Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Rory Bray. OSSEC Host-Based Intrusion Detection Guide. – М.: , 2010. – 416 с. Дополнительные результаты Minute Help Guides. A Newbies Guide to LinkedIn: Tips, Tricks and Insider Hints for Using LinkedIn. – М.: , 2012. – 72 с. Minute Help Guides. The Small Business Reference Guide: The Complete Guide to Small Business Taxes and Business Start-Up. – М.: , 2012. – 68 с. Kevin Doyle, Environmental Careers Organization, Tanya Stubbs, Bill New Complete Guide to Environmental Careers Sharp, Sam Heizman, Sam Heizmann. The Complete Guide to Environmental Careers in the 21st Century. – М.: , 0. – 0 с. Safe Schools: A Security and Loss Prevention Plan. – М.: , 0. – 0 с. Gabriel Burstein. Macro Trading & Investment Strategies : Macroeconomic Arbitrage in Global Markets (Wiley Trading Advantage Series). – М.: , 0. – 0 с. Jason A. Santamaria, Vincent Martino, Eric K. Clemons. The Marine Corps Way: Using Maneuver Warfare to Lead a Winning Organization. – М.: , 0. – 0 с. Anne Hart. Make Money With Your Camcorder and Pc, 25+ Businesses: What to Expect from the Talking Cure. – М.: , 0. – 0 с. Dorothy E. Denning, Peter J. Denning. Internet Besieged. – М.: , 0. – 0 с. Bill James. Desktop Hosting: A Developer's Guide to Unattended Communications with CDROM. – М.: , 0. – 0 с. Martin Hilb. New Corporate Governance : Successful Board Management Tools. – М.: , 2004. – 0 с. H. E. Cook. Design For Six Sigma As Strategic Experimentation: Planning, Designing, And Building World-Class Products And Services. – М.: , 2005. – 0 с. Rough Guides. The Rough Guide to Shopping with a Conscience 1 (Rough Guide Reference). – М.: , 2007. – 0 с. Paul Piccard, Jeremy Faircloth. Combating Spyware in the Enterprise. – М.: , 2006. – 386 с. Mark Nash. 1001 Tips for Buying & Selling a Home. – М.: , 2004. – 240 с. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с. Martin Hilb. New Corporate Governance: Successful Board Management Tools. – М.: , 2006. – 231 с. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с. Quick Easy Guides. How To Prevent MRSA in the Workplace: Keep This Superbug Out of Your Office!. – М.: , 2008. – 42 с. Quick Easy Guides. How To Encourage a Drug-Free Work Environment: Encourage a Positive Workplace Atmosphere for Everyone!. – М.: , 2008. – 52 с. Quick Easy Guides. How To Use Instant Messaging in the Workplace. – М.: , 2008. – 30 с. Quick Easy Guides. How To Eliminate Stress in the Workplace: Is Your Job Making You Sick?. – М.: , 2008. – 42 с. Quick Easy Guides. How To Handle Difficult People in the Office and Workplace: Tips on Successfully Dealing with Difficult People. – М.: , 2008. – 46 с. Quick Easy Guides. How To Resolve Personality Conflicts in the Workplace. – М.: , 2008. – 36 с. Quick Easy Guides. How To Encourage Workplace Etiquette in Employees. – М.: , 2008. – 30 с. Quick Easy Guides. How To Limit Workplace Relationships. – М.: , 2008. – 28 с. Quick Easy Guides. How To Develop Relationships in the Workplace. – М.: , 2008. – 32 с. Trust, Privacy and Security in Digital Business: 5th International Conference, TrustBus 2008 Turin, Italy, September 1-5, 2008, Proceedings (Lecture Notes in Computer Science). – М.: , 2008. – 205 с. Based on Dave Ellis' Becoming a Master Student. From Master Student to Master Employee. – М.: , 2010. – 384 с. Mark A. Franklin, Patrick Crowley, Haldun Hadimioglu, Peter Z. Onufryk. Network Processor Design, Volume 3: Issues and Practices. – М.: Morgan Kaufmann, 2005. – 336 с. Autodesk Official Training Guide. Learning AutoCAD Civil 3D 2010. – М.: , 2009. – 720 с. Rory Bray. OSSEC Host-Based Intrusion Detection Guide. – М.: , 2010. – 416 с. Syngress. Snort Intrusion Detection 2.0. – М.: , 2010. – 550 с. Brian Caswell. Snort Intrusion Detection and Prevention Toolkit. – М.: , 2010. – 768 с. Robert Barnard. Intrusion Detection Systems. – М.: , 2010. – 480 с. Terry Escamilla. Intrusion Detection. – М.: , 1998. – 368 с. W HOST. Braun Non–specific Factors Influencing Host Resist Ance. – М.: , 1974. – 0 с. Hacking Exposed Malware And Rootkits. – М.: , 2011. – 400 с. Care At The Close Of Life: Evidence And Experience. – М.: , 2011. – 616 с. Pharmacotherapy Principles And Practice Study Guide: A Case-Based Care Plan Approach. – М.: , 2011. – 480 с. Fundamentals Of Network Security. – М.: , 2011. – 672 с. Greg Holden. Guide to Firewalls and Network Security: Intrusion Detection and VPNs. – М.: Course Technology, 2003. – 512 с. Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky. Cisco Security Professional's Guide to Secure Intrusion Detection Systems. – М.: , . – с. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . – с. Ido Dubrawsky. How to Cheat at Securing Your Network. – М.: Syngress, 2007. – 432 с. Time Out Guides Ltd. Time Out Film Guide 2009. – М.: , 2009. – с. Amy Van, Insight Guides. Step by Step Singapore. – М.: Apa Publications Ltd, 2012. – 128 с. Jennifer Olvera, Insight Guides. Select Chicago. – М.: Insight Guides, 2012. – 192 с. Rough Guides. The Rough Guide to Central America On A Budget. – М.: , 2012. – с. Rough Guides. The Rough Guide to Cancun and the Yucatan. – М.: , 2012. – с. Rough Guides. The Rough Guide to New England. – М.: , 2012. – с. Rough Guides. The Rough Guide to Southwest China. – М.: , 2012. – с. Rough Guides. Rough Guide Map Croatia. – М.: , 2012. – с. Rough Guides. The Rough Guide to India. – М.: Rough Guides, 2012. – с. Rough Guides. The Rough Guide to France. – М.: , 2012. – с. Rough Guides. Rough Guide Phrasebook: Swahili. – М.: , 2012. – с. Rough Guides. Rough Guide Phrasebook: Greek. – М.: , 2012. – с. Rough Guides. The Rough Guide to Cult Sport. – М.: , 2012. – с. Rough Guides. Rough Guide Phrasebook: Spanish. – М.: , 2012. – с. Rough Guides. Rough Guide Phrasebook: Italian. – М.: , 2012. – с. Rough Guides. Rough Guide Phrasebook: Mandarin Chinese. – М.: , 2012. – с. Rough Guides. Rough Guide Phrasebook: Portuguese. – М.: , 2012. – с. Time Out Guides Ltd. Time Out Istanbul 5th edition. – М.: , 2014. – с. Time Out Guides Ltd. Time Out Chicago 6th edition. – М.: , 2014. – с. Anup Bhange and Manmeet Kaur Marhas. Anomaly Detection in Network Traffic; A Statistical Approach. – М.: LAP Lambert Academic Publishing, 2012. – 92 с. Gulshan Kumar. Effective Intrusion Detection using Genetic Algorithms. – М.: LAP Lambert Academic Publishing, 2014. – 100 с. Tanmoy Hazra. Application of PCA in IDS. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Anamika Jain. Ann Based Fault Detection, Classification and Distance Location. – М.: LAP Lambert Academic Publishing, 2011. – 140 с. Naveen K. S. Histogram Equalization & PCA based Face Recognition on MATLAB Platform. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Arindam Sarkar and J. K. Mandal. Artificial Neural Network Guided Secured Communication Techniques. – М.: LAP Lambert Academic Publishing, 2012. – 128 с. Sampath V.P. FPGA Based Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 120 с. Jai Sukh Paul Singh. Cognitive Radio Spectrum Sensing and its Performance Analysis. – М.: LAP Lambert Academic Publishing, 2013. – 124 с. Huang-Chun Roan. Network Intrusion Detection Based on Shift-OR Circuit. – М.: LAP Lambert Academic Publishing, 2011. – 60 с. M. Sadiq Ali Khan and S. M. Aqil Burney. Recent Trends in Intrusion Detection System & Network Monitoring. – М.: LAP Lambert Academic Publishing, 2012. – 120 с. Harshanee C. Rajapakshe. Detect Antibodies Against Ascariasis. – М.: LAP Lambert Academic Publishing, 2014. – 52 с. Shokrollah Haji Vand. Differential Reaction of Huanglongbing Disease Host and its Detection. – М.: LAP Lambert Academic Publishing, 2012. – 148 с. Yi Xin. Mid-IR-based Gas Detection System Analysis Model. – М.: LAP Lambert Academic Publishing, 2011. – 136 с. Zelalem Weldesenbet. A Metric Based Automatic Code Smell Detection Tool. – М.: LAP Lambert Academic Publishing, 2014. – 92 с. Sambit Bakshi. Development of Robust Iris Localization and Impairment Pruning Schemes. – М.: LAP Lambert Academic Publishing, 2011. – 76 с. Shiblee Sadik. Outlier Detection for Data Streams. – М.: LAP Lambert Academic Publishing, 2011. – 200 с. Abhay Nath Singh. Honeypot Based Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 68 с. Shahnawaz Husain,S. C. Gupta and R. C. Joshi. Intrusion Detection Engine for Adhoc Environment. – М.: LAP Lambert Academic Publishing, 2013. – 120 с. Sumaya Saad Sulaiman and Sarab M. Hameed. A Fuzzy Based Clustering for Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 120 с. Shubha Puthran and Ketan Shah. Intrusion Detection System using datamining techniques. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Mohammad S. I. Mamun. Intrusion Detection System Architecture in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Heba Fathy Eid. Computational Intelligence in Network Intrusion Detection System. – М.: Scholars' Press, 2014. – 164 с. Janakiraman S. Distributed Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 164 с. Yogesh Kumar,Krishan Kumar and Gulshan Kumar. Feature Selection For Intrusion Detection Systems. – М.: LAP Lambert Academic Publishing, 2014. – 100 с. Srikanth Hariharan,Ness B. Shroff and Saurabh Bagchi. Secure Neighbor Discovery in Wireless Networks. – М.: LAP Lambert Academic Publishing, 2011. – 52 с. Saad Usman. Spatio Temporal Anomaly Detector. – М.: LAP Lambert Academic Publishing, 2011. – 84 с. Syed Zahidur Rashid. Computer Network Security Monitoring. – М.: Scholars' Press, 2015. – 284 с. K. Shaila and K. R. Venugopal. Secure Data Communication in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2014. – 240 с. Lanier Watkins. Resource Discovery: Using Network Traffic To Infer CPU And Memory Load. – М.: LAP Lambert Academic Publishing, 2014. – 96 с. Gulshan Kumar. Effective Intrusion Detection using Feature Selection. – М.: LAP Lambert Academic Publishing, 2014. – 92 с. Mrutyunjaya Panda and Manas Ranjan Patra. A Data Mining Approach to Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2015. – 216 с. Madhav P. Namdev. Phishing Attacks and Detection. – М.: LAP Lambert Academic Publishing, 2015. – 68 с. Glenn Wilkinson. Identification of Hostile TCP Traffic using Support Vector Machines. – М.: LAP Lambert Academic Publishing, 2010. – 80 с. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с. Mueen Uddin. Dynamic Multi Layer Signature based IDS System using Mobile Agents. – М.: LAP Lambert Academic Publishing, 2011. – 72 с. Ivano Malavolta. A tamper resistant Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2011. – 144 с. Ayman El-Sayed. End-System Multicast Protocols (ESM). – М.: LAP Lambert Academic Publishing, 2012. – 172 с. Sunit Jindal. Swarm Intelligence Based Hole Detection. – М.: LAP Lambert Academic Publishing, 2012. – 88 с. Prashant Kumar Singh and Avimanyou Kumar Vatsa. Taxonomy Based Intrusion Attacks and Detection Scheme in P2P Network. – М.: LAP Lambert Academic Publishing, 2012. – 56 с. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с. Shaffali Gupta and Sanmeet Kaur. A GUI Framework for detecting Intrusions using Bro IDS. – М.: LAP Lambert Academic Publishing, 2013. – 76 с. Mahmoud Jazzar. Computer Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 240 с. Siva S. Sivatha Sindhu,S. Geetha and S. Selvakumar. Network Intrusion Detection System using Machine Learning Techniques. – М.: LAP Lambert Academic Publishing, 2013. – 80 с. Gaurav Mishra and Gulshan Ahuja. Classification of data mining techniques in intrusion detection. – М.: LAP Lambert Academic Publishing, 2013. – 52 с. Nasim Beigi-Mohammadi. Smart Meter Networks: Intrusion Detection System by Design. – М.: LAP Lambert Academic Publishing, 2014. – 136 с. Christian Chetachi Umunna. Distributed Intrusion Detection System in Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 104 с. Iftikhar Ahmad. Feature Subset Selection in Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 220 с. Saima Munawar. Detection and Classification Of Normal and Anomaly IP Packet. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Jabarweer Singh,Krishan Kumar and Gulshan Kumar. Intrusion detection using artificial intelligence based ensembles. – М.: LAP Lambert Academic Publishing, 2014. – 116 с. Govind Sreekar Shenoy. Architecture Support for Intrusion Detection systems. – М.: LAP Lambert Academic Publishing, 2014. – 160 с. Muhammad Atta Othman A. Khfagy. Artificial Neural Networks Applied For Digital Images with Matlab Code. – М.: LAP Lambert Academic Publishing, 2014. – 152 с. Monis Akhlaq,Irfan Awan and Faeiz Alserhani. Improved Performance High Speed Network Intrusion Detection Systems. – М.: LAP Lambert Academic Publishing, 2011. – 132 с. Prakash Prasad. Intrusion Detection System: Findings. – М.: LAP Lambert Academic Publishing, 2011. – 104 с. Homam El-Taj and Omar Amer. Network Alert Management System For IDS False Positive Reduction. – М.: LAP Lambert Academic Publishing, 2013. – 156 с. Manju Bala and R. K. Agrawal. Multiple Classifier Systems Analysis and Design. – М.: LAP Lambert Academic Publishing, 2012. – 128 с. Sultan H. Aljahdali and Mohd. Junedul Haque. Intelligent Approaches to Data Management. – М.: LAP Lambert Academic Publishing, 2013. – 116 с. Bibi Masoomeh Aslahi Shahri. Intrusion Detection System Using Hybrid Gsa-kmeans. – М.: LAP Lambert Academic Publishing, 2014. – 128 с. Amanpreet Chauhan. Survey on data mining techniques in intrusion detection. – М.: LAP Lambert Academic Publishing, 2012. – 64 с. Tigabu Dagne Akal. Constructing Predictive Model for Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 160 с. Kamaruzaman Maskat and Mohd Afizi Mohd Shukran. Agent Based Snort In Distributed Environment. – М.: LAP Lambert Academic Publishing, 2013. – 112 с. Kamrul Hasan. An Investigation into Botnet Detection System. – М.: LAP Lambert Academic Publishing, 2013. – 120 с. Rupali Pathak. Recent Advances In Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 72 с. Fadel O. Shaban. Spyware Detection. – М.: LAP Lambert Academic Publishing, 2013. – 92 с. Emon Kumar Dey. Computer Vision Based Gender Detection from Facial Image. – М.: LAP Lambert Academic Publishing, 2013. – 80 с. Mohamed Nassar. Voice over IP Networks Monitoring. – М.: LAP Lambert Academic Publishing, 2009. – 172 с. vudasreenivasa rao. DISTRIBUTED DATA MINING AND MINING MULTI-AGENT DATA. – М.: LAP Lambert Academic Publishing, 2011. – 152 с. Al-Sakib Khan Pathan. Securing WSN with Lightweight Resource-Efficient Schemes. – М.: LAP Lambert Academic Publishing, 2011. – 116 с. Usman Qayyum. Notch based Face Detection and Facial Feature Localization. – М.: LAP Lambert Academic Publishing, 2012. – 92 с. Sathish Kumar. Intrusion Detection and Response Techniques for Mobile Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 200 с. Richard Rimiru. Exploring Immune System's Concepts for the Design of Novel AIS Models. – М.: LAP Lambert Academic Publishing, 2012. – 164 с. Khandakar Entenam Unayes Ahmed. IDENTITY AND ACCESS MANAGEMENT IN CLOUD COMPUTING. – М.: LAP Lambert Academic Publishing, 2011. – 172 с. Luciano Oliveira. Semantically integrating laser and vision. – М.: LAP Lambert Academic Publishing, 2012. – 152 с. Rough Guides. The Rough Guide to Amsterdam. – М.: Rough Guides, 2016. – 280 с. Rough Guides. The Rough Guide to London. – М.: Rough Guides, 2016. – 496 с. Rough Guides. The Rough Guide to New York City. – М.: Rough Guides, 2016. – 464 с. Rough Guides. The Rough Guide to Paris. – М.: Rough Guides, 2016. – 416 с. Rough Guides. The Rough Guide to First-Time Europe. – М.: Rough Guides, 2016. – 344 с. Лучшие результаты Ничего не найдено Дополнительные результаты Учет и калькулирование затрат по функциям. Метод АВС. Activity-Based Costing. М.К. Ерижев, "Новое в бухгалтерском учете и отчетности", № 19, октябрь 2003. Обеспечение безопасности PIN-Based операций с банковскими картами. С.В. Серебряков, "Расчеты и операционная работа в коммерческом банке", N 2, март-апрель 2012 г. Risk-based pricing: посткризисные тенденции. А.В. Гидулян, "Банковское кредитование", N 1, январь-февраль 2012 г. Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Марина, 09.06 Юля, здравствуйте. Я защитилась, все прошло замечательно. Вам спасибо за работу!