Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Rory Bray. OSSEC Host-Based Intrusion Detection Guide. – М.: , 2010. – 416 с.

Дополнительные результаты

  1. Minute Help Guides. A Newbies Guide to LinkedIn: Tips, Tricks and Insider Hints for Using LinkedIn. – М.: , 2012. – 72 с.
  2. Minute Help Guides. The Small Business Reference Guide: The Complete Guide to Small Business Taxes and Business Start-Up. – М.: , 2012. – 68 с.
  3. Kevin Doyle, Environmental Careers Organization, Tanya Stubbs, Bill New Complete Guide to Environmental Careers Sharp, Sam Heizman, Sam Heizmann. The Complete Guide to Environmental Careers in the 21st Century. – М.: , 0. – 0 с.
  4. Safe Schools: A Security and Loss Prevention Plan. – М.: , 0. – 0 с.
  5. Gabriel Burstein. Macro Trading & Investment Strategies : Macroeconomic Arbitrage in Global Markets (Wiley Trading Advantage Series). – М.: , 0. – 0 с.
  6. Jason A. Santamaria, Vincent Martino, Eric K. Clemons. The Marine Corps Way: Using Maneuver Warfare to Lead a Winning Organization. – М.: , 0. – 0 с.
  7. Anne Hart. Make Money With Your Camcorder and Pc, 25+ Businesses: What to Expect from the Talking Cure. – М.: , 0. – 0 с.
  8. Dorothy E. Denning, Peter J. Denning. Internet Besieged. – М.: , 0. – 0 с.
  9. Bill James. Desktop Hosting: A Developer's Guide to Unattended Communications with CDROM. – М.: , 0. – 0 с.
  10. Martin Hilb. New Corporate Governance : Successful Board Management Tools. – М.: , 2004. – 0 с.
  11. H. E. Cook. Design For Six Sigma As Strategic Experimentation: Planning, Designing, And Building World-Class Products And Services. – М.: , 2005. – 0 с.
  12. Rough Guides. The Rough Guide to Shopping with a Conscience 1 (Rough Guide Reference). – М.: , 2007. – 0 с.
  13. Paul Piccard, Jeremy Faircloth. Combating Spyware in the Enterprise. – М.: , 2006. – 386 с.
  14. Mark Nash. 1001 Tips for Buying & Selling a Home. – М.: , 2004. – 240 с.
  15. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с.
  16. Martin Hilb. New Corporate Governance: Successful Board Management Tools. – М.: , 2006. – 231 с.
  17. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с.
  18. Quick Easy Guides. How To Prevent MRSA in the Workplace: Keep This Superbug Out of Your Office!. – М.: , 2008. – 42 с.
  19. Quick Easy Guides. How To Encourage a Drug-Free Work Environment: Encourage a Positive Workplace Atmosphere for Everyone!. – М.: , 2008. – 52 с.
  20. Quick Easy Guides. How To Use Instant Messaging in the Workplace. – М.: , 2008. – 30 с.
  21. Quick Easy Guides. How To Eliminate Stress in the Workplace: Is Your Job Making You Sick?. – М.: , 2008. – 42 с.
  22. Quick Easy Guides. How To Handle Difficult People in the Office and Workplace: Tips on Successfully Dealing with Difficult People. – М.: , 2008. – 46 с.
  23. Quick Easy Guides. How To Resolve Personality Conflicts in the Workplace. – М.: , 2008. – 36 с.
  24. Quick Easy Guides. How To Encourage Workplace Etiquette in Employees. – М.: , 2008. – 30 с.
  25. Quick Easy Guides. How To Limit Workplace Relationships. – М.: , 2008. – 28 с.
  26. Quick Easy Guides. How To Develop Relationships in the Workplace. – М.: , 2008. – 32 с.
  27. Trust, Privacy and Security in Digital Business: 5th International Conference, TrustBus 2008 Turin, Italy, September 1-5, 2008, Proceedings (Lecture Notes in Computer Science). – М.: , 2008. – 205 с.
  28. Based on Dave Ellis' Becoming a Master Student. From Master Student to Master Employee. – М.: , 2010. – 384 с.
  29. Mark A. Franklin, Patrick Crowley, Haldun Hadimioglu, Peter Z. Onufryk. Network Processor Design, Volume 3: Issues and Practices. – М.: Morgan Kaufmann, 2005. – 336 с.
  30. Autodesk Official Training Guide. Learning AutoCAD Civil 3D 2010. – М.: , 2009. – 720 с.
  31. Rory Bray. OSSEC Host-Based Intrusion Detection Guide. – М.: , 2010. – 416 с.
  32. Syngress. Snort Intrusion Detection 2.0. – М.: , 2010. – 550 с.
  33. Brian Caswell. Snort Intrusion Detection and Prevention Toolkit. – М.: , 2010. – 768 с.
  34. Robert Barnard. Intrusion Detection Systems. – М.: , 2010. – 480 с.
  35. Terry Escamilla. Intrusion Detection. – М.: , 1998. – 368 с.
  36. W HOST. Braun Non–specific Factors Influencing Host Resist Ance. – М.: , 1974. – 0 с.
  37. Hacking Exposed Malware And Rootkits. – М.: , 2011. – 400 с.
  38. Care At The Close Of Life: Evidence And Experience. – М.: , 2011. – 616 с.
  39. Pharmacotherapy Principles And Practice Study Guide: A Case-Based Care Plan Approach. – М.: , 2011. – 480 с.
  40. Fundamentals Of Network Security. – М.: , 2011. – 672 с.
  41. Greg Holden. Guide to Firewalls and Network Security: Intrusion Detection and VPNs. – М.: Course Technology, 2003. – 512 с.
  42. Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky. Cisco Security Professional's Guide to Secure Intrusion Detection Systems. – М.: , . –  с.
  43. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . –  с.
  44. Ido Dubrawsky. How to Cheat at Securing Your Network. – М.: Syngress, 2007. – 432 с.
  45. Time Out Guides Ltd. Time Out Film Guide 2009. – М.: , 2009. –  с.
  46. Amy Van, Insight Guides. Step by Step Singapore. – М.: Apa Publications Ltd, 2012. – 128 с.
  47. Jennifer Olvera, Insight Guides. Select Chicago. – М.: Insight Guides, 2012. – 192 с.
  48. Rough Guides. The Rough Guide to Central America On A Budget. – М.: , 2012. –  с.
  49. Rough Guides. The Rough Guide to Cancun and the Yucatan. – М.: , 2012. –  с.
  50. Rough Guides. The Rough Guide to New England. – М.: , 2012. –  с.
  51. Rough Guides. The Rough Guide to Southwest China. – М.: , 2012. –  с.
  52. Rough Guides. Rough Guide Map Croatia. – М.: , 2012. –  с.
  53. Rough Guides. The Rough Guide to India. – М.: Rough Guides, 2012. –  с.
  54. Rough Guides. The Rough Guide to France. – М.: , 2012. –  с.
  55. Rough Guides. Rough Guide Phrasebook: Swahili. – М.: , 2012. –  с.
  56. Rough Guides. Rough Guide Phrasebook: Greek. – М.: , 2012. –  с.
  57. Rough Guides. The Rough Guide to Cult Sport. – М.: , 2012. –  с.
  58. Rough Guides. Rough Guide Phrasebook: Spanish. – М.: , 2012. –  с.
  59. Rough Guides. Rough Guide Phrasebook: Italian. – М.: , 2012. –  с.
  60. Rough Guides. Rough Guide Phrasebook: Mandarin Chinese. – М.: , 2012. –  с.
  61. Rough Guides. Rough Guide Phrasebook: Portuguese. – М.: , 2012. –  с.
  62. Time Out Guides Ltd. Time Out Istanbul 5th edition. – М.: , 2014. –  с.
  63. Time Out Guides Ltd. Time Out Chicago 6th edition. – М.: , 2014. –  с.
  64. Anup Bhange and Manmeet Kaur Marhas. Anomaly Detection in Network Traffic; A Statistical Approach. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  65. Gulshan Kumar. Effective Intrusion Detection using Genetic Algorithms. – М.: LAP Lambert Academic Publishing, 2014. – 100 с.
  66. Tanmoy Hazra. Application of PCA in IDS. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  67. Anamika Jain. Ann Based Fault Detection, Classification and Distance Location. – М.: LAP Lambert Academic Publishing, 2011. – 140 с.
  68. Naveen K. S. Histogram Equalization & PCA based Face Recognition on MATLAB Platform. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  69. Arindam Sarkar and J. K. Mandal. Artificial Neural Network Guided Secured Communication Techniques. – М.: LAP Lambert Academic Publishing, 2012. – 128 с.
  70. Sampath V.P. FPGA Based Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  71. Jai Sukh Paul Singh. Cognitive Radio Spectrum Sensing and its Performance Analysis. – М.: LAP Lambert Academic Publishing, 2013. – 124 с.
  72. Huang-Chun Roan. Network Intrusion Detection Based on Shift-OR Circuit. – М.: LAP Lambert Academic Publishing, 2011. – 60 с.
  73. M. Sadiq Ali Khan and S. M. Aqil Burney. Recent Trends in Intrusion Detection System & Network Monitoring. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  74. Harshanee C. Rajapakshe. Detect Antibodies Against Ascariasis. – М.: LAP Lambert Academic Publishing, 2014. – 52 с.
  75. Shokrollah Haji Vand. Differential Reaction of Huanglongbing Disease Host and its Detection. – М.: LAP Lambert Academic Publishing, 2012. – 148 с.
  76. Yi Xin. Mid-IR-based Gas Detection System Analysis Model. – М.: LAP Lambert Academic Publishing, 2011. – 136 с.
  77. Zelalem Weldesenbet. A Metric Based Automatic Code Smell Detection Tool. – М.: LAP Lambert Academic Publishing, 2014. – 92 с.
  78. Sambit Bakshi. Development of Robust Iris Localization and Impairment Pruning Schemes. – М.: LAP Lambert Academic Publishing, 2011. – 76 с.
  79. Shiblee Sadik. Outlier Detection for Data Streams. – М.: LAP Lambert Academic Publishing, 2011. – 200 с.
  80. Abhay Nath Singh. Honeypot Based Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  81. Shahnawaz Husain,S. C. Gupta and R. C. Joshi. Intrusion Detection Engine for Adhoc Environment. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  82. Sumaya Saad Sulaiman and Sarab M. Hameed. A Fuzzy Based Clustering for Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  83. Shubha Puthran and Ketan Shah. Intrusion Detection System using datamining techniques. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  84. Mohammad S. I. Mamun. Intrusion Detection System Architecture in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  85. Heba Fathy Eid. Computational Intelligence in Network Intrusion Detection System. – М.: Scholars' Press, 2014. – 164 с.
  86. Janakiraman S. Distributed Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 164 с.
  87. Yogesh Kumar,Krishan Kumar and Gulshan Kumar. Feature Selection For Intrusion Detection Systems. – М.: LAP Lambert Academic Publishing, 2014. – 100 с.
  88. Srikanth Hariharan,Ness B. Shroff and Saurabh Bagchi. Secure Neighbor Discovery in Wireless Networks. – М.: LAP Lambert Academic Publishing, 2011. – 52 с.
  89. Saad Usman. Spatio Temporal Anomaly Detector. – М.: LAP Lambert Academic Publishing, 2011. – 84 с.
  90. Syed Zahidur Rashid. Computer Network Security Monitoring. – М.: Scholars' Press, 2015. – 284 с.
  91. K. Shaila and K. R. Venugopal. Secure Data Communication in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2014. – 240 с.
  92. Lanier Watkins. Resource Discovery: Using Network Traffic To Infer CPU And Memory Load. – М.: LAP Lambert Academic Publishing, 2014. – 96 с.
  93. Gulshan Kumar. Effective Intrusion Detection using Feature Selection. – М.: LAP Lambert Academic Publishing, 2014. – 92 с.
  94. Mrutyunjaya Panda and Manas Ranjan Patra. A Data Mining Approach to Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2015. – 216 с.
  95. Madhav P. Namdev. Phishing Attacks and Detection. – М.: LAP Lambert Academic Publishing, 2015. – 68 с.
  96. Glenn Wilkinson. Identification of Hostile TCP Traffic using Support Vector Machines. – М.: LAP Lambert Academic Publishing, 2010. – 80 с.
  97. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  98. Mueen Uddin. Dynamic Multi Layer Signature based IDS System using Mobile Agents. – М.: LAP Lambert Academic Publishing, 2011. – 72 с.
  99. Ivano Malavolta. A tamper resistant Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2011. – 144 с.
  100. Ayman El-Sayed. End-System Multicast Protocols (ESM). – М.: LAP Lambert Academic Publishing, 2012. – 172 с.
  101. Sunit Jindal. Swarm Intelligence Based Hole Detection. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  102. Prashant Kumar Singh and Avimanyou Kumar Vatsa. Taxonomy Based Intrusion Attacks and Detection Scheme in P2P Network. – М.: LAP Lambert Academic Publishing, 2012. – 56 с.
  103. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  104. Shaffali Gupta and Sanmeet Kaur. A GUI Framework for detecting Intrusions using Bro IDS. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  105. Mahmoud Jazzar. Computer Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 240 с.
  106. Siva S. Sivatha Sindhu,S. Geetha and S. Selvakumar. Network Intrusion Detection System using Machine Learning Techniques. – М.: LAP Lambert Academic Publishing, 2013. – 80 с.
  107. Gaurav Mishra and Gulshan Ahuja. Classification of data mining techniques in intrusion detection. – М.: LAP Lambert Academic Publishing, 2013. – 52 с.
  108. Nasim Beigi-Mohammadi. Smart Meter Networks: Intrusion Detection System by Design. – М.: LAP Lambert Academic Publishing, 2014. – 136 с.
  109. Christian Chetachi Umunna. Distributed Intrusion Detection System in Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 104 с.
  110. Iftikhar Ahmad. Feature Subset Selection in Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 220 с.
  111. Saima Munawar. Detection and Classification Of Normal and Anomaly IP Packet. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  112. Jabarweer Singh,Krishan Kumar and Gulshan Kumar. Intrusion detection using artificial intelligence based ensembles. – М.: LAP Lambert Academic Publishing, 2014. – 116 с.
  113. Govind Sreekar Shenoy. Architecture Support for Intrusion Detection systems. – М.: LAP Lambert Academic Publishing, 2014. – 160 с.
  114. Muhammad Atta Othman A. Khfagy. Artificial Neural Networks Applied For Digital Images with Matlab Code. – М.: LAP Lambert Academic Publishing, 2014. – 152 с.
  115. Monis Akhlaq,Irfan Awan and Faeiz Alserhani. Improved Performance High Speed Network Intrusion Detection Systems. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  116. Prakash Prasad. Intrusion Detection System: Findings. – М.: LAP Lambert Academic Publishing, 2011. – 104 с.
  117. Homam El-Taj and Omar Amer. Network Alert Management System For IDS False Positive Reduction. – М.: LAP Lambert Academic Publishing, 2013. – 156 с.
  118. Manju Bala and R. K. Agrawal. Multiple Classifier Systems Analysis and Design. – М.: LAP Lambert Academic Publishing, 2012. – 128 с.
  119. Sultan H. Aljahdali and Mohd. Junedul Haque. Intelligent Approaches to Data Management. – М.: LAP Lambert Academic Publishing, 2013. – 116 с.
  120. Bibi Masoomeh Aslahi Shahri. Intrusion Detection System Using Hybrid Gsa-kmeans. – М.: LAP Lambert Academic Publishing, 2014. – 128 с.
  121. Amanpreet Chauhan. Survey on data mining techniques in intrusion detection. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  122. Tigabu Dagne Akal. Constructing Predictive Model for Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 160 с.
  123. Kamaruzaman Maskat and Mohd Afizi Mohd Shukran. Agent Based Snort In Distributed Environment. – М.: LAP Lambert Academic Publishing, 2013. – 112 с.
  124. Kamrul Hasan. An Investigation into Botnet Detection System. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  125. Rupali Pathak. Recent Advances In Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  126. Fadel O. Shaban. Spyware Detection. – М.: LAP Lambert Academic Publishing, 2013. – 92 с.
  127. Emon Kumar Dey. Computer Vision Based Gender Detection from Facial Image. – М.: LAP Lambert Academic Publishing, 2013. – 80 с.
  128. Mohamed Nassar. Voice over IP Networks Monitoring. – М.: LAP Lambert Academic Publishing, 2009. – 172 с.
  129. vudasreenivasa rao. DISTRIBUTED DATA MINING AND MINING MULTI-AGENT DATA. – М.: LAP Lambert Academic Publishing, 2011. – 152 с.
  130. Al-Sakib Khan Pathan. Securing WSN with Lightweight Resource-Efficient Schemes. – М.: LAP Lambert Academic Publishing, 2011. – 116 с.
  131. Usman Qayyum. Notch based Face Detection and Facial Feature Localization. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  132. Sathish Kumar. Intrusion Detection and Response Techniques for Mobile Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 200 с.
  133. Richard Rimiru. Exploring Immune System's Concepts for the Design of Novel AIS Models. – М.: LAP Lambert Academic Publishing, 2012. – 164 с.
  134. Khandakar Entenam Unayes Ahmed. IDENTITY AND ACCESS MANAGEMENT IN CLOUD COMPUTING. – М.: LAP Lambert Academic Publishing, 2011. – 172 с.
  135. Luciano Oliveira. Semantically integrating laser and vision. – М.: LAP Lambert Academic Publishing, 2012. – 152 с.
  136. Rough Guides. The Rough Guide to Amsterdam. – М.: Rough Guides, 2016. – 280 с.
  137. Rough Guides. The Rough Guide to London. – М.: Rough Guides, 2016. – 496 с.
  138. Rough Guides. The Rough Guide to New York City. – М.: Rough Guides, 2016. – 464 с.
  139. Rough Guides. The Rough Guide to Paris. – М.: Rough Guides, 2016. – 416 с.
  140. Rough Guides. The Rough Guide to First-Time Europe. – М.: Rough Guides, 2016. – 344 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Учет и калькулирование затрат по функциям. Метод АВС. Activity-Based Costing. М.К. Ерижев, "Новое в бухгалтерском учете и отчетности", № 19, октябрь 2003.
  2. Обеспечение безопасности PIN-Based операций с банковскими картами. С.В.  Серебряков, "Расчеты и операционная работа в коммерческом банке", N 2, март-апрель 2012 г.
  3. Risk-based pricing: посткризисные тенденции. А.В. Гидулян, "Банковское кредитование", N 1, январь-февраль 2012 г.

Образцы работ

Тема и предметТип и объем работы
Порядок разработки, проектирования системы стратегического менеджмента
Менеджмент
Диплом
100 стр.
Проблемы стратегического менеджмента в организации
Менеджмент
Диплом
80 стр.
Разработка рекомендаций по эффективному использованию зарубежного опыта реализации прогрессивных систем и методов менеджмента на предприятии
Стратегический менеджмент
Диплом
150 стр.
Анализ и совершенствование стратегии развития предприятия
Стратегическое управление
Диплом
91 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Марина, 09.06
Юля, здравствуйте. Я защитилась, все прошло замечательно. Вам спасибо за работу!