Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Omid Mahdi Ebadati E.,Harleen Kaur M. Afshar Alam and Kaebeh Yaeghoobi. Micro-Firewalls for Dynamic Network Security Framework. – М.: LAP Lambert Academic Publishing, 2012. – 292 с. Дополнительные результаты Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с. ZongWei Luo. Innovations in Logistics and Supply Chain Management Technologies for Dynamic Economies. – М.: , 2012. – 460 с. Stan Herman. Rewiring Organizations for the Networked Economy : Organizing, Managing, and Leading in the Information Age (J-B O-D (Organizational Development)). – М.: , 0. – 0 с. Kanwalroop Kathy Dhanda, Anna Nagurney, Padma Ramanujam. Environmental Networks:A Framework for Economic Decision-Making and Policy Analysis. – М.: , 0. – 0 с. Thomas J. Parenty. Digital Defense: What You Should Know About Protecting Your Company's Assets. – М.: , 0. – 0 с. Peter R., MBA Ramsaroop. Securing Business Intelligence: Knowledge and CyberSecurity in the Post 9/11 World. – М.: , 2004. – 0 с. Jeffrey Bannister. Convergence Technologies for 3G Networks : IP, UMTS, EGPRS and ATM. – М.: , 2004. – 670 с. Ron Ben Natan. Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase. – М.: , 2005. – 432 с. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с. Spatial Dynamics, Networks And Modelling (New Horizons in Regional Science Series). – М.: , 2006. – 528 с. Patrick Traynor, Patrick McDaniel, Thomas La Porta. Security for Telecommunications Networks (Advances in Information Security). – М.: , 2008. – 182 с. Network Security. – М.: , 2008. – 370 с. Crucible For Survival: Environmental Security and Justice in the Indian Ocean Region. – М.: , 2008. – 332 с. Environmental Change and Human Security: Recognizing and Acting on Hazard Impacts (NATO Science for Peace and Security Series C: Environmental Security). – М.: , 2008. – 480 с. Micro-Foundations for Innovation Policy. – М.: , 2008. – 385 с. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с. Daniel Clark. Network Access Control 100 Success Secrets - 100 Most Asked NAC Questions on Implementation and Deployment of unify endpoint security technology, user ... and network security enforcement. – М.: , 2008. – 180 с. Dmitrii Lozovanu, Stefan Pickl. Optimization and Multiobjective Control of Time-Discrete Systems: Dynamic Networks and Multilayered Structures. – М.: , 2009. – 285 с. Stephen Hardison, David Byrd, Gary Wood, Tim Speed, Michael Martin, Suzanne Livingston, Jason Moore. IBM Lotus Connections 2.5: Planning and Implementing Social Software for Your Enterprise. – М.: , 2010. – 456 с. Rob Cameron. Juniper(r) Networks Secure Access SSL VPN Configuration Guide. – М.: , 2010. – 656 с. Daniel M. Dobkin. RF Engineering for Wireless Networks. – М.: , 2010. – 448 с. Owen Poole. Network Security. – М.: , 2010. – 224 с. Edward Beltrami. Mathematics for Dynamic Modeling. – М.: , 2010. – 219 с. James Joshi. Network Security: Know It All. – М.: , 2010. – 368 с. Steve Manzuik. Network Security Assessment: From Vulnerability to Patch. – М.: , 2010. – 500 с. Jan L. Harrington. Network Security. – М.: , 2010. – 384 с. Russ Rogers. Network Security Evaluation Using the NSA IEM. – М.: , 2010. – 450 с. Brien Posey. GFI Network Security and PCI Compliance Power Tools. – М.: , 2010. – 488 с. John William Evans. Deploying IP and MPLS QoS for Multiservice Networks. – М.: , 2010. – 456 с. Arun Handa. System Engineering for IMS Networks. – М.: , 2010. – 340 с. Syngress. Managing Cisco Network Security 2E. – М.: , 2010. – 752 с. Merouane Debbah. Game Theory for Wireless Networks. – М.: , 2010. – 400 с. Mark Stefik. The Internet Edge – Social, Technical & Legal Challenges for a Networked World. – М.: , 1999. – 330 с. Bill English. MCSA/MCSE: Windows® 2000 Network Security Administration Study Guide. – М.: , 2003. – 574 с. Mark Stefik. Internet Edge – Social, Technical & Legal Challenges for a Networked World. – М.: , 2000. – 338 с. Russ Kaufman. MCSA/MCSE: Windows® Server 2003 Network Security Administration Study Guide. – М.: , 2004. – 560 с. Nitesh Dhanjani. Network Security Tools. – М.: , 2005. – 340 с. Brian Komar. Firewalls For Dummies®. – М.: , 2001. – 408 с. NR SEIGLE. Seigle Instructor?s Manual (t/m) For Dynamics Of ?business Communications? (paper Only). – М.: , 1984. – 96 с. Thomas W. Madron. Network Security in the 90?s. – М.: , 1992. – 304 с. B Epstein. Wiley IAS 98 – Interpretation & Application of International Accounting Standards 1998 for Windows Network User?s Guide. – М.: , 1999. – 0 с. Microsoft. MCSE Training Kit (Exam 70–220) – Designing Microsoft Windows 2000 Network Security. – М.: , 2001. – 864 с. Andrew Lockhart. Network Security Hacks. – М.: , 2004. – 316 с. Barry J. Epstein. Wiley IAS 98 Interpretation and Application of International Accounting Standards 1998 for Windows Network Version. – М.: , 1999. – 0 с. D Delaney. Wiley CPA Examination Review 3.0 for Windows Network User?s Guide. – М.: , 1999. – 0 с. B Larkin. Wiley GAAP–NfP for Windows Network CD. – М.: , 1999. – 0 с. P Delaney. Wiley GAAP 98 for Windows: Interpretation & Application of Generally Accepted Accounting Standards for Windows Network Edition User?s Guide. – М.: , 1998. – 40 с. B Larkin. Wiley GAAP NfP 99 for Windows Network Quick Start Card. – М.: , 1999. – 0 с. DAN. Network Security In A Mixed Environment. – М.: , 1998. – 456 с. Brian Komar. Firewalls For Dummies®. – М.: , 2003. – 432 с. Epstein. Wiley IAS 99 for Windows Network Edition Quick Start Card. – М.: , 1999. – 0 с. David Claiborne. Mathematical Preliminaries for Computer Networking. – М.: , 1990. – 180 с. Matthew Strebe. Network Security JumpStartTM. – М.: , 2002. – 384 с. Pawan K Bhardwaj. A+. Network+, Security+ Exams in a Nutshell. – М.: , 2007. – 812 с. Eric Cole. Network Security Bible. – М.: , 2005. – 694 с. Anthony Jones. Network Programming for the Microsoft .NET Framework. – М.: , 2003. – 384 с. S MUFTIC. Muftic: ?security? Mechanisms For Computer Network S. – М.: , 1989. – 196 с. Eric Cole. Wiley Pathways Network Security Fundamentals Project Manual. – М.: , 2008. – 312 с. Andrew Lockhart. Network Security Hacks 2e. – М.: , 2006. – 352 с. Chris Mcnab. Network Security Assessment 2e. – М.: , 2007. – 464 с. Cryptography & Network Security. – М.: , 2007. – 0 с. Securing Global Transportation Networks. – М.: , 2011. – 312 с. Perfect Phrases For Professional Networking: Hundreds Of Ready-To-Use Phrases For Meeting And Keeping Helpful Contacts – Everywhere You Go. – М.: , 2011. – 208 с. Wireless Network Security A Beginners Guide. – М.: , 2011. – 400 с. Network Security: The Complete Reference. – М.: , 2011. – 896 с. Fundamentals Of Network Security. – М.: , 2011. – 672 с. Greg Holden. Guide to Firewalls and Network Security: Intrusion Detection and VPNs. – М.: Course Technology, 2003. – 512 с. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . – с. Michael Gregg, Eric Seagren, Angela Orebaugh, Matt Jonkman, Raffael Marty. How to Cheat at Configuring Open Source Security Tools (How to Cheat) (How to Cheat). – М.: , 2007. – 528 с. Ido Dubrawsky. How to Cheat at Securing Your Network. – М.: Syngress, 2007. – 432 с. Peter Bounds. Application of High-level Languages for Water Network Modelling. – М.: LAP Lambert Academic Publishing, 2010. – 252 с. Govind Sharma and Manish Gupta. Secure routing in wireless mobile Ad-Hoc network. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Shaek Rana Mohammad Baki Billah and Mohammad Hafizur Rahman. Design & Development of Network Security System using IP Tables. – М.: LAP Lambert Academic Publishing, 2013. – 164 с. Yujia Zhai and Dingli Yu. Advanced Neural Network based Control for Automotive Engines. – М.: LAP Lambert Academic Publishing, 2012. – 180 с. Ben Puttnam. Sub-Systems for Dynamic Wavelength-Routed Optical Networks. – М.: LAP Lambert Academic Publishing, 2010. – 216 с. Xiangqian Chen. DEFENSE AGAINST NODE COMPROMISE IN SENSOR NETWORK SECURITY. – М.: LAP Lambert Academic Publishing, 2009. – 108 с. Quoc-Tuan Vien. Distributed Space-Time Block Codes for Relay Networks. – М.: LAP Lambert Academic Publishing, 2011. – 52 с. Vikram Santhanam. Interference Mitigation Techniques for Heterogeneous Network. – М.: LAP Lambert Academic Publishing, 2013. – 60 с. Chiranjeev Kumar and Rajeev Tripathi. Mobility Management Techniques for Wireless Networks. – М.: LAP Lambert Academic Publishing, 2010. – 128 с. Wael Al-Tabey. Kinematics &Dynamics Analysis of Micro-Robot for Surgical Applications. – М.: LAP Lambert Academic Publishing, 2012. – 136 с. Stefano Severi. Cooperative Wireless Networks for Localization. – М.: LAP Lambert Academic Publishing, 2010. – 96 с. Daniel Kwon and Venky Shankar. Vulnerability Analysis and Risk Assessment. – М.: Scholars' Press, 2014. – 324 с. Mikaela Warberg and Tora Gustafsson. The implementation of Hyogo Framework for Action in South Africa. – М.: LAP Lambert Academic Publishing, 2012. – 136 с. Hussein M. Khattab,Almoataz Y. Abdelaziz and Said F. Mekhamer. Innovative Approaches for Power System Security Assessment. – М.: LAP Lambert Academic Publishing, 2013. – 224 с. Raina Arora and Nita Parekh. Dynamical Networks. – М.: LAP Lambert Academic Publishing, 2012. – 88 с. Manzur Ashraf. Channel Based Medium Access Control for Ad Hoc Wireless Networks. – М.: LAP Lambert Academic Publishing, 2010. – 168 с. Shahbaz Khan and Sahibzada Ali Mahmud. Cross Layer Optimization Techniques for Wireless Networks. – М.: LAP Lambert Academic Publishing, 2011. – 192 с. Ahmad Mostafa and Dharma Prakash Agrawal. Packet Delay and Throughput Optimization for Vehicular Networks. – М.: LAP Lambert Academic Publishing, 2014. – 168 с. Jose Manuel Delgado Mendinueta. Digital signal processing receivers for dynamic optical networks. – М.: LAP Lambert Academic Publishing, 2012. – 228 с. Hamid Reza Barzegar,Mahdiyeh Barzegar and Neshat Alidad. Energy Efficient And Secured Communication For Manets In Military. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Xiaodong He. Automated intrusion prevention mechanism in enhancing network security. – М.: Scholars' Press, 2014. – 128 с. Lane Thames. Advancing Cyber Security. – М.: LAP Lambert Academic Publishing, 2013. – 256 с. Elliot Attipoe. Securing the Public Wireless Network. – М.: LAP Lambert Academic Publishing, 2013. – 92 с. Manvi Mishra and S.S. Bedi. WBEM for Heterogeneous Network Management. – М.: LAP Lambert Academic Publishing, 2014. – 116 с. Mohammad AlAhmad. Security threats of finger print biometric in network system. – М.: LAP Lambert Academic Publishing, 2014. – 88 с. Nirbhay Chaubey. Securing AODV Routing Protocol in design of Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2015. – 132 с. Aditya Kumar. Cryptography and Chaos a New Approach in Network Security. – М.: LAP Lambert Academic Publishing, 2015. – 80 с. Gang Zhao. Geographic Routing in Wireless Sensor and Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 128 с. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с. Rakesh Jha. Security Issues In AD-HOC And Infrastructure (WLAN) Networks. – М.: LAP Lambert Academic Publishing, 2011. – 124 с. Reena Sharma. Authentication Mechanism for P2P Networks. – М.: LAP Lambert Academic Publishing, 2012. – 84 с. Xiangfei Zhu. Bandwidth-sharing Mechanisms in Dynamic Circuit Networks. – М.: LAP Lambert Academic Publishing, 2012. – 132 с. R. Baskaran,M. S. Saleem Basha and A. Balasubramanian. Two Tier Security Framework for Service Oriented Systems. – М.: LAP Lambert Academic Publishing, 2012. – 176 с. Hong Yu. A Protocol for Multimedia Transmission over Wireless Networks. – М.: LAP Lambert Academic Publishing, 2012. – 272 с. Marimuthu Kanagaraj and Eswari Venkatachalam. Multifactor Authentication Protocol for a Secured WSN. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Gurpreet juneja. Security:MPLS VPN Network. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Shriram Sharma. Energy-efficient Secure Routing in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 96 с. Omid Mahdi Ebadati E.,Harleen Kaur M. Afshar Alam and Kaebeh Yaeghoobi. Micro-Firewalls for Dynamic Network Security Framework. – М.: LAP Lambert Academic Publishing, 2012. – 292 с. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с. Shaffali Gupta and Sanmeet Kaur. A GUI Framework for detecting Intrusions using Bro IDS. – М.: LAP Lambert Academic Publishing, 2013. – 76 с. Peter Kemei. Framework for Monitoring Hardware Firewall Functionality Using NIDS. – М.: LAP Lambert Academic Publishing, 2013. – 176 с. Soke Onyemelukwe. On-Demand Routing and Security in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2013. – 128 с. Vincent Omollo. Enhanced Network Security. – М.: LAP Lambert Academic Publishing, 2013. – 76 с. Ahmed EzzEldin. Secure Clustering in Multi-Modal Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2013. – 84 с. Raj Shree and Ravi Prakash Pandey. Security Advancement in ZRP based Wireless Networks. – М.: LAP Lambert Academic Publishing, 2014. – 92 с. Firkhan Ali Hamid Ali. Vulnerability Analysis on the Computer Network Security. – М.: LAP Lambert Academic Publishing, 2010. – 72 с. Imran Sohail and Sikandar Hayat. Network Security and DDoS. – М.: LAP Lambert Academic Publishing, 2010. – 64 с. Ashok Karmokar. Cross-layer Power and Rate Adaptation Techniques for Wireless Networks. – М.: LAP Lambert Academic Publishing, 2011. – 256 с. Britto R. Kumar and Albert S. Rabara. An Architecture for Secure Mobile Payment System using PKI. – М.: LAP Lambert Academic Publishing, 2013. – 184 с. Raghavendra K. R. Model-checking infinite state systems for information flow security. – М.: LAP Lambert Academic Publishing, 2014. – 160 с. Volkan ERTURK,Dr. Ali ARIFOGLU and Dr. Attila OZGIT. A Framework Based On Continuous Security Monitoring. – М.: LAP Lambert Academic Publishing, 2010. – 148 с. Kefa Rabah. Mastering Securing ICT Infrastructure for Corporate Network. – М.: LAP Lambert Academic Publishing, 2014. – 360 с. Katarzyna Musial. Recommender System for Online Social Network. – М.: LAP Lambert Academic Publishing, 2010. – 124 с. Drake Patrick Mirembe. Security Framework for Telemedicine, eHealth, and Wellness Services. – М.: LAP Lambert Academic Publishing, 2010. – 72 с. RAMARAJ RAVI. AN OPTIMUM RESTORATION ALGORITHM FOR VIRTUAL PRIVATE NETWORKS. – М.: LAP Lambert Academic Publishing, 2011. – 60 с. Muna Elsadig Mohamed Ahmed Elsheik. Bio Inspired Intrusion Prevention and Self healing System for Networks. – М.: LAP Lambert Academic Publishing, 2012. – 256 с. Mohammad Faisal. Networks Security and Communication. – М.: LAP Lambert Academic Publishing, 2012. – 56 с. Benjamin Eze. Policy-based Data Sharing for Event-driven Services in B2B Networks. – М.: LAP Lambert Academic Publishing, 2011. – 148 с. Susanta Mitra and Aditya Bagchi. Data Model for Social Networks. – М.: LAP Lambert Academic Publishing, 2013. – 184 с. Tanveer Zia. A Security Framework for Wireless Sensor Networks (WSN). – М.: LAP Lambert Academic Publishing, 2013. – 160 с. Dirk Lessner. Network Security for Embedded Systems. – М.: LAP Lambert Academic Publishing, 2009. – 232 с. Jeffy Mwakalinga. A Framework for Adaptive Information Security Systems. – М.: LAP Lambert Academic Publishing, 2011. – 364 с. Stephen Murove,S. B. Mangena and B. Jones. Firewall Evaluation:Models for Major Decisions in Computer Security. – М.: LAP Lambert Academic Publishing, 2014. – 236 с. Manuel Barbares. Periodic subgraph mining in dynamic networks. – М.: LAP Lambert Academic Publishing, 2015. – 96 с. Mayank Keshariya. Policy Based Management Framework for Mobile Networks. – М.: LAP Lambert Academic Publishing, 2011. – 268 с. Zari Dzalilov. Models of Dynamic Reconfiguration of Telecommunication Networks. – М.: Scholars' Press, 2014. – 136 с. Sathish Kumar. Intrusion Detection and Response Techniques for Mobile Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 200 с. Ali ElRifaie. A Novel Cos-Sin based Protection for EHV Networks. – М.: LAP Lambert Academic Publishing, 2013. – 160 с. Kota Venkata Ramanaiah. VLSI Architectures for Neural Network Based Image Compression. – М.: , 2015. – 124 с. Лучшие результаты Ничего не найдено Дополнительные результаты Мы можем управлять собственными мыслями. интервью с С. Харитоновым, врачом-психотерапевтом, психиатором, кандидатом медицинских наук, старшим научным сотрудником Московского НИИ психиатрии Росздрава РФ, членом-корреспондентом Международной академии наук. МАНЭБ, членом Британского общества когнитивных и поведенческих психотерапевтов. Membership British Association for Behavioural & Cognitive Psychoterapies / BABCP. Ф. Кульпин, "Управление персоналом", N 8, апрель 2011 г. Зачетная реструктуризация долга: институт DEBT-FOR-EQUITY SWAP в России". интервью с М. Григорьевым, старшим юристом корпоративной практики юридической фирмы "Вегас-Лекс". О. Бодрягина, "эж-ЮРИСТ", № 3, январь 2010. Основной арсенал "охотника" - его network: кого он знает на рынке и качество этих отношений. С. Плетнева, "Управление персоналом", № 12, июнь 2009. Управление проектами при подборе персонала. PM for HR. Е. Кривов, "Кадровик. Рекрутинг для кадровика", № 9, сентябрь 2008. Опыт реализации МСФО на базе Microsoft Dynamics AX. Н. Овчаренко, "Финансовая газета", № 9, февраль 2008. Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Алена Научный руководитель посмотрела работу после вашего сопровождения, все хорошо.