Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Nasim Beigi-Mohammadi. Smart Meter Networks: Intrusion Detection System by Design. – М.: LAP Lambert Academic Publishing, 2014. – 136 с.

Дополнительные результаты

  1. Turid H. Horgen, Michael L. Joroff, William L. Porter, Donald A. SchA¶n. Excellence By Design : Transforming Workplace and Work Practice. – М.: , 0. – 0 с.
  2. Donna McIntosh-Fletcher. Teaming By Design: Real Teams for Real People. – М.: , 0. – 0 с.
  3. Safe Schools: A Security and Loss Prevention Plan. – М.: , 0. – 0 с.
  4. Ricardo Sal Zebulum, Marco Aurelio Pacheco, Marley Maria B.R. Vellasco, Marley Maria Bernard Vellasco. Evolutionary Electronics: Automatic Design of Electronic Circuits and Systems by Genetic Algorithms. – М.: , 0. – 0 с.
  5. Getting There by Design, An architect's guide to project and design management. – М.: , 0. – 0 с.
  6. C. Carney Strange, James H. Banning, C. Carney Strange, James H. Banning. Educating by Design : Creating Campus Learning Environments That Work. – М.: , 0. – 0 с.
  7. Dorothy E. Denning, Peter J. Denning. Internet Besieged. – М.: , 0. – 0 с.
  8. Abraham B. Shani. Learning by Design: Building Sustainable Organizations (Management, Organizations, and Business Series). – М.: , 2003. – 0 с.
  9. Paul Piccard, Jeremy Faircloth. Combating Spyware in the Enterprise. – М.: , 2006. – 386 с.
  10. William Horton. e-Learning by Design. – М.: , 2006. – 640 с.
  11. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с.
  12. Edited by Edward L. Gibson. Federalism and Democracy in Latin America. – М.: The Johns Hopkins University Press, 2004. – 392 с.
  13. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с.
  14. Sybil Hatch. Diversity by Design: Guide to Fostering Diversity in the Civil Engineering Workforce. – М.: , 2008. – 70 с.
  15. Andrew Abela. Advanced Presentations by Design: Creating Communication that Drives Action. – М.: , 2008. – 224 с.
  16. Kenneth Allinson. Getting There by Design. – М.: , 2010. – 144 с.
  17. Turid H. Horgen. Excellence By Design. – М.: , 1998. – 304 с.
  18. Ralf Strauss. Marketing Planning by Design. – М.: , 2008. – 368 с.
  19. Nigel Hirst. Containment Systems: A Design Guide. – М.: , 2010. – 199 с.
  20. Sean Stanwick. Wine by Design. – М.: , 2010. – 232 с.
  21. Eugene C. Nelson. Quality By Design. – М.: , 2007. – 512 с.
  22. Masahiro Fujita. Verification Techniques for System-Level Design. – М.: , 2010. – 256 с.
  23. Rory Bray. OSSEC Host-Based Intrusion Detection Guide. – М.: , 2010. – 416 с.
  24. Perry Alexander. System Level Design with Rosetta. – М.: , 2010. – 384 с.
  25. Syngress. Snort Intrusion Detection 2.0. – М.: , 2010. – 550 с.
  26. Georgia Butina-Watson. Identity by Design. – М.: , 2010. – 298 с.
  27. Christopher Cuttle. Lighting by Design. – М.: Architectural Press, 2008. – 264 с.
  28. Brian Caswell. Snort Intrusion Detection and Prevention Toolkit. – М.: , 2010. – 768 с.
  29. M.B. Timmons. Aquaculture Water Reuse Systems: Engineering Design and Management. – М.: , 2010. – 348 с.
  30. Robert Barnard. Intrusion Detection Systems. – М.: , 2010. – 480 с.
  31. E Herman. Kinship by Design – A History of Adoption in the Modern United States. – М.: , 2008. – 368 с.
  32. Claude S Fischer. Inequality By Design – Cracking the Bell Curve Myth. – М.: , 1996. – 330 с.
  33. Claude S Fischer. Inequality By Design – Cracking the Bell Curve Myth (Paper). – М.: , 1996. – 330 с.
  34. John O Reiss. Not by Design – Retiring Darwin?s Watchmaker. – М.: , 2009. – 382 с.
  35. C. Carney Strange. Educating by Design. – М.: , 2000. – 272 с.
  36. Saloni Mathur. India by Design – Colonial History and Cultural Display. – М.: , 2007. – 220 с.
  37. Vivien Walsh. Winning By Design. – М.: , 1992. – 0 с.
  38. Peter D Salins. Scarcity by Design – The Legacy of New York City?s Housing Policies. – М.: , 1992. – 178 с.
  39. Melanie Manion. Corruption by Design. – М.: , 2004. – 304 с.
  40. Stephen I Gallant. Neural Network Learning & Expert Systems. – М.: , 1993. – 382 с.
  41. Douglas C. Eadie. Changing by Design. – М.: , 1997. – 228 с.
  42. Joseph J. Byrne. Network+ Certification Study System. – М.: , 1999. – 356 с.
  43. Michael Boroian. India by Design. – М.: , 2009. – 400 с.
  44. Rj Light. By Design – Planning Research On Higher Education. – М.: , 1990. – 288 с.
  45. Light. By Design – Planning Research on Higher Education (Paper). – М.: , 1990. – 0 с.
  46. Michael Adas. Dominance by Design – Technological Imperatives and America?s Civilizing Mission. – М.: , 2006. – 480 с.
  47. Goldman Sachs. Wealth Creation by Design. – М.: , 2012. – 320 с.
  48. Sean Stanwick. Wine by Design. – М.: , 2005. – 224 с.
  49. Terry Escamilla. Intrusion Detection. – М.: , 1998. – 368 с.
  50. Norman Witkin. Enterprise Networking for Information Systems Professionals. – М.: , 1997. – 254 с.
  51. Jeremy Stolow. Orthodox by Design – Judaism, Print Politics, and the ArtScroll Revolution. – М.: , 2010. – 240 с.
  52. Jeremy Stolow. Orthodox by Design – Judaism, Print Politics, and the ArtScroll Revolution. – М.: , 2010. – 240 с.
  53. Edward D Hess. Smart Growth – Building an Enduring Business by Managing the Risks of Growth. – М.: , 2010. – 224 с.
  54. Henry Petroski. Invention by Design – How Engineers Get from Thought to Thing (Paper) (OIP). – М.: , 1998. – 252 с.
  55. Henry Petroski. Invention by Design – How Engineers Get from Thought to Thing (OIPSE). – М.: , 1996. – 252 с.
  56. Eric Higgs. Nature by Design – People, Natural Process & Ecological Restoration. – М.: , 2003. – 416 с.
  57. Robin Landa. Advertising by Design. – М.: , 2004. – 256 с.
  58. Halyna Hryn. Hunger by Design – The Great Ukrainian Famine and Its Soviet Context. – М.: , 2009. – 168 с.
  59. Aristide Zolberg. A Nation by Design – Immigration Policy in the Fashioning of America. – М.: , 2006. – 528 с.
  60. William Horton. e–Learning by Design. – М.: , 2011. – 600 с.
  61. Eugene C. Nelson. Value by Design. – М.: , 2011. – 384 с.
  62. Saloni Mathur. India by Design – Colonial History and Cultural Display. – М.: , 2007. – 220 с.
  63. David Travis. Taken by Design. – М.: , 2002. – 272 с.
  64. WR VIETH. Vieth: ?membrane? Systems – Analysis & Design – Applications In Biotechnology Etc. – М.: , 1988. – 378 с.
  65. Ronald Green. Babies By Design – The Ethics of Genetic Choice. – М.: , 2009. – 288 с.
  66. Dr. Sitansu S. Mittra. Structured Techniques of System Analysis, Design, and Implementation. – М.: , 1988. – 392 с.
  67. Michael Adas. Dominance by Design – Technological Imperatives and America?s Civilizing Mission. – М.: , 2009. – 480 с.
  68. Marian H Feldman. Diplomacy by Design – Luxury Arts and an "International Style" in the Ancient Near East 1400 – 1200 BCE. – М.: , 2006. – 272 с.
  69. Franklin Becker. Workplace by Design. – М.: , 1995. – 256 с.
  70. Craig Erhorn. Competing by Design. – М.: , 1995. – 300 с.
  71. Alan Dennis. WIE Systems Analysis & Design with UML. – М.: , 2004. – 544 с.
  72. Fen Montaigne. Medicine by Design – The Practice and Promise of Biomedical Engineering. – М.: , 2006. – 224 с.
  73. E. Grady Bogue. Leadership by Design. – М.: , 1994. – 164 с.
  74. Robin Landa. Advertising by Design. – М.: , 2010. – 288 с.
  75. George A. Covington. Access by Design. – М.: , 1996. – 256 с.
  76. Eric Higgs. Nature by Design – People, Natural Process & Ecological Restoration. – М.: , 2003. – 416 с.
  77. Excavation Systems Planning, Design, And Safety. – М.: , 2011. – 509 с.
  78. Sustainable Thermal Storage Systems Planning Design And Operations. – М.: , 2011. – 320 с.
  79. Brilliance By Design. – М.: , 2011. – 216 с.
  80. Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky. Cisco Security Professional's Guide to Secure Intrusion Detection Systems. – М.: , . –  с.
  81. David Zumoffen and Marta Basualdo. Fault Detection Systems Integrated to Fault-Tolerant Control. – М.: LAP Lambert Academic Publishing, 2012. – 236 с.
  82. Anup Bhange and Manmeet Kaur Marhas. Anomaly Detection in Network Traffic; A Statistical Approach. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  83. Gulshan Kumar. Effective Intrusion Detection using Genetic Algorithms. – М.: LAP Lambert Academic Publishing, 2014. – 100 с.
  84. Tanmoy Hazra. Application of PCA in IDS. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  85. Md. Nafiz Imtiaz. Protection of Domestic & industrial Electrical system by sensing Sound. – М.: LAP Lambert Academic Publishing, 2013. – 64 с.
  86. Saifur Sabuj. Microcontroller Based Friend or Foe (FoF) Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 52 с.
  87. Congzhi Huang and Yan Bai. Modeling, Analysis, and Synthesis of Networked Cascade Control Systems. – М.: LAP Lambert Academic Publishing, 2011. – 176 с.
  88. Hua Ouyang. Networked Predictive Control Systems. – М.: LAP Lambert Academic Publishing, 2010. – 164 с.
  89. Huang-Chun Roan. Network Intrusion Detection Based on Shift-OR Circuit. – М.: LAP Lambert Academic Publishing, 2011. – 60 с.
  90. Gopal U. Shinde and Sunil B. Sharma. Design Optimization in Tillage Tool System by CAD/CAM/CAE:Vol:I. – М.: LAP Lambert Academic Publishing, 2013. – 172 с.
  91. M. Sadiq Ali Khan and S. M. Aqil Burney. Recent Trends in Intrusion Detection System & Network Monitoring. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  92. Cruceru Madalina. Radiation Detection Systems With Applications in High Energy Physics. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  93. Yi Xin. Mid-IR-based Gas Detection System Analysis Model. – М.: LAP Lambert Academic Publishing, 2011. – 136 с.
  94. Janice Golding. Extinction by design. – М.: LAP Lambert Academic Publishing, 2010. – 280 с.
  95. Po-Ning Chen. Large Deviations Analysis to the Performance of Distributed Detection. – М.: LAP Lambert Academic Publishing, 2010. – 132 с.
  96. Farhana Shahid and Ubaid Ur Rahman. Detection Of Heart Disease Using Decision Tree Technique. – М.: LAP Lambert Academic Publishing, 2014. – 64 с.
  97. Abhay Nath Singh. Honeypot Based Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  98. Shahnawaz Husain,S. C. Gupta and R. C. Joshi. Intrusion Detection Engine for Adhoc Environment. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  99. Sumaya Saad Sulaiman and Sarab M. Hameed. A Fuzzy Based Clustering for Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  100. Shubha Puthran and Ketan Shah. Intrusion Detection System using datamining techniques. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  101. Mohammad S. I. Mamun. Intrusion Detection System Architecture in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  102. Heba Fathy Eid. Computational Intelligence in Network Intrusion Detection System. – М.: Scholars' Press, 2014. – 164 с.
  103. Janakiraman S. Distributed Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 164 с.
  104. Yogesh Kumar,Krishan Kumar and Gulshan Kumar. Feature Selection For Intrusion Detection Systems. – М.: LAP Lambert Academic Publishing, 2014. – 100 с.
  105. Syed Zahidur Rashid. Computer Network Security Monitoring. – М.: Scholars' Press, 2015. – 284 с.
  106. Lanier Watkins. Resource Discovery: Using Network Traffic To Infer CPU And Memory Load. – М.: LAP Lambert Academic Publishing, 2014. – 96 с.
  107. Mrutyunjaya Panda and Manas Ranjan Patra. A Data Mining Approach to Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2015. – 216 с.
  108. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  109. Mueen Uddin. Dynamic Multi Layer Signature based IDS System using Mobile Agents. – М.: LAP Lambert Academic Publishing, 2011. – 72 с.
  110. Ivano Malavolta. A tamper resistant Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2011. – 144 с.
  111. Shaffali Gupta and Sanmeet Kaur. A GUI Framework for detecting Intrusions using Bro IDS. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  112. Mahmoud Jazzar. Computer Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 240 с.
  113. Siva S. Sivatha Sindhu,S. Geetha and S. Selvakumar. Network Intrusion Detection System using Machine Learning Techniques. – М.: LAP Lambert Academic Publishing, 2013. – 80 с.
  114. Nasim Beigi-Mohammadi. Smart Meter Networks: Intrusion Detection System by Design. – М.: LAP Lambert Academic Publishing, 2014. – 136 с.
  115. Christian Chetachi Umunna. Distributed Intrusion Detection System in Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 104 с.
  116. Iftikhar Ahmad. Feature Subset Selection in Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 220 с.
  117. Sharmin Rashid Linta and Md.Ridgewan Khan Neuton. Today’s Impact on Communication System by IP Spoofing. – М.: LAP Lambert Academic Publishing, 2012. – 72 с.
  118. Saima Munawar. Detection and Classification Of Normal and Anomaly IP Packet. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  119. Jabarweer Singh,Krishan Kumar and Gulshan Kumar. Intrusion detection using artificial intelligence based ensembles. – М.: LAP Lambert Academic Publishing, 2014. – 116 с.
  120. Muhammad Rashid. System Level Design. – М.: LAP Lambert Academic Publishing, 2011. – 200 с.
  121. Govind Sreekar Shenoy. Architecture Support for Intrusion Detection systems. – М.: LAP Lambert Academic Publishing, 2014. – 160 с.
  122. Alireza (Arash) Salehi Nejad. Fundamentals of System Analysis & Design. – М.: LAP Lambert Academic Publishing, 2014. – 100 с.
  123. Monis Akhlaq,Irfan Awan and Faeiz Alserhani. Improved Performance High Speed Network Intrusion Detection Systems. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  124. Prakash Prasad. Intrusion Detection System: Findings. – М.: LAP Lambert Academic Publishing, 2011. – 104 с.
  125. Homam El-Taj and Omar Amer. Network Alert Management System For IDS False Positive Reduction. – М.: LAP Lambert Academic Publishing, 2013. – 156 с.
  126. Bibi Masoomeh Aslahi Shahri. Intrusion Detection System Using Hybrid Gsa-kmeans. – М.: LAP Lambert Academic Publishing, 2014. – 128 с.
  127. Tigabu Dagne Akal. Constructing Predictive Model for Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 160 с.
  128. Kamaruzaman Maskat and Mohd Afizi Mohd Shukran. Agent Based Snort In Distributed Environment. – М.: LAP Lambert Academic Publishing, 2013. – 112 с.
  129. Kamrul Hasan. An Investigation into Botnet Detection System. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  130. Rupali Pathak. Recent Advances In Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  131. Davoud Mougouei and Man Kwan Yeung. Requirement Engineering for Intrusion Tolerant Systems. – М.: LAP Lambert Academic Publishing, 2013. – 104 с.
  132. Al-Sakib Khan Pathan. Securing WSN with Lightweight Resource-Efficient Schemes. – М.: LAP Lambert Academic Publishing, 2011. – 116 с.
  133. Alpay Doruk. Security Review Program Requirements for Intrusion Management Systems. – М.: LAP Lambert Academic Publishing, 2010. – 88 с.
  134. Sathish Kumar. Intrusion Detection and Response Techniques for Mobile Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 200 с.
  135. Richard Rimiru. Exploring Immune System's Concepts for the Design of Novel AIS Models. – М.: LAP Lambert Academic Publishing, 2012. – 164 с.
  136. Khandakar Entenam Unayes Ahmed. IDENTITY AND ACCESS MANAGEMENT IN CLOUD COMPUTING. – М.: LAP Lambert Academic Publishing, 2011. – 172 с.
  137. Emma Robertson, photographs by Max Wanger. Knitting by Design. – М.: , 2013. – 144 с.
  138. Nadim Al-Mosawi and Frida Ohlson. Occupant Detection System. – М.: , 2015. – 64 с.
  139. Bond By Design: The Art of the James Bond Films. – М.: Penguin Random House, Дорлинг Киндерсли, 2015. – 320 с.
  140. Lawrence Zeegen. Ladybird by Design: 100 Years of Words and Pictures. – М.: Ladybird Books Ltd, Penguin Random House, 2015. – 256 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Банковское отделение будущего. интервью с Камероном МакКворри. Cameron MacQuarrie, менеджером по развитию бизнеса компании Cisco Systems в области корпоративных финансов в регионе EMEA. Европа, Ближний Восток, Африка. Н.Ф. Колюшенко, "Расчеты и операционная работа в коммерческом банке", № 2, февраль 2006.
  2. Ловушка для пирата. интервью с И. Слабых, руководителем отдела противодействия интеллектуальному пиратству в России и СНГ Adobe Systems. И. Голова, "Расчет", N 9, сентябрь 2012 г.
  3. Осторожно: дети! Что нужно молодому поколению от работодателей. интервью с Р. Алиевым, управляющим партнером HR Solutions, Д. Байковым, директором по развитию кондитерского объединения "Любимый Край", В.  Ворошиловым, генеральным директором группы компаний "БАГЕМ", Н. Зотовым, генеральным директором группы компаний "Мега-НН", А. Коршуновым, заместителем директора МИГСУ РАГС, Л. Кузьмичевой, исполнительным директором Нижегородской ассоциации рестораторов и отельеров, генеральным директором компании "Ресторатор", И. Мареевой, директором Центра технического обучения компании Digital Design, Е. Омельченко, социологом, профессором кафедры социологии ГУ - Высшая.... А. Асанова, "Управление персоналом", N 12, июнь 2010 г.
  4. Рабочее время + личное время = жизнь. интервью с Е. Акимовой, ведущим специалистом учебно-информационного центра ООО "Коммерческие и легковые автомобили - ГК ГАЗ", бизнес-тренером, консультантом, коучером, к.п.н., В. Вахрушевой, руководителем отдела по работе с персоналом Городского Ипотечного Банка, О. Гартман, директором "Нижегородского брачного агентства", Н. Герасимовой, генеральным директором частного охранного предприятия "Салют-НН", Д. Гоновым, генеральным директором Научно-производственного предприятия "Гранит", Э. Лавровой, генеральным директором маркетингово-рекламной компании SMART.... М. Сипатова, Л.  Валеева, С. Сипатов, Н. Гончаренко, А. Конфисахор, "Управление персоналом", N 10, май 2010 г.
  5. Основной арсенал "охотника" - его network: кого он знает на рынке и качество этих отношений. С. Плетнева, "Управление персоналом", № 12, июнь 2009.
  6. Я воспринимаю персонального помощника как напарника червяк должен нравиться рыбке, а не рыбаку. интервью с П.А. Черкашиным, руководителем российского представительства компании Adobe Systems. "Управление персоналом", № 20, октябрь 2008.

Образцы работ

Тема и предметТип и объем работы
Концентрация производства и определение оптимальных размеров
Экономика предприятия
Курсовая работа
25 стр.
Переход от концентрации к развитию малых и средних предприятий
Экономика предприятия
Курсовая работа
21 стр.
Эффект от увеличения масштабов производства (специализация и комбинирование производства в различных отраслях экономики России и других стран)
Экономика
Курсовая работа
31 стр.
Слияния и поглощения Мировая и Российская практика
Мировая экономика
Диплом
99 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Владислав
Хочу сказать большое спасибо за написанную Вами работу, которая понравилась преподавателю и мне лично. Надеюсь на дальнейшее сотрудничество.