Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Kanav Sood. Kerberos Authentication Protocol. – М.: LAP Lambert Academic Publishing, 2011. – 120 с. Garima Verma. Implementation of Authentication and Transaction Security. – М.: LAP Lambert Academic Publishing, 2013. – 60 с. Mohamed Geaiger. Development of Secure Domain Control Frame Work. – М.: LAP Lambert Academic Publishing, 2011. – 224 с. Дополнительные результаты Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с. Craig Neal and Patricia Neal. The Art Of Convening: Authentic Engagement in Meetings, Gatherings, and Conversations. – М.: , 2012. – 284 с. James D. Showkeir. Authentic Conversations: Moving from Manipulating to Truth and Commitment. – М.: , 2012. – 316 с. James E. Lukaszewski. Communication Standards: The Principles and Protocols for Standard-Setting Individual and Corporate Communication. – М.: Lukaszewski Group, 1995. – 10 с. Scott D. Seligman. Chinese Business Etiquette: A Guide to Protocol, Manners, and Culture in the People's Republic of China. – М.: Grand Central Publishing, 1999. – 304 с. Carol Bennett. Business Etiquette & Protocol: Professional Development Series. – М.: , 0. – 0 с. David J. Pauleen. Virtual Teams: Projects, Protocols and Processes. – М.: , 0. – 0 с. Hank Karp, Connie Fuller, Danilo Sirias. Bridging the Boomer Xer Gap: Creating Authentic Teams for High Performance at Work. – М.: , 0. – 0 с. Bill George. Authentic Leadership: Rediscovering the Secrets to Creating Lasting Value. – М.: , 0. – 0 с. Terry Pearce, Terry Pearce. Leading Out Loud: Inspiring Change Through Authentic Communications, New and Revised. – М.: , 0. – 0 с. Jerry Whitaker. Audio/Video Protocol Handbook. – М.: , 0. – 0 с. David G. Victor. The Collapse of the Kyoto Protocol and the Struggle to Slow Global Warming (Council on Foreign Relations Book). – М.: , 0. – 0 с. Bradnee W. Chambers, W. Bradnee Chambers, ed. W. Bradnee Chambers. Inter-Linkages: The Kyoto Protocol and the International Trade and Investment Regimes. – М.: , 0. – 0 с. David Greenblatt. Call Heard 'Round the World, The: Voice Over Internet Protocol and the Quest for Convergence. – М.: , 0. – 0 с. Stephen J. Bagnato, John T. Neisworth, Susan M. Munson. Linking Assessment and Early Intervention: An Authentic Curriculum-Based Approach. – М.: , 0. – 0 с. John Roland, Mark J. Newcomb. CCSP Cisco Secure VPN Exam Certification Guide (CCSP Self-Study). – М.: , 0. – 0 с. Andrew Sun. Using and Managing Ppp. – М.: , 0. – 0 с. Mostafa Hashem Sherif. Protocols for Secure Electronic Commerce, Second Edition. – М.: , 0. – 0 с. Scn Education B. V. Mobile Networking With Wap: The Ultimate Guide to the Efficient Use of Wireless Application Protocol (Hott Guide). – М.: , 2004. – 0 с. Virtual Teams: Projects, Protocols and Processes. – М.: , 2003. – 0 с. V Anand. Cisco IP Routing Protocols: Trouble Shooting Techniques (Networking Series). – М.: , 2004. – 0 с. Richard A. Greenwald. The Triangle Fire, The Protocols Of Peace, And Industrial Democracy: In Progressive Era New York (Labor in Crisis). – М.: , 2005. – 0 с. Convention on the Elimination of All Forms of Discrimination Against Women and Its Optional Protocol. – М.: , 2003. – 0 с. FranCois Thomazeau. The Authentic Bistros of Paris. – М.: , 2005. – 192 с. Richard Heinberg. The Oil Depletion Protocol: A Plan to Avert Oil Wars, Terrorism and Economic Collapse. – М.: , 2006. – 208 с. Dave Wheitner. Naked Idealism: Expose Your Authentic Side and Create a Sustainable Life and World, or How to Find Happiness, Direction and Success in Career, Fun, and Relationships While Inspiring Progressive Change. – М.: , 2008. – 252 с. Progress in Cryptology - AFRICACRYPT 2008: First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008, Proceedings (Lecture Notes in Computer Science). – М.: , 2008. – 415 с. Candida Albicans: Methods and Protocols (Methods in Molecular Biology). – М.: , 2009. – 195 с. Chromatin Protocols: Second Edition (Methods in Molecular Biology). – М.: , 2009. – 399 с. En-Ying Lin. Luxury E-Branding in Greater China: product category, country-of-origin, and authenticity. – М.: , 2010. – 156 с. Mehmet Yusuf Yahyagil, S. Meltem Ceri Booms. Leadership Behaviors: The Turkish Case: Transactional, Transformational, or Authentic Leadership?. – М.: , 2010. – 168 с. James F. Ransome, PhD, CI. Voice over Internet Protocol (VoIP) Security. – М.: , 2010. – 432 с. Rina Prentice. AUTHENTIC NELSON. – М.: , 2005. – 192 с. Trygve O. Tollefsbol. Biological Aging: Methods and Protocols. – М.: Humana Press, 2007. – 414 с. Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards and Applications (Wireless Networks and Mobile Communications). – М.: , 2008. – 424 с. Functional Proteomics: Methods and Protocols (Methods in Molecular Biology). – М.: , 2008. – 598 с. Edited by Laszlo Otvos. Peptide-Based Drug Design: Methods and Protocols. – М.: Humana Press, 2008. – 304 с. RNA-Protein Interaction Protocols (Methods in Molecular Biology). – М.: , 2008. – 416 с. Drosophila Protocols. – М.: , 2008. – 697 с. Len Sperry. Treatment of Chronic Medical Conditions: Cognitive-Behavioral Therapy Strategies and Integrative Treatment Protocols. – М.: , 2008. – 289 с. Redox-Mediated Signal Transduction: Methods and Protocols (Methods in Molecular Biology). – М.: , 2008. – 234 с. SARS- and Other Coronaviruses: Laboratory Protocols (Methods in Molecular Biology). – М.: , 2008. – 344 с. Mycobacteria Protocols: Second Edition (Methods in Molecular Biology). – М.: , 2008. – 520 с. MDCT: From Protocols to Practice. – М.: , 2008. – 412 с. Nanostructure Design: Methods and Protocols (Methods in Molecular Biology). – М.: , 2008. – 274 с. Cardiovascular Genomics: Methods and Protocols. – М.: Humana Press, 2009. – 350 с. Jay Lehmann. Intermediate Algebra: Functions & Authentic Applications (4th Edition). – М.: , 2010. – 720 с. Jay Lehmann. Elementary and Intermediate Algebra: Functions & Authentic Applications. – М.: , 2010. – 1040 с. Protein Secretion: Methods and Protocols (Methods in Molecular Biology). – М.: , 2010. – 395 с. Matrix Metalloproteinase Protocols (Methods in Molecular Biology). – М.: , 2010. – 410 с. Analgesia: Methods and Protocols (Methods in Molecular Biology). – М.: , 2010. – 528 с. Genetic Variation: Methods and Protocols (Methods in Molecular Biology). – М.: , 2010. – 376 с. Carbon Nanotubes: Methods and Protocols (Methods in Molecular Biology). – М.: , 2010. – 250 с. S.Y. Kung, M.W. Mak, S.H. Lin. Biometric Authentication: A Machine Learning Approach (Prentice Hall Information and System Sciences Series). – М.: , 2010. – 496 с. Japonica Brown-Saracino. A Neighborhood That Never Changes: Gentrification, Social Preservation, and the Search for Authenticity (Fieldwork Encounters and Discoveries). – М.: , 2010. – 352 с. Forensic DNA Typing Protocols. – М.: Humana Press, 2004. – 296 с. Imaging Mass Spectrometry: Protocols for Mass Microscopy. – М.: , 2010. – 272 с. Steve Suehring. Wiley Pathways Windows Network Administration Project Manual. – М.: , 2007. – 404 с. Qing Li. IPv6 Core Protocols Implementation. – М.: , 2010. – 968 с. Alan R. Kimmel. DNA Microarrays Part A: Array Platforms & Wet-Bench Protocols,410. – М.: , 2010. – 512 с. Da-Wen Sun. Modern Techniques for Food Authentication. – М.: , 2010. – 720 с. M. Bentall. ATM and Internet Protocol. – М.: , 2010. – 168 с. Evan DeRenzo. Writing Clinical Research Protocols. – М.: , 2010. – 320 с. Qing Li. IPv6 Advanced Protocols Implementation. – М.: , 2010. – 1008 с. Gordon Clarke. Practical Modern SCADA Protocols. – М.: , 2010. – 544 с. Adrian Farrel. The Internet and Its Protocols. – М.: , 2010. – 840 с. W. Wisden. In Situ Hybridization Protocols for the Brain,47. – М.: , 2010. – 272 с. Mark Wrathall. Heidegger, Authenticity & Modernity V 1 – Essays in Honor of Hubert L Dreyfus. – М.: , 2000. – 424 с. Allan G. Grapard. The Protocol of the Gods – A Study of the Kasuga Cult in Japanese History. – М.: , 1993. – 310 с. Tasaka. Performance Analysis of Multiple Access Protocols. – М.: , 2008. – 288 с. Lucinda Scala Quinn. Lucinda?s Authentic Jamaican Kitchen. – М.: , 2006. – 128 с. Eric A Hall. Internet Core Protocols: The Definitive Guide. – М.: , 2000. – 472 с. Richard Peterson. Creating Country Music – Fabricating Authenticity (Paper). – М.: , 2000. – 320 с. Anne–marie Blondeau. Authenticating Tibet – Answers to China?s 100 Questions. – М.: , 2008. – 398 с. Joesph Davies. Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference. – М.: , 2003. – 768 с. Mallikarjun Tatipamula. Advanced Internet Protocols. – М.: , 2011. – 450 с. Seth D. Kunin. Juggling Identities – Identity and Authenticity Among the Crypto–Jews. – М.: , 2009. – 320 с. David Chidester. Authentic Fakes – Religion and American Popular Culture. – М.: , 2005. – 294 с. David Grazian. Blue Chicago – The Search for Authenticity in Urban Blues Clubs. – М.: , 2003. – 320 с. David Chidester. Authentic Fakes – Religion and American Popular Culture. – М.: , 2005. – 294 с. David Grazian. Blue Chicago – The Search for Authenticity in Urban Blues Clubs. – М.: , 2005. – 328 с. Gary Alan Fine. Everyday Genius – Self–Taught Art and the Culture of Authenticity. – М.: , 2006. – 344 с. Alexander R Galloway. Protocol – How Control Exists after Decentralization. – М.: , 2004. – 248 с. John Amodeo. The Authentic Heart. – М.: , 2001. – 304 с. Will Eisner. The Plot – The Secret Story of the Protocols of the Elders of Zion. – М.: , 2006. – 160 с. Timothy A. Craul. Soil Design Protocols for Landscape Architects and Contractors. – М.: , 1995. – 0 с. Alexander Nehamas. Virtues of Authenticity – Essays on Plato & Socrates (Paper). – М.: , 1998. – 408 с. Tasaka. Performance Analysis of Multiple Access Protocols. – М.: , 1986. – 0 с. Hamad Rashid. Wireless Application Protocol Programming. – М.: , 2001. – 720 с. Shelly Errington. The Death of Authentic Primitive Art & Other Tales of Progress (Paper). – М.: , 1998. – 338 с. Jon Crowcroft. TCP/IP and Linux Protocol Implementation. – М.: , 2001. – 976 с. Charles Taylor. The Ethics of Authenticity. – М.: , 1992. – 154 с. R. Jones. Clinically Speaking – the Authentic Language of Clinical Medicine. – М.: , 1994. – 144 с. Nat Hentoff. Living the Bill of Rights – How to be an Authentic American. – М.: , 1999. – 254 с. Andreas Schonle. Authenticity & Fiction in the Russian Literary Journey, 1790–1840. – М.: , 2000. – 304 с. Goedicke. The Protocol of Neferyt – The Prophecy of Neferti. – М.: , 1977. – 0 с. K Anders Ericsson. Protocol Analysis – Verbal Reports as Data – Revised Edition. – М.: , 1993. – 500 с. Jan Yager. Business Protocol. – М.: , 1991. – 246 с. Bill George. Authentic Leadership. – М.: , 2003. – 240 с. David Durham. Inside the Internet?s Resource reSerVation Protocol. – М.: , 1999. – 384 с. J Kilian. Uses of Randomness in Algorithms & Protocols. – М.: , 1990. – 260 с. Gregor Kiczales. The Art of the Metaobject Protocol. – М.: , 1991. – 348 с. James Buchan. The Authentic Adam Smith – His Life and Ideas. – М.: , 2006. – 256 с. Mark Wrathall. Heidegger, Authenticity & Modernity V 1 – Essays in Honor of Hubert L Dreyfus. – М.: , 2000. – 424 с. Hugh Barker. Faking It – The Quest for Authenticity in Popular Music. – М.: , 2007. – 304 с. Will Eisner. The Plot – The Secret Story of the Protocols of the Elders of Zion. – М.: , 2005. – 160 с. Dr. Silke Holtmanns. Cellular Authentication for Mobile and Internet Services. – М.: , 2008. – 212 с. David G Victor. The Collapse of the Kyoto Protocol and the Struggle to Slow Global Warming. – М.: , 2004. – 224 с. J. Mark Pullen. Understanding Internet Protocols. – М.: , 2000. – 304 с. Stephen A. Thomas. IPng and the TCP/IP Protocols. – М.: , 1996. – 496 с. Elizabeth Bernstein. Temporarily Yours – Intimacy, Authenticity and the Commerce of Sex. – М.: , 2008. – 288 с. Elizabeth Bernstein. Temporarily Yours – Intimacy, Authenticity, and the Commerce of Sex. – М.: , 2007. – 288 с. Steve Mann. Programming Applications with the Wireless Application Protocol. – М.: , 2000. – 256 с. Wireless Application Protocol Forum, Ltd. Official Wireless Application Protocol 2.0. – М.: , 1999. – 768 с. Jacob Palme. Internet Application Protocols. – М.: , 2003. – 640 с. Maram Epstein. Competing Discourses – Orthodoxy, Authenticity & Engendered Meanings in Late Imperial Chinese Fiction. – М.: , 2001. – 376 с. Authenticity in Teaching. – М.: , 2006. – 96 с. Kevin J H Dettmar. Reading Rock & Roll – Authenticity, Appropriation, Aesthetics (Paper). – М.: , 1999. – 360 с. Gregor Kiczales. The Art of the Metaobject Protocol (Paper). – М.: , 1991. – 348 с. Mohamed Youshah Shameel Mecca and Tirumala Rao Kothaluru. Evaluation of EAP Authentication Methods. – М.: LAP Lambert Academic Publishing, 2013. – 72 с. M. Amutha Prabakar and Indrani B. Road Map on Password Based Authentication Schemes Using Smart Card. – М.: LAP Lambert Academic Publishing, 2011. – 76 с. Kanav Sood. Kerberos Authentication Protocol. – М.: LAP Lambert Academic Publishing, 2011. – 120 с. Garima Verma. Implementation of Authentication and Transaction Security. – М.: LAP Lambert Academic Publishing, 2013. – 60 с. Younus Javed and Hassan Tahir. Optimized Security Protocol for Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. E.A.Mary Anita. Securing Multicast Routing Protocols for Mobile Adhoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 88 с. Arun Saha. Secure Protocols for Location, Adjacency, and Identity Verification. – М.: LAP Lambert Academic Publishing, 2011. – 248 с. Ming-Chin Chuang. Authentication and Mobility Management Mechanisms in VANETs. – М.: Scholars' Press, 2014. – 96 с. Mohamed Geaiger. Development of Secure Domain Control Frame Work. – М.: LAP Lambert Academic Publishing, 2011. – 224 с. Marimuthu Kanagaraj and Eswari Venkatachalam. Multifactor Authentication Protocol for a Secured WSN. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Vincent Omollo. Enhanced Network Security. – М.: LAP Lambert Academic Publishing, 2013. – 76 с. Pavel Ocenasek. Security Protocols. – М.: LAP Lambert Academic Publishing, 2010. – 112 с. Keshava Munegowda. Design and Implementation of WLAN Authentication and Security. – М.: LAP Lambert Academic Publishing, 2010. – 124 с. Faisal Karim Bhutta. Smartphone based Authentication & Authorization Protocol for SPACS. – М.: LAP Lambert Academic Publishing, 2014. – 56 с. Paulo Sergio Pagliusi. Internet Authentication for Remote Access. – М.: Scholars' Press, 2013. – 432 с. Mohd Nazri Ismail,Mohd Afizi Shukran and Megat Farez Azril. VoIP over IP with fingerprint authentication and digital signature. – М.: LAP Lambert Academic Publishing, 2014. – 84 с. Astha Keshariya. Authenticated Trusted Server Controlled Key Establishment. – М.: LAP Lambert Academic Publishing, 2012. – 180 с. Bijan Soleymani. Social Authentication for Mobile Phones. – М.: LAP Lambert Academic Publishing, 2010. – 100 с. Mahmoud Osama Ouf,Raafat A.El-kammar and Alaa Eldeen Sayed Ahmed. Implementation and Analysis Requirements of Ultra-Lightweight. – М.: LAP Lambert Academic Publishing, 2012. – 132 с. Burcu Kulahc?oglu. Timed Automata as a Verification Tool for Security Protocols. – М.: LAP Lambert Academic Publishing, 2011. – 104 с. Dr Sandeep Kumar Sood. AUTHENTICATION PROTOCOLS. – М.: LAP Lambert Academic Publishing, 2011. – 236 с.
Лучшие результаты Ничего не найдено Дополнительные результаты Ничего не найдено
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Марина Большое спасибо за сопровождаемые лабораторные работы. С наступившими Вас праздниками, всего хорошего!