Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Russ Rogers. Network Security Evaluation Using the NSA IEM. – М.: , 2010. – 450 с.

Дополнительные результаты

  1. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с.
  2. Alex Berozashvili. Women Entrepreneurship in Sweden: An Evaluation of the program "Support Women Entrepreneurs 2007-2009". – М.: , 2012. – 96 с.
  3. Maggie Mort. Building the Trident Network: A Study of the Enrollment of People, Knowledge, and Machines (Inside Technology). – М.: , 0. – 0 с.
  4. Valorie Beer. The Web Learning Fieldbook : Using the World Wide Web to Build Workplace Learning Environments. – М.: , 0. – 0 с.
  5. Richard Aston. Electrical Circuit Analysis Using the TI-85 or TI-86. – М.: , 0. – 0 с.
  6. James Stewart, Chao-Ying Wang, James W. Stewart. Digital Electronics Laboratory Experiments Using the Xilinx XC95108 CPLD with Xilinx Foundation Design and Simulation Software. – М.: , 0. – 0 с.
  7. Richard Clodfelter. Making Buying Decisions: Using the Computer As a Tool. – М.: , 0. – 0 с.
  8. Bradford W. Ketchum. Tips and Tactics for Using the Internet to Run Your Business. – М.: Inc. Publishing, 2001. – 96 с.
  9. Cybermarketing: How to Use the Internet to Market Your Goods and Services. – М.: , 0. – 0 с.
  10. Al Doran. E-Work Architect: How HR Leads the Way Using the Internet. – М.: , 0. – 0 с.
  11. Peter Varhol. Network-Centric Computing: Preparing the Enterprise for the Next Millennium. – М.: , 0. – 0 с.
  12. Uma J. Lele. The Cgiar at 31: An Independent Meta-Evaluation of the Consultative Group on International Agricultural Research (Operations Evaluation Studies). – М.: , 2004. – 0 с.
  13. Richard C Putz. The Uncorrupted Stock Picker: Using the Theory of Constraints, Analyze Stocks Without Being Influenced by Brokers, Analysts and Money Managers. – М.: , 2003. – 0 с.
  14. Constance E. Bagley. Winning Legally: How Managers Can Use the Law to Create Value, Marshal Resources, and Manage Risk. – М.: , 2005. – 0 с.
  15. H. William Dettmer. Brainpower Networking Using the Crawford Slip Method. – М.: , 2003. – 0 с.
  16. Henry Harington. New Investor's Toolbox: Using the Right Tools to Fine Tune Your Financial Future (Investor's Guide). – М.: , 2004. – 0 с.
  17. Dennis B Posadas. Rice Bowl & Chips : How Asian countries are using the Silicon Valley model to develop technology startups. – М.: , 2005. – 0 с.
  18. Donald L. Kirkpatrick, James D. Kirkpatric. Transferring Learning to Behavior: Using the Four Levels to Improve Performance. – М.: Berrett-Koehler Publishers, 2005. – 182 с.
  19. Michael Khairallah. Physical Security Systems Handbook: The Design and Implementation of Electronic Security Systems. – М.: , 2005. – 312 с.
  20. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с.
  21. John G. Miller. Flipping the Switch...: Unleash the Power of Personal Accountability Using the QBQ!. – М.: , 2005. – 144 с.
  22. Steven C. Mills. Using the Internet for Active Teaching and Learning. – М.: , 2005. – 240 с.
  23. Rick Jarow. Alchemy of Abundance: Using the Energy of Desire to Manifest Your Highest Vision, Power, and Purpose. – М.: , 2005. – 83 с.
  24. Network Security. – М.: , 2008. – 370 с.
  25. World Bank. Doing Business: Independent Evaluation: Taking the Measure of the World Bank/IFC Doing Business Indicators. – М.: , 2008. – 104 с.
  26. Daniel Clark. Network Access Control 100 Success Secrets - 100 Most Asked NAC Questions on Implementation and Deployment of unify endpoint security technology, user ... and network security enforcement. – М.: , 2008. – 180 с.
  27. David J. Lieberman. Executive Power: Use the Greatest Collection of Psychological Strategies to Create an Automatic Advantage in Any Business Situation. – М.: , 2009. – 224 с.
  28. Mario F. Triola. Elementary Statistics Using the TI-83/84 Plus Calculator (3rd Edition) (Triola Statistics Series). – М.: , 2010. – 896 с.
  29. Fergus O'Connell. Earn More, Stress Less: How to attract wealth using the secret science of getting rich Your Practical Guide to Living the Law of Attraction. – М.: , 2010. – 258 с.
  30. Kim Tran. 50 Strategic Ways To Promote Your Local Business Using The Internet: Effective marketing methods to quickly boost sales and profits for your business online. – М.: , 2010. – 58 с.
  31. Jack L. Manson. Internet Marketing Services For Sale!: Make Money By Selling Your Internet Marketing Services To Local Businesses Using The Marketing Secrets Of Guerilla Marketing. – М.: , 2011. – 56 с.
  32. Douglas E. Comer. Network Systems Design Using Network Processors: Intel 2XXX Version. – М.: Prentice Hall, 2005. – 600 с.
  33. Dale Liu. Cisco CCNA/CCENT Exam 640-802, 640-822, 640-816 Preparation Kit. – М.: Syngress, 2009. – 848 с.
  34. Rob Cameron. Juniper(r) Networks Secure Access SSL VPN Configuration Guide. – М.: , 2010. – 656 с.
  35. Owen Poole. Network Security. – М.: , 2010. – 224 с.
  36. Joanne Green. Neuropsychological Evaluation of the Older Adult. – М.: , 2010. – 311 с.
  37. Dennis P. Nolan. Safety and Security Review for the Process Industries. – М.: , 2010. – 250 с.
  38. James Joshi. Network Security: Know It All. – М.: , 2010. – 368 с.
  39. Steve Manzuik. Network Security Assessment: From Vulnerability to Patch. – М.: , 2010. – 500 с.
  40. Jan L. Harrington. Network Security. – М.: , 2010. – 384 с.
  41. Dogan Ibrahim. SD Card Projects Using the PIC Microcontroller. – М.: , 2010. – 567 с.
  42. Mike Billington. Using the Building Regulations: Administrative Procedures. – М.: , 2010. – 312 с.
  43. Russ Rogers. Network Security Evaluation Using the NSA IEM. – М.: , 2010. – 450 с.
  44. Brien Posey. GFI Network Security and PCI Compliance Power Tools. – М.: , 2010. – 488 с.
  45. Melanie Smith. Using the Building Regulations: Part M Access. – М.: , 2010. – 224 с.
  46. Syngress. Managing Cisco Network Security 2E. – М.: , 2010. – 752 с.
  47. Al Williams. Microcontroller Projects Using the Basic Stamp. – М.: , 2010. – 456 с.
  48. David Hoyle. ISO 9000 Quality Systems Handbook: Using the Standards as a Framework for Business Improvement. – М.: Butterworth-Heinemann, 2010. – 824 с.
  49. Joaquim Casal. Evaluation of the Effects and Consequences of Major Accidents in Industrial Plants,8. – М.: , 2010. – 378 с.
  50. Nancy C. Muir. Using the Internet Safely For Seniors For Dummies®. – М.: , 2009. – 384 с.
  51. Harold Kerzner. Using the Project Management Maturity Model. – М.: , 2005. – 352 с.
  52. Hope Ricciotti. Applied Econometrics Using the SAS® System. – М.: , 2004. – 448 с.
  53. S Cashdan. Object Relations Therapy – Using the Relationship. – М.: , 1989. – 214 с.
  54. Hillel Cohen. Good Arabs – The Israeli Security Agencies and the Israeli Arabs, 1948–1967. – М.: , 2009. – 272 с.
  55. Amitav Acharya. Reassessing Security Cooperation in the Asia– Pacific – Competition, Congruence, and Transformation. – М.: , 2007. – 288 с.
  56. Maggie Mort. Building the Trident Network – A Study of the Enrollment of People, Knowledge & Machines. – М.: , 2001. – 230 с.
  57. Hillel Cohen. Good Arabs – The Israeli Security Agencies and the Israeli Arabs, 1948–1967. – М.: , 2011. – 296 с.
  58. Bill English. MCSA/MCSE: Windows® 2000 Network Security Administration Study Guide. – М.: , 2003. – 574 с.
  59. Kaufman. U.S. National Security Strategy for the 1990s. – М.: , 1991. – 0 с.
  60. Kaufman. U.S. National Security Strategy for the 1990s. – М.: , 1991. – 0 с.
  61. P Waddy. Seventeenth Century Roman Palaces – Use & the Art of the Plan. – М.: , 1991. – 472 с.
  62. Russ Kaufman. MCSA/MCSE: Windows® Server 2003 Network Security Administration Study Guide. – М.: , 2004. – 560 с.
  63. C Everett Bailey. Children in Therapy – Using the Family as a Resource. – М.: , 2000. – 560 с.
  64. Nitesh Dhanjani. Network Security Tools. – М.: , 2005. – 340 с.
  65. RL GOODMAN. Goodman: Using The ?triggered? Sweep Oscilloscope. – М.: , 1988. – 308 с.
  66. Thomas W. Madron. Network Security in the 90?s. – М.: , 1992. – 304 с.
  67. Bruce J. Feibel. Measuring Investment Performance Using the Global Investment Performance Standards (GIPS). – М.: , 2011. – 304 с.
  68. Stanley Fischer. Securing Peace in the Middle East – Project on Economic Transition. – М.: , 1994. – 208 с.
  69. Using the Entertainment Media to Inform Student Affairs Practice. – М.: , 2004. – 128 с.
  70. C Everett Bailey. Children in Therapy – Using the Family as a Resource. – М.: , 1972. – 0 с.
  71. Microsoft. MCSE Training Kit (Exam 70–220) – Designing Microsoft Windows 2000 Network Security. – М.: , 2001. – 864 с.
  72. Andrew Lockhart. Network Security Hacks. – М.: , 2004. – 316 с.
  73. Browning Rockwell. Using the Web to Compete in a Global Marketplace. – М.: , 1998. – 336 с.
  74. Daniel H Deudney. Bounding Power – Republican Security Theory from the Polis to the Global Village. – М.: , 2008. – 384 с.
  75. DAN. Network Security In A Mixed Environment. – М.: , 1998. – 456 с.
  76. NAP. National Academy Press: Evaluation Of The Role Of Microbiological Criteria For Foods Etc. – М.: , 1985. – 452 с.
  77. F O?Connell. Earn More, Stress Less – How to attract wealth and stop worrying, using the secret science of Getting rich. – М.: , 2011. – 192 с.
  78. RD WALKER. Walker: Numerical Methods For Eng & ?scientists? P Ractapplic & Methods Using The Apple Ii Ser. – М.: , 1987. – 304 с.
  79. Linda Almgren Kime. Explorations Using the TI–82 & TI–83 to Accompany Explorations in College Algebra. – М.: , 1998. – 76 с.
  80. Philip J. Hatcher. Applied Econometrics Using the SAS® System. – М.: , 1992. – 250 с.
  81. Matthew Strebe. Network Security JumpStartTM. – М.: , 2002. – 384 с.
  82. Donald Lopez. Good Arabs – The Israeli Security Agencies and the Israeli Arabs, 1948–1967. – М.: , 1999. – 290 с.
  83. Patricia A. Fennell. Managing Chronic Illness Using the Four–Phase Treatment Approach. – М.: , 2003. – 440 с.
  84. The Financial Services Group, Spicer and Oppenheim. The Spicer & Oppenheim Guide to Securities Markets Around the World. – М.: , 1988. – 248 с.
  85. Pawan K Bhardwaj. A+. Network+, Security+ Exams in a Nutshell. – М.: , 2007. – 812 с.
  86. Bruno Coppieters. Statehood and Security – Georgia after the Rose Revolution. – М.: , 2005. – 280 с.
  87. Bruno Coppieters. Statehood and Security – Georgia after the Rose Revolution. – М.: , 2005. – 280 с.
  88. Eric Cole. Network Security Bible. – М.: , 2005. – 694 с.
  89. Genserik L.L. Reniers. Multi–Plant Safety and Security Management in the Chemical and Process Industries. – М.: , 2010. – 290 с.
  90. RD WALKER. Walker: Numerical Methods For ?engineers? & Sci – Pracapplications & Methods Using The Ibm Pc. – М.: , 1987. – 304 с.
  91. The Financial Services Group, Spicer and Oppenheim. The Spicer & Oppenheim Guide to Securities Markets Around the World. – М.: , 1988. – 248 с.
  92. Jean–Pierre Hourdebaigt LMT. Fitness Evaluation of the Horse. – М.: , 2008. – 272 с.
  93. IN GLEIM. Gleim Beginning Your Cpa Review–how To Use The Tex Ts A ?video Vhs?. – М.: , 1983. – 0 с.
  94. IN GLEIM. Gleim Beginning Your Cpa Review – How To Use The Texts – A ?video U–matic?. – М.: , 1983. – 0 с.
  95. Mark A Stafford. The Real Estate Agent's Guide To Using The Equator Short Sale Website: Discover How to Receive Short Sale Approvals in 60 Days or Less Using the Equator Short Sale Website. – М.: , 2011. – 118 с.
  96. Evaluation in the Federal Government. – М.: , 1993. – 144 с.
  97. Eric Cole. Wiley Pathways Network Security Fundamentals Project Manual. – М.: , 2008. – 312 с.
  98. Kostas Terzidis. Algorithms for Visual Design Using the Processing Language. – М.: , 2009. – 384 с.
  99. Andrew Lockhart. Network Security Hacks 2e. – М.: , 2006. – 352 с.
  100. Gary Cziko. The Things We Do – Using the Lessons of Bernard & Darwin to Understand the What, How & Why of Our Behavior. – М.: , 2000. – 304 с.
  101. Chris Mcnab. Network Security Assessment 2e. – М.: , 2007. – 464 с.
  102. Stefan Elbe. Virus Alert – Security, Governmentality, and the Global AIDS Pandemic. – М.: , 2009. – 224 с.
  103. Cryptography & Network Security. – М.: , 2007. – 0 с.
  104. The Winner'S Attitude: Using The "Switch" Method To Change How You Deal With Difficult People And Get The Best Out Of Any Situation At Work. – М.: , 2011. – 224 с.
  105. Citrix Xenapp Platinum Edition For Windows: The Official Guide. – М.: , 2011. – 576 с.
  106. Bringing Out The Best In Everyone You Coach: Use The Enneagram System For Exceptional Results. – М.: , 2011. – 288 с.
  107. Wireless Network Security A Beginners Guide. – М.: , 2011. – 400 с.
  108. Mobile Application Security. – М.: , 2011. – 432 с.
  109. Six Sigma On A Budget: Achieving More With Less Using The Principles Of Six Sigma. – М.: , 2011. – 192 с.
  110. Network Security: The Complete Reference. – М.: , 2011. – 896 с.
  111. Fundamentals Of Network Security. – М.: , 2011. – 672 с.
  112. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . –  с.
  113. Shaek Rana Mohammad Baki Billah and Mohammad Hafizur Rahman. Design & Development of Network Security System using IP Tables. – М.: LAP Lambert Academic Publishing, 2013. – 164 с.
  114. Anand Kannan. Evaluation of the Security Mechanisms in Cloud Networks. – М.: LAP Lambert Academic Publishing, 2013. – 192 с.
  115. Tasnuva Ahmed,Rabiul Hossain and Dipesh Barua. Security System Using Ultrasound. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  116. Punit N. Dhirawani. A Holistic Security System Using Motion Sensors. – М.: LAP Lambert Academic Publishing, 2011. – 72 с.
  117. Atif Farrukh. Secure Communication using Rossler Attractor. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  118. Nida Aziz. Control of a Virtual Hand Using a Brain-Computer Interface System. – М.: LAP Lambert Academic Publishing, 2011. – 104 с.
  119. Mustafa Aygul. Fatigue Analysis of Welded Structures Using the Finite Element Method. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  120. Randeep Chana and William Wiltshire. Evaluation of Class II correction using the Xbow® appliance. – М.: LAP Lambert Academic Publishing, 2013. – 132 с.
  121. Peter Hallock. A Network-based Investigation of the Mechanisms of Alzheimer's Disease. – М.: LAP Lambert Academic Publishing, 2012. – 288 с.
  122. William Fox. Mathematical Modeling using MADM Methods in Social & Dark Networks. – М.: LAP Lambert Academic Publishing, 2014. – 116 с.
  123. Glenn Greenwald. No Place to Hide: Edward Snowden, the NSA and the Surveillance State. – М.: Hamish Hamilton, 2014. – 272 с.
  124. Leman Ar?kbuka. EU-NATO Security Relations since the Maastricht Treaty. – М.: LAP Lambert Academic Publishing, 2011. – 68 с.
  125. Feras Al-Khayyal. Evaluation Of The Treatment Results Achieved In Orthodontic Patients. – М.: LAP Lambert Academic Publishing, 2013. – 56 с.
  126. Brijender Kahanwal. A Research Study On Java File Security System Using Rijndael Algorithm. – М.: LAP Lambert Academic Publishing, 2012. – 244 с.
  127. Xiaodong He. Automated intrusion prevention mechanism in enhancing network security. – М.: Scholars' Press, 2014. – 128 с.
  128. Syed Zahidur Rashid. Computer Network Security Monitoring. – М.: Scholars' Press, 2015. – 284 с.
  129. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  130. Gurpreet juneja. Security:MPLS VPN Network. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  131. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  132. Vincent Omollo. Enhanced Network Security. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  133. Manish Gupta and Dharmendra Kumar. Design and Implementation of Digital Watermarking. – М.: LAP Lambert Academic Publishing, 2014. – 172 с.
  134. Firkhan Ali Hamid Ali. Vulnerability Analysis on the Computer Network Security. – М.: LAP Lambert Academic Publishing, 2010. – 72 с.
  135. Imran Sohail and Sikandar Hayat. Network Security and DDoS. – М.: LAP Lambert Academic Publishing, 2010. – 64 с.
  136. Yi Ji. Scalability Evaluation of the GIPSY Runtime System. – М.: LAP Lambert Academic Publishing, 2011. – 112 с.
  137. Predrag Tasevski. Interactive Cyber Security Awareness Program. – М.: LAP Lambert Academic Publishing, 2012. – 184 с.
  138. Dirk Lessner. Network Security for Embedded Systems. – М.: LAP Lambert Academic Publishing, 2009. – 232 с.
  139. Georgina Yeboah. Evaluation of the Quality Systems of Komfo Anokye Teaching Hospital. – М.: LAP Lambert Academic Publishing, 2013. – 112 с.
  140. Tennyson Percival Mutsambi. An Evaluation of the Primary School Art Curriculum in Zimbabwe. – М.: LAP Lambert Academic Publishing, 2011. – 136 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Займы для корпораций: back to the Russia. Т. Мартынова, "Банковское обозрение", № 11, ноябрь 2007.
  2. Как в детском пазле. интервью с И. Смелянским, директором московского офиса компании The Boston Consulting Group. М. Тальская, "БДМ. Банки и деловой мир", N 3, март 2012 г.
  3. Back side of the moon, или темная сторона поведения персонала. интервью с Н. Русаковой, директором по персоналу ОАО "Хлебпром", А. Сукачёвым, директором "Торговой компании АС", Н. Харитоновой, руководителем службы персонала тверской компании ЗАО "ДКС". А. Колесникова, Т. Тюрина, С.  Машарипов, "Управление персоналом", N 16, август 2010 г.
  4. Цены под контролем: the present and the future. С. Стройкова, И. Леметюйнен, "Консультант", № 19, сентябрь 2009.
  5. Основной арсенал "охотника" - его network: кого он знает на рынке и качество этих отношений. С. Плетнева, "Управление персоналом", № 12, июнь 2009.
  6. Новая упрощенная процедура рассмотрения мелких исков в Евросоюзе - the european small claims procedure. escp. Н.В. Сивак, "Законодательство", № 2, февраль 2009.

Образцы работ

Тема и предметТип и объем работы
Инвестиционная стратегия предприятия
Инвестиционный менеджмент
Диплом
123 стр.
Правовая культура
Правоведение
Дипломный проект
67 стр.
Правовая культура
Макроэкономика, экономическая теория
Диплом
67 стр.
Продвижение брендов в шоу-бизнесе
Электроснабжение городов и промышленных предприятий
Диплом
79 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Света, 10.05
Большое спасибо за работу, Марина Михайловна и отдельное большое спасибо Юлии Крючковой. Вы оказали мне огромную помощь и за такой коротки срок. Вы меня очень сильно выручили, надеюсь защита также пройдет успешно. После защиты обязательно напишу отзыв на сайте.