Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Rob Cameron. Juniper(r) Networks Secure Access SSL VPN Configuration Guide. – М.: , 2010. – 656 с. Дополнительные результаты Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с. Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – М.: , 2012. – 283 с. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с. Jane M. Lommel. NetWork : Maximum Access to Career Resources on the Internet. – М.: , 0. – 0 с. Sean Cleary. Canadian Securities Exam : Fast-Track Study Guide. – М.: , 0. – 0 с. Timothy Braithwaite. Securing E-Business Systems: A Guide for Managers and Executives. – М.: , 0. – 0 с. Thomas J. Parenty. Digital Defense: What You Should Know About Protecting Your Company's Assets. – М.: , 0. – 0 с. Barry Slawter. Network Security: Developing and Implementing Effective Enterprise Strategies. – М.: , 0. – 0 с. Henry Chan, Raymond Lee, Tharam Dillon, Elizabeth Chang, Henry Chan, Raymond Lee, Tharam Dillon. Electronic Commerce: Fundamentals & Applications. – М.: , 0. – 0 с. Joel Siegel. The International Handbook of Electronic Commerce. – М.: , 0. – 0 с. Jonathan Davidson, Tina Fox, Phil Bailey, Rommel Bajamundi, Wayne Cheung, Thu Dao, Sachin Gupta, Christina Hattingh, Ted Huff, Stephen Liu. Deploying Cisco Voice over IP Solutions. – М.: , 0. – 0 с. Richard Mansfield. Visual Basic .NET All in One Desk Reference for Dummies. – М.: , 0. – 0 с. Roberta Bragg. MCSE Training Guide (70-220): Windows 2000 Network Security Design, Second Edition. – М.: , 0. – 0 с. Dave Bixler, Will Schmied, Ed Tittel. MCSA/MCSE 70-291 Training Guide: Implementing, Managing, and Maintaining a Windows Server 2003 Network Infrastructure. – М.: , 0. – 0 с. Jae K. Shim, Anique A. Qureshi, Joel G. Siegel, Roberta M. Siegel. The International Handbook of Electronic Commerce. – М.: , 0. – 0 с. Dave Bixler, James Michael Stewart. MCSE Windows 2000 Network Infrastructure Design Training Guide (With CD-ROM). – М.: , 0. – 0 с. George H. Bodnar. Accounting Information Systems (9th Edition). – М.: , 2003. – 0 с. Valerie Feldmann. Leveraging Mobile Media : Cross-Media Strategy and Innovation Policy for Mobile Media Communication (Information Age Economy). – М.: , 2005. – 0 с. Peter R., MBA Ramsaroop. Securing Business Intelligence: Knowledge and CyberSecurity in the Post 9/11 World. – М.: , 2004. – 0 с. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с. Rickland Hollar. Enterprise Web Services Security (Internet Series). – М.: , 2005. – 432 с. Ron Ben Natan. Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase. – М.: , 2005. – 432 с. Sean, Ph.D., CFA Cleary. Canadian Securities Exam: Fast-Track Study Guide. – М.: , 2007. – 352 с. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с. Network Security. – М.: , 2008. – 370 с. James Michael Stewart, Ed Tittel, Mike Chapple. CISSP: Certified Information Systems Security Professional Study Guide. – М.: , 2008. – 841 с. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с. Daniel Clark. Network Access Control 100 Success Secrets - 100 Most Asked NAC Questions on Implementation and Deployment of unify endpoint security technology, user ... and network security enforcement. – М.: , 2008. – 180 с. Jeff Crume. Inside Internet Security: What Hackers Don't Want You To Know. – М.: , 0. – 0 с. Bill Ferguson. CompTIA Network+ Review Guide. – М.: , 2009. – 264 с. Michael Jang. MasteringTM Red Hat® Linux 9. – М.: , 2003. – 976 с. Rob Scrimger, Paul LaSalle, Mridula Parihar, Meeta Gupta. TCP/IP Bible. – М.: John Wiley and Sons, Ltd, 2002. – 624 с. Kelley J.P. Lindberg. Novell?s NetWare® 5 Basics. – М.: , 1999. – 342 с. Rob Cameron. Juniper(r) Networks Secure Access SSL VPN Configuration Guide. – М.: , 2010. – 656 с. Owen Poole. Network Security. – М.: , 2010. – 224 с. Syngress. Firewall Policies and VPN Configurations. – М.: , 2010. – 550 с. James Joshi. Network Security: Know It All. – М.: , 2010. – 368 с. Steve Manzuik. Network Security Assessment: From Vulnerability to Patch. – М.: , 2010. – 500 с. Jan L. Harrington. Network Security. – М.: , 2010. – 384 с. Russ Rogers. Network Security Evaluation Using the NSA IEM. – М.: , 2010. – 450 с. Brien Posey. GFI Network Security and PCI Compliance Power Tools. – М.: , 2010. – 488 с. Andrew Hay. Nokia Firewall, VPN, and IPSO Configuration Guide. – М.: , 2010. – 488 с. Syngress. Managing Cisco Network Security 2E. – М.: , 2010. – 752 с. Bill English. MCSA/MCSE: Windows® 2000 Network Security Administration Study Guide. – М.: , 2003. – 574 с. Russ Kaufman. MCSA/MCSE: Windows® Server 2003 Network Security Administration Study Guide. – М.: , 2004. – 560 с. Nitesh Dhanjani. Network Security Tools. – М.: , 2005. – 340 с. EDWARD. Microsoft Access 2000 Developer?s Guide. – М.: , 1999. – 900 с. Thomas W. Madron. Network Security in the 90?s. – М.: , 1992. – 304 с. Microsoft. MCSE Training Kit (Exam 70–220) – Designing Microsoft Windows 2000 Network Security. – М.: , 2001. – 864 с. Andrew Lockhart. Network Security Hacks. – М.: , 2004. – 316 с. DAN. Network Security In A Mixed Environment. – М.: , 1998. – 456 с. Matthew Strebe. Network Security JumpStartTM. – М.: , 2002. – 384 с. Pawan K Bhardwaj. A+. Network+, Security+ Exams in a Nutshell. – М.: , 2007. – 812 с. Eric Cole. Network Security Bible. – М.: , 2005. – 694 с. Eric Cole. Wiley Pathways Network Security Fundamentals Project Manual. – М.: , 2008. – 312 с. Andrew Lockhart. Network Security Hacks 2e. – М.: , 2006. – 352 с. Chris Mcnab. Network Security Assessment 2e. – М.: , 2007. – 464 с. Cryptography & Network Security. – М.: , 2007. – 0 с. Securing Global Transportation Networks. – М.: , 2011. – 312 с. Shon Harris. CISSP All-in-One Exam Guide (+ CD-ROM). – М.: McGraw-Hill Companies, 2010. – 1216 с. Richard A. Deal. Cisco Asa Configuration. – М.: McGraw-Hill, 2009. – 752 с. Comptia Security+ All-In-One Exam Guide, Second Edition (Exam Sy0-201). – М.: , 2011. – 0 с. Mcitp Windows Vista Support Technician All-In-One Exam Guide (Exam 70-620, 70-622, & 70-623). – М.: , 2011. – 0 с. Pc Quicksteps, Second Edition. – М.: , 2011. – 240 с. Citrix® Access Suite Security For It Administrators. – М.: , 2011. – 268 с. Secure Metrics: A Beginners Guide. – М.: , 2011. – 400 с. Wireless Network Security A Beginners Guide. – М.: , 2011. – 400 с. Cissp Practice Exams. – М.: , 2011. – 414 с. Security Information And Event Management (Siem) Implementation. – М.: , 2011. – 464 с. Principles Of Computer Security Comptia Security+ And Beyond Lab Manual, Second Edition. – М.: , 2011. – 352 с. Network Security: The Complete Reference. – М.: , 2011. – 896 с. Fundamentals Of Network Security. – М.: , 2011. – 672 с. Greg Holden. Guide to Firewalls and Network Security: Intrusion Detection and VPNs. – М.: Course Technology, 2003. – 512 с. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . – с. Dave Tyson. Security Convergence: Managing Enterprise Security Risk. – М.: , 2007. – 232 с. Michael Gregg, Eric Seagren, Angela Orebaugh, Matt Jonkman, Raffael Marty. How to Cheat at Configuring Open Source Security Tools (How to Cheat) (How to Cheat). – М.: , 2007. – 528 с. Fred Eady. Implementing 802.11 with Microcontrollers: Wireless Networking for Embedded Systems Designers (Embedded Technology). – М.: , 2005. – 400 с. Susan Snedaker. Syngress IT Security Project Management Handbook. – М.: Syngress, 2006. – 612 с. Thomas W. Shinder. The Best Damn Firewall Book Period. – М.: Syngress, 2007. – 1000 с. Ido Dubrawsky. How to Cheat at Securing Your Network. – М.: Syngress, 2007. – 432 с. Ido Dubrawsky. CompTIA Security+ Certification Study Guide, Third Edition: Exam SYO-201 3E. – М.: , 2009. – 752 с. Md. Mahmudul Hasan Rafee and Sharmin Akter Lima. Proximity Based Access Control (PBAC). – М.: LAP Lambert Academic Publishing, 2012. – 160 с. Varun K.,Sushil R. S. and Sanjay J. Recognition of Human Iris Patterns. – М.: LAP Lambert Academic Publishing, 2012. – 64 с. Shaikh Salim and Shankar Nawale. Secure Access of RFID System. – М.: LAP Lambert Academic Publishing, 2012. – 96 с. Shaek Rana Mohammad Baki Billah and Mohammad Hafizur Rahman. Design & Development of Network Security System using IP Tables. – М.: LAP Lambert Academic Publishing, 2013. – 164 с. Xiangqian Chen. DEFENSE AGAINST NODE COMPROMISE IN SENSOR NETWORK SECURITY. – М.: LAP Lambert Academic Publishing, 2009. – 108 с. Saeed Ur Rehman. Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 132 с. Alessandro Vittorio Bergami. Masonry infilled r.c. frames. – М.: LAP Lambert Academic Publishing, 2011. – 160 с. M. Sadiq Ali Khan and S. M. Aqil Burney. Recent Trends in Intrusion Detection System & Network Monitoring. – М.: LAP Lambert Academic Publishing, 2012. – 120 с. Morteza Rafiei. Food Security Measurement Guide. – М.: LAP Lambert Academic Publishing, 2014. – 108 с. Krishna Das. Spatial Pattern of Road Network Development in Assam. – М.: LAP Lambert Academic Publishing, 2013. – 76 с. Ephrem Tekele Woldehana. GIS and Remote Sensing Based Rural Road Network Analysis. – М.: LAP Lambert Academic Publishing, 2013. – 104 с. Ankur Gupta and Bhupendra Gupta. Random Networks and its Applications. – М.: LAP Lambert Academic Publishing, 2013. – 100 с. Kabtamu Niguse. Land Tenure and Tenure Security Among Somali Pastorals of Ethiopia. – М.: LAP Lambert Academic Publishing, 2012. – 188 с. Catherine Doldirina. The Common Good and Access to Remote Sensing Data. – М.: LAP Lambert Academic Publishing, 2011. – 252 с. John Meyer and Amanda Barefield. Developing and Sustaining Online Education. – М.: LAP Lambert Academic Publishing, 2010. – 100 с. Anil Kumar V. and Prasad E. Dynamic Broadcast Routing With Security Enhancement. – М.: LAP Lambert Academic Publishing, 2012. – 120 с. Xiaodong He. Automated intrusion prevention mechanism in enhancing network security. – М.: Scholars' Press, 2014. – 128 с. Syed Zahidur Rashid. Computer Network Security Monitoring. – М.: Scholars' Press, 2015. – 284 с. Elliot Attipoe. Securing the Public Wireless Network. – М.: LAP Lambert Academic Publishing, 2013. – 92 с. Mamunur Rashid and Bellal Hossain. WiMAX Security Architecture. – М.: LAP Lambert Academic Publishing, 2014. – 76 с. Mohammad AlAhmad. Security threats of finger print biometric in network system. – М.: LAP Lambert Academic Publishing, 2014. – 88 с. Nirbhay Chaubey. Securing AODV Routing Protocol in design of Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2015. – 132 с. Aditya Kumar. Cryptography and Chaos a New Approach in Network Security. – М.: LAP Lambert Academic Publishing, 2015. – 80 с. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с. Srikanthreddy Arimanda and Manojkumar Kolli. Performance Study Of Security Mechanismsm For Mobile Agent Domain. – М.: LAP Lambert Academic Publishing, 2011. – 84 с. Marimuthu Kanagaraj and Eswari Venkatachalam. Multifactor Authentication Protocol for a Secured WSN. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Gurpreet juneja. Security:MPLS VPN Network. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Omid Mahdi Ebadati E.,Harleen Kaur M. Afshar Alam and Kaebeh Yaeghoobi. Micro-Firewalls for Dynamic Network Security Framework. – М.: LAP Lambert Academic Publishing, 2012. – 292 с. Wisam Elmasry. Securing WBAODV Routing Protocol in MANETs. – М.: LAP Lambert Academic Publishing, 2013. – 100 с. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с. Shaffali Gupta and Sanmeet Kaur. A GUI Framework for detecting Intrusions using Bro IDS. – М.: LAP Lambert Academic Publishing, 2013. – 76 с. Vincent Omollo. Enhanced Network Security. – М.: LAP Lambert Academic Publishing, 2013. – 76 с. MARCO SPOHN. Using Dominating Sets to Improve the Performance of ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 164 с. Firkhan Ali Hamid Ali. Vulnerability Analysis on the Computer Network Security. – М.: LAP Lambert Academic Publishing, 2010. – 72 с. Sunil Kumar Senapati and Prof. Pabitra Mohan Khilar. SECURING FSR PROTOCOL AGAINST DATA PACKET DROPPING IN MANET. – М.: LAP Lambert Academic Publishing, 2010. – 64 с. Imran Sohail and Sikandar Hayat. Network Security and DDoS. – М.: LAP Lambert Academic Publishing, 2010. – 64 с. Christian Chetachi Umunna. Distributed Intrusion Detection System in Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 104 с. Xiaolong Li. Modeling and Performance Analysis of Mobile Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 120 с. ANNADURAI P and Dr. V. PALANISAMY. Impact of Black Hole Attack on Multicast in Ad hoc Network (IBAMA). – М.: LAP Lambert Academic Publishing, 2011. – 84 с. Kirat Pal Singh. MIPS Pipeline Cryptoprocessor. – М.: LAP Lambert Academic Publishing, 2012. – 480 с. Deniz Akkaya and Fabien Thalgott. Honeypots in Network Security. – М.: LAP Lambert Academic Publishing, 2012. – 64 с. Kefa Rabah. Mastering Securing ICT Infrastructure for Corporate Network. – М.: LAP Lambert Academic Publishing, 2014. – 360 с. Muna Elsadig Mohamed Ahmed Elsheik. Bio Inspired Intrusion Prevention and Self healing System for Networks. – М.: LAP Lambert Academic Publishing, 2012. – 256 с. Mohammad Faisal. Networks Security and Communication. – М.: LAP Lambert Academic Publishing, 2012. – 56 с. Affan Yasin,Hafiz Adnan Shafiq and Muhammad Ijlal Hasnain. Software Architecture for Centralized Health Database. – М.: LAP Lambert Academic Publishing, 2013. – 64 с. Edmond K. Machie. Network Attack Traceback And React. – М.: LAP Lambert Academic Publishing, 2013. – 208 с. Tanveer Zia. A Security Framework for Wireless Sensor Networks (WSN). – М.: LAP Lambert Academic Publishing, 2013. – 160 с. Dirk Lessner. Network Security for Embedded Systems. – М.: LAP Lambert Academic Publishing, 2009. – 232 с. Shivan Fazil Sabr. Cloud Computing Security. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Amit Choudhary. Routing Security Issues in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2014. – 80 с. Mohamed Nassar. Voice over IP Networks Monitoring. – М.: LAP Lambert Academic Publishing, 2009. – 172 с. Liang Song. Large Scale Cognitive Wireless Networks. – М.: LAP Lambert Academic Publishing, 2010. – 208 с. Nathan Darmawan. Shielding Your Company with a Better Network Security Design. – М.: LAP Lambert Academic Publishing, 2010. – 180 с. Rinaldi Yulius. DESIGN OF A CYBER SECURITY LABORATORY. – М.: LAP Lambert Academic Publishing, 2010. – 140 с. Nirmalya Kar,Ashim Saha and Mrinal Kanti Debbarma. Biometric Based Attendance System. – М.: LAP Lambert Academic Publishing, 2012. – 64 с. Arpita Mondal. Simple and Secured Access to Networked Home Appliances via Internet. – М.: LAP Lambert Academic Publishing, 2010. – 180 с. Prashant Pittalia. Ecommerce Security Real Life Cases And Practical Solutions. – М.: , 2015. – 72 с. Лучшие результаты Ничего не найдено Дополнительные результаты Банковский бизнес: взгляд непостороннего наблюдателя. интервью с Г. Киперварг, заместителем генерального директора компании "R-Style Softlab". "Банковское дело в Москве", № 6, июнь 2006. Основная проблема для руководителя - самому определиться, эффективен ли менеджер. интервью с Б.Б. Ренским, вице-президентом группы компаний R & K по организационному развитию. "Управление персоналом", № 9, май 2006. Система с видом на будущее. интервью с А. Зусиным, заместителем председателя Правления АКБ "Электроника" и Г. Киперварг, заместителем генерального директора "R-Style Softlab". "Банковское дело в Москве", № 4, апрель 2006. R-Style Softlab: новые возможности и перспективы развития. Е. Смирнов, "Расчеты и операционная работа в коммерческом банке", № 1, январь 2006. Новости от "R-Style Softlab". "Банковское дело в Москве", № 2, февраль 2005. Почему госкомпании неэффективны в сравнении с частными?. интервью с И. Богдановым, управляющим партнером BIRC. до 2011 года BI&R Consulting. А. Гончаров, "Управление персоналом", N 12, июнь 2012 г. Команда из десяти управленцев во главе с одним генеральным способна сделать больше, чем один генеральный с десятью помощниками. интервью с И. Богдановым, управляющим партнером BIRC. до 2011 года BI&R Consulting. Е. Баранова, "Управление персоналом", N 8, апрель 2012 г. Как создать базу данных регистрации трудовых договоров и дополнительных соглашений к ним в MS Access 2007. А. Лобанова, "Кадровик. Кадровое делопроизводство", N 7, 8, июль, август 2011 г. Основной арсенал "охотника" - его network: кого он знает на рынке и качество этих отношений. С. Плетнева, "Управление персоналом", № 12, июнь 2009. Формирование базы данных персонального учета сотрудников с использованием Microsoft Access. Е. Гурова, "Кадровик. Кадровое делопроизводство", № 6, июнь 2009. Публичные горизонты. интервью с А. Киреевым, первым вице-президентом компании R-Style. К. Дяконов, "Консультант", № 7, апрель 2008. Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Ольга Марина, огромное Вам спасибо, Вы меня спасаете.