Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Rob Cameron. Juniper(r) Networks Secure Access SSL VPN Configuration Guide. – М.: , 2010. – 656 с.

Дополнительные результаты

  1. Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с.
  2. Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  3. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с.
  4. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с.
  5. Jane M. Lommel. NetWork : Maximum Access to Career Resources on the Internet. – М.: , 0. – 0 с.
  6. Sean Cleary. Canadian Securities Exam : Fast-Track Study Guide. – М.: , 0. – 0 с.
  7. Timothy Braithwaite. Securing E-Business Systems: A Guide for Managers and Executives. – М.: , 0. – 0 с.
  8. Thomas J. Parenty. Digital Defense: What You Should Know About Protecting Your Company's Assets. – М.: , 0. – 0 с.
  9. Barry Slawter. Network Security: Developing and Implementing Effective Enterprise Strategies. – М.: , 0. – 0 с.
  10. Henry Chan, Raymond Lee, Tharam Dillon, Elizabeth Chang, Henry Chan, Raymond Lee, Tharam Dillon. Electronic Commerce: Fundamentals & Applications. – М.: , 0. – 0 с.
  11. Joel Siegel. The International Handbook of Electronic Commerce. – М.: , 0. – 0 с.
  12. Jonathan Davidson, Tina Fox, Phil Bailey, Rommel Bajamundi, Wayne Cheung, Thu Dao, Sachin Gupta, Christina Hattingh, Ted Huff, Stephen Liu. Deploying Cisco Voice over IP Solutions. – М.: , 0. – 0 с.
  13. Richard Mansfield. Visual Basic .NET All in One Desk Reference for Dummies. – М.: , 0. – 0 с.
  14. Roberta Bragg. MCSE Training Guide (70-220): Windows 2000 Network Security Design, Second Edition. – М.: , 0. – 0 с.
  15. Dave Bixler, Will Schmied, Ed Tittel. MCSA/MCSE 70-291 Training Guide: Implementing, Managing, and Maintaining a Windows Server 2003 Network Infrastructure. – М.: , 0. – 0 с.
  16. Jae K. Shim, Anique A. Qureshi, Joel G. Siegel, Roberta M. Siegel. The International Handbook of Electronic Commerce. – М.: , 0. – 0 с.
  17. Dave Bixler, James Michael Stewart. MCSE Windows 2000 Network Infrastructure Design Training Guide (With CD-ROM). – М.: , 0. – 0 с.
  18. George H. Bodnar. Accounting Information Systems (9th Edition). – М.: , 2003. – 0 с.
  19. Valerie Feldmann. Leveraging Mobile Media : Cross-Media Strategy and Innovation Policy for Mobile Media Communication (Information Age Economy). – М.: , 2005. – 0 с.
  20. Peter R., MBA Ramsaroop. Securing Business Intelligence: Knowledge and CyberSecurity in the Post 9/11 World. – М.: , 2004. – 0 с.
  21. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с.
  22. Rickland Hollar. Enterprise Web Services Security (Internet Series). – М.: , 2005. – 432 с.
  23. Ron Ben Natan. Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase. – М.: , 2005. – 432 с.
  24. Sean, Ph.D., CFA Cleary. Canadian Securities Exam: Fast-Track Study Guide. – М.: , 2007. – 352 с.
  25. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с.
  26. Network Security. – М.: , 2008. – 370 с.
  27. James Michael Stewart, Ed Tittel, Mike Chapple. CISSP: Certified Information Systems Security Professional Study Guide. – М.: , 2008. – 841 с.
  28. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с.
  29. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с.
  30. Daniel Clark. Network Access Control 100 Success Secrets - 100 Most Asked NAC Questions on Implementation and Deployment of unify endpoint security technology, user ... and network security enforcement. – М.: , 2008. – 180 с.
  31. Jeff Crume. Inside Internet Security: What Hackers Don't Want You To Know. – М.: , 0. – 0 с.
  32. Bill Ferguson. CompTIA Network+ Review Guide. – М.: , 2009. – 264 с.
  33. Michael Jang. MasteringTM Red Hat® Linux 9. – М.: , 2003. – 976 с.
  34. Rob Scrimger, Paul LaSalle, Mridula Parihar, Meeta Gupta. TCP/IP Bible. – М.: John Wiley and Sons, Ltd, 2002. – 624 с.
  35. Kelley J.P. Lindberg. Novell?s NetWare® 5 Basics. – М.: , 1999. – 342 с.
  36. Rob Cameron. Juniper(r) Networks Secure Access SSL VPN Configuration Guide. – М.: , 2010. – 656 с.
  37. Owen Poole. Network Security. – М.: , 2010. – 224 с.
  38. Syngress. Firewall Policies and VPN Configurations. – М.: , 2010. – 550 с.
  39. James Joshi. Network Security: Know It All. – М.: , 2010. – 368 с.
  40. Steve Manzuik. Network Security Assessment: From Vulnerability to Patch. – М.: , 2010. – 500 с.
  41. Jan L. Harrington. Network Security. – М.: , 2010. – 384 с.
  42. Russ Rogers. Network Security Evaluation Using the NSA IEM. – М.: , 2010. – 450 с.
  43. Brien Posey. GFI Network Security and PCI Compliance Power Tools. – М.: , 2010. – 488 с.
  44. Andrew Hay. Nokia Firewall, VPN, and IPSO Configuration Guide. – М.: , 2010. – 488 с.
  45. Syngress. Managing Cisco Network Security 2E. – М.: , 2010. – 752 с.
  46. Bill English. MCSA/MCSE: Windows® 2000 Network Security Administration Study Guide. – М.: , 2003. – 574 с.
  47. Russ Kaufman. MCSA/MCSE: Windows® Server 2003 Network Security Administration Study Guide. – М.: , 2004. – 560 с.
  48. Nitesh Dhanjani. Network Security Tools. – М.: , 2005. – 340 с.
  49. EDWARD. Microsoft Access 2000 Developer?s Guide. – М.: , 1999. – 900 с.
  50. Thomas W. Madron. Network Security in the 90?s. – М.: , 1992. – 304 с.
  51. Microsoft. MCSE Training Kit (Exam 70–220) – Designing Microsoft Windows 2000 Network Security. – М.: , 2001. – 864 с.
  52. Andrew Lockhart. Network Security Hacks. – М.: , 2004. – 316 с.
  53. DAN. Network Security In A Mixed Environment. – М.: , 1998. – 456 с.
  54. Matthew Strebe. Network Security JumpStartTM. – М.: , 2002. – 384 с.
  55. Pawan K Bhardwaj. A+. Network+, Security+ Exams in a Nutshell. – М.: , 2007. – 812 с.
  56. Eric Cole. Network Security Bible. – М.: , 2005. – 694 с.
  57. Eric Cole. Wiley Pathways Network Security Fundamentals Project Manual. – М.: , 2008. – 312 с.
  58. Andrew Lockhart. Network Security Hacks 2e. – М.: , 2006. – 352 с.
  59. Chris Mcnab. Network Security Assessment 2e. – М.: , 2007. – 464 с.
  60. Cryptography & Network Security. – М.: , 2007. – 0 с.
  61. Securing Global Transportation Networks. – М.: , 2011. – 312 с.
  62. Shon Harris. CISSP All-in-One Exam Guide (+ CD-ROM). – М.: McGraw-Hill Companies, 2010. – 1216 с.
  63. Richard A. Deal. Cisco Asa Configuration. – М.: McGraw-Hill, 2009. – 752 с.
  64. Comptia Security+ All-In-One Exam Guide, Second Edition (Exam Sy0-201). – М.: , 2011. – 0 с.
  65. Mcitp Windows Vista Support Technician All-In-One Exam Guide (Exam 70-620, 70-622, & 70-623). – М.: , 2011. – 0 с.
  66. Pc Quicksteps, Second Edition. – М.: , 2011. – 240 с.
  67. Citrix® Access Suite Security For It Administrators. – М.: , 2011. – 268 с.
  68. Secure Metrics: A Beginners Guide. – М.: , 2011. – 400 с.
  69. Wireless Network Security A Beginners Guide. – М.: , 2011. – 400 с.
  70. Cissp Practice Exams. – М.: , 2011. – 414 с.
  71. Security Information And Event Management (Siem) Implementation. – М.: , 2011. – 464 с.
  72. Principles Of Computer Security Comptia Security+ And Beyond Lab Manual, Second Edition. – М.: , 2011. – 352 с.
  73. Network Security: The Complete Reference. – М.: , 2011. – 896 с.
  74. Fundamentals Of Network Security. – М.: , 2011. – 672 с.
  75. Greg Holden. Guide to Firewalls and Network Security: Intrusion Detection and VPNs. – М.: Course Technology, 2003. – 512 с.
  76. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . –  с.
  77. Dave Tyson. Security Convergence: Managing Enterprise Security Risk. – М.: , 2007. – 232 с.
  78. Michael Gregg, Eric Seagren, Angela Orebaugh, Matt Jonkman, Raffael Marty. How to Cheat at Configuring Open Source Security Tools (How to Cheat) (How to Cheat). – М.: , 2007. – 528 с.
  79. Fred Eady. Implementing 802.11 with Microcontrollers: Wireless Networking for Embedded Systems Designers (Embedded Technology). – М.: , 2005. – 400 с.
  80. Susan Snedaker. Syngress IT Security Project Management Handbook. – М.: Syngress, 2006. – 612 с.
  81. Thomas W. Shinder. The Best Damn Firewall Book Period. – М.: Syngress, 2007. – 1000 с.
  82. Ido Dubrawsky. How to Cheat at Securing Your Network. – М.: Syngress, 2007. – 432 с.
  83. Ido Dubrawsky. CompTIA Security+ Certification Study Guide, Third Edition: Exam SYO-201 3E. – М.: , 2009. – 752 с.
  84. Md. Mahmudul Hasan Rafee and Sharmin Akter Lima. Proximity Based Access Control (PBAC). – М.: LAP Lambert Academic Publishing, 2012. – 160 с.
  85. Varun K.,Sushil R. S. and Sanjay J. Recognition of Human Iris Patterns. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  86. Shaikh Salim and Shankar Nawale. Secure Access of RFID System. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  87. Shaek Rana Mohammad Baki Billah and Mohammad Hafizur Rahman. Design & Development of Network Security System using IP Tables. – М.: LAP Lambert Academic Publishing, 2013. – 164 с.
  88. Xiangqian Chen. DEFENSE AGAINST NODE COMPROMISE IN SENSOR NETWORK SECURITY. – М.: LAP Lambert Academic Publishing, 2009. – 108 с.
  89. Saeed Ur Rehman. Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 132 с.
  90. Alessandro Vittorio Bergami. Masonry infilled r.c. frames. – М.: LAP Lambert Academic Publishing, 2011. – 160 с.
  91. M. Sadiq Ali Khan and S. M. Aqil Burney. Recent Trends in Intrusion Detection System & Network Monitoring. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  92. Morteza Rafiei. Food Security Measurement Guide. – М.: LAP Lambert Academic Publishing, 2014. – 108 с.
  93. Krishna Das. Spatial Pattern of Road Network Development in Assam. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  94. Ephrem Tekele Woldehana. GIS and Remote Sensing Based Rural Road Network Analysis. – М.: LAP Lambert Academic Publishing, 2013. – 104 с.
  95. Ankur Gupta and Bhupendra Gupta. Random Networks and its Applications. – М.: LAP Lambert Academic Publishing, 2013. – 100 с.
  96. Kabtamu Niguse. Land Tenure and Tenure Security Among Somali Pastorals of Ethiopia. – М.: LAP Lambert Academic Publishing, 2012. – 188 с.
  97. Catherine Doldirina. The Common Good and Access to Remote Sensing Data. – М.: LAP Lambert Academic Publishing, 2011. – 252 с.
  98. John Meyer and Amanda Barefield. Developing and Sustaining Online Education. – М.: LAP Lambert Academic Publishing, 2010. – 100 с.
  99. Anil Kumar V. and Prasad E. Dynamic Broadcast Routing With Security Enhancement. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  100. Xiaodong He. Automated intrusion prevention mechanism in enhancing network security. – М.: Scholars' Press, 2014. – 128 с.
  101. Syed Zahidur Rashid. Computer Network Security Monitoring. – М.: Scholars' Press, 2015. – 284 с.
  102. Elliot Attipoe. Securing the Public Wireless Network. – М.: LAP Lambert Academic Publishing, 2013. – 92 с.
  103. Mamunur Rashid and Bellal Hossain. WiMAX Security Architecture. – М.: LAP Lambert Academic Publishing, 2014. – 76 с.
  104. Mohammad AlAhmad. Security threats of finger print biometric in network system. – М.: LAP Lambert Academic Publishing, 2014. – 88 с.
  105. Nirbhay Chaubey. Securing AODV Routing Protocol in design of Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2015. – 132 с.
  106. Aditya Kumar. Cryptography and Chaos a New Approach in Network Security. – М.: LAP Lambert Academic Publishing, 2015. – 80 с.
  107. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  108. Srikanthreddy Arimanda and Manojkumar Kolli. Performance Study Of Security Mechanismsm For Mobile Agent Domain. – М.: LAP Lambert Academic Publishing, 2011. – 84 с.
  109. Marimuthu Kanagaraj and Eswari Venkatachalam. Multifactor Authentication Protocol for a Secured WSN. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  110. Gurpreet juneja. Security:MPLS VPN Network. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  111. Omid Mahdi Ebadati E.,Harleen Kaur M. Afshar Alam and Kaebeh Yaeghoobi. Micro-Firewalls for Dynamic Network Security Framework. – М.: LAP Lambert Academic Publishing, 2012. – 292 с.
  112. Wisam Elmasry. Securing WBAODV Routing Protocol in MANETs. – М.: LAP Lambert Academic Publishing, 2013. – 100 с.
  113. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  114. Shaffali Gupta and Sanmeet Kaur. A GUI Framework for detecting Intrusions using Bro IDS. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  115. Vincent Omollo. Enhanced Network Security. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  116. MARCO SPOHN. Using Dominating Sets to Improve the Performance of ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 164 с.
  117. Firkhan Ali Hamid Ali. Vulnerability Analysis on the Computer Network Security. – М.: LAP Lambert Academic Publishing, 2010. – 72 с.
  118. Sunil Kumar Senapati and Prof. Pabitra Mohan Khilar. SECURING FSR PROTOCOL AGAINST DATA PACKET DROPPING IN MANET. – М.: LAP Lambert Academic Publishing, 2010. – 64 с.
  119. Imran Sohail and Sikandar Hayat. Network Security and DDoS. – М.: LAP Lambert Academic Publishing, 2010. – 64 с.
  120. Christian Chetachi Umunna. Distributed Intrusion Detection System in Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 104 с.
  121. Xiaolong Li. Modeling and Performance Analysis of Mobile Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 120 с.
  122. ANNADURAI P and Dr. V. PALANISAMY. Impact of Black Hole Attack on Multicast in Ad hoc Network (IBAMA). – М.: LAP Lambert Academic Publishing, 2011. – 84 с.
  123. Kirat Pal Singh. MIPS Pipeline Cryptoprocessor. – М.: LAP Lambert Academic Publishing, 2012. – 480 с.
  124. Deniz Akkaya and Fabien Thalgott. Honeypots in Network Security. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  125. Kefa Rabah. Mastering Securing ICT Infrastructure for Corporate Network. – М.: LAP Lambert Academic Publishing, 2014. – 360 с.
  126. Muna Elsadig Mohamed Ahmed Elsheik. Bio Inspired Intrusion Prevention and Self healing System for Networks. – М.: LAP Lambert Academic Publishing, 2012. – 256 с.
  127. Mohammad Faisal. Networks Security and Communication. – М.: LAP Lambert Academic Publishing, 2012. – 56 с.
  128. Affan Yasin,Hafiz Adnan Shafiq and Muhammad Ijlal Hasnain. Software Architecture for Centralized Health Database. – М.: LAP Lambert Academic Publishing, 2013. – 64 с.
  129. Edmond K. Machie. Network Attack Traceback And React. – М.: LAP Lambert Academic Publishing, 2013. – 208 с.
  130. Tanveer Zia. A Security Framework for Wireless Sensor Networks (WSN). – М.: LAP Lambert Academic Publishing, 2013. – 160 с.
  131. Dirk Lessner. Network Security for Embedded Systems. – М.: LAP Lambert Academic Publishing, 2009. – 232 с.
  132. Shivan Fazil Sabr. Cloud Computing Security. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  133. Amit Choudhary. Routing Security Issues in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2014. – 80 с.
  134. Mohamed Nassar. Voice over IP Networks Monitoring. – М.: LAP Lambert Academic Publishing, 2009. – 172 с.
  135. Liang Song. Large Scale Cognitive Wireless Networks. – М.: LAP Lambert Academic Publishing, 2010. – 208 с.
  136. Nathan Darmawan. Shielding Your Company with a Better Network Security Design. – М.: LAP Lambert Academic Publishing, 2010. – 180 с.
  137. Rinaldi Yulius. DESIGN OF A CYBER SECURITY LABORATORY. – М.: LAP Lambert Academic Publishing, 2010. – 140 с.
  138. Nirmalya Kar,Ashim Saha and Mrinal Kanti Debbarma. Biometric Based Attendance System. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  139. Arpita Mondal. Simple and Secured Access to Networked Home Appliances via Internet. – М.: LAP Lambert Academic Publishing, 2010. – 180 с.
  140. Prashant Pittalia. Ecommerce Security Real Life Cases And Practical Solutions. – М.: , 2015. – 72 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Банковский бизнес: взгляд непостороннего наблюдателя. интервью с Г. Киперварг, заместителем генерального директора компании "R-Style Softlab". "Банковское дело в Москве", № 6, июнь 2006.
  2. Основная проблема для руководителя - самому определиться, эффективен ли менеджер. интервью с Б.Б. Ренским, вице-президентом группы компаний R & K по организационному развитию. "Управление персоналом", № 9, май 2006.
  3. Система с видом на будущее. интервью с А. Зусиным, заместителем председателя Правления АКБ "Электроника" и Г. Киперварг, заместителем генерального директора "R-Style Softlab". "Банковское дело в Москве", № 4, апрель 2006.
  4. R-Style Softlab: новые возможности и перспективы развития. Е. Смирнов, "Расчеты и операционная работа в коммерческом банке", № 1, январь 2006.
  5. Новости от "R-Style Softlab". "Банковское дело в Москве", № 2, февраль 2005.
  6. Почему госкомпании неэффективны в сравнении с частными?. интервью с И.  Богдановым, управляющим партнером BIRC. до 2011 года BI&R Consulting. А. Гончаров, "Управление персоналом", N 12, июнь 2012 г.
  7. Команда из десяти управленцев во главе с одним генеральным способна сделать больше, чем один генеральный с десятью помощниками. интервью с И. Богдановым, управляющим партнером BIRC. до 2011 года BI&R Consulting. Е. Баранова, "Управление персоналом", N 8, апрель 2012 г.
  8. Как создать базу данных регистрации трудовых договоров и дополнительных соглашений к ним в MS Access 2007. А. Лобанова, "Кадровик. Кадровое делопроизводство", N 7, 8, июль, август 2011 г.
  9. Основной арсенал "охотника" - его network: кого он знает на рынке и качество этих отношений. С. Плетнева, "Управление персоналом", № 12, июнь 2009.
  10. Формирование базы данных персонального учета сотрудников с использованием Microsoft Access. Е. Гурова, "Кадровик. Кадровое делопроизводство", № 6, июнь 2009.
  11. Публичные горизонты. интервью с А. Киреевым, первым вице-президентом компании R-Style. К. Дяконов, "Консультант", № 7, апрель 2008.

Образцы работ

Тема и предметТип и объем работы
Выбор системы управления базами данных туризма
Информатика
Реферат
11 стр.
Информатика
Информатика
Реферат
12 стр.
Информатика
Информатика
Реферат
16 стр.
Информатика
Информатика
Реферат
18 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Ольга
Марина, огромное Вам спасибо, Вы меня спасаете.