Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Sunil Kumar Senapati and Prof. Pabitra Mohan Khilar. SECURING FSR PROTOCOL AGAINST DATA PACKET DROPPING IN MANET. – М.: LAP Lambert Academic Publishing, 2010. – 64 с. Дополнительные результаты Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с. Anindya Banerjee, J.W. Galbraith, Juan Dolado, David Hendry. Co-Integration, Error Correction, and the Econometric Analysis of Non-Stationary Data (Advanced Texts in Econometrics). – М.: Oxford University Press, 1993. – 352 с. Gavin Cawthra. Securing South Africa's Democracy: Defense, Development and Security in Transition (International Political Economy Series). – М.: , 0. – 0 с. Douglas W. Allen, Dean Lueck. The Nature of the Farm: Contracts, Risk, and Organization in Agriculture. – М.: , 0. – 0 с. Klaus M. Leisinger, Karin Schmitt, Rajul Pandya-Lorch. Six Billion and Counting: Population Growth and Food Security in the 21st Century. – М.: , 0. – 0 с. Parag Pendharkar. Managing Data Mining Technologies in Organizations: Techniques and Applications. – М.: , 0. – 0 с. Roger Blanpain. Employee Rights in Bankruptcy: A Comparative-Law Assessment (Bulletin of Comparative Labour Relations, 46). – М.: , 0. – 0 с. Jothy Rosenberg and David Remy. Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption. – М.: Sams, 2004. – 380 с. Charles Carrington, Timothy Speed, Juanita Ellis, Steffano Korper. Enterprise Directory and Security Implementation Guide: Designing and Implementing Directories in Your Organization (The Korper and Ellis E-Commerce Books Series). – М.: , 0. – 0 с. David G. Loomis, Lester D. Taylor. Forecasting the Internet: Understanding the Explosive Growth of Data Communications (TOPICS IN REGULATORY ECONOMICS AND POLICY). – М.: , 0. – 0 с. Stefan Kokot. The Econometrics of Sequential Trade Models : Theory and Applications Using High Frequency Data (Lecture Notes in Economics and Mathematical Systems). – М.: , 2004. – 0 с. Thomas C. Glaessner. Electronic Safety and Soundness: Securing Finance in a New Age (World Bank Working Papers). – М.: , 2004. – 0 с. Economics of Information Security (Advances in Information Security). – М.: , 2004. – 0 с. Sustainable Metals Management : Securing Our Future - Steps Towards a Closed Loop Economy (Eco-Efficiency in Industry and Science) (Eco-Efficiency in Industry and Science). – М.: , 2006. – 607 с. Privacy-Preserving Data Mining: Models and Algorithms (Advances in Database Systems). – М.: , 2008. – 514 с. Stephen Gough. Sustainability and Security within Liberal Societies: Learning to Live with the Future (Routledge Studies in Social and Political Thought). – М.: , 2008. – 148 с. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с. Alan Calder. Information Security based on ISO 27001/ISO 27002: A Management Guide. – М.: , 2009. – 83 с. Doug Stokes, Sam Raphael. Global Energy Security and American Hegemony (Themes in Global Social Change). – М.: , 2010. – 296 с. Robert Schmansky CFP. Avoid Retirement Clumsiness: Secure your retirement against costly and ineffective investment schemes, and achieve true retirement guarantees with a bond ladder. – М.: , 2010. – 132 с. Craig K. Enders PhD. Applied Missing Data Analysis (Methodology In The Social Sciences). – М.: , 2010. – 377 с. John Shade. Data Analysis in Business and Industry (Statistics in Practice). – М.: , 2010. – 384 с. Steven H. Goldberg. Billions of Drops in Millions of Buckets. – М.: , 2009. – 302 с. John Bender, Michael Marrinan. The Culture of Diagram. – М.: , 2010. – 296 с. Side Effects of Drugs Annual 30, Volume 30: A worldwide yearly survey of new data and trends in adverse drug reactions (Side Effects of Drugs Annual) (Side Effects of Drugs Annual). – М.: , 2008. – 672 с. Redox-Mediated Signal Transduction: Methods and Protocols (Methods in Molecular Biology). – М.: , 2008. – 234 с. Padmashree Gehl Sampath, Banji Oyeyinka. The Gene Revolution and Global Food Security: Biotechnology Innovation in Latecomers. – М.: , 2010. – 288 с. Jamil Naji. ROAD SAFETY MANAGEMENT IN YEMEN:: The identification of shortcomings in accident data, data adjustment, cost and modelling of road accident fatalities. – М.: , 2010. – 184 с. Konstantinos Tsiptsis. Data Mining Techniques in CRM. – М.: , 2010. – 372 с. W. J. Emery. Data Analysis Methods in Physical Oceanography, 3E. – М.: , 2010. – 654 с. Jennifer J Baker. Securing the Commonwealth – Debt, Speculation, and Writing in the Making of Early America. – М.: , 2008. – 232 с. Davide Rodogno. Against Massacre – Humanitarian Interventions in the Ottoman Empire. – М.: , 2011. – 0 с. Len Silverston, Paul Agnew. The Data Model Resource Book, Vol. 3: Universal Patterns for Data Modeling. – М.: Wiley, 2009. – 648 с. Clastres. Society Against the State – Essays in Political Anthropology. – М.: , 1988. – 0 с. P Clastres. Society Against the State – Essays in Political Anthropology (Paper). – М.: , 1990. – 218 с. Jennifer J Baker. Securing the Commonwealth – Debt, Speculation, and Writing in the Making of Early America. – М.: , 2006. – 240 с. S Berger. Peasants Against Politics – Rural Organization in Britanny 1911–1967. – М.: , 1974. – 312 с. Isaiah Berlin. Against the Current – Essays in the History of Ideas. – М.: , 2002. – 474 с. Brajendra C. Sutradhar. Dynamic Mixed Models for Familial Longitudinal Data (Springer Series in Statistics). – М.: , 2011. – 506 с. L FINKEL. Finkel: Data File Programming In Basic (pr Only). – М.: , 1981. – 338 с. Security Valuation And Risk Analysis: Assessing Value In Investment Decision-Making. – М.: , 2011. – 614 с. Voice & Data Communications Handbook, Fifth Edition. – М.: , 2011. – 650 с. David Endler, Mark Collier. Hacking Exposed VoIP: Voice Over Ip Security Secrets & Solutions. – М.: McGraw-Hill Osborne Media, 2006. – 574 с. Leon Shklar, Richard Rosen. Web Application Architecture: Principles, Protocols and Practices. – М.: , . – с. Vivek Bhushan. Securing Published Data In Cloud Using Data Incognito. – М.: LAP Lambert Academic Publishing, 2013. – 76 с. Habis Al-Zoubi. Pretreatment in Desalination: Prediction of NF membranes. – М.: LAP Lambert Academic Publishing, 2011. – 304 с. Abhishek Purohit. An Efficient Energy Utilization in MANET. – М.: LAP Lambert Academic Publishing, 2012. – 92 с. Vinav Keshari. Secure Web Service:Encryption. – М.: LAP Lambert Academic Publishing, 2012. – 72 с. Mukul Pratap Singh and Kunal Gupta. Draining injected invalid data using EBCAS scheme in WSN. – М.: LAP Lambert Academic Publishing, 2013. – 64 с. Govind Sharma and Manish Gupta. Secure routing in wireless mobile Ad-Hoc network. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Maitrik Shah. Packet Watermarking using IP options field. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Samiullah Durrani. Mobile Device Data Entry Error in Emergency Operations Centers. – М.: LAP Lambert Academic Publishing, 2011. – 112 с. Patrick Ezigbo. Model for Data Integration in Financial Services Institutions. – М.: LAP Lambert Academic Publishing, 2011. – 180 с. Sharup Barua and Ratan Chandra Mondal. Impact of Node Mobility on the Voice Quality in Mobile Ad-hoc Network. – М.: LAP Lambert Academic Publishing, 2012. – 92 с. Sandeep Singh. Performance Evaluation of IP and MPLS Based Networks. – М.: LAP Lambert Academic Publishing, 2012. – 88 с. Jaber Al-Balushi and Afaq Ahmad. Response Data Compression Techniques in Digital Circuit Testing. – М.: LAP Lambert Academic Publishing, 2014. – 96 с. Mohammed Chetioui and Fatima Bouasria. CDMA and PRMA for multimedia mobile communication. – М.: LAP Lambert Academic Publishing, 2015. – 112 с. Punit N. Dhirawani. A Holistic Security System Using Motion Sensors. – М.: LAP Lambert Academic Publishing, 2011. – 72 с. Asad Ali and Sajjad Ali. Performance Analysis of AODV, DSR and OLSR in MANET. – М.: LAP Lambert Academic Publishing, 2011. – 84 с. Sankalp Bahadur Singh and Asha Ambhaikar. Optimization Of Routing Protocol In Manet Using GA. – М.: LAP Lambert Academic Publishing, 2013. – 64 с. Samy S. Soliman. Hierarchically Clustered Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 156 с. Sukanta Dash and Manmath Roul. Two phase flow pressure drop in sudden expansion and contraction. – М.: LAP Lambert Academic Publishing, 2010. – 136 с. Prasanna Sridhar and Asad M. Madni. Fault-Tolerant Data Aggregation Methods in Sensor Networks. – М.: LAP Lambert Academic Publishing, 2010. – 172 с. Celina Myrann Sorboe. Security and Inclusive Citizenship. – М.: LAP Lambert Academic Publishing, 2013. – 144 с. Anne Chepkurui. Impact of Tobacco Farming on Household Food Security in Ang'urai Kenya. – М.: LAP Lambert Academic Publishing, 2013. – 180 с. Jude Kagoro. The Urban (In)Security Paradox in Uganda. – М.: LAP Lambert Academic Publishing, 2012. – 124 с. Thanh Yen Thao Phan. HIV Infection among Female Sex Workers in VinhLong, Vietnam, 2009. – М.: LAP Lambert Academic Publishing, 2013. – 72 с. Nestory Riwa. Security and Illegal Immigrants in TANZANIA. – М.: LAP Lambert Academic Publishing, 2012. – 52 с. Olukemi Asemota. HIV/AIDS MANAGEMENT IN THE WORKPLACE: FOCUS ON SECURITY FORCES. – М.: LAP Lambert Academic Publishing, 2010. – 240 с. Muhammad Zakaullah. Design of 20 G router on NETFPGA. – М.: LAP Lambert Academic Publishing, 2011. – 72 с. Carike Verbooy. The use of nude celebrities in development communication campaigns. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Monirul Islam. Violence against Women in Bangladesh. – М.: LAP Lambert Academic Publishing, 2013. – 96 с. Lighton Dube. Land Tenure Security and Agriculture Performance in Zimbabwe. – М.: LAP Lambert Academic Publishing, 2015. – 124 с. Ronald Lulijwa. The Fish Export Trade and Food Security. – М.: LAP Lambert Academic Publishing, 2012. – 64 с. Rafatu Mohammed. Food Security And Coping Strategies Of Farm Households In Ejura, Ghana. – М.: LAP Lambert Academic Publishing, 2013. – 60 с. Tesfaye Hailu. Effective entomopathognic fungi against pink stem borer in sugarcane. – М.: LAP Lambert Academic Publishing, 2012. – 88 с. Agatha Daniel and Charles Olungah. Women's Indigenous Knowledge in Household Food Security. – М.: LAP Lambert Academic Publishing, 2012. – 100 с. Muhammad Subtain Raza. Evaluation of Bio-Nematicides against Root Knot Nematode in Tomato. – М.: LAP Lambert Academic Publishing, 2014. – 108 с. Jacob Tsado. Women involvement in farming activities and household food security. – М.: LAP Lambert Academic Publishing, 2011. – 128 с. Emmanuel Nepolo. Genetic variations of marama bean in the Namibian germplasm. – М.: LAP Lambert Academic Publishing, 2011. – 88 с. MOHAMMED AL-AMIN. APPLICATION OF SPATIAL DATA IN FOREST ECOLOGY AND MANAGEMENT. – М.: LAP Lambert Academic Publishing, 2011. – 252 с. Evangelin Hema Mariya,Dhivya Rajasankaran and Aswini Ramaswamy. Trusted Data Forwarding using POR in Manet. – М.: LAP Lambert Academic Publishing, 2013. – 72 с. Ayyaswamy Kathirvel,Srinivasan Rengaramanujam and Mohanambal Kathirvel. Prevention of attacks usign umpiring security model for manets. – М.: LAP Lambert Academic Publishing, 2012. – 192 с. Rupesh S. Mishra and D. K. Chitre. Data Leakage Detection in Relational Database. – М.: LAP Lambert Academic Publishing, 2013. – 68 с. Ayyoub Akbari Moghanjoughi and Abbas Mehdizadeh Zare Anari. Performance Analysis of Swarm Intelligence Based Routing Protocols. – М.: LAP Lambert Academic Publishing, 2012. – 112 с. Deepak Puthal and Bibhudatta Sahoo. Secure Data Collection & Critical Data Transmission in Mobile Sink WSN. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Aref Hassan Poor. Enhancement of DSDV Routing Protocol in Vehicular Ad Hoc Network. – М.: LAP Lambert Academic Publishing, 2013. – 76 с. Nisarg Gandhewar and Rahila Sheikh. Performance Valuation of AODV Under Sinkhole Attack In MANET Using NS2. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Arnab Banerjee,ANIRUDDHA BHATTACHARYYA and DIPAYAN BOSE. IMPLEMENTATION OF A TRUST BASED SECURE ROUTING PROTOCOL IN MANET. – М.: LAP Lambert Academic Publishing, 2012. – 292 с. Sandeep Kr. Agarwal and Dr. K. V. Arya. Security in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 88 с. E.A.Mary Anita. Securing Multicast Routing Protocols for Mobile Adhoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 88 с. Abbas Mehdizadeh Zare Anari and Ayyoub Akbari Moghanjoughi. Route optimization security in mobile IPv6 networks. – М.: LAP Lambert Academic Publishing, 2012. – 116 с. Yassar Aziz and Muhammad Naeem Aslam. Traffic Engineering with Multi-Protocol Label Switching. – М.: LAP Lambert Academic Publishing, 2010. – 68 с. Niroj Kumar Pani and Dr. Ashok Kumar Turuk. A Hybrid Zone-Based Routing Protocol for Secure Communication in MANET. – М.: LAP Lambert Academic Publishing, 2010. – 92 с. Kiran Kotla. Can delay based protocols survive in real world?. – М.: LAP Lambert Academic Publishing, 2014. – 76 с. Kundan Munjal,Shilpa Verma and Namita Munjal. Cooperative Black Hole Attack Detection by Modifying AODV. – М.: LAP Lambert Academic Publishing, 2012. – 64 с. Heba Elshandidy. Enhancing Security Solutions in Mobile Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2013. – 128 с. Saurabh Sharma and Sapna Gambhir. Cooperative Malicious Nodes Detection and Removal Scheme in MANETs. – М.: LAP Lambert Academic Publishing, 2014. – 108 с. Premalatha Natarajan. Mitigating congestion and collision in adhoc networks. – М.: LAP Lambert Academic Publishing, 2014. – 200 с. Xianhui Che. Control Protocol for Optical Packet Switched Local Area Network. – М.: LAP Lambert Academic Publishing, 2014. – 188 с. Ramandeep Kaur. Packet dropping attack in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2014. – 52 с. Ali Modirkhazeni. Mitigation of Passive Wormhole Attack in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2015. – 112 с. Nirbhay Chaubey. Securing AODV Routing Protocol in design of Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2015. – 132 с. Suman Paul. Study of Cluster Based Algorithm in MANET using Network Simulator. – М.: LAP Lambert Academic Publishing, 2015. – 52 с. Amol Zade. A New Cluster Approach for Wormhole Attack Removal in MANET using NS2. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с. Tejpal Singh. Security Protocols for Data Routing in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 68 с. Vinothkumar Jambulingam. Highly consistent and secured data delivery for mobile ad-hoc networks. – М.: LAP Lambert Academic Publishing, 2014. – 76 с. Amit Bhati. Congestion Control: Problem and Solution for Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 92 с. Shaila S. Math,Manjula R. Bharamagoudra and Sunil Kumar S. Manvi. VCS verified data transactions on SoC bus using AMBA AXI-04 protocol. – М.: LAP Lambert Academic Publishing, 2012. – 116 с. Marimuthu Kanagaraj and Eswari Venkatachalam. Multifactor Authentication Protocol for a Secured WSN. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Saurabh Mittal,Ankita Mittal and Sapna Boora. Security Enhancement using Dynamic Cache on DSR Based MANETS. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Gurpreet juneja. Security:MPLS VPN Network. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Shilpa Jaiswal and Sumeet Agrawal. Detection of Network Worm to Eliminate Security Threats in MANET. – М.: LAP Lambert Academic Publishing, 2012. – 52 с. Wisam Elmasry. Securing WBAODV Routing Protocol in MANETs. – М.: LAP Lambert Academic Publishing, 2013. – 100 с. Pallavi Kaliyar and Gagan Singla. A secure routing protocol for MANETs against byzantine attacks. – М.: LAP Lambert Academic Publishing, 2013. – 84 с. Haitham ELwahsh. Secure Service Discovery Protocol for ad-hoc Networks "hash function". – М.: LAP Lambert Academic Publishing, 2013. – 144 с. Soke Onyemelukwe. On-Demand Routing and Security in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2013. – 128 с. Sunil Kumar Senapati and Prof. Pabitra Mohan Khilar. SECURING FSR PROTOCOL AGAINST DATA PACKET DROPPING IN MANET. – М.: LAP Lambert Academic Publishing, 2010. – 64 с. RAJIV GHIMIRE. IP BASED Networks. – М.: LAP Lambert Academic Publishing, 2010. – 72 с. Muhammad Naeem Aslam and Yassar Aziz. Traffic Engineering with Multiprotocol label switching. – М.: LAP Lambert Academic Publishing, 2010. – 72 с. Gergely Acs. Secure Routing in Multi-hop Wireless Networks. – М.: LAP Lambert Academic Publishing, 2010. – 116 с. ANNADURAI P and Dr. V. PALANISAMY. Impact of Black Hole Attack on Multicast in Ad hoc Network (IBAMA). – М.: LAP Lambert Academic Publishing, 2011. – 84 с. Manuj Mishra,Govind Sharma and Ram Pathak. Secure Routing In Wireless Mobile Ad Hoc Network. – М.: LAP Lambert Academic Publishing, 2014. – 84 с. Ricardo Chaves. Secure Computing on Reconfigurable Systems. – М.: LAP Lambert Academic Publishing, 2010. – 212 с. Lamek Ronoh. Security Concern of Cloud Computing Models. – М.: LAP Lambert Academic Publishing, 2014. – 88 с. C. Balakrishnan and D. I. George Amalarethinam. Data Allocation Strategies in Distributed Database Systems. – М.: Scholars' Press, 2014. – 212 с. Anju Yadav. Study and Implementation on protocol in MANET. – М.: LAP Lambert Academic Publishing, 2013. – 68 с. Debasish Jena. On Protocols for Information Security Services. – М.: LAP Lambert Academic Publishing, 2011. – 136 с. Benjamin Eze. Policy-based Data Sharing for Event-driven Services in B2B Networks. – М.: LAP Lambert Academic Publishing, 2011. – 148 с. Hanane Houmani. Security Protocols Analysis. – М.: LAP Lambert Academic Publishing, 2012. – 288 с. Yacoob Tanveer. IDS in MANET. – М.: LAP Lambert Academic Publishing, 2012. – 64 с. Angelo Agatino Nicolosi. Efficient RSA Key Generation Protocol in the Two-Party Setting. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Amit Choudhary. Routing Security Issues in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2014. – 80 с. Noor Ul Amin. Secure MANET Communication Based on Hybrid Cryptosystem. – М.: LAP Lambert Academic Publishing, 2013. – 64 с. Soumya Chatterjee. Importance of Security in E-learning. – М.: LAP Lambert Academic Publishing, 2013. – 112 с. Navneet kaur Bajwa. Sanitization of Data in Computer Network. – М.: LAP Lambert Academic Publishing, 2012. – 92 с. Hrituparna Paul. Transmission Control Protocol Adaption Technique in MANET. – М.: LAP Lambert Academic Publishing, 2012. – 112 с. Tarachand Verma,Piyusha Tyagi and Somya Arya. Biometric Template Security in Iris Based Systems: A Novel Approach. – М.: LAP Lambert Academic Publishing, 2012. – 96 с. S. V. S. Kishore Kumar. Information Systems Audit And Security In Banking. – М.: LAP Lambert Academic Publishing, 2013. – 476 с. Лучшие результаты Ничего не найдено Дополнительные результаты Применение интеллектуального анализа данных. data mining в управлении страховой компанией. Ю.В. Грызенкова, З.Ф. Шарифьянова, "Управление в страховой компании", № 4, октябрь-декабрь 2007. Наука человековедения. интервью с Д. Уолтоном, профессором London Metropolitan University, экспертом CIPD. Chartered Institute of Personnel and Development, автором программы Master of Arts in Human Resource Strategies. И. Смирнова, "Кадровый менеджмент", № 5, июль-август 2007. Trade-in как способ обмена автомобиля. С.Н. Гордеева, "Торговля: бухгалтерский учет и налогообложение", N 2, февраль 2011 г. Проблемы применения универсальной юрисдикции in absentia. Г.А. Королев, "Журнал российского права", № 10, октябрь 2009. Тонкости trade-in. С.А.Королев, "НДС. Проблемы и решения", № 8, август 2009. In-store banking - новая модель банковского бизнеса. А. Пятков, "Банковское обозрение", № 11, ноябрь 2008. Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Руслан Это альтернативно одаренный преподаватель - объяснять или доказывать ему что-либо бесполезно. Остается надеяться, что на втором разе он остановится. Спасибо за консультацию.