Bhange and Manmeet Kaur Marhas. Anomaly Detection in Network Traffic; A Statistical Approach. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  21. Gulshan Kumar. Effective Intrusion Detection using Genetic Algorithms. – М.: LAP Lambert Academic Publishing, 2014. – 100 с.
  22. Peichung Shih. Facial Analysis in Video: Detection and Recognition. – М.: Scholars Press, 2013. – 176 с.
  23. Tanmoy Hazra. Application of PCA in IDS. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  24. Shui-cheong Kam. Assessing of Circuit Breaker Restrike Risks Using Computer Simulation. – М.: LAP Lambert Academic Publishing, 2012. – 380 с.
  25. Sampath V.P. FPGA Based Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  26. Waqas Ahmed Rana. GSM Based System Design for Home Automation and Security. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  27. Elez Shenhar and Ilan Shallom. Uniform Non-Intrusive Speech Quality Assessment Model. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  28. Festus T. Ejikemeuwa,Sabestine O. Ejike and Onyinyechi F.A Ofoh. Three Stage Intruder Radio Alert System. – М.: LAP Lambert Academic Publishing, 2013. – 60 с.
  29. Huang-Chun Roan. Network Intrusion Detection Based on Shift-OR Circuit. – М.: LAP Lambert Academic Publishing, 2011. – 60 с.
  30. M. Sadiq Ali Khan and S. M. Aqil Burney. Recent Trends in Intrusion Detection System & Network Monitoring. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  31. Elijah Edet Nkitnam. Analytic Signal Analysis Of Aeromagnetic Data Over Zaria Area, Nigeria. – М.: LAP Lambert Academic Publishing, 2014. – 92 с.
  32. Mohsin Mahmood. GSM Based System Design for Home Automation and Security. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  33. Husniza Razalli,Rahmita Wirza O. K. Rahmad and Ramlan Mahmod. Real Time Face-Tracking and Iris Localization. – М.: LAP Lambert Academic Publishing, 2012. – 136 с.
  34. Abhay Nath Singh. Honeypot Based Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  35. Shahnawaz Husain,S. C. Gupta and R. C. Joshi. Intrusion Detection Engine for Adhoc Environment. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  36. Sumaya Saad Sulaiman and Sarab M. Hameed. A Fuzzy Based Clustering for Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  37. Shubha Puthran and Ketan Shah. Intrusion Detection System using datamining techniques. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  38. Mohammad S. I. Mamun. Intrusion Detection System Architecture in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  39. Heba Fathy Eid. Computational Intelligence in Network Intrusion Detection System. – М.: Scholars' Press, 2014. – 164 с.
  40. Janakiraman S. Distributed Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 164 с.
  41. Yogesh Kumar,Krishan Kumar and Gulshan Kumar. Feature Selection For Intrusion Detection Systems. – М.: LAP Lambert Academic Publishing, 2014. – 100 с.
  42. Srikanth Hariharan,Ness B. Shroff and Saurabh Bagchi. Secure Neighbor Discovery in Wireless Networks. – М.: LAP Lambert Academic Publishing, 2011. – 52 с.
  43. Saad Usman. Spatio Temporal Anomaly Detector. – М.: LAP Lambert Academic Publishing, 2011. – 84 с.
  44. Xiaodong He. Automated intrusion prevention mechanism in enhancing network security. – М.: Scholars' Press, 2014. – 128 с.
  45. Syed Zahidur Rashid. Computer Network Security Monitoring. – М.: Scholars' Press, 2015. – 284 с.
  46. K. Shaila and K. R. Venugopal. Secure Data Communication in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2014. – 240 с.
  47. Lanier Watkins. Resource Discovery: Using Network Traffic To Infer CPU And Memory Load. – М.: LAP Lambert Academic Publishing, 2014. – 96 с.
  48. P. Ganesh Kumar and S. Ramesh. Secure Routing Protocol for ICMN. – М.: LAP Lambert Academic Publishing, 2014. – 64 с.
  49. Gulshan Kumar. Effective Intrusion Detection using Feature Selection. – М.: LAP Lambert Academic Publishing, 2014. – 92 с.
  50. Mrutyunjaya Panda and Manas Ranjan Patra. A Data Mining Approach to Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2015. – 216 с.
  51. Glenn Wilkinson. Identification of Hostile TCP Traffic using Support Vector Machines. – М.: LAP Lambert Academic Publishing, 2010. – 80 с.
  52. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  53. Mueen Uddin. Dynamic Multi Layer Signature based IDS System using Mobile Agents. – М.: LAP Lambert Academic Publishing, 2011. – 72 с.
  54. Ivano Malavolta. A tamper resistant Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2011. – 144 с.
  55. Prashant Kumar Singh and Avimanyou Kumar Vatsa. Taxonomy Based Intrusion Attacks and Detection Scheme in P2P Network. – М.: LAP Lambert Academic Publishing, 2012. – 56 с.
  56. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  57. Shaffali Gupta and Sanmeet Kaur. A GUI Framework for detecting Intrusions using Bro IDS. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  58. Mahmoud Jazzar. Computer Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 240 с.
  59. Siva S. Sivatha Sindhu,S. Geetha and S. Selvakumar. Network Intrusion Detection System using Machine Learning Techniques. – М.: LAP Lambert Academic Publishing, 2013. – 80 с.
  60. Gaurav Mishra and Gulshan Ahuja. Classification of data mining techniques in intrusion detection. – М.: LAP Lambert Academic Publishing, 2013. – 52 с.
  61. Nasim Beigi-Mohammadi. Smart Meter Networks: Intrusion Detection System by Design. – М.: LAP Lambert Academic Publishing, 2014. – 136 с.
  62. Christian Chetachi Umunna. Distributed Intrusion Detection System in Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 104 с.
  63. Manuj Mishra,Govind Sharma and Ram Pathak. Secure Routing In Wireless Mobile Ad Hoc Network. – М.: LAP Lambert Academic Publishing, 2014. – 84 с.
  64. Iftikhar Ahmad. Feature Subset Selection in Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 220 с.
  65. Saima Munawar. Detection and Classification Of Normal and Anomaly IP Packet. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  66. Jabarweer Singh,Krishan Kumar and Gulshan Kumar. Intrusion detection using artificial intelligence based ensembles. – М.: LAP Lambert Academic Publishing, 2014. – 116 с.
  67. Govind Sreekar Shenoy. Architecture Support for Intrusion Detection systems. – М.: LAP Lambert Academic Publishing, 2014. – 160 с.
  68. Monis Akhlaq,Irfan Awan and Faeiz Alserhani. Improved Performance High Speed Network Intrusion Detection Systems. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  69. Prakash Prasad. Intrusion Detection System: Findings. – М.: LAP Lambert Academic Publishing, 2011. – 104 с.
  70. Homam El-Taj and Omar Amer. Network Alert Management System For IDS False Positive Reduction. – М.: LAP Lambert Academic Publishing, 2013. – 156 с.
  71. Manju Bala and R. K. Agrawal. Multiple Classifier Systems Analysis and Design. – М.: LAP Lambert Academic Publishing, 2012. – 128 с.
  72. Sultan H. Aljahdali and Mohd. Junedul Haque. Intelligent Approaches to Data Management. – М.: LAP Lambert Academic Publishing, 2013. – 116 с.
  73. Bibi Masoomeh Aslahi Shahri. Intrusion Detection System Using Hybrid Gsa-kmeans. – М.: LAP Lambert Academic Publishing, 2014. – 128 с.
  74. Muna Elsadig Mohamed Ahmed Elsheik. Bio Inspired Intrusion Prevention and Self healing System for Networks. – М.: LAP Lambert Academic Publishing, 2012. – 256 с.
  75. Amanpreet Chauhan. Survey on data mining techniques in intrusion detection. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  76. Tigabu Dagne Akal. Constructing Predictive Model for Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 160 с.
  77. Kamaruzaman Maskat and Mohd Afizi Mohd Shukran. Agent Based Snort In Distributed Environment. – М.: LAP Lambert Academic Publishing, 2013. – 112 с.
  78. Kamrul Hasan. An Investigation into Botnet Detection System. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  79. Rupali Pathak. Recent Advances In Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  80. Mafaz M. K. Al-Anezi and Najla B. I. Al-Dabagh. Multilayer Artificial Immune Systems for Intrusion & Malware Detection. – М.: LAP Lambert Academic Publishing, 2012. – 148 с.
  81. Mohamed Nassar. Voice over IP Networks Monitoring. – М.: LAP Lambert Academic Publishing, 2009. – 172 с.
  82. Keijo Haataja. Security Threats and Countermeasures in Bluetooth-Enabled Systems. – М.: LAP Lambert Academic Publishing, 2009. – 188 с.
  83. vudasreenivasa rao. DISTRIBUTED DATA MINING AND MINING MULTI-AGENT DATA. – М.: LAP Lambert Academic Publishing, 2011. – 152 с.
  84. Al-Sakib Khan Pathan. Securing WSN with Lightweight Resource-Efficient Schemes. – М.: LAP Lambert Academic Publishing, 2011. – 116 с.
  85. Joao Antunes. Network Attack Injection. – М.: Scholars' Press, 2013. – 268 с.
  86. Alpay Doruk. Security Review Program Requirements for Intrusion Management Systems. – М.: LAP Lambert Academic Publishing, 2010. – 88 с.
  87. Sathish Kumar. Intrusion Detection and Response Techniques for Mobile Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 200 с.
  88. Richard Rimiru. Exploring Immune System's Concepts for the Design of Novel AIS Models. – М.: LAP Lambert Academic Publishing, 2012. – 164 с.
  89. Faeiz Alserhani,Irfan Awan and Monis Akhlaq. Correlation and Aggregation of Security Alerts in Networks. – М.: LAP Lambert Academic Publishing, 2012. – 256 с.
  90. Khandakar Entenam Unayes Ahmed. IDENTITY AND ACCESS MANAGEMENT IN CLOUD COMPUTING. – М.: LAP Lambert Academic Publishing, 2011. – 172 с.

Дополнительные результаты

  1. Zabihollah Rezaee. Financial Statement Fraud: Prevention and Detection. – М.: , 0. – 0 с.
  2. Douglas M. Patterson, Richard A. Ashley. A Nonlinear Time Series Workshop - A Toolkit for Detecting and Identifying Nonlinear Serial (DYNAMIC MODELING AND ECONOMETRICS IN ECONOMICS AND). – М.: , 0. – 0 с.
  3. James E. Lukaszewski. When You Are the Target : Coping With Activist Intrusions and Threats. – М.: , 0. – 0 с.
  4. Safe Schools: A Security and Loss Prevention Plan. – М.: , 0. – 0 с.
  5. Chris Hawley. HazMat Air Monitoring & Detection Devices. – М.: , 0. – 0 с.
  6. Robert G. Hagstrom. The Detective and The Investor: Uncovering Investment Techniques from the Legendary Sleuths. – М.: , 0. – 0 с.
  7. Jordan E. Goodman. Reading between the Lies : How to detect fraud and avoid becoming a victom of Wall Street's next scandal. – М.: , 0. – 0 с.
  8. Jeffrey A. Cuddy. The Ultimate Breakthrough in Market Turning Point Detection: Catching Every Major Pivot in Stocks, Options, and Futures with the PAMA Method. – М.: Windsor Books, 1997. – 168 с.
  9. Jose Nazario, Nazario. Defense and Detection Strategies against Internet Worms. – М.: , 0. – 0 с.
  10. Dorothy E. Denning, Peter J. Denning. Internet Besieged. – М.: , 0. – 0 с.
  11. Robert G. Hagstrom. The Detective and the Investor (Paperback) : Uncovering Investment Techniques from the Legendary Sleuths. – М.: , 2004. – 0 с.
  12. Scott Mackay. Old Scores (Detective Barry Gilbert, 3). – М.: , 2003. – 320 с.
  13. Paul Piccard, Jeremy Faircloth. Combating Spyware in the Enterprise. – М.: , 2006. – 386 с.
  14. Martin Fridson. Unwarranted Intrusions: The Case Against Government Intervention in the Marketplace. – М.: , 2006. – 309 с.
  15. Howard Silverstone, Howard R. Davia. Fraud 101: Techniques and Strategies for Detection. – М.: , 2005. – 238 с.
  16. Randolph A Smith, Stephen Davis. The Psychologist as Detective: An Introduction to Conducting Research in Psychology (4th Edition). – М.: , 2006. – 480 с.
  17. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с.
  18. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с.
  19. Trust, Privacy and Security in Digital Business: 5th International Conference, TrustBus 2008 Turin, Italy, September 1-5, 2008, Proceedings (Lecture Notes in Computer Science). – М.: , 2008. – 205 с.
  20. Optimizing Molecular Methods to Detect Human Caliciviruses in Environmental Samples. – М.: , 2008. – 84 с.
  21. Mark A. Franklin, Patrick Crowley, Haldun Hadimioglu, Peter Z. Onufryk. Network Processor Design, Volume 3: Issues and Practices. – М.: Morgan Kaufmann, 2005. – 336 с.
  22. Shankar Narasimhan, S. Narasimhan, C. Jordache. Data Reconciliation and Gross Error Detection: An Intelligent Use of Process Data. – М.: Gulf Professional Publishing, 2006. – 428 с.
  23. Morton J. Canty. Image Analysis, Classification and Change Detection in Remote Sensing. – М.: , 2006. – 348 с.
  24. Keith Chugg, Achilleas Anastasopoulos, Xiaopeng Chen. Iterative Detection - Adaptivity, Complexity Reduction, and Applications. – М.: Springer, 2000. – 392 с.
  25. Principles of Bacterial Detection: Biosensors, Recognition Receptors and Microsystems. – М.: , 2008. – 1040 с.
  26. Walter Blum, Werner Riegler, Luigi Rolandi. Particle Detection with Drift Chambers (Particle Acceleration and Detection). – М.: , 2008. – 454 с.
  27. Steve Voake. Insect Detective. – М.: , 2010. – 32 с.
  28. Jinho Choi. Optimal Combining and Detection: Statistical Signal Processing for Communications. – М.: , 2010. – 352 с.
  29. Magued Iskander. Modelling with Transparent Soils: Visualizing Soil Structure Interaction and Multi Phase Flow, Non-Intrusively (Springer Series in Geomechanics and Geoengineering). – М.: , 2010. – 300 с.
  30. Zhiguo Wang, Baofeng Yang. MicroRNA Expression Detection Methods. – М.: , 2010. – 387 с.
  31. Stephen Pedneault. Preventing and Detecting Employee Theft and Embezzlement. – М.: , 2010. – 310 с.
  32. Tommy Oberg. Modulation, Detection and Coding. – М.: , 2001. – 480 с.
  33. Barb Karg. The History Detectives Explore Lincoln?s Letter, Parker?s Sax, and Mark Twain?s Watch. – М.: , 2008. – 408 с.
  34. M. Henini. Handbook of Infra-red Detection Technologies. – М.: , 2010. – 532 с.
  35. Daniel L. Purich. Enzyme Kinetics and Mechanism, Part F: Detection and Characterizationof Enzyme Reaction Intermediates,354. – М.: , 2010. – 650 с.
  36. Shirley J. Gee. Environmental Immunochemical Analysis Detection of Pesticides and Other Chemicals. – М.: , 2010. – 119 с.
  37. Rory Bray. OSSEC Host-Based Intrusion Detection Guide. – М.: , 2010. – 416 с.
  38. Michael Rash. Intrusion Prevention and Active Response. – М.: , 2010. – 550 с.
  39. Jesus Mena. Investigative Data Mining for Security and Criminal Detection. – М.: , 2010. – 272 с.
  40. Michael Kolawole. Radar Systems, Peak Detection and Tracking. – М.: , 2010. – 400 с.
  41. Joseph W. Maresca. Volumetric Leak Detection Methods for Underground Fuel Storage Tanks. – М.: , 2010. – 371 с.
  42. Arthur E. Lord. Detection of Subsurface Hazardous Waste Containers by Nondestructive Techniques. – М.: , 2010. – 91 с.
  43. Syngress. Snort Intrusion Detection 2.0. – М.: , 2010. – 550 с.
  44. Hong-Yue Zhang. Fault Detection, Supervision and Safety of Technical Processes 2006. – М.: , 2010. – 1576 с.
  45. CAMACHO ET AL. PROCEEDINGS OF THE 15TH WORLD CONGRESS VOL JFAULT DETECTION AND SUPERVISIONIFAC PROCEEDINGS VOLUME (IPV). – М.: , 2010. – 0 с.
  46. J. Chen. Fault Detection, Supervision and Safety for Technical Processes 1997,(3-Volume Set). – М.: , 2010. – 0 с.
  47. Daniela Berg. Transcranial sonography and the detection of neurodegenerative disease,90. – М.: , 2010. – 320 с.
  48. Maurice Marshall. Aspects of Explosives Detection. – М.: , 2010. – 302 с.
  49. Brian Caswell. Snort Intrusion Detection and Prevention Toolkit. – М.: , 2010. – 768 с.
  50. Maria Luisa Marina. Analysis and Detection by Capillary Electrophoresis,45. – М.: , 2010. – 796 с.
  51. Thomas J. Chambers. The Flaviviruses: Detection, Diagnosis and Vaccine Development,61. – М.: , 2010. – 577 с.
  52. P.S. Dhurjati. On-Line Fault Detection and Supervision in the Chemical Process Industries 1998. – М.: , 2010. – 0 с.
  53. Jehuda Yinon. Counterterrorist Detection Techniques of Explosives. – М.: , 2010. – 454 с.
  54. Chris Hurley. WarDriving: Drive, Detect, Defend. – М.: , 2010. – 512 с.
  55. Eva Wu. Fault Detection, Supervision and Safety of Technical Processes. – М.: , 2010. – 1204 с.
  56. David McCombs. Detecting the World. – М.: , 2010. – 344 с.
  57. Robert N. McDonough. Detection of Signals in Noise. – М.: , 2010. – 495 с.
  58. Russell J. Schmitt. Detecting Ecological Impacts. – М.: , 2010. – 401 с.
  59. T. McAvoy. Fault Detection II, Aerospace, Marine Systems,Volume P. – М.: , 2010. – 0 с.
  60. John N. Abelson. Nitric Oxide, Part A: Sources and Detection of NO; NO Synthase,268. – М.: , 2010. – 555 с.
  61. Robert Barnard. Intrusion Detection Systems. – М.: , 2010. – 480 с.
  62. S. Niaki. Underground Tank Leak Detection Methods. – М.: , 2010. – 134 с.
  63. I Ousby. Ousby: ?bloodhounds? Of Heaven: The Detective In English Fiction From Godwin To Doyle. – М.: , 1976. – 185 с.
  64. Yunte Huang. Charlie Chan – The Untold Story of the Honorable Detective and his Rendezvous with American History. – М.: , 2010. – 288 с.
  65. Harvey Rachlin. The Making of a Detective. – М.: , 1996. – 320 с.
  66. Yunte Huang. Charlie Chan – The Untold Story of the Honorable Detective and His Rendezvous with American History. – М.: , 2011. – 0 с.
  67. Jeffery C May. Jeff May?s Healthy Home Tips – A Workbook for Detecting, Diagnosing and Eliminating Pesky Pests, Stinky Stenches, Musty Mold and Other Aggravating. – М.: , 2008. – 160 с.
  68. Pricilla L Walton. Detective Agency – Women Rewriting The Hard–Boiled Tradition (Paper). – М.: , 1999. – 328 с.
  69. Aaron Noah. Hoorwitz. The Clinical Detective – Techniques in the Evaluation of Sexual Abuse. – М.: , 1992. – 314 с.
  70. Richard Chandler. Statistical Methods for Trend Detection and Analysis in the Environmental Sciences. – М.: , 2011. – 384 с.
  71. Friedman. Detection of Signals by Template Matching. – М.: , 1969. – 0 с.
  72. John C Trueswell. Why Does the World Exist? – An Existential Detective Story. – М.: , 2004. – 368 с.
  73. John C Trueswell. Why Does the World Exist? – An Existential Detective Story. – М.: , 1973. – 0 с.
  74. Terry Escamilla. Intrusion Detection. – М.: , 1998. – 368 с.
  75. Hacking Exposed Malware And Rootkits. – М.: , 2011. – 400 с.
  76. Fundamentals Of Network Security. – М.: , 2011. – 672 с.
  77. Greg Holden. Guide to Firewalls and Network Security: Intrusion Detection and VPNs. – М.: Course Technology, 2003. – 512 с.
  78. Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky. Cisco Security Professional's Guide to Secure Intrusion Detection Systems. – М.: , . –  с.
  79. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . –  с.
  80. Ido Dubrawsky. How to Cheat at Securing Your Network. – М.: Syngress, 2007. – 432 с.
  81. Anup Bhange and Manmeet Kaur Marhas. Anomaly Detection in Network Traffic; A Statistical Approach. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  82. Gulshan Kumar. Effective Intrusion Detection using Genetic Algorithms. – М.: LAP Lambert Academic Publishing, 2014. – 100 с.
  83. Peichung Shih. Facial Analysis in Video: Detection and Recognition. – М.: Scholars Press, 2013. – 176 с.
  84. Tanmoy Hazra. Application of PCA in IDS. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  85. Sampath V.P. FPGA Based Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  86. Elez Shenhar and Ilan Shallom. Uniform Non-Intrusive Speech Quality Assessment Model. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  87. Huang-Chun Roan. Network Intrusion Detection Based on Shift-OR Circuit. – М.: LAP Lambert Academic Publishing, 2011. – 60 с.
  88. M. Sadiq Ali Khan and S. M. Aqil Burney. Recent Trends in Intrusion Detection System & Network Monitoring. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  89. Abhay Nath Singh. Honeypot Based Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  90. Shahnawaz Husain,S. C. Gupta and R. C. Joshi. Intrusion Detection Engine for Adhoc Environment. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  91. Sumaya Saad Sulaiman and Sarab M. Hameed. A Fuzzy Based Clustering for Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  92. Shubha Puthran and Ketan Shah. Intrusion Detection System using datamining techniques. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  93. Mohammad S. I. Mamun. Intrusion Detection System Architecture in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  94. Heba Fathy Eid. Computational Intelligence in Network Intrusion Detection System. – М.: Scholars' Press, 2014. – 164 с.
  95. Janakiraman S. Distributed Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 164 с.
  96. Yogesh Kumar,Krishan Kumar and Gulshan Kumar. Feature Selection For Intrusion Detection Systems. – М.: LAP Lambert Academic Publishing, 2014. – 100 с.
  97. Srikanth Hariharan,Ness B. Shroff and Saurabh Bagchi. Secure Neighbor Discovery in Wireless Networks. – М.: LAP Lambert Academic Publishing, 2011. – 52 с.
  98. Saad Usman. Spatio Temporal Anomaly Detector. – М.: LAP Lambert Academic Publishing, 2011. – 84 с.
  99. Xiaodong He. Automated intrusion prevention mechanism in enhancing network security. – М.: Scholars' Press, 2014. – 128 с.
  100. Syed Zahidur Rashid. Computer Network Security Monitoring. – М.: Scholars' Press, 2015. – 284 с.
  101. K. Shaila and K. R. Venugopal. Secure Data Communication in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2014. – 240 с.
  102. Lanier Watkins. Resource Discovery: Using Network Traffic To Infer CPU And Memory Load. – М.: LAP Lambert Academic Publishing, 2014. – 96 с.
  103. Gulshan Kumar. Effective Intrusion Detection using Feature Selection. – М.: LAP Lambert Academic Publishing, 2014. – 92 с.
  104. Mrutyunjaya Panda and Manas Ranjan Patra. A Data Mining Approach to Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2015. – 216 с.
  105. Glenn Wilkinson. Identification of Hostile TCP Traffic using Support Vector Machines. – М.: LAP Lambert Academic Publishing, 2010. – 80 с.
  106. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  107. Mueen Uddin. Dynamic Multi Layer Signature based IDS System using Mobile Agents. – М.: LAP Lambert Academic Publishing, 2011. – 72 с.
  108. Ivano Malavolta. A tamper resistant Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2011. – 144 с.
  109. Prashant Kumar Singh and Avimanyou Kumar Vatsa. Taxonomy Based Intrusion Attacks and Detection Scheme in P2P Network. – М.: LAP Lambert Academic Publishing, 2012. – 56 с.
  110. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  111. Shaffali Gupta and Sanmeet Kaur. A GUI Framework for detecting Intrusions using Bro IDS. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  112. Mahmoud Jazzar. Computer Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 240 с.
  113. Siva S. Sivatha Sindhu,S. Geetha and S. Selvakumar. Network Intrusion Detection System using Machine Learning Techniques. – М.: LAP Lambert Academic Publishing, 2013. – 80 с.
  114. Gaurav Mishra and Gulshan Ahuja. Classification of data mining techniques in intrusion detection. – М.: LAP Lambert Academic Publishing, 2013. – 52 с.
  115. Nasim Beigi-Mohammadi. Smart Meter Networks: Intrusion Detection System by Design. – М.: LAP Lambert Academic Publishing, 2014. – 136 с.
  116. Christian Chetachi Umunna. Distributed Intrusion Detection System in Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 104 с.
  117. Iftikhar Ahmad. Feature Subset Selection in Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 220 с.
  118. Saima Munawar. Detection and Classification Of Normal and Anomaly IP Packet. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  119. Jabarweer Singh,Krishan Kumar and Gulshan Kumar. Intrusion detection using artificial intelligence based ensembles. – М.: LAP Lambert Academic Publishing, 2014. – 116 с.
  120. Govind Sreekar Shenoy. Architecture Support for Intrusion Detection systems. – М.: LAP Lambert Academic Publishing, 2014. – 160 с.
  121. Monis Akhlaq,Irfan Awan and Faeiz Alserhani. Improved Performance High Speed Network Intrusion Detection Systems. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  122. Prakash Prasad. Intrusion Detection System: Findings. – М.: LAP Lambert Academic Publishing, 2011. – 104 с.
  123. Homam El-Taj and Omar Amer. Network Alert Management System For IDS False Positive Reduction. – М.: LAP Lambert Academic Publishing, 2013. – 156 с.
  124. Manju Bala and R. K. Agrawal. Multiple Classifier Systems Analysis and Design. – М.: LAP Lambert Academic Publishing, 2012. – 128 с.
  125. Sultan H. Aljahdali and Mohd. Junedul Haque. Intelligent Approaches to Data Management. – М.: LAP Lambert Academic Publishing, 2013. – 116 с.
  126. Bibi Masoomeh Aslahi Shahri. Intrusion Detection System Using Hybrid Gsa-kmeans. – М.: LAP Lambert Academic Publishing, 2014. – 128 с.
  127. Muna Elsadig Mohamed Ahmed Elsheik. Bio Inspired Intrusion Prevention and Self healing System for Networks. – М.: LAP Lambert Academic Publishing, 2012. – 256 с.
  128. Amanpreet Chauhan. Survey on data mining techniques in intrusion detection. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  129. Tigabu Dagne Akal. Constructing Predictive Model for Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 160 с.
  130. Kamaruzaman Maskat and Mohd Afizi Mohd Shukran. Agent Based Snort In Distributed Environment. – М.: LAP Lambert Academic Publishing, 2013. – 112 с.
  131. Kamrul Hasan. An Investigation into Botnet Detection System. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  132. Rupali Pathak. Recent Advances In Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  133. Mafaz M. K. Al-Anezi and Najla B. I. Al-Dabagh. Multilayer Artificial Immune Systems for Intrusion & Malware Detection. – М.: LAP Lambert Academic Publishing, 2012. – 148 с.
  134. Mohamed Nassar. Voice over IP Networks Monitoring. – М.: LAP Lambert Academic Publishing, 2009. – 172 с.
  135. vudasreenivasa rao. DISTRIBUTED DATA MINING AND MINING MULTI-AGENT DATA. – М.: LAP Lambert Academic Publishing, 2011. – 152 с.
  136. Al-Sakib Khan Pathan. Securing WSN with Lightweight Resource-Efficient Schemes. – М.: LAP Lambert Academic Publishing, 2011. – 116 с.
  137. Alpay Doruk. Security Review Program Requirements for Intrusion Management Systems. – М.: LAP Lambert Academic Publishing, 2010. – 88 с.
  138. Sathish Kumar. Intrusion Detection and Response Techniques for Mobile Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 200 с.
  139. Richard Rimiru. Exploring Immune System's Concepts for the Design of Novel AIS Models. – М.: LAP Lambert Academic Publishing, 2012. – 164 с.
  140. Khandakar Entenam Unayes Ahmed. IDENTITY AND ACCESS MANAGEMENT IN CLOUD COMPUTING. – М.: LAP Lambert Academic Publishing, 2011. – 172 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

Ничего не найдено

Образцы работ

Тема и предметТип и объем работы
Коммерческие банки как субъект кредитного рынка, их операции и сделки
Банковский менеджмент
Диплом
87 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Саша
Вчера защитилась, спасибо Вам большое за чудесный диплом после вашего сопровождения!!!)