Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Aldrin Wanambisi. Probabilistic Encryption. – М.: LAP Lambert Academic Publishing, 2013. – 52 с.

Дополнительные результаты

  1. Vivek S. Borkar, Vladimir Ejov, Jerzy A. Filar, Giang T. Nguyen. Hamiltonian Cycle Problem and Markov Chains (International Series in Operations Research & Management Science). – М.: , 2012. – 215 с.
  2. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с.
  3. Morton Glantz. Managing Bank Risk: An Introduction to Broad-Base Credit Engineering (+ CD-ROM). – М.: Academic Press, 0. – 600 с.
  4. Jack J. Champlain. Auditing Information Systems. – М.: , 0. – 0 с.
  5. M. A. Mian. Project Economics and Decision Analysis: Probabilistic Models (Project Economics and Decision Analysis). – М.: , 0. – 0 с.
  6. M. A. Mian, Mohammad A. Mian. Project Economics and Decision Analysis: Volume 1: Deterministic Models. – М.: , 0. – 0 с.
  7. Markov Networks in Evolutionary Computation (Adaptation, Learning, and Optimization). – М.: , 2012. – 264 с.
  8. Nirmal Sengupta. A New Institutional Theory of Production: An Application. – М.: , 0. – 0 с.
  9. Donald W. Katzner. Time, Ignorance, and Uncertainty in Economic Models. – М.: , 0. – 0 с.
  10. Sara Baase. A Gift of Fire. – М.: , 0. – 0 с.
  11. Debora L. Spar. Ruling the Waves: From the Compass to the Internet, a History of Business and Politics along the Technological Frontier. – М.: , 0. – 0 с.
  12. Donal O'Mahony, Michael Peirce, Hitesh Tewari, O'Mahony Donal. Electronic Payment Systems for E-Commerce. – М.: , 0. – 0 с.
  13. Albert N. Shiriaev. Essentials of Stochastic Finance: Facts, Models, Theory. – М.: , 0. – 0 с.
  14. L. C. G. Rogers, D. Talay. Numerical Methods in Finance (Publications of the Newton Institute). – М.: , 0. – 0 с.
  15. Jerry Iannacci, Ronald Morris, Ron Morris. Access Device Fraud and Related Financial Crimes. – М.: , 0. – 0 с.
  16. Marc Yor. On Exponential Functionals of Brownian Motion and Related Processes. – М.: , 0. – 0 с.
  17. N. H. Bingham, Rudiger Kiesel, Nicholas Bingham. Risk-Neutral Valuation: Pricing and Hedging of Financial Derivitives (Springer Finance). – М.: , 2004. – 0 с.
  18. Seymour Bosworth, Michel E. Kabay. Computer Security Handbook. – М.: , 0. – 0 с.
  19. Bill Rosenblatt, Bill Trippe, Stephen Mooney. Digital Rights Management: Business and Technology. – М.: M&T Books, 0. – 0 с.
  20. Richard W. Conway, William L. Maxwell, Louis W. Miller. Theory of Scheduling. – М.: Dover Publications, 2003. – 304 с.
  21. Giampiero E. G. Beroggi. Decision Modeling in Policy Management: An Introduction to the Analytic Concepts. – М.: , 0. – 0 с.
  22. Steven E. Rigdon, Asit P. Basu. Statistical Methods for the Reliability of Repairable Systems. – М.: , 0. – 0 с.
  23. Debra Cameron. Reengineering Business for Success in the Internet Age : Business-to-Business E-commerce Strategies. – М.: , 0. – 0 с.
  24. Ronald De Bruin, Ronald De Bruin. Consumer Trust in Electronic Commerce: Time for Best Practice (Law and Electronic Commerce, 17). – М.: , 0. – 0 с.
  25. Chris Hayhurst. Careers in E-Commerce Security and Encryption (Library of E-Commerce and Internet Careers). – М.: , 0. – 0 с.
  26. Thomas Mikosch. Non-Life Insurance Mathematics: An Introduction With Stochastic Processes (Universitext). – М.: , 0. – 0 с.
  27. Dirk Vanzyl, Marshall Koval, Ta Li. Risk Assessment/Management Issues in the Environmental Planning of Mines. – М.: , 0. – 0 с.
  28. R. F. Churchhouse. Codes and Ciphers: Julius Caesar, the Enigma, and the Internet. – М.: , 0. – 0 с.
  29. Jothy Rosenberg and David Remy. Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption. – М.: Sams, 2004. – 380 с.
  30. Warwick Ford, Michael S. Baum. Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption (2nd Edition). – М.: , 0. – 0 с.
  31. Richard Mansfield. Visual Basic .NET All in One Desk Reference for Dummies. – М.: , 0. – 0 с.
  32. Dorothy E. Denning, Peter J. Denning. Internet Besieged. – М.: , 0. – 0 с.
  33. Mostafa Hashem Sherif. Protocols for Secure Electronic Commerce, Second Edition. – М.: , 0. – 0 с.
  34. Amjad Umar. E-Business and Distributed Systems Handbook: Management Module. – М.: , 0. – 0 с.
  35. Peter Loshin, John Vacca, Paul A. Murphy. Electronic Commerce, Third Edition. – М.: , 0. – 0 с.
  36. Jonathan S. Held, John R. Bowers. Securing E-Business Applications and Communications. – М.: , 0. – 0 с.
  37. Simson Garfinkel, Gene Spafford. Web Security & Commerce (O'Reilly Nutshell). – М.: , 0. – 0 с.
  38. J.M. Binner. Applications of Artificial Intelligence in Finance and Economics, Volume 19 (Advances in Econometrics). – М.: , 2005. – 0 с.
  39. E.D. Solojentsev. Scenario Logic and Probabilistic Management of Risk in Business and Engineering (Applied Optimization). – М.: , 2004. – 0 с.
  40. Social Choice and Strategic Decisions : Essays in Honor of Jeffrey S. Banks (Studies in Choice and Welfare). – М.: , 2005. – 0 с.
  41. S.T Rachev. Handbook of Heavy Tailed Distributions in Finance (Handbooks in Finance). – М.: , 2003. – 0 с.
  42. George H. Bodnar. Accounting Information Systems (9th Edition). – М.: , 2003. – 0 с.
  43. Preston Gralla. Complete Idiot's Guide To Online Shopping (The Complete Idiot's Guide). – М.: , 2003. – 0 с.
  44. A. V. Melnikov. Risk Analysis in Finance and Insurance. – М.: , 2003. – 0 с.
  45. Dynamic Stochastic Optimization (Lecture Notes in Economics and Mathematical Systems). – М.: , 2004. – 0 с.
  46. Applied Research in Uncertainty Modeling and Analysis (International Series in Intelligent Technologies). – М.: , 2004. – 0 с.
  47. Harry H. Panjer. Operational Risk : Modeling Analytics. – М.: Wiley-Interscience, 2006. – 448 с.
  48. Robert Kast, AndrA?A© Lapied. Economics and Finance of Risk and of the Future (The Wiley Finance Series). – М.: , 2006. – 242 с.
  49. Michael Todinov. Reliability and Risk Models: Setting Reliability Requirements. – М.: , 2005. – 340 с.
  50. David G. Luenberger. Information Science. – М.: , 2006. – 448 с.
  51. Paul Embrechts, Claudia Kluppelberg, Thomas Mikosch. Modelling Extremal Events for Insurance and Finance. – М.: Springer, 2004. – 656 с.
  52. Libby Schweber. Disciplining Statistics: Demography and Vital Statistics in France and England, 1830-1885 (Politics, History, and Culture). – М.: , 2006. – 296 с.
  53. Michael L. Pinedo. Scheduling: Theory, Algorithms, and Systems. – М.: , 2008. – 678 с.
  54. Michael V. Frank. Choosing Safety: A Guide to Using Probabilistic Risk Assessment and Decision Analysis in Complex, High Consequence Systems (Rff Press). – М.: , 2008. – 242 с.
  55. Soft Methods for Handling Variability and Imprecision (Advances in Soft Computing). – М.: , 2008. – 436 с.
  56. Progress in Cryptology - AFRICACRYPT 2008: First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008, Proceedings (Lecture Notes in Computer Science). – М.: , 2008. – 415 с.
  57. Operations Research and Cyber-Infrastructure (Operations Research/Computer Science Interfaces Series). – М.: , 2009. – 462 с.
  58. Douglas Kennedy. Stochastic Financial Models (Chapman & Hall/CRC Financial Mathematics Series). – М.: , 2010. – 264 с.
  59. Richard E. Neapolitan. Probabilistic Methods for Financial and Marketing Informatics. – М.: , 2010. – 432 с.
  60. Editors Karl Maria Michael de Leeuw, Jan Bergstra. The History of Information Security: A Comprehensive Handbook. – М.: Elsevier Science, 2007. – 900 с.
  61. Tsutomu Sasao, Jon T. Butler. Progress in Applications of Boolean Functions (Synthesis Lectures on Digital Circuits and Systems). – М.: , 2010. – 154 с.
  62. Sebnem Duzgun. Reliability-Based Rock Slope Stability Analysis. – М.: , 2010. – 116 с.
  63. Mark A. Franklin, Patrick Crowley, Haldun Hadimioglu, Peter Z. Onufryk. Network Processor Design: Issues and Practices, Volume 1. – М.: Morgan Kaufmann, 2002. – 338 с.
  64. Bernadette Bouchon-Meunier, Laurent Foulloy, Ronald R. Yager, L. Foulloy, INTERNATIONAL CONFERENCE ON INFORMATION. Intelligent Systems for Information Processing: From Representation to Applications. – М.: , 0. – 0 с.
  65. Erkki Oja, Samuel Kaski. Kohonen Maps. – М.: , 0. – 0 с.
  66. Ben Goertzel, Matthew Ikle, Izabela Freire Goertzel, Ari Heljakka. Probabilistic Logic Networks: A Comprehensive Framework for Uncertain Inference. – М.: , 2008. – 344 с.
  67. Noga Alon, Joel H. Spencer. The Probabilistic Method (Wiley-Interscience Series in Discrete Mathematics and Optimization). – М.: , 2008. – 352 с.
  68. Michael V. Frank. Choo Safety: A Guide to Using Probabilistic Risk Assessment and Decision Analysis in Complex, High Consequence Systems (Rff Press). – М.: , 2008. – 241 с.
  69. Per Nilsson. Exploring probabilistic reasoning. – М.: , 2010. – 144 с.
  70. Judea Pearl. Probabilistic Reasoning in Intelligent Systems. – М.: , 2010. – 552 с.
  71. Giora Maymon. Structural Dynamics and Probabilistic Analysis for Engineers. – М.: , 2010. – 488 с.
  72. Erich Peter Klement. Logical, Algebraic, Analytic and Probabilistic Aspects of Triangular Norms. – М.: , 2010. – 492 с.
  73. Richard E. Neapolitan. Probabilistic Methods for Bioinformatics. – М.: , 2010. – 424 с.
  74. Whitfield Diffie. Privacy on the Line – The Politics of Wiretapping & Encryption. – М.: , 1998. – 352 с.
  75. Whitfield Diffie. Privacy on the Line – The Politics of Wiretapping & Encryption (Paper). – М.: , 1999. – 352 с.
  76. Whitfield Diffie. Privacy on the Line – The Politics of Wiretapping and Encryption, Updated and Expanded Edition. – М.: , 2010. – 496 с.
  77. Daphne Koller. Probabilistic Graphical Models – Principles and Techniques. – М.: , 2009. – 1208 с.
  78. Prof Franco Taroni. Bayesian Networks and Probabilistic Inference in Forensic Science. – М.: , 2006. – 372 с.
  79. Sebastian Thrun, Wolfram Burgard, Dieter Fox. Probabilistic Robotics. – М.: The MIT Press, 2005. – 668 с.
  80. Kenji Doya. Bayesian Brain – Probabilistic Approaches to Neural Coding. – М.: , 2011. – 340 с.
  81. Arthur M. Breipohl. Probabilistic Systems Analysis. – М.: , 1970. – 352 с.
  82. L Kruger. The Probabilistic Revolution – Ideas in History. – М.: , 1987. – 468 с.
  83. I ELISHAKOFF. Elishakoff Probabilistic Methods In The Theory Of ?structures?. – М.: , 1983. – 490 с.
  84. Rens Bod. Probabilistic Linguistics. – М.: , 2003. – 448 с.
  85. L Kruger. Kruger: The ?probabilistic? Revolution – Ideas In The Sciences (cloth). – М.: , 1987. – 480 с.
  86. L Kruger. Kruger: The Probabilistic Revolution (cloth) 2vlst. – М.: , 1987. – 948 с.
  87. David. Heckerman. Probabilistic Similarity Networks. – М.: , 1992. – 264 с.
  88. L Kruger. The Probabilistic Revolution – Ideas in the Sciences V 2. – М.: , 1990. – 480 с.
  89. L Kruger. The Probabilistic Revolution (Paper) 2 V Set. – М.: , 1990. – 948 с.
  90. L Kruger. The Probabilistic Revolution V 1. – М.: , 1999. – 468 с.
  91. F Bacchus. Representing & Reasoning with Probabilistic Knowledge – A Logical Approach etc. – М.: , 1991. – 256 с.
  92. Rpn Rao. Probabilistic Models of the Brain – Perception & Neural Function. – М.: , 2002. – 346 с.
  93. Daniela Mladin. Probabilistic Safety Assessment Studies For Research Reactors. – М.: LAP Lambert Academic Publishing, 2013. – 144 с.
  94. Vinav Keshari. Secure Web Service:Encryption. – М.: LAP Lambert Academic Publishing, 2012. – 72 с.
  95. Himani Agrawal and Monisha Sharma. Implementation and Analysis of various Encryption Techniques. – М.: LAP Lambert Academic Publishing, 2014. – 136 с.
  96. Shima Ramesh. An uncompressed image encryption Algorithm based on DNA sequnces. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  97. LeelaRani Vanapalli. FPGA Implementation of Advanced Encryption Standard Algorithm. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  98. Nisar Ahmed Rana and Marya Gul. Image Encryption. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  99. Shabareesh Kumar V. Encrypted Communication Algorithm in Engine Immobiliser. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  100. M.V.N. Sivakumar,B. N. Rao and S. R. Satishkumar. Probabilistic Strain Based Approach. – М.: LAP Lambert Academic Publishing, 2012. – 180 с.
  101. Yu Chee Tong. Probabilistic Fatigue Life Analysis Methods for Aerospace Vehicles. – М.: LAP Lambert Academic Publishing, 2014. – 288 с.
  102. P. Chitti Babu,S. Ramakrishna and K.C.K. Bharathi. Machine Learning Methods in Identification of Encryption Methods. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  103. Amr ElSayed Emam and M. Abd ElGhany. A Novel Image Encryption AND Steganography technique. – М.: LAP Lambert Academic Publishing, 2012. – 188 с.
  104. Mohammad Khajehzadeh,Mohd Raihan Taha and Ahmed El-Shafie. Deterministic and Probabilistic Analysis of Earth Slope. – М.: LAP Lambert Academic Publishing, 2012. – 176 с.
  105. Iason Chalmoukis. Probabilistic coastal vulnerability assessment to storms. – М.: LAP Lambert Academic Publishing, 2013. – 96 с.
  106. Vibha Verma. Multicrypt Vs Single Encryption Scheme. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  107. Ashraf Ahmed. Probabilistic Analysis of Shallow Foundations. – М.: LAP Lambert Academic Publishing, 2013. – 224 с.
  108. Aldrin Wanambisi. Probabilistic Encryption. – М.: LAP Lambert Academic Publishing, 2013. – 52 с.
  109. Julien Guyon. Probabilistic Modeling in Finance and Biology. – М.: LAP Lambert Academic Publishing, 2010. – 172 с.
  110. Shimaa Ibrahim Moustafa,Nassar H. Abdel-All and Rashwan A. Rashwan. A Study of Some Fixed Point Theorems in Probabilistic Metric Spaces. – М.: LAP Lambert Academic Publishing, 2013. – 104 с.
  111. Mohamad Rafi Segi Rahmat. FIXED POINTS ON PROBABILISTIC AND FUZZY STRUCTURES. – М.: LAP Lambert Academic Publishing, 2010. – 136 с.
  112. Issam Hammodi Hasson,A. AL-Obaidi and A. M. Jassar. Image Encryption Using RC5 Algorithm. – М.: LAP Lambert Academic Publishing, 2015. – 56 с.
  113. Mayank Chandra. Digital Video Encryption. – М.: LAP Lambert Academic Publishing, 2012. – 72 с.
  114. Mohammad Bani Younes and Aman Jantan. Image Encryption Using Block-Based Transformation Algorithm. – М.: LAP Lambert Academic Publishing, 2011. – 176 с.
  115. Chengqing Li. Cryptanalyzing Some Multimedia Encryption Schemes. – М.: LAP Lambert Academic Publishing, 2012. – 168 с.
  116. Shahab Saquib Sohail and Musheer Ahmad. Chaos-based Encryption. – М.: LAP Lambert Academic Publishing, 2012. – 144 с.
  117. Saja Taha Ahmed and Loay E. George. SMS Encryption Using RC4 with Dynamic Key Based on Android. – М.: LAP Lambert Academic Publishing, 2015. – 108 с.
  118. Yunhuai Liu. Probabilistic Topology Control in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2010. – 96 с.
  119. Dariusz Jakobczak. 2D Curve Modeling via the Method of Probabilistic Nodes Combination. – М.: LAP Lambert Academic Publishing, 2014. – 88 с.
  120. Abdul Hafez Abdul Hafez. Learning and Probabilistic Methods for Visual Servoing and Tracking. – М.: Scholars' Press, 2014. – 236 с.
  121. Raed Alsaqour and Yap Earn. Searchable Symmetric Encryption. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  122. Pawan Kumar Jha and J. K. Mandal. Symmetric Encryption-Algorithm, Analysis and Applications. – М.: LAP Lambert Academic Publishing, 2011. – 452 с.
  123. Su Su Maung. Image Encryption Scheme Based on Chaotic Maps. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  124. Francesca Fallucchi and Fabio Massimo Zanzotto. Probabilistic Models for Ontology Learning. – М.: LAP Lambert Academic Publishing, 2012. – 132 с.
  125. Rajit Nair and Preeti Sharma Nair. Encryption Approach for Maximizing Avalanche Effect for Cryptography. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  126. Faicel Chamroukhi. Probabilistic Learning From Longitudinal Data. – М.: LAP Lambert Academic Publishing, 2011. – 252 с.
  127. Hossein Miri and Darryl Davis. CernoCAMAL: A Probabilistic Computational Cognitive Architecture. – М.: LAP Lambert Academic Publishing, 2014. – 200 с.
  128. Amnesh Goel and Nidhi Chandra. Secure Image Archival Based on Image Encryption Technique. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  129. Nigam Sangwan. Using Huffman Compression with Symmetric Key Encryption. – М.: LAP Lambert Academic Publishing, 2014. – 68 с.
  130. Daniel Caragata,Safwan El Assad and Alexandru Serbanescu. Development of some encryption algorithms using chaotic functions. – М.: LAP Lambert Academic Publishing, 2011. – 88 с.
  131. Benjamin Okike. Some New Encryption Techniques Using Firewalls and Random Generators. – М.: LAP Lambert Academic Publishing, 2012. – 180 с.
  132. Saurabh Dutta. AN APPROACH TO DESIGN NEW EFFICIENT ENCRYPTION TECHNIQUES. – М.: LAP Lambert Academic Publishing, 2011. – 320 с.
  133. Yi Li. Probabilistic Toponym Resolution and Geographic Indexing and Querying. – М.: LAP Lambert Academic Publishing, 2012. – 168 с.
  134. Tamur Aziz. Intelligent Watermarking Using Loss Less Compression and RSA Encryption. – М.: LAP Lambert Academic Publishing, 2011. – 60 с.
  135. Guido Scatena. Abstract Probabilistic Semantics for the Analysis of Bio Sys Models. – М.: LAP Lambert Academic Publishing, 2012. – 176 с.
  136. Chaitanya Chemudugunta. Text Mining with Probabilistic Topic Models. – М.: LAP Lambert Academic Publishing, 2010. – 140 с.
  137. Eda Ercan. Probabilistic Matrix Factorization Based Collaborative Filtering. – М.: LAP Lambert Academic Publishing, 2011. – 108 с.
  138. Andrea Francesco Domeneghini. A Probabilistic Approach to Wind Energy Generation Costs in Italy. – М.: LAP Lambert Academic Publishing, 2011. – 144 с.
  139. Ramkrishna Das and Saurabh Dutta. An Approach to Develop Efficient Private Key Encryption Techniques. – М.: LAP Lambert Academic Publishing, 2013. – 84 с.
  140. Kevin P. Murphy. Machine Learning: A Probabilistic Perspective. – М.: The MIT Press, 2012. – 1104 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

Ничего не найдено

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Евгения
Здравствуйте Марина! Хочу сказать большое спасибо за консультацию. Пришлось доработать текст под себя, кое что ещё и дописать. Но в целом, неплохо.