Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards and Applications (Wireless Networks and Mobile Communications). – М.: , 2008. – 424 с.
  2. Sudesh Kumar. WiMAX Technology:. – М.: LAP Lambert Academic Publishing, 2012. – 100 с.
  3. M. Hossein Ahmadzadegan. Security-Centric Investigation of WiMAX. – М.: LAP Lambert Academic Publishing, 2013. – 104 с.
  4. Hattab Guesmi. High performance IP networks. – М.: LAP Lambert Academic Publishing, 2013. – 104 с.
  5. Mamunur Rashid and Bellal Hossain. WiMAX Security Architecture. – М.: LAP Lambert Academic Publishing, 2014. – 76 с.

Дополнительные результаты

  1. Francis Groves. Corporate Actions - A Concise Guide: An introduction to securities events. – М.: , 2012. – 230 с.
  2. Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с.
  3. Data Privacy Management and Autonomous Spontaneus Security: 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, ... Computer Science / Security and Cryptology). – М.: , 2012. – 334 с.
  4. Wireless Communications and Applications: First International Conference, ICWCA 2011, Sanya, China, August 1-3, 2011, Revised Selected Papers (Lecture ... and Telecommunications Engineering). – М.: , 2012. – 468 с.
  5. Security and Privacy in Mobile Information and Communication Systems: Third International ICST Conference, MOBISEC 2011, Aalborg, Denmark, May 17-19, ... and Telecommunications Engineering). – М.: , 2012. – 195 с.
  6. Constructive Side-Channel Analysis and Secure Design: Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings ... Computer Science / Security and Cryptology). – М.: , 2012. – 280 с.
  7. Public Key Infrastructures, Services and Applications: 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected ... Computer Science / Security and Cryptology). – М.: , 2012. – 219 с.
  8. Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  9. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с.
  10. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с.
  11. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 515 с.
  12. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  13. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с.
  14. Smart Card Research and Advanced Applications: 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, ... Computer Science / Security and Cryptology). – М.: , 2012. – 357 с.
  15. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с.
  16. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с.
  17. Security and Development in Global Politics: A Critical Comparison. – М.: , 2012. – 360 с.
  18. Joseph F. Stenken JD CLU ChFc. Social Security & Medicare Facts 2012. – М.: , 2012. – 451 с.
  19. Luis Lobo-Guerrero. Insuring Security: Biopolitics, security and risk. – М.: , 2012. – 178 с.
  20. CCH Editorial Staff. Social Security Explained 2012. – М.: , 2012. – 298 с.
  21. Terrorism and the Olympics: Major Event Security and Lessons for the Future. – М.: , 2012. – 272 с.
  22. Sheila R Ronis. Economic Security: Neglected Dimension of National Security?. – М.: , 2012. – 128 с.
  23. Denise Garcia. Disarmament Diplomacy and Human Security: Regimes, Norms and Moral Progress in International Relations. – М.: , 2012. – 0 с.
  24. Securities Compliance Index. Securities Compliance Index, Second Edition: A Topical Guide To U.S. Securities Regulation. – М.: , 2012. – 512 с.
  25. American Bar Association, Thomas Lee Hazen. Securities Regulation: Corporate Counsel Guides. – М.: , 2012. – 540 с.
  26. Lionel Martellini, Philippe Priaulet, StA©phane Priaulet. Fixed-Income Securities : Valuation, Risk Management and Portfolio Strategies (The Wiley Finance Series). – М.: , 0. – 0 с.
  27. Jeffrey C. Hooke. Security Analysis on Wall Street. – М.: , 0. – 0 с.
  28. Martin Stone, Spencer Strauss. Secure Your Financial Future Investing in Real Estate. – М.: , 0. – 0 с.
  29. William Rini. Fundamentals of the Securities Industry. – М.: , 0. – 0 с.
  30. Frank J. Fabozzi, John N. Dunlevy, Frank J. Fabozzi, John N. Dunlevy. Real Estate Backed Securities. – М.: , 0. – 0 с.
  31. David F. Teitelbaum. The Procrastinator's Guide to Financial Security: How Anyone Over 40 Can Still Build a Strong Portfolio--and Retire Comfortably. – М.: , 0. – 0 с.
  32. Giorgio S. Questa. Fixed Income Analysis for the Global Financial Market: Money Market, Foreign Exchange, Securities, and Derivatives. – М.: Wiley, 1999. – 368 с.
  33. Bambi Holzer. Retire Rich : The Baby Boomer's Guide to a Secure Future. – М.: , 0. – 0 с.
  34. Peter A. Diamond. Taxation, Incomplete Markets, and Social Security (Munich Lectures). – М.: , 0. – 0 с.
  35. William T. Moore. Real Options and Option-Embedded Securities. – М.: , 0. – 0 с.
  36. Marilyn Greenstein, Todd M. Feinman. Electronic Commerce: Security Risk Management and Control. – М.: , 0. – 0 с.
  37. Kenneth S. Hackel, Joshua Livnat. Cash Flow and Security Analysis. – М.: , 0. – 0 с.
  38. Changmin Chun. Cross-border Transactions of Intermediated Securities: A Comparative Analysis in Substantive Law and Private International Law. – М.: , 2012. – 524 с.
  39. The SAP Architectural Community. SAP Guidelines for Best-Built Applications that Integrate with SAP Business Suite: 2012Spring. – М.: , 2012. – 226 с.
  40. Paul Osterman. Securing Prosperity: The American Labor Market: How It Has Changed and What to Do About It. – М.: , 0. – 0 с.
  41. Neil Fligstein. The Architecture of Markets: An Economic Sociology of Twenty-First-Century Capitalist Societies. – М.: , 0. – 0 с.
  42. Kathryn H. Anthony. Designing for Diversity: Gender, Race, and Ethnicity in the Architectural Profession. – М.: , 0. – 0 с.
  43. Eberhardt Rechtin. Systems Architecting of Organizations: Why Eagles Can't Swim. – М.: , 0. – 0 с.
  44. Jianmin Zhao, Bruce J. Dickson, Chien-Min Zhao. Remaking the Chinese State: Strategies, Society, and Security (Asia's Transformations). – М.: , 0. – 0 с.
  45. Lenore G. Martin. New Frontiers in Middle East Security. – М.: , 0. – 0 с.
  46. Martin S. Feldstein, Horst Siebert. Social Security Pension Reform in Europe. – М.: , 0. – 0 с.
  47. Peter B. Kenen. The International Financial Architecture: What's New? What's Missing. – М.: , 0. – 0 с.
  48. Nancy Birdsall, John Williamson, Brian Deese. Delivering on Debt Relief: From IMF Gold to a New Aid Architecture. – М.: , 0. – 0 с.
  49. Rattan Lal, David Hansen, Norman Uphoff, Steven Slack, Rattan Lal. Food Security and Environmental Quality in the Developing World. – М.: , 0. – 0 с.
  50. Frank J. Fabozzi, Frank J. Fabozzi. Investing In Commercial Mortgage-Backed Securities. – М.: , 0. – 0 с.
  51. Henry J. Bailey, Richard B. Hagedorn. Secured Transactions in a Nutshell Nutshell Series) (4th ed). – М.: , 0. – 0 с.
  52. Douglas Hearth, Janis K. Zaima, Janis Zaima. Contemporary Investments: Security and Portfolio Analysis. – М.: , 0. – 0 с.
  53. Dean Baker, Mark Weisbrot. Social Security: The Phony Crisis. – М.: , 0. – 0 с.
  54. Andrew W. Lo. The Industrial Organization and Regulation of the Securities Industry (National Bureau of Economic Research Conference Report). – М.: , 0. – 0 с.
  55. Sylvester J. Schieber, John B. Shoven. The Real Deal: The History and Future of Social Security. – М.: , 0. – 0 с.
  56. Henry J. Aaron, John B. Shoven, Benjamin M. Friedman, Alvin Hansen Symposium on Public Policy 1998 Harvard University). Should the United States Privatize Social Security? (Alvin Hansen Symposium Series on Public Policy). – М.: , 0. – 0 с.
  57. Julia Lowell, C. R. Neu, Daochi Tong, National Defense Research Institute, National Security Research Institute. Financial Crises and Contagion in Emerging Market Countries. – М.: , 0. – 0 с.
  58. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с.
  59. Joseph S. Nye, William A. Owens, James R. Schlesinger, R. James Woolsey, James A. Lewis, Joseph S., Jr. Nye, James Andrew Lewis, Erin Schlather, Csis Commission on Technology Security in the Twenty-First Century. Computer Exports and National Security: New Tools for a New Century : A Report of the Csis Commission on Technology Security in the 21St-Century (Csis Panel Reports.). – М.: , 0. – 0 с.
  60. Charles Carrington, Timothy Speed, Juanita Ellis, Steffano Korper. Enterprise Directory and Security Implementation Guide: Designing and Implementing Directories in Your Organization (The Korper and Ellis E-Commerce Books Series). – М.: , 0. – 0 с.
  61. INTERNATIONAL CONFERENCE ON URBAN REGENE. The Sustainable City III: Urban Regeneration and Sustainability (Advances in Architecture, 18). – М.: , 2004. – 0 с.
  62. Peter R., MBA Ramsaroop. Securing Business Intelligence: Knowledge and CyberSecurity in the Post 9/11 World. – М.: , 2004. – 0 с.
  63. Jack Ahern, Elizabeth Leduc, Mary Lee York, Landscape Architecture Foundation. Biodiversity Planning and Design: Sustainable Practices. – М.: , 2007. – 136 с.
  64. Committee on Federal Regulation of Securities Committee. The Fund Director's Guidebook: Third Edition (Fund Director's Guidebook). – М.: , 2006. – 128 с.
  65. Eric A. Marks. Service-Oriented Architecture (SOA) Governance for the Services Driven Enterprise. – М.: , 2008. – 330 с.
  66. James Michael Stewart, Ed Tittel, Mike Chapple. CISSP: Certified Information Systems Security Professional Study Guide. – М.: , 2008. – 841 с.
  67. Keith D. Willett. Information Assurance Architecture. – М.: , 2008. – 624 с.
  68. Meridian Securities Market. World Stock Exchange Fact Book. – М.: , 2008. – 0 с.
  69. Timothy M. Virtue. Payment Card Industry Data Security Standard Handbook. – М.: Wiley, 2009. – 224 с.
  70. Yale School Of Architecture. The Human City: Kings Cross: 03: Roger Madelin / Demetri Porphyrios. – М.: W. W. Norton & Company, Inc., 2009. – 192 с.
  71. CompTIA Security+: Certification Kit (комплект из 3 книг + 2 CD-ROM). – М.: Sybex, 2009. – 1440 с.
  72. The SAP Architectural Community. SAP® Guidelines for Best-Built Applications, Spring 2010. – М.: , 2010. – 132 с.
  73. Peter F. Smith. Architecture in a Climate of Change. – М.: Architectural Press, 2008. – 294 с.
  74. Javier Senosiain. Bio-Architecture. – М.: Architectural Press, 2003. – 240 с.
  75. Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards and Applications (Wireless Networks and Mobile Communications). – М.: , 2008. – 424 с.
  76. Dan Forsberg, Gunther Horn, Wolf-Dietrich Moeller, Valtteri Niemi. LTE Security. – М.: John Wiley and Sons, Ltd, 2010. – 304 с.
  77. Ronald L. Krutz. Cloud Security. – М.: , 2010. – 384 с.
  78. A Peter Fawcett. Architecture: Design Notebook. – М.: Architectural Press, 2009. – 118 с.
  79. Peter Szalapaj. CAD Principles for Architectural Design. – М.: Architectural Press, 2001. – 256 с.
  80. Graham Bizley. Architecture in Detail: Volume 2. – М.: Architectural Press, 2010. – 224 с.
  81. Ken Allinson. Architects and Architecture of London. – М.: Architectural Press, 2009. – 448 с.
  82. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с.
  83. Charles Nelson. Managing Quality in Architecture: A Handbook for Creators of the Built Environment. – М.: Architectural Press, 2006. – 338 с.
  84. Architecture Yale School. Future Proofing V 2. – М.: , 2007. – 192 с.
  85. Architecture Yale School Of. Negotiated Terrains. – М.: , 2010. – 144 с.
  86. Sead Muftic. Security Architecture for Open Distributed Systems. – М.: , 1993. – 298 с.
  87. Building Security. – М.: , 2004. – 672 с.
  88. Hacking Exposed Web 2.0: Web 2.0 Security Secrets And Solutions. – М.: , 2011. – 258 с.
  89. Shon Harris. CISSP All-in-One Exam Guide (+ CD-ROM). – М.: McGraw-Hill Companies, 2010. – 1216 с.
  90. Careers In Architecture. – М.: , 2011. – 192 с.
  91. Cissp Practice Exams. – М.: , 2011. – 414 с.
  92. Oracle Fusion Middleware 11G Architecture And Management. – М.: , 2011. – 576 с.
  93. Thomas Porter, Jan Kanclirz Jr. Practical VoIP Security. – М.: Syngress, 2006. – 564 с.
  94. Thomas Porter, Michael Gough. How to Cheat at Voip Security (How to Cheat) (How to Cheat) (How to Cheat). – М.: , 2007. – 432 с.
  95. Christopher Day. Places of the Soul: Architecture and Environmental Design as a Healing Art. – М.: Architectural Press, 2010. – 328 с.
  96. Architectural League of New York, The. Young Architects 13. – М.: , 2012. –  с.
  97. Eduardo Fernandez-Buglioni. Security Patterns in Practice: Designing Secure Architectures Using Software Patterns. – М.: Wiley, 2013. – 582 с.
  98. Eric D. Knapp, Raj Samani. Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure. – М.: Syngress, 2013. – 228 с.
  99. Gina Crandell. Tree Gardens: Architecture and the Forest. – М.: Princeton Architectural Press, 2013. – 166 с.
  100. Sudesh Kumar. WiMAX Technology:. – М.: LAP Lambert Academic Publishing, 2012. – 100 с.
  101. Anand Kannan. Evaluation of the Security Mechanisms in Cloud Networks. – М.: LAP Lambert Academic Publishing, 2013. – 192 с.
  102. Sanjay Chaudhary. OFDM Physical Layer Simulation of IEEE 802.16-2009(Mobile WiMAX). – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  103. M. Hossein Ahmadzadegan. Security-Centric Investigation of WiMAX. – М.: LAP Lambert Academic Publishing, 2013. – 104 с.
  104. SALAH UDDIN,Hussain Arif and Umair Aslam. UMTS/WCDMA AND WiMAX Technologies. – М.: LAP Lambert Academic Publishing, 2010. – 124 с.
  105. Keorapetse Mmoloki Gabatlhaolwe. United Nations Peacebuilding Architecture. – М.: LAP Lambert Academic Publishing, 2013. – 144 с.
  106. Fahmi Ahmed. African Peace & Security Architecture. – М.: LAP Lambert Academic Publishing, 2011. – 96 с.
  107. Patrick Maluki and David Okwomba. Combating New Piracy in the Indian Ocean. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  108. Anthony Amoi. Integrating East Africa. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  109. Reza Mohammad Hossein and Kamran Gholamahmadi. A Combinational Security-Model In Service-Oriented Architecture. – М.: LAP Lambert Academic Publishing, 2014. – 136 с.
  110. Hattab Guesmi. High performance IP networks. – М.: LAP Lambert Academic Publishing, 2013. – 104 с.
  111. Nateq Be-Nazir Ibn Minar. Bluetooth Networking and its Security Architecture. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  112. Wiem Tounsi. Security and Privacy Controls in RFID Systems. – М.: LAP Lambert Academic Publishing, 2014. – 172 с.
  113. Younus Javed and Hassan Tahir. Optimized Security Protocol for Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  114. Lane Thames. Advancing Cyber Security. – М.: LAP Lambert Academic Publishing, 2013. – 256 с.
  115. Mamunur Rashid and Bellal Hossain. WiMAX Security Architecture. – М.: LAP Lambert Academic Publishing, 2014. – 76 с.
  116. kalyani chalamalasetty. Architecture for IMS Security to Mobile:. – М.: LAP Lambert Academic Publishing, 2010. – 60 с.
  117. Faisal Riaz,Muhammad Akram and Rashid Mehmood. WiMAX Cryptographic Suit Up-gradation. – М.: LAP Lambert Academic Publishing, 2010. – 116 с.
  118. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  119. Iman Almomani. Security Solutions for Wireless Mobile Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2011. – 360 с.
  120. Rakesh Jha. Security Issues In AD-HOC And Infrastructure (WLAN) Networks. – М.: LAP Lambert Academic Publishing, 2011. – 124 с.
  121. Irfan Hafeez and Wajahat Nosharwan. WiMAX Wi-Fi Integrated System QoS and Security. – М.: LAP Lambert Academic Publishing, 2011. – 76 с.
  122. Ankush Khere,Mayur Patankar and Klesh Shrirame. Proposed Gateway Architecture for an E-Payment System. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  123. Omid Mahdi Ebadati E.,Harleen Kaur M. Afshar Alam and Kaebeh Yaeghoobi. Micro-Firewalls for Dynamic Network Security Framework. – М.: LAP Lambert Academic Publishing, 2012. – 292 с.
  124. Ayesha Azam Bhatti. Automated Industrial Processes Control Via WIMAX. – М.: LAP Lambert Academic Publishing, 2013. – 116 с.
  125. Tenshi Hara. Towards a reliable Architecture for Crowdsourcing. – М.: LAP Lambert Academic Publishing, 2013. – 300 с.
  126. Vincent Omollo. Enhanced Network Security. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  127. Abdel-Latif Elkouny. Secured Image and Video Stream Across Wireless Networks. – М.: LAP Lambert Academic Publishing, 2011. – 120 с.
  128. Britto R. Kumar and Albert S. Rabara. An Architecture for Secure Mobile Payment System using PKI. – М.: LAP Lambert Academic Publishing, 2013. – 184 с.
  129. Usman Habib. Secure Mobile Authentication for Linux Workstation log on. – М.: LAP Lambert Academic Publishing, 2011. – 120 с.
  130. Kun Ma. Advances in Multi-tenant Architecture. – М.: LAP Lambert Academic Publishing, 2014. – 96 с.
  131. Samuel Mbuguah and Franklin Wabwoba. Attackability Metrics Model For Secure Service Oriented Architecture. – М.: LAP Lambert Academic Publishing, 2014. – 164 с.
  132. Saad Ahmed Khan and Saif Ahmad. Security Implications of Cloud computing. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  133. Mohammad Faisal. Networks Security and Communication. – М.: LAP Lambert Academic Publishing, 2012. – 56 с.
  134. Zhishun Wang and Qifei Lu. A Method for Analyzing Security of SOA-based Systems. – М.: LAP Lambert Academic Publishing, 2011. – 68 с.
  135. Apoorva Kumar Singhal and Mohit Kumar. Security For ARM Based Embedded Systems. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  136. Amos Omamo. The effectiveness of IDPS's in enhancing database security. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  137. Mohammed Faisal. Integrative Framework of Requirement Engineering and Security System. – М.: LAP Lambert Academic Publishing, 2013. – 236 с.
  138. Carlos Grima-Izquierdo. A generic architecture for e-Government and e-Democracy. – М.: LAP Lambert Academic Publishing, 2012. – 316 с.
  139. Kane Bignell. Authentication Strategies for Internet Banking. – М.: LAP Lambert Academic Publishing, 2010. – 164 с.
  140. Vijayan Prasath. Secure Architecture for Web Service Discovery and Retrieval. – М.: LAP Lambert Academic Publishing, 2012. – 116 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

Ничего не найдено

Образцы работ

Тема и предметТип и объем работы
Анализ l ’architecture d ’aujourd ’hui
Журналистика
Реферат
10 стр.
Последствия операции НАТО
Политология
Диплом
80 стр.
Платежные системы в Интернете
Информатика
Диплом
102 стр.
Роль ОБСЕ в урегулировании конфликтов в Европе
Политология
Курсовая работа
33 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Евгения, 03.03
Спасибо вам огромное