Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Michael Jang. MasteringTM Red Hat® Linux 9. – М.: , 2003. – 976 с. Roderick W. Smith. CompTIA Linux+ Study Guide. – М.: , 2010. – 648 с. Michael Bauer. Linux Server Security. – М.: , 2005. – 526 с. Vivek Chopra, Sing Li, Jeff Genender. Professional Apache Tomcat 6. – М.: Wiley Publishing, Inc, 2007. – 672 с. Linux: The Complete Reference, Sixth Edition. – М.: , 2011. – 830 с. Vmware Vsphere 4 Implementation. – М.: , 2011. – 682 с. Linux Administration: A Beginner'S Guide, Fifth Edition. – М.: , 2011. – 662 с. Mike Meyers' Comptia Network+ Guide To Managing And Troubleshooting Networks Lab Manual, Second Edition. – М.: , 2011. – 352 с. Oracle Database Administration For Microsoft Sql Server Dbas. – М.: , 2011. – 352 с. Bill McCarty. Learning Red Hat Enterprise Linux and Fedora (+ 2 CD-ROM). – М.: O'Reilly Media, 2004. – 352 с. Shaek Rana Mohammad Baki Billah and Mohammad Hafizur Rahman. Design & Development of Network Security System using IP Tables. – М.: LAP Lambert Academic Publishing, 2013. – 164 с. Kefa Rabah. Mastering Virtualization Technology for your IT Challenges. – М.: LAP Lambert Academic Publishing, 2011. – 352 с. Firas Abdullah Thweny Al-Saedi and Mazin Mohammed Radhi Al-Haidary. Design and implementation of Linux based VSAT monitoring system. – М.: LAP Lambert Academic Publishing, 2013. – 100 с. Kefa Rabah. Mastering Open Source Mail Servers and ISPHost Deployment. – М.: LAP Lambert Academic Publishing, 2011. – 352 с. Дополнительные результаты Francis Groves. Corporate Actions - A Concise Guide: An introduction to securities events. – М.: , 2012. – 230 с. Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с. Data Privacy Management and Autonomous Spontaneus Security: 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, ... Computer Science / Security and Cryptology). – М.: , 2012. – 334 с. Security and Privacy in Mobile Information and Communication Systems: Third International ICST Conference, MOBISEC 2011, Aalborg, Denmark, May 17-19, ... and Telecommunications Engineering). – М.: , 2012. – 195 с. Constructive Side-Channel Analysis and Secure Design: Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings ... Computer Science / Security and Cryptology). – М.: , 2012. – 280 с. Public Key Infrastructures, Services and Applications: 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected ... Computer Science / Security and Cryptology). – М.: , 2012. – 219 с. Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – М.: , 2012. – 283 с. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 515 с. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с. Smart Card Research and Advanced Applications: 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, ... Computer Science / Security and Cryptology). – М.: , 2012. – 357 с. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с. Security and Development in Global Politics: A Critical Comparison. – М.: , 2012. – 360 с. Joseph F. Stenken JD CLU ChFc. Social Security & Medicare Facts 2012. – М.: , 2012. – 451 с. Brian Larson. Delivering Business Intelligence with Microsoft SQL Server 2012 3/E. – М.: , 2012. – 832 с. Luis Lobo-Guerrero. Insuring Security: Biopolitics, security and risk. – М.: , 2012. – 178 с. CCH Editorial Staff. Social Security Explained 2012. – М.: , 2012. – 298 с. Terrorism and the Olympics: Major Event Security and Lessons for the Future. – М.: , 2012. – 272 с. Sheila R Ronis. Economic Security: Neglected Dimension of National Security?. – М.: , 2012. – 128 с. Denise Garcia. Disarmament Diplomacy and Human Security: Regimes, Norms and Moral Progress in International Relations. – М.: , 2012. – 0 с. Securities Compliance Index. Securities Compliance Index, Second Edition: A Topical Guide To U.S. Securities Regulation. – М.: , 2012. – 512 с. SSC, Publishers of Linux Journal. Linux in the Workplace. – М.: , 0. – 0 с. Julia Lowell, C. R. Neu, Daochi Tong, National Defense Research Institute, National Security Research Institute. Financial Crises and Contagion in Emerging Market Countries. – М.: , 0. – 0 с. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с. Joseph S. Nye, William A. Owens, James R. Schlesinger, R. James Woolsey, James A. Lewis, Joseph S., Jr. Nye, James Andrew Lewis, Erin Schlather, Csis Commission on Technology Security in the Twenty-First Century. Computer Exports and National Security: New Tools for a New Century : A Report of the Csis Commission on Technology Security in the 21St-Century (Csis Panel Reports.). – М.: , 0. – 0 с. Geoff Craighead. High-Rise Security and Fire Life Safety, Second Edition. – М.: , 0. – 0 с. Lisa M. Lindgren, Lisa Lindgren. Application Servers for E-Business. – М.: , 0. – 0 с. Jonathan S. Held, John R. Bowers. Securing E-Business Applications and Communications. – М.: , 0. – 0 с. James E. Goldman, Phillip T. Rawles, Julie R. Mariga. Client/Server Information Systems: A Business-Oriented Approach. – М.: , 0. – 0 с. Tony Redmond. Microsoft Exchange Server V5.5: Planning, Design and Implementation. – М.: , 0. – 0 с. Simson Garfinkel, Gene Spafford. Web Security & Commerce (O'Reilly Nutshell). – М.: , 0. – 0 с. Clayton C. Peddy, Derek Armentrout. Building Solutions with Microsoft Commerce Server 2002. – М.: Microsoft Press, 2003. – 656 с. Ron Ben Natan. Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase. – М.: , 2005. – 432 с. Goran Husman. Beginning SharePoint Administration: Windows SharePoint Services and SharePoint Portal Server. – М.: Wrox, 2006. – 552 с. Joe Schurman, Randy Thomas, Bob Christian. Professional Live Communications Server. – М.: Wrox, 2006. – 302 с. Committee on Federal Regulation of Securities Committee. The Fund Director's Guidebook: Third Edition (Fund Director's Guidebook). – М.: , 2006. – 128 с. Windows Server 2008 Resource Kit. – М.: Microsoft Press, 2008. – 4000 с. Patrick Regan. MCTS 70-643 Exam Cram: Windows Server 2008 Applications Infrastructure, Configuring (Exam Cram). – М.: , 2008. – 480 с. Meridian Securities Market. World Stock Exchange Fact Book. – М.: , 2008. – 0 с. CompTIA Security+: Certification Kit (комплект из 3 книг + 2 CD-ROM). – М.: Sybex, 2009. – 1440 с. Bob LeVitus, Jeff Evans. WebMaster Windows: How to Build Your Own World Wide Web Server Without Really Trying (+ CD-ROM). – М.: AP Professional, 1997. – 512 с. Todd Klindt, Shane Young, Steve Caravajal. Professional SharePoint 2010 Administration. – М.: Wiley Publishing, Inc, 2010. – 840 с. Michael Jang. MasteringTM Red Hat® Linux 9. – М.: , 2003. – 976 с. Jim McBee. Mastering Microsoft Exchange Server 2010. – М.: , 2010. – 984 с. John Kelbley. Windows Server 2008 R2 Hyper–V. – М.: , 2010. – 408 с. Roderick W. Smith. CompTIA Linux+ Study Guide. – М.: , 2010. – 648 с. James Stanger. How to Cheat at Securing Linux. – М.: , 2010. – 432 с. XYPRO Technology Corp. Securing HP NonStop Servers in an Open Systems World. – М.: , 2010. – 1000 с. Aaron Tiensivu. Securing Windows Server 2008. – М.: , 2010. – 656 с. Tariq Azad. Securing Citrix XenApp Server in the Enterprise. – М.: , 2010. – 528 с. XYPRO Technology Corp. HP NonStop Server Security. – М.: , 2010. – 656 с. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с. Mark Fugatt. CYA Securing Exchange Server 2003. – М.: , 2010. – 352 с. Mark Horninger. How to Cheat at Securing SQL Server 2005. – М.: , 2010. – 412 с. Orin Thomas. MCSA/MCSE Self–Paced Training Kit (Exam 70–350) – Implementing Microsoft Internet Security and Acceleration Server 2004. – М.: , 2005. – 1104 с. Daniel J Barrett. Linux Security Cookbook. – М.: , 2003. – 336 с. Matthew Hester, Sarah Dutkiewicz. Automating Microsoft Windows Server 2008 R2 with Windows PowerShell 2.0. – М.: Wiley Publishing, Inc, 2011. – 432 с. Roderick W. Smith. Linux Samba Server Administration. – М.: , 2000. – 630 с. Stacia Misner. Microsoft SQL Server 2008 Reporting Services Step by Step (+ CD-ROM). – М.: Microsoft Press, 2009. – 576 с. Dave Farquhar. Integrating Linux Servers with Windows Networks. – М.: , 2000. – 400 с. Russ Kaufman. MCSA/MCSE: Windows® Server 2003 Network Security Administration Study Guide. – М.: , 2004. – 560 с. Stefan Norberg. Securing Windows NT/2000 Servers for the Internet. – М.: , 2000. – 216 с. Christa Anderson and Kristin L. Griffin. Windows Server 2008 R2: Remote Desktop Services: Resource Kit (+ CD-ROM). – М.: Microsoft Press, 2010. – 718 с. Mike Danseglio. Windows Server 2003 Security Cookbook. – М.: , 2006. – 512 с. Mohammed J. Kabir. Red Hat® Linux® 6 Server. – М.: , 1999. – 816 с. Michael Bauer. Linux Server Security. – М.: , 2005. – 526 с. Joseph S. Park. AS/400 Security in a Client/Server Environment. – М.: , 1995. – 290 с. Vivek Chopra, Sing Li, Jeff Genender. Professional Apache Tomcat 6. – М.: Wiley Publishing, Inc, 2007. – 672 с. NICHOLAS. LINUX Web Server Toolkit. – М.: , 1998. – 528 с. Microsoft. Security Operations for Microsoft Exchange 2000 Server. – М.: , 2002. – 136 с. Microsoft. Security Operations Guide for Microsoft Windows 2000 Server. – М.: , 2002. – 208 с. Charles Aulds. Linux Apache Web Server Administration. – М.: , 2002. – 624 с. Craig Hunt. Linux Network Servers. – М.: , 2002. – 672 с. William Von Hagen. Linux Server Hacks V 2. – М.: , 2006. – 478 с. Roberta Bragg. MCSE Self–Paced Training Kit (Exam 70–298) – Designing Security for a Microsoft Windows Server 2003 Network. – М.: , 2004. – 864 с. Paul Robichaux. Secure Messaging with Microsoft Exchange Server 2003. – М.: , 2004. – 544 с. David A. Bandel. Linux® Security Toolkit. – М.: , 2000. – 480 с. Mohammed J. Kabir. Red Hat® Linux® Security and Optimization. – М.: , 2001. – 720 с. Hacking Exposed Windows: Microsoft Windows Security Secrets And Solutions, Third Edition. – М.: , 2011. – 451 с. Microsoft Windows Server 2008 Administration. – М.: , 2011. – 488 с. Microsoft® Office Sharepoint® Server 2007: A Beginner'S Guide. – М.: , 2011. – 625 с. Linux: The Complete Reference, Sixth Edition. – М.: , 2011. – 830 с. Vmware Vsphere 4 Implementation. – М.: , 2011. – 682 с. Microsoft® Sql Server 2008 R2 Analytics & Data Visualization. – М.: , 2011. – 576 с. Microsoft Exchange Server 2007: A Beginner'S Guide. – М.: , 2011. – 528 с. Mcitp Sql Server 2005 Database Administration All-In-One Exam Guide (Exams 70-431, 70-443, & 70-444). – М.: , 2011. – 0 с. Linux Administration: A Beginner'S Guide, Fifth Edition. – М.: , 2011. – 662 с. Microsoft Sql Server 2008 A Beginner'S Guide 4/E. – М.: , 2011. – 709 с. Mike Meyers' Comptia Network+ Guide To Managing And Troubleshooting Networks Lab Manual, Second Edition. – М.: , 2011. – 352 с. Citrix® Access Suite Security For It Administrators. – М.: , 2011. – 268 с. Oracle Database Administration For Microsoft Sql Server Dbas. – М.: , 2011. – 352 с. Microsoft Sql Server 2008 Administration For Oracle Dbas. – М.: , 2011. – 592 с. Mac Os X System Administration. – М.: , 2011. – 528 с. Oracle Application Server Portal Handbook. – М.: , 2011. – 597 с. Microsoft Windows Server 2008: A Beginner'S Guide. – М.: , 2011. – 592 с. Microsoft Windows Server 2008: The Complete Reference. – М.: , 2011. – 826 с. Hands-On Microsoft Sql Server 2008 Integration Services, Second Edition. – М.: , 2011. – 720 с. Sap R/3 Handbook, Third Edition. – М.: , 2011. – 606 с. Microsoft Sql Server 2005: A Beginner''S Guide. – М.: , 2011. – 704 с. Hacking Exposed Linux. – М.: , 2011. – 813 с. А.Г. Андреев, Е.Ю. Беззубов, М.М. Емельянов, О.И. Кокорева, А.Н. Чекмарев. Microsoft Windows 2000. Server и Professional. Русские версии. – СПб.: БХВ-Петербург, 2000. – 1056 с. Дэвид Бэндл. Защита и безопасность в сетях Linux. Для профессионалов (+ CD-ROM). – СПб.: Питер, 2002. – 480 с. Hitachi Consulting, Stacia Misner. Microsoft SQL Server 2000 Reporting Services Step by Step (+ CD-ROM). – М.: Microsoft Press, 2005. – 464 с. Elias Khasner, Laura E. Hunter. MCSE Designing Security for a Windows Server 2003 Network: Exam 70-298. – М.: , . – с. Jan De Clercq, JAN DE CLERCQ. Windows Server 2003 Security Infrastructures : Core Security Features. – М.: , . – с. Thomas Porter, Jan Kanclirz Jr. Practical VoIP Security. – М.: Syngress, 2006. – 564 с. Ken England, Gavin JT Powell. Microsoft SQL Server 2005 Performance Optimization and Tuning Handbook. – М.: , 2007. – 520 с. Bill McCarty. Learning Red Hat Enterprise Linux and Fedora (+ 2 CD-ROM). – М.: O'Reilly Media, 2004. – 352 с. В.Б. Комягин, Ф.А. Резников. Ubuntu Server 2012-2015 + настольные ПК с Ubuntu в офисе (+ DVD-ROM). – М.: Триумф, 2012. – 256 с. Shaek Rana Mohammad Baki Billah and Mohammad Hafizur Rahman. Design & Development of Network Security System using IP Tables. – М.: LAP Lambert Academic Publishing, 2013. – 164 с. Divya Sharma and Kamal Kant. Embedded Linux Porting on ARM & RFID Implementation Using ARM SoC. – М.: LAP Lambert Academic Publishing, 2013. – 84 с. Alaa K. Farhan. Security Protocol for Mobile Data. – М.: LAP Lambert Academic Publishing, 2013. – 116 с. Victoria Yemi-Peters. Mobile Banking Security Services. – М.: LAP Lambert Academic Publishing, 2011. – 88 с. Mehedi Al Mamun. Operating systems security: LINUX. – М.: LAP Lambert Academic Publishing, 2011. – 52 с. Faraz Fatemi Moghaddam. Secure Cloud Computing with Client-Based Control System. – М.: LAP Lambert Academic Publishing, 2013. – 100 с. Garima Verma. Implementation of Authentication and Transaction Security. – М.: LAP Lambert Academic Publishing, 2013. – 60 с. Ahmad Mudhar. The CSF Firewall. – М.: LAP Lambert Academic Publishing, 2013. – 52 с. Mohamed Geaiger. Development of Secure Domain Control Frame Work. – М.: LAP Lambert Academic Publishing, 2011. – 224 с. Vincent Omollo. Enhanced Network Security. – М.: LAP Lambert Academic Publishing, 2013. – 76 с. Usman Habib. Secure Mobile Authentication for Linux Workstation log on. – М.: LAP Lambert Academic Publishing, 2011. – 120 с. Kefa Rabah. Ubuntu Server Administration and Cloud Computing. – М.: LAP Lambert Academic Publishing, 2011. – 320 с. Gunasekar Kumar and Anirudh Chelikani. Analysis of Security Issues in Cloud Based E-Learning. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Kefa Rabah. Mastering Virtualization Technology for your IT Challenges. – М.: LAP Lambert Academic Publishing, 2011. – 352 с. Debasish Jena. On Protocols for Information Security Services. – М.: LAP Lambert Academic Publishing, 2011. – 136 с. Rajani Sharma and Rajender Trivedi. Secure Data Retrieval with token ensuring possession proof. – М.: LAP Lambert Academic Publishing, 2014. – 56 с. Astha Keshariya. Authenticated Trusted Server Controlled Key Establishment. – М.: LAP Lambert Academic Publishing, 2012. – 180 с. Firas Abdullah Thweny Al-Saedi and Mazin Mohammed Radhi Al-Haidary. Design and implementation of Linux based VSAT monitoring system. – М.: LAP Lambert Academic Publishing, 2013. – 100 с. Hassen Alsafi and Mohammed Azhruddin. The Security Issues for Smart Grids Applications on Cloud Computing. – М.: LAP Lambert Academic Publishing, 2013. – 60 с. Kefa Rabah. Red Hat Enterprise Linux (RHEL) 6 Server Installation & Administration. – М.: LAP Lambert Academic Publishing, 2012. – 352 с. Kefa Rabah. Mastering Open Source Mail Servers and ISPHost Deployment. – М.: LAP Lambert Academic Publishing, 2011. – 352 с. Kefa Rabah. The Ultimate Ubuntu 14.04 LTS Server Installation and Administration. – М.: LAP Lambert Academic Publishing, 2014. – 352 с. Anvar Akhmedjanov. Security in SAP NetWeaver 7.0 Application Server ABAP. – М.: LAP Lambert Academic Publishing, 2011. – 128 с. Alptekin Kupcu. Efficient Cryptography for the Next Generation Secure Cloud. – М.: LAP Lambert Academic Publishing, 2010. – 220 с. Audu Jonathan Adoga and Fredah I. Agbeje. Introduction to Internet Security for PHP Web Developers. – М.: , 2014. – 52 с. Michael Hale Ligh, Andrew Case, Jamie Levy, AAron Walters. The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory. – М.: Wiley, . – 912 с. Emmett Dulaney. Linux All??“in??“One For Dummies. – М.: , 2014. – с. David Rule. How to Cheat at Configuring VmWare ESX Server. – М.: Syngress, 2007. – 408 с. Лучшие результаты Ничего не найдено Дополнительные результаты Сегодня виртуализация компьютера, а завтра... персонала?. интервью с С. Белоусовым, генеральным директором компании Parallels, основателем компаний: Acronis, ASP Linux. "Управление персоналом", № 24, декабрь 2008. Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
J.S., 23.05 Я наконец получил окончательную оценку за реферат по кинокомедии: отлично, как и ожидалось. В основе реферата - полученный от вас материал. Я его значительно сократил и несколько переработал, немного перестроил, добавил эпиграфы и прочие цитаты а также кое-какие собственные необязательные рассуждения. Большое спасибо за помощь (Фактически Ваш вклад составил около 80% работы).