Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Data Privacy Management and Autonomous Spontaneus Security: 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, ... Computer Science / Security and Cryptology). – М.: , 2012. – 334 с. Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – М.: , 2012. – 283 с. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с. Seymour Bosworth, Michel E. Kabay. Computer Security Handbook. – М.: , 0. – 0 с. Charles J. Austin, Stuart B. Boxerman. Information Systems for Healthcare Management, Sixth Edition. – М.: , 0. – 0 с. Timothy Braithwaite. Securing E-Business Systems: A Guide for Managers and Executives. – М.: , 0. – 0 с. Ray Ramon. Technology Solutions for Growing Businesses. – М.: , 0. – 0 с. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с. Jose Nazario, Nazario. Defense and Detection Strategies against Internet Worms. – М.: , 0. – 0 с. Andrew Sun. Using and Managing Ppp. – М.: , 0. – 0 с. Amjad Umar. E-Business and Distributed Systems Handbook: Management Module. – М.: , 0. – 0 с. James E. Goldman, Phillip T. Rawles, Julie R. Mariga. Client/Server Information Systems: A Business-Oriented Approach. – М.: , 0. – 0 с. Jesus Mena. Homeland Security Techniques and Technologies (Networking Series). – М.: , 0. – 0 с. Steve Litt. Samba Unleashed (Unleashed). – М.: , 0. – 0 с. Vesna Hassler. Security Fundamentals for E-Commerce (Artech House Computer Security Series). – М.: , 0. – 0 с. Ross Malaga. Information Systems Technology. – М.: , 0. – 0 с. Aspatore Books Staff. Inside the Minds: Security Matters - Industry Leaders from eBay, Inc., Motorola, Internet Security Systems & More on Protecting Your Most Valuable Assets. – М.: , 0. – 0 с. Thomas C. Glaessner. Electronic Safety and Soundness: Securing Finance in a New Age (World Bank Working Papers). – М.: , 2004. – 0 с. Geoffrey Elliott. Mobile Commerce and Wireless Computing Systems. – М.: , 2003. – 0 с. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с. Patrick Traynor, Patrick McDaniel, Thomas La Porta. Security for Telecommunications Networks (Advances in Information Security). – М.: , 2008. – 182 с. James Michael Stewart, Ed Tittel, Mike Chapple. CISSP: Certified Information Systems Security Professional Study Guide. – М.: , 2008. – 841 с. Crucible For Survival: Environmental Security and Justice in the Indian Ocean Region. – М.: , 2008. – 332 с. Fredrik Nilsson, Communications Axis. Intelligent Network Video: Understanding Modern Video Surveillance Systems. – М.: , 2008. – 440 с. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с. Handbook on Information Technology in Finance (International Handbooks on Information Systems). – М.: , 2008. – 800 с. Handbook of Information and Communication Security. – М.: , 2010. – 800 с. Paul Dyson, Andrew Longshaw. Architecting Enterprise Solutions. – М.: John Wiley and Sons, Ltd, 0. – 364 с. John R. Vacca. Network and System Security. – М.: , 2010. – 408 с. Tony Flick, Justin Morehouse. Securing the Smart Grid: Next Generation Power Grid Security. – М.: Рид Элсивер, 2011. – 320 с. Principles Of Computer Security, Comptia Security+ And Beyond, Second Edition. – М.: , 2011. – 0 с. Session Initiation Protocol (Sip): Controlling Convergent Networks. – М.: , 2011. – 264 с. John Watson, Roopesh Ramklass, Bob Bryla. OCA/OCP Oracle Database 11G: All-in-One Exam Guide (+ CD-ROM). – М.: Oracle Press, 2010. – 1072 с. Mike Meyers' Comptia Network+ Guide To Managing And Troubleshooting Networks Lab Manual, Second Edition. – М.: , 2011. – 352 с. Mac Os X System Administration. – М.: , 2011. – 528 с. Operating Systems Demystified. – М.: , 2011. – 400 с. David Endler, Mark Collier. Hacking Exposed VoIP: Voice Over Ip Security Secrets & Solutions. – М.: McGraw-Hill Osborne Media, 2006. – 574 с. Will Schmied, Thomas W. Shinder, Robert J. Shimonski, Tony Piltzecker. MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network. Study Guide and DVD Training System (Exam 70-214). – М.: Syngress, . – 822 с. Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky. Cisco Security Professional's Guide to Secure Intrusion Detection Systems. – М.: , . – с. Ido Dubrawsky. CompTIA Security+ Certification Study Guide, Third Edition: Exam SYO-201 3E. – М.: , 2009. – 752 с. Eduardo Fernandez-Buglioni. Security Patterns in Practice: Designing Secure Architectures Using Software Patterns. – М.: Wiley, 2013. – 582 с. Muhammad Wasim and Abdulbasit Shaikh. Rasterstereography Based Partial Face Recognition. – М.: LAP Lambert Academic Publishing, 2014. – 64 с. Jaydeb Bhaumik and Satyajit Das. Substitution Permutation Network Type Block Cipher. – М.: LAP Lambert Academic Publishing, 2013. – 68 с. Naveen Kolla,Nigusie Alamerie Melesse and Adnan Kedir Jarso. Smart-Puter Based Sectrol for Two-Wheeler. – М.: LAP Lambert Academic Publishing, 2012. – 92 с. Shaek Rana Mohammad Baki Billah and Mohammad Hafizur Rahman. Design & Development of Network Security System using IP Tables. – М.: LAP Lambert Academic Publishing, 2013. – 164 с. Uwakwe Chukwu. Assessment of the Impact of V2G on Distribution System. – М.: LAP Lambert Academic Publishing, 2012. – 404 с. Musthak Ahmed Shaik,Shaik Abdul Gafoor and M. Raghavendra Rao. Busbar Protection. – М.: LAP Lambert Academic Publishing, 2011. – 92 с. Oladimeji Tolulope. Design of remotely controlled Vehicle Anti-Theft via GSM Network. – М.: LAP Lambert Academic Publishing, 2014. – 60 с. Amal Punchihewa and Bhim Dulal. IPTV-Internet Protocol Television. – М.: LAP Lambert Academic Publishing, 2013. – 104 с. Jayendra Singh,Satvik Vats and Ankit Dagar. Control Area Network for Vehicle Security System. – М.: LAP Lambert Academic Publishing, 2013. – 88 с. Jai Parkash,Mr. Ashutosh Gupta and Dr. Pradeep Kumar Rana. SMS based Wireless Temperature monitoring. – М.: LAP Lambert Academic Publishing, 2010. – 100 с. Indu Sreedevi,Santanu Chaudhury and Asok Bhattacharyya. Smart Camera Networks. – М.: LAP Lambert Academic Publishing, 2012. – 156 с. Van Liem Nguyen. Power Systems Modeling and Control Coordination. – М.: LAP Lambert Academic Publishing, 2010. – 280 с. AbdolMajid Shahgholi,Dr. K. K. Shukla and Dr. Rajeev Srivastava. LARGE SCALE WIRELESS SENSOR NETWORK FOR TACTICAL MILITARY APPLICATIONS. – М.: LAP Lambert Academic Publishing, 2012. – 92 с. Rashi Kohli and Manoj Kumar. Cryptographic on System-Chip-Design Using VLSI Technique. – М.: LAP Lambert Academic Publishing, 2013. – 92 с. Xiangqian Chen. DEFENSE AGAINST NODE COMPROMISE IN SENSOR NETWORK SECURITY. – М.: LAP Lambert Academic Publishing, 2009. – 108 с. James Gadze. Embedded Wireless Sensor Network for monitoring and control. – М.: LAP Lambert Academic Publishing, 2010. – 168 с. Rshdee Alhakim,Emmanuel Simeu and Kosai Raoof. Optimizing the performance of synchronization process. – М.: LAP Lambert Academic Publishing, 2013. – 284 с. Daniel Kwon and Venky Shankar. Vulnerability Analysis and Risk Assessment. – М.: Scholars' Press, 2014. – 324 с. Hakan Aydogan. Satellite Technologies and Global Security. – М.: LAP Lambert Academic Publishing, 2014. – 292 с. M. Sadiq Ali Khan and S. M. Aqil Burney. Recent Trends in Intrusion Detection System & Network Monitoring. – М.: LAP Lambert Academic Publishing, 2012. – 120 с. Mohamed Zellagui and Abdelaziz Chaghi. Distance Protection for Electrical Transmission Line. – М.: LAP Lambert Academic Publishing, 2012. – 112 с. Hussein M. Khattab,Almoataz Y. Abdelaziz and Said F. Mekhamer. Innovative Approaches for Power System Security Assessment. – М.: LAP Lambert Academic Publishing, 2013. – 224 с. Ayyaswamy Kathirvel,Srinivasan Rengaramanujam and Mohanambal Kathirvel. Prevention of attacks usign umpiring security model for manets. – М.: LAP Lambert Academic Publishing, 2012. – 192 с. Shahnawaz Husain,S. C. Gupta and R. C. Joshi. Intrusion Detection Engine for Adhoc Environment. – М.: LAP Lambert Academic Publishing, 2013. – 120 с. Hattab Guesmi. High performance IP networks. – М.: LAP Lambert Academic Publishing, 2013. – 104 с. Sumaya Saad Sulaiman and Sarab M. Hameed. A Fuzzy Based Clustering for Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 120 с. Shubha Puthran and Ketan Shah. Intrusion Detection System using datamining techniques. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Younus Javed and Hassan Tahir. Optimized Security Protocol for Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Jiantao Gu,Jun Zheng and Jixun Song. WLAN Monitoring and Management System. – М.: LAP Lambert Academic Publishing, 2012. – 196 с. Hamid Reza Barzegar,Mahdiyeh Barzegar and Neshat Alidad. Energy Efficient And Secured Communication For Manets In Military. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Yogesh Kumar,Krishan Kumar and Gulshan Kumar. Feature Selection For Intrusion Detection Systems. – М.: LAP Lambert Academic Publishing, 2014. – 100 с. Sourav Kanti Addya and Ashok Kumar Turuk. Key Pre-distribution in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2010. – 68 с. Rupa Ch. and Avadhani P. S. Modern Security Methods in Applied Computer Science. – М.: Scholars' Press, 2014. – 124 с. Ming-Chin Chuang. Authentication and Mobility Management Mechanisms in VANETs. – М.: Scholars' Press, 2014. – 96 с. D. N. Sujatha and K. R. Venugopal. Performance Evaluation of Video-on-Demand System. – М.: LAP Lambert Academic Publishing, 2014. – 208 с. Lane Thames. Advancing Cyber Security. – М.: LAP Lambert Academic Publishing, 2013. – 256 с. Sanjeev Karmakar and Manoj K. Kowar. A Comprehensive Lecture Notes on RSA-1024 Cryptography. – М.: LAP Lambert Academic Publishing, 2013. – 160 с. Ulya Sabeel and Nidhi Chandra. ADLS: Attack Detection & Localization Scheme in WSN. – М.: LAP Lambert Academic Publishing, 2014. – 68 с. Gerardine Mary. Simulation and Test-System of Vehicle Body CAN Bus - A Project Report. – М.: LAP Lambert Academic Publishing, 2014. – 76 с. Denver Abrey and Neco Ventura. Voice over IP Security. – М.: LAP Lambert Academic Publishing, 2010. – 72 с. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с. Irfan Hafeez and Wajahat Nosharwan. WiMAX Wi-Fi Integrated System QoS and Security. – М.: LAP Lambert Academic Publishing, 2011. – 76 с. Marimuthu Kanagaraj and Eswari Venkatachalam. Multifactor Authentication Protocol for a Secured WSN. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Omid Mahdi Ebadati E.,Harleen Kaur M. Afshar Alam and Kaebeh Yaeghoobi. Micro-Firewalls for Dynamic Network Security Framework. – М.: LAP Lambert Academic Publishing, 2012. – 292 с. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с. Babar Zulfiqar,Anil Ahmed and Rizwan Akhtar. Efficient Surveillance System Based on Cognitive Radio. – М.: LAP Lambert Academic Publishing, 2013. – 80 с. Shaffali Gupta and Sanmeet Kaur. A GUI Framework for detecting Intrusions using Bro IDS. – М.: LAP Lambert Academic Publishing, 2013. – 76 с. Siva S. Sivatha Sindhu,S. Geetha and S. Selvakumar. Network Intrusion Detection System using Machine Learning Techniques. – М.: LAP Lambert Academic Publishing, 2013. – 80 с. E.O. Ibidunmoye and B.K. Alese. Game-Theoretic Analysis of Network Attack-Defense Interactions. – М.: LAP Lambert Academic Publishing, 2013. – 108 с. Vincent Omollo. Enhanced Network Security. – М.: LAP Lambert Academic Publishing, 2013. – 76 с. Christian Chetachi Umunna. Distributed Intrusion Detection System in Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 104 с. Sharmin Rashid Linta and Md.Ridgewan Khan Neuton. Today’s Impact on Communication System by IP Spoofing. – М.: LAP Lambert Academic Publishing, 2012. – 72 с. Amel Chowdhury. Deployment of a Secure VoIP System. – М.: LAP Lambert Academic Publishing, 2014. – 68 с. Jabarweer Singh,Krishan Kumar and Gulshan Kumar. Intrusion detection using artificial intelligence based ensembles. – М.: LAP Lambert Academic Publishing, 2014. – 116 с. Govind Sreekar Shenoy. Architecture Support for Intrusion Detection systems. – М.: LAP Lambert Academic Publishing, 2014. – 160 с. Sabrina Ahmed,Supriyo Ahmed and Murtaza Motiwala. Automated Incident Detection In Surveillance Systems. – М.: LAP Lambert Academic Publishing, 2011. – 56 с. Deniz Akkaya and Fabien Thalgott. Honeypots in Network Security. – М.: LAP Lambert Academic Publishing, 2012. – 64 с. Mais Mohammed Hobi and Sarab Majeed Hameed. Biometrics for User Authentication Using Artificial Neural Networks. – М.: LAP Lambert Academic Publishing, 2013. – 108 с. Homam El-Taj and Omar Amer. Network Alert Management System For IDS False Positive Reduction. – М.: LAP Lambert Academic Publishing, 2013. – 156 с. Md. Rabiul Islam and M. Abdul Goffar Khan. Retina Recognition: Secure Biometric Authentication System. – М.: LAP Lambert Academic Publishing, 2012. – 72 с. Yasser Alshehri. Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 156 с. Maria Mushtaq,Hamid Turab Mirza and Adnan Ahmad. Developing Trust in Ride Sharing System. – М.: LAP Lambert Academic Publishing, 2015. – 144 с. Danish Jamil. Designing and Evaluating the honeypots using virtual machine. – М.: LAP Lambert Academic Publishing, 2012. – 164 с. Affan Yasin,Hafiz Adnan Shafiq and Muhammad Ijlal Hasnain. Software Architecture for Centralized Health Database. – М.: LAP Lambert Academic Publishing, 2013. – 64 с. Hanane Houmani. Security Protocols Analysis. – М.: LAP Lambert Academic Publishing, 2012. – 288 с. Firas Abdullah Thweny Al-Saedi and Mazin Mohammed Radhi Al-Haidary. Design and implementation of Linux based VSAT monitoring system. – М.: LAP Lambert Academic Publishing, 2013. – 100 с. Dirk Lessner. Network Security for Embedded Systems. – М.: LAP Lambert Academic Publishing, 2009. – 232 с. Stephen Murove,S. B. Mangena and B. Jones. Firewall Evaluation:Models for Major Decisions in Computer Security. – М.: LAP Lambert Academic Publishing, 2014. – 236 с. Azadeh Sarkheyli,Norafida binti Ithnin and Arezoo Sarkheyli. Dynamic Risk Management Approach Using Immune System. – М.: LAP Lambert Academic Publishing, 2013. – 56 с. Aftab Yaseen,S. M. Zakariya and M. Q. Rafiq. Association Rules Mining for AIS based Classification. – М.: LAP Lambert Academic Publishing, 2013. – 100 с. inayat ullah khan and Syed Majid Ali Shah Bukhari. SWOT Analysis of IP Multimedia Sub System Security Authentication. – М.: LAP Lambert Academic Publishing, 2010. – 52 с. Radu Mardare. Logical Analysis of Complex Concurrent Systems. – М.: LAP Lambert Academic Publishing, 2010. – 244 с. Joao Antunes. Network Attack Injection. – М.: Scholars' Press, 2013. – 268 с. Nirmalya Kar,Ashim Saha and Mrinal Kanti Debbarma. Biometric Based Attendance System. – М.: LAP Lambert Academic Publishing, 2012. – 64 с. Faeiz Alserhani,Irfan Awan and Monis Akhlaq. Correlation and Aggregation of Security Alerts in Networks. – М.: LAP Lambert Academic Publishing, 2012. – 256 с. Haneen Qarabash. An Intranet Based System For Securities Trading. – М.: LAP Lambert Academic Publishing, 2013. – 84 с. Amarnath Surendranath and Saranya Chinnusamy. Evaluation of Sustainability in Agro Ecological Systems of Tamil Nadu. – М.: LAP Lambert Academic Publishing, 2014. – 140 с. Alaa Al-Deen Mohammed Hassan. Information Security Management. – М.: LAP Lambert Academic Publishing, 2013. – 188 с. Nisha Tamta and Ashwini Arya. Modelling of Facts Controllers in Power System Networks. – М.: LAP Lambert Academic Publishing, 2012. – 96 с. Nureddin Abulgasem,Dzulkifli Mohamad and Siti Zaiton Hashim. Libyan vehicle license plate detection and recognition using RBF. – М.: LAP Lambert Academic Publishing, 2013. – 140 с. Дополнительные результаты Maryann P. Feldman, Nadine Massard. Institutions and Systems in the Geography of Innovation (Economics of Science, Technology and Innovation, Vol 25). – М.: , 0. – 0 с. Bhaskar Dutta, Matthew O. Jackson. Networks and Groups. – М.: , 0. – 0 с. Risk Management, Speculation, and Derivative Securities. – М.: , 0. – 0 с. Gerald Kovacich. The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition. – М.: , 0. – 0 с. Stephen F. Bush, Amit B. Kulkarni. Active Networks and Active Network Management: A Proactive Management Framework (Advances in Experimental Medicine & Biology). – М.: , 0. – 0 с. Ricardo Sal Zebulum, Marco Aurelio Pacheco, Marley Maria B.R. Vellasco, Marley Maria Bernard Vellasco. Evolutionary Electronics: Automatic Design of Electronic Circuits and Systems by Genetic Algorithms. – М.: , 0. – 0 с. Lori Ann Thrupp. Cultivating Diversity: Agrobiodiversity and Food Security. – М.: , 0. – 0 с. Risk Analysis and the Security Survey. – М.: , 0. – 0 с. Mark S. Daskin, Mark S. Daskin. Network and Discrete Location: Models, Algorithms, and Applications. – М.: , 0. – 0 с. Lawrence Bernstein, C. M. Yuhas. Basic Concepts for Managing Telecommunications Networks: Copper to Sand to Glass to Air (Kluwer Academic/Plenum Publishers Network and Systems Manage). – М.: , 0. – 0 с. Jose Nazario, Nazario. Defense and Detection Strategies against Internet Worms. – М.: , 0. – 0 с. Ifip Tc6, Tc11 Joint Working Conference on Communications and Multimedi, Tomaz Klobucar. Advanced Communications and Multimedia Security: Ifip Tc6/Tc11 Sixth Joint Working Conference on Communications and Multimedia Security, September 26-27, 2002, Portoroz, Slovenia (International Federation for Information Processing, 100). – М.: , 0. – 0 с. Community Operational Research : OR and Systems Thinking for Community Development (Contemporary Systems Thinking). – М.: , 2004. – 0 с. Thomas C. Glaessner. Electronic Safety and Soundness: Securing Finance in a New Age (World Bank Working Papers). – М.: , 2004. – 0 с. Pradeep Kumar Ray. Integrated Management from E-Business Perspective: Concepts, Architectures and Methodologies (Network and Systems Management). – М.: , 2003. – 0 с. Multinational Enterprises, Innovative Strategies and Systems of Innovation (New Horizons in International Business Series). – М.: , 2004. – 0 с. Martin Kilduff. Social Networks and Organizations. – М.: , 2003. – 0 с. Giovanni Giambene. Queuing Theory and Telecommunications : Networks and Applications. – М.: , 2005. – 0 с. Akhil Sahai. Web Services in the Enterprise : Concepts, Standards, Solutions, and Management (Network and Systems Management). – М.: , 2005. – 0 с. Enhancing Inter-Firm Networks and Interorganizational Strategies (Research in Management Consulting, Vol. 3) (Research in Management Consulting, V. 3). – М.: , 2003. – 262 с. Helen Nesadurai. Globalisation and Economic Security in East Asia: Governance and Institutions. – М.: , 2005. – 256 с. Stochastic Processes, Optimization, and Control Theory: Applications in Financial Engineering, Queueing Networks, and Manufacturing Systems/ A Volume in ... in Operations Research. – М.: , 2006. – 358 с. Edward Halibozek, Gerald L. Kovacich. Mergers and Acquisitions Security: Corporate Restructuring and Security Management. – М.: , 2005. – 272 с. Clifford W. Eischen, Lynn A. Eischen. Resumes, Cover-Letters, Networking, and Interviewing. – М.: , 2006. – 120 с. Spatial Dynamics, Networks And Modelling (New Horizons in Regional Science Series). – М.: , 2006. – 528 с. Bernard P. Wong. The Chinese in Silicon Valley: Globalization, Social Networks, and Ethnic Identity (Pacific Formations). – М.: , 2005. – 288 с. Nandish V. Patel. Organization and Systems Design: Theory of Deferred Action. – М.: , 2006. – 288 с. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с. Ronald H. Bowman. Business Continuity Planning for Data Centers and Systems: A Strategic Implementation Guide. – М.: , 2008. – 206 с. James Michael Stewart, Ed Tittel, Mike Chapple. CISSP: Certified Information Systems Security Professional Study Guide. – М.: , 2008. – 841 с. Environmental Change and Human Security: Recognizing and Acting on Hazard Impacts (NATO Science for Peace and Security Series C: Environmental Security). – М.: , 2008. – 480 с. Ibp Usa. Cuba Army Defense Policy and National Security Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Connectivity and Knowledge Management in Virtual Organizations: Networking and Developing Interactive Communications (Premier Reference Source). – М.: , 2008. – 450 с. Ronald Hall. Biometrics 100 Most asked Questions on Physiological (face, fingerprint, hand, iris, DNA) and Behavioral (keystroke, signature, voice) Biometrics Technologies, ... Implementation and Performance evaluation. – М.: , 2008. – 176 с. Bel G. Raggad. Information Security Management: Concepts and Practice. – М.: , 2010. – 871 с. William P Crowell. Physical and Logical Security Convergence: Powered By Enterprise Security Management. – М.: , 2010. – 592 с. Geoffrey Poitras. Risk Management, Speculation, and Derivative Securities. – М.: , 2010. – 601 с. Charles E. Thomas. Process Technology Equipment and Systems. – М.: , 2010. – 480 с. Robert W. Sandstrom, Helene Lohman, James D. Bramble. Health Services: Policy and Systems for Therapists (2nd Edition). – М.: , 2008. – 336 с. N. Sundararajan. A Practical Approach to Signals and Systems. – М.: , 2008. – 400 с. Frederick Marcus. Bioinformatics and Systems Biology: Collaborative Research and Resources. – М.: , 2008. – 288 с. Beaufort B. Longest, Kurt Darr. Managing Health Services Organizations and Systems. – М.: , 2008. – 664 с. Christin Maria Hainbuchner. Technology Acceptance of Complex Products and Systems: The Case of Terrestrial Trunked Radio (TETRA). – М.: , 2008. – 264 с. Handbook of Information and Communication Security. – М.: , 2010. – 800 с. Stamatios V. Kartalopoulos. Understanding Neural Networks and Fuzzy Logic. – М.: , 1995. – 232 с. Barry Kauler. Windows Assembly Language and Systems Programming. – М.: , 2010. – 419 с. Russell Colling. Hospital and Healthcare Security. – М.: , 2010. – 720 с. Heinz Durr. Photochromism: Molecules and Systems. – М.: , 2010. – 1218 с. Anthony Kelly. Maintenance Organization and Systems. – М.: , 2010. – 320 с. Omid Omidvar. Neural Networks and Pattern Recognition. – М.: , 2010. – 351 с. John R. Vacca. Network and System Security. – М.: , 2010. – 408 с. Philip Purpura. Terrorism and Homeland Security. – М.: , 2010. – 512 с. Gerald L. Kovacich. The Information Systems Security Officer's Guide. – М.: , 2010. – 361 с. Vadim A. Davankov. Hypercrosslinked Polymeric Networks and Adsorbing Materials ,56. – М.: , 2010. – 712 с. Owen Bishop. Electronics - Circuits and Systems. – М.: , 2010. – 0 с. Gianfranco Pistoia. Battery Operated Devices and Systems. – М.: , 2010. – 408 с. John Buford. P2P Networking and Applications. – М.: , 2010. – 408 с. Duc T. Pham. Intelligent Production Machines and Systems - First I*PROMS Virtual Conference. – М.: , 2010. – 592 с. Robert H. Kingston. Optical Sources, Detectors, and Systems. – М.: , 2010. – 198 с. Luis Chaparro. Signals and Systems Online Testing Registration Card. – М.: , 2010. – 0 с. Luis F. Chaparro. Signals and Systems Using MATLAB. – М.: Elsevier, 2011. – 768 с. J. Ricard. Emergent Collective Properties, Networks and Information in Biology,40. – М.: , 2010. – 296 с. Fred Eady. Networking and Internetworking with Microcontrollers. – М.: , 2010. – 512 с. Didier J. Dubois. Fuzzy Sets and Systems. – М.: , 2010. – 393 с. John R. Vacca. Computer and Information Security Handbook. – М.: , 2010. – 928 с. Jan Bergstra. Handbook of Network and System Administration. – М.: , 2010. – 1028 с. Owen Bishop. Electronics - Circuits and Systems. – М.: , 2010. – 384 с. Robert Thornton. Unimagined Community – Sex, Networks and AIDS in Uganda and South Africa. – М.: , 2008. – 304 с. Robert J Thornton. Unimagined Community – Sex, Networks,and AIDS in Uganda and South Africa. – М.: , 2008. – 304 с. Jeff Trinkle. Robotics – Science and Systems V. – М.: , 2010. – 500 с. Peter A Diamond. Taxation, Incomplete Markets and Social Security. – М.: , 2005. – 216 с. Erica Jong. Infrared Detectors and Systems. – М.: , 2004. – 336 с. Janes. Scholars? Guide to Washington, D.C., for Peace and International Security Studies. – М.: , 1995. – 0 с. Janes. Scholars? Guide to Washington, D.C., for Peace and International Security Studies. – М.: , 1995. – 0 с. Magnus Enquist. Neural Networks and Animal Behavior. – М.: , 2005. – 256 с. Sanjay Mathur. Nanostructured Materials and Systems. – М.: , 2010. – 168 с. Bernard Finn. Communications Under The Seas – The Evolving Cable Network and its Implications. – М.: , 2009. – 360 с. Stephen C. Payne. Novell?s Guide to Storage Area Networks and Novell® Cluster ServicesTM. – М.: , 2001. – 864 с. Prof Franco Taroni. Bayesian Networks and Probabilistic Inference in Forensic Science. – М.: , 2006. – 372 с. Andrew T Price–smith. Contagion and Chaos – Disease, Ecology and National Security in the Era of Globalization. – М.: , 2009. – 296 с. Gaurav S Sukhatme. Robotics – Science and Systems II. – М.: , 2007. – 600 с. Stephen Kern. A Cultural History of Causality – Science, Murder Novels and Systems of Thought. – М.: , 2006. – 448 с. Steven Brams. Game Theory and National Security. – М.: , 1972. – 0 с. Vishaal B. Bhuyan. Reverse Mortgages and Linked Securities. – М.: , 2010. – 188 с. RJ SMITH. Smith ?circuits? Devices And Systems – A First Cou Rse In Electrical Engineering 3ed. – М.: , 1976. – 768 с. Bruce Potter. Mastering FreeBSD and OpenBSD Security. – М.: , 2005. – 462 с. Bruce Potter. Mastering FreeBSD and OpenBSD Security. – М.: , 1972. – 0 с. Bruce Potter. Mastering FreeBSD and OpenBSD Security. – М.: , 1981. – 382 с. Bruce Potter. Mastering FreeBSD and OpenBSD Security. – М.: , 1987. – 28 с. Bruce Potter. Mastering FreeBSD and OpenBSD Security. – М.: , 1987. – 100 с. E. J. Mastascusa. Computer–Assisted Network and System Analysis. – М.: , 1988. – 308 с. Irv Englander. The Architecture of Computer Hardware and Systems Software. – М.: , 2000. – 784 с. Richard Koch. Superconnect – Harnessing the Power of Networks and the Strength of Weak Links. – М.: , 2010. – 0 с. RS SCHWARTZ. Schwartz Progress In Allergy – ?immunology? Of Ane Rgy And Systemic Lupus Erythematosus. – М.: , 1984. – 184 с. Stephen T. Welstead. Neural Network and Fuzzy Logic Applications in C/C++. – М.: , 1994. – 0 с. Stephen T. Welstead. Neural Network and Fuzzy Logic Applications in C/C++. – М.: , 1994. – 494 с. Stephen T. Welstead. Neural Network and Fuzzy Logic Applications in C/C++. – М.: , 1994. – 494 с. Deborah M Gordon. Ant Encounters – Interaction Networks and Colony Behaviour. – М.: , 2010. – 152 с. Simon Haykin. Signals and Systems. – М.: , 2002. – 820 с. Nikola Kasabov. Foundations of Neural Networks, Fuzzy Systems & Knowledge Engineering. – М.: , 1996. – 568 с. Ralph J. Smith. Circuits, Devices and Systems. – М.: , 1984. – 752 с. Microsoft Official Academic Course. 70–299 Implementing and Administering Security in a Microsoft® Windows ServerTM 2003 Network Package. – М.: , 2005. – 836 с. Children?s Social Networks and Social Supports. – М.: , 1989. – 384 с. Philip W Porter. Challenging Nature – Local Knowledge, Agroscience, and Food Security in Tanga region, Tanzania. – М.: , 2006. – 288 с. Jiannong Cao. Mobile Agents in Networking and Distributed Computing. – М.: , 2012. – 450 с. Microsoft. Microsoft .Net Framework 1.1 Class Library Reference 7: System.Windows.Forms System Drawing and System.Component Model. – М.: , 2003. – 3760 с. Microsoft. Microsoft .NET Framework 1.1 Class Library Reference Volume 6: System.Xml and System.Data. – М.: , 2003. – 2576 с. JS QUARTERMAN. Quarterman: The ?matrix?: Computer Networks & Conferencing Systems Worldwid (pr Only). – М.: , 1989. – 752 с. Globalization, Development and Human Security. – М.: , 2006. – 240 с. Matthew Strebe. MCSA/MCSE Self–Paced Training Kit (Exam 70–214) – Implemanting and Administering Security in a Microsoft Windows 2000 Network. – М.: , 2003. – 704 с. Gerald D. Cole. Computer Networking for Systems Programmers. – М.: , 1990. – 242 с. Terry Collings. Red Hat® Linux® Networking and System Administration. – М.: , 2004. – 1008 с. Akhil Sahai, Sven Graupner. Web Services in the Enterprise: Concepts, Standards, Solutions, and Management (Network and Systems Management). – М.: , 2011. – 312 с. James E. Goldman. Network and E–Commerce Security. – М.: , 1975. – 768 с. The Complete Book Of Home, Site And Office Security. – М.: , 2011. – 309 с. Prof Lucy Lynn Maliwichi,Prof Peter BIkam and Dovhani Johannes Mulaudzi. Energy Needs and Food Security in Mutale Municipality, South Africa. – М.: LAP Lambert Academic Publishing, 2011. – 76 с. Wrastawa Ridwan. Dissipative Networked Control Systems. – М.: LAP Lambert Academic Publishing, 2012. – 96 с. Amir Rajaee. Cognitive Radio Networks And System Optimization. – М.: LAP Lambert Academic Publishing, 2013. – 132 с. Alphan Ulusoy,Ozgur Gurbuz and Ahmet Onat. Cooperative Wireless Model Based Predictive Networked Control Systems. – М.: LAP Lambert Academic Publishing, 2010. – 92 с. Mehmet Emrah Parlakay and Ahmet Onat. Model Based Predictive Networked Control Systems. – М.: LAP Lambert Academic Publishing, 2010. – 60 с. Elias Wahab. Social And Economic Security of the Elderly in Nigeria. – М.: LAP Lambert Academic Publishing, 2012. – 232 с. David Kaawa-Mafigiri. Social Networks and Social Support for Tuberculosis Control in Uganda. – М.: LAP Lambert Academic Publishing, 2011. – 244 с. Ishrat Fatima,Badar Naseem Siddiqui and Kanwal Naeem. Rural Youth and Food Security. – М.: LAP Lambert Academic Publishing, 2014. – 112 с. Tawheed Reza Noor. Seed Systems and Seed Security of Rice Plantation. – М.: LAP Lambert Academic Publishing, 2015. – 116 с. Abdelaziz Hamad Elawad,Bahrom Sanugi and Shahariddin Salleh. Neural network and scheduling. – М.: LAP Lambert Academic Publishing, 2011. – 160 с. Hussein M. Khattab,Almoataz Y. Abdelaziz and Said F. Mekhamer. Innovative Approaches for Power System Security Assessment. – М.: LAP Lambert Academic Publishing, 2013. – 224 с. Faiz Rasool and Sing Kiong Nguang. Networked Control Systems. – М.: LAP Lambert Academic Publishing, 2014. – 96 с. Anju Lis Kurian and C. Vinodan. Regional Integration and Energy Security:The European Union Experience. – М.: LAP Lambert Academic Publishing, 2014. – 268 с. Vyacheslav Abramov. Queueing systems, networks and telecommunication systems. – М.: LAP Lambert Academic Publishing, 2010. – 164 с. Ankur Gupta and Bhupendra Gupta. Random Networks and its Applications. – М.: LAP Lambert Academic Publishing, 2013. – 100 с. Elsayed M. Elsayed and Hamdy A. El-Metwally. Qualitative Studies of Scalars and Systems of Difference Equations. – М.: LAP Lambert Academic Publishing, 2012. – 208 с. Nateq Be-Nazir Ibn Minar. Bluetooth Networking and its Security Architecture. – М.: LAP Lambert Academic Publishing, 2012. – 84 с. Garima Verma. Implementation of Authentication and Transaction Security. – М.: LAP Lambert Academic Publishing, 2013. – 60 с. Rezaul Hoque. Scalable Network Tomography System. – М.: LAP Lambert Academic Publishing, 2011. – 80 с. Wei Ren. Lightweight and Robust Security for Applications in Internet of Things. – М.: LAP Lambert Academic Publishing, 2013. – 188 с. Emenike Ahiabuike. Power Management: Using Observer Network Management System. – М.: LAP Lambert Academic Publishing, 2014. – 64 с. Saeed Soltanmohammadi. Improving Information System Security by Evaluating Human Factors. – М.: LAP Lambert Academic Publishing, 2014. – 116 с. Kareem Bahlol Afan,Afnan Hussein Hayat and Omar Akram Ahmed. Design And Implement Network Management System. – М.: LAP Lambert Academic Publishing, 2015. – 52 с. Jun Zheng,Jiantao Gu and Hong Wang. Financial Management and Information Security of Independent Colleges. – М.: LAP Lambert Academic Publishing, 2014. – 256 с. Sanjay Srivastava. Alleviating Rural Poverty and Food Security in Changing Climate. – М.: LAP Lambert Academic Publishing, 2010. – 96 с. Лучшие результаты Ничего не найдено Дополнительные результаты Наука человековедения. интервью с Д. Уолтоном, профессором London Metropolitan University, экспертом CIPD. Chartered Institute of Personnel and Development, автором программы Master of Arts in Human Resource Strategies. И. Смирнова, "Кадровый менеджмент", № 5, июль-август 2007. Специализированный модуль FS-CD. Collections and Disbursements - "Сборы и Выплаты" и его возможности. О.А. Глущенко, "Финансовый менеджмент в страховой компании", № 2, II квартал 2007. Бюджетирование страховой компании на базе Oracle Enterprise Planning and Budgeting. Д.В. Лесоводский, "Финансовый менеджмент в страховой компании", № 3, III квартал 2006. Банковское отделение будущего. интервью с Камероном МакКворри. Cameron MacQuarrie, менеджером по развитию бизнеса компании Cisco Systems в области корпоративных финансов в регионе EMEA. Европа, Ближний Восток, Африка. Н.Ф. Колюшенко, "Расчеты и операционная работа в коммерческом банке", № 2, февраль 2006. Ловушка для пирата. интервью с И. Слабых, руководителем отдела противодействия интеллектуальному пиратству в России и СНГ Adobe Systems. И. Голова, "Расчет", N 9, сентябрь 2012 г. Регулирование операций торгового финансирования: новые инициативы. интервью с Д. Шмандом, вице-председателем Банковской комиссии ICC по supply chain finance, главой подразделения Trade Finance and Cash Management Corporates EMEA в Global Transaction Banking. GTB division Deutsche Bank. Н. Макарова, "Международные банковские операции", N 2, апрель-июнь 2012 г. Ужин в темноте в стиле Малевича и Новый год в Хаммере". Что может выть лучше?". интервью с Н. Саниной, индивидуальным предпринимателем и креативным директором компании "San and stars". М. Сипатова, "Арсенал предпринимателя", N 12, декабрь 2011 г. На пути к новому стандарту в торговом финансировании. интервью с А. Кастерманом, руководителем Trade and Supply Chain, SWIFT, сопредседателем рабочей группы ICC-BPO. Э. Шакирова, "Международные банковские операции", N 4, октябрь-декабрь 2011 г. Уильям Савадж: Мотивировать людей в Нижнем Новгороде и Новосибирске нужно по-разному". интервью с У. Саваджем, вице-президентом корпорации Intel, подразделение Software and Services Group. М. Холкина, "Управление персоналом", N 14, июль 2010 г. Цены под контролем: the present and the future. С. Стройкова, И. Леметюйнен, "Консультант", № 19, сентябрь 2009. Основной арсенал "охотника" - его network: кого он знает на рынке и качество этих отношений. С. Плетнева, "Управление персоналом", № 12, июнь 2009. Я воспринимаю персонального помощника как напарника червяк должен нравиться рыбке, а не рыбаку. интервью с П.А. Черкашиным, руководителем российского представительства компании Adobe Systems. "Управление персоналом", № 20, октябрь 2008. Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Екатерина, 05.06 Работу приняли,всё нормально!