Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с. Fundamentals Of Network Security. – М.: , 2011. – 672 с. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . – с. Дополнительные результаты Trust Management VI: 6th IFIP WG 11.11 International Conference, IFIPTM 2012, Surat, India, May 21-25, 2012, Proceedings (IFIP Advances in Information and Communication Technology). – М.: , 2012. – 298 с. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с. Technological Innovation for Value Creation: Third IFIP WG 5.5/SOCOLNET Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS ... in Information and Communication Technology). – М.: , 2012. – 607 с. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с. Kern Peng. Equipment Management in the Post-Maintenance Era: A New Alternative to Total Productive Maintenance (TPM). – М.: , 2012. – 255 с. Advances in Management Accounting, Volume 9. – М.: , 0. – 0 с. J.Y. Lee, M.J. Epstein. Advances in Management Accounting, Volume 11. – М.: , 0. – 0 с. Marc J. Epstein, John Y. Lee. Advances in Management Accounting, Volume 8. – М.: , 0. – 0 с. John Wang. Innovations in Information Systems for Business Functionality and Operations Management. – М.: , 2012. – 378 с. Jacques Janssen, Christos H. Skiadas, Constantin Zopounidis. Advances in Stochastic Modelling and Data Analysis. – М.: , 0. – 0 с. Fritz Drasgow, Neil Schmitt. Measuring & Analyzing Behavior in Organizations: Advances in Measurement & Data Analysis. – М.: , 0. – 0 с. Barbara C. McNurlin, Ralph H. Sprague. Information Systems Management in Practice (5th Edition). – М.: , 0. – 0 с. Safe Schools: A Security and Loss Prevention Plan. – М.: , 0. – 0 с. Erhan Kozan, Azuma Ohuchi. Operations Research/Management Science at Work (Advances in Information Security). – М.: , 0. – 0 с. Leigh Wade. Careers in Private Security: How to Get Started, How to Get Ahead. – М.: , 0. – 0 с. Panos M. Pardalos, Yannis Siskos, Constantin Zopounidis. Advances in Multicriteria Analysis (Nonconvex Optimization and Its Applications ; V. 5). – М.: , 0. – 0 с. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с. Andrew Hawker. Security in Information Systems : A Guide for Business and Accounting. – М.: , 0. – 0 с. Ifip Tc11 Wg11.5 Working Conference on Integrity and Internal Control, Michael Gertz. Integrity and Internal Control in Information Systems V: Ifip Tc11/Wg11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (Iicis), November 11-12, 2002, Bonn, Germany (International Federation for Information Processing. – М.: , 0. – 0 с. Mehdi Khosrow-Pour. Advanced Topics in Information Resources Management, Volume 2. – М.: , 0. – 0 с. Edward J., Ph.D. Szewczak, Coral R., Ph.D. Snodgrass. Human Factors in Information Systems. – М.: , 0. – 0 с. Mehdi Khosrow-Pour. Advanced Topics in Information Resources Management (Advanced Topics in Information Resources Management, Vol 3). – М.: , 0. – 0 с. Dorothy E. Denning, Peter J. Denning. Internet Besieged. – М.: , 0. – 0 с. Marvin V. Zelkowitz. Advances in Computers, Volume 53: Emphasizing Distributed Systems. – М.: , 0. – 0 с. Eugene Kaluzniacky. Managing Psychological Factors in Information Systems Work: An Orientation to Emotional Intelligence. – М.: , 0. – 0 с. Harold F. Tipton, Micki Krause, Micki, Cissp Krause. Information Security Management Handbook, Fifth Edition. – М.: , 0. – 0 с. Ifip Tc5, Wg5.7 International Conference on Advances in Production Mana, Harinder S. Jagdev, J. C. Wortmann, H. J. Pels. Collaborative Systems for Production Management: Ifip Tc5/Wg5.7 International Conference on Advanced Sic in Production Management Systems, September 8 ... Federation for Information Processing, ?257). – М.: , 0. – 0 с. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с. Barbara C. McNurlin. Information Systems Management in Practice (7th Edition). – М.: , 2005. – 0 с. Advanced Topics in Information Resources Management (Advanced Topics in Information Resources Management). – М.: , 2004. – 0 с. Advances in Security and Payment Methods for Mobile Commerce. – М.: , 2004. – 0 с. Economics of Information Security (Advances in Information Security). – М.: , 2004. – 0 с. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с. Advances in Electronic Marketing. – М.: , 2005. – 317 с. Paul Piccard, Jeremy Faircloth. Combating Spyware in the Enterprise. – М.: , 2006. – 386 с. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с. Advances in Management Accounting. – М.: , 2006. – 228 с. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с. Privacy-Preserving Data Mining: Models and Algorithms (Advances in Database Systems). – М.: , 2008. – 514 с. Patrick Traynor, Patrick McDaniel, Thomas La Porta. Security for Telecommunications Networks (Advances in Information Security). – М.: , 2008. – 182 с. Major Currents in Information Systems (SAGE Library in Business and Management). – М.: , 2008. – 2424 с. Healthcare Information Systems and Informatics: Research and Practices (Advances in Healthcare Information Systems and Informatics) (Advances in Healthcare Information Systems and Informatics). – М.: , 2008. – 448 с. Encyclopedia of Human Resources Information Systems: Challenges in E-hrm. – М.: , 2008. – 1010 с. Social and Human Elements of Information Security: Emerging Trends and Countermeasures (Premier Reference Source). – М.: , 2008. – 412 с. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с. Gerard Blokdijk, Ivanka Menken. Information Security Management Best Practice Workbook: Implementation and Management Roadmap for Threats, Challenges and Solutions - Ready to use supporting documents bringing Theory into Practice. – М.: , 2008. – 124 с. Planning for Information Systems (Advances in Management Information Systems). – М.: , 2009. – 528 с. Hamid R. Nemati. Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues (Advances in Information Security and Privacy). – М.: , 2009. – 414 с. Jay Ramanathan, Rajiv Ramnath. Co-engineering Applications and Adaptive Business Technologies in Practice: Enterprise Service Ontologies, Models, and Frameworks (Advances in Information Resources Management). – М.: , 2009. – 426 с. Alan Calder. Information Security based on ISO 27001/ISO 27002: A Management Guide. – М.: , 2009. – 83 с. Alan Calder, Steve G Watkins. Information Security Risk Management for ISO27001 / ISO27002. – М.: , 2010. – 198 с. Alan Hevner, Samir Chatterjee. Design Research in Information Systems: Theory and Practice (Integrated Series in Information Systems). – М.: , 2010. – 393 с. WALLACE. ADVANCES IN EXPERT SYSTEMS FOR MANAGEMENT, VOLUME 2Advances in System Management (AESM). – М.: , 2010. – 0 с. Innovations and Advances in Computer Sciences and Engineering. – М.: , 2010. – 400 с. Signal Transduction in the Cardiovascular System in Health and Disease (Advances in Biochemistry in Health and Disease). – М.: , 2008. – 424 с. Advances in Statistical Control, Algebraic Systems Theory, and Dynamic Systems Characteristics: A Tribute to Michael K. Sain (Systems & Control: Foundations & Applications). – М.: , 2008. – 386 с. Advances in Music Information Retrieval (Studies in Computational Intelligence). – М.: , 2010. – 420 с. Global Perspectives In Information Security. – М.: , 2008. – 896 с. David Avison. Research in Information Systems. – М.: , 2010. – 344 с. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с. Nicholas P Cheremisinoff. Advances in Engineering Fluid Mechanics: Multiphase Reactor and Polymerization System Hydr. – М.: , 2010. – 772 с. Robert Barnard. Intrusion Detection Systems. – М.: , 2010. – 480 с. Michael I Jordan. Advances in Neural Information Processing Systems – Proceeding of the First 12 Conferences CD. – М.: , 2002. – 0 с. Sara A Solla. Advances in Nerual Information Processing Systems 12. – М.: , 2000. – 2002 с. Todd K Leen. Advances in Neural Information Processing Systems 13. – М.: , 2001. – 1100 с. Sebastian Thrun. Advances in Neural Information Processing Systems 16 – Proceedings of the 2003 Conference. – М.: , 2004. – 1656 с. Gerald Tesauro. Advances in Neural Information Processing Systems 7 – Proceedings Nov–Dec 1994 Denver Colorado. – М.: , 1995. – 1168 с. David S Touretzky. Advances in Neural Information Processing Systems 8 – Proceedings of the 1995 Conference. – М.: , 1996. – 1120 с. Advances in the Valuation and Management of Mortgage–Backed Securities. – М.: , 1999. – 318 с. John Van Zandt. Parallel Processing in Information Systems. – М.: , 1992. – 224 с. Advances in Ceramic Coatings and Ceramic–Metal Systems. – М.: , 2006. – 418 с. Michael Kearns. Advances in Neural Information Processing Systems 11. – М.: , 1999. – 1108 с. Richard J. Boland. Critical Issues in Information Systems Research. – М.: , 1991. – 410 с. Budi Martokoesoemo. The On–Line Business Survival Guide in Information Systems and Decision Sciences Featuring the Wall Street Journal Interactive Edition. – М.: , 1998. – 64 с. Nickerson. Nickerson: ?using? Computers Human Factors In Information Systems (cloth). – М.: , 1986. – 0 с. CCTA. Justifying Investment in Information Systems. – М.: , 1989. – 94 с. Jun Akedo. Advances in Multifunctional Materials and Systems. – М.: , 2010. – 188 с. Raymond S Nickerson. Using Computers Human Factors in Information Systems. – М.: , 1987. – 452 с. Open Source Development, Communities and Quality: IFIP 20th World Computer Congress, Working Group 2.3 on Open Source Software, September 7-10, 2008, ... in Information and Communication Technology). – М.: , 2011. – 417 с. LK DORAISWAMY. Doraiswamy Recent Advances In The ?engineering? Analysis Of Chemically Reacting Systems. – М.: , 1984. – 624 с. Michael I Jordan. Advances in Neural Information Processing Systems 10. – М.: , 1998. – 1116 с. M Jordan. Advances in Neural Information Processing Systems 9. – М.: , 1997. – 1116 с. Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky. Cisco Security Professional's Guide to Secure Intrusion Detection Systems. – М.: , . – с. Mat Santamouris. Advances in Building Energy Research: Volume 4. – М.: Earthscan, 2010. – 310 с. Anup Bhange and Manmeet Kaur Marhas. Anomaly Detection in Network Traffic; A Statistical Approach. – М.: LAP Lambert Academic Publishing, 2012. – 92 с. Gulshan Kumar. Effective Intrusion Detection using Genetic Algorithms. – М.: LAP Lambert Academic Publishing, 2014. – 100 с. Huang-Chun Roan. Network Intrusion Detection Based on Shift-OR Circuit. – М.: LAP Lambert Academic Publishing, 2011. – 60 с. M. Sadiq Ali Khan and S. M. Aqil Burney. Recent Trends in Intrusion Detection System & Network Monitoring. – М.: LAP Lambert Academic Publishing, 2012. – 120 с. Cruceru Madalina. Radiation Detection Systems With Applications in High Energy Physics. – М.: LAP Lambert Academic Publishing, 2012. – 84 с. Basanti Jena,K. Sadasiva Rao and D. Das. Canine Pyometra: Recent Advances in Therapeutic Management. – М.: LAP Lambert Academic Publishing, 2014. – 204 с. Abhay Nath Singh. Honeypot Based Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 68 с. Shahnawaz Husain,S. C. Gupta and R. C. Joshi. Intrusion Detection Engine for Adhoc Environment. – М.: LAP Lambert Academic Publishing, 2013. – 120 с. Sumaya Saad Sulaiman and Sarab M. Hameed. A Fuzzy Based Clustering for Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 120 с. Shubha Puthran and Ketan Shah. Intrusion Detection System using datamining techniques. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Mohammad S. I. Mamun. Intrusion Detection System Architecture in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Heba Fathy Eid. Computational Intelligence in Network Intrusion Detection System. – М.: Scholars' Press, 2014. – 164 с. Janakiraman S. Distributed Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 164 с. Yogesh Kumar,Krishan Kumar and Gulshan Kumar. Feature Selection For Intrusion Detection Systems. – М.: LAP Lambert Academic Publishing, 2014. – 100 с. Syed Zahidur Rashid. Computer Network Security Monitoring. – М.: Scholars' Press, 2015. – 284 с. Mrutyunjaya Panda and Manas Ranjan Patra. A Data Mining Approach to Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2015. – 216 с. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с. Ivano Malavolta. A tamper resistant Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2011. – 144 с. Shaffali Gupta and Sanmeet Kaur. A GUI Framework for detecting Intrusions using Bro IDS. – М.: LAP Lambert Academic Publishing, 2013. – 76 с. Siva S. Sivatha Sindhu,S. Geetha and S. Selvakumar. Network Intrusion Detection System using Machine Learning Techniques. – М.: LAP Lambert Academic Publishing, 2013. – 80 с. Nasim Beigi-Mohammadi. Smart Meter Networks: Intrusion Detection System by Design. – М.: LAP Lambert Academic Publishing, 2014. – 136 с. Christian Chetachi Umunna. Distributed Intrusion Detection System in Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 104 с. Iftikhar Ahmad. Feature Subset Selection in Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 220 с. Jabarweer Singh,Krishan Kumar and Gulshan Kumar. Intrusion detection using artificial intelligence based ensembles. – М.: LAP Lambert Academic Publishing, 2014. – 116 с. Govind Sreekar Shenoy. Architecture Support for Intrusion Detection systems. – М.: LAP Lambert Academic Publishing, 2014. – 160 с. ILKAY VURAL. Success Factors in Information Systems Outsourcing. – М.: LAP Lambert Academic Publishing, 2010. – 92 с. Yedji Mbangsoua and Dr. Freddie Acosta. Information Security and its Investment Justification. – М.: LAP Lambert Academic Publishing, 2011. – 132 с. Monis Akhlaq,Irfan Awan and Faeiz Alserhani. Improved Performance High Speed Network Intrusion Detection Systems. – М.: LAP Lambert Academic Publishing, 2011. – 132 с. Prakash Prasad. Intrusion Detection System: Findings. – М.: LAP Lambert Academic Publishing, 2011. – 104 с. Yasser Alshehri. Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 156 с. Bibi Masoomeh Aslahi Shahri. Intrusion Detection System Using Hybrid Gsa-kmeans. – М.: LAP Lambert Academic Publishing, 2014. – 128 с. Julien Shabani. Information Security for RFID Systems. – М.: LAP Lambert Academic Publishing, 2011. – 92 с. Debasish Jena. On Protocols for Information Security Services. – М.: LAP Lambert Academic Publishing, 2011. – 136 с. Aliyu Onipede. Biometrics as a tool for Information Security in Aviation industry. – М.: LAP Lambert Academic Publishing, 2012. – 88 с. Edmund Balogun and Usang Inah. Paradigms of Interface Design in Information Systems. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Tigabu Dagne Akal. Constructing Predictive Model for Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 160 с. Kamrul Hasan. An Investigation into Botnet Detection System. – М.: LAP Lambert Academic Publishing, 2013. – 120 с. Furhan Mehmood and Rajia Rafique. Information Security in Financial Organizations. – М.: LAP Lambert Academic Publishing, 2010. – 68 с. Rupali Pathak. Recent Advances In Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 72 с. Saeed Soltanmohammadi. Improving Information System Security by Evaluating Human Factors. – М.: LAP Lambert Academic Publishing, 2014. – 116 с. Ahmed AlNunu. How Much Information Security?. – М.: LAP Lambert Academic Publishing, 2010. – 68 с. Jeffy Mwakalinga. A Framework for Adaptive Information Security Systems. – М.: LAP Lambert Academic Publishing, 2011. – 364 с. Shinsuke Tamura. Elements of Schemes for Preserving Privacies in e-Society Systems. – М.: LAP Lambert Academic Publishing, 2015. – 156 с. Muhammad Imran Tariq. SLA based Information Security Metrics in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2014. – 192 с. Al-Sakib Khan Pathan. Securing WSN with Lightweight Resource-Efficient Schemes. – М.: LAP Lambert Academic Publishing, 2011. – 116 с. Alpay Doruk. Security Review Program Requirements for Intrusion Management Systems. – М.: LAP Lambert Academic Publishing, 2010. – 88 с. Sathish Kumar. Intrusion Detection and Response Techniques for Mobile Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 200 с. PRASANNA POKHREL and Siva Praneeth Babu Vemulapalli. Web Based Information System (WBIS). – М.: LAP Lambert Academic Publishing, 2010. – 80 с. Heba Hatamlah. Health Information Systems (HIS) in Hospitals. – М.: LAP Lambert Academic Publishing, 2012. – 96 с. Alaa Al-Deen Mohammed Hassan. Information Security Management. – М.: LAP Lambert Academic Publishing, 2013. – 188 с. Jun Zheng,Jiantao Gu and Hong Wang. Financial Management and Information Security of Independent Colleges. – М.: LAP Lambert Academic Publishing, 2014. – 256 с. Ying Qian. Mitigating Information Security Risks during Operation Transition. – М.: LAP Lambert Academic Publishing, 2012. – 372 с. Лучшие результаты Ничего не найдено Дополнительные результаты Наука человековедения. интервью с Д. Уолтоном, профессором London Metropolitan University, экспертом CIPD. Chartered Institute of Personnel and Development, автором программы Master of Arts in Human Resource Strategies. И. Смирнова, "Кадровый менеджмент", № 5, июль-август 2007. Банковское отделение будущего. интервью с Камероном МакКворри. Cameron MacQuarrie, менеджером по развитию бизнеса компании Cisco Systems в области корпоративных финансов в регионе EMEA. Европа, Ближний Восток, Африка. Н.Ф. Колюшенко, "Расчеты и операционная работа в коммерческом банке", № 2, февраль 2006. Ловушка для пирата. интервью с И. Слабых, руководителем отдела противодействия интеллектуальному пиратству в России и СНГ Adobe Systems. И. Голова, "Расчет", N 9, сентябрь 2012 г. О качестве сервиса, связанного с запросами на медицинскую информацию. Medical Information Service?. А. Беденков, "Ремедиум", № 1, январь 2012. Trade-in как способ обмена автомобиля. С.Н. Гордеева, "Торговля: бухгалтерский учет и налогообложение", N 2, февраль 2011 г. Проблемы применения универсальной юрисдикции in absentia. Г.А. Королев, "Журнал российского права", № 10, октябрь 2009. Тонкости trade-in. С.А.Королев, "НДС. Проблемы и решения", № 8, август 2009. In-store banking - новая модель банковского бизнеса. А. Пятков, "Банковское обозрение", № 11, ноябрь 2008. Я воспринимаю персонального помощника как напарника червяк должен нравиться рыбке, а не рыбаку. интервью с П.А. Черкашиным, руководителем российского представительства компании Adobe Systems. "Управление персоналом", № 20, октябрь 2008. Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Мария Мариночка! Большое Вам спасибо, я защитилась после ваших консультаций с оценкой отлично. Мне очень понравилось с Вами работать!!! Буду рекомендовать другим студентам. С Уважением и большой признательностью. Еще раз спасибо!