Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Kanav Sood. Kerberos Authentication Protocol. – М.: LAP Lambert Academic Publishing, 2011. – 120 с.
  2. Garima Verma. Implementation of Authentication and Transaction Security. – М.: LAP Lambert Academic Publishing, 2013. – 60 с.
  3. Mohamed Geaiger. Development of Secure Domain Control Frame Work. – М.: LAP Lambert Academic Publishing, 2011. – 224 с.

Дополнительные результаты

  1. Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с.
  2. Craig Neal and Patricia Neal. The Art Of Convening: Authentic Engagement in Meetings, Gatherings, and Conversations. – М.: , 2012. – 284 с.
  3. James D. Showkeir. Authentic Conversations: Moving from Manipulating to Truth and Commitment. – М.: , 2012. – 316 с.
  4. James E. Lukaszewski. Communication Standards: The Principles and Protocols for Standard-Setting Individual and Corporate Communication. – М.: Lukaszewski Group, 1995. – 10 с.
  5. Scott D. Seligman. Chinese Business Etiquette: A Guide to Protocol, Manners, and Culture in the People's Republic of China. – М.: Grand Central Publishing, 1999. – 304 с.
  6. Carol Bennett. Business Etiquette & Protocol: Professional Development Series. – М.: , 0. – 0 с.
  7. David J. Pauleen. Virtual Teams: Projects, Protocols and Processes. – М.: , 0. – 0 с.
  8. Hank Karp, Connie Fuller, Danilo Sirias. Bridging the Boomer Xer Gap: Creating Authentic Teams for High Performance at Work. – М.: , 0. – 0 с.
  9. Bill George. Authentic Leadership: Rediscovering the Secrets to Creating Lasting Value. – М.: , 0. – 0 с.
  10. Terry Pearce, Terry Pearce. Leading Out Loud: Inspiring Change Through Authentic Communications, New and Revised. – М.: , 0. – 0 с.
  11. Jerry Whitaker. Audio/Video Protocol Handbook. – М.: , 0. – 0 с.
  12. David G. Victor. The Collapse of the Kyoto Protocol and the Struggle to Slow Global Warming (Council on Foreign Relations Book). – М.: , 0. – 0 с.
  13. Bradnee W. Chambers, W. Bradnee Chambers, ed. W. Bradnee Chambers. Inter-Linkages: The Kyoto Protocol and the International Trade and Investment Regimes. – М.: , 0. – 0 с.
  14. David Greenblatt. Call Heard 'Round the World, The: Voice Over Internet Protocol and the Quest for Convergence. – М.: , 0. – 0 с.
  15. Stephen J. Bagnato, John T. Neisworth, Susan M. Munson. Linking Assessment and Early Intervention: An Authentic Curriculum-Based Approach. – М.: , 0. – 0 с.
  16. John Roland, Mark J. Newcomb. CCSP Cisco Secure VPN Exam Certification Guide (CCSP Self-Study). – М.: , 0. – 0 с.
  17. Andrew Sun. Using and Managing Ppp. – М.: , 0. – 0 с.
  18. Mostafa Hashem Sherif. Protocols for Secure Electronic Commerce, Second Edition. – М.: , 0. – 0 с.
  19. Scn Education B. V. Mobile Networking With Wap: The Ultimate Guide to the Efficient Use of Wireless Application Protocol (Hott Guide). – М.: , 2004. – 0 с.
  20. Virtual Teams: Projects, Protocols and Processes. – М.: , 2003. – 0 с.
  21. V Anand. Cisco IP Routing Protocols: Trouble Shooting Techniques (Networking Series). – М.: , 2004. – 0 с.
  22. Richard A. Greenwald. The Triangle Fire, The Protocols Of Peace, And Industrial Democracy: In Progressive Era New York (Labor in Crisis). – М.: , 2005. – 0 с.
  23. Convention on the Elimination of All Forms of Discrimination Against Women and Its Optional Protocol. – М.: , 2003. – 0 с.
  24. FranCois Thomazeau. The Authentic Bistros of Paris. – М.: , 2005. – 192 с.
  25. Richard Heinberg. The Oil Depletion Protocol: A Plan to Avert Oil Wars, Terrorism and Economic Collapse. – М.: , 2006. – 208 с.
  26. Dave Wheitner. Naked Idealism: Expose Your Authentic Side and Create a Sustainable Life and World, or How to Find Happiness, Direction and Success in Career, Fun, and Relationships While Inspiring Progressive Change. – М.: , 2008. – 252 с.
  27. Progress in Cryptology - AFRICACRYPT 2008: First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008, Proceedings (Lecture Notes in Computer Science). – М.: , 2008. – 415 с.
  28. Candida Albicans: Methods and Protocols (Methods in Molecular Biology). – М.: , 2009. – 195 с.
  29. Chromatin Protocols: Second Edition (Methods in Molecular Biology). – М.: , 2009. – 399 с.
  30. En-Ying Lin. Luxury E-Branding in Greater China: product category, country-of-origin, and authenticity. – М.: , 2010. – 156 с.
  31. Mehmet Yusuf Yahyagil, S. Meltem Ceri Booms. Leadership Behaviors: The Turkish Case: Transactional, Transformational, or Authentic Leadership?. – М.: , 2010. – 168 с.
  32. James F. Ransome, PhD, CI. Voice over Internet Protocol (VoIP) Security. – М.: , 2010. – 432 с.
  33. Rina Prentice. AUTHENTIC NELSON. – М.: , 2005. – 192 с.
  34. Trygve O. Tollefsbol. Biological Aging: Methods and Protocols. – М.: Humana Press, 2007. – 414 с.
  35. Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards and Applications (Wireless Networks and Mobile Communications). – М.: , 2008. – 424 с.
  36. Functional Proteomics: Methods and Protocols (Methods in Molecular Biology). – М.: , 2008. – 598 с.
  37. Edited by Laszlo Otvos. Peptide-Based Drug Design: Methods and Protocols. – М.: Humana Press, 2008. – 304 с.
  38. RNA-Protein Interaction Protocols (Methods in Molecular Biology). – М.: , 2008. – 416 с.
  39. Drosophila Protocols. – М.: , 2008. – 697 с.
  40. Len Sperry. Treatment of Chronic Medical Conditions: Cognitive-Behavioral Therapy Strategies and Integrative Treatment Protocols. – М.: , 2008. – 289 с.
  41. Redox-Mediated Signal Transduction: Methods and Protocols (Methods in Molecular Biology). – М.: , 2008. – 234 с.
  42. SARS- and Other Coronaviruses: Laboratory Protocols (Methods in Molecular Biology). – М.: , 2008. – 344 с.
  43. Mycobacteria Protocols: Second Edition (Methods in Molecular Biology). – М.: , 2008. – 520 с.
  44. MDCT: From Protocols to Practice. – М.: , 2008. – 412 с.
  45. Nanostructure Design: Methods and Protocols (Methods in Molecular Biology). – М.: , 2008. – 274 с.
  46. Cardiovascular Genomics: Methods and Protocols. – М.: Humana Press, 2009. – 350 с.
  47. Jay Lehmann. Intermediate Algebra: Functions & Authentic Applications (4th Edition). – М.: , 2010. – 720 с.
  48. Jay Lehmann. Elementary and Intermediate Algebra: Functions & Authentic Applications. – М.: , 2010. – 1040 с.
  49. Protein Secretion: Methods and Protocols (Methods in Molecular Biology). – М.: , 2010. – 395 с.
  50. Matrix Metalloproteinase Protocols (Methods in Molecular Biology). – М.: , 2010. – 410 с.
  51. Analgesia: Methods and Protocols (Methods in Molecular Biology). – М.: , 2010. – 528 с.
  52. Genetic Variation: Methods and Protocols (Methods in Molecular Biology). – М.: , 2010. – 376 с.
  53. Carbon Nanotubes: Methods and Protocols (Methods in Molecular Biology). – М.: , 2010. – 250 с.
  54. S.Y. Kung, M.W. Mak, S.H. Lin. Biometric Authentication: A Machine Learning Approach (Prentice Hall Information and System Sciences Series). – М.: , 2010. – 496 с.
  55. Japonica Brown-Saracino. A Neighborhood That Never Changes: Gentrification, Social Preservation, and the Search for Authenticity (Fieldwork Encounters and Discoveries). – М.: , 2010. – 352 с.
  56. Forensic DNA Typing Protocols. – М.: Humana Press, 2004. – 296 с.
  57. Imaging Mass Spectrometry: Protocols for Mass Microscopy. – М.: , 2010. – 272 с.
  58. Steve Suehring. Wiley Pathways Windows Network Administration Project Manual. – М.: , 2007. – 404 с.
  59. Qing Li. IPv6 Core Protocols Implementation. – М.: , 2010. – 968 с.
  60. Alan R. Kimmel. DNA Microarrays Part A: Array Platforms & Wet-Bench Protocols,410. – М.: , 2010. – 512 с.
  61. Da-Wen Sun. Modern Techniques for Food Authentication. – М.: , 2010. – 720 с.
  62. M. Bentall. ATM and Internet Protocol. – М.: , 2010. – 168 с.
  63. Evan DeRenzo. Writing Clinical Research Protocols. – М.: , 2010. – 320 с.
  64. Qing Li. IPv6 Advanced Protocols Implementation. – М.: , 2010. – 1008 с.
  65. Gordon Clarke. Practical Modern SCADA Protocols. – М.: , 2010. – 544 с.
  66. Adrian Farrel. The Internet and Its Protocols. – М.: , 2010. – 840 с.
  67. W. Wisden. In Situ Hybridization Protocols for the Brain,47. – М.: , 2010. – 272 с.
  68. Mark Wrathall. Heidegger, Authenticity & Modernity V 1 – Essays in Honor of Hubert L Dreyfus. – М.: , 2000. – 424 с.
  69. Allan G. Grapard. The Protocol of the Gods – A Study of the Kasuga Cult in Japanese History. – М.: , 1993. – 310 с.
  70. Tasaka. Performance Analysis of Multiple Access Protocols. – М.: , 2008. – 288 с.
  71. Lucinda Scala Quinn. Lucinda?s Authentic Jamaican Kitchen. – М.: , 2006. – 128 с.
  72. Eric A Hall. Internet Core Protocols: The Definitive Guide. – М.: , 2000. – 472 с.
  73. Richard Peterson. Creating Country Music – Fabricating Authenticity (Paper). – М.: , 2000. – 320 с.
  74. Anne–marie Blondeau. Authenticating Tibet – Answers to China?s 100 Questions. – М.: , 2008. – 398 с.
  75. Joesph Davies. Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference. – М.: , 2003. – 768 с.
  76. Mallikarjun Tatipamula. Advanced Internet Protocols. – М.: , 2011. – 450 с.
  77. Seth D. Kunin. Juggling Identities – Identity and Authenticity Among the Crypto–Jews. – М.: , 2009. – 320 с.
  78. David Chidester. Authentic Fakes – Religion and American Popular Culture. – М.: , 2005. – 294 с.
  79. David Grazian. Blue Chicago – The Search for Authenticity in Urban Blues Clubs. – М.: , 2003. – 320 с.
  80. David Chidester. Authentic Fakes – Religion and American Popular Culture. – М.: , 2005. – 294 с.
  81. David Grazian. Blue Chicago – The Search for Authenticity in Urban Blues Clubs. – М.: , 2005. – 328 с.
  82. Gary Alan Fine. Everyday Genius – Self–Taught Art and the Culture of Authenticity. – М.: , 2006. – 344 с.
  83. Alexander R Galloway. Protocol – How Control Exists after Decentralization. – М.: , 2004. – 248 с.
  84. John Amodeo. The Authentic Heart. – М.: , 2001. – 304 с.
  85. Will Eisner. The Plot – The Secret Story of the Protocols of the Elders of Zion. – М.: , 2006. – 160 с.
  86. Timothy A. Craul. Soil Design Protocols for Landscape Architects and Contractors. – М.: , 1995. – 0 с.
  87. Alexander Nehamas. Virtues of Authenticity – Essays on Plato & Socrates (Paper). – М.: , 1998. – 408 с.
  88. Tasaka. Performance Analysis of Multiple Access Protocols. – М.: , 1986. – 0 с.
  89. Hamad Rashid. Wireless Application Protocol Programming. – М.: , 2001. – 720 с.
  90. Shelly Errington. The Death of Authentic Primitive Art & Other Tales of Progress (Paper). – М.: , 1998. – 338 с.
  91. Jon Crowcroft. TCP/IP and Linux Protocol Implementation. – М.: , 2001. – 976 с.
  92. Charles Taylor. The Ethics of Authenticity. – М.: , 1992. – 154 с.
  93. R. Jones. Clinically Speaking – the Authentic Language of Clinical Medicine. – М.: , 1994. – 144 с.
  94. Nat Hentoff. Living the Bill of Rights – How to be an Authentic American. – М.: , 1999. – 254 с.
  95. Andreas Schonle. Authenticity & Fiction in the Russian Literary Journey, 1790–1840. – М.: , 2000. – 304 с.
  96. Goedicke. The Protocol of Neferyt – The Prophecy of Neferti. – М.: , 1977. – 0 с.
  97. K Anders Ericsson. Protocol Analysis – Verbal Reports as Data – Revised Edition. – М.: , 1993. – 500 с.
  98. Jan Yager. Business Protocol. – М.: , 1991. – 246 с.
  99. Bill George. Authentic Leadership. – М.: , 2003. – 240 с.
  100. David Durham. Inside the Internet?s Resource reSerVation Protocol. – М.: , 1999. – 384 с.
  101. J Kilian. Uses of Randomness in Algorithms & Protocols. – М.: , 1990. – 260 с.
  102. Gregor Kiczales. The Art of the Metaobject Protocol. – М.: , 1991. – 348 с.
  103. James Buchan. The Authentic Adam Smith – His Life and Ideas. – М.: , 2006. – 256 с.
  104. Mark Wrathall. Heidegger, Authenticity & Modernity V 1 – Essays in Honor of Hubert L Dreyfus. – М.: , 2000. – 424 с.
  105. Hugh Barker. Faking It – The Quest for Authenticity in Popular Music. – М.: , 2007. – 304 с.
  106. Will Eisner. The Plot – The Secret Story of the Protocols of the Elders of Zion. – М.: , 2005. – 160 с.
  107. Dr. Silke Holtmanns. Cellular Authentication for Mobile and Internet Services. – М.: , 2008. – 212 с.
  108. David G Victor. The Collapse of the Kyoto Protocol and the Struggle to Slow Global Warming. – М.: , 2004. – 224 с.
  109. J. Mark Pullen. Understanding Internet Protocols. – М.: , 2000. – 304 с.
  110. Stephen A. Thomas. IPng and the TCP/IP Protocols. – М.: , 1996. – 496 с.
  111. Elizabeth Bernstein. Temporarily Yours – Intimacy, Authenticity and the Commerce of Sex. – М.: , 2008. – 288 с.
  112. Elizabeth Bernstein. Temporarily Yours – Intimacy, Authenticity, and the Commerce of Sex. – М.: , 2007. – 288 с.
  113. Steve Mann. Programming Applications with the Wireless Application Protocol. – М.: , 2000. – 256 с.
  114. Wireless Application Protocol Forum, Ltd. Official Wireless Application Protocol 2.0. – М.: , 1999. – 768 с.
  115. Jacob Palme. Internet Application Protocols. – М.: , 2003. – 640 с.
  116. Maram Epstein. Competing Discourses – Orthodoxy, Authenticity & Engendered Meanings in Late Imperial Chinese Fiction. – М.: , 2001. – 376 с.
  117. Authenticity in Teaching. – М.: , 2006. – 96 с.
  118. Kevin J H Dettmar. Reading Rock & Roll – Authenticity, Appropriation, Aesthetics (Paper). – М.: , 1999. – 360 с.
  119. Gregor Kiczales. The Art of the Metaobject Protocol (Paper). – М.: , 1991. – 348 с.
  120. Mohamed Youshah Shameel Mecca and Tirumala Rao Kothaluru. Evaluation of EAP Authentication Methods. – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  121. M. Amutha Prabakar and Indrani B. Road Map on Password Based Authentication Schemes Using Smart Card. – М.: LAP Lambert Academic Publishing, 2011. – 76 с.
  122. Kanav Sood. Kerberos Authentication Protocol. – М.: LAP Lambert Academic Publishing, 2011. – 120 с.
  123. Garima Verma. Implementation of Authentication and Transaction Security. – М.: LAP Lambert Academic Publishing, 2013. – 60 с.
  124. Younus Javed and Hassan Tahir. Optimized Security Protocol for Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  125. E.A.Mary Anita. Securing Multicast Routing Protocols for Mobile Adhoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  126. Arun Saha. Secure Protocols for Location, Adjacency, and Identity Verification. – М.: LAP Lambert Academic Publishing, 2011. – 248 с.
  127. Ming-Chin Chuang. Authentication and Mobility Management Mechanisms in VANETs. – М.: Scholars' Press, 2014. – 96 с.
  128. Mohamed Geaiger. Development of Secure Domain Control Frame Work. – М.: LAP Lambert Academic Publishing, 2011. – 224 с.
  129. Marimuthu Kanagaraj and Eswari Venkatachalam. Multifactor Authentication Protocol for a Secured WSN. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  130. Vincent Omollo. Enhanced Network Security. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  131. Pavel Ocenasek. Security Protocols. – М.: LAP Lambert Academic Publishing, 2010. – 112 с.
  132. Keshava Munegowda. Design and Implementation of WLAN Authentication and Security. – М.: LAP Lambert Academic Publishing, 2010. – 124 с.
  133. Faisal Karim Bhutta. Smartphone based Authentication & Authorization Protocol for SPACS. – М.: LAP Lambert Academic Publishing, 2014. – 56 с.
  134. Paulo Sergio Pagliusi. Internet Authentication for Remote Access. – М.: Scholars' Press, 2013. – 432 с.
  135. Mohd Nazri Ismail,Mohd Afizi Shukran and Megat Farez Azril. VoIP over IP with fingerprint authentication and digital signature. – М.: LAP Lambert Academic Publishing, 2014. – 84 с.
  136. Astha Keshariya. Authenticated Trusted Server Controlled Key Establishment. – М.: LAP Lambert Academic Publishing, 2012. – 180 с.
  137. Bijan Soleymani. Social Authentication for Mobile Phones. – М.: LAP Lambert Academic Publishing, 2010. – 100 с.
  138. Mahmoud Osama Ouf,Raafat A.El-kammar and Alaa Eldeen Sayed Ahmed. Implementation and Analysis Requirements of Ultra-Lightweight. – М.: LAP Lambert Academic Publishing, 2012. – 132 с.
  139. Burcu Kulahc?oglu. Timed Automata as a Verification Tool for Security Protocols. – М.: LAP Lambert Academic Publishing, 2011. – 104 с.
  140. Dr Sandeep Kumar Sood. AUTHENTICATION PROTOCOLS. – М.: LAP Lambert Academic Publishing, 2011. – 236 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

Ничего не найдено

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Марина
Большое спасибо за сопровождаемые лабораторные работы. С наступившими Вас праздниками, всего хорошего!