Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Omid Mahdi Ebadati E.,Harleen Kaur M. Afshar Alam and Kaebeh Yaeghoobi. Micro-Firewalls for Dynamic Network Security Framework. – М.: LAP Lambert Academic Publishing, 2012. – 292 с.

Дополнительные результаты

  1. Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с.
  2. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с.
  3. ZongWei Luo. Innovations in Logistics and Supply Chain Management Technologies for Dynamic Economies. – М.: , 2012. – 460 с.
  4. Stan Herman. Rewiring Organizations for the Networked Economy : Organizing, Managing, and Leading in the Information Age (J-B O-D (Organizational Development)). – М.: , 0. – 0 с.
  5. Kanwalroop Kathy Dhanda, Anna Nagurney, Padma Ramanujam. Environmental Networks:A Framework for Economic Decision-Making and Policy Analysis. – М.: , 0. – 0 с.
  6. Thomas J. Parenty. Digital Defense: What You Should Know About Protecting Your Company's Assets. – М.: , 0. – 0 с.
  7. Peter R., MBA Ramsaroop. Securing Business Intelligence: Knowledge and CyberSecurity in the Post 9/11 World. – М.: , 2004. – 0 с.
  8. Jeffrey Bannister. Convergence Technologies for 3G Networks : IP, UMTS, EGPRS and ATM. – М.: , 2004. – 670 с.
  9. Ron Ben Natan. Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase. – М.: , 2005. – 432 с.
  10. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с.
  11. Spatial Dynamics, Networks And Modelling (New Horizons in Regional Science Series). – М.: , 2006. – 528 с.
  12. Patrick Traynor, Patrick McDaniel, Thomas La Porta. Security for Telecommunications Networks (Advances in Information Security). – М.: , 2008. – 182 с.
  13. Network Security. – М.: , 2008. – 370 с.
  14. Crucible For Survival: Environmental Security and Justice in the Indian Ocean Region. – М.: , 2008. – 332 с.
  15. Environmental Change and Human Security: Recognizing and Acting on Hazard Impacts (NATO Science for Peace and Security Series C: Environmental Security). – М.: , 2008. – 480 с.
  16. Micro-Foundations for Innovation Policy. – М.: , 2008. – 385 с.
  17. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с.
  18. Daniel Clark. Network Access Control 100 Success Secrets - 100 Most Asked NAC Questions on Implementation and Deployment of unify endpoint security technology, user ... and network security enforcement. – М.: , 2008. – 180 с.
  19. Dmitrii Lozovanu, Stefan Pickl. Optimization and Multiobjective Control of Time-Discrete Systems: Dynamic Networks and Multilayered Structures. – М.: , 2009. – 285 с.
  20. Stephen Hardison, David Byrd, Gary Wood, Tim Speed, Michael Martin, Suzanne Livingston, Jason Moore. IBM Lotus Connections 2.5: Planning and Implementing Social Software for Your Enterprise. – М.: , 2010. – 456 с.
  21. Rob Cameron. Juniper(r) Networks Secure Access SSL VPN Configuration Guide. – М.: , 2010. – 656 с.
  22. Daniel M. Dobkin. RF Engineering for Wireless Networks. – М.: , 2010. – 448 с.
  23. Owen Poole. Network Security. – М.: , 2010. – 224 с.
  24. Edward Beltrami. Mathematics for Dynamic Modeling. – М.: , 2010. – 219 с.
  25. James Joshi. Network Security: Know It All. – М.: , 2010. – 368 с.
  26. Steve Manzuik. Network Security Assessment: From Vulnerability to Patch. – М.: , 2010. – 500 с.
  27. Jan L. Harrington. Network Security. – М.: , 2010. – 384 с.
  28. Russ Rogers. Network Security Evaluation Using the NSA IEM. – М.: , 2010. – 450 с.
  29. Brien Posey. GFI Network Security and PCI Compliance Power Tools. – М.: , 2010. – 488 с.
  30. John William Evans. Deploying IP and MPLS QoS for Multiservice Networks. – М.: , 2010. – 456 с.
  31. Arun Handa. System Engineering for IMS Networks. – М.: , 2010. – 340 с.
  32. Syngress. Managing Cisco Network Security 2E. – М.: , 2010. – 752 с.
  33. Merouane Debbah. Game Theory for Wireless Networks. – М.: , 2010. – 400 с.
  34. Mark Stefik. The Internet Edge – Social, Technical & Legal Challenges for a Networked World. – М.: , 1999. – 330 с.
  35. Bill English. MCSA/MCSE: Windows® 2000 Network Security Administration Study Guide. – М.: , 2003. – 574 с.
  36. Mark Stefik. Internet Edge – Social, Technical & Legal Challenges for a Networked World. – М.: , 2000. – 338 с.
  37. Russ Kaufman. MCSA/MCSE: Windows® Server 2003 Network Security Administration Study Guide. – М.: , 2004. – 560 с.
  38. Nitesh Dhanjani. Network Security Tools. – М.: , 2005. – 340 с.
  39. Brian Komar. Firewalls For Dummies®. – М.: , 2001. – 408 с.
  40. NR SEIGLE. Seigle Instructor?s Manual (t/m) For Dynamics Of ?business Communications? (paper Only). – М.: , 1984. – 96 с.
  41. Thomas W. Madron. Network Security in the 90?s. – М.: , 1992. – 304 с.
  42. B Epstein. Wiley IAS 98 – Interpretation & Application of International Accounting Standards 1998 for Windows Network User?s Guide. – М.: , 1999. – 0 с.
  43. Microsoft. MCSE Training Kit (Exam 70–220) – Designing Microsoft Windows 2000 Network Security. – М.: , 2001. – 864 с.
  44. Andrew Lockhart. Network Security Hacks. – М.: , 2004. – 316 с.
  45. Barry J. Epstein. Wiley IAS 98 Interpretation and Application of International Accounting Standards 1998 for Windows Network Version. – М.: , 1999. – 0 с.
  46. D Delaney. Wiley CPA Examination Review 3.0 for Windows Network User?s Guide. – М.: , 1999. – 0 с.
  47. B Larkin. Wiley GAAP–NfP for Windows Network CD. – М.: , 1999. – 0 с.
  48. P Delaney. Wiley GAAP 98 for Windows: Interpretation & Application of Generally Accepted Accounting Standards for Windows Network Edition User?s Guide. – М.: , 1998. – 40 с.
  49. B Larkin. Wiley GAAP NfP 99 for Windows Network Quick Start Card. – М.: , 1999. – 0 с.
  50. DAN. Network Security In A Mixed Environment. – М.: , 1998. – 456 с.
  51. Brian Komar. Firewalls For Dummies®. – М.: , 2003. – 432 с.
  52. Epstein. Wiley IAS 99 for Windows Network Edition Quick Start Card. – М.: , 1999. – 0 с.
  53. David Claiborne. Mathematical Preliminaries for Computer Networking. – М.: , 1990. – 180 с.
  54. Matthew Strebe. Network Security JumpStartTM. – М.: , 2002. – 384 с.
  55. Pawan K Bhardwaj. A+. Network+, Security+ Exams in a Nutshell. – М.: , 2007. – 812 с.
  56. Eric Cole. Network Security Bible. – М.: , 2005. – 694 с.
  57. Anthony Jones. Network Programming for the Microsoft .NET Framework. – М.: , 2003. – 384 с.
  58. S MUFTIC. Muftic: ?security? Mechanisms For Computer Network S. – М.: , 1989. – 196 с.
  59. Eric Cole. Wiley Pathways Network Security Fundamentals Project Manual. – М.: , 2008. – 312 с.
  60. Andrew Lockhart. Network Security Hacks 2e. – М.: , 2006. – 352 с.
  61. Chris Mcnab. Network Security Assessment 2e. – М.: , 2007. – 464 с.
  62. Cryptography & Network Security. – М.: , 2007. – 0 с.
  63. Securing Global Transportation Networks. – М.: , 2011. – 312 с.
  64. Perfect Phrases For Professional Networking: Hundreds Of Ready-To-Use Phrases For Meeting And Keeping Helpful Contacts – Everywhere You Go. – М.: , 2011. – 208 с.
  65. Wireless Network Security A Beginners Guide. – М.: , 2011. – 400 с.
  66. Network Security: The Complete Reference. – М.: , 2011. – 896 с.
  67. Fundamentals Of Network Security. – М.: , 2011. – 672 с.
  68. Greg Holden. Guide to Firewalls and Network Security: Intrusion Detection and VPNs. – М.: Course Technology, 2003. – 512 с.
  69. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . –  с.
  70. Michael Gregg, Eric Seagren, Angela Orebaugh, Matt Jonkman, Raffael Marty. How to Cheat at Configuring Open Source Security Tools (How to Cheat) (How to Cheat). – М.: , 2007. – 528 с.
  71. Ido Dubrawsky. How to Cheat at Securing Your Network. – М.: Syngress, 2007. – 432 с.
  72. Peter Bounds. Application of High-level Languages for Water Network Modelling. – М.: LAP Lambert Academic Publishing, 2010. – 252 с.
  73. Govind Sharma and Manish Gupta. Secure routing in wireless mobile Ad-Hoc network. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  74. Shaek Rana Mohammad Baki Billah and Mohammad Hafizur Rahman. Design & Development of Network Security System using IP Tables. – М.: LAP Lambert Academic Publishing, 2013. – 164 с.
  75. Yujia Zhai and Dingli Yu. Advanced Neural Network based Control for Automotive Engines. – М.: LAP Lambert Academic Publishing, 2012. – 180 с.
  76. Ben Puttnam. Sub-Systems for Dynamic Wavelength-Routed Optical Networks. – М.: LAP Lambert Academic Publishing, 2010. – 216 с.
  77. Xiangqian Chen. DEFENSE AGAINST NODE COMPROMISE IN SENSOR NETWORK SECURITY. – М.: LAP Lambert Academic Publishing, 2009. – 108 с.
  78. Quoc-Tuan Vien. Distributed Space-Time Block Codes for Relay Networks. – М.: LAP Lambert Academic Publishing, 2011. – 52 с.
  79. Vikram Santhanam. Interference Mitigation Techniques for Heterogeneous Network. – М.: LAP Lambert Academic Publishing, 2013. – 60 с.
  80. Chiranjeev Kumar and Rajeev Tripathi. Mobility Management Techniques for Wireless Networks. – М.: LAP Lambert Academic Publishing, 2010. – 128 с.
  81. Wael Al-Tabey. Kinematics &Dynamics Analysis of Micro-Robot for Surgical Applications. – М.: LAP Lambert Academic Publishing, 2012. – 136 с.
  82. Stefano Severi. Cooperative Wireless Networks for Localization. – М.: LAP Lambert Academic Publishing, 2010. – 96 с.
  83. Daniel Kwon and Venky Shankar. Vulnerability Analysis and Risk Assessment. – М.: Scholars' Press, 2014. – 324 с.
  84. Mikaela Warberg and Tora Gustafsson. The implementation of Hyogo Framework for Action in South Africa. – М.: LAP Lambert Academic Publishing, 2012. – 136 с.
  85. Hussein M. Khattab,Almoataz Y. Abdelaziz and Said F. Mekhamer. Innovative Approaches for Power System Security Assessment. – М.: LAP Lambert Academic Publishing, 2013. – 224 с.
  86. Raina Arora and Nita Parekh. Dynamical Networks. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  87. Manzur Ashraf. Channel Based Medium Access Control for Ad Hoc Wireless Networks. – М.: LAP Lambert Academic Publishing, 2010. – 168 с.
  88. Shahbaz Khan and Sahibzada Ali Mahmud. Cross Layer Optimization Techniques for Wireless Networks. – М.: LAP Lambert Academic Publishing, 2011. – 192 с.
  89. Ahmad Mostafa and Dharma Prakash Agrawal. Packet Delay and Throughput Optimization for Vehicular Networks. – М.: LAP Lambert Academic Publishing, 2014. – 168 с.
  90. Jose Manuel Delgado Mendinueta. Digital signal processing receivers for dynamic optical networks. – М.: LAP Lambert Academic Publishing, 2012. – 228 с.
  91. Hamid Reza Barzegar,Mahdiyeh Barzegar and Neshat Alidad. Energy Efficient And Secured Communication For Manets In Military. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  92. Xiaodong He. Automated intrusion prevention mechanism in enhancing network security. – М.: Scholars' Press, 2014. – 128 с.
  93. Lane Thames. Advancing Cyber Security. – М.: LAP Lambert Academic Publishing, 2013. – 256 с.
  94. Elliot Attipoe. Securing the Public Wireless Network. – М.: LAP Lambert Academic Publishing, 2013. – 92 с.
  95. Manvi Mishra and S.S. Bedi. WBEM for Heterogeneous Network Management. – М.: LAP Lambert Academic Publishing, 2014. – 116 с.
  96. Mohammad AlAhmad. Security threats of finger print biometric in network system. – М.: LAP Lambert Academic Publishing, 2014. – 88 с.
  97. Nirbhay Chaubey. Securing AODV Routing Protocol in design of Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2015. – 132 с.
  98. Aditya Kumar. Cryptography and Chaos a New Approach in Network Security. – М.: LAP Lambert Academic Publishing, 2015. – 80 с.
  99. Gang Zhao. Geographic Routing in Wireless Sensor and Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 128 с.
  100. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  101. Rakesh Jha. Security Issues In AD-HOC And Infrastructure (WLAN) Networks. – М.: LAP Lambert Academic Publishing, 2011. – 124 с.
  102. Reena Sharma. Authentication Mechanism for P2P Networks. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  103. Xiangfei Zhu. Bandwidth-sharing Mechanisms in Dynamic Circuit Networks. – М.: LAP Lambert Academic Publishing, 2012. – 132 с.
  104. R. Baskaran,M. S. Saleem Basha and A. Balasubramanian. Two Tier Security Framework for Service Oriented Systems. – М.: LAP Lambert Academic Publishing, 2012. – 176 с.
  105. Hong Yu. A Protocol for Multimedia Transmission over Wireless Networks. – М.: LAP Lambert Academic Publishing, 2012. – 272 с.
  106. Marimuthu Kanagaraj and Eswari Venkatachalam. Multifactor Authentication Protocol for a Secured WSN. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  107. Gurpreet juneja. Security:MPLS VPN Network. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  108. Shriram Sharma. Energy-efficient Secure Routing in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  109. Omid Mahdi Ebadati E.,Harleen Kaur M. Afshar Alam and Kaebeh Yaeghoobi. Micro-Firewalls for Dynamic Network Security Framework. – М.: LAP Lambert Academic Publishing, 2012. – 292 с.
  110. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  111. Shaffali Gupta and Sanmeet Kaur. A GUI Framework for detecting Intrusions using Bro IDS. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  112. Peter Kemei. Framework for Monitoring Hardware Firewall Functionality Using NIDS. – М.: LAP Lambert Academic Publishing, 2013. – 176 с.
  113. Soke Onyemelukwe. On-Demand Routing and Security in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2013. – 128 с.
  114. Vincent Omollo. Enhanced Network Security. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  115. Ahmed EzzEldin. Secure Clustering in Multi-Modal Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2013. – 84 с.
  116. Raj Shree and Ravi Prakash Pandey. Security Advancement in ZRP based Wireless Networks. – М.: LAP Lambert Academic Publishing, 2014. – 92 с.
  117. Firkhan Ali Hamid Ali. Vulnerability Analysis on the Computer Network Security. – М.: LAP Lambert Academic Publishing, 2010. – 72 с.
  118. Imran Sohail and Sikandar Hayat. Network Security and DDoS. – М.: LAP Lambert Academic Publishing, 2010. – 64 с.
  119. Ashok Karmokar. Cross-layer Power and Rate Adaptation Techniques for Wireless Networks. – М.: LAP Lambert Academic Publishing, 2011. – 256 с.
  120. Britto R. Kumar and Albert S. Rabara. An Architecture for Secure Mobile Payment System using PKI. – М.: LAP Lambert Academic Publishing, 2013. – 184 с.
  121. Raghavendra K. R. Model-checking infinite state systems for information flow security. – М.: LAP Lambert Academic Publishing, 2014. – 160 с.
  122. Volkan ERTURK,Dr. Ali ARIFOGLU and Dr. Attila OZGIT. A Framework Based On Continuous Security Monitoring. – М.: LAP Lambert Academic Publishing, 2010. – 148 с.
  123. Kefa Rabah. Mastering Securing ICT Infrastructure for Corporate Network. – М.: LAP Lambert Academic Publishing, 2014. – 360 с.
  124. Katarzyna Musial. Recommender System for Online Social Network. – М.: LAP Lambert Academic Publishing, 2010. – 124 с.
  125. Drake Patrick Mirembe. Security Framework for Telemedicine, eHealth, and Wellness Services. – М.: LAP Lambert Academic Publishing, 2010. – 72 с.
  126. RAMARAJ RAVI. AN OPTIMUM RESTORATION ALGORITHM FOR VIRTUAL PRIVATE NETWORKS. – М.: LAP Lambert Academic Publishing, 2011. – 60 с.
  127. Muna Elsadig Mohamed Ahmed Elsheik. Bio Inspired Intrusion Prevention and Self healing System for Networks. – М.: LAP Lambert Academic Publishing, 2012. – 256 с.
  128. Mohammad Faisal. Networks Security and Communication. – М.: LAP Lambert Academic Publishing, 2012. – 56 с.
  129. Benjamin Eze. Policy-based Data Sharing for Event-driven Services in B2B Networks. – М.: LAP Lambert Academic Publishing, 2011. – 148 с.
  130. Susanta Mitra and Aditya Bagchi. Data Model for Social Networks. – М.: LAP Lambert Academic Publishing, 2013. – 184 с.
  131. Tanveer Zia. A Security Framework for Wireless Sensor Networks (WSN). – М.: LAP Lambert Academic Publishing, 2013. – 160 с.
  132. Dirk Lessner. Network Security for Embedded Systems. – М.: LAP Lambert Academic Publishing, 2009. – 232 с.
  133. Jeffy Mwakalinga. A Framework for Adaptive Information Security Systems. – М.: LAP Lambert Academic Publishing, 2011. – 364 с.
  134. Stephen Murove,S. B. Mangena and B. Jones. Firewall Evaluation:Models for Major Decisions in Computer Security. – М.: LAP Lambert Academic Publishing, 2014. – 236 с.
  135. Manuel Barbares. Periodic subgraph mining in dynamic networks. – М.: LAP Lambert Academic Publishing, 2015. – 96 с.
  136. Mayank Keshariya. Policy Based Management Framework for Mobile Networks. – М.: LAP Lambert Academic Publishing, 2011. – 268 с.
  137. Zari Dzalilov. Models of Dynamic Reconfiguration of Telecommunication Networks. – М.: Scholars' Press, 2014. – 136 с.
  138. Sathish Kumar. Intrusion Detection and Response Techniques for Mobile Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 200 с.
  139. Ali ElRifaie. A Novel Cos-Sin based Protection for EHV Networks. – М.: LAP Lambert Academic Publishing, 2013. – 160 с.
  140. Kota Venkata Ramanaiah. VLSI Architectures for Neural Network Based Image Compression. – М.: , 2015. – 124 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Мы можем управлять собственными мыслями. интервью с С. Харитоновым, врачом-психотерапевтом, психиатором, кандидатом медицинских наук, старшим научным сотрудником Московского НИИ психиатрии Росздрава РФ, членом-корреспондентом Международной академии наук. МАНЭБ, членом Британского общества когнитивных и поведенческих психотерапевтов. Membership British Association for Behavioural & Cognitive Psychoterapies / BABCP. Ф. Кульпин, "Управление персоналом", N 8, апрель 2011 г.
  2. Зачетная реструктуризация долга: институт DEBT-FOR-EQUITY SWAP в России". интервью с М. Григорьевым, старшим юристом корпоративной практики юридической фирмы "Вегас-Лекс". О. Бодрягина, "эж-ЮРИСТ", № 3, январь 2010.
  3. Основной арсенал "охотника" - его network: кого он знает на рынке и качество этих отношений. С. Плетнева, "Управление персоналом", № 12, июнь 2009.
  4. Управление проектами при подборе персонала. PM for HR. Е. Кривов, "Кадровик. Рекрутинг для кадровика", № 9, сентябрь 2008.
  5. Опыт реализации МСФО на базе Microsoft Dynamics AX. Н. Овчаренко, "Финансовая газета", № 9, февраль 2008.

Образцы работ

Тема и предметТип и объем работы
Последствия операции НАТО
Политология
Диплом
80 стр.
Платежные системы в Интернете
Информатика
Диплом
102 стр.
Математические модели океанических течений
Переводоведение (теория перевода)
Курсовая работа
42 стр.
Формирование системы экономической безопасности на Белоярской АЭС
Психофизиология
Диплом
96 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Алена
Научный руководитель посмотрела работу после вашего сопровождения, все хорошо.