Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Wireless Communications and Applications: First International Conference, ICWCA 2011, Sanya, China, August 1-3, 2011, Revised Selected Papers (Lecture ... and Telecommunications Engineering). – М.: , 2012. – 468 с.
  2. Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  3. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с.
  4. Bennett Harrison, Marcus Weiss, Marcus S. Weiss. Workforce Development Networks: Community-Based Organizations and Regional Alliances. – М.: , 0. – 0 с.
  5. Bennett Harrison, Marcus Weiss, Marcus S. Weiss. Workforce Development Networks: Community-Based Organizations and Regional Alliances. – М.: , 0. – 0 с.
  6. Charles P. Jones. Investments : Analysis and Management. – М.: , 0. – 0 с.
  7. Timothy Braithwaite. Securing E-Business Systems: A Guide for Managers and Executives. – М.: , 0. – 0 с.
  8. Gladson I., Ph.D. Nwanna. American Businesses Abroad: How to Protect Your Assets and Personnel. – М.: , 0. – 0 с.
  9. Andrew Sun. Using and Managing Ppp. – М.: , 0. – 0 с.
  10. Jonathan S. Held, John R. Bowers. Securing E-Business Applications and Communications. – М.: , 0. – 0 с.
  11. Vesna Hassler. Security Fundamentals for E-Commerce (Artech House Computer Security Series). – М.: , 0. – 0 с.
  12. George H. Bodnar. Accounting Information Systems (9th Edition). – М.: , 2003. – 0 с.
  13. Richard Coyne. Cornucopia Limited : Design and Dissent on the Internet. – М.: , 2005. – 272 с.
  14. Protection of Civilian Infrastructure from Acts of Terrorism (NATO Security through Science Series / NATO Security through Science Series C: Environmental Security). – М.: , 2006. – 269 с.
  15. Patrick Traynor, Patrick McDaniel, Thomas La Porta. Security for Telecommunications Networks (Advances in Information Security). – М.: , 2008. – 182 с.
  16. Fredrik Nilsson, Communications Axis. Intelligent Network Video: Understanding Modern Video Surveillance Systems. – М.: , 2008. – 440 с.
  17. Nicholas Kaufman. Whose Peace?: Hegemony, Development, and Social Change in Post-Conflict El Salvador. – М.: , 2008. – 104 с.
  18. Towards Sustainable Society on Ubiquitous Networks: The 8th IFIP Conference on e-Business, e-Services, and e-Society (I3E 2008), September 24 - 26, 2008, ... Federation for Information Processing). – М.: , 2008. – 366 с.
  19. Xavier Carcelle. Power Line Communications in Practice. – М.: , 2009. – 370 с.
  20. Bel G. Raggad. Information Security Management: Concepts and Practice. – М.: , 2010. – 871 с.
  21. Karen Pirtle BSCJ. The Legal Nurse Consultant and Life Care Planners Guide to Social Media. – М.: , 2010. – 116 с.
  22. Bastian Cleve. Film Production Management. – М.: Focal Press, 2006. – 240 с.
  23. Klaus W. Grewlich. Governance in "Cyberspace: Access and Public Interest in Global Communications (Law and Electronic Commerce, V. 9). – М.: , 0. – 0 с.
  24. Jeff Crume. Inside Internet Security: What Hackers Don't Want You To Know. – М.: , 0. – 0 с.
  25. Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards and Applications (Wireless Networks and Mobile Communications). – М.: , 2008. – 424 с.
  26. Handbook of Information and Communication Security. – М.: , 2010. – 800 с.
  27. Rob Scrimger, Paul LaSalle, Mridula Parihar, Meeta Gupta. TCP/IP Bible. – М.: John Wiley and Sons, Ltd, 2002. – 624 с.
  28. James Momoh. Operation and Control of Electric Energy Processing Systems. – М.: , 2010. – 202 с.
  29. Principles Of Computer Security, Comptia Security+ And Beyond, Second Edition. – М.: , 2011. – 0 с.
  30. Session Initiation Protocol (Sip): Controlling Convergent Networks. – М.: , 2011. – 264 с.
  31. Wireless Network Security A Beginners Guide. – М.: , 2011. – 400 с.
  32. Operating Systems Demystified. – М.: , 2011. – 400 с.
  33. Cisco: A Beginner'S Guide, Fourth Edition. – М.: , 2011. – 696 с.
  34. Voice & Data Communications Handbook, Fifth Edition. – М.: , 2011. – 650 с.
  35. Eoghan Casey. Digital Evidence and Computer Crime. – М.: , . –  с.
  36. Robert Stephens. Configuring Check Point NGX VPN-1/Firewall-1. – М.: , 2005. – 608 с.
  37. Thomas Porter, Michael Gough. How to Cheat at Voip Security (How to Cheat) (How to Cheat) (How to Cheat). – М.: , 2007. – 432 с.
  38. Fred Eady. Implementing 802.11 with Microcontrollers: Wireless Networking for Embedded Systems Designers (Embedded Technology). – М.: , 2005. – 400 с.
  39. Timothy Stapko. Practical Embedded Security: Building Secure Resource-Constrained Systems. – М.: Newnes, 2007. – 480 с.
  40. Susan Snedaker, Chris Rima. Business Continuity and Disaster Recovery Planning for IT Professionals. – М.: Syngress, 2014. –  с.
  41. Spencer, Sabina. The Heart Of Leadership. – М.: , 2014. –  с.
  42. Govind Sharma and Manish Gupta. Secure routing in wireless mobile Ad-Hoc network. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  43. Susmita Mandal. A Key Management Solution for HIPAA Compliance. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  44. Jayendra Singh,Satvik Vats and Ankit Dagar. Control Area Network for Vehicle Security System. – М.: LAP Lambert Academic Publishing, 2013. – 88 с.
  45. Jai Parkash,Mr. Ashutosh Gupta and Dr. Pradeep Kumar Rana. SMS based Wireless Temperature monitoring. – М.: LAP Lambert Academic Publishing, 2010. – 100 с.
  46. Arindam Sarkar and J. K. Mandal. Artificial Neural Network Guided Secured Communication Techniques. – М.: LAP Lambert Academic Publishing, 2012. – 128 с.
  47. Husam Abduldaem Mohammed. Ring Network Based on Fiber Distributed Data Interface (FDDI). – М.: LAP Lambert Academic Publishing, 2014. – 136 с.
  48. AbdolMajid Shahgholi,Dr. K. K. Shukla and Dr. Rajeev Srivastava. LARGE SCALE WIRELESS SENSOR NETWORK FOR TACTICAL MILITARY APPLICATIONS. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  49. Rshdee Alhakim,Emmanuel Simeu and Kosai Raoof. Optimizing the performance of synchronization process. – М.: LAP Lambert Academic Publishing, 2013. – 284 с.
  50. Samy S. Soliman. Hierarchically Clustered Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 156 с.
  51. Yang Liu. Towards Enhanced Security and Reliability in Wireless Communications. – М.: LAP Lambert Academic Publishing, 2010. – 144 с.
  52. M. Sadiq Ali Khan and S. M. Aqil Burney. Recent Trends in Intrusion Detection System & Network Monitoring. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  53. Yasir Waseem Iqbal. Sociology Of Networking. – М.: LAP Lambert Academic Publishing, 2013. – 88 с.
  54. Vinay Abburi. SECURE AND RELIABLE DEEP SPACE NETWORKS. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  55. Gideon Nomdo. The 'Poor and the Rich' in Luke-Acts. – М.: LAP Lambert Academic Publishing, 2011. – 180 с.
  56. Ankur Gupta and Bhupendra Gupta. Random Networks and its Applications. – М.: LAP Lambert Academic Publishing, 2013. – 100 с.
  57. Reza Mohammad Hossein and Kamran Gholamahmadi. A Combinational Security-Model In Service-Oriented Architecture. – М.: LAP Lambert Academic Publishing, 2014. – 136 с.
  58. Subhankar Chattopadhyay and Ashok Kumar Turuk. Key Pre-distribution and Key Revocation in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2011. – 72 с.
  59. Ashit Kumar Dutta and Abdul Rahaman Wahab Sait. Computer Networks from Scratch. – М.: LAP Lambert Academic Publishing, 2013. – 324 с.
  60. Subir Biswas. Security and Privacy in Vehicular Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2013. – 204 с.
  61. Sumaya Saad Sulaiman and Sarab M. Hameed. A Fuzzy Based Clustering for Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  62. Arnab Banerjee,ANIRUDDHA BHATTACHARYYA and DIPAYAN BOSE. IMPLEMENTATION OF A TRUST BASED SECURE ROUTING PROTOCOL IN MANET. – М.: LAP Lambert Academic Publishing, 2012. – 292 с.
  63. Ali Pesaranghader and Esmaeel Marjani. Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2013. – 108 с.
  64. Younus Javed and Hassan Tahir. Optimized Security Protocol for Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  65. Sandeep Kr. Agarwal and Dr. K. V. Arya. Security in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  66. Prathap Jonnadula and Naga Mani Darajula. Secure Group Communication. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  67. Mohammed azharuddin Adhoni. Secure communication in p2p networks. – М.: LAP Lambert Academic Publishing, 2012. – 124 с.
  68. Mohamed Rasslan,Yasser Dakroury and Heba Aslan. Group Key Distribution in Computer Networks. – М.: LAP Lambert Academic Publishing, 2012. – 212 с.
  69. E.A.Mary Anita. Securing Multicast Routing Protocols for Mobile Adhoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  70. Marzieh Yazdanipour and Afsaneh Yazdanipour. Wireless Mesh Networks. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  71. Hamid Reza Barzegar,Mahdiyeh Barzegar and Neshat Alidad. Energy Efficient And Secured Communication For Manets In Military. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  72. Mazen Mohammed,Alaa Eldin Rohiem and Ali El-moghazy. CSRTP. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  73. Cong Hoan Vu and Adeyinka Soneye. Collaborative Attacks on MANETs. – М.: LAP Lambert Academic Publishing, 2010. – 76 с.
  74. Niroj Kumar Pani and Dr. Ashok Kumar Turuk. A Hybrid Zone-Based Routing Protocol for Secure Communication in MANET. – М.: LAP Lambert Academic Publishing, 2010. – 92 с.
  75. Sourav Kanti Addya and Ashok Kumar Turuk. Key Pre-distribution in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  76. Rupa Ch. and Avadhani P. S. Modern Security Methods in Applied Computer Science. – М.: Scholars' Press, 2014. – 124 с.
  77. K. Shaila and K. R. Venugopal. Secure Data Communication in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2014. – 240 с.
  78. Sanjeev Karmakar and Manoj K. Kowar. A Comprehensive Lecture Notes on RSA-1024 Cryptography. – М.: LAP Lambert Academic Publishing, 2013. – 160 с.
  79. Chandan Koner. Authentications in Remote and Mobile System Communications. – М.: LAP Lambert Academic Publishing, 2014. – 128 с.
  80. P. Ganesh Kumar and S. Ramesh. Secure Routing Protocol for ICMN. – М.: LAP Lambert Academic Publishing, 2014. – 64 с.
  81. Ali Rezaeian and Azad Azadmanesh. Sensor Area Coverage. – М.: LAP Lambert Academic Publishing, 2014. – 240 с.
  82. Aditya Kumar. Cryptography and Chaos a New Approach in Network Security. – М.: LAP Lambert Academic Publishing, 2015. – 80 с.
  83. Tuncay Ercan. Wireless Networks for Corporations. – М.: LAP Lambert Academic Publishing, 2010. – 120 с.
  84. Lukman Sharif and Munir Ahmed. IPSec: A Practical Approach. – М.: LAP Lambert Academic Publishing, 2010. – 128 с.
  85. Albert Wasef. Managing and Complementing PKI for Securing Vehicular Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2011. – 204 с.
  86. Cosmin Dini and Pascal Lorenz. Data Management in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2011. – 144 с.
  87. Tejpal Singh. Security Protocols for Data Routing in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  88. Marimuthu Kanagaraj and Eswari Venkatachalam. Multifactor Authentication Protocol for a Secured WSN. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  89. Saurabh Mittal,Ankita Mittal and Sapna Boora. Security Enhancement using Dynamic Cache on DSR Based MANETS. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  90. Shilpa Jaiswal and Sumeet Agrawal. Detection of Network Worm to Eliminate Security Threats in MANET. – М.: LAP Lambert Academic Publishing, 2012. – 52 с.
  91. Devendra Prasad. Relible Data Dissemination in Mobile Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 144 с.
  92. Pallavi Kaliyar and Gagan Singla. A secure routing protocol for MANETs against byzantine attacks. – М.: LAP Lambert Academic Publishing, 2013. – 84 с.
  93. Haitham ELwahsh. Secure Service Discovery Protocol for ad-hoc Networks "hash function". – М.: LAP Lambert Academic Publishing, 2013. – 144 с.
  94. Omar Cheikhrouhou. Secure Group communication in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2013. – 160 с.
  95. Pushphas Chaturvedi and Kunal Gupta. Enhanced Packet Dissembling Schemes For Jamming Attacks Prevention. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  96. Vincent Omollo. Enhanced Network Security. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  97. Sunil Kumar Senapati and Prof. Pabitra Mohan Khilar. SECURING FSR PROTOCOL AGAINST DATA PACKET DROPPING IN MANET. – М.: LAP Lambert Academic Publishing, 2010. – 64 с.
  98. Manuj Mishra,Govind Sharma and Ram Pathak. Secure Routing In Wireless Mobile Ad Hoc Network. – М.: LAP Lambert Academic Publishing, 2014. – 84 с.
  99. Sharmin Rashid Linta and Md.Ridgewan Khan Neuton. Today’s Impact on Communication System by IP Spoofing. – М.: LAP Lambert Academic Publishing, 2012. – 72 с.
  100. Amel Chowdhury. Deployment of a Secure VoIP System. – М.: LAP Lambert Academic Publishing, 2014. – 68 с.
  101. Chaman Singh and Kishori Lal Bansal. NAT Traversal and Detection. – М.: LAP Lambert Academic Publishing, 2012. – 324 с.
  102. Seppo Sirkemaa. On Local Area Network Management. – М.: LAP Lambert Academic Publishing, 2010. – 248 с.
  103. Mehdi Hussain and Mureed Hussain. Efficient Data Hiding Techniques with Enhanced Capacity. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  104. Mohammad Faisal. Networks Security and Communication. – М.: LAP Lambert Academic Publishing, 2012. – 56 с.
  105. Affan Yasin,Hafiz Adnan Shafiq and Muhammad Ijlal Hasnain. Software Architecture for Centralized Health Database. – М.: LAP Lambert Academic Publishing, 2013. – 64 с.
  106. Benjamin Eze. Policy-based Data Sharing for Event-driven Services in B2B Networks. – М.: LAP Lambert Academic Publishing, 2011. – 148 с.
  107. Edmond K. Machie. Network Attack Traceback And React. – М.: LAP Lambert Academic Publishing, 2013. – 208 с.
  108. Hassen Alsafi and Mohammed Azhruddin. The Security Issues for Smart Grids Applications on Cloud Computing. – М.: LAP Lambert Academic Publishing, 2013. – 60 с.
  109. Tanveer Zia. A Security Framework for Wireless Sensor Networks (WSN). – М.: LAP Lambert Academic Publishing, 2013. – 160 с.
  110. Dirk Lessner. Network Security for Embedded Systems. – М.: LAP Lambert Academic Publishing, 2009. – 232 с.
  111. Musharrif Hussain and Sulman Mahmood. Secure Software and Comm. on Handheld Devices. – М.: LAP Lambert Academic Publishing, 2011. – 60 с.
  112. Fatty Mustafa Salem,Maged Hamada Ibrahim and Ibrahim Ismail Ibrahim. Efficient and Secure Message Transmission in Vehicular Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  113. Stephen Murove,S. B. Mangena and B. Jones. Firewall Evaluation:Models for Major Decisions in Computer Security. – М.: LAP Lambert Academic Publishing, 2014. – 236 с.
  114. Al-Sakib Khan Pathan. Securing WSN with Lightweight Resource-Efficient Schemes. – М.: LAP Lambert Academic Publishing, 2011. – 116 с.
  115. Noor Ul Amin. Secure MANET Communication Based on Hybrid Cryptosystem. – М.: LAP Lambert Academic Publishing, 2013. – 64 с.
  116. Gulzar Mehmood,Nizamud Din and Muhammad Nawaz Khan. Privacy Preserving Scheme for Body Sensor Networks Based on CDLP. – М.: LAP Lambert Academic Publishing, 2014. – 56 с.
  117. Nirmalya Kar,Ashim Saha and Mrinal Kanti Debbarma. Biometric Based Attendance System. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  118. Sheriza Hassan-Ali. Extranets: Designing, Planning and Implementation. – М.: LAP Lambert Academic Publishing, 2010. – 92 с.
  119. Faeiz Alserhani,Irfan Awan and Monis Akhlaq. Correlation and Aggregation of Security Alerts in Networks. – М.: LAP Lambert Academic Publishing, 2012. – 256 с.
  120. Sachin Tripathi and Gosta Pada Biswas. Enhancements on Internet Applications. – М.: LAP Lambert Academic Publishing, 2011. – 148 с.
  121. S. Balamurugan and S. Charanyaa. Principles of Social Network Data Security. – М.: LAP Lambert Academic Publishing, 2014. – 92 с.
  122. Jegan Ganeshamoorthy and Volker Hoffmann. Assessment of Local Perception of Wealth and Poverty Dynamics. – М.: LAP Lambert Academic Publishing, 2011. – 160 с.
  123. Amarnath Surendranath and Saranya Chinnusamy. Evaluation of Sustainability in Agro Ecological Systems of Tamil Nadu. – М.: LAP Lambert Academic Publishing, 2014. – 140 с.

Дополнительные результаты

  1. Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с.
  2. Andrej Fatur. EU Competition Law and the Information and Communication Technology Network Industries: Economic versus Legal Concepts in Pursuit of (Consumer) Welfare (Hart Studies in Competition Law). – М.: , 2012. – 312 с.
  3. Security and Privacy in Mobile Information and Communication Systems: Third International ICST Conference, MOBISEC 2011, Aalborg, Denmark, May 17-19, ... and Telecommunications Engineering). – М.: , 2012. – 195 с.
  4. Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  5. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с.
  6. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с.
  7. Security and Development in Global Politics: A Critical Comparison. – М.: , 2012. – 360 с.
  8. Advances in Electronic Commerce, Web Application and Communication: Volume 2 (Advances in Intelligent and Soft Computing). – М.: , 2012. – 640 с.
  9. Luis Lobo-Guerrero. Insuring Security: Biopolitics, security and risk. – М.: , 2012. – 178 с.
  10. Terrorism and the Olympics: Major Event Security and Lessons for the Future. – М.: , 2012. – 272 с.
  11. Giorgio S. Questa. Fixed Income Analysis for the Global Financial Market: Money Market, Foreign Exchange, Securities, and Derivatives. – М.: Wiley, 1999. – 368 с.
  12. Rattan Lal, David Hansen, Norman Uphoff, Steven Slack, Rattan Lal. Food Security and Environmental Quality in the Developing World. – М.: , 0. – 0 с.
  13. International Conference on Information and Communication technologies, Andrew J. Frew, Martin Hitz, Karl W. Wober. Information and Communication Technologies in Tourism 2002: Proceedings of the International Conference in Innsbruck, Austria, 2002 (Springer Computer Science). – М.: , 0. – 0 с.
  14. Merrelyn Emery, Ronald E. Purser. The Search Conference : A Powerful Method for Planning Organizational Change and Community Action (Jossey-Bass Public Administration). – М.: , 0. – 0 с.
  15. Paul M. Hildreth, Chris Kimble. Knowledge Networks: Innovation Through Communities of Practice. – М.: , 0. – 0 с.
  16. Hellen Davis. Influence and Communication. – М.: , 0. – 0 с.
  17. Dirk Jaap Vriens, Dirk Vriens. Information and Communications Technology for Competitive Intelligence. – М.: , 0. – 0 с.
  18. Bill Withers, Keami D. Lewis. The Conflict and Communication Activity Book: 30 High-Impact Training Exercises for Adult Learners. – М.: , 0. – 0 с.
  19. Susan Echaore-McDavid. Career Opportunities in Law Enforcement, Security, and Protective Services (The Career Opportunities Series). – М.: , 0. – 0 с.
  20. Geoff Dow, Rachel Parker. Business, Work, and Community: Into the New Millennium. – М.: , 0. – 0 с.
  21. Maurice, Ph.D. Youakim. Social Security and Medicare for the New Millenium. – М.: , 0. – 0 с.
  22. Benjamin Shepard, Ronald Hayduk. From ACT UP to the WTO: Urban Protest and Community Building in the Era of Globalization. – М.: , 0. – 0 с.
  23. Hildegarde Hannum, Nancy Jack Todd. People, Land, and Community: Collected E.F. Schumacher Society Lectures. – М.: , 0. – 0 с.
  24. Jonathan Y. Okamura. Imagining the Filipino American Diaspora : Transnational Relations, Identities, and Communities (Asian Americans: Reconceptualizing Culture, History, Politics). – М.: , 0. – 0 с.
  25. Timothy Beatley. Native to Nowhere: Sustaining Home and Community in a Global Age. – М.: , 0. – 0 с.
  26. Nancy Lynch Street, Marilyn J. Matelski. American Businesses in China: Balancing Culture and Communication. – М.: , 0. – 0 с.
  27. William H. Dutton, Malcolm Peltu. Information and Communication Technologies: Visions and Realities. – М.: , 0. – 0 с.
  28. Yrjo Engestrom, David Middleton. Cognition and Communication at Work. – М.: , 0. – 0 с.
  29. Retail Security and Loss Prevention. – М.: , 0. – 0 с.
  30. Physical Security and the Inspection Process. – М.: , 0. – 0 с.
  31. John De LA Mothe, Albert N. Link. Networks, Alliances and Partnerships in the Innovation Process (Economics of Science, Technology, and Innovation, 28). – М.: , 0. – 0 с.
  32. Louis Barajas. The Latino Journey to Financial Greatness : The 10 Steps to Creating Wealth, Security, and a Prosperous Future for You and Your Family. – М.: , 0. – 0 с.
  33. Don Silver. The Generation X Money Book: Achieving Security and Independence. – М.: , 0. – 0 с.
  34. Jonathan Gruber, David A. Wise. Social Security and Retirement Around the World (NATIONAL BUREAU OF ECONOMIC RESEARCH CONFERENCE REPORT). – М.: , 0. – 0 с.
  35. Geoff Craighead. High-Rise Security and Fire Life Safety, Second Edition. – М.: , 0. – 0 с.
  36. Roberta Bragg. MCSE Training Guide (70-220): Windows 2000 Network Security Design, Second Edition. – М.: , 0. – 0 с.
  37. Marian Quigley, Marian Quiqley. Information Security and Ethics: Social and Organizational Issues. – М.: , 0. – 0 с.
  38. Jonathan S. Held, John R. Bowers. Securing E-Business Applications and Communications. – М.: , 0. – 0 с.
  39. Anup K. Ghosh. E-Commerce Security and Privacy. – М.: , 0. – 0 с.
  40. Mavis A. Ampah. Connecting Sub-Saharan Africa: A World Bank Group Strategy for Information and Communication Technology Sector Development (World Bank Working Papers) (World Bank Working Papers). – М.: , 2005. – 0 с.
  41. Jairo A. Arboleda. Voices of the Poor in Colombia: Strengthening Livelihoods, Families and Communities. – М.: , 2004. – 0 с.
  42. Information and Communication Technologies in Tourism 2005 : Proceedings of the International Conference in Innsbruck, Austria, 2005. – М.: , 2005. – 0 с.
  43. Kenneth Atchity. How to Escape Lifetime Security and Pursue Your Impossible Dream: A Guide to Transforming Your Career. – М.: , 2004. – 0 с.
  44. Information and Communications Technology for Competitive Intelligence. – М.: , 2003. – 0 с.
  45. Information and Communication Technologies in Tourism 2004. – М.: , 2004. – 0 с.
  46. A.J. Frew. Information and Communication Technologies in Tourism 2003. – М.: , 2003. – 0 с.
  47. Joseph White. False Alarm : Why the Greatest Threat to Social Security and Medicare Is the Campaign to "Save" Them (Century Foundation Book). – М.: , 2003. – 0 с.
  48. Advances in Security and Payment Methods for Mobile Commerce. – М.: , 2004. – 0 с.
  49. Bob Thompson. Real Estate & The New Economy: The Impact Of Information And Communications Technology (Real Estate Issues). – М.: , 2005. – 0 с.
  50. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с.
  51. Information and Communication Technology and the Teacher of the Future (IFIP International Federation for Information Processing). – М.: , 2003. – 0 с.
  52. Mediating Science Learning Through Information and Communications Technology. – М.: , 2004. – 0 с.
  53. Information and Communication Technologies and Real-Life Learning : New Education for the Knowledge Society (IFIP International Federation for Information Processing). – М.: , 2005. – 0 с.
  54. Ron Ben Natan. Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase. – М.: , 2005. – 432 с.
  55. Joe Conason. The Raw Deal: How the Bush Republicans Plan to Destroy Social Security and the Legacy of the New Deal. – М.: , 2005. – 141 с.
  56. Barbara Benedict Bunker, Billie T. Alban. The Handbook of Large Group Methods: Creating Systemic Change in Organizations and Communities (Jossey-Bass Business & Management). – М.: , 2006. – 480 с.
  57. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с.
  58. Sexualities and Communication in Everyday Life: A Reader. – М.: , 2006. – 344 с.
  59. Helen James. Security and Stustaibable Developement in Myanmar/Burma (Routledge Contemporary Southeast Asia Series). – М.: , 2006. – 231 с.
  60. Information and Communication Technologies for Development and Poverty Reduction: The Potential of Telecommunications (International Food Policy Research Institute). – М.: , 2006. – 392 с.
  61. Information and Communications for Development 2006: Global Trends and Policies. – М.: World Bank Publications, 2006. – 328 с.
  62. The SAGE Handbook of Gender and Communication. – М.: , 2006. – 504 с.
  63. Susan Echaore-McDavid. Career Opportunities In Law Enforcement, Security And Protective Services (Career Opportunities). – М.: , 2005. – 272 с.
  64. Information and Communication Technologies for Development and Poverty Reduction: The Potential of Telecommunications. – М.: , 2006. – 392 с.
  65. Roger I. Cartwright. Key Concepts in Information and Communication Technology. – М.: Palgrave Macmillan, 2005. – 232 с.
  66. Roy H. Campbell, Prasad G. Naldurg. Security and Survivability: Analyzing, Modeling, and Verifying Dynamic Recovery in Insecure Systems. – М.: , 2008. – 240 с.
  67. Network Security. – М.: , 2008. – 370 с.
  68. Daya Thussu. International Media and Communication: A Dictionary (Oxford Studies in Comparative Syntax). – М.: , 2008. – 0 с.
  69. Niranjala Weerakkody. Research Methods for Media and Communication. – М.: Oxford University Press, 2008. – 304 с.
  70. Ibp Usa. Thailand Army, National Security And Defense Policy Handbook. – М.: , 2008. – 300 с.
  71. Ibp Usa. Turkey Army, National Security And Defense Policy Handbook (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с.
  72. Ibp Usa. Ukraine Army, National Security And Defense Policy Handbook (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с.
  73. Social Security and Development. – М.: , 2008. – 256 с.
  74. Ibp Usa. CZECH REPUBLIC ARMY, NATIONAL SECURITY AND DEFENSE POLICY HANDBOOK (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с.
  75. Ibp Usa. ESTONIA ARMY, NATIONAL SECURITY AND DEFENSE POLICY HANDBOOK (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с.
  76. Ibp Usa. Finland Army, National Security And Defense Policy Handbook (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с.
  77. Ibp Usa. Germany Army, National Security And Defense Policy Handbook (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с.
  78. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с.
  79. Daniel Clark. Network Access Control 100 Success Secrets - 100 Most Asked NAC Questions on Implementation and Deployment of unify endpoint security technology, user ... and network security enforcement. – М.: , 2008. – 180 с.
  80. Robert Rattle. Computing Our Way to Paradise?: The Role of Internet and Communication Technologies in Sustainable Consumption and Globalization (Globalization and the Environment). – М.: , 2010. – 246 с.
  81. Handbook of Information and Communication Security. – М.: , 2010. – 800 с.
  82. Amiya Nayak, Ivan Stojmenovic. Wireless Sensor and Actuator Networks: Algorithms and Protocols for Scalable Coordination and Data Communication. – М.: , 2010. – 300 с.
  83. Brien Posey. GFI Network Security and PCI Compliance Power Tools. – М.: , 2010. – 488 с.
  84. Edited by Benjamin J Goold and Liora Lazarus. Security and Human Rights. – М.: , 2011. – 426 с.
  85. Helen Toner, Elspeth Guild and Anneliese Baldaccini. Whose Freedom, Security and Justice?. – М.: , 2011. – 582 с.
  86. Open Source Development, Communities and Quality: IFIP 20th World Computer Congress, Working Group 2.3 on Open Source Software, September 7-10, 2008, ... in Information and Communication Technology). – М.: , 2011. – 417 с.
  87. Cryptography & Network Security. – М.: , 2007. – 0 с.
  88. Principles Of Computer Security, Comptia Security+ And Beyond, Second Edition. – М.: , 2011. – 0 с.
  89. Wireless Network Security A Beginners Guide. – М.: , 2011. – 400 с.
  90. Principles Of Computer Security Comptia Security+ And Beyond Lab Manual, Second Edition. – М.: , 2011. – 352 с.
  91. Network Security: The Complete Reference. – М.: , 2011. – 896 с.
  92. Fundamentals Of Network Security. – М.: , 2011. – 672 с.
  93. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . –  с.
  94. Ido Dubrawsky. How to Cheat at Securing Your Network. – М.: Syngress, 2007. – 432 с.
  95. Rob Carter, Ben Day, Philip B. Meggs. Typographic Design: Form and Communication. – М.: John Wiley and Sons, Ltd, 2012. – 368 с.
  96. PROFESSOR DR MUNIR AHMED and Gershon Adzadi. An Analysis of Information and Communication Technology (ICT). – М.: LAP Lambert Academic Publishing, 2010. – 96 с.
  97. Shaek Rana Mohammad Baki Billah and Mohammad Hafizur Rahman. Design & Development of Network Security System using IP Tables. – М.: LAP Lambert Academic Publishing, 2013. – 164 с.
  98. Jameel Ahmed. Transform-Domain and DSP Based Secure Speech Communication. – М.: LAP Lambert Academic Publishing, 2011. – 252 с.
  99. Xiangqian Chen. DEFENSE AGAINST NODE COMPROMISE IN SENSOR NETWORK SECURITY. – М.: LAP Lambert Academic Publishing, 2009. – 108 с.
  100. Manoj Kollam. A Low-cost Embedded Smart Car Security And Theft Control System. – М.: LAP Lambert Academic Publishing, 2011. – 84 с.
  101. Shukuru Nyagawa,Claude Mung'ong'o and Fanuel Shechambo. Information, Education and Communication (IEC)Strategy. – М.: LAP Lambert Academic Publishing, 2011. – 116 с.
  102. Jim Schnell. Culture and Communication Within HUMINT and Military Intelligence. – М.: LAP Lambert Academic Publishing, 2013. – 208 с.
  103. Sylvia Kiamba. Societal Security and Migration. – М.: LAP Lambert Academic Publishing, 2012. – 132 с.
  104. Animesh Bhaskar Mani Tripathi,Neelabh Shreesh and Pratik Shanu. Socio-Economic, and Educational Status of Caste and Community in India. – М.: LAP Lambert Academic Publishing, 2012. – 152 с.
  105. Khalid Sultan,Abdul Waseem Khattak and Zoha Khalid. Effects of Information and Communication Technologies. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  106. Md. Abul Kalam Siddike and S. M. Mannan. Use of Information and Communication Technology (ICT). – М.: LAP Lambert Academic Publishing, 2011. – 180 с.
  107. Vinay Abburi. SECURE AND RELIABLE DEEP SPACE NETWORKS. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  108. Nnaemeka Ajuka and Chidozie Anyiro. Information and Communication Technologies in Extension Delivery. – М.: LAP Lambert Academic Publishing, 2014. – 92 с.
  109. Sikhulumile Sinyolo. Smallholder irrigation, water security and rural household welfare. – М.: LAP Lambert Academic Publishing, 2014. – 192 с.
  110. Kanwal Naeem,Badar Naseem Siddiqui and Ishrat Fatima. ICTs, Food Security and Small Farmers. – М.: LAP Lambert Academic Publishing, 2014. – 172 с.
  111. Dingfei Li. Information and Communication Technologies on Farming in Miyun, China. – М.: LAP Lambert Academic Publishing, 2014. – 200 с.
  112. Qerim Qerimi. A World Interconnected: Sovereignty, Security And Globalization. – М.: LAP Lambert Academic Publishing, 2013. – 80 с.
  113. Muhammad Azfar Anwar and Saif ur Rehman. Defense Spending, National Security and Economic Growth of Pakistan. – М.: LAP Lambert Academic Publishing, 2012. – 128 с.
  114. Amlan Ganguly,Khaled Bin Arman and Amit Saha. Hospital and Community Pharmacy Practice in Bangladesh. – М.: LAP Lambert Academic Publishing, 2013. – 92 с.
  115. Seyed Rahim Benrazavi,H. Hasan and Abdul M. Z. Ahmad. Herzbeg''s Motivation Factors and Communicative Teamwork. – М.: LAP Lambert Academic Publishing, 2011. – 152 с.
  116. Syed Zahidur Rashid. Network-Based Parallel Communications. – М.: Scholars' Press, 2015. – 260 с.
  117. Subir Biswas. Security and Privacy in Vehicular Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2013. – 204 с.
  118. Prathap Jonnadula and Naga Mani Darajula. Secure Group Communication. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  119. Lusheng Miao,Karim Djouani and Anish Kurien. Network routing and coding in wireless sensor networks. – М.: LAP Lambert Academic Publishing, 2012. – 168 с.
  120. Xiaodong He. Automated intrusion prevention mechanism in enhancing network security. – М.: Scholars' Press, 2014. – 128 с.
  121. Munnujahan Ara. Reliable and Secure Wireless Communications Systems. – М.: Scholars' Press, 2014. – 140 с.
  122. K. Shaila and K. R. Venugopal. Secure Data Communication in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2014. – 240 с.
  123. John Tengviel and Kwasi Diawuo. Mobility Models For Mobile AD HOC Network By Simulation. – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  124. Aditya Kumar. Cryptography and Chaos a New Approach in Network Security. – М.: LAP Lambert Academic Publishing, 2015. – 80 с.
  125. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  126. Omid Mahdi Ebadati E.,Harleen Kaur M. Afshar Alam and Kaebeh Yaeghoobi. Micro-Firewalls for Dynamic Network Security Framework. – М.: LAP Lambert Academic Publishing, 2012. – 292 с.
  127. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  128. Omar Cheikhrouhou. Secure Group communication in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2013. – 160 с.
  129. Vincent Omollo. Enhanced Network Security. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  130. Faisal Al Mahrouqi. Energy-Aware Security and QoS Routing Trade-offs in Wireless Networks. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  131. Firkhan Ali Hamid Ali. Vulnerability Analysis on the Computer Network Security. – М.: LAP Lambert Academic Publishing, 2010. – 72 с.
  132. Imran Sohail and Sikandar Hayat. Network Security and DDoS. – М.: LAP Lambert Academic Publishing, 2010. – 64 с.
  133. Hammad Kazmi. Security and Privacy issues in Near Field Communication (NFC) Systems. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  134. Mohammad Faisal. Networks Security and Communication. – М.: LAP Lambert Academic Publishing, 2012. – 56 с.
  135. Edmond K. Machie. Network Attack Traceback And React. – М.: LAP Lambert Academic Publishing, 2013. – 208 с.
  136. Ekoningtyas Margu Wardani and Muyanja Ssenyonga. Soaring Food Prices, Food Security, and Poverty in Indonesia. – М.: LAP Lambert Academic Publishing, 2013. – 128 с.
  137. Maxwell Musingafi,Emmanuel Dumbu and Patrick Chadamoyo. Public Governance and Community Leadership. – М.: LAP Lambert Academic Publishing, 2012. – 232 с.
  138. Nader Sh. Kandelousi,A. Janee Ali and A. Abdollahi. Interpersonal Communication and Communication Satisfaction. – М.: LAP Lambert Academic Publishing, 2010. – 112 с.
  139. Rajiv Kumar Chaurasia,Ganesh Dubey and Bhaskar Chaurasia. Social and Communicative Participation of Students. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  140. Prashant Pittalia. Ecommerce Security Real Life Cases And Practical Solutions. – М.: , 2015. – 72 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Наука человековедения. интервью с Д. Уолтоном, профессором London Metropolitan University, экспертом CIPD. Chartered Institute of Personnel and Development, автором программы Master of Arts in Human Resource Strategies. И. Смирнова, "Кадровый менеджмент", № 5, июль-август 2007.
  2. Специализированный модуль FS-CD. Collections and Disbursements - "Сборы и Выплаты" и его возможности. О.А. Глущенко, "Финансовый менеджмент в страховой компании", № 2, II квартал 2007.
  3. Бюджетирование страховой компании на базе Oracle Enterprise Planning and Budgeting. Д.В. Лесоводский, "Финансовый менеджмент в страховой компании", № 3, III квартал 2006.
  4. Построить идеальный каскад информации удается далеко не всегда. интервью с А. Синикас. Angela D. Sinickas, президентом международной консалтинговой компании Sinickas Communications, Inc. США, www.sinicom. com. В. Правоторов, "Кадровый менеджмент", № 4, май-июнь 2006.
  5. Регулирование операций торгового финансирования: новые инициативы. интервью с Д. Шмандом, вице-председателем Банковской комиссии ICC по supply chain finance, главой подразделения Trade Finance and Cash Management Corporates EMEA в Global Transaction Banking. GTB division Deutsche Bank. Н. Макарова, "Международные банковские операции", N 2, апрель-июнь 2012 г.
  6. Ужин в темноте в стиле Малевича и Новый год в Хаммере". Что может выть лучше?". интервью с Н. Саниной, индивидуальным предпринимателем и креативным директором компании "San and stars". М. Сипатова, "Арсенал предпринимателя", N 12, декабрь 2011 г.
  7. На пути к новому стандарту в торговом финансировании. интервью с А.  Кастерманом, руководителем Trade and Supply Chain, SWIFT, сопредседателем рабочей группы ICC-BPO. Э. Шакирова, "Международные банковские операции", N 4, октябрь-декабрь 2011 г.
  8. Уильям Савадж: Мотивировать людей в Нижнем Новгороде и Новосибирске нужно по-разному". интервью с У. Саваджем, вице-президентом корпорации Intel, подразделение Software and Services Group. М. Холкина, "Управление персоналом", N 14, июль 2010 г.
  9. Цены под контролем: the present and the future. С. Стройкова, И. Леметюйнен, "Консультант", № 19, сентябрь 2009.
  10. Основной арсенал "охотника" - его network: кого он знает на рынке и качество этих отношений. С. Плетнева, "Управление персоналом", № 12, июнь 2009.

Образцы работ

Тема и предметТип и объем работы
Лингвистика
Лингвистика
Диплом
69 стр.
Последствия операции НАТО
Политология
Диплом
80 стр.
Торговые марки: рецензия и речь
Маркетинг
Диплом
85 стр.
Продвижение брендов в шоу-бизнесе
Электроснабжение городов и промышленных предприятий
Диплом
79 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Сергей, 01.06
Спасибо большое за оперативность! сегодня преподу все скинули. надеюсь его все устроит