Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Martin Fridson. Unwarranted Intrusions: The Case Against Government Intervention in the Marketplace. – М.: , 2006. – 309 с.
  2. Martin S. Fridson. Unwarranted Intrusions. – М.: , 2006. – 310 с.

Дополнительные результаты

  1. Michael S. Greve. Sell Globally, Tax Locally: Sales Tax Reform for the New Economy (AEI Studies on Tax Reform). – М.: , 0. – 0 с.
  2. Joel Slemrod, Jon M. Bakija. Taxing Ourselves - 2nd Edition: A Citizen's Guide to the Great Debate over Tax Reform. – М.: , 0. – 0 с.
  3. Michael Perelman. The Pathology of the U.S. Economy: The Costs of a Low-Wage System. – М.: , 0. – 0 с.
  4. Larry Gross, John Stuart Katz, Jay Ruby. Image Ethics: The Moral Rights of Subjects in Photographs, Film, and Television (Communication and Society). – М.: , 0. – 0 с.
  5. James E. Lukaszewski. Coping With Corporate Campaigns : Patterns of Activist Intrusion. – М.: , 0. – 0 с.
  6. James E. Lukaszewski. When You Are the Target : Coping With Activist Intrusions and Threats. – М.: , 0. – 0 с.
  7. Safe Schools: A Security and Loss Prevention Plan. – М.: , 0. – 0 с.
  8. Partha Dasgupta, Karl-Goran Maler. The Economics of Non-Convex Ecosystems (Economics of Non-Market Goods and Resources, V. 4). – М.: , 0. – 0 с.
  9. F. H. Buckley. The Fall and Rise of Freedom of Contract. – М.: , 0. – 0 с.
  10. Dorothy E. Denning, Peter J. Denning. Internet Besieged. – М.: , 0. – 0 с.
  11. Charles Carrington, Timothy Speed, Juanita Ellis, Steffano Korper. Enterprise Directory and Security Implementation Guide: Designing and Implementing Directories in Your Organization (The Korper and Ellis E-Commerce Books Series). – М.: , 0. – 0 с.
  12. George Mohay, Alison Anderson, Byron Collie, Olivier de Vel, Rod McKemmish. Computer and Intrusion Forensics (Artech House Computer Security Series). – М.: , 0. – 0 с.
  13. Michael Regester. Risk Issues And Crisis Management: A Casebook of Best Practice (Pr in Practice). – М.: , 2005. – 0 с.
  14. Kenneth Arrow, Robert H. Mnookin, Amos Tversky. Barriers to Conflict Resolution. – М.: W. W. Norton & Company, Inc., 1995. – 368 с.
  15. Paul Piccard, Jeremy Faircloth. Combating Spyware in the Enterprise. – М.: , 2006. – 386 с.
  16. Martin Fridson. Unwarranted Intrusions: The Case Against Government Intervention in the Marketplace. – М.: , 2006. – 309 с.
  17. Kenneth Kuan-yun Kuo. Principles of Combustion. – М.: , 2005. – 760 с.
  18. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с.
  19. Robert G. Williscroft. Chicken Little Agenda: Debunking "Experts'" Lies. – М.: , 2006. – 256 с.
  20. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с.
  21. Privacy-Preserving Data Mining: Models and Algorithms (Advances in Database Systems). – М.: , 2008. – 514 с.
  22. Kevin L. Patterson. Why God Wants You Wealthy and Government Wants You Poor: Giving yourself permission is the first step in achieving great wealth in your life. – М.: , 2008. – 132 с.
  23. Ismail; Erturk. Financialization At Work: Key Texts and Analysis. – М.: , 2008. – 365 с.
  24. Ismail; Erturk. Financialization At Work: Key Texts and Analysis. – М.: , 2008. – 365 с.
  25. The Ethics of Diagnosis (Philosophy and Medicine). – М.: , 2008. – 320 с.
  26. Trust, Privacy and Security in Digital Business: 5th International Conference, TrustBus 2008 Turin, Italy, September 1-5, 2008, Proceedings (Lecture Notes in Computer Science). – М.: , 2008. – 205 с.
  27. Gerard Blokdijk, Ivanka Menken. Information Security Management Best Practice Workbook: Implementation and Management Roadmap for Threats, Challenges and Solutions - Ready to use supporting documents bringing Theory into Practice. – М.: , 2008. – 124 с.
  28. Dean Baker. Taking Economics Seriously (Boston Review Books). – М.: , 2010. – 136 с.
  29. Lawrence A. Beer. A Strategic and Tactical Approach to Global Business Ethics. – М.: , 2010. – 125 с.
  30. Md. Siddiqur Rahman. Climate Change and Forest in Bangladesh: Growth, Survivability, Stress Adoption and Spatial Shift to Forest Species due to Climate Change. – М.: , 2012. – 60 с.
  31. Mark A. Franklin, Patrick Crowley, Haldun Hadimioglu, Peter Z. Onufryk. Network Processor Design, Volume 3: Issues and Practices. – М.: Morgan Kaufmann, 2005. – 336 с.
  32. William J. Duiker. Victory in Vietnam: The Official History of the People's Army of Vietnam. – М.: University Press of Kansas, 2002. – 512 с.
  33. Christopher Kelly. Ruling the Later Roman Empire. – М.: Belknap Press, 2006. – 352 с.
  34. Keith Stenning, Michiel van Lambalgen. Human Reasoning and Cognitive Science (Bradford Books). – М.: , 2008. – 392 с.
  35. Ronald W. Shonkwiler. Mathematical Biology: An Introduction with Maple and Matlab (Graduate Texts in Mathematics). – М.: , 2008. – 428 с.
  36. ICRP. ICRP Publication 104: Scope of Radiological Protection Control Measures: Annals of the ICRP Volume 37 Issue 5 (International Commission on Radiological Protection). – М.: , 2008. – 62 с.
  37. Magued Iskander. Modelling with Transparent Soils: Visualizing Soil Structure Interaction and Multi Phase Flow, Non-Intrusively (Springer Series in Geomechanics and Geoengineering). – М.: , 2010. – 300 с.
  38. Paul Segall. Earthquake and Volcano Deformation. – М.: , 2010. – 458 с.
  39. Kevin D. Mitnick. The Art of Intrusion. – М.: , 2005. – 270 с.
  40. John H. Mace. The Act of Remembering. – М.: , 2010. – 416 с.
  41. John H. Mace. The Act of Remembering. – М.: , 2010. – 416 с.
  42. Rory Bray. OSSEC Host-Based Intrusion Detection Guide. – М.: , 2010. – 416 с.
  43. Michael Rash. Intrusion Prevention and Active Response. – М.: , 2010. – 550 с.
  44. Syngress. Snort Intrusion Detection 2.0. – М.: , 2010. – 550 с.
  45. Brian Caswell. Snort Intrusion Detection and Prevention Toolkit. – М.: , 2010. – 768 с.
  46. Robert Barnard. Intrusion Detection Systems. – М.: , 2010. – 480 с.
  47. Serap Erincin. Unwarranted Influence – Dwight D. Eisenhower and the Military Industrial Complex. – М.: , 2011. – 270 с.
  48. Terry Escamilla. Intrusion Detection. – М.: , 1998. – 368 с.
  49. Carrie Pitzulo. Unwarranted Influence – Dwight D. Eisenhower and the Military Industrial Complex. – М.: , 2011. – 216 с.
  50. P Rosenau. Post–Modernism & the Social Sciences – Insights, Inroads & Intrusions (Paper). – М.: , 1992. – 0 с.
  51. Ronald W. Shonkwiler, James Herod. Mathematical Biology: An Introduction with Maple and Matlab. – М.: Springer, 2009. – 556 с.
  52. Giuliano Amato. Antitrust and the Bounds of Power. – М.: , 2011. – 154 с.
  53. Paul Stanley. The Law of Confidentiality. – М.: , 2011. – 198 с.
  54. Edited by Stephen Weatherill and Ulf Bernitz. The Role of Regions and Sub-National Actors in Europe. – М.: , 2011. – 180 с.
  55. Edited by Katja S Ziegler. Human Rights and Private Law. – М.: , 2011. – 242 с.
  56. Larry Slater. Successful Investing Advice. – М.: , 2011. – 108 с.
  57. Martin S. Fridson. Unwarranted Intrusions. – М.: , 2006. – 310 с.
  58. Desmond Macnamara. The Book of Intrusions. – М.: , 1994. – 213 с.
  59. Hacking Exposed Malware And Rootkits. – М.: , 2011. – 400 с.
  60. Gray Hat Hacking The Ethical Hackers Handbook, 3Rd Edition. – М.: , 2011. – 720 с.
  61. Fundamentals Of Network Security. – М.: , 2011. – 672 с.
  62. Eoghan Casey. Digital Evidence and Computer Crime. – М.: , . –  с.
  63. Greg Holden. Guide to Firewalls and Network Security: Intrusion Detection and VPNs. – М.: Course Technology, 2003. – 512 с.
  64. Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky. Cisco Security Professional's Guide to Secure Intrusion Detection Systems. – М.: , . –  с.
  65. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . –  с.
  66. Ido Dubrawsky. How to Cheat at Securing Your Network. – М.: Syngress, 2007. – 432 с.
  67. Kevin D. Mitnick. The Art of Intrusion. – М.: , 2005. – 288 с.
  68. Dominique Guillemant. Voyage en France (набор из 66 карточек). – М.: ELI s.r.l., 2009. – 66 с.
  69. Karpin. Perfecting Pregnancy. – М.: , 2014. – 394 с.
  70. Sam Harris. The Moral Landscape. – М.: Black Swan, 2012. – 384 с.
  71. Alaa Afeef,Alaa Sheta and Adnan Al-Rabea. Image Reconstruction of a Manufacturing Process. – М.: LAP Lambert Academic Publishing, 2011. – 100 с.
  72. Anup Bhange and Manmeet Kaur Marhas. Anomaly Detection in Network Traffic; A Statistical Approach. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  73. Vai Yee Hon. Transient Flow Modeling For Reservoir Pressure Estimation. – М.: LAP Lambert Academic Publishing, 2011. – 88 с.
  74. Gulshan Kumar. Effective Intrusion Detection using Genetic Algorithms. – М.: LAP Lambert Academic Publishing, 2014. – 100 с.
  75. Peichung Shih. Facial Analysis in Video: Detection and Recognition. – М.: Scholars Press, 2013. – 176 с.
  76. Tanmoy Hazra. Application of PCA in IDS. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  77. Prem Subedi. Energy & Environmental Change by RETs in Village Tourist Area of Nepal. – М.: LAP Lambert Academic Publishing, 2014. – 56 с.
  78. Yannis Benlachtar. Advanced Performance Monitoring in All-Optical Networks. – М.: LAP Lambert Academic Publishing, 2010. – 232 с.
  79. Shui-cheong Kam. Assessing of Circuit Breaker Restrike Risks Using Computer Simulation. – М.: LAP Lambert Academic Publishing, 2012. – 380 с.
  80. Sampath V.P. FPGA Based Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  81. Waqas Ahmed Rana. GSM Based System Design for Home Automation and Security. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  82. Elez Shenhar and Ilan Shallom. Uniform Non-Intrusive Speech Quality Assessment Model. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  83. Festus T. Ejikemeuwa,Sabestine O. Ejike and Onyinyechi F.A Ofoh. Three Stage Intruder Radio Alert System. – М.: LAP Lambert Academic Publishing, 2013. – 60 с.
  84. Huang-Chun Roan. Network Intrusion Detection Based on Shift-OR Circuit. – М.: LAP Lambert Academic Publishing, 2011. – 60 с.
  85. Ricardo S. Barros. Masonry Structures. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  86. Sajal Kumar Adhikary. Modeling Groundwater Flow and Salinity Intrusion. – М.: LAP Lambert Academic Publishing, 2011. – 148 с.
  87. Yousef Shaheen. Prospect of Water Desalination. – М.: LAP Lambert Academic Publishing, 2014. – 120 с.
  88. Sourav Das and Tuhin Roy. Community Based Disaster Assessment. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.
  89. Dipankar Sarkar and Md. Rezaur Rahman. Storm Surge Risk Assessment under Changing Climate on Bangladesh coast. – М.: LAP Lambert Academic Publishing, 2013. – 88 с.
  90. S.M. Khaledur Rahman. Assessing Suitable Alternatives for Better Livelihood. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  91. Sadia Tasneem and Ir. Md. Nasif Ahsan. Impact of climate change on poverty: Evidence from Bangladesh. – М.: LAP Lambert Academic Publishing, 2014. – 124 с.
  92. M. Sadiq Ali Khan and S. M. Aqil Burney. Recent Trends in Intrusion Detection System & Network Monitoring. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  93. Samuel Abaidoo. The Role of Environmental Ethics in Human-Nature Interaction. – М.: LAP Lambert Academic Publishing, 2009. – 192 с.
  94. Md. Ashiqur Rahman. Local Response to Global Climate Change. – М.: LAP Lambert Academic Publishing, 2010. – 88 с.
  95. Khurram Shahzad. Use and Impact of ICT in Libraries. – М.: LAP Lambert Academic Publishing, 2012. – 140 с.
  96. R. Nithya and S. Barathan. An exploration on the hydration of admixtured special cement sample. – М.: LAP Lambert Academic Publishing, 2013. – 260 с.
  97. Kristen Camp. Miarolitic Pegmatites, New Hampshire. – М.: LAP Lambert Academic Publishing, 2012. – 148 с.
  98. S. Selvam. Groundwater quality in coastal Aquifer. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  99. Esamaldeen Ali. Geology and Structural Evolution around Abidiya area,Sudan. – М.: LAP Lambert Academic Publishing, 2012. – 196 с.
  100. Pierre-Alain Wulser. Uranium metallogeny in the North Flinders Ranges. – М.: LAP Lambert Academic Publishing, 2012. – 256 с.
  101. Mahamadane Diene and Mamadou Gueye. Tectonomagmatic Evolution of Precambrian segment:Mako belt Formations. – М.: LAP Lambert Academic Publishing, 2013. – 64 с.
  102. Shen Liu,Caixia Feng and Shaocong Lai. Ordovician mafic dykes from Qinling Orogenic Belt, China. – М.: LAP Lambert Academic Publishing, 2015. – 60 с.
  103. Alyssa Dausman. VARIABLE-DENSITY FLOW OF GROUNDWATER. – М.: LAP Lambert Academic Publishing, 2009. – 188 с.
  104. Md. Nazrul Islam,Md. Shahidul Islam and M. Nazrul Islam. Environmental Review of Salinity Intrusion of Coastal Bangladesh. – М.: LAP Lambert Academic Publishing, 2013. – 108 с.
  105. Soma Das. Thermal Effect of Intrusive on Coal Seam. – М.: LAP Lambert Academic Publishing, 2012. – 56 с.
  106. Farhat Godhrawala,M.N. Kuttappa and U.S.Krishna Nayak. Orthodontic intrusion - implants Vs utility arches. – М.: LAP Lambert Academic Publishing, 2012. – 52 с.
  107. Remya Ravindran. The Mechanics of Intrusion. – М.: LAP Lambert Academic Publishing, 2013. – 124 с.
  108. Emmanuel Igonor. Geochemical Evaluation of Igneous Intrusive Within Parts of SW Nigeria. – М.: LAP Lambert Academic Publishing, 2013. – 64 с.
  109. Karmanye Thadani,Subhajyoti Banerjee and Achintya Arora. Onslaughts on Free Speech in India by Means of Unwarranted Film Bans. – М.: LAP Lambert Academic Publishing, 2012. – 52 с.
  110. Celia Thornton Corrad. Intrusion on Tomorrow. – М.: LAP Lambert Academic Publishing, 2014. – 168 с.
  111. Abhay Nath Singh. Honeypot Based Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  112. Shahnawaz Husain,S. C. Gupta and R. C. Joshi. Intrusion Detection Engine for Adhoc Environment. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  113. Sumaya Saad Sulaiman and Sarab M. Hameed. A Fuzzy Based Clustering for Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  114. Shubha Puthran and Ketan Shah. Intrusion Detection System using datamining techniques. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  115. Mohammad S. I. Mamun. Intrusion Detection System Architecture in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  116. Heba Fathy Eid. Computational Intelligence in Network Intrusion Detection System. – М.: Scholars' Press, 2014. – 164 с.
  117. Janakiraman S. Distributed Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 164 с.
  118. Yogesh Kumar,Krishan Kumar and Gulshan Kumar. Feature Selection For Intrusion Detection Systems. – М.: LAP Lambert Academic Publishing, 2014. – 100 с.
  119. Xiaodong He. Automated intrusion prevention mechanism in enhancing network security. – М.: Scholars' Press, 2014. – 128 с.
  120. Gulshan Kumar. Effective Intrusion Detection using Feature Selection. – М.: LAP Lambert Academic Publishing, 2014. – 92 с.
  121. Mrutyunjaya Panda and Manas Ranjan Patra. A Data Mining Approach to Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2015. – 216 с.
  122. Ivano Malavolta. A tamper resistant Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2011. – 144 с.
  123. Prashant Kumar Singh and Avimanyou Kumar Vatsa. Taxonomy Based Intrusion Attacks and Detection Scheme in P2P Network. – М.: LAP Lambert Academic Publishing, 2012. – 56 с.
  124. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  125. Shaffali Gupta and Sanmeet Kaur. A GUI Framework for detecting Intrusions using Bro IDS. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  126. Mahmoud Jazzar. Computer Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 240 с.
  127. Siva S. Sivatha Sindhu,S. Geetha and S. Selvakumar. Network Intrusion Detection System using Machine Learning Techniques. – М.: LAP Lambert Academic Publishing, 2013. – 80 с.
  128. Nasim Beigi-Mohammadi. Smart Meter Networks: Intrusion Detection System by Design. – М.: LAP Lambert Academic Publishing, 2014. – 136 с.
  129. Christian Chetachi Umunna. Distributed Intrusion Detection System in Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 104 с.
  130. Iftikhar Ahmad. Feature Subset Selection in Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 220 с.
  131. Jabarweer Singh,Krishan Kumar and Gulshan Kumar. Intrusion detection using artificial intelligence based ensembles. – М.: LAP Lambert Academic Publishing, 2014. – 116 с.
  132. Govind Sreekar Shenoy. Architecture Support for Intrusion Detection systems. – М.: LAP Lambert Academic Publishing, 2014. – 160 с.
  133. Monis Akhlaq,Irfan Awan and Faeiz Alserhani. Improved Performance High Speed Network Intrusion Detection Systems. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  134. Bibi Masoomeh Aslahi Shahri. Intrusion Detection System Using Hybrid Gsa-kmeans. – М.: LAP Lambert Academic Publishing, 2014. – 128 с.
  135. Muna Elsadig Mohamed Ahmed Elsheik. Bio Inspired Intrusion Prevention and Self healing System for Networks. – М.: LAP Lambert Academic Publishing, 2012. – 256 с.
  136. Tigabu Dagne Akal. Constructing Predictive Model for Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 160 с.
  137. Rupali Pathak. Recent Advances In Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  138. Mafaz M. K. Al-Anezi and Najla B. I. Al-Dabagh. Multilayer Artificial Immune Systems for Intrusion & Malware Detection. – М.: LAP Lambert Academic Publishing, 2012. – 148 с.
  139. Alpay Doruk. Security Review Program Requirements for Intrusion Management Systems. – М.: LAP Lambert Academic Publishing, 2010. – 88 с.
  140. Sathish Kumar. Intrusion Detection and Response Techniques for Mobile Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 200 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

Ничего не найдено

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Андрей, 18.05
У меня с работой все хорошо,спасибо!