Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Nasim Beigi-Mohammadi. Smart Meter Networks: Intrusion Detection System by Design. – М.: LAP Lambert Academic Publishing, 2014. – 136 с. Дополнительные результаты Turid H. Horgen, Michael L. Joroff, William L. Porter, Donald A. SchA¶n. Excellence By Design : Transforming Workplace and Work Practice. – М.: , 0. – 0 с. Donna McIntosh-Fletcher. Teaming By Design: Real Teams for Real People. – М.: , 0. – 0 с. Safe Schools: A Security and Loss Prevention Plan. – М.: , 0. – 0 с. Ricardo Sal Zebulum, Marco Aurelio Pacheco, Marley Maria B.R. Vellasco, Marley Maria Bernard Vellasco. Evolutionary Electronics: Automatic Design of Electronic Circuits and Systems by Genetic Algorithms. – М.: , 0. – 0 с. Getting There by Design, An architect's guide to project and design management. – М.: , 0. – 0 с. C. Carney Strange, James H. Banning, C. Carney Strange, James H. Banning. Educating by Design : Creating Campus Learning Environments That Work. – М.: , 0. – 0 с. Dorothy E. Denning, Peter J. Denning. Internet Besieged. – М.: , 0. – 0 с. Abraham B. Shani. Learning by Design: Building Sustainable Organizations (Management, Organizations, and Business Series). – М.: , 2003. – 0 с. Paul Piccard, Jeremy Faircloth. Combating Spyware in the Enterprise. – М.: , 2006. – 386 с. William Horton. e-Learning by Design. – М.: , 2006. – 640 с. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с. Edited by Edward L. Gibson. Federalism and Democracy in Latin America. – М.: The Johns Hopkins University Press, 2004. – 392 с. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с. Sybil Hatch. Diversity by Design: Guide to Fostering Diversity in the Civil Engineering Workforce. – М.: , 2008. – 70 с. Andrew Abela. Advanced Presentations by Design: Creating Communication that Drives Action. – М.: , 2008. – 224 с. Kenneth Allinson. Getting There by Design. – М.: , 2010. – 144 с. Turid H. Horgen. Excellence By Design. – М.: , 1998. – 304 с. Ralf Strauss. Marketing Planning by Design. – М.: , 2008. – 368 с. Nigel Hirst. Containment Systems: A Design Guide. – М.: , 2010. – 199 с. Sean Stanwick. Wine by Design. – М.: , 2010. – 232 с. Eugene C. Nelson. Quality By Design. – М.: , 2007. – 512 с. Masahiro Fujita. Verification Techniques for System-Level Design. – М.: , 2010. – 256 с. Rory Bray. OSSEC Host-Based Intrusion Detection Guide. – М.: , 2010. – 416 с. Perry Alexander. System Level Design with Rosetta. – М.: , 2010. – 384 с. Syngress. Snort Intrusion Detection 2.0. – М.: , 2010. – 550 с. Georgia Butina-Watson. Identity by Design. – М.: , 2010. – 298 с. Christopher Cuttle. Lighting by Design. – М.: Architectural Press, 2008. – 264 с. Brian Caswell. Snort Intrusion Detection and Prevention Toolkit. – М.: , 2010. – 768 с. M.B. Timmons. Aquaculture Water Reuse Systems: Engineering Design and Management. – М.: , 2010. – 348 с. Robert Barnard. Intrusion Detection Systems. – М.: , 2010. – 480 с. E Herman. Kinship by Design – A History of Adoption in the Modern United States. – М.: , 2008. – 368 с. Claude S Fischer. Inequality By Design – Cracking the Bell Curve Myth. – М.: , 1996. – 330 с. Claude S Fischer. Inequality By Design – Cracking the Bell Curve Myth (Paper). – М.: , 1996. – 330 с. John O Reiss. Not by Design – Retiring Darwin?s Watchmaker. – М.: , 2009. – 382 с. C. Carney Strange. Educating by Design. – М.: , 2000. – 272 с. Saloni Mathur. India by Design – Colonial History and Cultural Display. – М.: , 2007. – 220 с. Vivien Walsh. Winning By Design. – М.: , 1992. – 0 с. Peter D Salins. Scarcity by Design – The Legacy of New York City?s Housing Policies. – М.: , 1992. – 178 с. Melanie Manion. Corruption by Design. – М.: , 2004. – 304 с. Stephen I Gallant. Neural Network Learning & Expert Systems. – М.: , 1993. – 382 с. Douglas C. Eadie. Changing by Design. – М.: , 1997. – 228 с. Joseph J. Byrne. Network+ Certification Study System. – М.: , 1999. – 356 с. Michael Boroian. India by Design. – М.: , 2009. – 400 с. Rj Light. By Design – Planning Research On Higher Education. – М.: , 1990. – 288 с. Light. By Design – Planning Research on Higher Education (Paper). – М.: , 1990. – 0 с. Michael Adas. Dominance by Design – Technological Imperatives and America?s Civilizing Mission. – М.: , 2006. – 480 с. Goldman Sachs. Wealth Creation by Design. – М.: , 2012. – 320 с. Sean Stanwick. Wine by Design. – М.: , 2005. – 224 с. Terry Escamilla. Intrusion Detection. – М.: , 1998. – 368 с. Norman Witkin. Enterprise Networking for Information Systems Professionals. – М.: , 1997. – 254 с. Jeremy Stolow. Orthodox by Design – Judaism, Print Politics, and the ArtScroll Revolution. – М.: , 2010. – 240 с. Jeremy Stolow. Orthodox by Design – Judaism, Print Politics, and the ArtScroll Revolution. – М.: , 2010. – 240 с. Edward D Hess. Smart Growth – Building an Enduring Business by Managing the Risks of Growth. – М.: , 2010. – 224 с. Henry Petroski. Invention by Design – How Engineers Get from Thought to Thing (Paper) (OIP). – М.: , 1998. – 252 с. Henry Petroski. Invention by Design – How Engineers Get from Thought to Thing (OIPSE). – М.: , 1996. – 252 с. Eric Higgs. Nature by Design – People, Natural Process & Ecological Restoration. – М.: , 2003. – 416 с. Robin Landa. Advertising by Design. – М.: , 2004. – 256 с. Halyna Hryn. Hunger by Design – The Great Ukrainian Famine and Its Soviet Context. – М.: , 2009. – 168 с. Aristide Zolberg. A Nation by Design – Immigration Policy in the Fashioning of America. – М.: , 2006. – 528 с. William Horton. e–Learning by Design. – М.: , 2011. – 600 с. Eugene C. Nelson. Value by Design. – М.: , 2011. – 384 с. Saloni Mathur. India by Design – Colonial History and Cultural Display. – М.: , 2007. – 220 с. David Travis. Taken by Design. – М.: , 2002. – 272 с. WR VIETH. Vieth: ?membrane? Systems – Analysis & Design – Applications In Biotechnology Etc. – М.: , 1988. – 378 с. Ronald Green. Babies By Design – The Ethics of Genetic Choice. – М.: , 2009. – 288 с. Dr. Sitansu S. Mittra. Structured Techniques of System Analysis, Design, and Implementation. – М.: , 1988. – 392 с. Michael Adas. Dominance by Design – Technological Imperatives and America?s Civilizing Mission. – М.: , 2009. – 480 с. Marian H Feldman. Diplomacy by Design – Luxury Arts and an "International Style" in the Ancient Near East 1400 – 1200 BCE. – М.: , 2006. – 272 с. Franklin Becker. Workplace by Design. – М.: , 1995. – 256 с. Craig Erhorn. Competing by Design. – М.: , 1995. – 300 с. Alan Dennis. WIE Systems Analysis & Design with UML. – М.: , 2004. – 544 с. Fen Montaigne. Medicine by Design – The Practice and Promise of Biomedical Engineering. – М.: , 2006. – 224 с. E. Grady Bogue. Leadership by Design. – М.: , 1994. – 164 с. Robin Landa. Advertising by Design. – М.: , 2010. – 288 с. George A. Covington. Access by Design. – М.: , 1996. – 256 с. Eric Higgs. Nature by Design – People, Natural Process & Ecological Restoration. – М.: , 2003. – 416 с. Excavation Systems Planning, Design, And Safety. – М.: , 2011. – 509 с. Sustainable Thermal Storage Systems Planning Design And Operations. – М.: , 2011. – 320 с. Brilliance By Design. – М.: , 2011. – 216 с. Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky. Cisco Security Professional's Guide to Secure Intrusion Detection Systems. – М.: , . – с. David Zumoffen and Marta Basualdo. Fault Detection Systems Integrated to Fault-Tolerant Control. – М.: LAP Lambert Academic Publishing, 2012. – 236 с. Anup Bhange and Manmeet Kaur Marhas. Anomaly Detection in Network Traffic; A Statistical Approach. – М.: LAP Lambert Academic Publishing, 2012. – 92 с. Gulshan Kumar. Effective Intrusion Detection using Genetic Algorithms. – М.: LAP Lambert Academic Publishing, 2014. – 100 с. Tanmoy Hazra. Application of PCA in IDS. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Md. Nafiz Imtiaz. Protection of Domestic & industrial Electrical system by sensing Sound. – М.: LAP Lambert Academic Publishing, 2013. – 64 с. Saifur Sabuj. Microcontroller Based Friend or Foe (FoF) Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 52 с. Congzhi Huang and Yan Bai. Modeling, Analysis, and Synthesis of Networked Cascade Control Systems. – М.: LAP Lambert Academic Publishing, 2011. – 176 с. Hua Ouyang. Networked Predictive Control Systems. – М.: LAP Lambert Academic Publishing, 2010. – 164 с. Huang-Chun Roan. Network Intrusion Detection Based on Shift-OR Circuit. – М.: LAP Lambert Academic Publishing, 2011. – 60 с. Gopal U. Shinde and Sunil B. Sharma. Design Optimization in Tillage Tool System by CAD/CAM/CAE:Vol:I. – М.: LAP Lambert Academic Publishing, 2013. – 172 с. M. Sadiq Ali Khan and S. M. Aqil Burney. Recent Trends in Intrusion Detection System & Network Monitoring. – М.: LAP Lambert Academic Publishing, 2012. – 120 с. Cruceru Madalina. Radiation Detection Systems With Applications in High Energy Physics. – М.: LAP Lambert Academic Publishing, 2012. – 84 с. Yi Xin. Mid-IR-based Gas Detection System Analysis Model. – М.: LAP Lambert Academic Publishing, 2011. – 136 с. Janice Golding. Extinction by design. – М.: LAP Lambert Academic Publishing, 2010. – 280 с. Po-Ning Chen. Large Deviations Analysis to the Performance of Distributed Detection. – М.: LAP Lambert Academic Publishing, 2010. – 132 с. Farhana Shahid and Ubaid Ur Rahman. Detection Of Heart Disease Using Decision Tree Technique. – М.: LAP Lambert Academic Publishing, 2014. – 64 с. Abhay Nath Singh. Honeypot Based Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 68 с. Shahnawaz Husain,S. C. Gupta and R. C. Joshi. Intrusion Detection Engine for Adhoc Environment. – М.: LAP Lambert Academic Publishing, 2013. – 120 с. Sumaya Saad Sulaiman and Sarab M. Hameed. A Fuzzy Based Clustering for Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 120 с. Shubha Puthran and Ketan Shah. Intrusion Detection System using datamining techniques. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Mohammad S. I. Mamun. Intrusion Detection System Architecture in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Heba Fathy Eid. Computational Intelligence in Network Intrusion Detection System. – М.: Scholars' Press, 2014. – 164 с. Janakiraman S. Distributed Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 164 с. Yogesh Kumar,Krishan Kumar and Gulshan Kumar. Feature Selection For Intrusion Detection Systems. – М.: LAP Lambert Academic Publishing, 2014. – 100 с. Syed Zahidur Rashid. Computer Network Security Monitoring. – М.: Scholars' Press, 2015. – 284 с. Lanier Watkins. Resource Discovery: Using Network Traffic To Infer CPU And Memory Load. – М.: LAP Lambert Academic Publishing, 2014. – 96 с. Mrutyunjaya Panda and Manas Ranjan Patra. A Data Mining Approach to Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2015. – 216 с. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с. Mueen Uddin. Dynamic Multi Layer Signature based IDS System using Mobile Agents. – М.: LAP Lambert Academic Publishing, 2011. – 72 с. Ivano Malavolta. A tamper resistant Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2011. – 144 с. Shaffali Gupta and Sanmeet Kaur. A GUI Framework for detecting Intrusions using Bro IDS. – М.: LAP Lambert Academic Publishing, 2013. – 76 с. Mahmoud Jazzar. Computer Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 240 с. Siva S. Sivatha Sindhu,S. Geetha and S. Selvakumar. Network Intrusion Detection System using Machine Learning Techniques. – М.: LAP Lambert Academic Publishing, 2013. – 80 с. Nasim Beigi-Mohammadi. Smart Meter Networks: Intrusion Detection System by Design. – М.: LAP Lambert Academic Publishing, 2014. – 136 с. Christian Chetachi Umunna. Distributed Intrusion Detection System in Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 104 с. Iftikhar Ahmad. Feature Subset Selection in Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 220 с. Sharmin Rashid Linta and Md.Ridgewan Khan Neuton. Today’s Impact on Communication System by IP Spoofing. – М.: LAP Lambert Academic Publishing, 2012. – 72 с. Saima Munawar. Detection and Classification Of Normal and Anomaly IP Packet. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Jabarweer Singh,Krishan Kumar and Gulshan Kumar. Intrusion detection using artificial intelligence based ensembles. – М.: LAP Lambert Academic Publishing, 2014. – 116 с. Muhammad Rashid. System Level Design. – М.: LAP Lambert Academic Publishing, 2011. – 200 с. Govind Sreekar Shenoy. Architecture Support for Intrusion Detection systems. – М.: LAP Lambert Academic Publishing, 2014. – 160 с. Alireza (Arash) Salehi Nejad. Fundamentals of System Analysis & Design. – М.: LAP Lambert Academic Publishing, 2014. – 100 с. Monis Akhlaq,Irfan Awan and Faeiz Alserhani. Improved Performance High Speed Network Intrusion Detection Systems. – М.: LAP Lambert Academic Publishing, 2011. – 132 с. Prakash Prasad. Intrusion Detection System: Findings. – М.: LAP Lambert Academic Publishing, 2011. – 104 с. Homam El-Taj and Omar Amer. Network Alert Management System For IDS False Positive Reduction. – М.: LAP Lambert Academic Publishing, 2013. – 156 с. Bibi Masoomeh Aslahi Shahri. Intrusion Detection System Using Hybrid Gsa-kmeans. – М.: LAP Lambert Academic Publishing, 2014. – 128 с. Tigabu Dagne Akal. Constructing Predictive Model for Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 160 с. Kamaruzaman Maskat and Mohd Afizi Mohd Shukran. Agent Based Snort In Distributed Environment. – М.: LAP Lambert Academic Publishing, 2013. – 112 с. Kamrul Hasan. An Investigation into Botnet Detection System. – М.: LAP Lambert Academic Publishing, 2013. – 120 с. Rupali Pathak. Recent Advances In Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 72 с. Davoud Mougouei and Man Kwan Yeung. Requirement Engineering for Intrusion Tolerant Systems. – М.: LAP Lambert Academic Publishing, 2013. – 104 с. Al-Sakib Khan Pathan. Securing WSN with Lightweight Resource-Efficient Schemes. – М.: LAP Lambert Academic Publishing, 2011. – 116 с. Alpay Doruk. Security Review Program Requirements for Intrusion Management Systems. – М.: LAP Lambert Academic Publishing, 2010. – 88 с. Sathish Kumar. Intrusion Detection and Response Techniques for Mobile Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 200 с. Richard Rimiru. Exploring Immune System's Concepts for the Design of Novel AIS Models. – М.: LAP Lambert Academic Publishing, 2012. – 164 с. Khandakar Entenam Unayes Ahmed. IDENTITY AND ACCESS MANAGEMENT IN CLOUD COMPUTING. – М.: LAP Lambert Academic Publishing, 2011. – 172 с. Emma Robertson, photographs by Max Wanger. Knitting by Design. – М.: , 2013. – 144 с. Nadim Al-Mosawi and Frida Ohlson. Occupant Detection System. – М.: , 2015. – 64 с. Bond By Design: The Art of the James Bond Films. – М.: Penguin Random House, Дорлинг Киндерсли, 2015. – 320 с. Lawrence Zeegen. Ladybird by Design: 100 Years of Words and Pictures. – М.: Ladybird Books Ltd, Penguin Random House, 2015. – 256 с. Лучшие результаты Ничего не найдено Дополнительные результаты Банковское отделение будущего. интервью с Камероном МакКворри. Cameron MacQuarrie, менеджером по развитию бизнеса компании Cisco Systems в области корпоративных финансов в регионе EMEA. Европа, Ближний Восток, Африка. Н.Ф. Колюшенко, "Расчеты и операционная работа в коммерческом банке", № 2, февраль 2006. Ловушка для пирата. интервью с И. Слабых, руководителем отдела противодействия интеллектуальному пиратству в России и СНГ Adobe Systems. И. Голова, "Расчет", N 9, сентябрь 2012 г. Осторожно: дети! Что нужно молодому поколению от работодателей. интервью с Р. Алиевым, управляющим партнером HR Solutions, Д. Байковым, директором по развитию кондитерского объединения "Любимый Край", В. Ворошиловым, генеральным директором группы компаний "БАГЕМ", Н. Зотовым, генеральным директором группы компаний "Мега-НН", А. Коршуновым, заместителем директора МИГСУ РАГС, Л. Кузьмичевой, исполнительным директором Нижегородской ассоциации рестораторов и отельеров, генеральным директором компании "Ресторатор", И. Мареевой, директором Центра технического обучения компании Digital Design, Е. Омельченко, социологом, профессором кафедры социологии ГУ - Высшая.... А. Асанова, "Управление персоналом", N 12, июнь 2010 г. Рабочее время + личное время = жизнь. интервью с Е. Акимовой, ведущим специалистом учебно-информационного центра ООО "Коммерческие и легковые автомобили - ГК ГАЗ", бизнес-тренером, консультантом, коучером, к.п.н., В. Вахрушевой, руководителем отдела по работе с персоналом Городского Ипотечного Банка, О. Гартман, директором "Нижегородского брачного агентства", Н. Герасимовой, генеральным директором частного охранного предприятия "Салют-НН", Д. Гоновым, генеральным директором Научно-производственного предприятия "Гранит", Э. Лавровой, генеральным директором маркетингово-рекламной компании SMART.... М. Сипатова, Л. Валеева, С. Сипатов, Н. Гончаренко, А. Конфисахор, "Управление персоналом", N 10, май 2010 г. Основной арсенал "охотника" - его network: кого он знает на рынке и качество этих отношений. С. Плетнева, "Управление персоналом", № 12, июнь 2009. Я воспринимаю персонального помощника как напарника червяк должен нравиться рыбке, а не рыбаку. интервью с П.А. Черкашиным, руководителем российского представительства компании Adobe Systems. "Управление персоналом", № 20, октябрь 2008. Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Владислав Хочу сказать большое спасибо за написанную Вами работу, которая понравилась преподавателю и мне лично. Надеюсь на дальнейшее сотрудничество.