Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Eric Cole. Wiley Pathways Network Security Fundamentals Project Manual. – М.: , 2008. – 312 с.

Дополнительные результаты

  1. Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с.
  2. Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  3. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с.
  4. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с.
  5. Anna Nagurney, Anna Nugurney. Sustainable Transportation Networks. – М.: , 0. – 0 с.
  6. Hubert Osterle, Elgar Fleisch, Rainer Alt. Business Networking: Shaping Collaboration Between Enterprises. – М.: , 0. – 0 с.
  7. John Attarian. Social Security: False Consciousness and Crisis. – М.: , 0. – 0 с.
  8. Thomas J. Parenty. Digital Defense: What You Should Know About Protecting Your Company's Assets. – М.: , 0. – 0 с.
  9. Barry Slawter. Network Security: Developing and Implementing Effective Enterprise Strategies. – М.: , 0. – 0 с.
  10. Henry Chan, Raymond Lee, Tharam Dillon, Elizabeth Chang, Henry Chan, Raymond Lee, Tharam Dillon. Electronic Commerce: Fundamentals & Applications. – М.: , 0. – 0 с.
  11. Joel Siegel. The International Handbook of Electronic Commerce. – М.: , 0. – 0 с.
  12. Roberta Bragg. MCSE Training Guide (70-220): Windows 2000 Network Security Design, Second Edition. – М.: , 0. – 0 с.
  13. Jae K. Shim, Anique A. Qureshi, Joel G. Siegel, Roberta M. Siegel. The International Handbook of Electronic Commerce. – М.: , 0. – 0 с.
  14. Vesna Hassler. Security Fundamentals for E-Commerce (Artech House Computer Security Series). – М.: , 0. – 0 с.
  15. Thomas Peltier, Thomas Pelitier, Justin Peltier, John A. Blackley, Peltier, Associates. Information Security Fundamentals. – М.: , 0. – 0 с.
  16. George H. Bodnar. Accounting Information Systems (9th Edition). – М.: , 2003. – 0 с.
  17. Peter R., MBA Ramsaroop. Securing Business Intelligence: Knowledge and CyberSecurity in the Post 9/11 World. – М.: , 2004. – 0 с.
  18. Jack T. Marchewka. Information Technology Project Management. – М.: , 2006. – 0 с.
  19. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с.
  20. Rickland Hollar. Enterprise Web Services Security (Internet Series). – М.: , 2005. – 432 с.
  21. Ron Ben Natan. Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase. – М.: , 2005. – 432 с.
  22. Richard M. Hodgetts, Donald F. Kuratko, Margaret Burlingame, Don Gulbrandsen. Wiley Pathways Small Business Management (Wiley Pathways). – М.: , 2007. – 576 с.
  23. Bob Nelson, Peter Economy, Kerry Sommerville, Laura Town. Wiley Pathways Supervision (Wiley Pathways). – М.: , 2007. – 408 с.
  24. Quentin W. Fleming, Joel M. Koppelman. Earned Value Project Management. – М.: , 2006. – 232 с.
  25. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с.
  26. Network Security. – М.: , 2008. – 370 с.
  27. James Michael Stewart, Ed Tittel, Mike Chapple. CISSP: Certified Information Systems Security Professional Study Guide. – М.: , 2008. – 841 с.
  28. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с.
  29. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с.
  30. Daniel Clark. Network Access Control 100 Success Secrets - 100 Most Asked NAC Questions on Implementation and Deployment of unify endpoint security technology, user ... and network security enforcement. – М.: , 2008. – 180 с.
  31. Alexander Hiam. Wiley Pathways Marketing. – М.: , 2006. – 384 с.
  32. Jan De Clercq. Microsoft Windows Security Fundamentals. – М.: , 2010. – 832 с.
  33. Jeff Crume. Inside Internet Security: What Hackers Don't Want You To Know. – М.: , 0. – 0 с.
  34. Bill Ferguson. CompTIA Network+ Review Guide. – М.: , 2009. – 264 с.
  35. Donald N. Lombardi. Wiley Pathways Healthcare Management. – М.: , 2006. – 456 с.
  36. Marty Brounstein. Wiley Pathways Business Communication. – М.: , 2006. – 480 с.
  37. Aidan Chopra. Wiley Pathways Introduction to Google SketchUp. – М.: , 2007. – 480 с.
  38. Steve Suehring. Wiley Pathways Windows Network Administration Project Manual. – М.: , 2007. – 404 с.
  39. Dale Liu. Cisco CCNA/CCENT Exam 640-802, 640-822, 640-816 Preparation Kit. – М.: Syngress, 2009. – 848 с.
  40. Rob Cameron. Juniper(r) Networks Secure Access SSL VPN Configuration Guide. – М.: , 2010. – 656 с.
  41. Owen Poole. Network Security. – М.: , 2010. – 224 с.
  42. James Joshi. Network Security: Know It All. – М.: , 2010. – 368 с.
  43. Steve Manzuik. Network Security Assessment: From Vulnerability to Patch. – М.: , 2010. – 500 с.
  44. Jan L. Harrington. Network Security. – М.: , 2010. – 384 с.
  45. Russ Rogers. Network Security Evaluation Using the NSA IEM. – М.: , 2010. – 450 с.
  46. R M MARSTON. Security Electronics Circuits Manual. – М.: , 2010. – 224 с.
  47. Brien Posey. GFI Network Security and PCI Compliance Power Tools. – М.: , 2010. – 488 с.
  48. Syngress. Managing Cisco Network Security 2E. – М.: , 2010. – 752 с.
  49. Bill English. MCSA/MCSE: Windows® 2000 Network Security Administration Study Guide. – М.: , 2003. – 574 с.
  50. Russ Kaufman. MCSA/MCSE: Windows® Server 2003 Network Security Administration Study Guide. – М.: , 2004. – 560 с.
  51. Evangelos Petroutsos. Wiley Pathways Introduction to Programming using Visual Basic. – М.: , 2007. – 560 с.
  52. Nitesh Dhanjani. Network Security Tools. – М.: , 2005. – 340 с.
  53. Thomas W. Madron. Network Security in the 90?s. – М.: , 1992. – 304 с.
  54. Microsoft. MCSE Training Kit (Exam 70–220) – Designing Microsoft Windows 2000 Network Security. – М.: , 2001. – 864 с.
  55. Marty Brounstein. Wiley Pathways Business Communication. – М.: , 2010. – 0 с.
  56. Andrew Lockhart. Network Security Hacks. – М.: , 2004. – 316 с.
  57. Microsoft Official Academic Course. 98–367: MTA Security Fundamentals. – М.: , 2011. – 192 с.
  58. Evangelos Petroutsos. Wiley Pathways Introduction to Programming using Visual Basics Project Manual. – М.: , 2007. – 288 с.
  59. DAN. Network Security In A Mixed Environment. – М.: , 1998. – 456 с.
  60. Richard M. Hodgetts. Wiley Pathways Small Business Management Microsoft Project Manual. – М.: , 2007. – 0 с.
  61. Bob Nelson. Wiley Pathways Supervision Microsoft Project Manual. – М.: , 2007. – 0 с.
  62. Stanley E. Portny. Wiley Pathways Project Management Microsoft Project Manual. – М.: , 2007. – 0 с.
  63. Bajtelsmit. Wiley Pathways Personal Finance Microsoft Project Manual. – М.: , 2007. – 0 с.
  64. Tom Hopkins. Wiley Pathways Selling Microsoft Project Manual. – М.: , 2007. – 456 с.
  65. TK. Wiley Pathways Compensation and Benefits. – М.: , 2008. – 456 с.
  66. David A. McEntire. Wiley Pathways Disaster Response and Recovery. – М.: , 2006. – 504 с.
  67. Matthew Strebe. Network Security JumpStartTM. – М.: , 2002. – 384 с.
  68. Vickie L. Bajtelsmit. Wiley Pathways Personal Finance. – М.: , 2007. – 528 с.
  69. Stanley E. Portny. Wiley Pathways Project Management. – М.: , 2007. – 480 с.
  70. Tom Hopkins. Wiley Pathways Selling. – М.: , 2007. – 360 с.
  71. Patrick Ciccarelli. Wiley Pathways Networking Basics. – М.: , 2008. – 560 с.
  72. TK. Wiley Pathways Labor Management Relations. – М.: , 2007. – 456 с.
  73. TK. Wiley Pathways Training and Development. – М.: , 2007. – 456 с.
  74. Anna K. Schwab. Wiley Pathways Hazard Mitigation and Preparedness. – М.: , 2006. – 600 с.
  75. Dennis D. Pointer. Wiley Pathways Introduction to U.S. Health Care. – М.: , 2006. – 408 с.
  76. Pawan K Bhardwaj. A+. Network+, Security+ Exams in a Nutshell. – М.: , 2007. – 812 с.
  77. Eric Cole. Network Security Bible. – М.: , 2005. – 694 с.
  78. J WILEY. Wiley ?computer Furniture? Plan And Project (paper Only). – М.: , 1985. – 0 с.
  79. Eric Cole. Wiley Pathways Network Security Fundamentals Project Manual. – М.: , 2008. – 312 с.
  80. Andrew Lockhart. Network Security Hacks 2e. – М.: , 2006. – 352 с.
  81. Chris Mcnab. Network Security Assessment 2e. – М.: , 2007. – 464 с.
  82. Cryptography & Network Security. – М.: , 2007. – 0 с.
  83. Securing Global Transportation Networks. – М.: , 2011. – 312 с.
  84. Comptia Security+ All-In-One Exam Guide, Second Edition (Exam Sy0-201). – М.: , 2011. – 0 с.
  85. Wireless Network Security A Beginners Guide. – М.: , 2011. – 400 с.
  86. Principles Of Computer Security Comptia Security+ And Beyond Lab Manual, Second Edition. – М.: , 2011. – 352 с.
  87. It Security Metrics: A Practical Framework For Measuring Security & Protecting Data. – М.: , 2011. – 396 с.
  88. Network Security: The Complete Reference. – М.: , 2011. – 896 с.
  89. Fundamentals Of Network Security. – М.: , 2011. – 672 с.
  90. Greg Holden. Guide to Firewalls and Network Security: Intrusion Detection and VPNs. – М.: Course Technology, 2003. – 512 с.
  91. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . –  с.
  92. Dave Tyson. Security Convergence: Managing Enterprise Security Risk. – М.: , 2007. – 232 с.
  93. Michael Gregg, Eric Seagren, Angela Orebaugh, Matt Jonkman, Raffael Marty. How to Cheat at Configuring Open Source Security Tools (How to Cheat) (How to Cheat). – М.: , 2007. – 528 с.
  94. Susan Snedaker. Syngress IT Security Project Management Handbook. – М.: Syngress, 2006. – 612 с.
  95. Ido Dubrawsky. How to Cheat at Securing Your Network. – М.: Syngress, 2007. – 432 с.
  96. Shaek Rana Mohammad Baki Billah and Mohammad Hafizur Rahman. Design & Development of Network Security System using IP Tables. – М.: LAP Lambert Academic Publishing, 2013. – 164 с.
  97. Xiangqian Chen. DEFENSE AGAINST NODE COMPROMISE IN SENSOR NETWORK SECURITY. – М.: LAP Lambert Academic Publishing, 2009. – 108 с.
  98. M. Sadiq Ali Khan and S. M. Aqil Burney. Recent Trends in Intrusion Detection System & Network Monitoring. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  99. Sharmin Akter Lima and Md. Mahmudul Hasan Rafee. Pattern Matching With Variable Length Gaps. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  100. Ankur Gupta and Bhupendra Gupta. Random Networks and its Applications. – М.: LAP Lambert Academic Publishing, 2013. – 100 с.
  101. Anil Kumar V. and Prasad E. Dynamic Broadcast Routing With Security Enhancement. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  102. Rudy Deca. Meta-CLI Configuration Model for Network Device Management. – М.: LAP Lambert Academic Publishing, 2010. – 148 с.
  103. Xiaodong He. Automated intrusion prevention mechanism in enhancing network security. – М.: Scholars' Press, 2014. – 128 с.
  104. Syed Zahidur Rashid. Computer Network Security Monitoring. – М.: Scholars' Press, 2015. – 284 с.
  105. Elliot Attipoe. Securing the Public Wireless Network. – М.: LAP Lambert Academic Publishing, 2013. – 92 с.
  106. Mamunur Rashid and Bellal Hossain. WiMAX Security Architecture. – М.: LAP Lambert Academic Publishing, 2014. – 76 с.
  107. Mohammad AlAhmad. Security threats of finger print biometric in network system. – М.: LAP Lambert Academic Publishing, 2014. – 88 с.
  108. Nirbhay Chaubey. Securing AODV Routing Protocol in design of Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2015. – 132 с.
  109. Akinchan Das,Pinaki Satpathy and Banibrata Bag. Effect of Network topology on Routing Protocol's Efficiency. – М.: LAP Lambert Academic Publishing, 2015. – 84 с.
  110. Aditya Kumar. Cryptography and Chaos a New Approach in Network Security. – М.: LAP Lambert Academic Publishing, 2015. – 80 с.
  111. Tamer N. Jarada. IP Telephony Over IUG Network. – М.: LAP Lambert Academic Publishing, 2011. – 88 с.
  112. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  113. Srikanthreddy Arimanda and Manojkumar Kolli. Performance Study Of Security Mechanismsm For Mobile Agent Domain. – М.: LAP Lambert Academic Publishing, 2011. – 84 с.
  114. Vinothkumar Jambulingam. Highly consistent and secured data delivery for mobile ad-hoc networks. – М.: LAP Lambert Academic Publishing, 2014. – 76 с.
  115. Marimuthu Kanagaraj and Eswari Venkatachalam. Multifactor Authentication Protocol for a Secured WSN. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  116. Gurpreet juneja. Security:MPLS VPN Network. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  117. Omid Mahdi Ebadati E.,Harleen Kaur M. Afshar Alam and Kaebeh Yaeghoobi. Micro-Firewalls for Dynamic Network Security Framework. – М.: LAP Lambert Academic Publishing, 2012. – 292 с.
  118. Wisam Elmasry. Securing WBAODV Routing Protocol in MANETs. – М.: LAP Lambert Academic Publishing, 2013. – 100 с.
  119. Adil Adil Nazir Malik. Modeling and Simulation of computer Network Using OPNET. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  120. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  121. Peter Kemei. Framework for Monitoring Hardware Firewall Functionality Using NIDS. – М.: LAP Lambert Academic Publishing, 2013. – 176 с.
  122. Vincent Omollo. Enhanced Network Security. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  123. Firkhan Ali Hamid Ali. Vulnerability Analysis on the Computer Network Security. – М.: LAP Lambert Academic Publishing, 2010. – 72 с.
  124. Sunil Kumar Senapati and Prof. Pabitra Mohan Khilar. SECURING FSR PROTOCOL AGAINST DATA PACKET DROPPING IN MANET. – М.: LAP Lambert Academic Publishing, 2010. – 64 с.
  125. Imran Sohail and Sikandar Hayat. Network Security and DDoS. – М.: LAP Lambert Academic Publishing, 2010. – 64 с.
  126. Christian Chetachi Umunna. Distributed Intrusion Detection System in Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 104 с.
  127. ANNADURAI P and Dr. V. PALANISAMY. Impact of Black Hole Attack on Multicast in Ad hoc Network (IBAMA). – М.: LAP Lambert Academic Publishing, 2011. – 84 с.
  128. Deniz Akkaya and Fabien Thalgott. Honeypots in Network Security. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  129. Kefa Rabah. Mastering Securing ICT Infrastructure for Corporate Network. – М.: LAP Lambert Academic Publishing, 2014. – 360 с.
  130. Zeinab Movahedi. Autonomic Network Management Fundamentals. – М.: LAP Lambert Academic Publishing, 2014. – 140 с.
  131. Muna Elsadig Mohamed Ahmed Elsheik. Bio Inspired Intrusion Prevention and Self healing System for Networks. – М.: LAP Lambert Academic Publishing, 2012. – 256 с.
  132. Mohammad Faisal. Networks Security and Communication. – М.: LAP Lambert Academic Publishing, 2012. – 56 с.
  133. Affan Yasin,Hafiz Adnan Shafiq and Muhammad Ijlal Hasnain. Software Architecture for Centralized Health Database. – М.: LAP Lambert Academic Publishing, 2013. – 64 с.
  134. Edmond K. Machie. Network Attack Traceback And React. – М.: LAP Lambert Academic Publishing, 2013. – 208 с.
  135. Tanveer Zia. A Security Framework for Wireless Sensor Networks (WSN). – М.: LAP Lambert Academic Publishing, 2013. – 160 с.
  136. Dirk Lessner. Network Security for Embedded Systems. – М.: LAP Lambert Academic Publishing, 2009. – 232 с.
  137. Mohamed Nassar. Voice over IP Networks Monitoring. – М.: LAP Lambert Academic Publishing, 2009. – 172 с.
  138. Nathan Darmawan. Shielding Your Company with a Better Network Security Design. – М.: LAP Lambert Academic Publishing, 2010. – 180 с.
  139. Rinaldi Yulius. DESIGN OF A CYBER SECURITY LABORATORY. – М.: LAP Lambert Academic Publishing, 2010. – 140 с.
  140. Prashant Pittalia. Ecommerce Security Real Life Cases And Practical Solutions. – М.: , 2015. – 72 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Профессионал управления проектами. интервью с В. Богдановым, известным как эксперт в области управления проектами испециалистом по Microsoft Project, членом PMI. американской Ассоциации менеджеров проектов. "Управление персоналом", № 24, декабрь 2005.
  2. Основной арсенал "охотника" - его network: кого он знает на рынке и качество этих отношений. С. Плетнева, "Управление персоналом", № 12, июнь 2009.

Образцы работ

Тема и предметТип и объем работы
Порядок разработки, проектирования системы стратегического менеджмента
Менеджмент
Диплом
100 стр.
Проблемы стратегического менеджмента в организации
Менеджмент
Диплом
80 стр.
Платежные системы в Интернете
Информатика
Диплом
102 стр.
Разработка рекомендаций по эффективному использованию зарубежного опыта реализации прогрессивных систем и методов менеджмента на предприятии
Стратегический менеджмент
Диплом
150 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Валерия
Спасибо Вам огромное за помощь, не знаю, что бы я делала.