Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Fred Eady. Implementing 802.11 with Microcontrollers: Wireless Networking for Embedded Systems Designers (Embedded Technology). – М.: , 2005. – 400 с.
  2. Timothy Stapko. Practical Embedded Security: Building Secure Resource-Constrained Systems. – М.: Newnes, 2007. – 480 с.
  3. James Gadze. Embedded Wireless Sensor Network for monitoring and control. – М.: LAP Lambert Academic Publishing, 2010. – 168 с.
  4. Piotr Szczechowiak. Security in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2011. – 248 с.
  5. Sameer Mitra. Inaudible Secrets. – М.: LAP Lambert Academic Publishing, 2010. – 124 с.
  6. Dirk Lessner. Network Security for Embedded Systems. – М.: LAP Lambert Academic Publishing, 2009. – 232 с.

Дополнительные результаты

  1. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с.
  2. Rajagopal. Systems Thinking and Process Dynamics for Marketing Systems: Technologies and Applications for Decision Management. – М.: , 2012. – 301 с.
  3. Dimitrios Soudris, Christian Piguet, Costas Goutis. Designing Cmos Circuits for Low Power (European Low-Power Initiative for Electronic System Design (Series).). – М.: , 0. – 0 с.
  4. Naim Afgan, Maria De Graca Carvalho, Naim Hamdia Afgan, M. G. Carvalho. Sustainable Assessment Method for Energy Systems: Indicators, Criteria and Decision Making Procedure. – М.: , 0. – 0 с.
  5. Zig Ziglar, John P. Hayes. Network Marketing for Dummies. – М.: , 0. – 0 с.
  6. Rod Nichols. Successful Network Marketing for the 21st Century (PSI Successful Business Library). – М.: , 0. – 0 с.
  7. Water Environment Federation. Financing and Charges for Wastewater Systems (Wef Manual of Practice). – М.: , 2004. – 0 с.
  8. Ron Ben Natan. Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase. – М.: , 2005. – 432 с.
  9. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с.
  10. Muhammad Ali Mazidi, Janice Mazidi, Rolin McKinlay. 8051 Microcontroller and Embedded Systems, The (2nd Edition). – М.: , 2005. – 640 с.
  11. Patrick Traynor, Patrick McDaniel, Thomas La Porta. Security for Telecommunications Networks (Advances in Information Security). – М.: , 2008. – 182 с.
  12. Network Security. – М.: , 2008. – 370 с.
  13. Thom Singer, Marny Lifshen. Some Assembly Required: A Networking Guide for Women. – М.: , 2008. – 184 с.
  14. Daniel Clark. Network Access Control 100 Success Secrets - 100 Most Asked NAC Questions on Implementation and Deployment of unify endpoint security technology, user ... and network security enforcement. – М.: , 2008. – 180 с.
  15. Planning for Information Systems (Advances in Management Information Systems). – М.: , 2009. – 528 с.
  16. Michael Erbschloe. Physical Security for IT. – М.: , 2010. – 256 с.
  17. Michael Erbschloe. Implementing Homeland Security for Enterprise IT. – М.: , 2010. – 299 с.
  18. Andreas Hoffmann, Heinrich Meyr, Rainer Leupers. Architecture Exploration for Embedded Processors With Lisa. – М.: , 0. – 0 с.
  19. Chris Nagy. Embedded Systems Design Using the TI MSP430 Series (Embedded Technology). – М.: Newnes, 2003. – 296 с.
  20. Kamal Hyder. Embedded Systems Design using the Rabbit 3000 Microprocessor : Interfacing, Networking, and Application Development (Embedded Technology). – М.: , 2004. – 480 с.
  21. Applications of Neural Networks in High Assurance Systems (Studies in Computational Intelligence). – М.: , 2010. – 280 с.
  22. Muhammad Ali Mazidi, Sarmad Naimi, Sepehr Naimi. AVR Microcontroller and Embedded Systems: Using Assembly and C. – М.: , 2010. – 792 с.
  23. Rob Cameron. Juniper(r) Networks Secure Access SSL VPN Configuration Guide. – М.: , 2010. – 656 с.
  24. Jack Ganssle. Embedded Systems: World Class Designs. – М.: , 2010. – 584 с.
  25. Owen Poole. Network Security. – М.: , 2010. – 224 с.
  26. Steve Heath. Embedded Systems Design. – М.: , 2010. – 430 с.
  27. Bruce Powel Douglass. Design Patterns for Embedded Systems in C. – М.: , 2010. – 416 с.
  28. Tim Wilmshurst. Designing Embedded Systems with PIC Microcontrollers. – М.: , 2010. – 0 с.
  29. Bruce Powel Douglass. Real Time UML Workshop for Embedded Systems. – М.: , 2010. – 432 с.
  30. Tammy Noergaard. Embedded Systems Architecture. – М.: , 2010. – 656 с.
  31. Jack Ganssle. Embedded Systems Dictionary. – М.: , 2010. – 256 с.
  32. Jack Ganssle. The Art of Designing Embedded Systems. – М.: , 2010. – 312 с.
  33. James Joshi. Network Security: Know It All. – М.: , 2010. – 368 с.
  34. Max Domeika. Software Development for Embedded Multi-core Systems. – М.: , 2010. – 440 с.
  35. Steve Manzuik. Network Security Assessment: From Vulnerability to Patch. – М.: , 2010. – 500 с.
  36. Jan L. Harrington. Network Security. – М.: , 2010. – 384 с.
  37. D. Dowson. Tribological Research and Design for Engineering Systems. – М.: , 2010. – 940 с.
  38. Axel Jantsch. Modeling Embedded Systems and SoC's. – М.: , 2010. – 351 с.
  39. Lewin Edwards. Embedded System Design on a Shoestring. – М.: , 2010. – 232 с.
  40. Andy Bailey. Network Technology for Digital Audio. – М.: , 2010. – 275 с.
  41. Jack Ganssle. The Art of Programming Embedded Systems. – М.: , 2010. – 279 с.
  42. Russ Rogers. Network Security Evaluation Using the NSA IEM. – М.: , 2010. – 450 с.
  43. Ahmad Ibrahim. Fuzzy Logic for Embedded Systems Applications. – М.: , 2010. – 312 с.
  44. Derrick Rountree. Security for Microsoft Windows System Administrators. – М.: , 2010. – 400 с.
  45. Tammy Noergaard. Demystifying Embedded Systems Middleware. – М.: , 2010. – 408 с.
  46. Ronald Sass. Embedded Systems Design with Platform FPGAs. – М.: , 2010. – 408 с.
  47. Brien Posey. GFI Network Security and PCI Compliance Power Tools. – М.: , 2010. – 488 с.
  48. Jean J. Labrosse. Embedded Systems Know It All Bundle. – М.: , 2010. – 0 с.
  49. Syngress. Configuring Cisco Network Services for Active Directory Adobe Edition. – М.: , 2010. – 608 с.
  50. Graham R Wilson. Embedded Systems and Computer Architecture. – М.: , 2010. – 320 с.
  51. Arnold S. Berger. Embedded Systems Design. – М.: , 2010. – 237 с.
  52. Gary E. Musgrave Ph.D. Safety Design for Space Systems. – М.: , 2010. – 992 с.
  53. Robert Oshana. DSP Software Development Techniques for Embedded and Real-Time Systems. – М.: , 2010. – 608 с.
  54. S.E. Jorgensen. Towards a Thermodynamic Theory for Ecological Systems. – М.: , 2010. – 380 с.
  55. S.E. Jorgensen. Towards a Thermodynamic Theory for Ecological Systems. – М.: , 2010. – 380 с.
  56. Syngress. Managing Cisco Network Security 2E. – М.: , 2010. – 752 с.
  57. Ed Sutter. Embedded Systems Firmware Demystified. – М.: , 2010. – 366 с.
  58. Abhik Roychoudhury. Embedded Systems and Software Validation. – М.: , 2010. – 272 с.
  59. Dan Schiller. Digital Capitalism – Networking the Global Market System. – М.: , 1999. – 320 с.
  60. John Mingers. Social Theory and Philosophy for Information Systems. – М.: , 2004. – 472 с.
  61. Karama Kanoun. Dependability Benchmarking for Computer Systems. – М.: , 2008. – 362 с.
  62. L P Kaelbling. Learning in Embedded Systems. – М.: , 2009. – 0 с.
  63. MORSE. Morse: ?operations? Research For Public Systems (pr Only). – М.: , 1967. – 0 с.
  64. Timothy Braithwaite. Securing E–Business Systems. – М.: , 2002. – 288 с.
  65. Bill English. MCSA/MCSE: Windows® 2000 Network Security Administration Study Guide. – М.: , 2003. – 574 с.
  66. Dan Schiller. Digital Capitalism – Networking the Global Market System. – М.: , 2000. – 320 с.
  67. Russ Kaufman. MCSA/MCSE: Windows® Server 2003 Network Security Administration Study Guide. – М.: , 2004. – 560 с.
  68. Michael Barr. Programming Embedded Systems 2e. – М.: , 2006. – 306 с.
  69. Jason Nash. Networking Essentials MCSE Study System. – М.: , 1999. – 82 с.
  70. Nitesh Dhanjani. Network Security Tools. – М.: , 2005. – 340 с.
  71. Thomas W. Madron. Network Security in the 90?s. – М.: , 1992. – 304 с.
  72. Microsoft. MCSE Training Kit (Exam 70–220) – Designing Microsoft Windows 2000 Network Security. – М.: , 2001. – 864 с.
  73. Andrew Lockhart. Network Security Hacks. – М.: , 2004. – 316 с.
  74. F THOMAS. Thomas ?instructor?s Manual? For ?filing? Systems For Information Management. – М.: , 1983. – 32 с.
  75. Norman Witkin. Enterprise Networking for Information Systems Professionals. – М.: , 1997. – 254 с.
  76. Prof John L Ward. Strategic Planning for Information Systems. – М.: , 1990. – 466 с.
  77. UNKNOWN. MCSE Networking Essentials For Dummies, Training K it. – М.: , 1999. – 0 с.
  78. Robert Aschermann. MCSE Networking Essentials For Dummies®. – М.: , 1999. – 354 с.
  79. DAN. Network Security In A Mixed Environment. – М.: , 1998. – 456 с.
  80. Glenn E. Weadock. MCSE Windows® 2000 Network Infrastructure For Dummies®. – М.: , 2000. – 432 с.
  81. Microsoft Official Academic Course. 70–298 Designing Security for a Microsoft® Windows ServerTM 2003 Network Package. – М.: , 2005. – 744 с.
  82. Leslie Pack Kaelbling. Learning in Embedded Systems. – М.: , 1993. – 194 с.
  83. Terry Bernstein. Internet Security for Business. – М.: , 1996. – 464 с.
  84. Laura L. Smith PhD. MCSE Networking Essentials For Dummies® Flash Cards. – М.: , 1999. – 250 с.
  85. Ronald M Harris–warwick. Dynamic Biological Networks – The Stomatogastric Nervous System. – М.: , 1992. – 348 с.
  86. Robert B. Harris. Precedence and Arrow Networking Techniques for Construction. – М.: , 1978. – 448 с.
  87. Matthew Strebe. Network Security JumpStartTM. – М.: , 2002. – 384 с.
  88. Benson Farb. Design for Embedded Image Processing on FPGAs. – М.: , 2011. – 552 с.
  89. Michelle Chuaprasert. Thermal and Power Design for Laptop Systems. – М.: , 2000. – 432 с.
  90. JOHN. Global Network Navigator For Dummies(r). – М.: , 1996. – 352 с.
  91. M GREENWELL. Greenwell: ?knowledge? Engineeering For Expert Systems (prev. Knowledge Elicitation). – М.: , 1988. – 184 с.
  92. BORKIN. Borkin: ?datamodels? – A Semantic Approach For Database Systems. – М.: , 1980. – 0 с.
  93. Pawan K Bhardwaj. A+. Network+, Security+ Exams in a Nutshell. – М.: , 2007. – 812 с.
  94. James W. Grenning. Test Driven Development for Embedded C. – М.: Pragmatic Bookshelf, 2011. – 310 с.
  95. Alan Derickson. Health Security for All – Dreams of Universal Health Care in America. – М.: , 2005. – 256 с.
  96. Eric Cole. Network Security Bible. – М.: , 2005. – 694 с.
  97. I Bratko. Kardio – A Study in Deep & Qualitative Knowledge for Expert Systems. – М.: , 1990. – 278 с.
  98. Anthony Jones. Network Programming for the Microsoft .NET Framework. – М.: , 2003. – 384 с.
  99. Roberta Bragg. MCSE Self–Paced Training Kit (Exam 70–298) – Designing Security for a Microsoft Windows Server 2003 Network. – М.: , 2004. – 864 с.
  100. Ed Robinson. Security for Microsoft Visual Basic .NET. – М.: , 2003. – 416 с.
  101. Kornel Terplan. Applications for Distributed Systems and Network Management. – М.: , 1994. – 400 с.
  102. Wireless Network Security A Beginners Guide. – М.: , 2011. – 400 с.
  103. Fundamentals Of Network Security. – М.: , 2011. – 672 с.
  104. Jean J. Labrosse. Embedded Systems Building Blocks: Complete and Ready-To-Use Modules in C (+ CD-ROM). – М.: CMP Books, 1999. – 616 с.
  105. Pat Villani. FreeDOS Kernel: An MS-DOS Emulator for Platform Independence and Embedded Systems Development. – М.: Publishers Group West, 1996. – 332 с.
  106. Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky. Cisco Security Professional's Guide to Secure Intrusion Detection Systems. – М.: , . –  с.
  107. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . –  с.
  108. Qing Li, Caroline Yao. Real-Time Concepts for Embedded Systems. – М.: , . –  с.
  109. Roel Wieringa, R. J. Wieringa. Design Methods for Reactive Systems: Yourdon, Statemate, and the UML. – М.: Morgan Kaufmann, . –  с.
  110. Doug Abbott. Linux for Embedded and Real-time Applications, Second Edition (Embedded Technology). – М.: Newnes, 2006. – 352 с.
  111. Fred Eady. Implementing 802.11 with Microcontrollers: Wireless Networking for Embedded Systems Designers (Embedded Technology). – М.: , 2005. – 400 с.
  112. Timothy Stapko. Practical Embedded Security: Building Secure Resource-Constrained Systems. – М.: Newnes, 2007. – 480 с.
  113. Siti Nurmaini. Intelligent Navigation for Embedded Mobile Robot. – М.: LAP Lambert Academic Publishing, 2012. – 244 с.
  114. Susmita Mandal. A Key Management Solution for HIPAA Compliance. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  115. Shaek Rana Mohammad Baki Billah and Mohammad Hafizur Rahman. Design & Development of Network Security System using IP Tables. – М.: LAP Lambert Academic Publishing, 2013. – 164 с.
  116. Ruirui Gu,Shuvra S. Bhattacharyya and William S. Levine. Hardware Software Co-Design For Parallel Embedded Systems. – М.: LAP Lambert Academic Publishing, 2011. – 180 с.
  117. Muhammad Asif. UDP/IP For Embedded System. – М.: LAP Lambert Academic Publishing, 2010. – 104 с.
  118. Gurpreet Kaur. Rice Grading System for Embedded Image Processing. – М.: LAP Lambert Academic Publishing, 2014. – 96 с.
  119. Mouaaz Nahas. Time-Triggered Embedded Systems. – М.: LAP Lambert Academic Publishing, 2013. – 580 с.
  120. J. Somasekhar,G. K. Sivasankara Yadav and K. E. Srinivasa Murthy. Design and development of an embedded system for AD/DC power control. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  121. Hussein M. Khattab,Almoataz Y. Abdelaziz and Said F. Mekhamer. Innovative Approaches for Power System Security Assessment. – М.: LAP Lambert Academic Publishing, 2013. – 224 с.
  122. R. Sivakumar and K. Balu. Design and Development of Fuzzy Controllers for MIMO Systems. – М.: LAP Lambert Academic Publishing, 2013. – 140 с.
  123. Swarnendu Biswas. Regression Test Selection and Optimization for Embedded Programs. – М.: LAP Lambert Academic Publishing, 2012. – 140 с.
  124. Muhammad Khurram Bhatti. Energy-Aware Scheduling For Real-Time Embedded Systems. – М.: LAP Lambert Academic Publishing, 2012. – 208 с.
  125. Ehsan Khorasani Esmaeili. Secure Keyboard logging system. – М.: LAP Lambert Academic Publishing, 2013. – 124 с.
  126. Venkata Krishna Parimala. Dimensions and challenges in providing QoS for wireless systems. – М.: LAP Lambert Academic Publishing, 2012. – 224 с.
  127. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  128. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  129. Srilatha Chepure,C. V. Guru Rao and N. Ramesh Babu. Cache Configuration for High Performance Embedded Systems. – М.: LAP Lambert Academic Publishing, 2013. – 56 с.
  130. Vincent Omollo. Enhanced Network Security. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  131. Mehmet Hilal Ozcanhan. Security & Reliability in Embedded Systems. – М.: LAP Lambert Academic Publishing, 2014. – 152 с.
  132. Firkhan Ali Hamid Ali. Vulnerability Analysis on the Computer Network Security. – М.: LAP Lambert Academic Publishing, 2010. – 72 с.
  133. Mwaffaq Otoom. APPLYING MODEL DRIVEN TECHNIQUES TO EMBEDDED SYSTEMS. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  134. Britto R. Kumar and Albert S. Rabara. An Architecture for Secure Mobile Payment System using PKI. – М.: LAP Lambert Academic Publishing, 2013. – 184 с.
  135. Kefa Rabah. Mastering Securing ICT Infrastructure for Corporate Network. – М.: LAP Lambert Academic Publishing, 2014. – 360 с.
  136. Ahmed I. Sharaf,Ahmed E. Hassan and Magdi Z. Rashad. Designing Software Engineering Model for Web Enabled Embedded Systems. – М.: LAP Lambert Academic Publishing, 2012. – 124 с.
  137. Julien Shabani. Information Security for RFID Systems. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.
  138. Dirk Lessner. Network Security for Embedded Systems. – М.: LAP Lambert Academic Publishing, 2009. – 232 с.
  139. Yiran Shen. Addressing Problems of Embedded Systems via Compressive Sensing. – М.: LAP Lambert Academic Publishing, 2015. – 188 с.
  140. Mousumi Saha. Simulation of FPGA based Buffered Security Enabled Encoders. – М.: LAP Lambert Academic Publishing, 2012. – 100 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Банковское отделение будущего. интервью с Камероном МакКворри. Cameron MacQuarrie, менеджером по развитию бизнеса компании Cisco Systems в области корпоративных финансов в регионе EMEA. Европа, Ближний Восток, Африка. Н.Ф. Колюшенко, "Расчеты и операционная работа в коммерческом банке", № 2, февраль 2006.
  2. Ловушка для пирата. интервью с И. Слабых, руководителем отдела противодействия интеллектуальному пиратству в России и СНГ Adobe Systems. И. Голова, "Расчет", N 9, сентябрь 2012 г.
  3. Мы можем управлять собственными мыслями. интервью с С. Харитоновым, врачом-психотерапевтом, психиатором, кандидатом медицинских наук, старшим научным сотрудником Московского НИИ психиатрии Росздрава РФ, членом-корреспондентом Международной академии наук. МАНЭБ, членом Британского общества когнитивных и поведенческих психотерапевтов. Membership British Association for Behavioural & Cognitive Psychoterapies / BABCP. Ф. Кульпин, "Управление персоналом", N 8, апрель 2011 г.
  4. Зачетная реструктуризация долга: институт DEBT-FOR-EQUITY SWAP в России". интервью с М. Григорьевым, старшим юристом корпоративной практики юридической фирмы "Вегас-Лекс". О. Бодрягина, "эж-ЮРИСТ", № 3, январь 2010.
  5. Основной арсенал "охотника" - его network: кого он знает на рынке и качество этих отношений. С. Плетнева, "Управление персоналом", № 12, июнь 2009.
  6. Я воспринимаю персонального помощника как напарника червяк должен нравиться рыбке, а не рыбаку. интервью с П.А. Черкашиным, руководителем российского представительства компании Adobe Systems. "Управление персоналом", № 20, октябрь 2008.
  7. Управление проектами при подборе персонала. PM for HR. Е. Кривов, "Кадровик. Рекрутинг для кадровика", № 9, сентябрь 2008.

Образцы работ

Тема и предметТип и объем работы
Этапы формирования теории президентства
История государства и права
Курсовая работа
30 стр.
Последствия операции НАТО
Политология
Диплом
80 стр.
Слияния и поглощения Мировая и Российская практика
Мировая экономика
Диплом
99 стр.
Привлекательности труда в организации
Психология
Курсовая работа
35 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Наиль, 24.12
Спасибо за курсовую. на высшем уровне! Получили 5! Так же мы были бы рады и в будущем с Вами работать.