Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Chris Mcnab. Network Security Assessment 2e. – М.: , 2007. – 464 с.

Дополнительные результаты

  1. Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с.
  2. Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  3. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с.
  4. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с.
  5. Structural Adjustment Participatory Review International Network. Structural Adjustment, the Sapri Report: The Policy Roots of Economic Crisis, Poverty and Inequality. – М.: , 0. – 0 с.
  6. Safe Schools: A Security and Loss Prevention Plan. – М.: , 0. – 0 с.
  7. Rehabilitati International Conference on Brownfield Sites: Assessment, D. Almorza, H. Klapperich, C. A. Brebbia, David Almorza Gomar, Wessex Institute of Technology, Universidad De Cadiz. Brownfield Sites : Assessment, Rehabilitation and Development. – М.: , 0. – 0 с.
  8. John M. Lusa, John Lusa. The Network Manager's Handbook, Third Edition. – М.: , 0. – 0 с.
  9. Thomas J. Parenty. Digital Defense: What You Should Know About Protecting Your Company's Assets. – М.: , 0. – 0 с.
  10. Barry Slawter. Network Security: Developing and Implementing Effective Enterprise Strategies. – М.: , 0. – 0 с.
  11. Joseph S. Nye, William A. Owens, James R. Schlesinger, R. James Woolsey, James A. Lewis, Joseph S., Jr. Nye, James Andrew Lewis, Erin Schlather, Csis Commission on Technology Security in the Twenty-First Century. Computer Exports and National Security: New Tools for a New Century : A Report of the Csis Commission on Technology Security in the 21St-Century (Csis Panel Reports.). – М.: , 0. – 0 с.
  12. Henry Chan, Raymond Lee, Tharam Dillon, Elizabeth Chang, Henry Chan, Raymond Lee, Tharam Dillon. Electronic Commerce: Fundamentals & Applications. – М.: , 0. – 0 с.
  13. Business Women's Network, WorkingWoman Network. Business Women's Network 2001 International Directory. – М.: , 0. – 0 с.
  14. Joel Siegel. The International Handbook of Electronic Commerce. – М.: , 0. – 0 с.
  15. Roberta Bragg. MCSE Training Guide (70-220): Windows 2000 Network Security Design, Second Edition. – М.: , 0. – 0 с.
  16. Jae K. Shim, Anique A. Qureshi, Joel G. Siegel, Roberta M. Siegel. The International Handbook of Electronic Commerce. – М.: , 0. – 0 с.
  17. Donald C. Fisher. Homeland Security Assessment Manual: A Comprehensive Organizational Assessment Based On Baldridge Criteria. – М.: , 2004. – 0 с.
  18. George H. Bodnar. Accounting Information Systems (9th Edition). – М.: , 2003. – 0 с.
  19. Peter R., MBA Ramsaroop. Securing Business Intelligence: Knowledge and CyberSecurity in the Post 9/11 World. – М.: , 2004. – 0 с.
  20. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с.
  21. Sudhanshu Kairab. A Practical Guide to Security Assessments. – М.: , 2004. – 498 с.
  22. Rickland Hollar. Enterprise Web Services Security (Internet Series). – М.: , 2005. – 432 с.
  23. Ron Ben Natan. Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase. – М.: , 2005. – 432 с.
  24. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с.
  25. Network Security. – М.: , 2008. – 370 с.
  26. James Michael Stewart, Ed Tittel, Mike Chapple. CISSP: Certified Information Systems Security Professional Study Guide. – М.: , 2008. – 841 с.
  27. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с.
  28. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с.
  29. Daniel Clark. Network Access Control 100 Success Secrets - 100 Most Asked NAC Questions on Implementation and Deployment of unify endpoint security technology, user ... and network security enforcement. – М.: , 2008. – 180 с.
  30. Jeff Crume. Inside Internet Security: What Hackers Don't Want You To Know. – М.: , 0. – 0 с.
  31. Bill Ferguson. CompTIA Network+ Review Guide. – М.: , 2009. – 264 с.
  32. Michael Jang. MasteringTM Red Hat® Linux 9. – М.: , 2003. – 976 с.
  33. Kelley J.P. Lindberg. Novell?s NetWare® 5 Basics. – М.: , 1999. – 342 с.
  34. Dale Liu. Cisco CCNA/CCENT Exam 640-802, 640-822, 640-816 Preparation Kit. – М.: Syngress, 2009. – 848 с.
  35. Rob Cameron. Juniper(r) Networks Secure Access SSL VPN Configuration Guide. – М.: , 2010. – 656 с.
  36. Owen Poole. Network Security. – М.: , 2010. – 224 с.
  37. James Joshi. Network Security: Know It All. – М.: , 2010. – 368 с.
  38. Steve Manzuik. Network Security Assessment: From Vulnerability to Patch. – М.: , 2010. – 500 с.
  39. Jan L. Harrington. Network Security. – М.: , 2010. – 384 с.
  40. Russ Rogers. Network Security Evaluation Using the NSA IEM. – М.: , 2010. – 450 с.
  41. Brien Posey. GFI Network Security and PCI Compliance Power Tools. – М.: , 2010. – 488 с.
  42. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с.
  43. Syngress. Managing Cisco Network Security 2E. – М.: , 2010. – 752 с.
  44. AU (Assessment Update). Assessment Update. – М.: , 2008. – 16 с.
  45. Bill English. MCSA/MCSE: Windows® 2000 Network Security Administration Study Guide. – М.: , 2003. – 574 с.
  46. Russ Kaufman. MCSA/MCSE: Windows® Server 2003 Network Security Administration Study Guide. – М.: , 2004. – 560 с.
  47. Nitesh Dhanjani. Network Security Tools. – М.: , 2005. – 340 с.
  48. Thomas W. Madron. Network Security in the 90?s. – М.: , 1992. – 304 с.
  49. Microsoft. MCSE Training Kit (Exam 70–220) – Designing Microsoft Windows 2000 Network Security. – М.: , 2001. – 864 с.
  50. Andrew Lockhart. Network Security Hacks. – М.: , 2004. – 316 с.
  51. DAN. Network Security In A Mixed Environment. – М.: , 1998. – 456 с.
  52. David Leblanc. Writing Secure Code 2e. – М.: , 2002. – 800 с.
  53. Matthew Strebe. Network Security JumpStartTM. – М.: , 2002. – 384 с.
  54. Microsoft. MCSA/MCSE Self–Paced Training Kit (Exam 70–216) – Microsoft Windows 2000 Network Infrastructure Administration 2e. – М.: , 2002. – 992 с.
  55. Pawan K Bhardwaj. A+. Network+, Security+ Exams in a Nutshell. – М.: , 2007. – 812 с.
  56. Eric Cole. Network Security Bible. – М.: , 2005. – 694 с.
  57. Eric Cole. Wiley Pathways Network Security Fundamentals Project Manual. – М.: , 2008. – 312 с.
  58. Andrew Lockhart. Network Security Hacks 2e. – М.: , 2006. – 352 с.
  59. Chris Mcnab. Network Security Assessment 2e. – М.: , 2007. – 464 с.
  60. Cryptography & Network Security. – М.: , 2007. – 0 с.
  61. Securing Global Transportation Networks. – М.: , 2011. – 312 с.
  62. Shon Harris. CISSP All-in-One Exam Guide (+ CD-ROM). – М.: McGraw-Hill Companies, 2010. – 1216 с.
  63. Comptia Security+ All-In-One Exam Guide, Second Edition (Exam Sy0-201). – М.: , 2011. – 0 с.
  64. Pc Quicksteps, Second Edition. – М.: , 2011. – 240 с.
  65. Wireless Network Security A Beginners Guide. – М.: , 2011. – 400 с.
  66. Cissp Practice Exams. – М.: , 2011. – 414 с.
  67. Cisco: A Beginner'S Guide, Fourth Edition. – М.: , 2011. – 696 с.
  68. Mike Meyers' Comptia A+ Guide: Essentials, Third Edition (Exam 220-701). – М.: , 2011. – 0 с.
  69. Hacker'S Challenge 3. – М.: , 2011. – 400 с.
  70. Principles Of Computer Security Comptia Security+ And Beyond Lab Manual, Second Edition. – М.: , 2011. – 352 с.
  71. Network Security: The Complete Reference. – М.: , 2011. – 896 с.
  72. Fundamentals Of Network Security. – М.: , 2011. – 672 с.
  73. Greg Holden. Guide to Firewalls and Network Security: Intrusion Detection and VPNs. – М.: Course Technology, 2003. – 512 с.
  74. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . –  с.
  75. Quick Source. Microsoft Windows NT 4.0 Quick Source Guide. – М.: , . –  с.
  76. Dave Tyson. Security Convergence: Managing Enterprise Security Risk. – М.: , 2007. – 232 с.
  77. Michael Gregg, Eric Seagren, Angela Orebaugh, Matt Jonkman, Raffael Marty. How to Cheat at Configuring Open Source Security Tools (How to Cheat) (How to Cheat). – М.: , 2007. – 528 с.
  78. Susan Snedaker. Syngress IT Security Project Management Handbook. – М.: Syngress, 2006. – 612 с.
  79. Ido Dubrawsky. How to Cheat at Securing Your Network. – М.: Syngress, 2007. – 432 с.
  80. Susmita Mandal. A Key Management Solution for HIPAA Compliance. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  81. Shaek Rana Mohammad Baki Billah and Mohammad Hafizur Rahman. Design & Development of Network Security System using IP Tables. – М.: LAP Lambert Academic Publishing, 2013. – 164 с.
  82. Xiangqian Chen. DEFENSE AGAINST NODE COMPROMISE IN SENSOR NETWORK SECURITY. – М.: LAP Lambert Academic Publishing, 2009. – 108 с.
  83. M. Sadiq Ali Khan and S. M. Aqil Burney. Recent Trends in Intrusion Detection System & Network Monitoring. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  84. Ehab E. Elattar,Tahir A. Mohammed and Abdel Mohsen M. Kinawy. Static State Estimation for Power Systems. – М.: LAP Lambert Academic Publishing, 2014. – 132 с.
  85. Hussein M. Khattab,Almoataz Y. Abdelaziz and Said F. Mekhamer. Innovative Approaches for Power System Security Assessment. – М.: LAP Lambert Academic Publishing, 2013. – 224 с.
  86. Barirega Akankwasah. Contribution Of Protected Areas Towards Peoples’ Livelihoods In Uganda. – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  87. Sharmin Akter Lima and Md. Mahmudul Hasan Rafee. Pattern Matching With Variable Length Gaps. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  88. Ankur Gupta and Bhupendra Gupta. Random Networks and its Applications. – М.: LAP Lambert Academic Publishing, 2013. – 100 с.
  89. Vimalkumar Bhupatbhai Vaghela,Kalpesh H. Vandra and Nilesh K. Modi. Ensemble Classifier in Data Mining. – М.: LAP Lambert Academic Publishing, 2012. – 160 с.
  90. John Meyer and Amanda Barefield. Developing and Sustaining Online Education. – М.: LAP Lambert Academic Publishing, 2010. – 100 с.
  91. Andrew Hope. Internet Risk @ School. – М.: LAP Lambert Academic Publishing, 2011. – 236 с.
  92. Anil Kumar V. and Prasad E. Dynamic Broadcast Routing With Security Enhancement. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  93. Siamak Azodolmolky,Anna Tzanakaki and Ioannis Tomkos. Performance Evaluation of Optical Burst Switched Networks. – М.: LAP Lambert Academic Publishing, 2012. – 156 с.
  94. Ahmad A. Hassan. Firewalls: Modeling and Management. – М.: LAP Lambert Academic Publishing, 2012. – 100 с.
  95. Yogesh Kumar,Krishan Kumar and Gulshan Kumar. Feature Selection For Intrusion Detection Systems. – М.: LAP Lambert Academic Publishing, 2014. – 100 с.
  96. Xiaodong He. Automated intrusion prevention mechanism in enhancing network security. – М.: Scholars' Press, 2014. – 128 с.
  97. Syed Zahidur Rashid. Computer Network Security Monitoring. – М.: Scholars' Press, 2015. – 284 с.
  98. Elliot Attipoe. Securing the Public Wireless Network. – М.: LAP Lambert Academic Publishing, 2013. – 92 с.
  99. Chandan Koner. Authentications in Remote and Mobile System Communications. – М.: LAP Lambert Academic Publishing, 2014. – 128 с.
  100. Mamunur Rashid and Bellal Hossain. WiMAX Security Architecture. – М.: LAP Lambert Academic Publishing, 2014. – 76 с.
  101. Sushant Sudhakar Bahekar and Prashant Panse. Energy Efficient Mechanism for Detection of Wormhole Attacks. – М.: LAP Lambert Academic Publishing, 2014. – 72 с.
  102. Mohammad AlAhmad. Security threats of finger print biometric in network system. – М.: LAP Lambert Academic Publishing, 2014. – 88 с.
  103. Nirbhay Chaubey. Securing AODV Routing Protocol in design of Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2015. – 132 с.
  104. Aditya Kumar. Cryptography and Chaos a New Approach in Network Security. – М.: LAP Lambert Academic Publishing, 2015. – 80 с.
  105. Ashraf Hossain. Lifetime and Coverage Studies on Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2011. – 184 с.
  106. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  107. Srikanthreddy Arimanda and Manojkumar Kolli. Performance Study Of Security Mechanismsm For Mobile Agent Domain. – М.: LAP Lambert Academic Publishing, 2011. – 84 с.
  108. Marimuthu Kanagaraj and Eswari Venkatachalam. Multifactor Authentication Protocol for a Secured WSN. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  109. Gurpreet juneja. Security:MPLS VPN Network. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  110. Omid Mahdi Ebadati E.,Harleen Kaur M. Afshar Alam and Kaebeh Yaeghoobi. Micro-Firewalls for Dynamic Network Security Framework. – М.: LAP Lambert Academic Publishing, 2012. – 292 с.
  111. Wisam Elmasry. Securing WBAODV Routing Protocol in MANETs. – М.: LAP Lambert Academic Publishing, 2013. – 100 с.
  112. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  113. Shaffali Gupta and Sanmeet Kaur. A GUI Framework for detecting Intrusions using Bro IDS. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  114. Peter Kemei. Framework for Monitoring Hardware Firewall Functionality Using NIDS. – М.: LAP Lambert Academic Publishing, 2013. – 176 с.
  115. Vincent Omollo. Enhanced Network Security. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  116. Bashar Jabbar Hamza,Nor Kamariah Noordin and Chee Kyun Ng. Seamless Vertical Handover between 3G UMTS and WLAN. – М.: LAP Lambert Academic Publishing, 2013. – 180 с.
  117. Firkhan Ali Hamid Ali. Vulnerability Analysis on the Computer Network Security. – М.: LAP Lambert Academic Publishing, 2010. – 72 с.
  118. Sunil Kumar Senapati and Prof. Pabitra Mohan Khilar. SECURING FSR PROTOCOL AGAINST DATA PACKET DROPPING IN MANET. – М.: LAP Lambert Academic Publishing, 2010. – 64 с.
  119. Imran Sohail and Sikandar Hayat. Network Security and DDoS. – М.: LAP Lambert Academic Publishing, 2010. – 64 с.
  120. Christian Chetachi Umunna. Distributed Intrusion Detection System in Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 104 с.
  121. ANNADURAI P and Dr. V. PALANISAMY. Impact of Black Hole Attack on Multicast in Ad hoc Network (IBAMA). – М.: LAP Lambert Academic Publishing, 2011. – 84 с.
  122. Jabarweer Singh,Krishan Kumar and Gulshan Kumar. Intrusion detection using artificial intelligence based ensembles. – М.: LAP Lambert Academic Publishing, 2014. – 116 с.
  123. Kirat Pal Singh. MIPS Pipeline Cryptoprocessor. – М.: LAP Lambert Academic Publishing, 2012. – 480 с.
  124. Deniz Akkaya and Fabien Thalgott. Honeypots in Network Security. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  125. Kefa Rabah. Mastering Securing ICT Infrastructure for Corporate Network. – М.: LAP Lambert Academic Publishing, 2014. – 360 с.
  126. Muna Elsadig Mohamed Ahmed Elsheik. Bio Inspired Intrusion Prevention and Self healing System for Networks. – М.: LAP Lambert Academic Publishing, 2012. – 256 с.
  127. Mohammad Faisal. Networks Security and Communication. – М.: LAP Lambert Academic Publishing, 2012. – 56 с.
  128. Rajit Nair and Preeti Sharma Nair. Encryption Approach for Maximizing Avalanche Effect for Cryptography. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  129. Affan Yasin,Hafiz Adnan Shafiq and Muhammad Ijlal Hasnain. Software Architecture for Centralized Health Database. – М.: LAP Lambert Academic Publishing, 2013. – 64 с.
  130. Edmond K. Machie. Network Attack Traceback And React. – М.: LAP Lambert Academic Publishing, 2013. – 208 с.
  131. Oluwafemi Osho and Victor Waziri. Conceptual Models and Simulation of Computer Worm Propagation. – М.: LAP Lambert Academic Publishing, 2013. – 116 с.
  132. Tanveer Zia. A Security Framework for Wireless Sensor Networks (WSN). – М.: LAP Lambert Academic Publishing, 2013. – 160 с.
  133. Dirk Lessner. Network Security for Embedded Systems. – М.: LAP Lambert Academic Publishing, 2009. – 232 с.
  134. Mohamed Nassar. Voice over IP Networks Monitoring. – М.: LAP Lambert Academic Publishing, 2009. – 172 с.
  135. Nathan Darmawan. Shielding Your Company with a Better Network Security Design. – М.: LAP Lambert Academic Publishing, 2010. – 180 с.
  136. Rinaldi Yulius. DESIGN OF A CYBER SECURITY LABORATORY. – М.: LAP Lambert Academic Publishing, 2010. – 140 с.
  137. Nirmalya Kar,Ashim Saha and Mrinal Kanti Debbarma. Biometric Based Attendance System. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  138. Bhaarath Venkateswaran. Adaptive Internet Threat Forecasting. – М.: LAP Lambert Academic Publishing, 2011. – 116 с.
  139. Prashant Pittalia. Ecommerce Security Real Life Cases And Practical Solutions. – М.: , 2015. – 72 с.
  140. Dan Gookin. Laptops For Dummies. – М.: , 2015. –  с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Основной арсенал "охотника" - его network: кого он знает на рынке и качество этих отношений. С. Плетнева, "Управление персоналом", № 12, июнь 2009.

Образцы работ

Тема и предметТип и объем работы
Последствия операции НАТО
Политология
Диплом
80 стр.
Платежные системы в Интернете
Информатика
Диплом
102 стр.
Роль ОБСЕ в урегулировании конфликтов в Европе
Политология
Курсовая работа
33 стр.
Проблемы реформирования ОБСЕ
Политология
Курсовая работа
29 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Наталья
Здравствуйте, Марина. Хочу Вас поблагодарить за диплом, сегодня у меня была защита, защитилась на отл. Ваша помощь была неоценимой!