Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Luca Giancane. Side-Channel Attacks and Countermeasures. – М.: LAP Lambert Academic Publishing, 2012. – 172 с.
  2. Akram Hossain,A. K. M. Zaidi Satter and Shibli Shahriar. Side Channel Attack Prevention. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.

Дополнительные результаты

  1. Constructive Side-Channel Analysis and Secure Design: Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings ... Computer Science / Security and Cryptology). – М.: , 2012. – 280 с.
  2. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с.
  3. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 515 с.
  4. Smart Card Research and Advanced Applications: 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, ... Computer Science / Security and Cryptology). – М.: , 2012. – 357 с.
  5. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с.
  6. Bernd H. Schmitt, Laura Brown. Build Your Own Garage: Blueprints and Tools to Unleash Your Company's Hidden Creativity. – М.: , 0. – 0 с.
  7. Alex Cukierman, Zvi Hercowitz, Leonardo Leiderman. Political Economy, Growth, and Business Cycles. – М.: , 0. – 0 с.
  8. George S. Tavlas. The Collapse of Exchange Rate Regimes: Causes, Consequences, and Policy Responses (Open Economies Review , No 7:1). – М.: , 0. – 0 с.
  9. Information Warfare : corporate attack and defence in a digital world (Computer Weekly Professional (Paperback)). – М.: , 0. – 0 с.
  10. Pierre-Richard Agenor, Pierre-Richard Agenor, Marcus Miller, David Vines, Axel Weber. The Asian Financial Crisis: Causes, Contagion and Consequences (Global Economic Institutions 2). – М.: , 0. – 0 с.
  11. N. H. Bingham, Rudiger Kiesel, Nicholas Bingham. Risk-Neutral Valuation: Pricing and Hedging of Financial Derivitives (Springer Finance). – М.: , 2004. – 0 с.
  12. G. David Garson. Computer Technology and Social Issues. – М.: , 0. – 0 с.
  13. Eric Dezenhall. Nail 'Em!: Confronting High-Profile Attacks on Celebrities & Businesses. – М.: , 0. – 0 с.
  14. Josephine Bellaccomo. Move the Message: How to Make Your Case Effectively and Change the World. – М.: , 0. – 0 с.
  15. Eran Vigoda-Gadot. Managing Collaboration in Public Administration : The Promise of Alliance among Governance, Citizens, and Businesses. – М.: , 2003. – 0 с.
  16. William M. Epps. Terrorism and Personal Security : Reduce Your Chances of Becoming a Target. – М.: , 2005. – 0 с.
  17. Applying Social Cognition To Consumer-focused Strategy (Advertising and Consumer Psychology). – М.: , 2005. – 0 с.
  18. Accounting, the Social and the Political: Classics, Contemporary and Beyond. – М.: , 2005. – 416 с.
  19. Richard E. Caves. Switching Channels: Organization and Change in TV Broadcasting. – М.: , 2005. – 376 с.
  20. Teresa Ghilarducci. Labor's Capital: The Economics and Politics of Private Pensions. – М.: The MIT Press, 1992. – 227 с.
  21. Aspen Publishers Editorial Staff. Automotive Workplace Guide to EPA and OSHA. – М.: , 2008. – 740 с.
  22. Andy Walker. Windows Lockdown!: Your XP and Vista Guide Against Hacks, Attacks, and Other Internet Mayhem (Absolute Beginner's Guide). – М.: , 2008. – 480 с.
  23. Denis Waitley. The Dragon and the Eagle: China and America: Growing Together, Worlds Apart. – М.: , 2008. – 261 с.
  24. Robert B. Denhardt, Janet V. Denhardt, Maria P. Aristigueta. Managing Human Behavior in Public and Nonprofit Organizations. – М.: , 2008. – 480 с.
  25. Mergers & Acquisitions (SAGE Library in Business and Management). – М.: , 2008. – 1104 с.
  26. Social and Human Elements of Information Security: Emerging Trends and Countermeasures (Premier Reference Source). – М.: , 2008. – 412 с.
  27. Mary Joy Fernandez. Analysis of selected aspects of the multi-channel management and the international distribution system. – М.: , 2008. – 108 с.
  28. Nir Kshetri. The Global Cybercrime Industry: Economic, Institutional and Strategic Perspectives. – М.: , 2010. – 280 с.
  29. Wireless Network Traffic and Quality of Service Support: Trends and Standards (Premier Reference Source). – М.: , 2010. – 549 с.
  30. Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series). – М.: , 2005. – 298 с.
  31. Raymond W. Clanton. Fire, Fear and Guts: The B-29 and Her Gallant Crewmen. – М.: , 2005. – 304 с.
  32. Jeanine Cummins. A Rip in Heaven : A Memoir of Murder And Its Aftermath. – М.: NAL Trade, 2004. – 320 с.
  33. Frank A., Col. Haskel. The Battle of Gettysburg : A Soldier's First-Hand Account. – М.: , 2003. – 112 с.
  34. Greg Skomal. The Shark Handbook: The Essential Guide for Understanding the Sharks of the World. – М.: Cider Mill Press, 2008. – 280 с.
  35. David McCullough. 1776: America and Britain at War. – М.: Penguin Books Ltd., 2005. – 420 с.
  36. Chris Park. A Dictionary of Environment and Conservation (Oxford Paperback Reference). – М.: , 2008. – 528 с.
  37. Raman Yazdani. Analysis and Decoding of LDPC Codes: under Practical Considerations. – М.: LAP Lambert Academic Publishing, 2009. – 120 с.
  38. Jyrki T. J. Penttinen, Petri Jolma, Erkki Aaltonen, Jani Vare. The DVB-H Handbook: The Functioning and Planning of Mobile TV. – М.: John Wiley and Sons, Ltd, 2010. – 272 с.
  39. Lajos L. Hanzo, Yosef Akhtman, Li Wang, Ming Jiang. MIMO-OFDM for LTE, WiFi and WiMAX: Coherent Versus Non-coherent and Cooperative Turbo Transceivers. – М.: Wiley-IEEE Press, 2011. – 696 с.
  40. Haibing Yang. Gigabit Wireless at 60 GHz: Channel Modelling and Baseband Design. – М.: , 2010. – 228 с.
  41. Tommy Oberg. Modulation, Detection and Coding. – М.: , 2001. – 480 с.
  42. Markus Jakobsson. Phishing and Countermeasures. – М.: , 2007. – 736 с.
  43. Ken Dunham. Mobile Malware Attacks and Defense. – М.: , 2010. – 440 с.
  44. Justin Clarke. SQL Injection Attacks and Defense. – М.: , 2010. – 496 с.
  45. Microsoft. Improving Web Application Security – Threats and Countermeasures. – М.: , 2003. – 960 с.
  46. Robert Egby. Kings, Killers And Kinks In The Cosmos. – М.: , 2011. – 244 с.
  47. Hacking Exposed Windows: Microsoft Windows Security Secrets And Solutions, Third Edition. – М.: , 2011. – 451 с.
  48. The Winner'S Attitude: Using The "Switch" Method To Change How You Deal With Difficult People And Get The Best Out Of Any Situation At Work. – М.: , 2011. – 224 с.
  49. Hacking Exposed Web Applications, 3Rd Edition. – М.: , 2011. – 482 с.
  50. Hacking Exposed Linux. – М.: , 2011. – 813 с.
  51. Tim Speed, Juanita Ellis. Internet Security: A Jumpstart for Systems Administrators and IT Managers. – М.: , . –  с.
  52. Pei Zheng, Lionel Ni. Smart Phone and Next Generation Mobile Computing (Morgan Kaufmann Series in Networking (Paperback)). – М.: , 2005. – 350 с.
  53. Yi Qian, James Joshi, David Tipper, Prashant Krishnamurthy. Information Assurance: Dependability and Security in Networked Systems. – М.: Morgan Kaufmann, 2007. – 576 с.
  54. David Nahmani. Apple Pro Training Series: Logic Pro 9 and Logic Express 9 (+ DVD-ROM). – М.: Peachpit Press, 2009. – 504 с.
  55. Bill McCarty. Learning Red Hat Enterprise Linux and Fedora (+ 2 CD-ROM). – М.: O'Reilly Media, 2004. – 352 с.
  56. Michael Burleigh. Blood and Rage: A Cultural History of Terrorism. – М.: Harper Perennial, 2011. – 624 с.
  57. Dafydd Stuttard, Marcus Pinto. The Web Application: Hacker's Handbook. – М.: Wiley Publishing, Inc, 2011. – 912 с.
  58. Bill Burke. RESTful Java with JAX-RS 2.0: Designing and Developing Distributed Web Services. – М.: O'Reilly Media, 2014. – 392 с.
  59. W. Lance Bennett, Alexandra Segerberg. The Logic of Connective Action: Digital Media and the Personalization of Contentious Politics. – М.: Cambridge University Press, 2014. – 258 с.
  60. Subi Khan and R.P. Mahapatra. SQL Injection Attack and Countermeasures. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  61. Hayder A. Abdulbari Al-Khfaji,Zulkafli Hassan and Emma Suali. Sufactants- Suspended Solid Drag Reduction Systems in Pipelines. – М.: LAP Lambert Academic Publishing, 2011. – 124 с.
  62. Haitao Niu,Tong Lin and Xungai Wang. Electrospinning of Polymers for Functional Nanofibres. – М.: LAP Lambert Academic Publishing, 2013. – 232 с.
  63. Samundiswary Punniakodi and Dananjayan Perumal. Trust Based Routing Protocols for Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2015. – 120 с.
  64. Khaled ElMahgoub and Mohammed Nafie. Enhancements to Low Density Parity Check Codes. – М.: LAP Lambert Academic Publishing, 2010. – 88 с.
  65. Raza Ali Shah,Poompat Saengudomlert and R. M. A. Premanandana Rajatheva. ZP-NZP OFDM. – М.: LAP Lambert Academic Publishing, 2012. – 100 с.
  66. Hemant Kumar Gupta and Pramod Kumar Singhal. Rectenna System Design at L-band for Wireless Power Transmission. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  67. Ismail Khan Khattak and Sheikh Fakhar Uddin. Spectrum Selection Technique to Satisfy the QoS Requirement in CR. – М.: LAP Lambert Academic Publishing, 2013. – 56 с.
  68. Peixin Li and Ying Yi. Overview of Optical Interference Cancellation Technology in VLC System. – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  69. Imran Shafique Ansari. Composite and Cascaded Generalized-K Channel Model and Some Analyses. – М.: LAP Lambert Academic Publishing, 2011. – 84 с.
  70. Sameeraj Meduri and Rufus Ananth. A survey and evaluation of voice activity detection algorithms. – М.: LAP Lambert Academic Publishing, 2012. – 52 с.
  71. Thomas Arildsen and Jesper Blauendahl. Advanced Channel Estimation and Multiuser Detection in GSM. – М.: LAP Lambert Academic Publishing, 2010. – 172 с.
  72. Panupat Poocharoen and Mario E. Magana. Partial Network Coding with Cooperation. – М.: LAP Lambert Academic Publishing, 2011. – 148 с.
  73. Chhaya Dalela and M.V.S.N. Prasad. Radio Channel Measurements and Modeling over India. – М.: LAP Lambert Academic Publishing, 2012. – 192 с.
  74. Saqib Saleem,Qamar-ul- Islam and Khurram Shahzad. Channel Estimation for LTE-Advanced. – М.: LAP Lambert Academic Publishing, 2012. – 204 с.
  75. SUBRAMANIAM ARUNACHALAM and Tom Page. Development of a Compressor Circuit for an Automatic Sound Desk. – М.: LAP Lambert Academic Publishing, 2010. – 92 с.
  76. Zied Bouida,Mohamed-Slim Alouini and Khalid Qaraqe. JOINT DIVERSITY COMBINING, ADAPTIVE MODULATION, AND POWER CONTROL. – М.: LAP Lambert Academic Publishing, 2011. – 48 с.
  77. Viet Ha Pham. Generalized Spatio-Temporal Channel and System Characterization. – М.: LAP Lambert Academic Publishing, 2012. – 172 с.
  78. Nahian Chowdhury,Mahmud Taihan and Shahid Jaman. Crosstalk Analysis of a FBG-OC based OADM for WDM System. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  79. Shital Joshi,Jyotshna Pokharel and V. Siva Brahmaiah Rama. Capacity Analysis, Modeling And Simulation Of MIMO Channel. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  80. A.C.O Azubogu. Wireless channel models and beamforming antenna arrays. – М.: LAP Lambert Academic Publishing, 2014. – 116 с.
  81. Ali Salah Mahdi and Ergun Ercelebi. Design of Channel Estimation and Equalization for OFDM Systems. – М.: LAP Lambert Academic Publishing, 2015. – 84 с.
  82. Waqas Aslam Cheema and Asad Mehmood. Estimation Techniques for LTE Downlink. – М.: LAP Lambert Academic Publishing, 2010. – 96 с.
  83. Mohamed Esam. IEEE 802.11s Mesh Wireless LAN Channel Assignment and Power Management. – М.: LAP Lambert Academic Publishing, 2011. – 112 с.
  84. Luca Giancane. Side-Channel Attacks and Countermeasures. – М.: LAP Lambert Academic Publishing, 2012. – 172 с.
  85. Umair Mughal and Muhammad Iqbal. Break-Even Analysis of Sky Sail for Pakistan Maritime. – М.: LAP Lambert Academic Publishing, 2010. – 84 с.
  86. Sunetra Sarkar and Kartik Venkatraman. Unsteady Aerodynamics Of A Flapping Airfoil. – М.: LAP Lambert Academic Publishing, 2010. – 204 с.
  87. Umair Mughal,Muhammad Sadiq Sarfaraz and Syed Muhammad Sarim. Comparative CFD Study on Different Under Water Vehicles for Best L/D. – М.: LAP Lambert Academic Publishing, 2010. – 88 с.
  88. Amit Roy and Suhrita Chakrabarty. Impact Assessment of Two Women Empowerment Programs. – М.: LAP Lambert Academic Publishing, 2011. – 84 с.
  89. Sourav Das and Smita Biswas. Consequences of Cyclone Sidr on Socio-economic life. – М.: LAP Lambert Academic Publishing, 2011. – 96 с.
  90. Farukh Bashir. US Attack on Afghanistan and Public Response in Pakistan. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  91. Muhammad Yaqoub and Mudassar Hussain Shah. Media and Public Agenda on the National Issues in Pakistan. – М.: LAP Lambert Academic Publishing, 2014. – 160 с.
  92. Neeran Jasim and Zahra Azziz. Aspergillus and Cosyus Indian (Series Researches). – М.: LAP Lambert Academic Publishing, 2014. – 112 с.
  93. M. Abid Hussain and Wasim Ahmad. Management of Helicoverpa armigera by Entomopathogenic Nematodes. – М.: LAP Lambert Academic Publishing, 2011. – 168 с.
  94. Sajjad Anwar,Muhammad Siddique Khanzada and Shagufta Rani Khanzada. Effect Of Sowing Dates On Maize Stem Borer And Aphid Infestation. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  95. M. Nazrul Islam. BRAIDING AND CHANNEL MORPHODYNAMICS OF THE BRAHMAPUTRA-JAMUNA RIVER. – М.: LAP Lambert Academic Publishing, 2010. – 200 с.
  96. Fethallah Karim. Fiber Bragg gratings: channels’densification and tunability. – М.: LAP Lambert Academic Publishing, 2014. – 68 с.
  97. Yakubu Azeh and Gabriel Ademola Olatunji. Acetylation Of Wood Cellulose Using Ketene. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  98. Ghazala Nawaz,Amjad Hameed and Tahsin Gulzar. Jacaranda mimosifolia and Allamanda cathartica. – М.: LAP Lambert Academic Publishing, 2013. – 92 с.
  99. Mohammad Ruhul Amin. Spatial Analysis of Suicide Attack Incidences in Kabul City. – М.: LAP Lambert Academic Publishing, 2012. – 100 с.
  100. Sutrasno Kartohardjono. Shell Side Mass Transfer and Fluid Hydrodynamics in. – М.: LAP Lambert Academic Publishing, 2010. – 296 с.
  101. Ramkishore Singh Rathore and Vijay Lakshmi Singh. Trees of Agra. – М.: Scholars' Press, 2013. – 164 с.
  102. Sangeeta Parikh and Vaishali Mehta. S.O.D.H. [Study of Obesity, Diabetes, Hypertension]. – М.: LAP Lambert Academic Publishing, 2013. – 60 с.
  103. Rajvardan Wala and Shivaji Wala. Itihaas Puranas of India. – М.: BloggingBooks, 2012. – 80 с.
  104. Nadeem Ahmad and Riffat Asim Pasha. Temperature Sensitivity of Anti Armour Projectile. – М.: LAP Lambert Academic Publishing, 2011. – 64 с.
  105. Amit Kumar Dwivedi,Nivedita T. Dwivedi and Harnam Singh. Indian Village: A Socioeconomic Study. – М.: LAP Lambert Academic Publishing, 2013. – 132 с.
  106. Ayyaswamy Kathirvel,Srinivasan Rengaramanujam and Mohanambal Kathirvel. Prevention of attacks usign umpiring security model for manets. – М.: LAP Lambert Academic Publishing, 2012. – 192 с.
  107. Vijay Godse and Ladda P. L. Naikwade N. S. Hypolipidemic Activity of Diclofenac with Pioglitazone and Bezafibrate. – М.: LAP Lambert Academic Publishing, 2011. – 64 с.
  108. Swati Gupta and Amandeep Singh. Intravaginal scaffolds: A promising tool against cervical cancer. – М.: LAP Lambert Academic Publishing, 2014. – 92 с.
  109. Paramjit Singh and Kennath J. Arul. Temporomandibular Joint in Health and Disorders. – М.: LAP Lambert Academic Publishing, 2012. – 176 с.
  110. Anupama Rao,Amitha Ramesh and Biju Thomas. Subgingival irrigation of tea tree oil in chronic periodontitis. – М.: LAP Lambert Academic Publishing, 2014. – 80 с.
  111. Abhishek Parolia,Kundabala M. and ShashiRashmi Acharya. Methods of Caries Detection. – М.: LAP Lambert Academic Publishing, 2012. – 172 с.
  112. Deusdedit Peter Mlay,Jerome Peter Mrema and Johnson J.T. Msaky. Effects of Intercropping Cassava with Some Legumes. – М.: LAP Lambert Academic Publishing, 2012. – 260 с.
  113. Venkateswar Rao Vutukuri and T. Jayasree M. D. Comparative Studies Of NSAIDs In Albino Mice By Plethysmograph. – М.: LAP Lambert Academic Publishing, 2013. – 92 с.
  114. Jas Kirat Singh,Rajan Dhawan and Shivani Dhawan. Oral and Peri-oral Piercing-You Decide. – М.: LAP Lambert Academic Publishing, 2013. – 60 с.
  115. Nupur Singh,Sanjaya Sharma and Sushila Kharakwal. Anemia In Pregnancy. – М.: LAP Lambert Academic Publishing, 2013. – 132 с.
  116. Joseph Yanni,Halina Dobrzynski and Mark Boyett. Age-dependent remodelling of the sinoatrial node and right atrium. – М.: LAP Lambert Academic Publishing, 2012. – 208 с.
  117. Mashad Uddin Saleh,Iqbal Hasan and Nabeela Kauser. Effect of FWM in Ultra High Speed DWDM Transmission System. – М.: LAP Lambert Academic Publishing, 2013. – 64 с.
  118. Prapti Mankad,Shuchi Modi and Hardik Joshi. Seamless Wi-Fi Offloading For Mobile Applications. – М.: LAP Lambert Academic Publishing, 2013. – 112 с.
  119. Nitin K. Mishra and Sumit Dhariwal. Security in Mobile Ad-Hoc Networks. – М.: LAP Lambert Academic Publishing, 2014. – 72 с.
  120. Madhav P. Namdev. Phishing Attacks and Detection. – М.: LAP Lambert Academic Publishing, 2015. – 68 с.
  121. Srikanthreddy Arimanda and Manojkumar Kolli. Performance Study Of Security Mechanismsm For Mobile Agent Domain. – М.: LAP Lambert Academic Publishing, 2011. – 84 с.
  122. Inadyuti Dutt and Soumya Paul. Some Research on Optical Fibre Security. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  123. Prashant Kumar Singh and Avimanyou Kumar Vatsa. Taxonomy Based Intrusion Attacks and Detection Scheme in P2P Network. – М.: LAP Lambert Academic Publishing, 2012. – 56 с.
  124. E.O. Ibidunmoye and B.K. Alese. Game-Theoretic Analysis of Network Attack-Defense Interactions. – М.: LAP Lambert Academic Publishing, 2013. – 108 с.
  125. Raj Shree and Ravi Prakash Pandey. Security Advancement in ZRP based Wireless Networks. – М.: LAP Lambert Academic Publishing, 2014. – 92 с.
  126. Imran Sohail and Sikandar Hayat. Network Security and DDoS. – М.: LAP Lambert Academic Publishing, 2010. – 64 с.
  127. Zhifeng Chen and Dapeng Wu. Mobile Video Communications. – М.: LAP Lambert Academic Publishing, 2014. – 148 с.
  128. Antarpreet Singh Manchanda. Design Methodology for Differential Power Analysis Resistant Circuits. – М.: LAP Lambert Academic Publishing, 2014. – 120 с.
  129. Natarajan Meghanathan,DeShante C. Johnson and Alexander R. Geoghegan. An Analysis of Software Security Attacks and Mitigation Controls. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  130. Jayeeta Majumder and Gargi Saha. SQL Injection Attacks and possible Remedies. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  131. Mais Mohammed Hobi and Sarab Majeed Hameed. Biometrics for User Authentication Using Artificial Neural Networks. – М.: LAP Lambert Academic Publishing, 2013. – 108 с.
  132. Mitko Bogdanoski,Aleksandar Risteski and Marjan Bogdanoski. Cyber operations - a permanent part of the global conflict. – М.: LAP Lambert Academic Publishing, 2014. – 60 с.
  133. Stephen Schiavone,Lalit Garg and Kelly Summers. Information Security in Enterprises - an Ontological Perspective. – М.: LAP Lambert Academic Publishing, 2014. – 232 с.
  134. Akram Hossain,A. K. M. Zaidi Satter and Shibli Shahriar. Side Channel Attack Prevention. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  135. Edmond K. Machie. Network Attack Traceback And React. – М.: LAP Lambert Academic Publishing, 2013. – 208 с.
  136. frankie tvrz and marijke coetzee. Information Security of a Bluetooth-enabled handheld device. – М.: LAP Lambert Academic Publishing, 2010. – 180 с.
  137. Keijo Haataja. Security Threats and Countermeasures in Bluetooth-Enabled Systems. – М.: LAP Lambert Academic Publishing, 2009. – 188 с.
  138. B. B. Gupta. An Introduction to DDoS Attacks and Defense Mechanisms. – М.: LAP Lambert Academic Publishing, 2011. – 232 с.
  139. Rati Mekvabishvili. Self-fulfilling Speculative Attacks and Informational Structure. – М.: LAP Lambert Academic Publishing, 2011. – 60 с.
  140. Audu Jonathan Adoga and Fredah I. Agbeje. Introduction to Internet Security for PHP Web Developers. – М.: , 2014. – 52 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Наука человековедения. интервью с Д. Уолтоном, профессором London Metropolitan University, экспертом CIPD. Chartered Institute of Personnel and Development, автором программы Master of Arts in Human Resource Strategies. И. Смирнова, "Кадровый менеджмент", № 5, июль-август 2007.
  2. Специализированный модуль FS-CD. Collections and Disbursements - "Сборы и Выплаты" и его возможности. О.А. Глущенко, "Финансовый менеджмент в страховой компании", № 2, II квартал 2007.
  3. Бюджетирование страховой компании на базе Oracle Enterprise Planning and Budgeting. Д.В. Лесоводский, "Финансовый менеджмент в страховой компании", № 3, III квартал 2006.
  4. Регулирование операций торгового финансирования: новые инициативы. интервью с Д. Шмандом, вице-председателем Банковской комиссии ICC по supply chain finance, главой подразделения Trade Finance and Cash Management Corporates EMEA в Global Transaction Banking. GTB division Deutsche Bank. Н. Макарова, "Международные банковские операции", N 2, апрель-июнь 2012 г.
  5. Ужин в темноте в стиле Малевича и Новый год в Хаммере". Что может выть лучше?". интервью с Н. Саниной, индивидуальным предпринимателем и креативным директором компании "San and stars". М. Сипатова, "Арсенал предпринимателя", N 12, декабрь 2011 г.
  6. На пути к новому стандарту в торговом финансировании. интервью с А.  Кастерманом, руководителем Trade and Supply Chain, SWIFT, сопредседателем рабочей группы ICC-BPO. Э. Шакирова, "Международные банковские операции", N 4, октябрь-декабрь 2011 г.
  7. Back side of the moon, или темная сторона поведения персонала. интервью с Н. Русаковой, директором по персоналу ОАО "Хлебпром", А. Сукачёвым, директором "Торговой компании АС", Н. Харитоновой, руководителем службы персонала тверской компании ЗАО "ДКС". А. Колесникова, Т. Тюрина, С.  Машарипов, "Управление персоналом", N 16, август 2010 г.
  8. Уильям Савадж: Мотивировать людей в Нижнем Новгороде и Новосибирске нужно по-разному". интервью с У. Саваджем, вице-президентом корпорации Intel, подразделение Software and Services Group. М. Холкина, "Управление персоналом", N 14, июль 2010 г.
  9. Цены под контролем: the present and the future. С. Стройкова, И. Леметюйнен, "Консультант", № 19, сентябрь 2009.

Образцы работ

Тема и предметТип и объем работы
Последствия операции НАТО
Политология
Диплом
80 стр.
Руководство и лидерство в менеджменте
Менеджмент
Диплом
92 стр.
Использование фактора лидерства в менеджменте
Менеджмент
Курсовая работа
41 стр.
Математические модели океанических течений
Переводоведение (теория перевода)
Курсовая работа
42 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Рамиль
От души спасибо! Ты мой спаситель!