Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Neil C. Hughes. China's Economic Challenge: Smashing the Iron Rice Bowl. – М.: , 0. – 0 с. Charles Jennings, Elizabeth Dyson, Lori Fena. The Hundredth Window: Protecting Your Privacy and Security in the Age of the Internet. – М.: , 0. – 0 с. George S Faigen, Boris Fridman, Arielle Emmett. Wireless Data for the Enterprise. – М.: , 0. – 0 с. Thomas C. Glaessner. Electronic Safety and Soundness: Securing Finance in a New Age (World Bank Working Papers). – М.: , 2004. – 0 с. Richard Coyne. Cornucopia Limited : Design and Dissent on the Internet. – М.: , 2005. – 272 с. Patrick Traynor, Patrick McDaniel, Thomas La Porta. Security for Telecommunications Networks (Advances in Information Security). – М.: , 2008. – 182 с. Aaron Newman, Jeremy Thomas. ENTERPRISE 2.0 IMPLEMENTATION. – М.: , 2008. – 406 с. Enterprise 2.0 Implementation. – М.: , 2011. – 406 с. Cloud Computing, A Practical Approach. – М.: , 2011. – 352 с. Mac Os X System Administration. – М.: , 2011. – 528 с. Michael Gregg, Eric Seagren, Angela Orebaugh, Matt Jonkman, Raffael Marty. How to Cheat at Configuring Open Source Security Tools (How to Cheat) (How to Cheat). – М.: , 2007. – 528 с. George S. Oreku. ENHANCING E-COMMERCE SECURITY. – М.: LAP Lambert Academic Publishing, 2011. – 212 с. Nitin Kanzariya and Ashish Nimavat. Security of Digital Image Using Hybrid Steganography. – М.: LAP Lambert Academic Publishing, 2013. – 84 с. Nisar Ahmed Rana and Marya Gul. Image Encryption. – М.: LAP Lambert Academic Publishing, 2012. – 92 с. Jaiz Anuar Yeop Johari. Advanced RFID Application. – М.: LAP Lambert Academic Publishing, 2011. – 132 с. Yasir Waseem Iqbal. Sociology Of Networking. – М.: LAP Lambert Academic Publishing, 2013. – 88 с. Ivana Zelenika. Barriers to Appropriate Technologies for Sustainable Development. – М.: LAP Lambert Academic Publishing, 2012. – 92 с. Kaveh the Hammersmith. Global Hezbollah - The Iranian National-Islamist Nebula. – М.: LAP Lambert Academic Publishing, 2011. – 332 с. Attiq-ur- Rehman. The Origin and Evolution of Israeli Nuclear Program. – М.: LAP Lambert Academic Publishing, 2012. – 124 с. Marja Heimonen. Music Education and Law. – М.: LAP Lambert Academic Publishing, 2010. – 296 с. Sanping Li. Towards Ultra-High Speed Online Network Traffic Classification. – М.: LAP Lambert Academic Publishing, 2013. – 200 с. Mohammad Bani Younes and Aman Jantan. Image Encryption Using Block-Based Transformation Algorithm. – М.: LAP Lambert Academic Publishing, 2011. – 176 с. Mohammad S. I. Mamun. Intrusion Detection System Architecture in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Vinothkumar Jambulingam. Secure and Anonymous Routing for Mobile Adhoc Networks. – М.: LAP Lambert Academic Publishing, 2014. – 72 с. kalyani chalamalasetty. Architecture for IMS Security to Mobile:. – М.: LAP Lambert Academic Publishing, 2010. – 60 с. Mohamed Geaiger. Development of Secure Domain Control Frame Work. – М.: LAP Lambert Academic Publishing, 2011. – 224 с. Albert Wasef. Managing and Complementing PKI for Securing Vehicular Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2011. – 204 с. Cosmin Dini and Pascal Lorenz. Data Management in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2011. – 144 с. Rakesh Jha. Security Issues In AD-HOC And Infrastructure (WLAN) Networks. – М.: LAP Lambert Academic Publishing, 2011. – 124 с. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с. Shaffali Gupta and Sanmeet Kaur. A GUI Framework for detecting Intrusions using Bro IDS. – М.: LAP Lambert Academic Publishing, 2013. – 76 с. Pushphas Chaturvedi and Kunal Gupta. Enhanced Packet Dissembling Schemes For Jamming Attacks Prevention. – М.: LAP Lambert Academic Publishing, 2013. – 76 с. Raj Shree and Ravi Prakash Pandey. Security Advancement in ZRP based Wireless Networks. – М.: LAP Lambert Academic Publishing, 2014. – 92 с. Manish Gupta and Dharmendra Kumar. Design and Implementation of Digital Watermarking. – М.: LAP Lambert Academic Publishing, 2014. – 172 с. ANNADURAI P and Dr. V. PALANISAMY. Impact of Black Hole Attack on Multicast in Ad hoc Network (IBAMA). – М.: LAP Lambert Academic Publishing, 2011. – 84 с. Manuj Mishra,Govind Sharma and Ram Pathak. Secure Routing In Wireless Mobile Ad Hoc Network. – М.: LAP Lambert Academic Publishing, 2014. – 84 с. Suvamoy Changder. Text Steganography through Different Indian Languages. – М.: LAP Lambert Academic Publishing, 2011. – 164 с. Yacoob Tanveer. IDS in MANET. – М.: LAP Lambert Academic Publishing, 2012. – 64 с. Rafal AL-Khashab. An Authentication Model for Cloud Computing Application. – М.: LAP Lambert Academic Publishing, 2014. – 104 с. Amnesh Goel and Nidhi Chandra. Secure Image Archival Based on Image Encryption Technique. – М.: LAP Lambert Academic Publishing, 2012. – 64 с. Bhaarath Venkateswaran. Adaptive Internet Threat Forecasting. – М.: LAP Lambert Academic Publishing, 2011. – 116 с. Kimberly S. Hogelucht. Tapping the Hidden Job Market Through Informational Interviews. – М.: LAP Lambert Academic Publishing, 2011. – 84 с. Neva Slani. Secure Open Networks. – М.: , 2010. – 124 с. Дополнительные результаты William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с. Securities Compliance Index. Securities Compliance Index, Second Edition: A Topical Guide To U.S. Securities Regulation. – М.: , 2012. – 512 с. Margaret Wheatley, Paula Griffin, Kristine Quade, National OD Network. Organization Development at Work: Conversations on the Values, Applications, and Future of OD (J-B O-D (Organizational Development)). – М.: Pfeiffer, 2003. – 224 с. Structural Adjustment Participatory Review International Network. Structural Adjustment, the Sapri Report: The Policy Roots of Economic Crisis, Poverty and Inequality. – М.: , 0. – 0 с. Jenny Robinson, Open University. Development and Displacement. – М.: , 0. – 0 с. David Gabel, David F. Weiman. Opening Networks to Competition. – М.: , 0. – 0 с. John Mahoney, Elizabeth Vallance, Jack Mahoney, European Business Ethics Network. Business Ethics in a New Europe (Issues in Business Ethics, Vol 3). – М.: , 0. – 0 с. Robert Weinstein. Resumes Don't Get Jobs: The Realities and Myths of Job Hunting. – М.: , 0. – 0 с. Vivek Suneja, Open University. Policy Issues for Business: A Reader. – М.: , 0. – 0 с. Ross Fergusson, R. Fergusson, Gordon Hughes, Open University. Ordering Lives: Family, Work, Welfare. – М.: , 0. – 0 с. Julia Lowell, C. R. Neu, Daochi Tong, National Defense Research Institute, National Security Research Institute. Financial Crises and Contagion in Emerging Market Countries. – М.: , 0. – 0 с. Joseph S. Nye, William A. Owens, James R. Schlesinger, R. James Woolsey, James A. Lewis, Joseph S., Jr. Nye, James Andrew Lewis, Erin Schlather, Csis Commission on Technology Security in the Twenty-First Century. Computer Exports and National Security: New Tools for a New Century : A Report of the Csis Commission on Technology Security in the 21St-Century (Csis Panel Reports.). – М.: , 0. – 0 с. Mariana Mazzucato, Open University. Strategy for Business: A Reader. – М.: , 0. – 0 с. Sheryl Garrett, Marie Swift, The Garrett Planning Network. Just Give Me the Answer$ : Expert Advisors Address Your Most Pressing Financial Questions. – М.: , 0. – 0 с. Business Women's Network, WorkingWoman Network. Business Women's Network 2001 International Directory. – М.: , 0. – 0 с. Janet Soler, Anna Craft, Hilary Burgess, Open University. Teacher Development: Exploring Our Own Practice (Developing Practice in Primary Education). – М.: , 0. – 0 с. Ifip Tc3, Ethical, and Cognitive I Wg3.1&3.2 Open Conference on Social, Tom J. Van Weert, Robert K. Munro, Tom J. Van Weert. Informatics and the Digital Society: Ifip Tc3/Wg3.1&3.2 Open Conference on Social, Ethical, and Cognitive Issues of Informatics and Ict, July 22-26, 2 ... l Federation for Information Processing, 244). – М.: , 0. – 0 с. Carrie Paechter, Open University. Knowledge, Power and Learning (Learning Matters). – М.: , 0. – 0 с. Jesus Mena. Homeland Security Techniques and Technologies (Networking Series). – М.: , 0. – 0 с. Aspatore Books Staff. Inside the Minds: Security Matters - Industry Leaders from eBay, Inc., Motorola, Internet Security Systems & More on Protecting Your Most Valuable Assets. – М.: , 0. – 0 с. Thomas C. Glaessner. Electronic Safety and Soundness: Securing Finance in a New Age (World Bank Working Papers). – М.: , 2004. – 0 с. Peter R., MBA Ramsaroop. Securing Business Intelligence: Knowledge and CyberSecurity in the Post 9/11 World. – М.: , 2004. – 0 с. Committee on Federal Regulation of Securities Committee. The Fund Director's Guidebook: Third Edition (Fund Director's Guidebook). – М.: , 2006. – 128 с. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с. 3I Network. India Infrastructure Report 2007 (Hindi) Rural Infrastructure. – М.: , 2007. – 360 с. Patrick Traynor, Patrick McDaniel, Thomas La Porta. Security for Telecommunications Networks (Advances in Information Security). – М.: , 2008. – 182 с. Network Security. – М.: , 2008. – 370 с. The Transition Network, Gail Rentsch. Smart Women Don't Retire -- They Break Free: From Working Full-Time to Living Full-Time. – М.: , 2008. – 272 с. Meridian Securities Market. World Stock Exchange Fact Book. – М.: , 2008. – 0 с. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с. Daniel Clark. Network Access Control 100 Success Secrets - 100 Most Asked NAC Questions on Implementation and Deployment of unify endpoint security technology, user ... and network security enforcement. – М.: , 2008. – 180 с. Bastian Cleve. Film Production Management. – М.: Focal Press, 2006. – 240 с. Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards and Applications (Wireless Networks and Mobile Communications). – М.: , 2008. – 424 с. Food Network Kitchens. Food Network Favorites. – М.: , 2009. – 264 с. Rob Cameron. Juniper(r) Networks Secure Access SSL VPN Configuration Guide. – М.: , 2010. – 656 с. Owen Poole. Network Security. – М.: , 2010. – 224 с. XYPRO Technology Corp. Securing HP NonStop Servers in an Open Systems World. – М.: , 2010. – 1000 с. James Joshi. Network Security: Know It All. – М.: , 2010. – 368 с. Steve Manzuik. Network Security Assessment: From Vulnerability to Patch. – М.: , 2010. – 500 с. Jan L. Harrington. Network Security. – М.: , 2010. – 384 с. Open University. The Ocean Basins: Their Structure and Evolution. – М.: , 2010. – 192 с. John R. Vacca. Network and System Security. – М.: , 2010. – 408 с. Joe Levy. SonicWALL Secure Wireless Networks Integrated Solutions Guide. – М.: , 2010. – 512 с. Eric Seagren. Secure Your Network for Free. – М.: , 2010. – 512 с. Russ Rogers. Network Security Evaluation Using the NSA IEM. – М.: , 2010. – 450 с. Brien Posey. GFI Network Security and PCI Compliance Power Tools. – М.: , 2010. – 488 с. Open University. Ocean Circulation. – М.: , 2010. – 286 с. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с. Paul Goransson. Secure Roaming in 802.11 Networks. – М.: , 2010. – 368 с. Open University. Seawater. – М.: , 2010. – 166 с. Steven Andres. Security Sage's Guide to Hardening the Network Infrastructure. – М.: , 2010. – 608 с. Syngress. Managing Cisco Network Security 2E. – М.: , 2010. – 752 с. Jay Beale. 2008 Open Source Penetration Testing and Security Professional CD. – М.: , 2010. – 0 с. Open University. Waves, Tides and Shallow-Water Processes. – М.: , 2010. – 228 с. Bill English. MCSA/MCSE: Windows® 2000 Network Security Administration Study Guide. – М.: , 2003. – 574 с. Food Network Kitchens. How to Boil Water. – М.: , 2009. – 256 с. Russ Kaufman. MCSA/MCSE: Windows® Server 2003 Network Security Administration Study Guide. – М.: , 2004. – 560 с. Coopers & Lybrand International Tax Network. 1992 International Tax Summaries. – М.: , 1992. – 1248 с. Nitesh Dhanjani. Network Security Tools. – М.: , 2005. – 340 с. Thomas W. Madron. Network Security in the 90?s. – М.: , 1992. – 304 с. Microsoft. MCSE Training Kit (Exam 70–220) – Designing Microsoft Windows 2000 Network Security. – М.: , 2001. – 864 с. Coopers & Lybrand International Tax Network. 1994 International Tax Summaries. – М.: , 1994. – 1140 с. Andrew Lockhart. Network Security Hacks. – М.: , 2004. – 316 с. Sead Muftic. Security Architecture for Open Distributed Systems. – М.: , 1993. – 298 с. DAN. Network Security In A Mixed Environment. – М.: , 1998. – 456 с. Jahanzeb Khan. Building Secure Wireless Networks with 802.11. – М.: , 2003. – 352 с. Microsoft Official Academic Course. 70–298 Designing Security for a Microsoft® Windows ServerTM 2003 Network Package. – М.: , 2005. – 744 с. Microsoft Official Academic Course. 70–299 Implementing and Administering Security in a Microsoft® Windows ServerTM 2003 Network Package. – М.: , 2005. – 836 с. Smith. Delete Control and Security of Interconnected Networks Disk. – М.: , 1998. – 0 с. Matthew Strebe. MCSA/MCSE Self–Paced Training Kit (Exam 70–214) – Implemanting and Administering Security in a Microsoft Windows 2000 Network. – М.: , 2003. – 704 с. Matthew Strebe. Network Security JumpStartTM. – М.: , 2002. – 384 с. Coopers & Lybrand Global Tax Network. 1998 International Tax Summaries. – М.: , 1998. – 1376 с. Pawan K Bhardwaj. A+. Network+, Security+ Exams in a Nutshell. – М.: , 2007. – 812 с. Eric Cole. Network Security Bible. – М.: , 2005. – 694 с. Roberta Bragg. MCSE Self–Paced Training Kit (Exam 70–298) – Designing Security for a Microsoft Windows Server 2003 Network. – М.: , 2004. – 864 с. S MUFTIC. Muftic: ?security? Mechanisms For Computer Network S. – М.: , 1989. – 196 с. Joseph Davies. Deploying Secure 802.11 Wireless Networks with Microsoft Windoows. – М.: , 2003. – 416 с. Coopers & Lybrand Global Tax Network. 1997 International Tax Summaries. – М.: , 1997. – 1280 с. Pramode K. Verma, Ling Wang. Voice over IP Networks: Quality of Service, Pricing and Security (Lecture Notes in Electrical Engineering). – М.: , 2011. – 200 с. Eric Cole. Wiley Pathways Network Security Fundamentals Project Manual. – М.: , 2008. – 312 с. James E. Goldman. Network and E–Commerce Security. – М.: , 1975. – 768 с. Andrew Lockhart. Network Security Hacks 2e. – М.: , 2006. – 352 с. Chris Mcnab. Network Security Assessment 2e. – М.: , 2007. – 464 с. Cryptography & Network Security. – М.: , 2007. – 0 с. Computer Networks: An Open Source Approach. – М.: , 2011. – 0 с. Richard Deal. CCNA Cisco Certified Network Associate Security Study Guide: Exam 640-553 (+ CD-ROM). – М.: McGraw-Hill Osborne Media, 2009. – 832 с. Securing Global Transportation Networks. – М.: , 2011. – 312 с. Wireless Network Administration A Beginner'S Guide. – М.: , 2011. – 336 с. Wireless Network Security A Beginners Guide. – М.: , 2011. – 400 с. Networking, A Beginner'S Guide, Fifth Edition. – М.: , 2011. – 448 с. Mac Os X System Administration. – М.: , 2011. – 528 с. Operating Systems Demystified. – М.: , 2011. – 400 с. CWNA: Certified Wireless Network Administrator & CWSP Certified Wireless Security Professional All-in-One Exam Guide. – М.: , 2011. – 0 с. Network Security: The Complete Reference. – М.: , 2011. – 896 с. Fundamentals Of Network Security. – М.: , 2011. – 672 с. Greg Holden. Guide to Firewalls and Network Security: Intrusion Detection and VPNs. – М.: Course Technology, 2003. – 512 с. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . – с. Thomas Porter, Jan Kanclirz Jr. Practical VoIP Security. – М.: Syngress, 2006. – 564 с. Michael Gregg, Eric Seagren, Angela Orebaugh, Matt Jonkman, Raffael Marty. How to Cheat at Configuring Open Source Security Tools (How to Cheat) (How to Cheat). – М.: , 2007. – 528 с. Yi Qian, James Joshi, David Tipper, Prashant Krishnamurthy. Information Assurance: Dependability and Security in Networked Systems. – М.: Morgan Kaufmann, 2007. – 576 с. Ido Dubrawsky. How to Cheat at Securing Your Network. – М.: Syngress, 2007. – 432 с. FOOD NETWORK KITCHEN. CHOPPED COOKBOOK, THE. – М.: Clarkson Potter Publishers, 2014. – с. George S. Oreku. ENHANCING E-COMMERCE SECURITY. – М.: LAP Lambert Academic Publishing, 2011. – 212 с. Govind Sharma and Manish Gupta. Secure routing in wireless mobile Ad-Hoc network. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Shaek Rana Mohammad Baki Billah and Mohammad Hafizur Rahman. Design & Development of Network Security System using IP Tables. – М.: LAP Lambert Academic Publishing, 2013. – 164 с. Anand Kannan. Evaluation of the Security Mechanisms in Cloud Networks. – М.: LAP Lambert Academic Publishing, 2013. – 192 с. Nitin Kanzariya and Ashish Nimavat. Security of Digital Image Using Hybrid Steganography. – М.: LAP Lambert Academic Publishing, 2013. – 84 с. Arindam Sarkar and J. K. Mandal. Artificial Neural Network Guided Secured Communication Techniques. – М.: LAP Lambert Academic Publishing, 2012. – 128 с. Nisar Ahmed Rana and Marya Gul. Image Encryption. – М.: LAP Lambert Academic Publishing, 2012. – 92 с. Xiangqian Chen. DEFENSE AGAINST NODE COMPROMISE IN SENSOR NETWORK SECURITY. – М.: LAP Lambert Academic Publishing, 2009. – 108 с. Naseer Ahmad. Security Issues in Wireless Networks. – М.: LAP Lambert Academic Publishing, 2010. – 60 с. Yasir Waseem Iqbal. Sociology Of Networking. – М.: LAP Lambert Academic Publishing, 2013. – 88 с. Vinay Abburi. SECURE AND RELIABLE DEEP SPACE NETWORKS. – М.: LAP Lambert Academic Publishing, 2010. – 68 с. Wararak Chalermpuntusak. East Asian (security) intellectual networks. – М.: LAP Lambert Academic Publishing, 2012. – 476 с. Padmashali. A Secure communication for wireless sensor networks. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Manik Gupta. Security Model Beyond Energy Dependency In Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 120 с. Subir Biswas. Security and Privacy in Vehicular Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2013. – 204 с. Sanping Li. Towards Ultra-High Speed Online Network Traffic Classification. – М.: LAP Lambert Academic Publishing, 2013. – 200 с. Tapalina Bhattasali. Hierarchical LIMOS Model For Heterogeneous Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 100 с. Mohammad Bani Younes and Aman Jantan. Image Encryption Using Block-Based Transformation Algorithm. – М.: LAP Lambert Academic Publishing, 2011. – 176 с. Younus Javed and Hassan Tahir. Optimized Security Protocol for Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Sandeep Kr. Agarwal and Dr. K. V. Arya. Security in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 88 с. Mohammad S. I. Mamun. Intrusion Detection System Architecture in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Suman Bala. Secure Routing in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 72 с. Rayala Upendar Rao and K. Palanivel. Secure Routing In Cluster Based Wireless Sensor Network By Using ECC. – М.: LAP Lambert Academic Publishing, 2012. – 96 с. Abbas Mehdizadeh Zare Anari and Ayyoub Akbari Moghanjoughi. Route optimization security in mobile IPv6 networks. – М.: LAP Lambert Academic Publishing, 2012. – 116 с. Srikanth Hariharan,Ness B. Shroff and Saurabh Bagchi. Secure Neighbor Discovery in Wireless Networks. – М.: LAP Lambert Academic Publishing, 2011. – 52 с. Vinothkumar Jambulingam. Secure and Anonymous Routing for Mobile Adhoc Networks. – М.: LAP Lambert Academic Publishing, 2014. – 72 с. Ramandeep Kaur. Packet dropping attack in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2014. – 52 с. Sushant Sudhakar Bahekar and Prashant Panse. Energy Efficient Mechanism for Detection of Wormhole Attacks. – М.: LAP Lambert Academic Publishing, 2014. – 72 с. Albert Wasef. Managing and Complementing PKI for Securing Vehicular Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2011. – 204 с. Rakesh Jha. Security Issues In AD-HOC And Infrastructure (WLAN) Networks. – М.: LAP Lambert Academic Publishing, 2011. – 124 с. Reena Sharma. Authentication Mechanism for P2P Networks. – М.: LAP Lambert Academic Publishing, 2012. – 84 с. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с. Raj Shree and Ravi Prakash Pandey. Security Advancement in ZRP based Wireless Networks. – М.: LAP Lambert Academic Publishing, 2014. – 92 с. Manuj Mishra,Govind Sharma and Ram Pathak. Secure Routing In Wireless Mobile Ad Hoc Network. – М.: LAP Lambert Academic Publishing, 2014. – 84 с. Kefa Rabah. Mastering Securing ICT Infrastructure for Corporate Network. – М.: LAP Lambert Academic Publishing, 2014. – 360 с. Predrag Tasevski. Interactive Cyber Security Awareness Program. – М.: LAP Lambert Academic Publishing, 2012. – 184 с. Amnesh Goel and Nidhi Chandra. Secure Image Archival Based on Image Encryption Technique. – М.: LAP Lambert Academic Publishing, 2012. – 64 с. Neva Slani. Secure Open Networks. – М.: , 2010. – 124 с. Лучшие результаты Ничего не найдено Дополнительные результаты Open Plan - система календарного планирования и контроля за реализацией проектов. Н. Герасименко, "Финансовая газета. Региональный выпуск", № 43, октябрь 2005. Рекрутмент в сообществе Open Source: лучшие кандидаты и меньший риск. В. Басов, "Управление персоналом", № 20, октябрь 2005. Основной арсенал "охотника" - его network: кого он знает на рынке и качество этих отношений. С. Плетнева, "Управление персоналом", № 12, июнь 2009. Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Анна, 04.09 Спасибо вам за диплом, вы мне очень помогли.