Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с.
  2. Data Privacy Management and Autonomous Spontaneus Security: 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, ... Computer Science / Security and Cryptology). – М.: , 2012. – 334 с.
  3. Wireless Communications and Applications: First International Conference, ICWCA 2011, Sanya, China, August 1-3, 2011, Revised Selected Papers (Lecture ... and Telecommunications Engineering). – М.: , 2012. – 468 с.
  4. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с.
  5. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с.
  6. Smart Card Research and Advanced Applications: 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, ... Computer Science / Security and Cryptology). – М.: , 2012. – 357 с.
  7. Roz Usheroff, Roz Usheroff. Customize Your Career: How to Develop a Winning Strategy to Move Up, Move Ahead, or Move On. – М.: , 0. – 0 с.
  8. Hermann Scheer. The Solar Economy: Renewable Energy for a Sustainable Global Future. – М.: , 0. – 0 с.
  9. Henry Chan, Raymond Lee, Tharam Dillon, Elizabeth Chang, Henry Chan, Raymond Lee, Tharam Dillon. Electronic Commerce: Fundamentals & Applications. – М.: , 0. – 0 с.
  10. John Vacca, Pete Loshin, Paul Murphy. Electronic Commerce (Networking Series). – М.: , 0. – 0 с.
  11. John Roland, Mark J. Newcomb. CCSP Cisco Secure VPN Exam Certification Guide (CCSP Self-Study). – М.: , 0. – 0 с.
  12. Andrew Sun. Using and Managing Ppp. – М.: , 0. – 0 с.
  13. Lisa M. Lindgren, Lisa Lindgren. Application Servers for E-Business. – М.: , 0. – 0 с.
  14. Mostafa Hashem Sherif. Protocols for Secure Electronic Commerce, Second Edition. – М.: , 0. – 0 с.
  15. Peter Loshin, John Vacca, Paul A. Murphy. Electronic Commerce, Third Edition. – М.: , 0. – 0 с.
  16. Basil Nestor. Unofficial Guide to Casino Gambling. – М.: Wiley, 1998. – 400 с.
  17. Payment Technologies for E-Commerce. – М.: , 2003. – 0 с.
  18. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с.
  19. James F. Ransome, PhD, CI. Voice over Internet Protocol (VoIP) Security. – М.: , 2010. – 432 с.
  20. Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards and Applications (Wireless Networks and Mobile Communications). – М.: , 2008. – 424 с.
  21. Niels Ferguson. Cryptography Engineering. – М.: , 2010. – 384 с.
  22. Oracle Enterprise Manager 10G Grid Control Handbook. – М.: , 2011. – 688 с.
  23. Session Initiation Protocol (Sip): Controlling Convergent Networks. – М.: , 2011. – 264 с.
  24. Wireless Network Security A Beginners Guide. – М.: , 2011. – 400 с.
  25. Thomas Porter, Jan Kanclirz Jr. Practical VoIP Security. – М.: Syngress, 2006. – 564 с.
  26. Thomas Porter, Michael Gough. How to Cheat at Voip Security (How to Cheat) (How to Cheat) (How to Cheat). – М.: , 2007. – 432 с.
  27. Yi Qian, James Joshi, David Tipper, Prashant Krishnamurthy. Information Assurance: Dependability and Security in Networked Systems. – М.: Morgan Kaufmann, 2007. – 576 с.
  28. Samundiswary Punniakodi and Dananjayan Perumal. Trust Based Routing Protocols for Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2015. – 120 с.
  29. Amal Punchihewa and Bhim Dulal. IPTV-Internet Protocol Television. – М.: LAP Lambert Academic Publishing, 2013. – 104 с.
  30. Punit N. Dhirawani. A Holistic Security System Using Motion Sensors. – М.: LAP Lambert Academic Publishing, 2011. – 72 с.
  31. Alaa K. Farhan. Security Protocol for Mobile Data. – М.: LAP Lambert Academic Publishing, 2013. – 116 с.
  32. Adriana Marais. Security and Entanglement in Quantum Key Distribution. – М.: LAP Lambert Academic Publishing, 2010. – 108 с.
  33. Temitope Edward Akinyemi. National Interest and Global Environmental Security. – М.: LAP Lambert Academic Publishing, 2012. – 240 с.
  34. Fahmi Ahmed. African Peace & Security Architecture. – М.: LAP Lambert Academic Publishing, 2011. – 96 с.
  35. Ayyaswamy Kathirvel,Srinivasan Rengaramanujam and Mohanambal Kathirvel. Prevention of attacks usign umpiring security model for manets. – М.: LAP Lambert Academic Publishing, 2012. – 192 с.
  36. Kenia Nottage. ISPS Code, SUA 2005 Protocol, & Passenger Vessels. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  37. Kanav Sood. Kerberos Authentication Protocol. – М.: LAP Lambert Academic Publishing, 2011. – 120 с.
  38. Tulia Ackson. Coordination of Social Security Systems in the SADC Region. – М.: LAP Lambert Academic Publishing, 2009. – 96 с.
  39. Victoria Yemi-Peters. Mobile Banking Security Services. – М.: LAP Lambert Academic Publishing, 2011. – 88 с.
  40. Mayank Chandra. Digital Video Encryption. – М.: LAP Lambert Academic Publishing, 2012. – 72 с.
  41. Deepak Puthal and Bibhudatta Sahoo. Secure Data Collection & Critical Data Transmission in Mobile Sink WSN. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  42. Priyadarsini S. Secured & lifetime improved route discovery for MANETs. – М.: LAP Lambert Academic Publishing, 2011. – 64 с.
  43. Nateq Be-Nazir Ibn Minar. Bluetooth Networking and its Security Architecture. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  44. Kshitiz Saxena and Juhi Sharma. Performance Evaluation Of Security Algorithms In A Wi-Fi Testbed. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  45. Garima Verma. Implementation of Authentication and Transaction Security. – М.: LAP Lambert Academic Publishing, 2013. – 60 с.
  46. Arnab Banerjee,ANIRUDDHA BHATTACHARYYA and DIPAYAN BOSE. IMPLEMENTATION OF A TRUST BASED SECURE ROUTING PROTOCOL IN MANET. – М.: LAP Lambert Academic Publishing, 2012. – 292 с.
  47. Younus Javed and Hassan Tahir. Optimized Security Protocol for Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  48. Vesselin Hadjitodorov. Security of IPv6 and DNSSEC. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  49. Sandeep Kr. Agarwal and Dr. K. V. Arya. Security in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  50. Prathap Jonnadula and Naga Mani Darajula. Secure Group Communication. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  51. Mohammed azharuddin Adhoni. Secure communication in p2p networks. – М.: LAP Lambert Academic Publishing, 2012. – 124 с.
  52. Suman Bala. Secure Routing in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 72 с.
  53. Mohamed Rasslan,Yasser Dakroury and Heba Aslan. Group Key Distribution in Computer Networks. – М.: LAP Lambert Academic Publishing, 2012. – 212 с.
  54. Prasad Lokulwar,Vivek Shelkhe and Mangesh Ghonge. Security Aware Routing protocol for MANET. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  55. E.A.Mary Anita. Securing Multicast Routing Protocols for Mobile Adhoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  56. Abbas Mehdizadeh Zare Anari and Ayyoub Akbari Moghanjoughi. Route optimization security in mobile IPv6 networks. – М.: LAP Lambert Academic Publishing, 2012. – 116 с.
  57. Hamid Reza Barzegar,Mahdiyeh Barzegar and Neshat Alidad. Energy Efficient And Secured Communication For Manets In Military. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  58. Niroj Kumar Pani and Dr. Ashok Kumar Turuk. A Hybrid Zone-Based Routing Protocol for Secure Communication in MANET. – М.: LAP Lambert Academic Publishing, 2010. – 92 с.
  59. Arun Saha. Secure Protocols for Location, Adjacency, and Identity Verification. – М.: LAP Lambert Academic Publishing, 2011. – 248 с.
  60. Srikanth Hariharan,Ness B. Shroff and Saurabh Bagchi. Secure Neighbor Discovery in Wireless Networks. – М.: LAP Lambert Academic Publishing, 2011. – 52 с.
  61. Nidhi Sharma. A Novel Mechanism for Enhancing Security in Quantum Cryptography. – М.: LAP Lambert Academic Publishing, 2012. – 100 с.
  62. Rupa Ch. and Avadhani P. S. Modern Security Methods in Applied Computer Science. – М.: Scholars' Press, 2014. – 124 с.
  63. Divya Rajasekar. Cluster Based Secure Key Establishment Protocol for WSN. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  64. Ankit Panch. Enterprise Secure Wireless Authentication (ESWA). – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  65. Heba Elshandidy. Enhancing Security Solutions in Mobile Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2013. – 128 с.
  66. Mamunur Rashid and Bellal Hossain. WiMAX Security Architecture. – М.: LAP Lambert Academic Publishing, 2014. – 76 с.
  67. P. Ganesh Kumar and S. Ramesh. Secure Routing Protocol for ICMN. – М.: LAP Lambert Academic Publishing, 2014. – 64 с.
  68. Nitin K. Mishra and Sumit Dhariwal. Security in Mobile Ad-Hoc Networks. – М.: LAP Lambert Academic Publishing, 2014. – 72 с.
  69. Nirbhay Chaubey. Securing AODV Routing Protocol in design of Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2015. – 132 с.
  70. Mohamed Geaiger. Development of Secure Domain Control Frame Work. – М.: LAP Lambert Academic Publishing, 2011. – 224 с.
  71. Piotr Szczechowiak. Security in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2011. – 248 с.
  72. Masahiro Yagisawa. Proposal for New Key Agreement Protocols. – М.: LAP Lambert Academic Publishing, 2011. – 72 с.
  73. Iman Almomani. Security Solutions for Wireless Mobile Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2011. – 360 с.
  74. Rakesh Jha. Security Issues In AD-HOC And Infrastructure (WLAN) Networks. – М.: LAP Lambert Academic Publishing, 2011. – 124 с.
  75. Jamil Ibriq. Secure Routing in Wireless Sensor Networks. – М.: Scholars' Press, 2013. – 104 с.
  76. Tejpal Singh. Security Protocols for Data Routing in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  77. Vinothkumar Jambulingam. Highly consistent and secured data delivery for mobile ad-hoc networks. – М.: LAP Lambert Academic Publishing, 2014. – 76 с.
  78. Marimuthu Kanagaraj and Eswari Venkatachalam. Multifactor Authentication Protocol for a Secured WSN. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  79. Gurpreet juneja. Security:MPLS VPN Network. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  80. Shilpa Jaiswal. Elimination of Security Threats Using Trusted Proactive Routing. – М.: LAP Lambert Academic Publishing, 2014. – 56 с.
  81. Shilpa Jaiswal and Sumeet Agrawal. Detection of Network Worm to Eliminate Security Threats in MANET. – М.: LAP Lambert Academic Publishing, 2012. – 52 с.
  82. Wisam Elmasry. Securing WBAODV Routing Protocol in MANETs. – М.: LAP Lambert Academic Publishing, 2013. – 100 с.
  83. Tarek S. Sobh. Effective and Extensive VPN for Securing Web Applications. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  84. Pallavi Kaliyar and Gagan Singla. A secure routing protocol for MANETs against byzantine attacks. – М.: LAP Lambert Academic Publishing, 2013. – 84 с.
  85. Haitham ELwahsh. Secure Service Discovery Protocol for ad-hoc Networks "hash function". – М.: LAP Lambert Academic Publishing, 2013. – 144 с.
  86. Soke Onyemelukwe. On-Demand Routing and Security in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2013. – 128 с.
  87. Vincent Omollo. Enhanced Network Security. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  88. Faisal Al Mahrouqi. Energy-Aware Security and QoS Routing Trade-offs in Wireless Networks. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  89. Sunil Kumar Senapati and Prof. Pabitra Mohan Khilar. SECURING FSR PROTOCOL AGAINST DATA PACKET DROPPING IN MANET. – М.: LAP Lambert Academic Publishing, 2010. – 64 с.
  90. Pavel Ocenasek. Security Protocols. – М.: LAP Lambert Academic Publishing, 2010. – 112 с.
  91. Supakorn Kungpisdan. Securing Mobile Payments: Modelling, Design, and Analysis. – М.: LAP Lambert Academic Publishing, 2010. – 336 с.
  92. Imran Sohail and Sikandar Hayat. Network Security and DDoS. – М.: LAP Lambert Academic Publishing, 2010. – 64 с.
  93. Keshava Munegowda. Design and Implementation of WLAN Authentication and Security. – М.: LAP Lambert Academic Publishing, 2010. – 124 с.
  94. Gergely Acs. Secure Routing in Multi-hop Wireless Networks. – М.: LAP Lambert Academic Publishing, 2010. – 116 с.
  95. Djamel DJENOURI and Nadjib BADACHE. Security in Mobile Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 212 с.
  96. Nitin Goel. EPSAR: An Efficient Power Saving Adaptive Routing Protocol for MANETs. – М.: LAP Lambert Academic Publishing, 2012. – 124 с.
  97. Manuj Mishra,Govind Sharma and Ram Pathak. Secure Routing In Wireless Mobile Ad Hoc Network. – М.: LAP Lambert Academic Publishing, 2014. – 84 с.
  98. Amel Chowdhury. Deployment of a Secure VoIP System. – М.: LAP Lambert Academic Publishing, 2014. – 68 с.
  99. Ricardo Chaves. Secure Computing on Reconfigurable Systems. – М.: LAP Lambert Academic Publishing, 2010. – 212 с.
  100. Amol Bandal and Shankar Nawale. RFID Security. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  101. Britto R. Kumar and Albert S. Rabara. An Architecture for Secure Mobile Payment System using PKI. – М.: LAP Lambert Academic Publishing, 2013. – 184 с.
  102. Faisal Karim Bhutta. Smartphone based Authentication & Authorization Protocol for SPACS. – М.: LAP Lambert Academic Publishing, 2014. – 56 с.
  103. Muhammad Hussnain. Marlin Simple Secure Streaming for IPTV. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  104. E. Madhusudhana Reddy. Development of Secure Protocols for MHIS Using RMPJK–RSA Cryptosystem. – М.: LAP Lambert Academic Publishing, 2011. – 204 с.
  105. Ke Liu. Wireless Geometric Routing Protocol. – М.: LAP Lambert Academic Publishing, 2009. – 196 с.
  106. Vasilios Katos. Symmetric cryptography in computer communications. – М.: LAP Lambert Academic Publishing, 2011. – 344 с.
  107. Debasish Jena. On Protocols for Information Security Services. – М.: LAP Lambert Academic Publishing, 2011. – 136 с.
  108. Mohammad Faisal. Networks Security and Communication. – М.: LAP Lambert Academic Publishing, 2012. – 56 с.
  109. Hanane Houmani. Security Protocols Analysis. – М.: LAP Lambert Academic Publishing, 2012. – 288 с.
  110. Dirk Lessner. Network Security for Embedded Systems. – М.: LAP Lambert Academic Publishing, 2009. – 232 с.
  111. Fatty Mustafa Salem,Maged Hamada Ibrahim and Ibrahim Ismail Ibrahim. Efficient and Secure Message Transmission in Vehicular Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  112. Ubaid Hayee. A Six Sigma Approach to Assure IT Security. – М.: LAP Lambert Academic Publishing, 2011. – 64 с.
  113. Angelo Agatino Nicolosi. Efficient RSA Key Generation Protocol in the Two-Party Setting. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  114. Biswaraj Sen and Sanku Sinha. Ad hoc Routing Protocols. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  115. Amit Choudhary. Routing Security Issues in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2014. – 80 с.
  116. Rinaldi Yulius. DESIGN OF A CYBER SECURITY LABORATORY. – М.: LAP Lambert Academic Publishing, 2010. – 140 с.
  117. Noor Ul Amin. Secure MANET Communication Based on Hybrid Cryptosystem. – М.: LAP Lambert Academic Publishing, 2013. – 64 с.
  118. Burcu Kulahc?oglu. Timed Automata as a Verification Tool for Security Protocols. – М.: LAP Lambert Academic Publishing, 2011. – 104 с.
  119. Kerem Beygo and Cihan Eraslan. Enhancing Security and Usability Features of NFC. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  120. Franck Pommereau. Algebras of coloured/ Petri nets. – М.: LAP Lambert Academic Publishing, 2010. – 92 с.
  121. Alptekin Kupcu. Efficient Cryptography for the Next Generation Secure Cloud. – М.: LAP Lambert Academic Publishing, 2010. – 220 с.
  122. Haneen Qarabash. An Intranet Based System For Securities Trading. – М.: LAP Lambert Academic Publishing, 2013. – 84 с.
  123. Sirar Salih and Noureddine Bouhmala. Multilevel Techniques for solving the Satisfiability Problem. – М.: , 2012. – 124 с.

Дополнительные результаты

  1. Francis Groves. Corporate Actions - A Concise Guide: An introduction to securities events. – М.: , 2012. – 230 с.
  2. Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с.
  3. Data Privacy Management and Autonomous Spontaneus Security: 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, ... Computer Science / Security and Cryptology). – М.: , 2012. – 334 с.
  4. Wireless Communications and Applications: First International Conference, ICWCA 2011, Sanya, China, August 1-3, 2011, Revised Selected Papers (Lecture ... and Telecommunications Engineering). – М.: , 2012. – 468 с.
  5. Security and Privacy in Mobile Information and Communication Systems: Third International ICST Conference, MOBISEC 2011, Aalborg, Denmark, May 17-19, ... and Telecommunications Engineering). – М.: , 2012. – 195 с.
  6. Constructive Side-Channel Analysis and Secure Design: Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings ... Computer Science / Security and Cryptology). – М.: , 2012. – 280 с.
  7. Public Key Infrastructures, Services and Applications: 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected ... Computer Science / Security and Cryptology). – М.: , 2012. – 219 с.
  8. Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  9. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с.
  10. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с.
  11. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 515 с.
  12. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  13. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с.
  14. Smart Card Research and Advanced Applications: 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, ... Computer Science / Security and Cryptology). – М.: , 2012. – 357 с.
  15. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с.
  16. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с.
  17. Security and Development in Global Politics: A Critical Comparison. – М.: , 2012. – 360 с.
  18. Joseph F. Stenken JD CLU ChFc. Social Security & Medicare Facts 2012. – М.: , 2012. – 451 с.
  19. Luis Lobo-Guerrero. Insuring Security: Biopolitics, security and risk. – М.: , 2012. – 178 с.
  20. CCH Editorial Staff. Social Security Explained 2012. – М.: , 2012. – 298 с.
  21. Terrorism and the Olympics: Major Event Security and Lessons for the Future. – М.: , 2012. – 272 с.
  22. Sheila R Ronis. Economic Security: Neglected Dimension of National Security?. – М.: , 2012. – 128 с.
  23. Denise Garcia. Disarmament Diplomacy and Human Security: Regimes, Norms and Moral Progress in International Relations. – М.: , 2012. – 0 с.
  24. Securities Compliance Index. Securities Compliance Index, Second Edition: A Topical Guide To U.S. Securities Regulation. – М.: , 2012. – 512 с.
  25. American Bar Association, Thomas Lee Hazen. Securities Regulation: Corporate Counsel Guides. – М.: , 2012. – 540 с.
  26. Julia Lowell, C. R. Neu, Daochi Tong, National Defense Research Institute, National Security Research Institute. Financial Crises and Contagion in Emerging Market Countries. – М.: , 0. – 0 с.
  27. Joseph S. Nye, William A. Owens, James R. Schlesinger, R. James Woolsey, James A. Lewis, Joseph S., Jr. Nye, James Andrew Lewis, Erin Schlather, Csis Commission on Technology Security in the Twenty-First Century. Computer Exports and National Security: New Tools for a New Century : A Report of the Csis Commission on Technology Security in the 21St-Century (Csis Panel Reports.). – М.: , 0. – 0 с.
  28. John Vacca, Pete Loshin, Paul Murphy. Electronic Commerce (Networking Series). – М.: , 0. – 0 с.
  29. John Roland, Mark J. Newcomb. CCSP Cisco Secure VPN Exam Certification Guide (CCSP Self-Study). – М.: , 0. – 0 с.
  30. Mostafa Hashem Sherif. Protocols for Secure Electronic Commerce, Second Edition. – М.: , 0. – 0 с.
  31. Peter Loshin, John Vacca, Paul A. Murphy. Electronic Commerce, Third Edition. – М.: , 0. – 0 с.
  32. Basil Nestor. Unofficial Guide to Casino Gambling. – М.: Wiley, 1998. – 400 с.
  33. Committee on Federal Regulation of Securities Committee. The Fund Director's Guidebook: Third Edition (Fund Director's Guidebook). – М.: , 2006. – 128 с.
  34. Meridian Securities Market. World Stock Exchange Fact Book. – М.: , 2008. – 0 с.
  35. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с.
  36. CompTIA Security+: Certification Kit (комплект из 3 книг + 2 CD-ROM). – М.: Sybex, 2009. – 1440 с.
  37. James F. Ransome, PhD, CI. Voice over Internet Protocol (VoIP) Security. – М.: , 2010. – 432 с.
  38. Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards and Applications (Wireless Networks and Mobile Communications). – М.: , 2008. – 424 с.
  39. Niels Ferguson. Cryptography Engineering. – М.: , 2010. – 384 с.
  40. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с.
  41. Wireless Application Protocol Forum, Ltd. Official Wireless Application Protocol 2.0. – М.: , 1999. – 768 с.
  42. Oracle Enterprise Manager 10G Grid Control Handbook. – М.: , 2011. – 688 с.
  43. Session Initiation Protocol (Sip): Controlling Convergent Networks. – М.: , 2011. – 264 с.
  44. Wireless Network Security A Beginners Guide. – М.: , 2011. – 400 с.
  45. Thomas Porter, Jan Kanclirz Jr. Practical VoIP Security. – М.: Syngress, 2006. – 564 с.
  46. Thomas Porter, Michael Gough. How to Cheat at Voip Security (How to Cheat) (How to Cheat) (How to Cheat). – М.: , 2007. – 432 с.
  47. Yi Qian, James Joshi, David Tipper, Prashant Krishnamurthy. Information Assurance: Dependability and Security in Networked Systems. – М.: Morgan Kaufmann, 2007. – 576 с.
  48. Samundiswary Punniakodi and Dananjayan Perumal. Trust Based Routing Protocols for Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2015. – 120 с.
  49. Amal Punchihewa and Bhim Dulal. IPTV-Internet Protocol Television. – М.: LAP Lambert Academic Publishing, 2013. – 104 с.
  50. Punit N. Dhirawani. A Holistic Security System Using Motion Sensors. – М.: LAP Lambert Academic Publishing, 2011. – 72 с.
  51. Alaa K. Farhan. Security Protocol for Mobile Data. – М.: LAP Lambert Academic Publishing, 2013. – 116 с.
  52. Adriana Marais. Security and Entanglement in Quantum Key Distribution. – М.: LAP Lambert Academic Publishing, 2010. – 108 с.
  53. Temitope Edward Akinyemi. National Interest and Global Environmental Security. – М.: LAP Lambert Academic Publishing, 2012. – 240 с.
  54. Fahmi Ahmed. African Peace & Security Architecture. – М.: LAP Lambert Academic Publishing, 2011. – 96 с.
  55. Ayyaswamy Kathirvel,Srinivasan Rengaramanujam and Mohanambal Kathirvel. Prevention of attacks usign umpiring security model for manets. – М.: LAP Lambert Academic Publishing, 2012. – 192 с.
  56. Kenia Nottage. ISPS Code, SUA 2005 Protocol, & Passenger Vessels. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  57. Tulia Ackson. Coordination of Social Security Systems in the SADC Region. – М.: LAP Lambert Academic Publishing, 2009. – 96 с.
  58. Victoria Yemi-Peters. Mobile Banking Security Services. – М.: LAP Lambert Academic Publishing, 2011. – 88 с.
  59. Mayank Chandra. Digital Video Encryption. – М.: LAP Lambert Academic Publishing, 2012. – 72 с.
  60. Deepak Puthal and Bibhudatta Sahoo. Secure Data Collection & Critical Data Transmission in Mobile Sink WSN. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  61. Priyadarsini S. Secured & lifetime improved route discovery for MANETs. – М.: LAP Lambert Academic Publishing, 2011. – 64 с.
  62. Nateq Be-Nazir Ibn Minar. Bluetooth Networking and its Security Architecture. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  63. Kshitiz Saxena and Juhi Sharma. Performance Evaluation Of Security Algorithms In A Wi-Fi Testbed. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  64. Garima Verma. Implementation of Authentication and Transaction Security. – М.: LAP Lambert Academic Publishing, 2013. – 60 с.
  65. Arnab Banerjee,ANIRUDDHA BHATTACHARYYA and DIPAYAN BOSE. IMPLEMENTATION OF A TRUST BASED SECURE ROUTING PROTOCOL IN MANET. – М.: LAP Lambert Academic Publishing, 2012. – 292 с.
  66. Younus Javed and Hassan Tahir. Optimized Security Protocol for Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  67. Vesselin Hadjitodorov. Security of IPv6 and DNSSEC. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  68. Sandeep Kr. Agarwal and Dr. K. V. Arya. Security in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  69. Prathap Jonnadula and Naga Mani Darajula. Secure Group Communication. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  70. Mohammed azharuddin Adhoni. Secure communication in p2p networks. – М.: LAP Lambert Academic Publishing, 2012. – 124 с.
  71. Suman Bala. Secure Routing in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 72 с.
  72. Mohamed Rasslan,Yasser Dakroury and Heba Aslan. Group Key Distribution in Computer Networks. – М.: LAP Lambert Academic Publishing, 2012. – 212 с.
  73. Prasad Lokulwar,Vivek Shelkhe and Mangesh Ghonge. Security Aware Routing protocol for MANET. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  74. E.A.Mary Anita. Securing Multicast Routing Protocols for Mobile Adhoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  75. Abbas Mehdizadeh Zare Anari and Ayyoub Akbari Moghanjoughi. Route optimization security in mobile IPv6 networks. – М.: LAP Lambert Academic Publishing, 2012. – 116 с.
  76. Hamid Reza Barzegar,Mahdiyeh Barzegar and Neshat Alidad. Energy Efficient And Secured Communication For Manets In Military. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  77. Niroj Kumar Pani and Dr. Ashok Kumar Turuk. A Hybrid Zone-Based Routing Protocol for Secure Communication in MANET. – М.: LAP Lambert Academic Publishing, 2010. – 92 с.
  78. Arun Saha. Secure Protocols for Location, Adjacency, and Identity Verification. – М.: LAP Lambert Academic Publishing, 2011. – 248 с.
  79. Srikanth Hariharan,Ness B. Shroff and Saurabh Bagchi. Secure Neighbor Discovery in Wireless Networks. – М.: LAP Lambert Academic Publishing, 2011. – 52 с.
  80. Nidhi Sharma. A Novel Mechanism for Enhancing Security in Quantum Cryptography. – М.: LAP Lambert Academic Publishing, 2012. – 100 с.
  81. Rupa Ch. and Avadhani P. S. Modern Security Methods in Applied Computer Science. – М.: Scholars' Press, 2014. – 124 с.
  82. Divya Rajasekar. Cluster Based Secure Key Establishment Protocol for WSN. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  83. Ankit Panch. Enterprise Secure Wireless Authentication (ESWA). – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  84. Heba Elshandidy. Enhancing Security Solutions in Mobile Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2013. – 128 с.
  85. Mamunur Rashid and Bellal Hossain. WiMAX Security Architecture. – М.: LAP Lambert Academic Publishing, 2014. – 76 с.
  86. P. Ganesh Kumar and S. Ramesh. Secure Routing Protocol for ICMN. – М.: LAP Lambert Academic Publishing, 2014. – 64 с.
  87. Nitin K. Mishra and Sumit Dhariwal. Security in Mobile Ad-Hoc Networks. – М.: LAP Lambert Academic Publishing, 2014. – 72 с.
  88. Nirbhay Chaubey. Securing AODV Routing Protocol in design of Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2015. – 132 с.
  89. Mohamed Geaiger. Development of Secure Domain Control Frame Work. – М.: LAP Lambert Academic Publishing, 2011. – 224 с.
  90. Piotr Szczechowiak. Security in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2011. – 248 с.
  91. Masahiro Yagisawa. Proposal for New Key Agreement Protocols. – М.: LAP Lambert Academic Publishing, 2011. – 72 с.
  92. Iman Almomani. Security Solutions for Wireless Mobile Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2011. – 360 с.
  93. Rakesh Jha. Security Issues In AD-HOC And Infrastructure (WLAN) Networks. – М.: LAP Lambert Academic Publishing, 2011. – 124 с.
  94. Jamil Ibriq. Secure Routing in Wireless Sensor Networks. – М.: Scholars' Press, 2013. – 104 с.
  95. Tejpal Singh. Security Protocols for Data Routing in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  96. Marimuthu Kanagaraj and Eswari Venkatachalam. Multifactor Authentication Protocol for a Secured WSN. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  97. Gurpreet juneja. Security:MPLS VPN Network. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  98. Shilpa Jaiswal. Elimination of Security Threats Using Trusted Proactive Routing. – М.: LAP Lambert Academic Publishing, 2014. – 56 с.
  99. Shilpa Jaiswal and Sumeet Agrawal. Detection of Network Worm to Eliminate Security Threats in MANET. – М.: LAP Lambert Academic Publishing, 2012. – 52 с.
  100. Wisam Elmasry. Securing WBAODV Routing Protocol in MANETs. – М.: LAP Lambert Academic Publishing, 2013. – 100 с.
  101. Tarek S. Sobh. Effective and Extensive VPN for Securing Web Applications. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  102. Pallavi Kaliyar and Gagan Singla. A secure routing protocol for MANETs against byzantine attacks. – М.: LAP Lambert Academic Publishing, 2013. – 84 с.
  103. Haitham ELwahsh. Secure Service Discovery Protocol for ad-hoc Networks "hash function". – М.: LAP Lambert Academic Publishing, 2013. – 144 с.
  104. Soke Onyemelukwe. On-Demand Routing and Security in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2013. – 128 с.
  105. Vincent Omollo. Enhanced Network Security. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  106. Faisal Al Mahrouqi. Energy-Aware Security and QoS Routing Trade-offs in Wireless Networks. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  107. Sunil Kumar Senapati and Prof. Pabitra Mohan Khilar. SECURING FSR PROTOCOL AGAINST DATA PACKET DROPPING IN MANET. – М.: LAP Lambert Academic Publishing, 2010. – 64 с.
  108. Pavel Ocenasek. Security Protocols. – М.: LAP Lambert Academic Publishing, 2010. – 112 с.
  109. Supakorn Kungpisdan. Securing Mobile Payments: Modelling, Design, and Analysis. – М.: LAP Lambert Academic Publishing, 2010. – 336 с.
  110. Imran Sohail and Sikandar Hayat. Network Security and DDoS. – М.: LAP Lambert Academic Publishing, 2010. – 64 с.
  111. Keshava Munegowda. Design and Implementation of WLAN Authentication and Security. – М.: LAP Lambert Academic Publishing, 2010. – 124 с.
  112. Gergely Acs. Secure Routing in Multi-hop Wireless Networks. – М.: LAP Lambert Academic Publishing, 2010. – 116 с.
  113. Djamel DJENOURI and Nadjib BADACHE. Security in Mobile Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 212 с.
  114. Nitin Goel. EPSAR: An Efficient Power Saving Adaptive Routing Protocol for MANETs. – М.: LAP Lambert Academic Publishing, 2012. – 124 с.
  115. Manuj Mishra,Govind Sharma and Ram Pathak. Secure Routing In Wireless Mobile Ad Hoc Network. – М.: LAP Lambert Academic Publishing, 2014. – 84 с.
  116. Amel Chowdhury. Deployment of a Secure VoIP System. – М.: LAP Lambert Academic Publishing, 2014. – 68 с.
  117. Ricardo Chaves. Secure Computing on Reconfigurable Systems. – М.: LAP Lambert Academic Publishing, 2010. – 212 с.
  118. Amol Bandal and Shankar Nawale. RFID Security. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  119. Britto R. Kumar and Albert S. Rabara. An Architecture for Secure Mobile Payment System using PKI. – М.: LAP Lambert Academic Publishing, 2013. – 184 с.
  120. Faisal Karim Bhutta. Smartphone based Authentication & Authorization Protocol for SPACS. – М.: LAP Lambert Academic Publishing, 2014. – 56 с.
  121. E. Madhusudhana Reddy. Development of Secure Protocols for MHIS Using RMPJK–RSA Cryptosystem. – М.: LAP Lambert Academic Publishing, 2011. – 204 с.
  122. Ke Liu. Wireless Geometric Routing Protocol. – М.: LAP Lambert Academic Publishing, 2009. – 196 с.
  123. Vasilios Katos. Symmetric cryptography in computer communications. – М.: LAP Lambert Academic Publishing, 2011. – 344 с.
  124. Debasish Jena. On Protocols for Information Security Services. – М.: LAP Lambert Academic Publishing, 2011. – 136 с.
  125. Mohammad Faisal. Networks Security and Communication. – М.: LAP Lambert Academic Publishing, 2012. – 56 с.
  126. Hanane Houmani. Security Protocols Analysis. – М.: LAP Lambert Academic Publishing, 2012. – 288 с.
  127. Dirk Lessner. Network Security for Embedded Systems. – М.: LAP Lambert Academic Publishing, 2009. – 232 с.
  128. Fatty Mustafa Salem,Maged Hamada Ibrahim and Ibrahim Ismail Ibrahim. Efficient and Secure Message Transmission in Vehicular Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  129. Ubaid Hayee. A Six Sigma Approach to Assure IT Security. – М.: LAP Lambert Academic Publishing, 2011. – 64 с.
  130. Angelo Agatino Nicolosi. Efficient RSA Key Generation Protocol in the Two-Party Setting. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  131. Biswaraj Sen and Sanku Sinha. Ad hoc Routing Protocols. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  132. Amit Choudhary. Routing Security Issues in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2014. – 80 с.
  133. Rinaldi Yulius. DESIGN OF A CYBER SECURITY LABORATORY. – М.: LAP Lambert Academic Publishing, 2010. – 140 с.
  134. Noor Ul Amin. Secure MANET Communication Based on Hybrid Cryptosystem. – М.: LAP Lambert Academic Publishing, 2013. – 64 с.
  135. Burcu Kulahc?oglu. Timed Automata as a Verification Tool for Security Protocols. – М.: LAP Lambert Academic Publishing, 2011. – 104 с.
  136. Kerem Beygo and Cihan Eraslan. Enhancing Security and Usability Features of NFC. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  137. Franck Pommereau. Algebras of coloured/ Petri nets. – М.: LAP Lambert Academic Publishing, 2010. – 92 с.
  138. Alptekin Kupcu. Efficient Cryptography for the Next Generation Secure Cloud. – М.: LAP Lambert Academic Publishing, 2010. – 220 с.
  139. Haneen Qarabash. An Intranet Based System For Securities Trading. – М.: LAP Lambert Academic Publishing, 2013. – 84 с.
  140. Sirar Salih and Noureddine Bouhmala. Multilevel Techniques for solving the Satisfiability Problem. – М.: , 2012. – 124 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

Ничего не найдено

Образцы работ

Тема и предметТип и объем работы
Последствия операции НАТО
Политология
Диплом
80 стр.
Платежные системы в Интернете
Информатика
Диплом
102 стр.
Роль ОБСЕ в урегулировании конфликтов в Европе
Политология
Курсовая работа
33 стр.
Проблемы реформирования ОБСЕ
Политология
Курсовая работа
29 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Алексей, 20.02
Огромное Вам спасибо, с Вами приятно работать. Еще раз Вам спасибо. Да, хвалиться, конечно, не скромно, но качество своих работ я гарантирую, все они были защищены на отлично. Надеюсь на дальнейшее взаимное сотрудничество.