Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Data Privacy Management and Autonomous Spontaneus Security: 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, ... Computer Science / Security and Cryptology). – М.: , 2012. – 334 с.
  2. Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  3. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с.
  4. Seymour Bosworth, Michel E. Kabay. Computer Security Handbook. – М.: , 0. – 0 с.
  5. Charles J. Austin, Stuart B. Boxerman. Information Systems for Healthcare Management, Sixth Edition. – М.: , 0. – 0 с.
  6. Timothy Braithwaite. Securing E-Business Systems: A Guide for Managers and Executives. – М.: , 0. – 0 с.
  7. Ray Ramon. Technology Solutions for Growing Businesses. – М.: , 0. – 0 с.
  8. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с.
  9. Jose Nazario, Nazario. Defense and Detection Strategies against Internet Worms. – М.: , 0. – 0 с.
  10. Andrew Sun. Using and Managing Ppp. – М.: , 0. – 0 с.
  11. Amjad Umar. E-Business and Distributed Systems Handbook: Management Module. – М.: , 0. – 0 с.
  12. James E. Goldman, Phillip T. Rawles, Julie R. Mariga. Client/Server Information Systems: A Business-Oriented Approach. – М.: , 0. – 0 с.
  13. Jesus Mena. Homeland Security Techniques and Technologies (Networking Series). – М.: , 0. – 0 с.
  14. Steve Litt. Samba Unleashed (Unleashed). – М.: , 0. – 0 с.
  15. Vesna Hassler. Security Fundamentals for E-Commerce (Artech House Computer Security Series). – М.: , 0. – 0 с.
  16. Ross Malaga. Information Systems Technology. – М.: , 0. – 0 с.
  17. Aspatore Books Staff. Inside the Minds: Security Matters - Industry Leaders from eBay, Inc., Motorola, Internet Security Systems & More on Protecting Your Most Valuable Assets. – М.: , 0. – 0 с.
  18. Thomas C. Glaessner. Electronic Safety and Soundness: Securing Finance in a New Age (World Bank Working Papers). – М.: , 2004. – 0 с.
  19. Geoffrey Elliott. Mobile Commerce and Wireless Computing Systems. – М.: , 2003. – 0 с.
  20. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с.
  21. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с.
  22. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с.
  23. Patrick Traynor, Patrick McDaniel, Thomas La Porta. Security for Telecommunications Networks (Advances in Information Security). – М.: , 2008. – 182 с.
  24. James Michael Stewart, Ed Tittel, Mike Chapple. CISSP: Certified Information Systems Security Professional Study Guide. – М.: , 2008. – 841 с.
  25. Crucible For Survival: Environmental Security and Justice in the Indian Ocean Region. – М.: , 2008. – 332 с.
  26. Fredrik Nilsson, Communications Axis. Intelligent Network Video: Understanding Modern Video Surveillance Systems. – М.: , 2008. – 440 с.
  27. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с.
  28. Handbook on Information Technology in Finance (International Handbooks on Information Systems). – М.: , 2008. – 800 с.
  29. Handbook of Information and Communication Security. – М.: , 2010. – 800 с.
  30. Paul Dyson, Andrew Longshaw. Architecting Enterprise Solutions. – М.: John Wiley and Sons, Ltd, 0. – 364 с.
  31. John R. Vacca. Network and System Security. – М.: , 2010. – 408 с.
  32. Tony Flick, Justin Morehouse. Securing the Smart Grid: Next Generation Power Grid Security. – М.: Рид Элсивер, 2011. – 320 с.
  33. Principles Of Computer Security, Comptia Security+ And Beyond, Second Edition. – М.: , 2011. – 0 с.
  34. Session Initiation Protocol (Sip): Controlling Convergent Networks. – М.: , 2011. – 264 с.
  35. John Watson, Roopesh Ramklass, Bob Bryla. OCA/OCP Oracle Database 11G: All-in-One Exam Guide (+ CD-ROM). – М.: Oracle Press, 2010. – 1072 с.
  36. Mike Meyers' Comptia Network+ Guide To Managing And Troubleshooting Networks Lab Manual, Second Edition. – М.: , 2011. – 352 с.
  37. Mac Os X System Administration. – М.: , 2011. – 528 с.
  38. Operating Systems Demystified. – М.: , 2011. – 400 с.
  39. David Endler, Mark Collier. Hacking Exposed VoIP: Voice Over Ip Security Secrets & Solutions. – М.: McGraw-Hill Osborne Media, 2006. – 574 с.
  40. Will Schmied, Thomas W. Shinder, Robert J. Shimonski, Tony Piltzecker. MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network. Study Guide and DVD Training System (Exam 70-214). – М.: Syngress, . – 822 с.
  41. Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky. Cisco Security Professional's Guide to Secure Intrusion Detection Systems. – М.: , . –  с.
  42. Ido Dubrawsky. CompTIA Security+ Certification Study Guide, Third Edition: Exam SYO-201 3E. – М.: , 2009. – 752 с.
  43. Eduardo Fernandez-Buglioni. Security Patterns in Practice: Designing Secure Architectures Using Software Patterns. – М.: Wiley, 2013. – 582 с.
  44. Muhammad Wasim and Abdulbasit Shaikh. Rasterstereography Based Partial Face Recognition. – М.: LAP Lambert Academic Publishing, 2014. – 64 с.
  45. Jaydeb Bhaumik and Satyajit Das. Substitution Permutation Network Type Block Cipher. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  46. Naveen Kolla,Nigusie Alamerie Melesse and Adnan Kedir Jarso. Smart-Puter Based Sectrol for Two-Wheeler. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  47. Shaek Rana Mohammad Baki Billah and Mohammad Hafizur Rahman. Design & Development of Network Security System using IP Tables. – М.: LAP Lambert Academic Publishing, 2013. – 164 с.
  48. Uwakwe Chukwu. Assessment of the Impact of V2G on Distribution System. – М.: LAP Lambert Academic Publishing, 2012. – 404 с.
  49. Musthak Ahmed Shaik,Shaik Abdul Gafoor and M. Raghavendra Rao. Busbar Protection. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.
  50. Oladimeji Tolulope. Design of remotely controlled Vehicle Anti-Theft via GSM Network. – М.: LAP Lambert Academic Publishing, 2014. – 60 с.
  51. Amal Punchihewa and Bhim Dulal. IPTV-Internet Protocol Television. – М.: LAP Lambert Academic Publishing, 2013. – 104 с.
  52. Jayendra Singh,Satvik Vats and Ankit Dagar. Control Area Network for Vehicle Security System. – М.: LAP Lambert Academic Publishing, 2013. – 88 с.
  53. Jai Parkash,Mr. Ashutosh Gupta and Dr. Pradeep Kumar Rana. SMS based Wireless Temperature monitoring. – М.: LAP Lambert Academic Publishing, 2010. – 100 с.
  54. Indu Sreedevi,Santanu Chaudhury and Asok Bhattacharyya. Smart Camera Networks. – М.: LAP Lambert Academic Publishing, 2012. – 156 с.
  55. Van Liem Nguyen. Power Systems Modeling and Control Coordination. – М.: LAP Lambert Academic Publishing, 2010. – 280 с.
  56. AbdolMajid Shahgholi,Dr. K. K. Shukla and Dr. Rajeev Srivastava. LARGE SCALE WIRELESS SENSOR NETWORK FOR TACTICAL MILITARY APPLICATIONS. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  57. Rashi Kohli and Manoj Kumar. Cryptographic on System-Chip-Design Using VLSI Technique. – М.: LAP Lambert Academic Publishing, 2013. – 92 с.
  58. Xiangqian Chen. DEFENSE AGAINST NODE COMPROMISE IN SENSOR NETWORK SECURITY. – М.: LAP Lambert Academic Publishing, 2009. – 108 с.
  59. James Gadze. Embedded Wireless Sensor Network for monitoring and control. – М.: LAP Lambert Academic Publishing, 2010. – 168 с.
  60. Rshdee Alhakim,Emmanuel Simeu and Kosai Raoof. Optimizing the performance of synchronization process. – М.: LAP Lambert Academic Publishing, 2013. – 284 с.
  61. Daniel Kwon and Venky Shankar. Vulnerability Analysis and Risk Assessment. – М.: Scholars' Press, 2014. – 324 с.
  62. Hakan Aydogan. Satellite Technologies and Global Security. – М.: LAP Lambert Academic Publishing, 2014. – 292 с.
  63. M. Sadiq Ali Khan and S. M. Aqil Burney. Recent Trends in Intrusion Detection System & Network Monitoring. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  64. Mohamed Zellagui and Abdelaziz Chaghi. Distance Protection for Electrical Transmission Line. – М.: LAP Lambert Academic Publishing, 2012. – 112 с.
  65. Hussein M. Khattab,Almoataz Y. Abdelaziz and Said F. Mekhamer. Innovative Approaches for Power System Security Assessment. – М.: LAP Lambert Academic Publishing, 2013. – 224 с.
  66. Ayyaswamy Kathirvel,Srinivasan Rengaramanujam and Mohanambal Kathirvel. Prevention of attacks usign umpiring security model for manets. – М.: LAP Lambert Academic Publishing, 2012. – 192 с.
  67. Shahnawaz Husain,S. C. Gupta and R. C. Joshi. Intrusion Detection Engine for Adhoc Environment. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  68. Hattab Guesmi. High performance IP networks. – М.: LAP Lambert Academic Publishing, 2013. – 104 с.
  69. Sumaya Saad Sulaiman and Sarab M. Hameed. A Fuzzy Based Clustering for Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  70. Shubha Puthran and Ketan Shah. Intrusion Detection System using datamining techniques. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  71. Younus Javed and Hassan Tahir. Optimized Security Protocol for Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  72. Jiantao Gu,Jun Zheng and Jixun Song. WLAN Monitoring and Management System. – М.: LAP Lambert Academic Publishing, 2012. – 196 с.
  73. Hamid Reza Barzegar,Mahdiyeh Barzegar and Neshat Alidad. Energy Efficient And Secured Communication For Manets In Military. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  74. Yogesh Kumar,Krishan Kumar and Gulshan Kumar. Feature Selection For Intrusion Detection Systems. – М.: LAP Lambert Academic Publishing, 2014. – 100 с.
  75. Sourav Kanti Addya and Ashok Kumar Turuk. Key Pre-distribution in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  76. Rupa Ch. and Avadhani P. S. Modern Security Methods in Applied Computer Science. – М.: Scholars' Press, 2014. – 124 с.
  77. Ming-Chin Chuang. Authentication and Mobility Management Mechanisms in VANETs. – М.: Scholars' Press, 2014. – 96 с.
  78. D. N. Sujatha and K. R. Venugopal. Performance Evaluation of Video-on-Demand System. – М.: LAP Lambert Academic Publishing, 2014. – 208 с.
  79. Lane Thames. Advancing Cyber Security. – М.: LAP Lambert Academic Publishing, 2013. – 256 с.
  80. Sanjeev Karmakar and Manoj K. Kowar. A Comprehensive Lecture Notes on RSA-1024 Cryptography. – М.: LAP Lambert Academic Publishing, 2013. – 160 с.
  81. Ulya Sabeel and Nidhi Chandra. ADLS: Attack Detection & Localization Scheme in WSN. – М.: LAP Lambert Academic Publishing, 2014. – 68 с.
  82. Gerardine Mary. Simulation and Test-System of Vehicle Body CAN Bus - A Project Report. – М.: LAP Lambert Academic Publishing, 2014. – 76 с.
  83. Denver Abrey and Neco Ventura. Voice over IP Security. – М.: LAP Lambert Academic Publishing, 2010. – 72 с.
  84. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  85. Irfan Hafeez and Wajahat Nosharwan. WiMAX Wi-Fi Integrated System QoS and Security. – М.: LAP Lambert Academic Publishing, 2011. – 76 с.
  86. Marimuthu Kanagaraj and Eswari Venkatachalam. Multifactor Authentication Protocol for a Secured WSN. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  87. Omid Mahdi Ebadati E.,Harleen Kaur M. Afshar Alam and Kaebeh Yaeghoobi. Micro-Firewalls for Dynamic Network Security Framework. – М.: LAP Lambert Academic Publishing, 2012. – 292 с.
  88. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  89. Babar Zulfiqar,Anil Ahmed and Rizwan Akhtar. Efficient Surveillance System Based on Cognitive Radio. – М.: LAP Lambert Academic Publishing, 2013. – 80 с.
  90. Shaffali Gupta and Sanmeet Kaur. A GUI Framework for detecting Intrusions using Bro IDS. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  91. Siva S. Sivatha Sindhu,S. Geetha and S. Selvakumar. Network Intrusion Detection System using Machine Learning Techniques. – М.: LAP Lambert Academic Publishing, 2013. – 80 с.
  92. E.O. Ibidunmoye and B.K. Alese. Game-Theoretic Analysis of Network Attack-Defense Interactions. – М.: LAP Lambert Academic Publishing, 2013. – 108 с.
  93. Vincent Omollo. Enhanced Network Security. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  94. Christian Chetachi Umunna. Distributed Intrusion Detection System in Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 104 с.
  95. Sharmin Rashid Linta and Md.Ridgewan Khan Neuton. Today’s Impact on Communication System by IP Spoofing. – М.: LAP Lambert Academic Publishing, 2012. – 72 с.
  96. Amel Chowdhury. Deployment of a Secure VoIP System. – М.: LAP Lambert Academic Publishing, 2014. – 68 с.
  97. Jabarweer Singh,Krishan Kumar and Gulshan Kumar. Intrusion detection using artificial intelligence based ensembles. – М.: LAP Lambert Academic Publishing, 2014. – 116 с.
  98. Govind Sreekar Shenoy. Architecture Support for Intrusion Detection systems. – М.: LAP Lambert Academic Publishing, 2014. – 160 с.
  99. Sabrina Ahmed,Supriyo Ahmed and Murtaza Motiwala. Automated Incident Detection In Surveillance Systems. – М.: LAP Lambert Academic Publishing, 2011. – 56 с.
  100. Deniz Akkaya and Fabien Thalgott. Honeypots in Network Security. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  101. Mais Mohammed Hobi and Sarab Majeed Hameed. Biometrics for User Authentication Using Artificial Neural Networks. – М.: LAP Lambert Academic Publishing, 2013. – 108 с.
  102. Homam El-Taj and Omar Amer. Network Alert Management System For IDS False Positive Reduction. – М.: LAP Lambert Academic Publishing, 2013. – 156 с.
  103. Md. Rabiul Islam and M. Abdul Goffar Khan. Retina Recognition: Secure Biometric Authentication System. – М.: LAP Lambert Academic Publishing, 2012. – 72 с.
  104. Yasser Alshehri. Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 156 с.
  105. Maria Mushtaq,Hamid Turab Mirza and Adnan Ahmad. Developing Trust in Ride Sharing System. – М.: LAP Lambert Academic Publishing, 2015. – 144 с.
  106. Danish Jamil. Designing and Evaluating the honeypots using virtual machine. – М.: LAP Lambert Academic Publishing, 2012. – 164 с.
  107. Affan Yasin,Hafiz Adnan Shafiq and Muhammad Ijlal Hasnain. Software Architecture for Centralized Health Database. – М.: LAP Lambert Academic Publishing, 2013. – 64 с.
  108. Hanane Houmani. Security Protocols Analysis. – М.: LAP Lambert Academic Publishing, 2012. – 288 с.
  109. Firas Abdullah Thweny Al-Saedi and Mazin Mohammed Radhi Al-Haidary. Design and implementation of Linux based VSAT monitoring system. – М.: LAP Lambert Academic Publishing, 2013. – 100 с.
  110. Dirk Lessner. Network Security for Embedded Systems. – М.: LAP Lambert Academic Publishing, 2009. – 232 с.
  111. Stephen Murove,S. B. Mangena and B. Jones. Firewall Evaluation:Models for Major Decisions in Computer Security. – М.: LAP Lambert Academic Publishing, 2014. – 236 с.
  112. Azadeh Sarkheyli,Norafida binti Ithnin and Arezoo Sarkheyli. Dynamic Risk Management Approach Using Immune System. – М.: LAP Lambert Academic Publishing, 2013. – 56 с.
  113. Aftab Yaseen,S. M. Zakariya and M. Q. Rafiq. Association Rules Mining for AIS based Classification. – М.: LAP Lambert Academic Publishing, 2013. – 100 с.
  114. inayat ullah khan and Syed Majid Ali Shah Bukhari. SWOT Analysis of IP Multimedia Sub System Security Authentication. – М.: LAP Lambert Academic Publishing, 2010. – 52 с.
  115. Radu Mardare. Logical Analysis of Complex Concurrent Systems. – М.: LAP Lambert Academic Publishing, 2010. – 244 с.
  116. Joao Antunes. Network Attack Injection. – М.: Scholars' Press, 2013. – 268 с.
  117. Nirmalya Kar,Ashim Saha and Mrinal Kanti Debbarma. Biometric Based Attendance System. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  118. Faeiz Alserhani,Irfan Awan and Monis Akhlaq. Correlation and Aggregation of Security Alerts in Networks. – М.: LAP Lambert Academic Publishing, 2012. – 256 с.
  119. Haneen Qarabash. An Intranet Based System For Securities Trading. – М.: LAP Lambert Academic Publishing, 2013. – 84 с.
  120. Amarnath Surendranath and Saranya Chinnusamy. Evaluation of Sustainability in Agro Ecological Systems of Tamil Nadu. – М.: LAP Lambert Academic Publishing, 2014. – 140 с.
  121. Alaa Al-Deen Mohammed Hassan. Information Security Management. – М.: LAP Lambert Academic Publishing, 2013. – 188 с.
  122. Nisha Tamta and Ashwini Arya. Modelling of Facts Controllers in Power System Networks. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  123. Nureddin Abulgasem,Dzulkifli Mohamad and Siti Zaiton Hashim. Libyan vehicle license plate detection and recognition using RBF. – М.: LAP Lambert Academic Publishing, 2013. – 140 с.

Дополнительные результаты

  1. Maryann P. Feldman, Nadine Massard. Institutions and Systems in the Geography of Innovation (Economics of Science, Technology and Innovation, Vol 25). – М.: , 0. – 0 с.
  2. Bhaskar Dutta, Matthew O. Jackson. Networks and Groups. – М.: , 0. – 0 с.
  3. Risk Management, Speculation, and Derivative Securities. – М.: , 0. – 0 с.
  4. Gerald Kovacich. The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition. – М.: , 0. – 0 с.
  5. Stephen F. Bush, Amit B. Kulkarni. Active Networks and Active Network Management: A Proactive Management Framework (Advances in Experimental Medicine & Biology). – М.: , 0. – 0 с.
  6. Ricardo Sal Zebulum, Marco Aurelio Pacheco, Marley Maria B.R. Vellasco, Marley Maria Bernard Vellasco. Evolutionary Electronics: Automatic Design of Electronic Circuits and Systems by Genetic Algorithms. – М.: , 0. – 0 с.
  7. Lori Ann Thrupp. Cultivating Diversity: Agrobiodiversity and Food Security. – М.: , 0. – 0 с.
  8. Risk Analysis and the Security Survey. – М.: , 0. – 0 с.
  9. Mark S. Daskin, Mark S. Daskin. Network and Discrete Location: Models, Algorithms, and Applications. – М.: , 0. – 0 с.
  10. Lawrence Bernstein, C. M. Yuhas. Basic Concepts for Managing Telecommunications Networks: Copper to Sand to Glass to Air (Kluwer Academic/Plenum Publishers Network and Systems Manage). – М.: , 0. – 0 с.
  11. Jose Nazario, Nazario. Defense and Detection Strategies against Internet Worms. – М.: , 0. – 0 с.
  12. Ifip Tc6, Tc11 Joint Working Conference on Communications and Multimedi, Tomaz Klobucar. Advanced Communications and Multimedia Security: Ifip Tc6/Tc11 Sixth Joint Working Conference on Communications and Multimedia Security, September 26-27, 2002, Portoroz, Slovenia (International Federation for Information Processing, 100). – М.: , 0. – 0 с.
  13. Community Operational Research : OR and Systems Thinking for Community Development (Contemporary Systems Thinking). – М.: , 2004. – 0 с.
  14. Thomas C. Glaessner. Electronic Safety and Soundness: Securing Finance in a New Age (World Bank Working Papers). – М.: , 2004. – 0 с.
  15. Pradeep Kumar Ray. Integrated Management from E-Business Perspective: Concepts, Architectures and Methodologies (Network and Systems Management). – М.: , 2003. – 0 с.
  16. Multinational Enterprises, Innovative Strategies and Systems of Innovation (New Horizons in International Business Series). – М.: , 2004. – 0 с.
  17. Martin Kilduff. Social Networks and Organizations. – М.: , 2003. – 0 с.
  18. Giovanni Giambene. Queuing Theory and Telecommunications : Networks and Applications. – М.: , 2005. – 0 с.
  19. Akhil Sahai. Web Services in the Enterprise : Concepts, Standards, Solutions, and Management (Network and Systems Management). – М.: , 2005. – 0 с.
  20. Enhancing Inter-Firm Networks and Interorganizational Strategies (Research in Management Consulting, Vol. 3) (Research in Management Consulting, V. 3). – М.: , 2003. – 262 с.
  21. Helen Nesadurai. Globalisation and Economic Security in East Asia: Governance and Institutions. – М.: , 2005. – 256 с.
  22. Stochastic Processes, Optimization, and Control Theory: Applications in Financial Engineering, Queueing Networks, and Manufacturing Systems/ A Volume in ... in Operations Research. – М.: , 2006. – 358 с.
  23. Edward Halibozek, Gerald L. Kovacich. Mergers and Acquisitions Security: Corporate Restructuring and Security Management. – М.: , 2005. – 272 с.
  24. Clifford W. Eischen, Lynn A. Eischen. Resumes, Cover-Letters, Networking, and Interviewing. – М.: , 2006. – 120 с.
  25. Spatial Dynamics, Networks And Modelling (New Horizons in Regional Science Series). – М.: , 2006. – 528 с.
  26. Bernard P. Wong. The Chinese in Silicon Valley: Globalization, Social Networks, and Ethnic Identity (Pacific Formations). – М.: , 2005. – 288 с.
  27. Nandish V. Patel. Organization and Systems Design: Theory of Deferred Action. – М.: , 2006. – 288 с.
  28. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с.
  29. Ronald H. Bowman. Business Continuity Planning for Data Centers and Systems: A Strategic Implementation Guide. – М.: , 2008. – 206 с.
  30. James Michael Stewart, Ed Tittel, Mike Chapple. CISSP: Certified Information Systems Security Professional Study Guide. – М.: , 2008. – 841 с.
  31. Environmental Change and Human Security: Recognizing and Acting on Hazard Impacts (NATO Science for Peace and Security Series C: Environmental Security). – М.: , 2008. – 480 с.
  32. Ibp Usa. Cuba Army Defense Policy and National Security Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  33. Connectivity and Knowledge Management in Virtual Organizations: Networking and Developing Interactive Communications (Premier Reference Source). – М.: , 2008. – 450 с.
  34. Ronald Hall. Biometrics 100 Most asked Questions on Physiological (face, fingerprint, hand, iris, DNA) and Behavioral (keystroke, signature, voice) Biometrics Technologies, ... Implementation and Performance evaluation. – М.: , 2008. – 176 с.
  35. Bel G. Raggad. Information Security Management: Concepts and Practice. – М.: , 2010. – 871 с.
  36. William P Crowell. Physical and Logical Security Convergence: Powered By Enterprise Security Management. – М.: , 2010. – 592 с.
  37. Geoffrey Poitras. Risk Management, Speculation, and Derivative Securities. – М.: , 2010. – 601 с.
  38. Charles E. Thomas. Process Technology Equipment and Systems. – М.: , 2010. – 480 с.
  39. Robert W. Sandstrom, Helene Lohman, James D. Bramble. Health Services: Policy and Systems for Therapists (2nd Edition). – М.: , 2008. – 336 с.
  40. N. Sundararajan. A Practical Approach to Signals and Systems. – М.: , 2008. – 400 с.
  41. Frederick Marcus. Bioinformatics and Systems Biology: Collaborative Research and Resources. – М.: , 2008. – 288 с.
  42. Beaufort B. Longest, Kurt Darr. Managing Health Services Organizations and Systems. – М.: , 2008. – 664 с.
  43. Christin Maria Hainbuchner. Technology Acceptance of Complex Products and Systems: The Case of Terrestrial Trunked Radio (TETRA). – М.: , 2008. – 264 с.
  44. Handbook of Information and Communication Security. – М.: , 2010. – 800 с.
  45. Stamatios V. Kartalopoulos. Understanding Neural Networks and Fuzzy Logic. – М.: , 1995. – 232 с.
  46. Barry Kauler. Windows Assembly Language and Systems Programming. – М.: , 2010. – 419 с.
  47. Russell Colling. Hospital and Healthcare Security. – М.: , 2010. – 720 с.
  48. Heinz Durr. Photochromism: Molecules and Systems. – М.: , 2010. – 1218 с.
  49. Anthony Kelly. Maintenance Organization and Systems. – М.: , 2010. – 320 с.
  50. Omid Omidvar. Neural Networks and Pattern Recognition. – М.: , 2010. – 351 с.
  51. John R. Vacca. Network and System Security. – М.: , 2010. – 408 с.
  52. Philip Purpura. Terrorism and Homeland Security. – М.: , 2010. – 512 с.
  53. Gerald L. Kovacich. The Information Systems Security Officer's Guide. – М.: , 2010. – 361 с.
  54. Vadim A. Davankov. Hypercrosslinked Polymeric Networks and Adsorbing Materials ,56. – М.: , 2010. – 712 с.
  55. Owen Bishop. Electronics - Circuits and Systems. – М.: , 2010. – 0 с.
  56. Gianfranco Pistoia. Battery Operated Devices and Systems. – М.: , 2010. – 408 с.
  57. John Buford. P2P Networking and Applications. – М.: , 2010. – 408 с.
  58. Duc T. Pham. Intelligent Production Machines and Systems - First I*PROMS Virtual Conference. – М.: , 2010. – 592 с.
  59. Robert H. Kingston. Optical Sources, Detectors, and Systems. – М.: , 2010. – 198 с.
  60. Luis Chaparro. Signals and Systems Online Testing Registration Card. – М.: , 2010. – 0 с.
  61. Luis F. Chaparro. Signals and Systems Using MATLAB. – М.: Elsevier, 2011. – 768 с.
  62. J. Ricard. Emergent Collective Properties, Networks and Information in Biology,40. – М.: , 2010. – 296 с.
  63. Fred Eady. Networking and Internetworking with Microcontrollers. – М.: , 2010. – 512 с.
  64. Didier J. Dubois. Fuzzy Sets and Systems. – М.: , 2010. – 393 с.
  65. John R. Vacca. Computer and Information Security Handbook. – М.: , 2010. – 928 с.
  66. Jan Bergstra. Handbook of Network and System Administration. – М.: , 2010. – 1028 с.
  67. Owen Bishop. Electronics - Circuits and Systems. – М.: , 2010. – 384 с.
  68. Robert Thornton. Unimagined Community – Sex, Networks and AIDS in Uganda and South Africa. – М.: , 2008. – 304 с.
  69. Robert J Thornton. Unimagined Community – Sex, Networks,and AIDS in Uganda and South Africa. – М.: , 2008. – 304 с.
  70. Jeff Trinkle. Robotics – Science and Systems V. – М.: , 2010. – 500 с.
  71. Peter A Diamond. Taxation, Incomplete Markets and Social Security. – М.: , 2005. – 216 с.
  72. Erica Jong. Infrared Detectors and Systems. – М.: , 2004. – 336 с.
  73. Janes. Scholars? Guide to Washington, D.C., for Peace and International Security Studies. – М.: , 1995. – 0 с.
  74. Janes. Scholars? Guide to Washington, D.C., for Peace and International Security Studies. – М.: , 1995. – 0 с.
  75. Magnus Enquist. Neural Networks and Animal Behavior. – М.: , 2005. – 256 с.
  76. Sanjay Mathur. Nanostructured Materials and Systems. – М.: , 2010. – 168 с.
  77. Bernard Finn. Communications Under The Seas – The Evolving Cable Network and its Implications. – М.: , 2009. – 360 с.
  78. Stephen C. Payne. Novell?s Guide to Storage Area Networks and Novell® Cluster ServicesTM. – М.: , 2001. – 864 с.
  79. Prof Franco Taroni. Bayesian Networks and Probabilistic Inference in Forensic Science. – М.: , 2006. – 372 с.
  80. Andrew T Price–smith. Contagion and Chaos – Disease, Ecology and National Security in the Era of Globalization. – М.: , 2009. – 296 с.
  81. Gaurav S Sukhatme. Robotics – Science and Systems II. – М.: , 2007. – 600 с.
  82. Stephen Kern. A Cultural History of Causality – Science, Murder Novels and Systems of Thought. – М.: , 2006. – 448 с.
  83. Steven Brams. Game Theory and National Security. – М.: , 1972. – 0 с.
  84. Vishaal B. Bhuyan. Reverse Mortgages and Linked Securities. – М.: , 2010. – 188 с.
  85. RJ SMITH. Smith ?circuits? Devices And Systems – A First Cou Rse In Electrical Engineering 3ed. – М.: , 1976. – 768 с.
  86. Bruce Potter. Mastering FreeBSD and OpenBSD Security. – М.: , 2005. – 462 с.
  87. Bruce Potter. Mastering FreeBSD and OpenBSD Security. – М.: , 1972. – 0 с.
  88. Bruce Potter. Mastering FreeBSD and OpenBSD Security. – М.: , 1981. – 382 с.
  89. Bruce Potter. Mastering FreeBSD and OpenBSD Security. – М.: , 1987. – 28 с.
  90. Bruce Potter. Mastering FreeBSD and OpenBSD Security. – М.: , 1987. – 100 с.
  91. E. J. Mastascusa. Computer–Assisted Network and System Analysis. – М.: , 1988. – 308 с.
  92. Irv Englander. The Architecture of Computer Hardware and Systems Software. – М.: , 2000. – 784 с.
  93. Richard Koch. Superconnect – Harnessing the Power of Networks and the Strength of Weak Links. – М.: , 2010. – 0 с.
  94. RS SCHWARTZ. Schwartz Progress In Allergy – ?immunology? Of Ane Rgy And Systemic Lupus Erythematosus. – М.: , 1984. – 184 с.
  95. Stephen T. Welstead. Neural Network and Fuzzy Logic Applications in C/C++. – М.: , 1994. – 0 с.
  96. Stephen T. Welstead. Neural Network and Fuzzy Logic Applications in C/C++. – М.: , 1994. – 494 с.
  97. Stephen T. Welstead. Neural Network and Fuzzy Logic Applications in C/C++. – М.: , 1994. – 494 с.
  98. Deborah M Gordon. Ant Encounters – Interaction Networks and Colony Behaviour. – М.: , 2010. – 152 с.
  99. Simon Haykin. Signals and Systems. – М.: , 2002. – 820 с.
  100. Nikola Kasabov. Foundations of Neural Networks, Fuzzy Systems & Knowledge Engineering. – М.: , 1996. – 568 с.
  101. Ralph J. Smith. Circuits, Devices and Systems. – М.: , 1984. – 752 с.
  102. Microsoft Official Academic Course. 70–299 Implementing and Administering Security in a Microsoft® Windows ServerTM 2003 Network Package. – М.: , 2005. – 836 с.
  103. Children?s Social Networks and Social Supports. – М.: , 1989. – 384 с.
  104. Philip W Porter. Challenging Nature – Local Knowledge, Agroscience, and Food Security in Tanga region, Tanzania. – М.: , 2006. – 288 с.
  105. Jiannong Cao. Mobile Agents in Networking and Distributed Computing. – М.: , 2012. – 450 с.
  106. Microsoft. Microsoft .Net Framework 1.1 Class Library Reference 7: System.Windows.Forms System Drawing and System.Component Model. – М.: , 2003. – 3760 с.
  107. Microsoft. Microsoft .NET Framework 1.1 Class Library Reference Volume 6: System.Xml and System.Data. – М.: , 2003. – 2576 с.
  108. JS QUARTERMAN. Quarterman: The ?matrix?: Computer Networks & Conferencing Systems Worldwid (pr Only). – М.: , 1989. – 752 с.
  109. Globalization, Development and Human Security. – М.: , 2006. – 240 с.
  110. Matthew Strebe. MCSA/MCSE Self–Paced Training Kit (Exam 70–214) – Implemanting and Administering Security in a Microsoft Windows 2000 Network. – М.: , 2003. – 704 с.
  111. Gerald D. Cole. Computer Networking for Systems Programmers. – М.: , 1990. – 242 с.
  112. Terry Collings. Red Hat® Linux® Networking and System Administration. – М.: , 2004. – 1008 с.
  113. Akhil Sahai, Sven Graupner. Web Services in the Enterprise: Concepts, Standards, Solutions, and Management (Network and Systems Management). – М.: , 2011. – 312 с.
  114. James E. Goldman. Network and E–Commerce Security. – М.: , 1975. – 768 с.
  115. The Complete Book Of Home, Site And Office Security. – М.: , 2011. – 309 с.
  116. Prof Lucy Lynn Maliwichi,Prof Peter BIkam and Dovhani Johannes Mulaudzi. Energy Needs and Food Security in Mutale Municipality, South Africa. – М.: LAP Lambert Academic Publishing, 2011. – 76 с.
  117. Wrastawa Ridwan. Dissipative Networked Control Systems. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  118. Amir Rajaee. Cognitive Radio Networks And System Optimization. – М.: LAP Lambert Academic Publishing, 2013. – 132 с.
  119. Alphan Ulusoy,Ozgur Gurbuz and Ahmet Onat. Cooperative Wireless Model Based Predictive Networked Control Systems. – М.: LAP Lambert Academic Publishing, 2010. – 92 с.
  120. Mehmet Emrah Parlakay and Ahmet Onat. Model Based Predictive Networked Control Systems. – М.: LAP Lambert Academic Publishing, 2010. – 60 с.
  121. Elias Wahab. Social And Economic Security of the Elderly in Nigeria. – М.: LAP Lambert Academic Publishing, 2012. – 232 с.
  122. David Kaawa-Mafigiri. Social Networks and Social Support for Tuberculosis Control in Uganda. – М.: LAP Lambert Academic Publishing, 2011. – 244 с.
  123. Ishrat Fatima,Badar Naseem Siddiqui and Kanwal Naeem. Rural Youth and Food Security. – М.: LAP Lambert Academic Publishing, 2014. – 112 с.
  124. Tawheed Reza Noor. Seed Systems and Seed Security of Rice Plantation. – М.: LAP Lambert Academic Publishing, 2015. – 116 с.
  125. Abdelaziz Hamad Elawad,Bahrom Sanugi and Shahariddin Salleh. Neural network and scheduling. – М.: LAP Lambert Academic Publishing, 2011. – 160 с.
  126. Hussein M. Khattab,Almoataz Y. Abdelaziz and Said F. Mekhamer. Innovative Approaches for Power System Security Assessment. – М.: LAP Lambert Academic Publishing, 2013. – 224 с.
  127. Faiz Rasool and Sing Kiong Nguang. Networked Control Systems. – М.: LAP Lambert Academic Publishing, 2014. – 96 с.
  128. Anju Lis Kurian and C. Vinodan. Regional Integration and Energy Security:The European Union Experience. – М.: LAP Lambert Academic Publishing, 2014. – 268 с.
  129. Vyacheslav Abramov. Queueing systems, networks and telecommunication systems. – М.: LAP Lambert Academic Publishing, 2010. – 164 с.
  130. Ankur Gupta and Bhupendra Gupta. Random Networks and its Applications. – М.: LAP Lambert Academic Publishing, 2013. – 100 с.
  131. Elsayed M. Elsayed and Hamdy A. El-Metwally. Qualitative Studies of Scalars and Systems of Difference Equations. – М.: LAP Lambert Academic Publishing, 2012. – 208 с.
  132. Nateq Be-Nazir Ibn Minar. Bluetooth Networking and its Security Architecture. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  133. Garima Verma. Implementation of Authentication and Transaction Security. – М.: LAP Lambert Academic Publishing, 2013. – 60 с.
  134. Rezaul Hoque. Scalable Network Tomography System. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  135. Wei Ren. Lightweight and Robust Security for Applications in Internet of Things. – М.: LAP Lambert Academic Publishing, 2013. – 188 с.
  136. Emenike Ahiabuike. Power Management: Using Observer Network Management System. – М.: LAP Lambert Academic Publishing, 2014. – 64 с.
  137. Saeed Soltanmohammadi. Improving Information System Security by Evaluating Human Factors. – М.: LAP Lambert Academic Publishing, 2014. – 116 с.
  138. Kareem Bahlol Afan,Afnan Hussein Hayat and Omar Akram Ahmed. Design And Implement Network Management System. – М.: LAP Lambert Academic Publishing, 2015. – 52 с.
  139. Jun Zheng,Jiantao Gu and Hong Wang. Financial Management and Information Security of Independent Colleges. – М.: LAP Lambert Academic Publishing, 2014. – 256 с.
  140. Sanjay Srivastava. Alleviating Rural Poverty and Food Security in Changing Climate. – М.: LAP Lambert Academic Publishing, 2010. – 96 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Наука человековедения. интервью с Д. Уолтоном, профессором London Metropolitan University, экспертом CIPD. Chartered Institute of Personnel and Development, автором программы Master of Arts in Human Resource Strategies. И. Смирнова, "Кадровый менеджмент", № 5, июль-август 2007.
  2. Специализированный модуль FS-CD. Collections and Disbursements - "Сборы и Выплаты" и его возможности. О.А. Глущенко, "Финансовый менеджмент в страховой компании", № 2, II квартал 2007.
  3. Бюджетирование страховой компании на базе Oracle Enterprise Planning and Budgeting. Д.В. Лесоводский, "Финансовый менеджмент в страховой компании", № 3, III квартал 2006.
  4. Банковское отделение будущего. интервью с Камероном МакКворри. Cameron MacQuarrie, менеджером по развитию бизнеса компании Cisco Systems в области корпоративных финансов в регионе EMEA. Европа, Ближний Восток, Африка. Н.Ф. Колюшенко, "Расчеты и операционная работа в коммерческом банке", № 2, февраль 2006.
  5. Ловушка для пирата. интервью с И. Слабых, руководителем отдела противодействия интеллектуальному пиратству в России и СНГ Adobe Systems. И. Голова, "Расчет", N 9, сентябрь 2012 г.
  6. Регулирование операций торгового финансирования: новые инициативы. интервью с Д. Шмандом, вице-председателем Банковской комиссии ICC по supply chain finance, главой подразделения Trade Finance and Cash Management Corporates EMEA в Global Transaction Banking. GTB division Deutsche Bank. Н. Макарова, "Международные банковские операции", N 2, апрель-июнь 2012 г.
  7. Ужин в темноте в стиле Малевича и Новый год в Хаммере". Что может выть лучше?". интервью с Н. Саниной, индивидуальным предпринимателем и креативным директором компании "San and stars". М. Сипатова, "Арсенал предпринимателя", N 12, декабрь 2011 г.
  8. На пути к новому стандарту в торговом финансировании. интервью с А.  Кастерманом, руководителем Trade and Supply Chain, SWIFT, сопредседателем рабочей группы ICC-BPO. Э. Шакирова, "Международные банковские операции", N 4, октябрь-декабрь 2011 г.
  9. Уильям Савадж: Мотивировать людей в Нижнем Новгороде и Новосибирске нужно по-разному". интервью с У. Саваджем, вице-президентом корпорации Intel, подразделение Software and Services Group. М. Холкина, "Управление персоналом", N 14, июль 2010 г.
  10. Цены под контролем: the present and the future. С. Стройкова, И. Леметюйнен, "Консультант", № 19, сентябрь 2009.
  11. Основной арсенал "охотника" - его network: кого он знает на рынке и качество этих отношений. С. Плетнева, "Управление персоналом", № 12, июнь 2009.
  12. Я воспринимаю персонального помощника как напарника червяк должен нравиться рыбке, а не рыбаку. интервью с П.А. Черкашиным, руководителем российского представительства компании Adobe Systems. "Управление персоналом", № 20, октябрь 2008.

Образцы работ

Тема и предметТип и объем работы
Концентрация производства и определение оптимальных размеров
Экономика предприятия
Курсовая работа
25 стр.
Переход от концентрации к развитию малых и средних предприятий
Экономика предприятия
Курсовая работа
21 стр.
Этапы формирования теории президентства
История государства и права
Курсовая работа
30 стр.
Последствия операции НАТО
Политология
Диплом
80 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Екатерина, 05.06
Работу приняли,всё нормально!