Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Atif Farrukh. Secure Communication using Rossler Attractor. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.

Дополнительные результаты

  1. Kang Wu. Energy Economy in China: Policy Imperative, Market Dynamics, and Regional Developments. – М.: , 2012. – 600 с.
  2. David Ramsey, Dave Ramsey. More than Enough: The Ten Keys to Changing Your Financial Destiny. – М.: , 0. – 0 с.
  3. Sue Spielman, Liz Winfeld. The Web Conferencing Book: Understanding the Technology, Choose the Right Vendors, Software, and Equipment, Start Saving Time and Money Today. – М.: , 0. – 0 с.
  4. Neil J. Boucher. The Trunked Radio and Enhanced PMR Radio Handbook. – М.: , 0. – 0 с.
  5. Joseph Carr. The Technician's Radio Receiver Handbook. – М.: , 0. – 0 с.
  6. Ming Zhang. Major Powers at a Crossroads: Economic Interdependence and an Asia Pacific Security Community. – М.: , 0. – 0 с.
  7. William Rini. Mathematics of the Securities Industry. – М.: , 0. – 0 с.
  8. Stephane Garelli. World Competitiveness Yearbook 1999. – М.: , 0. – 0 с.
  9. Susan Buckingham. Local Environmental Sustainability. – М.: , 0. – 0 с.
  10. William B. Gamble. Investing in China: Legal, Financial and Regulatory Risk. – М.: , 0. – 0 с.
  11. Frank J. Fabozzi. Securities Lending and Repurchase Agreements. – М.: , 0. – 0 с.
  12. Frank J. Fabozzi, James L. Grant. Equity Portfolio Management. – М.: , 0. – 0 с.
  13. David E. Mulcahy. Materials Handling Handbook. – М.: , 0. – 0 с.
  14. International Workshop of Organisational Semiotics 2000 Staffordshire, Rodney J. Clarke, Peter Bogh Andersen, Ronald K. Stamper. Coordination and Communication Using Signs: Studies in Organisational Semiotics 2 (Information and Organization Design Series). – М.: , 0. – 0 с.
  15. Computer Security. – М.: , 0. – 0 с.
  16. Retail Security and Loss Prevention. – М.: , 0. – 0 с.
  17. Retail Security and Shrinkage Protection. – М.: , 0. – 0 с.
  18. Sam R. Lloyd. Developing Positive Assertiveness (Fifty-Minute Series.). – М.: , 0. – 0 с.
  19. HAROLD L. LUSTIG. 4 Steps to Financial Security for Lesbian and Gay Couples. – М.: , 0. – 0 с.
  20. Algernon Horatio. Depression Proof Your Future. – М.: , 0. – 0 с.
  21. John Roland, Mark J. Newcomb. CCSP Cisco Secure VPN Exam Certification Guide (CCSP Self-Study). – М.: , 0. – 0 с.
  22. James A. Rosenthal, Juan M. Ocampo. Securitization of Credit: Inside the New Technology of Finance. – М.: , 0. – 0 с.
  23. John R. Vacca. Public Key Infrastructure: Building Trusted Applications and Web Services. – М.: , 0. – 0 с.
  24. America's Changing Coasts: Private Rights And Public Trust (Advances in Ecological Economics). – М.: , 2005. – 0 с.
  25. David Beesley. Crow's Range: An Environmental History Of The Sierra Nevada. – М.: , 2004. – 0 с.
  26. Paul M. Pedersen, Kimberly S. Miloch, Pamela C. Laucella. Strategic Sport Communication. – М.: Human Kinetics Europe Ltd, 2007. – 408 с.
  27. Joe Nunziata. Spiritual Selling: How to Use the Attractor Sales System to Create Abundance in Your Business. – М.: , 2007. – 240 с.
  28. Dimensions of Inequality in Canada (Equality, Security, Community). – М.: , 2007. – 496 с.
  29. Timothy P. Layton. Information Security. – М.: , 2006. – 222 с.
  30. William Damon. The Moral Advantage: How to Succeed in Business by Doing the Right Thing. – М.: , 2004. – 216 с.
  31. Kimb Massey. Media Literacy Workbook. – М.: , 2004. – 64 с.
  32. Patrick Traynor, Patrick McDaniel, Thomas La Porta. Security for Telecommunications Networks (Advances in Information Security). – М.: , 2008. – 182 с.
  33. Mitsuru Kodama. New Knowledge Creation Through ICT Dynamic Capability Creating Knowledge Communities Using Broadband (HC). – М.: , 2008. – 224 с.
  34. ASC ISEAS. ASEAN Community: Unblocking the Roadblocks. – М.: , 2008. – 112 с.
  35. Drew Provan. iPhone in Easy Steps: Covers iPhone 4. – М.: , 2011. – 192 с.
  36. Dr. Robin Kelly. The Human Antenna: Reading the Language of the Universe in the Songs of Our Cells. – М.: , 2010. – 253 с.
  37. Applied Quantum Cryptography (Lecture Notes in Physics). – М.: , 2010. – 230 с.
  38. John Paul Mueller. NET Development Security SolutionsTM. – М.: , 2003. – 472 с.
  39. Russ Rogers. Network Security Evaluation Using the NSA IEM. – М.: , 2010. – 450 с.
  40. Rob Shein. Zero-Day Exploit: Countdown to Darkness. – М.: Syngress, 2008. – 364 с.
  41. Stacia Misner. Microsoft SQL Server 2008 Reporting Services Step by Step (+ CD-ROM). – М.: Microsoft Press, 2009. – 576 с.
  42. Theodore T. Allen. Introduction to Discrete Event Simulation and Agent-based Modeling: Voting Systems, Health Care, Military, and Manufacturing. – М.: , 2011. – 215 с.
  43. The Language Of Emotional Intelligence. – М.: , 2011. – 240 с.
  44. Citrix Xenapp Platinum Edition For Windows: The Official Guide. – М.: , 2011. – 576 с.
  45. The Ultimate French Review And Practice With Cd-Rom. – М.: , 2011. – 0 с.
  46. Ultimate Spanish Review And Practice With Cd-Rom, Second Edition. – М.: , 2011. – 0 с.
  47. Wireless Network Security A Beginners Guide. – М.: , 2011. – 400 с.
  48. Winning Body Language. – М.: , 2011. – 256 с.
  49. Mobile Application Security. – М.: , 2011. – 432 с.
  50. Voice & Data Communications Handbook, Fifth Edition. – М.: , 2011. – 650 с.
  51. Hands-On Microsoft Sql Server 2008 Integration Services, Second Edition. – М.: , 2011. – 720 с.
  52. Fundamentals Of Network Security. – М.: , 2011. – 672 с.
  53. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . –  с.
  54. Rogelio Martinez Perea. Internet Multimedia Communications Using SIP: A Modern Approach Including Java Practice. – М.: Morgan Kaufmann, 2008. – 600 с.
  55. San Francisco & Northern California. – М.: Дорлинг Киндерсли, 2009. – 336 с.
  56. Eduardo Fernandez-Buglioni. Security Patterns in Practice: Designing Secure Architectures Using Software Patterns. – М.: Wiley, 2013. – 582 с.
  57. Carmella Lieske, Scott Menking. Reading Adventures 1. – М.: Heinle Cengage Learning, 2012. – 128 с.
  58. Carmella Lieske, Scott Menking. Reading Adventures 3. – М.: National Geographic, 2011. – 128 с.
  59. Carmella Lieske, Scott Menking. Reading Adventures 2. – М.: National Geographic, 2012. – 128 с.
  60. Elizabeth Kuhnke. Communication Skills for Dummies. – М.: John Wiley and Sons, Ltd, 2013. – 264 с.
  61. Mario Herrera, Barbara Hojel. Pockets 3 (+ CD-ROM). – М.: Pearson Education, 2009. – 130 с.
  62. Mario Herrera, Barbara Hojel. Pockets 2 (+ CD-ROM). – М.: Pearson Education, 2009. – 130 с.
  63. Pockets 1. – М.: Pearson Education, 2009. – 112 с.
  64. Mario Herrera, Barbara Hojel. Pockets 1: Workbook (+ CD). – М.: Pearson Education, 2009. – 78 с.
  65. Mario Herrera, Barbara Hojel. Pockets 3: Workbook (+ CD). – М.: Pearson Education, 2014. – 94 с.
  66. Liu Xun. New Practical Chinese Reader 6: Textbook. – М.: Beijing Language and Culture University Press, 2009. – 300 с.
  67. Abhishek Roy,Sunil Karforma and Subhadeep Banik. Implementation Of Authentication In E-Governance–an Uml Based Approach. – М.: LAP Lambert Academic Publishing, 2013. – 116 с.
  68. Marimuthu Krishnaveni and Venkatachalam Radha. Classification of ISL using image processing techniques. – М.: Scholars Press, 2014. – 200 с.
  69. A. K. M. Harun-Ur-Rashid. E-Banking Services. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.
  70. Shaek Rana Mohammad Baki Billah and Mohammad Hafizur Rahman. Design & Development of Network Security System using IP Tables. – М.: LAP Lambert Academic Publishing, 2013. – 164 с.
  71. Tasnuva Ahmed,Rabiul Hossain and Dipesh Barua. Security System Using Ultrasound. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  72. Arindam Sarkar and J. K. Mandal. Artificial Neural Network Guided Secured Communication Techniques. – М.: LAP Lambert Academic Publishing, 2012. – 128 с.
  73. Punit N. Dhirawani. A Holistic Security System Using Motion Sensors. – М.: LAP Lambert Academic Publishing, 2011. – 72 с.
  74. S. A. R. Al-Haddad,M.H. Jamil and Ng Chee Kyun. Cerebral Palsy Speech Recognition System. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  75. Atif Farrukh. Secure Communication using Rossler Attractor. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  76. James Gadze. Embedded Wireless Sensor Network for monitoring and control. – М.: LAP Lambert Academic Publishing, 2010. – 168 с.
  77. Enangha Abeng. A Hybrid Hash Message Authentication Code (HMAC). – М.: LAP Lambert Academic Publishing, 2011. – 204 с.
  78. Syed Ashar Akhtar. Design and Development of OBC of a PICO Spacecraft. – М.: LAP Lambert Academic Publishing, 2012. – 116 с.
  79. Sarkar Mahbub Akhter. Devlopment of GaN Resonant Cavity LEDs. – М.: Scholars' Press, 2013. – 196 с.
  80. Amandeep Kaur,Parminder Singh and Ginni Sharma. Micro-strip Wearable Antenna. – М.: LAP Lambert Academic Publishing, 2014. – 56 с.
  81. ANKUR SINGH KANG. Pulse shaping in wireless communication. – М.: LAP Lambert Academic Publishing, 2011. – 112 с.
  82. Raul Aquino. Inter-Vehicular Communications using Wireless Ad-Hoc Networks. – М.: LAP Lambert Academic Publishing, 2011. – 160 с.
  83. EMMANUEL ONYEJEOSE. Innovative techniques in branding and communication of Mega events. – М.: LAP Lambert Academic Publishing, 2012. – 308 с.
  84. Idris Guclu and Fatih Irmak. Understanding Violent Crime and Social Structure. – М.: LAP Lambert Academic Publishing, 2013. – 148 с.
  85. Wilson Okaka. Designing Public Awareness Communication Campaign. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  86. Debabrata Samanta,Syed Khutubuddin Ahmed Khadri and Mousumi Paul. Some Research on Message Security. – М.: Scholars' Press, 2014. – 68 с.
  87. Olga Menagarishvili. Internet Dictionaries of Science and Technology: The Use and Usability. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  88. Tafadzwa Fungayi Mwangolela. Essays on Social Policy and Social Security Communities. – М.: LAP Lambert Academic Publishing, 2013. – 84 с.
  89. Judy Chepngeno and Obed Limo. Effectiveness of Communication Channels Used in Kenya. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  90. Stanley Mana Molefe. Perceptions of communication between traditional healers and clients. – М.: LAP Lambert Academic Publishing, 2013. – 64 с.
  91. Shekhar Saini and Amit Gupta. Inter-satellite Optical Wireless Communication Link (ISOWC). – М.: LAP Lambert Academic Publishing, 2014. – 76 с.
  92. Barirega Akankwasah. Contribution Of Protected Areas Towards Peoples’ Livelihoods In Uganda. – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  93. Radoslav Ivancik and Pavel Necas. Postmodern Conflicts on African Continent. – М.: LAP Lambert Academic Publishing, 2013. – 180 с.
  94. Ioana Ban. Black Sea Region: A Nascent Security Community?. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  95. Samuel Scicluna. Transatlantic security relations since the end of the cold war. – М.: LAP Lambert Academic Publishing, 2014. – 88 с.
  96. GAURAV SHARMA. Implementation and analysis of DES algorithm. – М.: LAP Lambert Academic Publishing, 2014. – 76 с.
  97. Harini Sivalingam. Discourses of Fear and Victimization. – М.: LAP Lambert Academic Publishing, 2009. – 116 с.
  98. Omondi Oketch. LANGUAGE USE AND MODE OF COMMUNICATION IN COMMUNITY DEVELOPMENT. – М.: LAP Lambert Academic Publishing, 2010. – 356 с.
  99. Padmashali. A Secure communication for wireless sensor networks. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  100. Nooruldeen Qader and Loay George. Design and Implement a Secure Database Using Multi Level Security. – М.: LAP Lambert Academic Publishing, 2014. – 124 с.
  101. Brijender Kahanwal. A Research Study On Java File Security System Using Rijndael Algorithm. – М.: LAP Lambert Academic Publishing, 2012. – 244 с.
  102. Subhankar Chattopadhyay and Ashok Kumar Turuk. Key Pre-distribution and Key Revocation in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2011. – 72 с.
  103. Yahya Al-Moliki. Coded Cooperation in Wireless Communications Using RSCC Channel Coder. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  104. Sandeep Kr. Agarwal and Dr. K. V. Arya. Security in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  105. Mohammed azharuddin Adhoni. Secure communication in p2p networks. – М.: LAP Lambert Academic Publishing, 2012. – 124 с.
  106. Rayala Upendar Rao and K. Palanivel. Secure Routing In Cluster Based Wireless Sensor Network By Using ECC. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  107. Ravinder Singh Mann. A Comparative Evaluation of Cryptographic Algorithms. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  108. Hamid Reza Barzegar,Mahdiyeh Barzegar and Neshat Alidad. Energy Efficient And Secured Communication For Manets In Military. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  109. Mohd Nazri Ismail,Mohd Afizi Shukran and Kamaruzaman Maskat. Smarthome Computing System Using Mobile Devices. – М.: LAP Lambert Academic Publishing, 2014. – 88 с.
  110. Niroj Kumar Pani and Dr. Ashok Kumar Turuk. A Hybrid Zone-Based Routing Protocol for Secure Communication in MANET. – М.: LAP Lambert Academic Publishing, 2010. – 92 с.
  111. Sourav Kanti Addya and Ashok Kumar Turuk. Key Pre-distribution in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  112. Sanjeev Karmakar and Manoj K. Kowar. A Comprehensive Lecture Notes on RSA-1024 Cryptography. – М.: LAP Lambert Academic Publishing, 2013. – 160 с.
  113. Wei Lu. Analysis of Inter-Vehicle Communication Using Network Simulator. – М.: LAP Lambert Academic Publishing, 2013. – 112 с.
  114. P. Ganesh Kumar and S. Ramesh. Secure Routing Protocol for ICMN. – М.: LAP Lambert Academic Publishing, 2014. – 64 с.
  115. R. Baskaran,M. S. Saleem Basha and A. Balasubramanian. Two Tier Security Framework for Service Oriented Systems. – М.: LAP Lambert Academic Publishing, 2012. – 176 с.
  116. Saurabh Mittal,Ankita Mittal and Sapna Boora. Security Enhancement using Dynamic Cache on DSR Based MANETS. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  117. Amish Kumar. AES Security Enhancement Using Double S-Box. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  118. Shilpa Jaiswal. Elimination of Security Threats Using Trusted Proactive Routing. – М.: LAP Lambert Academic Publishing, 2014. – 56 с.
  119. Tarek S. Sobh. Effective and Extensive VPN for Securing Web Applications. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  120. Biswojit Bose and Iftekhar Ahmad. Bit Error Analysis in WiMAX at Vehicular Speeds using Nakagami-m Model. – М.: LAP Lambert Academic Publishing, 2013. – 128 с.
  121. Aiman Abdul Razzak Al-Sabaawi. Hide A Text In An Image File (BMP). – М.: LAP Lambert Academic Publishing, 2013. – 80 с.
  122. Mahimn Bhupendrabhai Pandya,Ashish Jani and Nalin Jani. Bespoke Technique For Copyright Digital Images & Secure Communication. – М.: LAP Lambert Academic Publishing, 2014. – 84 с.
  123. Vasilios Katos. Symmetric cryptography in computer communications. – М.: LAP Lambert Academic Publishing, 2011. – 344 с.
  124. Hammad Kazmi. Security and Privacy issues in Near Field Communication (NFC) Systems. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  125. Kester Quist-Aphetsi. A Novel Cryptographic Key-exchange Algorithm. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  126. Predrag Tasevski. Interactive Cyber Security Awareness Program. – М.: LAP Lambert Academic Publishing, 2012. – 184 с.
  127. Yacoob Tanveer. IDS in MANET. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  128. Radu-Nicolae Turcas. Hands free human-computer interaction paradigm using face tracking. – М.: LAP Lambert Academic Publishing, 2013. – 144 с.
  129. Dirk Lessner. Network Security for Embedded Systems. – М.: LAP Lambert Academic Publishing, 2009. – 232 с.
  130. Penmetsa V. Krishna Raja,A.S.N. Chakravarthy and P.S. Avadhani. Crypto Authentication System Using Hilbert Matrices. – М.: LAP Lambert Academic Publishing, 2014. – 160 с.
  131. Makarand Mali and Nitin Patil. Efficient Watermarking Using Language Constructs. – М.: LAP Lambert Academic Publishing, 2014. – 80 с.
  132. Niranjan Lal. Security Enhancement of Java RMI in Distributed Systems. – М.: LAP Lambert Academic Publishing, 2014. – 64 с.
  133. Rodney Mushininga. Nanorobotic Agents Communication Using Bee Inspired Swarm Intelligence. – М.: LAP Lambert Academic Publishing, 2014. – 100 с.
  134. Mahmoud Osama Ouf,Raafat A.El-kammar and Alaa Eldeen Sayed Ahmed. Implementation and Analysis Requirements of Ultra-Lightweight. – М.: LAP Lambert Academic Publishing, 2012. – 132 с.
  135. Tadeusz Struk. Elliptic Curve Cryptography as suitable solution for mobile devices. – М.: LAP Lambert Academic Publishing, 2010. – 88 с.
  136. Sonu Lal Gupta and Aditi Sharan. Identifying Web Communities. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  137. Haneen Qarabash. An Intranet Based System For Securities Trading. – М.: LAP Lambert Academic Publishing, 2013. – 84 с.
  138. Arpita Mondal. Simple and Secured Access to Networked Home Appliances via Internet. – М.: LAP Lambert Academic Publishing, 2010. – 180 с.
  139. Levenson Nancy. Research on Retirement Communities. – М.: LAP Lambert Academic Publishing, 2010. – 212 с.
  140. Mahmuda Nasrin and Md. Taj Uddin. Land Tenure System and Food Security. – М.: LAP Lambert Academic Publishing, 2014. – 108 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Построить идеальный каскад информации удается далеко не всегда. интервью с А. Синикас. Angela D. Sinickas, президентом международной консалтинговой компании Sinickas Communications, Inc. США, www.sinicom. com. В. Правоторов, "Кадровый менеджмент", № 4, май-июнь 2006.

Образцы работ

Тема и предметТип и объем работы
Факторы, влияющие на мотивацию менеджеров, работающих в сфере рекламы
Управление персоналом
Диплом
90 стр.
Основы избирательных компаний
PR
Диплом
72 стр.
Последствия операции НАТО
Политология
Диплом
80 стр.
Особенности организации PR компании в туристическом бизнесе
Реклама и PR
Дипломный проект
71 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Николай, 06.05
Получил сегодня рефераты! Спасибо! Сдерживаю свою радость!!! Сглазить боюсь! Дождемся сессии, посмотрим, что скажут препады. Если их реакция совпадёт с моей, то обязательно продолжим сотрудничество! С почтением Всем.