Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Hacking Exposed Web 2.0: Web 2.0 Security Secrets And Solutions. – М.: , 2011. – 258 с. Dafydd Stuttard, Marcus Pinto. The Web Application: Hacker's Handbook. – М.: Wiley Publishing, Inc, 2011. – 912 с. Mukul Pratap Singh and Kunal Gupta. Draining injected invalid data using EBCAS scheme in WSN. – М.: LAP Lambert Academic Publishing, 2013. – 64 с. kalyani chalamalasetty. Architecture for IMS Security to Mobile:. – М.: LAP Lambert Academic Publishing, 2010. – 60 с. Tejpal Singh. Security Protocols for Data Routing in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 68 с. Omar Cheikhrouhou. Secure Group communication in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2013. – 160 с. Natarajan Meghanathan,DeShante C. Johnson and Alexander R. Geoghegan. An Analysis of Software Security Attacks and Mitigation Controls. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Joao Antunes. Network Attack Injection. – М.: Scholars' Press, 2013. – 268 с. Prashant Pittalia. Ecommerce Security Real Life Cases And Practical Solutions. – М.: , 2015. – 72 с. Дополнительные результаты Mark Yarnell, Rene Reid Yarnell. Your First Year in Network Marketing: Overcome Your Fears, Experience Success, and Achieve Your Dreams!. – М.: Prima Lifestyles, 1998. – 304 с. Martha M. Roggenkamp, Lila Barrera-Hernandez, Donald N. Zillman, Inigo del Guayo. Energy Networks and the Law: Innovative Solutions in Changing Markets. – М.: , 2012. – 500 с. Elizabeth Friesen. Challenging Global Finance: Civil Society and Transnational Networks (International Political Economy). – М.: , 2012. – 232 с. Andrej Fatur. EU Competition Law and the Information and Communication Technology Network Industries: Economic versus Legal Concepts in Pursuit of (Consumer) Welfare (Hart Studies in Competition Law). – М.: , 2012. – 312 с. African Conflicts and Informal Power: Big Men and Networks (Africa Now). – М.: , 2012. – 288 с. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с. Traffic Monitoring and Analysis: 4th International Workshop, TMA 2012, Vienna, Austria, March 12, 2012, Proceedings (Lecture Notes in Computer Science ... Networks and Telecommunications). – М.: , 2012. – 200 с. Nick Davies. How to Be Great at The Stuff You Hate: The Straight-Talking Guide to Networking, Persuading and Selling. – М.: , 2012. – 204 с. Ad Hoc Networks: Third International ICST Conference, ADHOCNETS 2011, Paris, France, September 21-23, 2011, Revised Selected Papers (Lecture Notes of ... and Telecommunications Engineering). – М.: , 2012. – 247 с. Sidney E Fuchs. Get Off The Bench: Unleashing The Power of Strategic Networking Through Relationships. – М.: , 2012. – 174 с. Business Networks in Clusters and Industrial Districts: The Governance of the Global Value Chain. – М.: , 2012. – 418 с. Paul Hill. The Panic Free Job Search: Unleash the Power of the Web and Social Networking to Get Hired. – М.: , 2012. – 256 с. April Kelly. Spaghetti on the Wall: Branding and Networking Methods that Stick. – М.: , 2012. – 216 с. Gerald Faulhaber, Gary Madden, Jeffrey Petchey. Regulation and the Performance of Communication and Information Networks. – М.: , 2012. – 384 с. Clusters in Automotive and Information & Communication Technology: Innovation, Multinationalization and Networking Dynamics. – М.: , 2012. – 308 с. Helen Lawton-Smith. Universities, Innovation and the Economy (Routledge Studies in Business Organizations and Networks). – М.: , 2012. – 256 с. Markov Networks in Evolutionary Computation (Adaptation, Learning, and Optimization). – М.: , 2012. – 264 с. Michael S Strauss-Cassel. The Money Making Social Media Network: How to Build a Social Media Network that makes Money (Volume 1). – М.: , 2012. – 194 с. J. Forbes Munro. Maritime Enterprise and Empire : Sir William Mackinnon and His Business Network, 1823-1893. – М.: , 0. – 0 с. Mark Ebers. The Formation of Inter-Organizational Networks. – М.: , 0. – 0 с. Anna Nagurney, Anna Nugurney. Sustainable Transportation Networks. – М.: , 0. – 0 с. Ann D. Bagchi. Making Connections: A Study of Networking Among Immigrant Professionals. – М.: , 0. – 0 с. Bennett Harrison, Marcus Weiss, Marcus S. Weiss. Workforce Development Networks: Community-Based Organizations and Regional Alliances. – М.: , 0. – 0 с. Diane Darling. The Networking Survival Guide: Get the Success You Want By Tapping Into the People You Know. – М.: , 0. – 0 с. Michael Salmon. Supernetworking: Reach the Right People, Build Your Career Network, and Land Your Dream Job-- Now. – М.: , 0. – 0 с. Donna Fisher. People Power: How to Create a Lifetime Network for Business, Career, and Personal Advancement. – М.: Bard Press, 1995. – 220 с. Ivan R. Misner, Don Morgan. Masters of Networking: Building Relationships for Your Pocketbook and Soul. – М.: Bard Press, 2000. – 200 с. Margaret Wheatley, Paula Griffin, Kristine Quade, National OD Network. Organization Development at Work: Conversations on the Values, Applications, and Future of OD (J-B O-D (Organizational Development)). – М.: Pfeiffer, 2003. – 224 с. Global Networks, Linked Cities. – М.: Routledge, 2002. – 300 с. Structural Adjustment Participatory Review International Network. Structural Adjustment, the Sapri Report: The Policy Roots of Economic Crisis, Poverty and Inequality. – М.: , 0. – 0 с. Bennett Harrison, Marcus Weiss, Marcus S. Weiss. Workforce Development Networks: Community-Based Organizations and Regional Alliances. – М.: , 0. – 0 с. Harrison C. White. Markets from Networks: Socioeconomic Models of Production. – М.: , 0. – 0 с. David M. Newberry. Privatization, Restructuring, and Regulation of Network Utilities. – М.: The MIT Press, 2002. – 484 с. Stephen P. Bradley, Richard L. Nolan. Sense & Respond: Capturing Value in the Network Era. – М.: , 0. – 0 с. John Mahoney, Elizabeth Vallance, Jack Mahoney, European Business Ethics Network. Business Ethics in a New Europe (Issues in Business Ethics, Vol 3). – М.: , 0. – 0 с. Sheryl Garrett, Marie Swift, The Garrett Planning Network. Just Give Me the Answer$ : Expert Advisors Address Your Most Pressing Financial Questions. – М.: , 0. – 0 с. Business Women's Network, WorkingWoman Network. Business Women's Network 2001 International Directory. – М.: , 0. – 0 с. 3I Network. India Infrastructure Report 2007 (Hindi) Rural Infrastructure. – М.: , 2007. – 360 с. The Transition Network, Gail Rentsch. Smart Women Don't Retire -- They Break Free: From Working Full-Time to Living Full-Time. – М.: , 2008. – 272 с. Food Network Kitchens. Food Network Favorites. – М.: , 2009. – 264 с. Justin Clarke. SQL Injection Attacks and Defense. – М.: , 2010. – 496 с. Food Network Kitchens. How to Boil Water. – М.: , 2009. – 256 с. Coopers & Lybrand International Tax Network. 1992 International Tax Summaries. – М.: , 1992. – 1248 с. Coopers & Lybrand International Tax Network. 1994 International Tax Summaries. – М.: , 1994. – 1140 с. Coopers & Lybrand Global Tax Network. 1998 International Tax Summaries. – М.: , 1998. – 1376 с. Coopers & Lybrand Global Tax Network. 1997 International Tax Summaries. – М.: , 1997. – 1280 с. Hacking Exposed Web 2.0: Web 2.0 Security Secrets And Solutions. – М.: , 2011. – 258 с. Principles Of Computer Security, Comptia Security+ And Beyond, Second Edition. – М.: , 2011. – 0 с. Wireless Network Security A Beginners Guide. – М.: , 2011. – 400 с. Hacking Exposed Cisco Networks. – М.: , 2011. – 400 с. CWNA: Certified Wireless Network Administrator & CWSP Certified Wireless Security Professional All-in-One Exam Guide. – М.: , 2011. – 0 с. Yi Qian, James Joshi, David Tipper, Prashant Krishnamurthy. Information Assurance: Dependability and Security in Networked Systems. – М.: Morgan Kaufmann, 2007. – 576 с. Dafydd Stuttard, Marcus Pinto. The Web Application: Hacker's Handbook. – М.: Wiley Publishing, Inc, 2011. – 912 с. Malware, Rootkits and Botnets: A Beginner's Guide. – М.: McGraw-Hill, 2012. – 382 с. FOOD NETWORK KITCHEN. CHOPPED COOKBOOK, THE. – М.: Clarkson Potter Publishers, 2014. – с. Subi Khan and R.P. Mahapatra. SQL Injection Attack and Countermeasures. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Mukul Pratap Singh and Kunal Gupta. Draining injected invalid data using EBCAS scheme in WSN. – М.: LAP Lambert Academic Publishing, 2013. – 64 с. Jaydeb Bhaumik and Satyajit Das. Substitution Permutation Network Type Block Cipher. – М.: LAP Lambert Academic Publishing, 2013. – 68 с. Govind Sharma and Manish Gupta. Secure routing in wireless mobile Ad-Hoc network. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Yujia Zhai and Dingli Yu. Advanced Neural Network based Control for Automotive Engines. – М.: LAP Lambert Academic Publishing, 2012. – 180 с. Samundiswary Punniakodi and Dananjayan Perumal. Trust Based Routing Protocols for Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2015. – 120 с. Xiangqian Chen. DEFENSE AGAINST NODE COMPROMISE IN SENSOR NETWORK SECURITY. – М.: LAP Lambert Academic Publishing, 2009. – 108 с. Saad Idrees. Portable Heart Attack Monitoring System with Dedicated Optical Network. – М.: LAP Lambert Academic Publishing, 2011. – 68 с. M. Sadiq Ali Khan and S. M. Aqil Burney. Recent Trends in Intrusion Detection System & Network Monitoring. – М.: LAP Lambert Academic Publishing, 2012. – 120 с. Enam Hasib. Health Risk and Awareness of Injecting Drug Users in Bangladesh. – М.: LAP Lambert Academic Publishing, 2011. – 92 с. Maurice Aarts. Electromagnetic Fault Injection using Transient Fault Injections. – М.: LAP Lambert Academic Publishing, 2014. – 168 с. Ayyaswamy Kathirvel,Srinivasan Rengaramanujam and Mohanambal Kathirvel. Prevention of attacks usign umpiring security model for manets. – М.: LAP Lambert Academic Publishing, 2012. – 192 с. Mehul Shah and Jignesh Rathod. Efficient Query Processing for Opportunistic Sensor Networks. – М.: LAP Lambert Academic Publishing, 2014. – 76 с. Tapalina Bhattasali. Hierarchical LIMOS Model For Heterogeneous Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 100 с. Nisarg Gandhewar and Rahila Sheikh. Performance Valuation of AODV Under Sinkhole Attack In MANET Using NS2. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Mohammad S. I. Mamun. Intrusion Detection System Architecture in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Suman Bala. Secure Routing in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 72 с. Abbas Mehdizadeh Zare Anari and Ayyoub Akbari Moghanjoughi. Route optimization security in mobile IPv6 networks. – М.: LAP Lambert Academic Publishing, 2012. – 116 с. Mohamed Amine Ferrag. Study of Attacks in Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 84 с. Cong Hoan Vu and Adeyinka Soneye. Collaborative Attacks on MANETs. – М.: LAP Lambert Academic Publishing, 2010. – 76 с. Srikanth Hariharan,Ness B. Shroff and Saurabh Bagchi. Secure Neighbor Discovery in Wireless Networks. – М.: LAP Lambert Academic Publishing, 2011. – 52 с. Vinothkumar Jambulingam. Secure and Anonymous Routing for Mobile Adhoc Networks. – М.: LAP Lambert Academic Publishing, 2014. – 72 с. Xiaodong He. Automated intrusion prevention mechanism in enhancing network security. – М.: Scholars' Press, 2014. – 128 с. Sheng Huang. Survivable Multipath Provisioning in Mesh Networks. – М.: Scholars' Press, 2013. – 140 с. Syed Zahidur Rashid. Computer Network Security Monitoring. – М.: Scholars' Press, 2015. – 284 с. K. Shaila and K. R. Venugopal. Secure Data Communication in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2014. – 240 с. Ulya Sabeel and Nidhi Chandra. ADLS: Attack Detection & Localization Scheme in WSN. – М.: LAP Lambert Academic Publishing, 2014. – 68 с. Ramandeep Kaur. Packet dropping attack in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2014. – 52 с. Sushant Sudhakar Bahekar and Prashant Panse. Energy Efficient Mechanism for Detection of Wormhole Attacks. – М.: LAP Lambert Academic Publishing, 2014. – 72 с. Nitin K. Mishra and Sumit Dhariwal. Security in Mobile Ad-Hoc Networks. – М.: LAP Lambert Academic Publishing, 2014. – 72 с. Mrutyunjaya Panda and Manas Ranjan Patra. A Data Mining Approach to Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2015. – 216 с. Ali Modirkhazeni. Mitigation of Passive Wormhole Attack in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2015. – 112 с. kalyani chalamalasetty. Architecture for IMS Security to Mobile:. – М.: LAP Lambert Academic Publishing, 2010. – 60 с. Amol Zade. A New Cluster Approach for Wormhole Attack Removal in MANET using NS2. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Cosmin Dini and Pascal Lorenz. Data Management in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2011. – 144 с. Jamil Ibriq. Secure Routing in Wireless Sensor Networks. – М.: Scholars' Press, 2013. – 104 с. Tejpal Singh. Security Protocols for Data Routing in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 68 с. Rachna H. Key Management Approach in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 64 с. Gurpreet juneja. Security:MPLS VPN Network. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Firdous Kausar. Key Management in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 124 с. Shilpa Jaiswal and Sumeet Agrawal. Detection of Network Worm to Eliminate Security Threats in MANET. – М.: LAP Lambert Academic Publishing, 2012. – 52 с. Anup Parkash Singh Virk. Direct Collaborative Attacks on MANET. – М.: LAP Lambert Academic Publishing, 2012. – 96 с. Prashant Kumar Singh and Avimanyou Kumar Vatsa. Taxonomy Based Intrusion Attacks and Detection Scheme in P2P Network. – М.: LAP Lambert Academic Publishing, 2012. – 56 с. Devendra Prasad. Relible Data Dissemination in Mobile Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 144 с. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с. Pallavi Kaliyar and Gagan Singla. A secure routing protocol for MANETs against byzantine attacks. – М.: LAP Lambert Academic Publishing, 2013. – 84 с. Siva S. Sivatha Sindhu,S. Geetha and S. Selvakumar. Network Intrusion Detection System using Machine Learning Techniques. – М.: LAP Lambert Academic Publishing, 2013. – 80 с. Omar Cheikhrouhou. Secure Group communication in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2013. – 160 с. E.O. Ibidunmoye and B.K. Alese. Game-Theoretic Analysis of Network Attack-Defense Interactions. – М.: LAP Lambert Academic Publishing, 2013. – 108 с. Raj Shree and Ravi Prakash Pandey. Security Advancement in ZRP based Wireless Networks. – М.: LAP Lambert Academic Publishing, 2014. – 92 с. Firkhan Ali Hamid Ali. Vulnerability Analysis on the Computer Network Security. – М.: LAP Lambert Academic Publishing, 2010. – 72 с. Imran Sohail and Sikandar Hayat. Network Security and DDoS. – М.: LAP Lambert Academic Publishing, 2010. – 64 с. Christian Chetachi Umunna. Distributed Intrusion Detection System in Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 104 с. Gergely Acs. Secure Routing in Multi-hop Wireless Networks. – М.: LAP Lambert Academic Publishing, 2010. – 116 с. ANNADURAI P and Dr. V. PALANISAMY. Impact of Black Hole Attack on Multicast in Ad hoc Network (IBAMA). – М.: LAP Lambert Academic Publishing, 2011. – 84 с. Einar Petana and SANJEEV KUMAR. EKG monitoring over Wireless Sensor Networks & DDoS vulnerabilities. – М.: LAP Lambert Academic Publishing, 2011. – 116 с. Manuj Mishra,Govind Sharma and Ram Pathak. Secure Routing In Wireless Mobile Ad Hoc Network. – М.: LAP Lambert Academic Publishing, 2014. – 84 с. Sivaraju Sharmila and U. Mamaheshwari G. Detection Schemes for Selective Forward Attack in WSN. – М.: LAP Lambert Academic Publishing, 2012. – 72 с. Shanmugam Bharathy Dhivya. A Study of Foiling Vehicles from Sybil Attack Using Pseudonyms. – М.: LAP Lambert Academic Publishing, 2012. – 100 с. Natarajan Meghanathan,DeShante C. Johnson and Alexander R. Geoghegan. An Analysis of Software Security Attacks and Mitigation Controls. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Jayeeta Majumder and Gargi Saha. SQL Injection Attacks and possible Remedies. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Mais Mohammed Hobi and Sarab Majeed Hameed. Biometrics for User Authentication Using Artificial Neural Networks. – М.: LAP Lambert Academic Publishing, 2013. – 108 с. Kefa Rabah. Mastering Securing ICT Infrastructure for Corporate Network. – М.: LAP Lambert Academic Publishing, 2014. – 360 с. Homam El-Taj and Omar Amer. Network Alert Management System For IDS False Positive Reduction. – М.: LAP Lambert Academic Publishing, 2013. – 156 с. Mohammed Firdos Alam Sheikh. Improving Web Security by Blocking SQL Injection Attack(SQLIA). – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Prateek Suraksha Bhushan,Abhishek Pandey and R. C. Tripathi. Prevention of Flooding Attack in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 84 с. Ranjit Singh. Jamming in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 224 с. Tigabu Dagne Akal. Constructing Predictive Model for Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 160 с. Kamrul Hasan. An Investigation into Botnet Detection System. – М.: LAP Lambert Academic Publishing, 2013. – 120 с. Georgiana Lucan. Computer-Based Attacks on Governments. – М.: LAP Lambert Academic Publishing, 2010. – 76 с. Edmond K. Machie. Network Attack Traceback And React. – М.: LAP Lambert Academic Publishing, 2013. – 208 с. Tanveer Zia. A Security Framework for Wireless Sensor Networks (WSN). – М.: LAP Lambert Academic Publishing, 2013. – 160 с. Fatty Mustafa Salem,Maged Hamada Ibrahim and Ibrahim Ismail Ibrahim. Efficient and Secure Message Transmission in Vehicular Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 96 с. Amit Choudhary. Routing Security Issues in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2014. – 80 с. Joao Antunes. Network Attack Injection. – М.: Scholars' Press, 2013. – 268 с. Hossein Rouhani Zeidanloo and Sahar Rouhani. Botnet Detection by Monitoring Common Network Behaviors. – М.: LAP Lambert Academic Publishing, 2012. – 104 с. Sathish Kumar. Intrusion Detection and Response Techniques for Mobile Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 200 с. Faeiz Alserhani,Irfan Awan and Monis Akhlaq. Correlation and Aggregation of Security Alerts in Networks. – М.: LAP Lambert Academic Publishing, 2012. – 256 с. Navneet kaur Bajwa. Sanitization of Data in Computer Network. – М.: LAP Lambert Academic Publishing, 2012. – 92 с. Mohammed Abu Hamada. Client Side Action Against Cross Site Scripting Attacks. – М.: LAP Lambert Academic Publishing, 2013. – 68 с. Jagdish Halde. Basics of SQL injection Analysis, Detection and Prevention. – М.: LAP Lambert Academic Publishing, 2014. – 68 с. Vishal Andodariya and Shaktisinh Parmar. Multilayered SQL Injection Prevention Mechanism. – М.: LAP Lambert Academic Publishing, 2015. – 68 с. B. B. Gupta. An Introduction to DDoS Attacks and Defense Mechanisms. – М.: LAP Lambert Academic Publishing, 2011. – 232 с. Amudapuram Mohan Rao and B.K. Durai. Travel Mode Choice Modeling Using Artificial Neural Networks (ANN). – М.: LAP Lambert Academic Publishing, 2012. – 84 с. Prashant Pittalia. Ecommerce Security Real Life Cases And Practical Solutions. – М.: , 2015. – 72 с. Лучшие результаты Ничего не найдено Дополнительные результаты Основной арсенал "охотника" - его network: кого он знает на рынке и качество этих отношений. С. Плетнева, "Управление персоналом", № 12, июнь 2009. Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Ольга Преподаватель ответила, что очень довольна работой! Менять больше ничего не нужно