Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Fred Eady. Implementing 802.11 with Microcontrollers: Wireless Networking for Embedded Systems Designers (Embedded Technology). – М.: , 2005. – 400 с. Timothy Stapko. Practical Embedded Security: Building Secure Resource-Constrained Systems. – М.: Newnes, 2007. – 480 с. James Gadze. Embedded Wireless Sensor Network for monitoring and control. – М.: LAP Lambert Academic Publishing, 2010. – 168 с. Piotr Szczechowiak. Security in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2011. – 248 с. Sameer Mitra. Inaudible Secrets. – М.: LAP Lambert Academic Publishing, 2010. – 124 с. Dirk Lessner. Network Security for Embedded Systems. – М.: LAP Lambert Academic Publishing, 2009. – 232 с. Дополнительные результаты William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с. Rajagopal. Systems Thinking and Process Dynamics for Marketing Systems: Technologies and Applications for Decision Management. – М.: , 2012. – 301 с. Dimitrios Soudris, Christian Piguet, Costas Goutis. Designing Cmos Circuits for Low Power (European Low-Power Initiative for Electronic System Design (Series).). – М.: , 0. – 0 с. Naim Afgan, Maria De Graca Carvalho, Naim Hamdia Afgan, M. G. Carvalho. Sustainable Assessment Method for Energy Systems: Indicators, Criteria and Decision Making Procedure. – М.: , 0. – 0 с. Zig Ziglar, John P. Hayes. Network Marketing for Dummies. – М.: , 0. – 0 с. Rod Nichols. Successful Network Marketing for the 21st Century (PSI Successful Business Library). – М.: , 0. – 0 с. Water Environment Federation. Financing and Charges for Wastewater Systems (Wef Manual of Practice). – М.: , 2004. – 0 с. Ron Ben Natan. Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase. – М.: , 2005. – 432 с. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с. Muhammad Ali Mazidi, Janice Mazidi, Rolin McKinlay. 8051 Microcontroller and Embedded Systems, The (2nd Edition). – М.: , 2005. – 640 с. Patrick Traynor, Patrick McDaniel, Thomas La Porta. Security for Telecommunications Networks (Advances in Information Security). – М.: , 2008. – 182 с. Network Security. – М.: , 2008. – 370 с. Thom Singer, Marny Lifshen. Some Assembly Required: A Networking Guide for Women. – М.: , 2008. – 184 с. Daniel Clark. Network Access Control 100 Success Secrets - 100 Most Asked NAC Questions on Implementation and Deployment of unify endpoint security technology, user ... and network security enforcement. – М.: , 2008. – 180 с. Planning for Information Systems (Advances in Management Information Systems). – М.: , 2009. – 528 с. Michael Erbschloe. Physical Security for IT. – М.: , 2010. – 256 с. Michael Erbschloe. Implementing Homeland Security for Enterprise IT. – М.: , 2010. – 299 с. Andreas Hoffmann, Heinrich Meyr, Rainer Leupers. Architecture Exploration for Embedded Processors With Lisa. – М.: , 0. – 0 с. Chris Nagy. Embedded Systems Design Using the TI MSP430 Series (Embedded Technology). – М.: Newnes, 2003. – 296 с. Kamal Hyder. Embedded Systems Design using the Rabbit 3000 Microprocessor : Interfacing, Networking, and Application Development (Embedded Technology). – М.: , 2004. – 480 с. Applications of Neural Networks in High Assurance Systems (Studies in Computational Intelligence). – М.: , 2010. – 280 с. Muhammad Ali Mazidi, Sarmad Naimi, Sepehr Naimi. AVR Microcontroller and Embedded Systems: Using Assembly and C. – М.: , 2010. – 792 с. Rob Cameron. Juniper(r) Networks Secure Access SSL VPN Configuration Guide. – М.: , 2010. – 656 с. Jack Ganssle. Embedded Systems: World Class Designs. – М.: , 2010. – 584 с. Owen Poole. Network Security. – М.: , 2010. – 224 с. Steve Heath. Embedded Systems Design. – М.: , 2010. – 430 с. Bruce Powel Douglass. Design Patterns for Embedded Systems in C. – М.: , 2010. – 416 с. Tim Wilmshurst. Designing Embedded Systems with PIC Microcontrollers. – М.: , 2010. – 0 с. Bruce Powel Douglass. Real Time UML Workshop for Embedded Systems. – М.: , 2010. – 432 с. Tammy Noergaard. Embedded Systems Architecture. – М.: , 2010. – 656 с. Jack Ganssle. Embedded Systems Dictionary. – М.: , 2010. – 256 с. Jack Ganssle. The Art of Designing Embedded Systems. – М.: , 2010. – 312 с. James Joshi. Network Security: Know It All. – М.: , 2010. – 368 с. Max Domeika. Software Development for Embedded Multi-core Systems. – М.: , 2010. – 440 с. Steve Manzuik. Network Security Assessment: From Vulnerability to Patch. – М.: , 2010. – 500 с. Jan L. Harrington. Network Security. – М.: , 2010. – 384 с. D. Dowson. Tribological Research and Design for Engineering Systems. – М.: , 2010. – 940 с. Axel Jantsch. Modeling Embedded Systems and SoC's. – М.: , 2010. – 351 с. Lewin Edwards. Embedded System Design on a Shoestring. – М.: , 2010. – 232 с. Andy Bailey. Network Technology for Digital Audio. – М.: , 2010. – 275 с. Jack Ganssle. The Art of Programming Embedded Systems. – М.: , 2010. – 279 с. Russ Rogers. Network Security Evaluation Using the NSA IEM. – М.: , 2010. – 450 с. Ahmad Ibrahim. Fuzzy Logic for Embedded Systems Applications. – М.: , 2010. – 312 с. Derrick Rountree. Security for Microsoft Windows System Administrators. – М.: , 2010. – 400 с. Tammy Noergaard. Demystifying Embedded Systems Middleware. – М.: , 2010. – 408 с. Ronald Sass. Embedded Systems Design with Platform FPGAs. – М.: , 2010. – 408 с. Brien Posey. GFI Network Security and PCI Compliance Power Tools. – М.: , 2010. – 488 с. Jean J. Labrosse. Embedded Systems Know It All Bundle. – М.: , 2010. – 0 с. Syngress. Configuring Cisco Network Services for Active Directory Adobe Edition. – М.: , 2010. – 608 с. Graham R Wilson. Embedded Systems and Computer Architecture. – М.: , 2010. – 320 с. Arnold S. Berger. Embedded Systems Design. – М.: , 2010. – 237 с. Gary E. Musgrave Ph.D. Safety Design for Space Systems. – М.: , 2010. – 992 с. Robert Oshana. DSP Software Development Techniques for Embedded and Real-Time Systems. – М.: , 2010. – 608 с. S.E. Jorgensen. Towards a Thermodynamic Theory for Ecological Systems. – М.: , 2010. – 380 с. S.E. Jorgensen. Towards a Thermodynamic Theory for Ecological Systems. – М.: , 2010. – 380 с. Syngress. Managing Cisco Network Security 2E. – М.: , 2010. – 752 с. Ed Sutter. Embedded Systems Firmware Demystified. – М.: , 2010. – 366 с. Abhik Roychoudhury. Embedded Systems and Software Validation. – М.: , 2010. – 272 с. Dan Schiller. Digital Capitalism – Networking the Global Market System. – М.: , 1999. – 320 с. John Mingers. Social Theory and Philosophy for Information Systems. – М.: , 2004. – 472 с. Karama Kanoun. Dependability Benchmarking for Computer Systems. – М.: , 2008. – 362 с. L P Kaelbling. Learning in Embedded Systems. – М.: , 2009. – 0 с. MORSE. Morse: ?operations? Research For Public Systems (pr Only). – М.: , 1967. – 0 с. Timothy Braithwaite. Securing E–Business Systems. – М.: , 2002. – 288 с. Bill English. MCSA/MCSE: Windows® 2000 Network Security Administration Study Guide. – М.: , 2003. – 574 с. Dan Schiller. Digital Capitalism – Networking the Global Market System. – М.: , 2000. – 320 с. Russ Kaufman. MCSA/MCSE: Windows® Server 2003 Network Security Administration Study Guide. – М.: , 2004. – 560 с. Michael Barr. Programming Embedded Systems 2e. – М.: , 2006. – 306 с. Jason Nash. Networking Essentials MCSE Study System. – М.: , 1999. – 82 с. Nitesh Dhanjani. Network Security Tools. – М.: , 2005. – 340 с. Thomas W. Madron. Network Security in the 90?s. – М.: , 1992. – 304 с. Microsoft. MCSE Training Kit (Exam 70–220) – Designing Microsoft Windows 2000 Network Security. – М.: , 2001. – 864 с. Andrew Lockhart. Network Security Hacks. – М.: , 2004. – 316 с. F THOMAS. Thomas ?instructor?s Manual? For ?filing? Systems For Information Management. – М.: , 1983. – 32 с. Norman Witkin. Enterprise Networking for Information Systems Professionals. – М.: , 1997. – 254 с. Prof John L Ward. Strategic Planning for Information Systems. – М.: , 1990. – 466 с. UNKNOWN. MCSE Networking Essentials For Dummies, Training K it. – М.: , 1999. – 0 с. Robert Aschermann. MCSE Networking Essentials For Dummies®. – М.: , 1999. – 354 с. DAN. Network Security In A Mixed Environment. – М.: , 1998. – 456 с. Glenn E. Weadock. MCSE Windows® 2000 Network Infrastructure For Dummies®. – М.: , 2000. – 432 с. Microsoft Official Academic Course. 70–298 Designing Security for a Microsoft® Windows ServerTM 2003 Network Package. – М.: , 2005. – 744 с. Leslie Pack Kaelbling. Learning in Embedded Systems. – М.: , 1993. – 194 с. Terry Bernstein. Internet Security for Business. – М.: , 1996. – 464 с. Laura L. Smith PhD. MCSE Networking Essentials For Dummies® Flash Cards. – М.: , 1999. – 250 с. Ronald M Harris–warwick. Dynamic Biological Networks – The Stomatogastric Nervous System. – М.: , 1992. – 348 с. Robert B. Harris. Precedence and Arrow Networking Techniques for Construction. – М.: , 1978. – 448 с. Matthew Strebe. Network Security JumpStartTM. – М.: , 2002. – 384 с. Benson Farb. Design for Embedded Image Processing on FPGAs. – М.: , 2011. – 552 с. Michelle Chuaprasert. Thermal and Power Design for Laptop Systems. – М.: , 2000. – 432 с. JOHN. Global Network Navigator For Dummies(r). – М.: , 1996. – 352 с. M GREENWELL. Greenwell: ?knowledge? Engineeering For Expert Systems (prev. Knowledge Elicitation). – М.: , 1988. – 184 с. BORKIN. Borkin: ?datamodels? – A Semantic Approach For Database Systems. – М.: , 1980. – 0 с. Pawan K Bhardwaj. A+. Network+, Security+ Exams in a Nutshell. – М.: , 2007. – 812 с. James W. Grenning. Test Driven Development for Embedded C. – М.: Pragmatic Bookshelf, 2011. – 310 с. Alan Derickson. Health Security for All – Dreams of Universal Health Care in America. – М.: , 2005. – 256 с. Eric Cole. Network Security Bible. – М.: , 2005. – 694 с. I Bratko. Kardio – A Study in Deep & Qualitative Knowledge for Expert Systems. – М.: , 1990. – 278 с. Anthony Jones. Network Programming for the Microsoft .NET Framework. – М.: , 2003. – 384 с. Roberta Bragg. MCSE Self–Paced Training Kit (Exam 70–298) – Designing Security for a Microsoft Windows Server 2003 Network. – М.: , 2004. – 864 с. Ed Robinson. Security for Microsoft Visual Basic .NET. – М.: , 2003. – 416 с. Kornel Terplan. Applications for Distributed Systems and Network Management. – М.: , 1994. – 400 с. Wireless Network Security A Beginners Guide. – М.: , 2011. – 400 с. Fundamentals Of Network Security. – М.: , 2011. – 672 с. Jean J. Labrosse. Embedded Systems Building Blocks: Complete and Ready-To-Use Modules in C (+ CD-ROM). – М.: CMP Books, 1999. – 616 с. Pat Villani. FreeDOS Kernel: An MS-DOS Emulator for Platform Independence and Embedded Systems Development. – М.: Publishers Group West, 1996. – 332 с. Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky. Cisco Security Professional's Guide to Secure Intrusion Detection Systems. – М.: , . – с. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . – с. Qing Li, Caroline Yao. Real-Time Concepts for Embedded Systems. – М.: , . – с. Roel Wieringa, R. J. Wieringa. Design Methods for Reactive Systems: Yourdon, Statemate, and the UML. – М.: Morgan Kaufmann, . – с. Doug Abbott. Linux for Embedded and Real-time Applications, Second Edition (Embedded Technology). – М.: Newnes, 2006. – 352 с. Fred Eady. Implementing 802.11 with Microcontrollers: Wireless Networking for Embedded Systems Designers (Embedded Technology). – М.: , 2005. – 400 с. Timothy Stapko. Practical Embedded Security: Building Secure Resource-Constrained Systems. – М.: Newnes, 2007. – 480 с. Siti Nurmaini. Intelligent Navigation for Embedded Mobile Robot. – М.: LAP Lambert Academic Publishing, 2012. – 244 с. Susmita Mandal. A Key Management Solution for HIPAA Compliance. – М.: LAP Lambert Academic Publishing, 2012. – 68 с. Shaek Rana Mohammad Baki Billah and Mohammad Hafizur Rahman. Design & Development of Network Security System using IP Tables. – М.: LAP Lambert Academic Publishing, 2013. – 164 с. Ruirui Gu,Shuvra S. Bhattacharyya and William S. Levine. Hardware Software Co-Design For Parallel Embedded Systems. – М.: LAP Lambert Academic Publishing, 2011. – 180 с. Muhammad Asif. UDP/IP For Embedded System. – М.: LAP Lambert Academic Publishing, 2010. – 104 с. Gurpreet Kaur. Rice Grading System for Embedded Image Processing. – М.: LAP Lambert Academic Publishing, 2014. – 96 с. Mouaaz Nahas. Time-Triggered Embedded Systems. – М.: LAP Lambert Academic Publishing, 2013. – 580 с. J. Somasekhar,G. K. Sivasankara Yadav and K. E. Srinivasa Murthy. Design and development of an embedded system for AD/DC power control. – М.: LAP Lambert Academic Publishing, 2012. – 96 с. Hussein M. Khattab,Almoataz Y. Abdelaziz and Said F. Mekhamer. Innovative Approaches for Power System Security Assessment. – М.: LAP Lambert Academic Publishing, 2013. – 224 с. R. Sivakumar and K. Balu. Design and Development of Fuzzy Controllers for MIMO Systems. – М.: LAP Lambert Academic Publishing, 2013. – 140 с. Swarnendu Biswas. Regression Test Selection and Optimization for Embedded Programs. – М.: LAP Lambert Academic Publishing, 2012. – 140 с. Muhammad Khurram Bhatti. Energy-Aware Scheduling For Real-Time Embedded Systems. – М.: LAP Lambert Academic Publishing, 2012. – 208 с. Ehsan Khorasani Esmaeili. Secure Keyboard logging system. – М.: LAP Lambert Academic Publishing, 2013. – 124 с. Venkata Krishna Parimala. Dimensions and challenges in providing QoS for wireless systems. – М.: LAP Lambert Academic Publishing, 2012. – 224 с. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с. Srilatha Chepure,C. V. Guru Rao and N. Ramesh Babu. Cache Configuration for High Performance Embedded Systems. – М.: LAP Lambert Academic Publishing, 2013. – 56 с. Vincent Omollo. Enhanced Network Security. – М.: LAP Lambert Academic Publishing, 2013. – 76 с. Mehmet Hilal Ozcanhan. Security & Reliability in Embedded Systems. – М.: LAP Lambert Academic Publishing, 2014. – 152 с. Firkhan Ali Hamid Ali. Vulnerability Analysis on the Computer Network Security. – М.: LAP Lambert Academic Publishing, 2010. – 72 с. Mwaffaq Otoom. APPLYING MODEL DRIVEN TECHNIQUES TO EMBEDDED SYSTEMS. – М.: LAP Lambert Academic Publishing, 2010. – 68 с. Britto R. Kumar and Albert S. Rabara. An Architecture for Secure Mobile Payment System using PKI. – М.: LAP Lambert Academic Publishing, 2013. – 184 с. Kefa Rabah. Mastering Securing ICT Infrastructure for Corporate Network. – М.: LAP Lambert Academic Publishing, 2014. – 360 с. Ahmed I. Sharaf,Ahmed E. Hassan and Magdi Z. Rashad. Designing Software Engineering Model for Web Enabled Embedded Systems. – М.: LAP Lambert Academic Publishing, 2012. – 124 с. Julien Shabani. Information Security for RFID Systems. – М.: LAP Lambert Academic Publishing, 2011. – 92 с. Dirk Lessner. Network Security for Embedded Systems. – М.: LAP Lambert Academic Publishing, 2009. – 232 с. Yiran Shen. Addressing Problems of Embedded Systems via Compressive Sensing. – М.: LAP Lambert Academic Publishing, 2015. – 188 с. Mousumi Saha. Simulation of FPGA based Buffered Security Enabled Encoders. – М.: LAP Lambert Academic Publishing, 2012. – 100 с. Лучшие результаты Ничего не найдено Дополнительные результаты Банковское отделение будущего. интервью с Камероном МакКворри. Cameron MacQuarrie, менеджером по развитию бизнеса компании Cisco Systems в области корпоративных финансов в регионе EMEA. Европа, Ближний Восток, Африка. Н.Ф. Колюшенко, "Расчеты и операционная работа в коммерческом банке", № 2, февраль 2006. Ловушка для пирата. интервью с И. Слабых, руководителем отдела противодействия интеллектуальному пиратству в России и СНГ Adobe Systems. И. Голова, "Расчет", N 9, сентябрь 2012 г. Мы можем управлять собственными мыслями. интервью с С. Харитоновым, врачом-психотерапевтом, психиатором, кандидатом медицинских наук, старшим научным сотрудником Московского НИИ психиатрии Росздрава РФ, членом-корреспондентом Международной академии наук. МАНЭБ, членом Британского общества когнитивных и поведенческих психотерапевтов. Membership British Association for Behavioural & Cognitive Psychoterapies / BABCP. Ф. Кульпин, "Управление персоналом", N 8, апрель 2011 г. Зачетная реструктуризация долга: институт DEBT-FOR-EQUITY SWAP в России". интервью с М. Григорьевым, старшим юристом корпоративной практики юридической фирмы "Вегас-Лекс". О. Бодрягина, "эж-ЮРИСТ", № 3, январь 2010. Основной арсенал "охотника" - его network: кого он знает на рынке и качество этих отношений. С. Плетнева, "Управление персоналом", № 12, июнь 2009. Я воспринимаю персонального помощника как напарника червяк должен нравиться рыбке, а не рыбаку. интервью с П.А. Черкашиным, руководителем российского представительства компании Adobe Systems. "Управление персоналом", № 20, октябрь 2008. Управление проектами при подборе персонала. PM for HR. Е. Кривов, "Кадровик. Рекрутинг для кадровика", № 9, сентябрь 2008. Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Наиль, 24.12 Спасибо за курсовую. на высшем уровне! Получили 5! Так же мы были бы рады и в будущем с Вами работать.