Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Hacking Exposed Web 2.0: Web 2.0 Security Secrets And Solutions. – М.: , 2011. – 258 с.
  2. Dafydd Stuttard, Marcus Pinto. The Web Application: Hacker's Handbook. – М.: Wiley Publishing, Inc, 2011. – 912 с.
  3. Mukul Pratap Singh and Kunal Gupta. Draining injected invalid data using EBCAS scheme in WSN. – М.: LAP Lambert Academic Publishing, 2013. – 64 с.
  4. kalyani chalamalasetty. Architecture for IMS Security to Mobile:. – М.: LAP Lambert Academic Publishing, 2010. – 60 с.
  5. Tejpal Singh. Security Protocols for Data Routing in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  6. Omar Cheikhrouhou. Secure Group communication in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2013. – 160 с.
  7. Natarajan Meghanathan,DeShante C. Johnson and Alexander R. Geoghegan. An Analysis of Software Security Attacks and Mitigation Controls. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  8. Joao Antunes. Network Attack Injection. – М.: Scholars' Press, 2013. – 268 с.
  9. Prashant Pittalia. Ecommerce Security Real Life Cases And Practical Solutions. – М.: , 2015. – 72 с.

Дополнительные результаты

  1. Mark Yarnell, Rene Reid Yarnell. Your First Year in Network Marketing: Overcome Your Fears, Experience Success, and Achieve Your Dreams!. – М.: Prima Lifestyles, 1998. – 304 с.
  2. Martha M. Roggenkamp, Lila Barrera-Hernandez, Donald N. Zillman, Inigo del Guayo. Energy Networks and the Law: Innovative Solutions in Changing Markets. – М.: , 2012. – 500 с.
  3. Elizabeth Friesen. Challenging Global Finance: Civil Society and Transnational Networks (International Political Economy). – М.: , 2012. – 232 с.
  4. Andrej Fatur. EU Competition Law and the Information and Communication Technology Network Industries: Economic versus Legal Concepts in Pursuit of (Consumer) Welfare (Hart Studies in Competition Law). – М.: , 2012. – 312 с.
  5. African Conflicts and Informal Power: Big Men and Networks (Africa Now). – М.: , 2012. – 288 с.
  6. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с.
  7. Traffic Monitoring and Analysis: 4th International Workshop, TMA 2012, Vienna, Austria, March 12, 2012, Proceedings (Lecture Notes in Computer Science ... Networks and Telecommunications). – М.: , 2012. – 200 с.
  8. Nick Davies. How to Be Great at The Stuff You Hate: The Straight-Talking Guide to Networking, Persuading and Selling. – М.: , 2012. – 204 с.
  9. Ad Hoc Networks: Third International ICST Conference, ADHOCNETS 2011, Paris, France, September 21-23, 2011, Revised Selected Papers (Lecture Notes of ... and Telecommunications Engineering). – М.: , 2012. – 247 с.
  10. Sidney E Fuchs. Get Off The Bench: Unleashing The Power of Strategic Networking Through Relationships. – М.: , 2012. – 174 с.
  11. Business Networks in Clusters and Industrial Districts: The Governance of the Global Value Chain. – М.: , 2012. – 418 с.
  12. Paul Hill. The Panic Free Job Search: Unleash the Power of the Web and Social Networking to Get Hired. – М.: , 2012. – 256 с.
  13. April Kelly. Spaghetti on the Wall: Branding and Networking Methods that Stick. – М.: , 2012. – 216 с.
  14. Gerald Faulhaber, Gary Madden, Jeffrey Petchey. Regulation and the Performance of Communication and Information Networks. – М.: , 2012. – 384 с.
  15. Clusters in Automotive and Information & Communication Technology: Innovation, Multinationalization and Networking Dynamics. – М.: , 2012. – 308 с.
  16. Helen Lawton-Smith. Universities, Innovation and the Economy (Routledge Studies in Business Organizations and Networks). – М.: , 2012. – 256 с.
  17. Markov Networks in Evolutionary Computation (Adaptation, Learning, and Optimization). – М.: , 2012. – 264 с.
  18. Michael S Strauss-Cassel. The Money Making Social Media Network: How to Build a Social Media Network that makes Money (Volume 1). – М.: , 2012. – 194 с.
  19. J. Forbes Munro. Maritime Enterprise and Empire : Sir William Mackinnon and His Business Network, 1823-1893. – М.: , 0. – 0 с.
  20. Mark Ebers. The Formation of Inter-Organizational Networks. – М.: , 0. – 0 с.
  21. Anna Nagurney, Anna Nugurney. Sustainable Transportation Networks. – М.: , 0. – 0 с.
  22. Ann D. Bagchi. Making Connections: A Study of Networking Among Immigrant Professionals. – М.: , 0. – 0 с.
  23. Bennett Harrison, Marcus Weiss, Marcus S. Weiss. Workforce Development Networks: Community-Based Organizations and Regional Alliances. – М.: , 0. – 0 с.
  24. Diane Darling. The Networking Survival Guide: Get the Success You Want By Tapping Into the People You Know. – М.: , 0. – 0 с.
  25. Michael Salmon. Supernetworking: Reach the Right People, Build Your Career Network, and Land Your Dream Job-- Now. – М.: , 0. – 0 с.
  26. Donna Fisher. People Power: How to Create a Lifetime Network for Business, Career, and Personal Advancement. – М.: Bard Press, 1995. – 220 с.
  27. Ivan R. Misner, Don Morgan. Masters of Networking: Building Relationships for Your Pocketbook and Soul. – М.: Bard Press, 2000. – 200 с.
  28. Margaret Wheatley, Paula Griffin, Kristine Quade, National OD Network. Organization Development at Work: Conversations on the Values, Applications, and Future of OD (J-B O-D (Organizational Development)). – М.: Pfeiffer, 2003. – 224 с.
  29. Global Networks, Linked Cities. – М.: Routledge, 2002. – 300 с.
  30. Structural Adjustment Participatory Review International Network. Structural Adjustment, the Sapri Report: The Policy Roots of Economic Crisis, Poverty and Inequality. – М.: , 0. – 0 с.
  31. Bennett Harrison, Marcus Weiss, Marcus S. Weiss. Workforce Development Networks: Community-Based Organizations and Regional Alliances. – М.: , 0. – 0 с.
  32. Harrison C. White. Markets from Networks: Socioeconomic Models of Production. – М.: , 0. – 0 с.
  33. David M. Newberry. Privatization, Restructuring, and Regulation of Network Utilities. – М.: The MIT Press, 2002. – 484 с.
  34. Stephen P. Bradley, Richard L. Nolan. Sense & Respond: Capturing Value in the Network Era. – М.: , 0. – 0 с.
  35. John Mahoney, Elizabeth Vallance, Jack Mahoney, European Business Ethics Network. Business Ethics in a New Europe (Issues in Business Ethics, Vol 3). – М.: , 0. – 0 с.
  36. Sheryl Garrett, Marie Swift, The Garrett Planning Network. Just Give Me the Answer$ : Expert Advisors Address Your Most Pressing Financial Questions. – М.: , 0. – 0 с.
  37. Business Women's Network, WorkingWoman Network. Business Women's Network 2001 International Directory. – М.: , 0. – 0 с.
  38. 3I Network. India Infrastructure Report 2007 (Hindi) Rural Infrastructure. – М.: , 2007. – 360 с.
  39. The Transition Network, Gail Rentsch. Smart Women Don't Retire -- They Break Free: From Working Full-Time to Living Full-Time. – М.: , 2008. – 272 с.
  40. Food Network Kitchens. Food Network Favorites. – М.: , 2009. – 264 с.
  41. Justin Clarke. SQL Injection Attacks and Defense. – М.: , 2010. – 496 с.
  42. Food Network Kitchens. How to Boil Water. – М.: , 2009. – 256 с.
  43. Coopers & Lybrand International Tax Network. 1992 International Tax Summaries. – М.: , 1992. – 1248 с.
  44. Coopers & Lybrand International Tax Network. 1994 International Tax Summaries. – М.: , 1994. – 1140 с.
  45. Coopers & Lybrand Global Tax Network. 1998 International Tax Summaries. – М.: , 1998. – 1376 с.
  46. Coopers & Lybrand Global Tax Network. 1997 International Tax Summaries. – М.: , 1997. – 1280 с.
  47. Hacking Exposed Web 2.0: Web 2.0 Security Secrets And Solutions. – М.: , 2011. – 258 с.
  48. Principles Of Computer Security, Comptia Security+ And Beyond, Second Edition. – М.: , 2011. – 0 с.
  49. Wireless Network Security A Beginners Guide. – М.: , 2011. – 400 с.
  50. Hacking Exposed Cisco Networks. – М.: , 2011. – 400 с.
  51. CWNA: Certified Wireless Network Administrator & CWSP Certified Wireless Security Professional All-in-One Exam Guide. – М.: , 2011. – 0 с.
  52. Yi Qian, James Joshi, David Tipper, Prashant Krishnamurthy. Information Assurance: Dependability and Security in Networked Systems. – М.: Morgan Kaufmann, 2007. – 576 с.
  53. Dafydd Stuttard, Marcus Pinto. The Web Application: Hacker's Handbook. – М.: Wiley Publishing, Inc, 2011. – 912 с.
  54. Malware, Rootkits and Botnets: A Beginner's Guide. – М.: McGraw-Hill, 2012. – 382 с.
  55. FOOD NETWORK KITCHEN. CHOPPED COOKBOOK, THE. – М.: Clarkson Potter Publishers, 2014. –  с.
  56. Subi Khan and R.P. Mahapatra. SQL Injection Attack and Countermeasures. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  57. Mukul Pratap Singh and Kunal Gupta. Draining injected invalid data using EBCAS scheme in WSN. – М.: LAP Lambert Academic Publishing, 2013. – 64 с.
  58. Jaydeb Bhaumik and Satyajit Das. Substitution Permutation Network Type Block Cipher. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  59. Govind Sharma and Manish Gupta. Secure routing in wireless mobile Ad-Hoc network. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  60. Yujia Zhai and Dingli Yu. Advanced Neural Network based Control for Automotive Engines. – М.: LAP Lambert Academic Publishing, 2012. – 180 с.
  61. Samundiswary Punniakodi and Dananjayan Perumal. Trust Based Routing Protocols for Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2015. – 120 с.
  62. Xiangqian Chen. DEFENSE AGAINST NODE COMPROMISE IN SENSOR NETWORK SECURITY. – М.: LAP Lambert Academic Publishing, 2009. – 108 с.
  63. Saad Idrees. Portable Heart Attack Monitoring System with Dedicated Optical Network. – М.: LAP Lambert Academic Publishing, 2011. – 68 с.
  64. M. Sadiq Ali Khan and S. M. Aqil Burney. Recent Trends in Intrusion Detection System & Network Monitoring. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  65. Enam Hasib. Health Risk and Awareness of Injecting Drug Users in Bangladesh. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.
  66. Maurice Aarts. Electromagnetic Fault Injection using Transient Fault Injections. – М.: LAP Lambert Academic Publishing, 2014. – 168 с.
  67. Ayyaswamy Kathirvel,Srinivasan Rengaramanujam and Mohanambal Kathirvel. Prevention of attacks usign umpiring security model for manets. – М.: LAP Lambert Academic Publishing, 2012. – 192 с.
  68. Mehul Shah and Jignesh Rathod. Efficient Query Processing for Opportunistic Sensor Networks. – М.: LAP Lambert Academic Publishing, 2014. – 76 с.
  69. Tapalina Bhattasali. Hierarchical LIMOS Model For Heterogeneous Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 100 с.
  70. Nisarg Gandhewar and Rahila Sheikh. Performance Valuation of AODV Under Sinkhole Attack In MANET Using NS2. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  71. Mohammad S. I. Mamun. Intrusion Detection System Architecture in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  72. Suman Bala. Secure Routing in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 72 с.
  73. Abbas Mehdizadeh Zare Anari and Ayyoub Akbari Moghanjoughi. Route optimization security in mobile IPv6 networks. – М.: LAP Lambert Academic Publishing, 2012. – 116 с.
  74. Mohamed Amine Ferrag. Study of Attacks in Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  75. Cong Hoan Vu and Adeyinka Soneye. Collaborative Attacks on MANETs. – М.: LAP Lambert Academic Publishing, 2010. – 76 с.
  76. Srikanth Hariharan,Ness B. Shroff and Saurabh Bagchi. Secure Neighbor Discovery in Wireless Networks. – М.: LAP Lambert Academic Publishing, 2011. – 52 с.
  77. Vinothkumar Jambulingam. Secure and Anonymous Routing for Mobile Adhoc Networks. – М.: LAP Lambert Academic Publishing, 2014. – 72 с.
  78. Xiaodong He. Automated intrusion prevention mechanism in enhancing network security. – М.: Scholars' Press, 2014. – 128 с.
  79. Sheng Huang. Survivable Multipath Provisioning in Mesh Networks. – М.: Scholars' Press, 2013. – 140 с.
  80. Syed Zahidur Rashid. Computer Network Security Monitoring. – М.: Scholars' Press, 2015. – 284 с.
  81. K. Shaila and K. R. Venugopal. Secure Data Communication in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2014. – 240 с.
  82. Ulya Sabeel and Nidhi Chandra. ADLS: Attack Detection & Localization Scheme in WSN. – М.: LAP Lambert Academic Publishing, 2014. – 68 с.
  83. Ramandeep Kaur. Packet dropping attack in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2014. – 52 с.
  84. Sushant Sudhakar Bahekar and Prashant Panse. Energy Efficient Mechanism for Detection of Wormhole Attacks. – М.: LAP Lambert Academic Publishing, 2014. – 72 с.
  85. Nitin K. Mishra and Sumit Dhariwal. Security in Mobile Ad-Hoc Networks. – М.: LAP Lambert Academic Publishing, 2014. – 72 с.
  86. Mrutyunjaya Panda and Manas Ranjan Patra. A Data Mining Approach to Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2015. – 216 с.
  87. Ali Modirkhazeni. Mitigation of Passive Wormhole Attack in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2015. – 112 с.
  88. kalyani chalamalasetty. Architecture for IMS Security to Mobile:. – М.: LAP Lambert Academic Publishing, 2010. – 60 с.
  89. Amol Zade. A New Cluster Approach for Wormhole Attack Removal in MANET using NS2. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  90. Cosmin Dini and Pascal Lorenz. Data Management in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2011. – 144 с.
  91. Jamil Ibriq. Secure Routing in Wireless Sensor Networks. – М.: Scholars' Press, 2013. – 104 с.
  92. Tejpal Singh. Security Protocols for Data Routing in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  93. Rachna H. Key Management Approach in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  94. Gurpreet juneja. Security:MPLS VPN Network. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  95. Firdous Kausar. Key Management in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 124 с.
  96. Shilpa Jaiswal and Sumeet Agrawal. Detection of Network Worm to Eliminate Security Threats in MANET. – М.: LAP Lambert Academic Publishing, 2012. – 52 с.
  97. Anup Parkash Singh Virk. Direct Collaborative Attacks on MANET. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  98. Prashant Kumar Singh and Avimanyou Kumar Vatsa. Taxonomy Based Intrusion Attacks and Detection Scheme in P2P Network. – М.: LAP Lambert Academic Publishing, 2012. – 56 с.
  99. Devendra Prasad. Relible Data Dissemination in Mobile Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 144 с.
  100. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  101. Pallavi Kaliyar and Gagan Singla. A secure routing protocol for MANETs against byzantine attacks. – М.: LAP Lambert Academic Publishing, 2013. – 84 с.
  102. Siva S. Sivatha Sindhu,S. Geetha and S. Selvakumar. Network Intrusion Detection System using Machine Learning Techniques. – М.: LAP Lambert Academic Publishing, 2013. – 80 с.
  103. Omar Cheikhrouhou. Secure Group communication in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2013. – 160 с.
  104. E.O. Ibidunmoye and B.K. Alese. Game-Theoretic Analysis of Network Attack-Defense Interactions. – М.: LAP Lambert Academic Publishing, 2013. – 108 с.
  105. Raj Shree and Ravi Prakash Pandey. Security Advancement in ZRP based Wireless Networks. – М.: LAP Lambert Academic Publishing, 2014. – 92 с.
  106. Firkhan Ali Hamid Ali. Vulnerability Analysis on the Computer Network Security. – М.: LAP Lambert Academic Publishing, 2010. – 72 с.
  107. Imran Sohail and Sikandar Hayat. Network Security and DDoS. – М.: LAP Lambert Academic Publishing, 2010. – 64 с.
  108. Christian Chetachi Umunna. Distributed Intrusion Detection System in Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 104 с.
  109. Gergely Acs. Secure Routing in Multi-hop Wireless Networks. – М.: LAP Lambert Academic Publishing, 2010. – 116 с.
  110. ANNADURAI P and Dr. V. PALANISAMY. Impact of Black Hole Attack on Multicast in Ad hoc Network (IBAMA). – М.: LAP Lambert Academic Publishing, 2011. – 84 с.
  111. Einar Petana and SANJEEV KUMAR. EKG monitoring over Wireless Sensor Networks & DDoS vulnerabilities. – М.: LAP Lambert Academic Publishing, 2011. – 116 с.
  112. Manuj Mishra,Govind Sharma and Ram Pathak. Secure Routing In Wireless Mobile Ad Hoc Network. – М.: LAP Lambert Academic Publishing, 2014. – 84 с.
  113. Sivaraju Sharmila and U. Mamaheshwari G. Detection Schemes for Selective Forward Attack in WSN. – М.: LAP Lambert Academic Publishing, 2012. – 72 с.
  114. Shanmugam Bharathy Dhivya. A Study of Foiling Vehicles from Sybil Attack Using Pseudonyms. – М.: LAP Lambert Academic Publishing, 2012. – 100 с.
  115. Natarajan Meghanathan,DeShante C. Johnson and Alexander R. Geoghegan. An Analysis of Software Security Attacks and Mitigation Controls. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  116. Jayeeta Majumder and Gargi Saha. SQL Injection Attacks and possible Remedies. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  117. Mais Mohammed Hobi and Sarab Majeed Hameed. Biometrics for User Authentication Using Artificial Neural Networks. – М.: LAP Lambert Academic Publishing, 2013. – 108 с.
  118. Kefa Rabah. Mastering Securing ICT Infrastructure for Corporate Network. – М.: LAP Lambert Academic Publishing, 2014. – 360 с.
  119. Homam El-Taj and Omar Amer. Network Alert Management System For IDS False Positive Reduction. – М.: LAP Lambert Academic Publishing, 2013. – 156 с.
  120. Mohammed Firdos Alam Sheikh. Improving Web Security by Blocking SQL Injection Attack(SQLIA). – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  121. Prateek Suraksha Bhushan,Abhishek Pandey and R. C. Tripathi. Prevention of Flooding Attack in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  122. Ranjit Singh. Jamming in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 224 с.
  123. Tigabu Dagne Akal. Constructing Predictive Model for Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 160 с.
  124. Kamrul Hasan. An Investigation into Botnet Detection System. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  125. Georgiana Lucan. Computer-Based Attacks on Governments. – М.: LAP Lambert Academic Publishing, 2010. – 76 с.
  126. Edmond K. Machie. Network Attack Traceback And React. – М.: LAP Lambert Academic Publishing, 2013. – 208 с.
  127. Tanveer Zia. A Security Framework for Wireless Sensor Networks (WSN). – М.: LAP Lambert Academic Publishing, 2013. – 160 с.
  128. Fatty Mustafa Salem,Maged Hamada Ibrahim and Ibrahim Ismail Ibrahim. Efficient and Secure Message Transmission in Vehicular Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  129. Amit Choudhary. Routing Security Issues in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2014. – 80 с.
  130. Joao Antunes. Network Attack Injection. – М.: Scholars' Press, 2013. – 268 с.
  131. Hossein Rouhani Zeidanloo and Sahar Rouhani. Botnet Detection by Monitoring Common Network Behaviors. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  132. Sathish Kumar. Intrusion Detection and Response Techniques for Mobile Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 200 с.
  133. Faeiz Alserhani,Irfan Awan and Monis Akhlaq. Correlation and Aggregation of Security Alerts in Networks. – М.: LAP Lambert Academic Publishing, 2012. – 256 с.
  134. Navneet kaur Bajwa. Sanitization of Data in Computer Network. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  135. Mohammed Abu Hamada. Client Side Action Against Cross Site Scripting Attacks. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  136. Jagdish Halde. Basics of SQL injection Analysis, Detection and Prevention. – М.: LAP Lambert Academic Publishing, 2014. – 68 с.
  137. Vishal Andodariya and Shaktisinh Parmar. Multilayered SQL Injection Prevention Mechanism. – М.: LAP Lambert Academic Publishing, 2015. – 68 с.
  138. B. B. Gupta. An Introduction to DDoS Attacks and Defense Mechanisms. – М.: LAP Lambert Academic Publishing, 2011. – 232 с.
  139. Amudapuram Mohan Rao and B.K. Durai. Travel Mode Choice Modeling Using Artificial Neural Networks (ANN). – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  140. Prashant Pittalia. Ecommerce Security Real Life Cases And Practical Solutions. – М.: , 2015. – 72 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Основной арсенал "охотника" - его network: кого он знает на рынке и качество этих отношений. С. Плетнева, "Управление персоналом", № 12, июнь 2009.

Образцы работ

Тема и предметТип и объем работы
Понятие и история брендинга. Анализ создания и стратегия продвижения бренда ***
Электроснабжение городов и промышленных предприятий
Другое
72 стр.
Комплекс маркетинговых коммуникаций в продвижении цифровых СМИ
Маркетинг
Диплом
74 стр.
Продвижение брендов в шоу-бизнесе
Электроснабжение городов и промышленных предприятий
Диплом
79 стр.
Поиск и внедрение дополнительных каналов монетизации ipad-версии журнала (на примере конкретного проекта с уникальным контентом)
Основы сертификации и стандартизации
Диплом
103 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Ольга
Преподаватель ответила, что очень довольна работой! Менять больше ничего не нужно