Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Joel Lerner. Financial Planning for the Utterly Confused. – М.: , 0. – 0 с.
  2. Jill Andresky Fraser. White Collar Sweatshop: The Deterioration of Work and Its Reward in Corporate America. – М.: , 0. – 0 с.
  3. Dean Baker, Mark Weisbrot. Social Security: The Phony Crisis. – М.: , 0. – 0 с.
  4. Andrew W. Lo. The Industrial Organization and Regulation of the Securities Industry (National Bureau of Economic Research Conference Report). – М.: , 0. – 0 с.
  5. Ann Poe. The McGraw-Hill Handbook of More Business Letters. – М.: , 0. – 0 с.
  6. Alexis Gutzman. Unforeseen Circumstances : Strategies and Technologies for Protecting Your Business and Your People in a Less Secure World. – М.: , 0. – 0 с.
  7. Handbook of Management Information Systems. – М.: , 0. – 0 с.
  8. Dean Baker, Mark Weisbrot, Dean Baker. Social Security: The Phony Crisis. – М.: , 0. – 0 с.
  9. Frank J. Fabozzi. Bond Portfolio Management, 2nd Edition. – М.: , 0. – 0 с.
  10. Seymour Bosworth, Michel E. Kabay. Computer Security Handbook. – М.: , 0. – 0 с.
  11. Ray Ramon. Technology Solutions for Growing Businesses. – М.: , 0. – 0 с.
  12. Christopher G. Pike. Virtual Monopoly: Building an Intellectual Property Strategy for Creative Advantage--From Patents to Trademarks, From Copyrights to Design Rights. – М.: , 0. – 0 с.
  13. E-Business, E-Government Ifip Conference on E-Commerce, Beat Schmid, Katarina Stanoevska-Slabeva, Volker Tschammer. Towards the E-Society. – М.: , 0. – 0 с.
  14. Jesus Mena. Homeland Security Techniques and Technologies (Networking Series). – М.: , 0. – 0 с.
  15. Stanley Bing. 100 Bullshit Jobs...And How to Get Them. – М.: , 2007. – 297 с.
  16. Stephen Schiffman. The 250 Sales Questions To Close The Deal. – М.: , 2005. – 202 с.
  17. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с.
  18. Sustainable Metals Management : Securing Our Future - Steps Towards a Closed Loop Economy (Eco-Efficiency in Industry and Science) (Eco-Efficiency in Industry and Science). – М.: , 2006. – 607 с.
  19. Bill Phillips. The Complete Book of Locks and Locksmithing (Complete Book of Locks & Locksmithing). – М.: , 2005. – 576 с.
  20. Patrick Regan. MCTS 70-643 Exam Cram: Windows Server 2008 Applications Infrastructure, Configuring (Exam Cram). – М.: , 2008. – 480 с.
  21. Allen H. Kupetz. The Future of Less. – М.: , 2008. – 205 с.
  22. Ivanka Menken. Virtualization Architecture, Adoption and Monetization of Virtualization Projects using Best Practice Service Strategy, Service Design, Service Transition, ... and Continual Service Improvement Processes. – М.: , 2008. – 164 с.
  23. David G. Hill. Data Protection: Governance, Risk Management, and Compliance. – М.: , 2009. – 330 с.
  24. Frederic Magoules, Thi-Mai-Huong Nguyen, Lei Yu. Grid Resource Management (Chapman & Hall/Crc Numerical Analy & Scient Comp.). – М.: , 2008. – 336 с.
  25. Jim McBee. Mastering Microsoft Exchange Server 2010. – М.: , 2010. – 984 с.
  26. John Hoopes. Virtualization for Security. – М.: , 2010. – 384 с.
  27. Christa Anderson and Kristin L. Griffin. Windows Server 2008 R2: Remote Desktop Services: Resource Kit (+ CD-ROM). – М.: Microsoft Press, 2010. – 718 с.
  28. Andrew Scobell. Kim Jong Il and North Korea: The Leader and the System. – М.: , 2011. – 202 с.
  29. Citrix Xenapp™ Platinum Edition Advanced Concepts: The Official Guide. – М.: , 2011. – 454 с.
  30. Principles Of Computer Security, Comptia Security+ And Beyond, Second Edition. – М.: , 2011. – 0 с.
  31. Linux Administration: A Beginner'S Guide, Fifth Edition. – М.: , 2011. – 662 с.
  32. Citrix Xenapp Platinum Edition For Windows: The Official Guide. – М.: , 2011. – 576 с.
  33. Microsoft Virtualization With Hyper-V. – М.: , 2011. – 448 с.
  34. Oracle Fusion Middleware 11G Architecture And Management. – М.: , 2011. – 576 с.
  35. How To Do Everything With Adobe Acrobat 8. – М.: , 2011. – 508 с.
  36. Will Schmied, Thomas W. Shinder, Robert J. Shimonski, Tony Piltzecker. MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network. Study Guide and DVD Training System (Exam 70-214). – М.: Syngress, . – 822 с.
  37. David E. Williams. Virtualization with Xen: Including Xenenterprise, Xenserver, and Xenexpress. – М.: Syngress, 2007. – 384 с.
  38. Bruce Dang, Alexandre Gazet, Elias Bachaalany. Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation. – М.: Wiley, 2014. – 384 с.
  39. Bruce Dang, Alexandre Gazet, Elias Bachaalany, Sebastien Josse. Practical Reverse Engineering. – М.: John Wiley and Sons, Ltd, 2014. – 384 с.
  40. Casnocha, Ben, Hoffman, Reid. The Start-up of You. – М.: , 2014. –  с.
  41. Kenneth Nwosu. TWIVES - Tool for Remote Patient Care, Access and Educational Support. – М.: LAP Lambert Academic Publishing, 2012. – 200 с.
  42. Anand Kannan. Evaluation of the Security Mechanisms in Cloud Networks. – М.: LAP Lambert Academic Publishing, 2013. – 192 с.
  43. T. Ambikadevi Amma. Inhibitors of Cloud Computing. – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  44. Indu Sreedevi,Santanu Chaudhury and Asok Bhattacharyya. Smart Camera Networks. – М.: LAP Lambert Academic Publishing, 2012. – 156 с.
  45. Amer Magableh and Mustafa Matalgah. Emerging Diversity Techniques and Their Performance in Fading Channels. – М.: LAP Lambert Academic Publishing, 2012. – 216 с.
  46. V. S. Santhosh Mithra. Virtual Growth of Sweet Potato Crop. – М.: LAP Lambert Academic Publishing, 2012. – 136 с.
  47. Athulasiri Kumara Samarakoon. Cyberspace:Anarchy or Control?. – М.: LAP Lambert Academic Publishing, 2011. – 152 с.
  48. Ajanta De Sarkar and Nandini Mukherjee. Maintaining Performance Guarantee of Applications in Grid Environment. – М.: LAP Lambert Academic Publishing, 2012. – 272 с.
  49. Tomas Bereta. The European Union As A Diplomatic Actor. – М.: LAP Lambert Academic Publishing, 2012. – 212 с.
  50. Dan Sarkar. Examining Privacy Practices of Websites Using Large Scale Data. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  51. Faraz Fatemi Moghaddam. Secure Cloud Computing with Client-Based Control System. – М.: LAP Lambert Academic Publishing, 2013. – 100 с.
  52. RAMARAJ RAVI. AN INNOVATIVE AND TESTED PROVISIONING ALGORITHM FOR VPN. – М.: LAP Lambert Academic Publishing, 2011. – 68 с.
  53. Arun Saha. Secure Protocols for Location, Adjacency, and Identity Verification. – М.: LAP Lambert Academic Publishing, 2011. – 248 с.
  54. Lukman Sharif and Munir Ahmed. IPSec: A Practical Approach. – М.: LAP Lambert Academic Publishing, 2010. – 128 с.
  55. Rakesh Jha. Security Issues In AD-HOC And Infrastructure (WLAN) Networks. – М.: LAP Lambert Academic Publishing, 2011. – 124 с.
  56. Soham Ambiye. How Virtual Private Network benefit SMEs. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  57. Gurpreet juneja. Security:MPLS VPN Network. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  58. Tarek S. Sobh. Effective and Extensive VPN for Securing Web Applications. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  59. Sohail Abbas. A Layered Security Approach for Cooperation Enforcement in MANETs. – М.: LAP Lambert Academic Publishing, 2012. – 280 с.
  60. Ajeet Singh Poonia. Investigation and Prevention of Cyber Crime. – М.: LAP Lambert Academic Publishing, 2014. – 116 с.
  61. RAMARAJ RAVI. AN OPTIMUM RESTORATION ALGORITHM FOR VIRTUAL PRIVATE NETWORKS. – М.: LAP Lambert Academic Publishing, 2011. – 60 с.
  62. Kefa Rabah. Mastering Virtualization Technology for your IT Challenges. – М.: LAP Lambert Academic Publishing, 2011. – 352 с.
  63. Danish Jamil. Designing and Evaluating the honeypots using virtual machine. – М.: LAP Lambert Academic Publishing, 2012. – 164 с.
  64. Sadia Marium. Analysis of the Security threats to Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  65. Kester Quist-Aphetsi. A Novel Cryptographic Key-exchange Algorithm. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  66. Kamrul Hasan. An Investigation into Botnet Detection System. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  67. Georgiana Lucan. Computer-Based Attacks on Governments. – М.: LAP Lambert Academic Publishing, 2010. – 76 с.
  68. Mahyar Modaresi. RFID Road. – М.: LAP Lambert Academic Publishing, 2011. – 64 с.
  69. Andre Meyer. A Framework for Distributed Mobile Multi-Media. – М.: LAP Lambert Academic Publishing, 2009. – 180 с.
  70. Sheriza Hassan-Ali. Extranets: Designing, Planning and Implementation. – М.: LAP Lambert Academic Publishing, 2010. – 92 с.
  71. Shada Al-Salamah. Towards Information Sharing in Virtual Organisations. – М.: LAP Lambert Academic Publishing, 2010. – 312 с.
  72. Alessia Saggese. Behavior Analysis. – М.: LAP Lambert Academic Publishing, 2014. – 216 с.
  73. Khandakar Entenam Unayes Ahmed. IDENTITY AND ACCESS MANAGEMENT IN CLOUD COMPUTING. – М.: LAP Lambert Academic Publishing, 2011. – 172 с.
  74. Majharul Talukder. Virtual Organization. – М.: LAP Lambert Academic Publishing, 2011. – 88 с.
  75. Vincent Osa Aghayere and Walter Idada. Accountability and Transparency in the Nigerian Public Service. – М.: LAP Lambert Academic Publishing, 2013. – 368 с.
  76. Anil Madhavapeddy. Creating High-Performance, Statically Type-Safe Network Applications. – М.: , 2010. – 180 с.
  77. Georgia Weidman. Penetration Testing: A Hands-On Introduction to Hacking. – М.: No Starch Press, 2014. – 528 с.
  78. David Rule. How to Cheat at Configuring VmWare ESX Server. – М.: Syngress, 2007. – 408 с.

Дополнительные результаты

  1. Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с.
  2. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с.
  3. Todd Barnum, Ron Dilley. The 11th Domain: People Skills for Security Management. – М.: , 2012. – 320 с.
  4. John Kampfner. Freedom For Sale: Why the World is Trading Democracy for Security. – М.: , 2012. – 452 с.
  5. Stephen R. Elias. Getting Paid: How to Collect from Bankrupt Debtors (Getting Paid: How to Collect from Bankrupt Debtors). – М.: , 0. – 0 с.
  6. James T. Turner, Michael G. Gelles. Threat Assessment: A Risk Management Approach. – М.: Routledge, 2003. – 212 с.
  7. Chris Harris. Building Innovative Teams: Strategies and Tools for Developing and Integrating High Performance Innovative Groups. – М.: , 0. – 0 с.
  8. Joseph E. Rathjen. Locksmithing. – М.: , 0. – 0 с.
  9. Safety and the Security Professional : A Guide to Occupational Safety and Health Strategies. – М.: , 0. – 0 с.
  10. Philip P. Purpura. The Security Handbook. – М.: , 0. – 0 с.
  11. Fern Lebo. Your Outplacement Handbook: Redesigning Your Career. – М.: , 0. – 0 с.
  12. Lawrence K. Grossman, Newton N. Minow, TCF. Digital Gift to the Nation: Fulfilling the Promise of the Digital and Internet Age. – М.: , 0. – 0 с.
  13. Gavin Cawthra. Securing South Africa's Democracy: Defense, Development and Security in Transition (International Political Economy Series). – М.: , 0. – 0 с.
  14. David Cortright, George A. Lopez, Linda Gerber, International Peace Academy. Sanctions and the Search for Security: Challenges to the UN Action. – М.: , 0. – 0 с.
  15. Roberta Romano. The Advantage of Competitive Federalism for Securities Regulation. – М.: , 0. – 0 с.
  16. Max Boisot. Knowledge Assets: Securing Competitive Advantage in the Information Economy. – М.: , 0. – 0 с.
  17. Max H. Boisot. Knowledge Assets: Securing Competitive Advantage in the Information Economy. – М.: , 0. – 0 с.
  18. Physical Security and the Inspection Process. – М.: , 0. – 0 с.
  19. Encyclopedia of Security Management : Techniques and technology. – М.: , 0. – 0 с.
  20. Ultimate Financial Security Survey. – М.: , 0. – 0 с.
  21. D. J. Williams. The Secrets to Good Credit and Debt Reduction : A Consumer Self Help Guide. – М.: , 0. – 0 с.
  22. Roberta Bragg. MCSE Training Guide (70-220): Windows 2000 Network Security Design, Second Edition. – М.: , 0. – 0 с.
  23. Mostafa Hashem Sherif. Protocols for Secure Electronic Commerce, Second Edition. – М.: , 0. – 0 с.
  24. John R. Vacca. Public Key Infrastructure: Building Trusted Applications and Web Services. – М.: , 0. – 0 с.
  25. Payment Technologies for E-Commerce. – М.: , 2003. – 0 с.
  26. The Security Economy (Safety Standards Series:). – М.: , 2004. – 0 с.
  27. Thomas C. Glaessner. Electronic Safety and Soundness: Securing Finance in a New Age (World Bank Working Papers). – М.: , 2004. – 0 с.
  28. Joseph Johnson. Do's and Don'ts of Fundraising. – М.: , 2004. – 0 с.
  29. Sudhanshu Kairab. A Practical Guide to Security Assessments. – М.: , 2004. – 498 с.
  30. Michel Noel, Zeynep Kantur, Yevgeny Krasnov. Development of Capital Markets and Institutional Investors in Russia: Recent Achievements and Policy Challenges Ahead. – М.: World Bank Publications, 2006. – 152 с.
  31. Scott Watson. The Art of War for Security Managers: 10 Steps to Enhancing Organizational Effectiveness. – М.: , 2007. – 200 с.
  32. Betty E. Biringer, Rudolph V. Matalucci, Sharon L. O'Connor. Security Risk Assessment and Management: A Professional Practice Guide for Protecting Buildings and Infrastructures. – М.: , 2007. – 384 с.
  33. Peterson's Vocational and Technical Schools East. – М.: , 2006. – 579 с.
  34. James B. Rule. Privacy in Peril: How We are Sacrificing a Fundamental Right in Exchange for Security and Convenience. – М.: , 2007. – 256 с.
  35. Environmental Security in Harbors and Coastal Areas: Management Using Comparative Risk Assessment and Multi-Criteria Decision Analysis (NATO Science for ... Security Series C: Envi. – М.: , 2007. – 492 с.
  36. Rachel Bronson. Thicker Than Oil: America's Uneasy Partnership with Saudi Arabia. – М.: , 2008. – 384 с.
  37. Andy Walker. Windows Lockdown!: Your XP and Vista Guide Against Hacks, Attacks, and Other Internet Mayhem (Absolute Beginner's Guide). – М.: , 2008. – 480 с.
  38. Fredrik Nilsson, Communications Axis. Intelligent Network Video: Understanding Modern Video Surveillance Systems. – М.: , 2008. – 440 с.
  39. Ibp Usa. European System for Security and Cooperation Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  40. Craig S. Wright. The IT Regulatory and Standards Compliance Handbook: How to Survive Information Systems Audit and Assessments. – М.: , 2008. – 750 с.
  41. Handbook on Information Technology in Finance (International Handbooks on Information Systems). – М.: , 2008. – 800 с.
  42. Gabor Pusztai. Managing Higher Education: Theory and Applications in Higher Education Reform. – М.: , 2008. – 84 с.
  43. Philipp Caspar Koch. Optimizing Distribution: Systems in Asset Management. – М.: , 2008. – 326 с.
  44. Timothy M. Virtue. Payment Card Industry Data Security Standard Handbook. – М.: Wiley, 2009. – 224 с.
  45. Carl Roper. Risk Management for Security Professionals. – М.: , 2010. – 304 с.
  46. Carl Young. Metrics and Methods for Security Risk Management. – М.: , 2010. – 296 с.
  47. Applied Quantum Cryptography (Lecture Notes in Physics). – М.: , 2010. – 230 с.
  48. David L. Cannon. CISA Certified Information Systems Auditor Study Guide. – М.: John Wiley and Sons, Ltd, 2010. – 704 с.
  49. Jesus Mena. Investigative Data Mining for Security and Criminal Detection. – М.: , 2010. – 272 с.
  50. James C Foster. Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploitsand Tool Coding for Security Professionals. – М.: , 2010. – 700 с.
  51. Tony Flick, Justin Morehouse. Securing the Smart Grid: Next Generation Power Grid Security. – М.: Рид Элсивер, 2011. – 320 с.
  52. John Hoopes. Virtualization for Security. – М.: , 2010. – 384 с.
  53. Editor Dave Kleiman. The Official CHFI: Exam 312-49: Study Guide. – М.: Syngress, 2010. – 964 с.
  54. Jeffrey Lewis. The Minimum Means of Reprisal – China?s Search for Security in the Nuclear Age. – М.: , 2007. – 200 с.
  55. Jeffrey Lewis. The Minimum Means of Reprisal – China?s Search for Security in the Nuclear Age. – М.: , 2007. – 200 с.
  56. Christa Anderson and Kristin L. Griffin. Windows Server 2008 R2: Remote Desktop Services: Resource Kit (+ CD-ROM). – М.: Microsoft Press, 2010. – 718 с.
  57. C Haber. Old Age & the Search for Security – An American Social History. – М.: , 1994. – 212 с.
  58. Mark S. Merkow. Building SET Applications for Secure Transactions. – М.: , 1998. – 416 с.
  59. Bernard Golden. Virtualization For Dummies®. – М.: , 2007. – 384 с.
  60. Andrew J Nathan. The Great Wall & the Empty Fortress – China?s Search for Security (Paper). – М.: , 1998. – 288 с.
  61. Silvia Hagen. iPv6 Essentials. – М.: O'Reilly Media, 2006. – 448 с.
  62. Wolfgang Safran. Saudi Arabia – The Ceaseless Quest for Security. – М.: , 1985. – 592 с.
  63. Citrix Xenapp™ Platinum Edition Advanced Concepts: The Official Guide. – М.: , 2011. – 454 с.
  64. The Complete Book Of Home, Site And Office Security. – М.: , 2011. – 309 с.
  65. Securing Global Transportation Networks. – М.: , 2011. – 312 с.
  66. Hacking Exposed, Sixth Edition. – М.: , 2011. – 720 с.
  67. Wireless Network Security A Beginners Guide. – М.: , 2011. – 400 с.
  68. Oracle Fusion Middleware 11G Architecture And Management. – М.: , 2011. – 576 с.
  69. It Security Metrics: A Practical Framework For Measuring Security & Protecting Data. – М.: , 2011. – 396 с.
  70. Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky. Cisco Security Professional's Guide to Secure Intrusion Detection Systems. – М.: , . –  с.
  71. Frank Thornton. How to Cheat at Deploying & Securing RFID. – М.: Syngress, 2007. – 448 с.
  72. Robert Vitalis. America's Kingdom: Mythmaking on the Saudi Oil Frontier (Stanford Studies in Middle Eastern and Islamic Studies and Cultures). – М.: , 2009. – 416 с.
  73. Tom Bingham. The Rule of Law. – М.: Penguin Books Ltd., 2011. – 224 с.
  74. Stephen Fineman. Work: A Very Short Introduction (Very Short Introductions). – М.: , 2012. – 144 с.
  75. Tom Bingham. The Rule of Law. – М.: Penguin Global, 2011. – 214 с.
  76. Mitchel Hashimoto. Vagrant: Up and Running. – М.: O'Reilly Media, 2013. – 160 с.
  77. Bruce Dang, Alexandre Gazet, Elias Bachaalany. Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation. – М.: Wiley, 2014. – 384 с.
  78. Bruce Dang, Alexandre Gazet, Elias Bachaalany, Sebastien Josse. Practical Reverse Engineering. – М.: John Wiley and Sons, Ltd, 2014. – 384 с.
  79. George S. Oreku. ENHANCING E-COMMERCE SECURITY. – М.: LAP Lambert Academic Publishing, 2011. – 212 с.
  80. Md. Mahmudul Hasan Rafee and Sharmin Akter Lima. Proximity Based Access Control (PBAC). – М.: LAP Lambert Academic Publishing, 2012. – 160 с.
  81. Govind Sharma and Manish Gupta. Secure routing in wireless mobile Ad-Hoc network. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  82. Raffie Arshak. Investigation of Organic Polymer Based Films for Flexible Solar Cells. – М.: LAP Lambert Academic Publishing, 2014. – 148 с.
  83. Abadi Tsegay and Kumudha Raimond. Video processing for Ethiopian sign language translation. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  84. Zahra Kalantari. Adaptation of road drainage structures to climate change. – М.: LAP Lambert Academic Publishing, 2012. – 52 с.
  85. Anand Kannan. Evaluation of the Security Mechanisms in Cloud Networks. – М.: LAP Lambert Academic Publishing, 2013. – 192 с.
  86. James Wafula. Solar Street Lighting in Bossaso- Somalia. – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  87. Jagadish Pal. Power System Static Security Analysis and Control. – М.: LAP Lambert Academic Publishing, 2010. – 160 с.
  88. Jai Parkash,Mr. Ashutosh Gupta and Dr. Pradeep Kumar Rana. SMS based Wireless Temperature monitoring. – М.: LAP Lambert Academic Publishing, 2010. – 100 с.
  89. Ronan O'Driscoll. Internet Controlled Security Robot. – М.: LAP Lambert Academic Publishing, 2014. – 52 с.
  90. Kosuru Trinadhachari. A Real World system for Motion Detection and Tracking. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  91. Ubaid Ur Rahman and Farhana Shahid. RFID Based Library Management System. – М.: LAP Lambert Academic Publishing, 2013. – 108 с.
  92. Asad Ali,M. Afzal and Ali Amjad. Home Automation Using Touch Screen. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  93. Zeeshan Ahmad. Remote Monitoring System. – М.: LAP Lambert Academic Publishing, 2011. – 64 с.
  94. Mahdiyeh Eslami,Hussain Shareef and Azah Mohamed. Design and Placement of Power System Stabilizer. – М.: LAP Lambert Academic Publishing, 2012. – 152 с.
  95. Andrew Gilbert Were. Rising to Urban Opportunities. – М.: LAP Lambert Academic Publishing, 2012. – 152 с.
  96. Tonia Rifaey. Child Labour in Old Cairo and the Roles Children Negotiate. – М.: LAP Lambert Academic Publishing, 2009. – 304 с.
  97. Amma Naningrum. Standardization Metadata Schema for Securing Interoperability. – М.: LAP Lambert Academic Publishing, 2012. – 112 с.
  98. Yuxuan Nie. Re-examining the Causes of Corporate Securities Fraud. – М.: LAP Lambert Academic Publishing, 2010. – 196 с.
  99. Saima Afzal. Non-Traditional Security Threats to Pakistan Post 9/11. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  100. Clare Mackay. SELLING LONDON’S OLYMPIC BID. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  101. ALI RAZA MOOSVI. TERRORISM. – М.: LAP Lambert Academic Publishing, 2010. – 88 с.
  102. Adriana Marais. Security and Entanglement in Quantum Key Distribution. – М.: LAP Lambert Academic Publishing, 2010. – 108 с.
  103. Veronica Fernandez-Marmol. Quantum Cryptography at High Speed. – М.: LAP Lambert Academic Publishing, 2010. – 240 с.
  104. Sushama Bhamare,Shashi Sonawane and Hemant Patel. PGR's Effect on Mango. – М.: LAP Lambert Academic Publishing, 2014. – 96 с.
  105. P.A. Pagar,R.K. Mathukia and M.K. Khistaria. Summer Sesame Response to Irrigation and Fertilizer. – М.: LAP Lambert Academic Publishing, 2014. – 116 с.
  106. Md. Shafiqul Islam. Present Status of Homestead Nursery of CARE-LIFT Project. – М.: LAP Lambert Academic Publishing, 2012. – 72 с.
  107. Gintaras Kavarskas. Security in the United Kingdom and the United States of America. – М.: LAP Lambert Academic Publishing, 2014. – 104 с.
  108. Rakesh Kumar. Human Security and Civil Society. – М.: LAP Lambert Academic Publishing, 2014. – 220 с.
  109. Sandeep Kr. Agarwal and Dr. K. V. Arya. Security in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  110. Prathap Jonnadula and Naga Mani Darajula. Secure Group Communication. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  111. Mohammed azharuddin Adhoni. Secure communication in p2p networks. – М.: LAP Lambert Academic Publishing, 2012. – 124 с.
  112. Niroj Kumar Pani and Dr. Ashok Kumar Turuk. A Hybrid Zone-Based Routing Protocol for Secure Communication in MANET. – М.: LAP Lambert Academic Publishing, 2010. – 92 с.
  113. Munnujahan Ara. Reliable and Secure Wireless Communications Systems. – М.: Scholars' Press, 2014. – 140 с.
  114. Albert Wasef. Managing and Complementing PKI for Securing Vehicular Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2011. – 204 с.
  115. Rakesh Jha. Security Issues In AD-HOC And Infrastructure (WLAN) Networks. – М.: LAP Lambert Academic Publishing, 2011. – 124 с.
  116. R. Baskaran,M. S. Saleem Basha and A. Balasubramanian. Two Tier Security Framework for Service Oriented Systems. – М.: LAP Lambert Academic Publishing, 2012. – 176 с.
  117. Tarek S. Sobh. Effective and Extensive VPN for Securing Web Applications. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  118. Seyed Mohamed Buhari. Optimizing access control lists Search for IP packet filtering. – М.: LAP Lambert Academic Publishing, 2012. – 300 с.
  119. Dimitrios Baltazis. Dynamic Authorizations for Secure Internet Applications. – М.: LAP Lambert Academic Publishing, 2012. – 152 с.
  120. Britto R. Kumar and Albert S. Rabara. An Architecture for Secure Mobile Payment System using PKI. – М.: LAP Lambert Academic Publishing, 2013. – 184 с.
  121. Usman Habib. Secure Mobile Authentication for Linux Workstation log on. – М.: LAP Lambert Academic Publishing, 2011. – 120 с.
  122. D. Maheswari Maheshlenin and V. Radha. Compound Image Segmentation and Compression for Secure Transmission. – М.: LAP Lambert Academic Publishing, 2012. – 240 с.
  123. Udai Pratap Rao,Dhiren R. Patel and Vidhya Goutham Guntaka. SVD Based Database Watermarking for Security in Database. – М.: LAP Lambert Academic Publishing, 2011. – 56 с.
  124. Roopesh Kumar. Steganography :A Technique for Information Hiding in Mobile. – М.: LAP Lambert Academic Publishing, 2014. – 76 с.
  125. Hammad Kazmi. Security and Privacy issues in Near Field Communication (NFC) Systems. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  126. Sudipta Dey. Development Of A Secured Object Oriented Model Of E-learning System. – М.: LAP Lambert Academic Publishing, 2012. – 264 с.
  127. Sadia Marium. Analysis of the Security threats to Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  128. Kester Quist-Aphetsi. A Novel Cryptographic Key-exchange Algorithm. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  129. Khalil Zebbiche. Digital Watermarking For Securing Fingerprint Data. – М.: LAP Lambert Academic Publishing, 2012. – 156 с.
  130. Moawiah Assali,Jihad Bisoomi and Iyad Tumar. New Scheme in Security Policies. – М.: LAP Lambert Academic Publishing, 2014. – 72 с.
  131. Zhishun Wang and Qifei Lu. A Method for Analyzing Security of SOA-based Systems. – М.: LAP Lambert Academic Publishing, 2011. – 68 с.
  132. Milan Senesi. Web systems security testing. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  133. Adebayo Omotosho and Justice Emuoyibofarhe. Development of a Secure Intelligent Electronic Prescription System. – М.: LAP Lambert Academic Publishing, 2012. – 156 с.
  134. Burcu Kulahc?oglu. Timed Automata as a Verification Tool for Security Protocols. – М.: LAP Lambert Academic Publishing, 2011. – 104 с.
  135. Alessia Saggese. Behavior Analysis. – М.: LAP Lambert Academic Publishing, 2014. – 216 с.
  136. Haneen Qarabash. An Intranet Based System For Securities Trading. – М.: LAP Lambert Academic Publishing, 2013. – 84 с.
  137. Abdul Rahman and Muhammad Zia-ur-Rehman. Why Brand Loyalty is so important for successful business companies?. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  138. Manojkumar Shastri. Right to Education & Basic Needs for Human Reference to Vedas. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  139. S. V. S. Kishore Kumar. Information Systems Audit And Security In Banking. – М.: LAP Lambert Academic Publishing, 2013. – 476 с.
  140. David Rule. How to Cheat at Configuring VmWare ESX Server. – М.: Syngress, 2007. – 408 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Мы можем управлять собственными мыслями. интервью с С. Харитоновым, врачом-психотерапевтом, психиатором, кандидатом медицинских наук, старшим научным сотрудником Московского НИИ психиатрии Росздрава РФ, членом-корреспондентом Международной академии наук. МАНЭБ, членом Британского общества когнитивных и поведенческих психотерапевтов. Membership British Association for Behavioural & Cognitive Psychoterapies / BABCP. Ф. Кульпин, "Управление персоналом", N 8, апрель 2011 г.
  2. Зачетная реструктуризация долга: институт DEBT-FOR-EQUITY SWAP в России". интервью с М. Григорьевым, старшим юристом корпоративной практики юридической фирмы "Вегас-Лекс". О. Бодрягина, "эж-ЮРИСТ", № 3, январь 2010.
  3. Управление проектами при подборе персонала. PM for HR. Е. Кривов, "Кадровик. Рекрутинг для кадровика", № 9, сентябрь 2008.

Образцы работ

Тема и предметТип и объем работы
Особенности виртуального общения
Психология
Курсовая работа
28 стр.
Разработка нового товара в маркетинге
Маркетинг
Курсовая работа
40 стр.
Последствия операции НАТО
Политология
Диплом
80 стр.
Формирование системы экономической безопасности на Белоярской АЭС
Психофизиология
Диплом
96 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Елена, 25.02
Огромнейшее преогромнейшее Вам спасибо! Защитилась на 5! :)