Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Wireless Communications and Applications: First International Conference, ICWCA 2011, Sanya, China, August 1-3, 2011, Revised Selected Papers (Lecture ... and Telecommunications Engineering). – М.: , 2012. – 468 с. Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – М.: , 2012. – 283 с. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с. Bennett Harrison, Marcus Weiss, Marcus S. Weiss. Workforce Development Networks: Community-Based Organizations and Regional Alliances. – М.: , 0. – 0 с. Bennett Harrison, Marcus Weiss, Marcus S. Weiss. Workforce Development Networks: Community-Based Organizations and Regional Alliances. – М.: , 0. – 0 с. Charles P. Jones. Investments : Analysis and Management. – М.: , 0. – 0 с. Timothy Braithwaite. Securing E-Business Systems: A Guide for Managers and Executives. – М.: , 0. – 0 с. Gladson I., Ph.D. Nwanna. American Businesses Abroad: How to Protect Your Assets and Personnel. – М.: , 0. – 0 с. Andrew Sun. Using and Managing Ppp. – М.: , 0. – 0 с. Jonathan S. Held, John R. Bowers. Securing E-Business Applications and Communications. – М.: , 0. – 0 с. Vesna Hassler. Security Fundamentals for E-Commerce (Artech House Computer Security Series). – М.: , 0. – 0 с. George H. Bodnar. Accounting Information Systems (9th Edition). – М.: , 2003. – 0 с. Richard Coyne. Cornucopia Limited : Design and Dissent on the Internet. – М.: , 2005. – 272 с. Protection of Civilian Infrastructure from Acts of Terrorism (NATO Security through Science Series / NATO Security through Science Series C: Environmental Security). – М.: , 2006. – 269 с. Patrick Traynor, Patrick McDaniel, Thomas La Porta. Security for Telecommunications Networks (Advances in Information Security). – М.: , 2008. – 182 с. Fredrik Nilsson, Communications Axis. Intelligent Network Video: Understanding Modern Video Surveillance Systems. – М.: , 2008. – 440 с. Nicholas Kaufman. Whose Peace?: Hegemony, Development, and Social Change in Post-Conflict El Salvador. – М.: , 2008. – 104 с. Towards Sustainable Society on Ubiquitous Networks: The 8th IFIP Conference on e-Business, e-Services, and e-Society (I3E 2008), September 24 - 26, 2008, ... Federation for Information Processing). – М.: , 2008. – 366 с. Xavier Carcelle. Power Line Communications in Practice. – М.: , 2009. – 370 с. Bel G. Raggad. Information Security Management: Concepts and Practice. – М.: , 2010. – 871 с. Karen Pirtle BSCJ. The Legal Nurse Consultant and Life Care Planners Guide to Social Media. – М.: , 2010. – 116 с. Bastian Cleve. Film Production Management. – М.: Focal Press, 2006. – 240 с. Klaus W. Grewlich. Governance in "Cyberspace: Access and Public Interest in Global Communications (Law and Electronic Commerce, V. 9). – М.: , 0. – 0 с. Jeff Crume. Inside Internet Security: What Hackers Don't Want You To Know. – М.: , 0. – 0 с. Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards and Applications (Wireless Networks and Mobile Communications). – М.: , 2008. – 424 с. Handbook of Information and Communication Security. – М.: , 2010. – 800 с. Rob Scrimger, Paul LaSalle, Mridula Parihar, Meeta Gupta. TCP/IP Bible. – М.: John Wiley and Sons, Ltd, 2002. – 624 с. James Momoh. Operation and Control of Electric Energy Processing Systems. – М.: , 2010. – 202 с. Principles Of Computer Security, Comptia Security+ And Beyond, Second Edition. – М.: , 2011. – 0 с. Session Initiation Protocol (Sip): Controlling Convergent Networks. – М.: , 2011. – 264 с. Wireless Network Security A Beginners Guide. – М.: , 2011. – 400 с. Operating Systems Demystified. – М.: , 2011. – 400 с. Cisco: A Beginner'S Guide, Fourth Edition. – М.: , 2011. – 696 с. Voice & Data Communications Handbook, Fifth Edition. – М.: , 2011. – 650 с. Eoghan Casey. Digital Evidence and Computer Crime. – М.: , . – с. Robert Stephens. Configuring Check Point NGX VPN-1/Firewall-1. – М.: , 2005. – 608 с. Thomas Porter, Michael Gough. How to Cheat at Voip Security (How to Cheat) (How to Cheat) (How to Cheat). – М.: , 2007. – 432 с. Fred Eady. Implementing 802.11 with Microcontrollers: Wireless Networking for Embedded Systems Designers (Embedded Technology). – М.: , 2005. – 400 с. Timothy Stapko. Practical Embedded Security: Building Secure Resource-Constrained Systems. – М.: Newnes, 2007. – 480 с. Susan Snedaker, Chris Rima. Business Continuity and Disaster Recovery Planning for IT Professionals. – М.: Syngress, 2014. – с. Spencer, Sabina. The Heart Of Leadership. – М.: , 2014. – с. Govind Sharma and Manish Gupta. Secure routing in wireless mobile Ad-Hoc network. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Susmita Mandal. A Key Management Solution for HIPAA Compliance. – М.: LAP Lambert Academic Publishing, 2012. – 68 с. Jayendra Singh,Satvik Vats and Ankit Dagar. Control Area Network for Vehicle Security System. – М.: LAP Lambert Academic Publishing, 2013. – 88 с. Jai Parkash,Mr. Ashutosh Gupta and Dr. Pradeep Kumar Rana. SMS based Wireless Temperature monitoring. – М.: LAP Lambert Academic Publishing, 2010. – 100 с. Arindam Sarkar and J. K. Mandal. Artificial Neural Network Guided Secured Communication Techniques. – М.: LAP Lambert Academic Publishing, 2012. – 128 с. Husam Abduldaem Mohammed. Ring Network Based on Fiber Distributed Data Interface (FDDI). – М.: LAP Lambert Academic Publishing, 2014. – 136 с. AbdolMajid Shahgholi,Dr. K. K. Shukla and Dr. Rajeev Srivastava. LARGE SCALE WIRELESS SENSOR NETWORK FOR TACTICAL MILITARY APPLICATIONS. – М.: LAP Lambert Academic Publishing, 2012. – 92 с. Rshdee Alhakim,Emmanuel Simeu and Kosai Raoof. Optimizing the performance of synchronization process. – М.: LAP Lambert Academic Publishing, 2013. – 284 с. Samy S. Soliman. Hierarchically Clustered Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 156 с. Yang Liu. Towards Enhanced Security and Reliability in Wireless Communications. – М.: LAP Lambert Academic Publishing, 2010. – 144 с. M. Sadiq Ali Khan and S. M. Aqil Burney. Recent Trends in Intrusion Detection System & Network Monitoring. – М.: LAP Lambert Academic Publishing, 2012. – 120 с. Yasir Waseem Iqbal. Sociology Of Networking. – М.: LAP Lambert Academic Publishing, 2013. – 88 с. Vinay Abburi. SECURE AND RELIABLE DEEP SPACE NETWORKS. – М.: LAP Lambert Academic Publishing, 2010. – 68 с. Gideon Nomdo. The 'Poor and the Rich' in Luke-Acts. – М.: LAP Lambert Academic Publishing, 2011. – 180 с. Ankur Gupta and Bhupendra Gupta. Random Networks and its Applications. – М.: LAP Lambert Academic Publishing, 2013. – 100 с. Reza Mohammad Hossein and Kamran Gholamahmadi. A Combinational Security-Model In Service-Oriented Architecture. – М.: LAP Lambert Academic Publishing, 2014. – 136 с. Subhankar Chattopadhyay and Ashok Kumar Turuk. Key Pre-distribution and Key Revocation in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2011. – 72 с. Ashit Kumar Dutta and Abdul Rahaman Wahab Sait. Computer Networks from Scratch. – М.: LAP Lambert Academic Publishing, 2013. – 324 с. Subir Biswas. Security and Privacy in Vehicular Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2013. – 204 с. Sumaya Saad Sulaiman and Sarab M. Hameed. A Fuzzy Based Clustering for Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 120 с. Arnab Banerjee,ANIRUDDHA BHATTACHARYYA and DIPAYAN BOSE. IMPLEMENTATION OF A TRUST BASED SECURE ROUTING PROTOCOL IN MANET. – М.: LAP Lambert Academic Publishing, 2012. – 292 с. Ali Pesaranghader and Esmaeel Marjani. Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2013. – 108 с. Younus Javed and Hassan Tahir. Optimized Security Protocol for Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Sandeep Kr. Agarwal and Dr. K. V. Arya. Security in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 88 с. Prathap Jonnadula and Naga Mani Darajula. Secure Group Communication. – М.: LAP Lambert Academic Publishing, 2012. – 64 с. Mohammed azharuddin Adhoni. Secure communication in p2p networks. – М.: LAP Lambert Academic Publishing, 2012. – 124 с. Mohamed Rasslan,Yasser Dakroury and Heba Aslan. Group Key Distribution in Computer Networks. – М.: LAP Lambert Academic Publishing, 2012. – 212 с. E.A.Mary Anita. Securing Multicast Routing Protocols for Mobile Adhoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 88 с. Marzieh Yazdanipour and Afsaneh Yazdanipour. Wireless Mesh Networks. – М.: LAP Lambert Academic Publishing, 2012. – 92 с. Hamid Reza Barzegar,Mahdiyeh Barzegar and Neshat Alidad. Energy Efficient And Secured Communication For Manets In Military. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Mazen Mohammed,Alaa Eldin Rohiem and Ali El-moghazy. CSRTP. – М.: LAP Lambert Academic Publishing, 2013. – 76 с. Cong Hoan Vu and Adeyinka Soneye. Collaborative Attacks on MANETs. – М.: LAP Lambert Academic Publishing, 2010. – 76 с. Niroj Kumar Pani and Dr. Ashok Kumar Turuk. A Hybrid Zone-Based Routing Protocol for Secure Communication in MANET. – М.: LAP Lambert Academic Publishing, 2010. – 92 с. Sourav Kanti Addya and Ashok Kumar Turuk. Key Pre-distribution in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2010. – 68 с. Rupa Ch. and Avadhani P. S. Modern Security Methods in Applied Computer Science. – М.: Scholars' Press, 2014. – 124 с. K. Shaila and K. R. Venugopal. Secure Data Communication in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2014. – 240 с. Sanjeev Karmakar and Manoj K. Kowar. A Comprehensive Lecture Notes on RSA-1024 Cryptography. – М.: LAP Lambert Academic Publishing, 2013. – 160 с. Chandan Koner. Authentications in Remote and Mobile System Communications. – М.: LAP Lambert Academic Publishing, 2014. – 128 с. P. Ganesh Kumar and S. Ramesh. Secure Routing Protocol for ICMN. – М.: LAP Lambert Academic Publishing, 2014. – 64 с. Ali Rezaeian and Azad Azadmanesh. Sensor Area Coverage. – М.: LAP Lambert Academic Publishing, 2014. – 240 с. Aditya Kumar. Cryptography and Chaos a New Approach in Network Security. – М.: LAP Lambert Academic Publishing, 2015. – 80 с. Tuncay Ercan. Wireless Networks for Corporations. – М.: LAP Lambert Academic Publishing, 2010. – 120 с. Lukman Sharif and Munir Ahmed. IPSec: A Practical Approach. – М.: LAP Lambert Academic Publishing, 2010. – 128 с. Albert Wasef. Managing and Complementing PKI for Securing Vehicular Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2011. – 204 с. Cosmin Dini and Pascal Lorenz. Data Management in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2011. – 144 с. Tejpal Singh. Security Protocols for Data Routing in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 68 с. Marimuthu Kanagaraj and Eswari Venkatachalam. Multifactor Authentication Protocol for a Secured WSN. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Saurabh Mittal,Ankita Mittal and Sapna Boora. Security Enhancement using Dynamic Cache on DSR Based MANETS. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Shilpa Jaiswal and Sumeet Agrawal. Detection of Network Worm to Eliminate Security Threats in MANET. – М.: LAP Lambert Academic Publishing, 2012. – 52 с. Devendra Prasad. Relible Data Dissemination in Mobile Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 144 с. Pallavi Kaliyar and Gagan Singla. A secure routing protocol for MANETs against byzantine attacks. – М.: LAP Lambert Academic Publishing, 2013. – 84 с. Haitham ELwahsh. Secure Service Discovery Protocol for ad-hoc Networks "hash function". – М.: LAP Lambert Academic Publishing, 2013. – 144 с. Omar Cheikhrouhou. Secure Group communication in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2013. – 160 с. Pushphas Chaturvedi and Kunal Gupta. Enhanced Packet Dissembling Schemes For Jamming Attacks Prevention. – М.: LAP Lambert Academic Publishing, 2013. – 76 с. Vincent Omollo. Enhanced Network Security. – М.: LAP Lambert Academic Publishing, 2013. – 76 с. Sunil Kumar Senapati and Prof. Pabitra Mohan Khilar. SECURING FSR PROTOCOL AGAINST DATA PACKET DROPPING IN MANET. – М.: LAP Lambert Academic Publishing, 2010. – 64 с. Manuj Mishra,Govind Sharma and Ram Pathak. Secure Routing In Wireless Mobile Ad Hoc Network. – М.: LAP Lambert Academic Publishing, 2014. – 84 с. Sharmin Rashid Linta and Md.Ridgewan Khan Neuton. Today’s Impact on Communication System by IP Spoofing. – М.: LAP Lambert Academic Publishing, 2012. – 72 с. Amel Chowdhury. Deployment of a Secure VoIP System. – М.: LAP Lambert Academic Publishing, 2014. – 68 с. Chaman Singh and Kishori Lal Bansal. NAT Traversal and Detection. – М.: LAP Lambert Academic Publishing, 2012. – 324 с. Seppo Sirkemaa. On Local Area Network Management. – М.: LAP Lambert Academic Publishing, 2010. – 248 с. Mehdi Hussain and Mureed Hussain. Efficient Data Hiding Techniques with Enhanced Capacity. – М.: LAP Lambert Academic Publishing, 2012. – 96 с. Mohammad Faisal. Networks Security and Communication. – М.: LAP Lambert Academic Publishing, 2012. – 56 с. Affan Yasin,Hafiz Adnan Shafiq and Muhammad Ijlal Hasnain. Software Architecture for Centralized Health Database. – М.: LAP Lambert Academic Publishing, 2013. – 64 с. Benjamin Eze. Policy-based Data Sharing for Event-driven Services in B2B Networks. – М.: LAP Lambert Academic Publishing, 2011. – 148 с. Edmond K. Machie. Network Attack Traceback And React. – М.: LAP Lambert Academic Publishing, 2013. – 208 с. Hassen Alsafi and Mohammed Azhruddin. The Security Issues for Smart Grids Applications on Cloud Computing. – М.: LAP Lambert Academic Publishing, 2013. – 60 с. Tanveer Zia. A Security Framework for Wireless Sensor Networks (WSN). – М.: LAP Lambert Academic Publishing, 2013. – 160 с. Dirk Lessner. Network Security for Embedded Systems. – М.: LAP Lambert Academic Publishing, 2009. – 232 с. Musharrif Hussain and Sulman Mahmood. Secure Software and Comm. on Handheld Devices. – М.: LAP Lambert Academic Publishing, 2011. – 60 с. Fatty Mustafa Salem,Maged Hamada Ibrahim and Ibrahim Ismail Ibrahim. Efficient and Secure Message Transmission in Vehicular Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 96 с. Stephen Murove,S. B. Mangena and B. Jones. Firewall Evaluation:Models for Major Decisions in Computer Security. – М.: LAP Lambert Academic Publishing, 2014. – 236 с. Al-Sakib Khan Pathan. Securing WSN with Lightweight Resource-Efficient Schemes. – М.: LAP Lambert Academic Publishing, 2011. – 116 с. Noor Ul Amin. Secure MANET Communication Based on Hybrid Cryptosystem. – М.: LAP Lambert Academic Publishing, 2013. – 64 с. Gulzar Mehmood,Nizamud Din and Muhammad Nawaz Khan. Privacy Preserving Scheme for Body Sensor Networks Based on CDLP. – М.: LAP Lambert Academic Publishing, 2014. – 56 с. Nirmalya Kar,Ashim Saha and Mrinal Kanti Debbarma. Biometric Based Attendance System. – М.: LAP Lambert Academic Publishing, 2012. – 64 с. Sheriza Hassan-Ali. Extranets: Designing, Planning and Implementation. – М.: LAP Lambert Academic Publishing, 2010. – 92 с. Faeiz Alserhani,Irfan Awan and Monis Akhlaq. Correlation and Aggregation of Security Alerts in Networks. – М.: LAP Lambert Academic Publishing, 2012. – 256 с. Sachin Tripathi and Gosta Pada Biswas. Enhancements on Internet Applications. – М.: LAP Lambert Academic Publishing, 2011. – 148 с. S. Balamurugan and S. Charanyaa. Principles of Social Network Data Security. – М.: LAP Lambert Academic Publishing, 2014. – 92 с. Jegan Ganeshamoorthy and Volker Hoffmann. Assessment of Local Perception of Wealth and Poverty Dynamics. – М.: LAP Lambert Academic Publishing, 2011. – 160 с. Amarnath Surendranath and Saranya Chinnusamy. Evaluation of Sustainability in Agro Ecological Systems of Tamil Nadu. – М.: LAP Lambert Academic Publishing, 2014. – 140 с. Дополнительные результаты Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с. Andrej Fatur. EU Competition Law and the Information and Communication Technology Network Industries: Economic versus Legal Concepts in Pursuit of (Consumer) Welfare (Hart Studies in Competition Law). – М.: , 2012. – 312 с. Security and Privacy in Mobile Information and Communication Systems: Third International ICST Conference, MOBISEC 2011, Aalborg, Denmark, May 17-19, ... and Telecommunications Engineering). – М.: , 2012. – 195 с. Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – М.: , 2012. – 283 с. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с. Security and Development in Global Politics: A Critical Comparison. – М.: , 2012. – 360 с. Advances in Electronic Commerce, Web Application and Communication: Volume 2 (Advances in Intelligent and Soft Computing). – М.: , 2012. – 640 с. Luis Lobo-Guerrero. Insuring Security: Biopolitics, security and risk. – М.: , 2012. – 178 с. Terrorism and the Olympics: Major Event Security and Lessons for the Future. – М.: , 2012. – 272 с. Giorgio S. Questa. Fixed Income Analysis for the Global Financial Market: Money Market, Foreign Exchange, Securities, and Derivatives. – М.: Wiley, 1999. – 368 с. Rattan Lal, David Hansen, Norman Uphoff, Steven Slack, Rattan Lal. Food Security and Environmental Quality in the Developing World. – М.: , 0. – 0 с. International Conference on Information and Communication technologies, Andrew J. Frew, Martin Hitz, Karl W. Wober. Information and Communication Technologies in Tourism 2002: Proceedings of the International Conference in Innsbruck, Austria, 2002 (Springer Computer Science). – М.: , 0. – 0 с. Merrelyn Emery, Ronald E. Purser. The Search Conference : A Powerful Method for Planning Organizational Change and Community Action (Jossey-Bass Public Administration). – М.: , 0. – 0 с. Paul M. Hildreth, Chris Kimble. Knowledge Networks: Innovation Through Communities of Practice. – М.: , 0. – 0 с. Hellen Davis. Influence and Communication. – М.: , 0. – 0 с. Dirk Jaap Vriens, Dirk Vriens. Information and Communications Technology for Competitive Intelligence. – М.: , 0. – 0 с. Bill Withers, Keami D. Lewis. The Conflict and Communication Activity Book: 30 High-Impact Training Exercises for Adult Learners. – М.: , 0. – 0 с. Susan Echaore-McDavid. Career Opportunities in Law Enforcement, Security, and Protective Services (The Career Opportunities Series). – М.: , 0. – 0 с. Geoff Dow, Rachel Parker. Business, Work, and Community: Into the New Millennium. – М.: , 0. – 0 с. Maurice, Ph.D. Youakim. Social Security and Medicare for the New Millenium. – М.: , 0. – 0 с. Benjamin Shepard, Ronald Hayduk. From ACT UP to the WTO: Urban Protest and Community Building in the Era of Globalization. – М.: , 0. – 0 с. Hildegarde Hannum, Nancy Jack Todd. People, Land, and Community: Collected E.F. Schumacher Society Lectures. – М.: , 0. – 0 с. Jonathan Y. Okamura. Imagining the Filipino American Diaspora : Transnational Relations, Identities, and Communities (Asian Americans: Reconceptualizing Culture, History, Politics). – М.: , 0. – 0 с. Timothy Beatley. Native to Nowhere: Sustaining Home and Community in a Global Age. – М.: , 0. – 0 с. Nancy Lynch Street, Marilyn J. Matelski. American Businesses in China: Balancing Culture and Communication. – М.: , 0. – 0 с. William H. Dutton, Malcolm Peltu. Information and Communication Technologies: Visions and Realities. – М.: , 0. – 0 с. Yrjo Engestrom, David Middleton. Cognition and Communication at Work. – М.: , 0. – 0 с. Retail Security and Loss Prevention. – М.: , 0. – 0 с. Physical Security and the Inspection Process. – М.: , 0. – 0 с. John De LA Mothe, Albert N. Link. Networks, Alliances and Partnerships in the Innovation Process (Economics of Science, Technology, and Innovation, 28). – М.: , 0. – 0 с. Louis Barajas. The Latino Journey to Financial Greatness : The 10 Steps to Creating Wealth, Security, and a Prosperous Future for You and Your Family. – М.: , 0. – 0 с. Don Silver. The Generation X Money Book: Achieving Security and Independence. – М.: , 0. – 0 с. Jonathan Gruber, David A. Wise. Social Security and Retirement Around the World (NATIONAL BUREAU OF ECONOMIC RESEARCH CONFERENCE REPORT). – М.: , 0. – 0 с. Geoff Craighead. High-Rise Security and Fire Life Safety, Second Edition. – М.: , 0. – 0 с. Roberta Bragg. MCSE Training Guide (70-220): Windows 2000 Network Security Design, Second Edition. – М.: , 0. – 0 с. Marian Quigley, Marian Quiqley. Information Security and Ethics: Social and Organizational Issues. – М.: , 0. – 0 с. Jonathan S. Held, John R. Bowers. Securing E-Business Applications and Communications. – М.: , 0. – 0 с. Anup K. Ghosh. E-Commerce Security and Privacy. – М.: , 0. – 0 с. Mavis A. Ampah. Connecting Sub-Saharan Africa: A World Bank Group Strategy for Information and Communication Technology Sector Development (World Bank Working Papers) (World Bank Working Papers). – М.: , 2005. – 0 с. Jairo A. Arboleda. Voices of the Poor in Colombia: Strengthening Livelihoods, Families and Communities. – М.: , 2004. – 0 с. Information and Communication Technologies in Tourism 2005 : Proceedings of the International Conference in Innsbruck, Austria, 2005. – М.: , 2005. – 0 с. Kenneth Atchity. How to Escape Lifetime Security and Pursue Your Impossible Dream: A Guide to Transforming Your Career. – М.: , 2004. – 0 с. Information and Communications Technology for Competitive Intelligence. – М.: , 2003. – 0 с. Information and Communication Technologies in Tourism 2004. – М.: , 2004. – 0 с. A.J. Frew. Information and Communication Technologies in Tourism 2003. – М.: , 2003. – 0 с. Joseph White. False Alarm : Why the Greatest Threat to Social Security and Medicare Is the Campaign to "Save" Them (Century Foundation Book). – М.: , 2003. – 0 с. Advances in Security and Payment Methods for Mobile Commerce. – М.: , 2004. – 0 с. Bob Thompson. Real Estate & The New Economy: The Impact Of Information And Communications Technology (Real Estate Issues). – М.: , 2005. – 0 с. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с. Information and Communication Technology and the Teacher of the Future (IFIP International Federation for Information Processing). – М.: , 2003. – 0 с. Mediating Science Learning Through Information and Communications Technology. – М.: , 2004. – 0 с. Information and Communication Technologies and Real-Life Learning : New Education for the Knowledge Society (IFIP International Federation for Information Processing). – М.: , 2005. – 0 с. Ron Ben Natan. Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase. – М.: , 2005. – 432 с. Joe Conason. The Raw Deal: How the Bush Republicans Plan to Destroy Social Security and the Legacy of the New Deal. – М.: , 2005. – 141 с. Barbara Benedict Bunker, Billie T. Alban. The Handbook of Large Group Methods: Creating Systemic Change in Organizations and Communities (Jossey-Bass Business & Management). – М.: , 2006. – 480 с. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с. Sexualities and Communication in Everyday Life: A Reader. – М.: , 2006. – 344 с. Helen James. Security and Stustaibable Developement in Myanmar/Burma (Routledge Contemporary Southeast Asia Series). – М.: , 2006. – 231 с. Information and Communication Technologies for Development and Poverty Reduction: The Potential of Telecommunications (International Food Policy Research Institute). – М.: , 2006. – 392 с. Information and Communications for Development 2006: Global Trends and Policies. – М.: World Bank Publications, 2006. – 328 с. The SAGE Handbook of Gender and Communication. – М.: , 2006. – 504 с. Susan Echaore-McDavid. Career Opportunities In Law Enforcement, Security And Protective Services (Career Opportunities). – М.: , 2005. – 272 с. Information and Communication Technologies for Development and Poverty Reduction: The Potential of Telecommunications. – М.: , 2006. – 392 с. Roger I. Cartwright. Key Concepts in Information and Communication Technology. – М.: Palgrave Macmillan, 2005. – 232 с. Roy H. Campbell, Prasad G. Naldurg. Security and Survivability: Analyzing, Modeling, and Verifying Dynamic Recovery in Insecure Systems. – М.: , 2008. – 240 с. Network Security. – М.: , 2008. – 370 с. Daya Thussu. International Media and Communication: A Dictionary (Oxford Studies in Comparative Syntax). – М.: , 2008. – 0 с. Niranjala Weerakkody. Research Methods for Media and Communication. – М.: Oxford University Press, 2008. – 304 с. Ibp Usa. Thailand Army, National Security And Defense Policy Handbook. – М.: , 2008. – 300 с. Ibp Usa. Turkey Army, National Security And Defense Policy Handbook (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с. Ibp Usa. Ukraine Army, National Security And Defense Policy Handbook (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с. Social Security and Development. – М.: , 2008. – 256 с. Ibp Usa. CZECH REPUBLIC ARMY, NATIONAL SECURITY AND DEFENSE POLICY HANDBOOK (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с. Ibp Usa. ESTONIA ARMY, NATIONAL SECURITY AND DEFENSE POLICY HANDBOOK (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с. Ibp Usa. Finland Army, National Security And Defense Policy Handbook (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с. Ibp Usa. Germany Army, National Security And Defense Policy Handbook (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с. Daniel Clark. Network Access Control 100 Success Secrets - 100 Most Asked NAC Questions on Implementation and Deployment of unify endpoint security technology, user ... and network security enforcement. – М.: , 2008. – 180 с. Robert Rattle. Computing Our Way to Paradise?: The Role of Internet and Communication Technologies in Sustainable Consumption and Globalization (Globalization and the Environment). – М.: , 2010. – 246 с. Handbook of Information and Communication Security. – М.: , 2010. – 800 с. Amiya Nayak, Ivan Stojmenovic. Wireless Sensor and Actuator Networks: Algorithms and Protocols for Scalable Coordination and Data Communication. – М.: , 2010. – 300 с. Brien Posey. GFI Network Security and PCI Compliance Power Tools. – М.: , 2010. – 488 с. Edited by Benjamin J Goold and Liora Lazarus. Security and Human Rights. – М.: , 2011. – 426 с. Helen Toner, Elspeth Guild and Anneliese Baldaccini. Whose Freedom, Security and Justice?. – М.: , 2011. – 582 с. Open Source Development, Communities and Quality: IFIP 20th World Computer Congress, Working Group 2.3 on Open Source Software, September 7-10, 2008, ... in Information and Communication Technology). – М.: , 2011. – 417 с. Cryptography & Network Security. – М.: , 2007. – 0 с. Principles Of Computer Security, Comptia Security+ And Beyond, Second Edition. – М.: , 2011. – 0 с. Wireless Network Security A Beginners Guide. – М.: , 2011. – 400 с. Principles Of Computer Security Comptia Security+ And Beyond Lab Manual, Second Edition. – М.: , 2011. – 352 с. Network Security: The Complete Reference. – М.: , 2011. – 896 с. Fundamentals Of Network Security. – М.: , 2011. – 672 с. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . – с. Ido Dubrawsky. How to Cheat at Securing Your Network. – М.: Syngress, 2007. – 432 с. Rob Carter, Ben Day, Philip B. Meggs. Typographic Design: Form and Communication. – М.: John Wiley and Sons, Ltd, 2012. – 368 с. PROFESSOR DR MUNIR AHMED and Gershon Adzadi. An Analysis of Information and Communication Technology (ICT). – М.: LAP Lambert Academic Publishing, 2010. – 96 с. Shaek Rana Mohammad Baki Billah and Mohammad Hafizur Rahman. Design & Development of Network Security System using IP Tables. – М.: LAP Lambert Academic Publishing, 2013. – 164 с. Jameel Ahmed. Transform-Domain and DSP Based Secure Speech Communication. – М.: LAP Lambert Academic Publishing, 2011. – 252 с. Xiangqian Chen. DEFENSE AGAINST NODE COMPROMISE IN SENSOR NETWORK SECURITY. – М.: LAP Lambert Academic Publishing, 2009. – 108 с. Manoj Kollam. A Low-cost Embedded Smart Car Security And Theft Control System. – М.: LAP Lambert Academic Publishing, 2011. – 84 с. Shukuru Nyagawa,Claude Mung'ong'o and Fanuel Shechambo. Information, Education and Communication (IEC)Strategy. – М.: LAP Lambert Academic Publishing, 2011. – 116 с. Jim Schnell. Culture and Communication Within HUMINT and Military Intelligence. – М.: LAP Lambert Academic Publishing, 2013. – 208 с. Sylvia Kiamba. Societal Security and Migration. – М.: LAP Lambert Academic Publishing, 2012. – 132 с. Animesh Bhaskar Mani Tripathi,Neelabh Shreesh and Pratik Shanu. Socio-Economic, and Educational Status of Caste and Community in India. – М.: LAP Lambert Academic Publishing, 2012. – 152 с. Khalid Sultan,Abdul Waseem Khattak and Zoha Khalid. Effects of Information and Communication Technologies. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Md. Abul Kalam Siddike and S. M. Mannan. Use of Information and Communication Technology (ICT). – М.: LAP Lambert Academic Publishing, 2011. – 180 с. Vinay Abburi. SECURE AND RELIABLE DEEP SPACE NETWORKS. – М.: LAP Lambert Academic Publishing, 2010. – 68 с. Nnaemeka Ajuka and Chidozie Anyiro. Information and Communication Technologies in Extension Delivery. – М.: LAP Lambert Academic Publishing, 2014. – 92 с. Sikhulumile Sinyolo. Smallholder irrigation, water security and rural household welfare. – М.: LAP Lambert Academic Publishing, 2014. – 192 с. Kanwal Naeem,Badar Naseem Siddiqui and Ishrat Fatima. ICTs, Food Security and Small Farmers. – М.: LAP Lambert Academic Publishing, 2014. – 172 с. Dingfei Li. Information and Communication Technologies on Farming in Miyun, China. – М.: LAP Lambert Academic Publishing, 2014. – 200 с. Qerim Qerimi. A World Interconnected: Sovereignty, Security And Globalization. – М.: LAP Lambert Academic Publishing, 2013. – 80 с. Muhammad Azfar Anwar and Saif ur Rehman. Defense Spending, National Security and Economic Growth of Pakistan. – М.: LAP Lambert Academic Publishing, 2012. – 128 с. Amlan Ganguly,Khaled Bin Arman and Amit Saha. Hospital and Community Pharmacy Practice in Bangladesh. – М.: LAP Lambert Academic Publishing, 2013. – 92 с. Seyed Rahim Benrazavi,H. Hasan and Abdul M. Z. Ahmad. Herzbeg''s Motivation Factors and Communicative Teamwork. – М.: LAP Lambert Academic Publishing, 2011. – 152 с. Syed Zahidur Rashid. Network-Based Parallel Communications. – М.: Scholars' Press, 2015. – 260 с. Subir Biswas. Security and Privacy in Vehicular Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2013. – 204 с. Prathap Jonnadula and Naga Mani Darajula. Secure Group Communication. – М.: LAP Lambert Academic Publishing, 2012. – 64 с. Lusheng Miao,Karim Djouani and Anish Kurien. Network routing and coding in wireless sensor networks. – М.: LAP Lambert Academic Publishing, 2012. – 168 с. Xiaodong He. Automated intrusion prevention mechanism in enhancing network security. – М.: Scholars' Press, 2014. – 128 с. Munnujahan Ara. Reliable and Secure Wireless Communications Systems. – М.: Scholars' Press, 2014. – 140 с. K. Shaila and K. R. Venugopal. Secure Data Communication in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2014. – 240 с. John Tengviel and Kwasi Diawuo. Mobility Models For Mobile AD HOC Network By Simulation. – М.: LAP Lambert Academic Publishing, 2013. – 72 с. Aditya Kumar. Cryptography and Chaos a New Approach in Network Security. – М.: LAP Lambert Academic Publishing, 2015. – 80 с. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с. Omid Mahdi Ebadati E.,Harleen Kaur M. Afshar Alam and Kaebeh Yaeghoobi. Micro-Firewalls for Dynamic Network Security Framework. – М.: LAP Lambert Academic Publishing, 2012. – 292 с. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с. Omar Cheikhrouhou. Secure Group communication in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2013. – 160 с. Vincent Omollo. Enhanced Network Security. – М.: LAP Lambert Academic Publishing, 2013. – 76 с. Faisal Al Mahrouqi. Energy-Aware Security and QoS Routing Trade-offs in Wireless Networks. – М.: LAP Lambert Academic Publishing, 2013. – 68 с. Firkhan Ali Hamid Ali. Vulnerability Analysis on the Computer Network Security. – М.: LAP Lambert Academic Publishing, 2010. – 72 с. Imran Sohail and Sikandar Hayat. Network Security and DDoS. – М.: LAP Lambert Academic Publishing, 2010. – 64 с. Hammad Kazmi. Security and Privacy issues in Near Field Communication (NFC) Systems. – М.: LAP Lambert Academic Publishing, 2012. – 68 с. Mohammad Faisal. Networks Security and Communication. – М.: LAP Lambert Academic Publishing, 2012. – 56 с. Edmond K. Machie. Network Attack Traceback And React. – М.: LAP Lambert Academic Publishing, 2013. – 208 с. Ekoningtyas Margu Wardani and Muyanja Ssenyonga. Soaring Food Prices, Food Security, and Poverty in Indonesia. – М.: LAP Lambert Academic Publishing, 2013. – 128 с. Maxwell Musingafi,Emmanuel Dumbu and Patrick Chadamoyo. Public Governance and Community Leadership. – М.: LAP Lambert Academic Publishing, 2012. – 232 с. Nader Sh. Kandelousi,A. Janee Ali and A. Abdollahi. Interpersonal Communication and Communication Satisfaction. – М.: LAP Lambert Academic Publishing, 2010. – 112 с. Rajiv Kumar Chaurasia,Ganesh Dubey and Bhaskar Chaurasia. Social and Communicative Participation of Students. – М.: LAP Lambert Academic Publishing, 2013. – 76 с. Prashant Pittalia. Ecommerce Security Real Life Cases And Practical Solutions. – М.: , 2015. – 72 с. Лучшие результаты Ничего не найдено Дополнительные результаты Наука человековедения. интервью с Д. Уолтоном, профессором London Metropolitan University, экспертом CIPD. Chartered Institute of Personnel and Development, автором программы Master of Arts in Human Resource Strategies. И. Смирнова, "Кадровый менеджмент", № 5, июль-август 2007. Специализированный модуль FS-CD. Collections and Disbursements - "Сборы и Выплаты" и его возможности. О.А. Глущенко, "Финансовый менеджмент в страховой компании", № 2, II квартал 2007. Бюджетирование страховой компании на базе Oracle Enterprise Planning and Budgeting. Д.В. Лесоводский, "Финансовый менеджмент в страховой компании", № 3, III квартал 2006. Построить идеальный каскад информации удается далеко не всегда. интервью с А. Синикас. Angela D. Sinickas, президентом международной консалтинговой компании Sinickas Communications, Inc. США, www.sinicom. com. В. Правоторов, "Кадровый менеджмент", № 4, май-июнь 2006. Регулирование операций торгового финансирования: новые инициативы. интервью с Д. Шмандом, вице-председателем Банковской комиссии ICC по supply chain finance, главой подразделения Trade Finance and Cash Management Corporates EMEA в Global Transaction Banking. GTB division Deutsche Bank. Н. Макарова, "Международные банковские операции", N 2, апрель-июнь 2012 г. Ужин в темноте в стиле Малевича и Новый год в Хаммере". Что может выть лучше?". интервью с Н. Саниной, индивидуальным предпринимателем и креативным директором компании "San and stars". М. Сипатова, "Арсенал предпринимателя", N 12, декабрь 2011 г. На пути к новому стандарту в торговом финансировании. интервью с А. Кастерманом, руководителем Trade and Supply Chain, SWIFT, сопредседателем рабочей группы ICC-BPO. Э. Шакирова, "Международные банковские операции", N 4, октябрь-декабрь 2011 г. Уильям Савадж: Мотивировать людей в Нижнем Новгороде и Новосибирске нужно по-разному". интервью с У. Саваджем, вице-президентом корпорации Intel, подразделение Software and Services Group. М. Холкина, "Управление персоналом", N 14, июль 2010 г. Цены под контролем: the present and the future. С. Стройкова, И. Леметюйнен, "Консультант", № 19, сентябрь 2009. Основной арсенал "охотника" - его network: кого он знает на рынке и качество этих отношений. С. Плетнева, "Управление персоналом", № 12, июнь 2009. Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Сергей, 01.06 Спасибо большое за оперативность! сегодня преподу все скинули. надеюсь его все устроит