Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Martin Fridson. Unwarranted Intrusions: The Case Against Government Intervention in the Marketplace. – М.: , 2006. – 309 с. Martin S. Fridson. Unwarranted Intrusions. – М.: , 2006. – 310 с. Дополнительные результаты Michael S. Greve. Sell Globally, Tax Locally: Sales Tax Reform for the New Economy (AEI Studies on Tax Reform). – М.: , 0. – 0 с. Joel Slemrod, Jon M. Bakija. Taxing Ourselves - 2nd Edition: A Citizen's Guide to the Great Debate over Tax Reform. – М.: , 0. – 0 с. Michael Perelman. The Pathology of the U.S. Economy: The Costs of a Low-Wage System. – М.: , 0. – 0 с. Larry Gross, John Stuart Katz, Jay Ruby. Image Ethics: The Moral Rights of Subjects in Photographs, Film, and Television (Communication and Society). – М.: , 0. – 0 с. James E. Lukaszewski. Coping With Corporate Campaigns : Patterns of Activist Intrusion. – М.: , 0. – 0 с. James E. Lukaszewski. When You Are the Target : Coping With Activist Intrusions and Threats. – М.: , 0. – 0 с. Safe Schools: A Security and Loss Prevention Plan. – М.: , 0. – 0 с. Partha Dasgupta, Karl-Goran Maler. The Economics of Non-Convex Ecosystems (Economics of Non-Market Goods and Resources, V. 4). – М.: , 0. – 0 с. F. H. Buckley. The Fall and Rise of Freedom of Contract. – М.: , 0. – 0 с. Dorothy E. Denning, Peter J. Denning. Internet Besieged. – М.: , 0. – 0 с. Charles Carrington, Timothy Speed, Juanita Ellis, Steffano Korper. Enterprise Directory and Security Implementation Guide: Designing and Implementing Directories in Your Organization (The Korper and Ellis E-Commerce Books Series). – М.: , 0. – 0 с. George Mohay, Alison Anderson, Byron Collie, Olivier de Vel, Rod McKemmish. Computer and Intrusion Forensics (Artech House Computer Security Series). – М.: , 0. – 0 с. Michael Regester. Risk Issues And Crisis Management: A Casebook of Best Practice (Pr in Practice). – М.: , 2005. – 0 с. Kenneth Arrow, Robert H. Mnookin, Amos Tversky. Barriers to Conflict Resolution. – М.: W. W. Norton & Company, Inc., 1995. – 368 с. Paul Piccard, Jeremy Faircloth. Combating Spyware in the Enterprise. – М.: , 2006. – 386 с. Martin Fridson. Unwarranted Intrusions: The Case Against Government Intervention in the Marketplace. – М.: , 2006. – 309 с. Kenneth Kuan-yun Kuo. Principles of Combustion. – М.: , 2005. – 760 с. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с. Robert G. Williscroft. Chicken Little Agenda: Debunking "Experts'" Lies. – М.: , 2006. – 256 с. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с. Privacy-Preserving Data Mining: Models and Algorithms (Advances in Database Systems). – М.: , 2008. – 514 с. Kevin L. Patterson. Why God Wants You Wealthy and Government Wants You Poor: Giving yourself permission is the first step in achieving great wealth in your life. – М.: , 2008. – 132 с. Ismail; Erturk. Financialization At Work: Key Texts and Analysis. – М.: , 2008. – 365 с. Ismail; Erturk. Financialization At Work: Key Texts and Analysis. – М.: , 2008. – 365 с. The Ethics of Diagnosis (Philosophy and Medicine). – М.: , 2008. – 320 с. Trust, Privacy and Security in Digital Business: 5th International Conference, TrustBus 2008 Turin, Italy, September 1-5, 2008, Proceedings (Lecture Notes in Computer Science). – М.: , 2008. – 205 с. Gerard Blokdijk, Ivanka Menken. Information Security Management Best Practice Workbook: Implementation and Management Roadmap for Threats, Challenges and Solutions - Ready to use supporting documents bringing Theory into Practice. – М.: , 2008. – 124 с. Dean Baker. Taking Economics Seriously (Boston Review Books). – М.: , 2010. – 136 с. Lawrence A. Beer. A Strategic and Tactical Approach to Global Business Ethics. – М.: , 2010. – 125 с. Md. Siddiqur Rahman. Climate Change and Forest in Bangladesh: Growth, Survivability, Stress Adoption and Spatial Shift to Forest Species due to Climate Change. – М.: , 2012. – 60 с. Mark A. Franklin, Patrick Crowley, Haldun Hadimioglu, Peter Z. Onufryk. Network Processor Design, Volume 3: Issues and Practices. – М.: Morgan Kaufmann, 2005. – 336 с. William J. Duiker. Victory in Vietnam: The Official History of the People's Army of Vietnam. – М.: University Press of Kansas, 2002. – 512 с. Christopher Kelly. Ruling the Later Roman Empire. – М.: Belknap Press, 2006. – 352 с. Keith Stenning, Michiel van Lambalgen. Human Reasoning and Cognitive Science (Bradford Books). – М.: , 2008. – 392 с. Ronald W. Shonkwiler. Mathematical Biology: An Introduction with Maple and Matlab (Graduate Texts in Mathematics). – М.: , 2008. – 428 с. ICRP. ICRP Publication 104: Scope of Radiological Protection Control Measures: Annals of the ICRP Volume 37 Issue 5 (International Commission on Radiological Protection). – М.: , 2008. – 62 с. Magued Iskander. Modelling with Transparent Soils: Visualizing Soil Structure Interaction and Multi Phase Flow, Non-Intrusively (Springer Series in Geomechanics and Geoengineering). – М.: , 2010. – 300 с. Paul Segall. Earthquake and Volcano Deformation. – М.: , 2010. – 458 с. Kevin D. Mitnick. The Art of Intrusion. – М.: , 2005. – 270 с. John H. Mace. The Act of Remembering. – М.: , 2010. – 416 с. John H. Mace. The Act of Remembering. – М.: , 2010. – 416 с. Rory Bray. OSSEC Host-Based Intrusion Detection Guide. – М.: , 2010. – 416 с. Michael Rash. Intrusion Prevention and Active Response. – М.: , 2010. – 550 с. Syngress. Snort Intrusion Detection 2.0. – М.: , 2010. – 550 с. Brian Caswell. Snort Intrusion Detection and Prevention Toolkit. – М.: , 2010. – 768 с. Robert Barnard. Intrusion Detection Systems. – М.: , 2010. – 480 с. Serap Erincin. Unwarranted Influence – Dwight D. Eisenhower and the Military Industrial Complex. – М.: , 2011. – 270 с. Terry Escamilla. Intrusion Detection. – М.: , 1998. – 368 с. Carrie Pitzulo. Unwarranted Influence – Dwight D. Eisenhower and the Military Industrial Complex. – М.: , 2011. – 216 с. P Rosenau. Post–Modernism & the Social Sciences – Insights, Inroads & Intrusions (Paper). – М.: , 1992. – 0 с. Ronald W. Shonkwiler, James Herod. Mathematical Biology: An Introduction with Maple and Matlab. – М.: Springer, 2009. – 556 с. Giuliano Amato. Antitrust and the Bounds of Power. – М.: , 2011. – 154 с. Paul Stanley. The Law of Confidentiality. – М.: , 2011. – 198 с. Edited by Stephen Weatherill and Ulf Bernitz. The Role of Regions and Sub-National Actors in Europe. – М.: , 2011. – 180 с. Edited by Katja S Ziegler. Human Rights and Private Law. – М.: , 2011. – 242 с. Larry Slater. Successful Investing Advice. – М.: , 2011. – 108 с. Martin S. Fridson. Unwarranted Intrusions. – М.: , 2006. – 310 с. Desmond Macnamara. The Book of Intrusions. – М.: , 1994. – 213 с. Hacking Exposed Malware And Rootkits. – М.: , 2011. – 400 с. Gray Hat Hacking The Ethical Hackers Handbook, 3Rd Edition. – М.: , 2011. – 720 с. Fundamentals Of Network Security. – М.: , 2011. – 672 с. Eoghan Casey. Digital Evidence and Computer Crime. – М.: , . – с. Greg Holden. Guide to Firewalls and Network Security: Intrusion Detection and VPNs. – М.: Course Technology, 2003. – 512 с. Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky. Cisco Security Professional's Guide to Secure Intrusion Detection Systems. – М.: , . – с. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . – с. Ido Dubrawsky. How to Cheat at Securing Your Network. – М.: Syngress, 2007. – 432 с. Kevin D. Mitnick. The Art of Intrusion. – М.: , 2005. – 288 с. Dominique Guillemant. Voyage en France (набор из 66 карточек). – М.: ELI s.r.l., 2009. – 66 с. Karpin. Perfecting Pregnancy. – М.: , 2014. – 394 с. Sam Harris. The Moral Landscape. – М.: Black Swan, 2012. – 384 с. Alaa Afeef,Alaa Sheta and Adnan Al-Rabea. Image Reconstruction of a Manufacturing Process. – М.: LAP Lambert Academic Publishing, 2011. – 100 с. Anup Bhange and Manmeet Kaur Marhas. Anomaly Detection in Network Traffic; A Statistical Approach. – М.: LAP Lambert Academic Publishing, 2012. – 92 с. Vai Yee Hon. Transient Flow Modeling For Reservoir Pressure Estimation. – М.: LAP Lambert Academic Publishing, 2011. – 88 с. Gulshan Kumar. Effective Intrusion Detection using Genetic Algorithms. – М.: LAP Lambert Academic Publishing, 2014. – 100 с. Peichung Shih. Facial Analysis in Video: Detection and Recognition. – М.: Scholars Press, 2013. – 176 с. Tanmoy Hazra. Application of PCA in IDS. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Prem Subedi. Energy & Environmental Change by RETs in Village Tourist Area of Nepal. – М.: LAP Lambert Academic Publishing, 2014. – 56 с. Yannis Benlachtar. Advanced Performance Monitoring in All-Optical Networks. – М.: LAP Lambert Academic Publishing, 2010. – 232 с. Shui-cheong Kam. Assessing of Circuit Breaker Restrike Risks Using Computer Simulation. – М.: LAP Lambert Academic Publishing, 2012. – 380 с. Sampath V.P. FPGA Based Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 120 с. Waqas Ahmed Rana. GSM Based System Design for Home Automation and Security. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Elez Shenhar and Ilan Shallom. Uniform Non-Intrusive Speech Quality Assessment Model. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Festus T. Ejikemeuwa,Sabestine O. Ejike and Onyinyechi F.A Ofoh. Three Stage Intruder Radio Alert System. – М.: LAP Lambert Academic Publishing, 2013. – 60 с. Huang-Chun Roan. Network Intrusion Detection Based on Shift-OR Circuit. – М.: LAP Lambert Academic Publishing, 2011. – 60 с. Ricardo S. Barros. Masonry Structures. – М.: LAP Lambert Academic Publishing, 2012. – 84 с. Sajal Kumar Adhikary. Modeling Groundwater Flow and Salinity Intrusion. – М.: LAP Lambert Academic Publishing, 2011. – 148 с. Yousef Shaheen. Prospect of Water Desalination. – М.: LAP Lambert Academic Publishing, 2014. – 120 с. Sourav Das and Tuhin Roy. Community Based Disaster Assessment. – М.: LAP Lambert Academic Publishing, 2011. – 92 с. Dipankar Sarkar and Md. Rezaur Rahman. Storm Surge Risk Assessment under Changing Climate on Bangladesh coast. – М.: LAP Lambert Academic Publishing, 2013. – 88 с. S.M. Khaledur Rahman. Assessing Suitable Alternatives for Better Livelihood. – М.: LAP Lambert Academic Publishing, 2012. – 64 с. Sadia Tasneem and Ir. Md. Nasif Ahsan. Impact of climate change on poverty: Evidence from Bangladesh. – М.: LAP Lambert Academic Publishing, 2014. – 124 с. M. Sadiq Ali Khan and S. M. Aqil Burney. Recent Trends in Intrusion Detection System & Network Monitoring. – М.: LAP Lambert Academic Publishing, 2012. – 120 с. Samuel Abaidoo. The Role of Environmental Ethics in Human-Nature Interaction. – М.: LAP Lambert Academic Publishing, 2009. – 192 с. Md. Ashiqur Rahman. Local Response to Global Climate Change. – М.: LAP Lambert Academic Publishing, 2010. – 88 с. Khurram Shahzad. Use and Impact of ICT in Libraries. – М.: LAP Lambert Academic Publishing, 2012. – 140 с. R. Nithya and S. Barathan. An exploration on the hydration of admixtured special cement sample. – М.: LAP Lambert Academic Publishing, 2013. – 260 с. Kristen Camp. Miarolitic Pegmatites, New Hampshire. – М.: LAP Lambert Academic Publishing, 2012. – 148 с. S. Selvam. Groundwater quality in coastal Aquifer. – М.: LAP Lambert Academic Publishing, 2012. – 92 с. Esamaldeen Ali. Geology and Structural Evolution around Abidiya area,Sudan. – М.: LAP Lambert Academic Publishing, 2012. – 196 с. Pierre-Alain Wulser. Uranium metallogeny in the North Flinders Ranges. – М.: LAP Lambert Academic Publishing, 2012. – 256 с. Mahamadane Diene and Mamadou Gueye. Tectonomagmatic Evolution of Precambrian segment:Mako belt Formations. – М.: LAP Lambert Academic Publishing, 2013. – 64 с. Shen Liu,Caixia Feng and Shaocong Lai. Ordovician mafic dykes from Qinling Orogenic Belt, China. – М.: LAP Lambert Academic Publishing, 2015. – 60 с. Alyssa Dausman. VARIABLE-DENSITY FLOW OF GROUNDWATER. – М.: LAP Lambert Academic Publishing, 2009. – 188 с. Md. Nazrul Islam,Md. Shahidul Islam and M. Nazrul Islam. Environmental Review of Salinity Intrusion of Coastal Bangladesh. – М.: LAP Lambert Academic Publishing, 2013. – 108 с. Soma Das. Thermal Effect of Intrusive on Coal Seam. – М.: LAP Lambert Academic Publishing, 2012. – 56 с. Farhat Godhrawala,M.N. Kuttappa and U.S.Krishna Nayak. Orthodontic intrusion - implants Vs utility arches. – М.: LAP Lambert Academic Publishing, 2012. – 52 с. Remya Ravindran. The Mechanics of Intrusion. – М.: LAP Lambert Academic Publishing, 2013. – 124 с. Emmanuel Igonor. Geochemical Evaluation of Igneous Intrusive Within Parts of SW Nigeria. – М.: LAP Lambert Academic Publishing, 2013. – 64 с. Karmanye Thadani,Subhajyoti Banerjee and Achintya Arora. Onslaughts on Free Speech in India by Means of Unwarranted Film Bans. – М.: LAP Lambert Academic Publishing, 2012. – 52 с. Celia Thornton Corrad. Intrusion on Tomorrow. – М.: LAP Lambert Academic Publishing, 2014. – 168 с. Abhay Nath Singh. Honeypot Based Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 68 с. Shahnawaz Husain,S. C. Gupta and R. C. Joshi. Intrusion Detection Engine for Adhoc Environment. – М.: LAP Lambert Academic Publishing, 2013. – 120 с. Sumaya Saad Sulaiman and Sarab M. Hameed. A Fuzzy Based Clustering for Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 120 с. Shubha Puthran and Ketan Shah. Intrusion Detection System using datamining techniques. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Mohammad S. I. Mamun. Intrusion Detection System Architecture in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Heba Fathy Eid. Computational Intelligence in Network Intrusion Detection System. – М.: Scholars' Press, 2014. – 164 с. Janakiraman S. Distributed Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 164 с. Yogesh Kumar,Krishan Kumar and Gulshan Kumar. Feature Selection For Intrusion Detection Systems. – М.: LAP Lambert Academic Publishing, 2014. – 100 с. Xiaodong He. Automated intrusion prevention mechanism in enhancing network security. – М.: Scholars' Press, 2014. – 128 с. Gulshan Kumar. Effective Intrusion Detection using Feature Selection. – М.: LAP Lambert Academic Publishing, 2014. – 92 с. Mrutyunjaya Panda and Manas Ranjan Patra. A Data Mining Approach to Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2015. – 216 с. Ivano Malavolta. A tamper resistant Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2011. – 144 с. Prashant Kumar Singh and Avimanyou Kumar Vatsa. Taxonomy Based Intrusion Attacks and Detection Scheme in P2P Network. – М.: LAP Lambert Academic Publishing, 2012. – 56 с. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с. Shaffali Gupta and Sanmeet Kaur. A GUI Framework for detecting Intrusions using Bro IDS. – М.: LAP Lambert Academic Publishing, 2013. – 76 с. Mahmoud Jazzar. Computer Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 240 с. Siva S. Sivatha Sindhu,S. Geetha and S. Selvakumar. Network Intrusion Detection System using Machine Learning Techniques. – М.: LAP Lambert Academic Publishing, 2013. – 80 с. Nasim Beigi-Mohammadi. Smart Meter Networks: Intrusion Detection System by Design. – М.: LAP Lambert Academic Publishing, 2014. – 136 с. Christian Chetachi Umunna. Distributed Intrusion Detection System in Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 104 с. Iftikhar Ahmad. Feature Subset Selection in Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 220 с. Jabarweer Singh,Krishan Kumar and Gulshan Kumar. Intrusion detection using artificial intelligence based ensembles. – М.: LAP Lambert Academic Publishing, 2014. – 116 с. Govind Sreekar Shenoy. Architecture Support for Intrusion Detection systems. – М.: LAP Lambert Academic Publishing, 2014. – 160 с. Monis Akhlaq,Irfan Awan and Faeiz Alserhani. Improved Performance High Speed Network Intrusion Detection Systems. – М.: LAP Lambert Academic Publishing, 2011. – 132 с. Bibi Masoomeh Aslahi Shahri. Intrusion Detection System Using Hybrid Gsa-kmeans. – М.: LAP Lambert Academic Publishing, 2014. – 128 с. Muna Elsadig Mohamed Ahmed Elsheik. Bio Inspired Intrusion Prevention and Self healing System for Networks. – М.: LAP Lambert Academic Publishing, 2012. – 256 с. Tigabu Dagne Akal. Constructing Predictive Model for Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 160 с. Rupali Pathak. Recent Advances In Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 72 с. Mafaz M. K. Al-Anezi and Najla B. I. Al-Dabagh. Multilayer Artificial Immune Systems for Intrusion & Malware Detection. – М.: LAP Lambert Academic Publishing, 2012. – 148 с. Alpay Doruk. Security Review Program Requirements for Intrusion Management Systems. – М.: LAP Lambert Academic Publishing, 2010. – 88 с. Sathish Kumar. Intrusion Detection and Response Techniques for Mobile Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 200 с.
Лучшие результаты Ничего не найдено Дополнительные результаты Ничего не найдено
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Андрей, 18.05 У меня с работой все хорошо,спасибо!