Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Gurpreet juneja. Security:MPLS VPN Network. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.

Дополнительные результаты

  1. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с.
  2. Securities Compliance Index. Securities Compliance Index, Second Edition: A Topical Guide To U.S. Securities Regulation. – М.: , 2012. – 512 с.
  3. Margaret Wheatley, Paula Griffin, Kristine Quade, National OD Network. Organization Development at Work: Conversations on the Values, Applications, and Future of OD (J-B O-D (Organizational Development)). – М.: Pfeiffer, 2003. – 224 с.
  4. Structural Adjustment Participatory Review International Network. Structural Adjustment, the Sapri Report: The Policy Roots of Economic Crisis, Poverty and Inequality. – М.: , 0. – 0 с.
  5. John Mahoney, Elizabeth Vallance, Jack Mahoney, European Business Ethics Network. Business Ethics in a New Europe (Issues in Business Ethics, Vol 3). – М.: , 0. – 0 с.
  6. Julia Lowell, C. R. Neu, Daochi Tong, National Defense Research Institute, National Security Research Institute. Financial Crises and Contagion in Emerging Market Countries. – М.: , 0. – 0 с.
  7. Joseph S. Nye, William A. Owens, James R. Schlesinger, R. James Woolsey, James A. Lewis, Joseph S., Jr. Nye, James Andrew Lewis, Erin Schlather, Csis Commission on Technology Security in the Twenty-First Century. Computer Exports and National Security: New Tools for a New Century : A Report of the Csis Commission on Technology Security in the 21St-Century (Csis Panel Reports.). – М.: , 0. – 0 с.
  8. Sheryl Garrett, Marie Swift, The Garrett Planning Network. Just Give Me the Answer$ : Expert Advisors Address Your Most Pressing Financial Questions. – М.: , 0. – 0 с.
  9. Business Women's Network, WorkingWoman Network. Business Women's Network 2001 International Directory. – М.: , 0. – 0 с.
  10. John Roland, Mark J. Newcomb. CCSP Cisco Secure VPN Exam Certification Guide (CCSP Self-Study). – М.: , 0. – 0 с.
  11. Jesus Mena. Homeland Security Techniques and Technologies (Networking Series). – М.: , 0. – 0 с.
  12. Vesna Hassler. Security Fundamentals for E-Commerce (Artech House Computer Security Series). – М.: , 0. – 0 с.
  13. Committee on Federal Regulation of Securities Committee. The Fund Director's Guidebook: Third Edition (Fund Director's Guidebook). – М.: , 2006. – 128 с.
  14. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с.
  15. Mahesh S. Raisinghani. Handbook of Research on Global Information Technology Management in the Digital Economy. – М.: Information Science Reference, 2008. – 588 с.
  16. 3I Network. India Infrastructure Report 2007 (Hindi) Rural Infrastructure. – М.: , 2007. – 360 с.
  17. Patrick Traynor, Patrick McDaniel, Thomas La Porta. Security for Telecommunications Networks (Advances in Information Security). – М.: , 2008. – 182 с.
  18. Network Security. – М.: , 2008. – 370 с.
  19. The Transition Network, Gail Rentsch. Smart Women Don't Retire -- They Break Free: From Working Full-Time to Living Full-Time. – М.: , 2008. – 272 с.
  20. Meridian Securities Market. World Stock Exchange Fact Book. – М.: , 2008. – 0 с.
  21. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с.
  22. Daniel Clark. Network Access Control 100 Success Secrets - 100 Most Asked NAC Questions on Implementation and Deployment of unify endpoint security technology, user ... and network security enforcement. – М.: , 2008. – 180 с.
  23. Bel G. Raggad. Information Security Management: Concepts and Practice. – М.: , 2010. – 871 с.
  24. Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards and Applications (Wireless Networks and Mobile Communications). – М.: , 2008. – 424 с.
  25. Food Network Kitchens. Food Network Favorites. – М.: , 2009. – 264 с.
  26. Dale Liu. Cisco CCNA/CCENT Exam 640-802, 640-822, 640-816 Preparation Kit. – М.: Syngress, 2009. – 848 с.
  27. Rob Cameron. Juniper(r) Networks Secure Access SSL VPN Configuration Guide. – М.: , 2010. – 656 с.
  28. Owen Poole. Network Security. – М.: , 2010. – 224 с.
  29. James Joshi. Network Security: Know It All. – М.: , 2010. – 368 с.
  30. Steve Manzuik. Network Security Assessment: From Vulnerability to Patch. – М.: , 2010. – 500 с.
  31. Jan L. Harrington. Network Security. – М.: , 2010. – 384 с.
  32. John R. Vacca. Network and System Security. – М.: , 2010. – 408 с.
  33. Joe Levy. SonicWALL Secure Wireless Networks Integrated Solutions Guide. – М.: , 2010. – 512 с.
  34. Eric Seagren. Secure Your Network for Free. – М.: , 2010. – 512 с.
  35. Russ Rogers. Network Security Evaluation Using the NSA IEM. – М.: , 2010. – 450 с.
  36. Brien Posey. GFI Network Security and PCI Compliance Power Tools. – М.: , 2010. – 488 с.
  37. John William Evans. Deploying IP and MPLS QoS for Multiservice Networks. – М.: , 2010. – 456 с.
  38. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с.
  39. Paul Goransson. Secure Roaming in 802.11 Networks. – М.: , 2010. – 368 с.
  40. Steven Andres. Security Sage's Guide to Hardening the Network Infrastructure. – М.: , 2010. – 608 с.
  41. Syngress. Managing Cisco Network Security 2E. – М.: , 2010. – 752 с.
  42. Bill English. MCSA/MCSE: Windows® 2000 Network Security Administration Study Guide. – М.: , 2003. – 574 с.
  43. Food Network Kitchens. How to Boil Water. – М.: , 2009. – 256 с.
  44. Russ Kaufman. MCSA/MCSE: Windows® Server 2003 Network Security Administration Study Guide. – М.: , 2004. – 560 с.
  45. Coopers & Lybrand International Tax Network. 1992 International Tax Summaries. – М.: , 1992. – 1248 с.
  46. Nitesh Dhanjani. Network Security Tools. – М.: , 2005. – 340 с.
  47. Thomas W. Madron. Network Security in the 90?s. – М.: , 1992. – 304 с.
  48. Microsoft. MCSE Training Kit (Exam 70–220) – Designing Microsoft Windows 2000 Network Security. – М.: , 2001. – 864 с.
  49. Coopers & Lybrand International Tax Network. 1994 International Tax Summaries. – М.: , 1994. – 1140 с.
  50. Andrew Lockhart. Network Security Hacks. – М.: , 2004. – 316 с.
  51. DAN. Network Security In A Mixed Environment. – М.: , 1998. – 456 с.
  52. Jahanzeb Khan. Building Secure Wireless Networks with 802.11. – М.: , 2003. – 352 с.
  53. Microsoft Official Academic Course. 70–298 Designing Security for a Microsoft® Windows ServerTM 2003 Network Package. – М.: , 2005. – 744 с.
  54. Microsoft Official Academic Course. 70–299 Implementing and Administering Security in a Microsoft® Windows ServerTM 2003 Network Package. – М.: , 2005. – 836 с.
  55. Smith. Delete Control and Security of Interconnected Networks Disk. – М.: , 1998. – 0 с.
  56. Matthew Strebe. MCSA/MCSE Self–Paced Training Kit (Exam 70–214) – Implemanting and Administering Security in a Microsoft Windows 2000 Network. – М.: , 2003. – 704 с.
  57. Matthew Strebe. Network Security JumpStartTM. – М.: , 2002. – 384 с.
  58. Coopers & Lybrand Global Tax Network. 1998 International Tax Summaries. – М.: , 1998. – 1376 с.
  59. Pawan K Bhardwaj. A+. Network+, Security+ Exams in a Nutshell. – М.: , 2007. – 812 с.
  60. Eric Cole. Network Security Bible. – М.: , 2005. – 694 с.
  61. Roberta Bragg. MCSE Self–Paced Training Kit (Exam 70–298) – Designing Security for a Microsoft Windows Server 2003 Network. – М.: , 2004. – 864 с.
  62. S MUFTIC. Muftic: ?security? Mechanisms For Computer Network S. – М.: , 1989. – 196 с.
  63. Joseph Davies. Deploying Secure 802.11 Wireless Networks with Microsoft Windoows. – М.: , 2003. – 416 с.
  64. Coopers & Lybrand Global Tax Network. 1997 International Tax Summaries. – М.: , 1997. – 1280 с.
  65. Pramode K. Verma, Ling Wang. Voice over IP Networks: Quality of Service, Pricing and Security (Lecture Notes in Electrical Engineering). – М.: , 2011. – 200 с.
  66. Rao Cherukuri. Creating Multiservice IP Networks with MPLS. – М.: , 2002. – 352 с.
  67. Eric Cole. Wiley Pathways Network Security Fundamentals Project Manual. – М.: , 2008. – 312 с.
  68. James E. Goldman. Network and E–Commerce Security. – М.: , 1975. – 768 с.
  69. Zhuo Xu. Designing and Implementing IP/MPLS–Based Ethernet Layer 2 VPN Services. – М.: , 2009. – 984 с.
  70. Andrew Lockhart. Network Security Hacks 2e. – М.: , 2006. – 352 с.
  71. Chris Mcnab. Network Security Assessment 2e. – М.: , 2007. – 464 с.
  72. Cryptography & Network Security. – М.: , 2007. – 0 с.
  73. Richard Deal. CCNA Cisco Certified Network Associate Security Study Guide: Exam 640-553 (+ CD-ROM). – М.: McGraw-Hill Osborne Media, 2009. – 832 с.
  74. Principles Of Computer Security, Comptia Security+ And Beyond, Second Edition. – М.: , 2011. – 0 с.
  75. Securing Global Transportation Networks. – М.: , 2011. – 312 с.
  76. Shon Harris. CISSP All-in-One Exam Guide (+ CD-ROM). – М.: McGraw-Hill Companies, 2010. – 1216 с.
  77. Wireless Network Security A Beginners Guide. – М.: , 2011. – 400 с.
  78. Cissp Practice Exams. – М.: , 2011. – 414 с.
  79. Networking, A Beginner'S Guide, Fifth Edition. – М.: , 2011. – 448 с.
  80. How To Do Everything With Windows Xp, Third Edition. – М.: , 2011. – 480 с.
  81. Hacking Exposed Linux. – М.: , 2011. – 813 с.
  82. CWNA: Certified Wireless Network Administrator & CWSP Certified Wireless Security Professional All-in-One Exam Guide. – М.: , 2011. – 0 с.
  83. Network Security: The Complete Reference. – М.: , 2011. – 896 с.
  84. Fundamentals Of Network Security. – М.: , 2011. – 672 с.
  85. Greg Holden. Guide to Firewalls and Network Security: Intrusion Detection and VPNs. – М.: Course Technology, 2003. – 512 с.
  86. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . –  с.
  87. Thomas D. Nadeau. MPLS Network Management: MIBs, Tools, and Techniques. – М.: Morgan Kaufmann, 2002. – 525 с.
  88. Robert Stephens. Configuring Check Point NGX VPN-1/Firewall-1. – М.: , 2005. – 608 с.
  89. Dave Tyson. Security Convergence: Managing Enterprise Security Risk. – М.: , 2007. – 232 с.
  90. Gerald R. Ash. Traffic Engineering and QoS Optimization of Integrated Voice & Data Networks. – М.: Morgan Kaufmann, 2006. – 512 с.
  91. Yi Qian, James Joshi, David Tipper, Prashant Krishnamurthy. Information Assurance: Dependability and Security in Networked Systems. – М.: Morgan Kaufmann, 2007. – 576 с.
  92. Ido Dubrawsky. How to Cheat at Securing Your Network. – М.: Syngress, 2007. – 432 с.
  93. Ram Balakrishnan. Advanced QoS for Multi–Service IP/MPLS Networks. – М.: Wiley Publishing, Inc, 2008. – 464 с.
  94. FOOD NETWORK KITCHEN. CHOPPED COOKBOOK, THE. – М.: Clarkson Potter Publishers, 2014. –  с.
  95. Govind Sharma and Manish Gupta. Secure routing in wireless mobile Ad-Hoc network. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  96. Shaek Rana Mohammad Baki Billah and Mohammad Hafizur Rahman. Design & Development of Network Security System using IP Tables. – М.: LAP Lambert Academic Publishing, 2013. – 164 с.
  97. Anand Kannan. Evaluation of the Security Mechanisms in Cloud Networks. – М.: LAP Lambert Academic Publishing, 2013. – 192 с.
  98. Sandeep Singh. Performance Evaluation of IP and MPLS Based Networks. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  99. Arindam Sarkar and J. K. Mandal. Artificial Neural Network Guided Secured Communication Techniques. – М.: LAP Lambert Academic Publishing, 2012. – 128 с.
  100. Nisar Ahmed Rana and Marya Gul. Image Encryption. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  101. Xiangqian Chen. DEFENSE AGAINST NODE COMPROMISE IN SENSOR NETWORK SECURITY. – М.: LAP Lambert Academic Publishing, 2009. – 108 с.
  102. Naseer Ahmad. Security Issues in Wireless Networks. – М.: LAP Lambert Academic Publishing, 2010. – 60 с.
  103. Md. Zahirul Islam and Md. Mohiuddin Ahmed. Performance Analysis of MPLS and Non-MPLS Network. – М.: LAP Lambert Academic Publishing, 2011. – 76 с.
  104. Mohamed Youshah Shameel Mecca and Tirumala Rao Kothaluru. Evaluation of EAP Authentication Methods. – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  105. Vinay Abburi. SECURE AND RELIABLE DEEP SPACE NETWORKS. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  106. Ramesh Deokate,K. Y. Rajpure and C. D. Lokhande. Metal oxide thin films Gas sensor. – М.: Scholars' Press, 2014. – 184 с.
  107. Wararak Chalermpuntusak. East Asian (security) intellectual networks. – М.: LAP Lambert Academic Publishing, 2012. – 476 с.
  108. Padmashali. A Secure communication for wireless sensor networks. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  109. RAMARAJ RAVI. AN INNOVATIVE AND TESTED PROVISIONING ALGORITHM FOR VPN. – М.: LAP Lambert Academic Publishing, 2011. – 68 с.
  110. Manik Gupta. Security Model Beyond Energy Dependency In Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  111. Subir Biswas. Security and Privacy in Vehicular Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2013. – 204 с.
  112. Kshitiz Saxena and Juhi Sharma. Performance Evaluation Of Security Algorithms In A Wi-Fi Testbed. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  113. Garima Verma. Implementation of Authentication and Transaction Security. – М.: LAP Lambert Academic Publishing, 2013. – 60 с.
  114. Younus Javed and Hassan Tahir. Optimized Security Protocol for Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  115. Sandeep Kr. Agarwal and Dr. K. V. Arya. Security in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  116. Suman Bala. Secure Routing in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 72 с.
  117. Ahmad A. Hassan. Firewalls: Modeling and Management. – М.: LAP Lambert Academic Publishing, 2012. – 100 с.
  118. Rayala Upendar Rao and K. Palanivel. Secure Routing In Cluster Based Wireless Sensor Network By Using ECC. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  119. Abbas Mehdizadeh Zare Anari and Ayyoub Akbari Moghanjoughi. Route optimization security in mobile IPv6 networks. – М.: LAP Lambert Academic Publishing, 2012. – 116 с.
  120. Srikanth Hariharan,Ness B. Shroff and Saurabh Bagchi. Secure Neighbor Discovery in Wireless Networks. – М.: LAP Lambert Academic Publishing, 2011. – 52 с.
  121. Xiaodong He. Automated intrusion prevention mechanism in enhancing network security. – М.: Scholars' Press, 2014. – 128 с.
  122. K. Shaila and K. R. Venugopal. Secure Data Communication in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2014. – 240 с.
  123. Rakesh Jha. Security Issues In AD-HOC And Infrastructure (WLAN) Networks. – М.: LAP Lambert Academic Publishing, 2011. – 124 с.
  124. Kun Hua. Self encoded Spread Spectrum Synchronization and Cooperative Diversity. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  125. Gurpreet juneja. Security:MPLS VPN Network. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  126. Omid Mahdi Ebadati E.,Harleen Kaur M. Afshar Alam and Kaebeh Yaeghoobi. Micro-Firewalls for Dynamic Network Security Framework. – М.: LAP Lambert Academic Publishing, 2012. – 292 с.
  127. Tarek S. Sobh. Effective and Extensive VPN for Securing Web Applications. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  128. Vincent Omollo. Enhanced Network Security. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  129. Mahesh Kumar Porwal. Traffic Analysis of MPLS and Non MPLS Network. – М.: LAP Lambert Academic Publishing, 2011. – 72 с.
  130. ANNADURAI P and Dr. V. PALANISAMY. Impact of Black Hole Attack on Multicast in Ad hoc Network (IBAMA). – М.: LAP Lambert Academic Publishing, 2011. – 84 с.
  131. Hanane Houmani. Security Protocols Analysis. – М.: LAP Lambert Academic Publishing, 2012. – 288 с.
  132. Oluwafemi Osho and Victor Waziri. Conceptual Models and Simulation of Computer Worm Propagation. – М.: LAP Lambert Academic Publishing, 2013. – 116 с.
  133. Dirk Lessner. Network Security for Embedded Systems. – М.: LAP Lambert Academic Publishing, 2009. – 232 с.
  134. Gulzar Mehmood,Nizamud Din and Muhammad Nawaz Khan. Privacy Preserving Scheme for Body Sensor Networks Based on CDLP. – М.: LAP Lambert Academic Publishing, 2014. – 56 с.
  135. Faeiz Alserhani,Irfan Awan and Monis Akhlaq. Correlation and Aggregation of Security Alerts in Networks. – М.: LAP Lambert Academic Publishing, 2012. – 256 с.
  136. Bhaarath Venkateswaran. Adaptive Internet Threat Forecasting. – М.: LAP Lambert Academic Publishing, 2011. – 116 с.
  137. Arpita Mondal. Simple and Secured Access to Networked Home Appliances via Internet. – М.: LAP Lambert Academic Publishing, 2010. – 180 с.
  138. Alaa Al-Deen Mohammed Hassan. Information Security Management. – М.: LAP Lambert Academic Publishing, 2013. – 188 с.
  139. Georgia Weidman. Penetration Testing: A Hands-On Introduction to Hacking. – М.: No Starch Press, 2014. – 528 с.
  140. Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services: An Advanced Guide for VPLS and VLL. – М.: , . –  с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Основной арсенал "охотника" - его network: кого он знает на рынке и качество этих отношений. С. Плетнева, "Управление персоналом", № 12, июнь 2009.

Образцы работ

Тема и предметТип и объем работы
Последствия операции НАТО
Политология
Диплом
80 стр.
Платежные системы в Интернете
Информатика
Диплом
102 стр.
Роль ОБСЕ в урегулировании конфликтов в Европе
Политология
Курсовая работа
33 стр.
Проблемы реформирования ОБСЕ
Политология
Курсовая работа
29 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
мария
юля вам поставили 4 говорит не был рассмотрен индивидуальная манера живописи но я думаю что он придерается в любом случае спасибо