Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Eric Cole. Wiley Pathways Network Security Fundamentals Project Manual. – М.: , 2008. – 312 с. Дополнительные результаты Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с. Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – М.: , 2012. – 283 с. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с. Anna Nagurney, Anna Nugurney. Sustainable Transportation Networks. – М.: , 0. – 0 с. Hubert Osterle, Elgar Fleisch, Rainer Alt. Business Networking: Shaping Collaboration Between Enterprises. – М.: , 0. – 0 с. John Attarian. Social Security: False Consciousness and Crisis. – М.: , 0. – 0 с. Thomas J. Parenty. Digital Defense: What You Should Know About Protecting Your Company's Assets. – М.: , 0. – 0 с. Barry Slawter. Network Security: Developing and Implementing Effective Enterprise Strategies. – М.: , 0. – 0 с. Henry Chan, Raymond Lee, Tharam Dillon, Elizabeth Chang, Henry Chan, Raymond Lee, Tharam Dillon. Electronic Commerce: Fundamentals & Applications. – М.: , 0. – 0 с. Joel Siegel. The International Handbook of Electronic Commerce. – М.: , 0. – 0 с. Roberta Bragg. MCSE Training Guide (70-220): Windows 2000 Network Security Design, Second Edition. – М.: , 0. – 0 с. Jae K. Shim, Anique A. Qureshi, Joel G. Siegel, Roberta M. Siegel. The International Handbook of Electronic Commerce. – М.: , 0. – 0 с. Vesna Hassler. Security Fundamentals for E-Commerce (Artech House Computer Security Series). – М.: , 0. – 0 с. Thomas Peltier, Thomas Pelitier, Justin Peltier, John A. Blackley, Peltier, Associates. Information Security Fundamentals. – М.: , 0. – 0 с. George H. Bodnar. Accounting Information Systems (9th Edition). – М.: , 2003. – 0 с. Peter R., MBA Ramsaroop. Securing Business Intelligence: Knowledge and CyberSecurity in the Post 9/11 World. – М.: , 2004. – 0 с. Jack T. Marchewka. Information Technology Project Management. – М.: , 2006. – 0 с. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с. Rickland Hollar. Enterprise Web Services Security (Internet Series). – М.: , 2005. – 432 с. Ron Ben Natan. Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase. – М.: , 2005. – 432 с. Richard M. Hodgetts, Donald F. Kuratko, Margaret Burlingame, Don Gulbrandsen. Wiley Pathways Small Business Management (Wiley Pathways). – М.: , 2007. – 576 с. Bob Nelson, Peter Economy, Kerry Sommerville, Laura Town. Wiley Pathways Supervision (Wiley Pathways). – М.: , 2007. – 408 с. Quentin W. Fleming, Joel M. Koppelman. Earned Value Project Management. – М.: , 2006. – 232 с. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с. Network Security. – М.: , 2008. – 370 с. James Michael Stewart, Ed Tittel, Mike Chapple. CISSP: Certified Information Systems Security Professional Study Guide. – М.: , 2008. – 841 с. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с. Daniel Clark. Network Access Control 100 Success Secrets - 100 Most Asked NAC Questions on Implementation and Deployment of unify endpoint security technology, user ... and network security enforcement. – М.: , 2008. – 180 с. Alexander Hiam. Wiley Pathways Marketing. – М.: , 2006. – 384 с. Jan De Clercq. Microsoft Windows Security Fundamentals. – М.: , 2010. – 832 с. Jeff Crume. Inside Internet Security: What Hackers Don't Want You To Know. – М.: , 0. – 0 с. Bill Ferguson. CompTIA Network+ Review Guide. – М.: , 2009. – 264 с. Donald N. Lombardi. Wiley Pathways Healthcare Management. – М.: , 2006. – 456 с. Marty Brounstein. Wiley Pathways Business Communication. – М.: , 2006. – 480 с. Aidan Chopra. Wiley Pathways Introduction to Google SketchUp. – М.: , 2007. – 480 с. Steve Suehring. Wiley Pathways Windows Network Administration Project Manual. – М.: , 2007. – 404 с. Dale Liu. Cisco CCNA/CCENT Exam 640-802, 640-822, 640-816 Preparation Kit. – М.: Syngress, 2009. – 848 с. Rob Cameron. Juniper(r) Networks Secure Access SSL VPN Configuration Guide. – М.: , 2010. – 656 с. Owen Poole. Network Security. – М.: , 2010. – 224 с. James Joshi. Network Security: Know It All. – М.: , 2010. – 368 с. Steve Manzuik. Network Security Assessment: From Vulnerability to Patch. – М.: , 2010. – 500 с. Jan L. Harrington. Network Security. – М.: , 2010. – 384 с. Russ Rogers. Network Security Evaluation Using the NSA IEM. – М.: , 2010. – 450 с. R M MARSTON. Security Electronics Circuits Manual. – М.: , 2010. – 224 с. Brien Posey. GFI Network Security and PCI Compliance Power Tools. – М.: , 2010. – 488 с. Syngress. Managing Cisco Network Security 2E. – М.: , 2010. – 752 с. Bill English. MCSA/MCSE: Windows® 2000 Network Security Administration Study Guide. – М.: , 2003. – 574 с. Russ Kaufman. MCSA/MCSE: Windows® Server 2003 Network Security Administration Study Guide. – М.: , 2004. – 560 с. Evangelos Petroutsos. Wiley Pathways Introduction to Programming using Visual Basic. – М.: , 2007. – 560 с. Nitesh Dhanjani. Network Security Tools. – М.: , 2005. – 340 с. Thomas W. Madron. Network Security in the 90?s. – М.: , 1992. – 304 с. Microsoft. MCSE Training Kit (Exam 70–220) – Designing Microsoft Windows 2000 Network Security. – М.: , 2001. – 864 с. Marty Brounstein. Wiley Pathways Business Communication. – М.: , 2010. – 0 с. Andrew Lockhart. Network Security Hacks. – М.: , 2004. – 316 с. Microsoft Official Academic Course. 98–367: MTA Security Fundamentals. – М.: , 2011. – 192 с. Evangelos Petroutsos. Wiley Pathways Introduction to Programming using Visual Basics Project Manual. – М.: , 2007. – 288 с. DAN. Network Security In A Mixed Environment. – М.: , 1998. – 456 с. Richard M. Hodgetts. Wiley Pathways Small Business Management Microsoft Project Manual. – М.: , 2007. – 0 с. Bob Nelson. Wiley Pathways Supervision Microsoft Project Manual. – М.: , 2007. – 0 с. Stanley E. Portny. Wiley Pathways Project Management Microsoft Project Manual. – М.: , 2007. – 0 с. Bajtelsmit. Wiley Pathways Personal Finance Microsoft Project Manual. – М.: , 2007. – 0 с. Tom Hopkins. Wiley Pathways Selling Microsoft Project Manual. – М.: , 2007. – 456 с. TK. Wiley Pathways Compensation and Benefits. – М.: , 2008. – 456 с. David A. McEntire. Wiley Pathways Disaster Response and Recovery. – М.: , 2006. – 504 с. Matthew Strebe. Network Security JumpStartTM. – М.: , 2002. – 384 с. Vickie L. Bajtelsmit. Wiley Pathways Personal Finance. – М.: , 2007. – 528 с. Stanley E. Portny. Wiley Pathways Project Management. – М.: , 2007. – 480 с. Tom Hopkins. Wiley Pathways Selling. – М.: , 2007. – 360 с. Patrick Ciccarelli. Wiley Pathways Networking Basics. – М.: , 2008. – 560 с. TK. Wiley Pathways Labor Management Relations. – М.: , 2007. – 456 с. TK. Wiley Pathways Training and Development. – М.: , 2007. – 456 с. Anna K. Schwab. Wiley Pathways Hazard Mitigation and Preparedness. – М.: , 2006. – 600 с. Dennis D. Pointer. Wiley Pathways Introduction to U.S. Health Care. – М.: , 2006. – 408 с. Pawan K Bhardwaj. A+. Network+, Security+ Exams in a Nutshell. – М.: , 2007. – 812 с. Eric Cole. Network Security Bible. – М.: , 2005. – 694 с. J WILEY. Wiley ?computer Furniture? Plan And Project (paper Only). – М.: , 1985. – 0 с. Eric Cole. Wiley Pathways Network Security Fundamentals Project Manual. – М.: , 2008. – 312 с. Andrew Lockhart. Network Security Hacks 2e. – М.: , 2006. – 352 с. Chris Mcnab. Network Security Assessment 2e. – М.: , 2007. – 464 с. Cryptography & Network Security. – М.: , 2007. – 0 с. Securing Global Transportation Networks. – М.: , 2011. – 312 с. Comptia Security+ All-In-One Exam Guide, Second Edition (Exam Sy0-201). – М.: , 2011. – 0 с. Wireless Network Security A Beginners Guide. – М.: , 2011. – 400 с. Principles Of Computer Security Comptia Security+ And Beyond Lab Manual, Second Edition. – М.: , 2011. – 352 с. It Security Metrics: A Practical Framework For Measuring Security & Protecting Data. – М.: , 2011. – 396 с. Network Security: The Complete Reference. – М.: , 2011. – 896 с. Fundamentals Of Network Security. – М.: , 2011. – 672 с. Greg Holden. Guide to Firewalls and Network Security: Intrusion Detection and VPNs. – М.: Course Technology, 2003. – 512 с. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . – с. Dave Tyson. Security Convergence: Managing Enterprise Security Risk. – М.: , 2007. – 232 с. Michael Gregg, Eric Seagren, Angela Orebaugh, Matt Jonkman, Raffael Marty. How to Cheat at Configuring Open Source Security Tools (How to Cheat) (How to Cheat). – М.: , 2007. – 528 с. Susan Snedaker. Syngress IT Security Project Management Handbook. – М.: Syngress, 2006. – 612 с. Ido Dubrawsky. How to Cheat at Securing Your Network. – М.: Syngress, 2007. – 432 с. Shaek Rana Mohammad Baki Billah and Mohammad Hafizur Rahman. Design & Development of Network Security System using IP Tables. – М.: LAP Lambert Academic Publishing, 2013. – 164 с. Xiangqian Chen. DEFENSE AGAINST NODE COMPROMISE IN SENSOR NETWORK SECURITY. – М.: LAP Lambert Academic Publishing, 2009. – 108 с. M. Sadiq Ali Khan and S. M. Aqil Burney. Recent Trends in Intrusion Detection System & Network Monitoring. – М.: LAP Lambert Academic Publishing, 2012. – 120 с. Sharmin Akter Lima and Md. Mahmudul Hasan Rafee. Pattern Matching With Variable Length Gaps. – М.: LAP Lambert Academic Publishing, 2012. – 84 с. Ankur Gupta and Bhupendra Gupta. Random Networks and its Applications. – М.: LAP Lambert Academic Publishing, 2013. – 100 с. Anil Kumar V. and Prasad E. Dynamic Broadcast Routing With Security Enhancement. – М.: LAP Lambert Academic Publishing, 2012. – 120 с. Rudy Deca. Meta-CLI Configuration Model for Network Device Management. – М.: LAP Lambert Academic Publishing, 2010. – 148 с. Xiaodong He. Automated intrusion prevention mechanism in enhancing network security. – М.: Scholars' Press, 2014. – 128 с. Syed Zahidur Rashid. Computer Network Security Monitoring. – М.: Scholars' Press, 2015. – 284 с. Elliot Attipoe. Securing the Public Wireless Network. – М.: LAP Lambert Academic Publishing, 2013. – 92 с. Mamunur Rashid and Bellal Hossain. WiMAX Security Architecture. – М.: LAP Lambert Academic Publishing, 2014. – 76 с. Mohammad AlAhmad. Security threats of finger print biometric in network system. – М.: LAP Lambert Academic Publishing, 2014. – 88 с. Nirbhay Chaubey. Securing AODV Routing Protocol in design of Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2015. – 132 с. Akinchan Das,Pinaki Satpathy and Banibrata Bag. Effect of Network topology on Routing Protocol's Efficiency. – М.: LAP Lambert Academic Publishing, 2015. – 84 с. Aditya Kumar. Cryptography and Chaos a New Approach in Network Security. – М.: LAP Lambert Academic Publishing, 2015. – 80 с. Tamer N. Jarada. IP Telephony Over IUG Network. – М.: LAP Lambert Academic Publishing, 2011. – 88 с. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с. Srikanthreddy Arimanda and Manojkumar Kolli. Performance Study Of Security Mechanismsm For Mobile Agent Domain. – М.: LAP Lambert Academic Publishing, 2011. – 84 с. Vinothkumar Jambulingam. Highly consistent and secured data delivery for mobile ad-hoc networks. – М.: LAP Lambert Academic Publishing, 2014. – 76 с. Marimuthu Kanagaraj and Eswari Venkatachalam. Multifactor Authentication Protocol for a Secured WSN. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Gurpreet juneja. Security:MPLS VPN Network. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Omid Mahdi Ebadati E.,Harleen Kaur M. Afshar Alam and Kaebeh Yaeghoobi. Micro-Firewalls for Dynamic Network Security Framework. – М.: LAP Lambert Academic Publishing, 2012. – 292 с. Wisam Elmasry. Securing WBAODV Routing Protocol in MANETs. – М.: LAP Lambert Academic Publishing, 2013. – 100 с. Adil Adil Nazir Malik. Modeling and Simulation of computer Network Using OPNET. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с. Peter Kemei. Framework for Monitoring Hardware Firewall Functionality Using NIDS. – М.: LAP Lambert Academic Publishing, 2013. – 176 с. Vincent Omollo. Enhanced Network Security. – М.: LAP Lambert Academic Publishing, 2013. – 76 с. Firkhan Ali Hamid Ali. Vulnerability Analysis on the Computer Network Security. – М.: LAP Lambert Academic Publishing, 2010. – 72 с. Sunil Kumar Senapati and Prof. Pabitra Mohan Khilar. SECURING FSR PROTOCOL AGAINST DATA PACKET DROPPING IN MANET. – М.: LAP Lambert Academic Publishing, 2010. – 64 с. Imran Sohail and Sikandar Hayat. Network Security and DDoS. – М.: LAP Lambert Academic Publishing, 2010. – 64 с. Christian Chetachi Umunna. Distributed Intrusion Detection System in Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 104 с. ANNADURAI P and Dr. V. PALANISAMY. Impact of Black Hole Attack on Multicast in Ad hoc Network (IBAMA). – М.: LAP Lambert Academic Publishing, 2011. – 84 с. Deniz Akkaya and Fabien Thalgott. Honeypots in Network Security. – М.: LAP Lambert Academic Publishing, 2012. – 64 с. Kefa Rabah. Mastering Securing ICT Infrastructure for Corporate Network. – М.: LAP Lambert Academic Publishing, 2014. – 360 с. Zeinab Movahedi. Autonomic Network Management Fundamentals. – М.: LAP Lambert Academic Publishing, 2014. – 140 с. Muna Elsadig Mohamed Ahmed Elsheik. Bio Inspired Intrusion Prevention and Self healing System for Networks. – М.: LAP Lambert Academic Publishing, 2012. – 256 с. Mohammad Faisal. Networks Security and Communication. – М.: LAP Lambert Academic Publishing, 2012. – 56 с. Affan Yasin,Hafiz Adnan Shafiq and Muhammad Ijlal Hasnain. Software Architecture for Centralized Health Database. – М.: LAP Lambert Academic Publishing, 2013. – 64 с. Edmond K. Machie. Network Attack Traceback And React. – М.: LAP Lambert Academic Publishing, 2013. – 208 с. Tanveer Zia. A Security Framework for Wireless Sensor Networks (WSN). – М.: LAP Lambert Academic Publishing, 2013. – 160 с. Dirk Lessner. Network Security for Embedded Systems. – М.: LAP Lambert Academic Publishing, 2009. – 232 с. Mohamed Nassar. Voice over IP Networks Monitoring. – М.: LAP Lambert Academic Publishing, 2009. – 172 с. Nathan Darmawan. Shielding Your Company with a Better Network Security Design. – М.: LAP Lambert Academic Publishing, 2010. – 180 с. Rinaldi Yulius. DESIGN OF A CYBER SECURITY LABORATORY. – М.: LAP Lambert Academic Publishing, 2010. – 140 с. Prashant Pittalia. Ecommerce Security Real Life Cases And Practical Solutions. – М.: , 2015. – 72 с. Лучшие результаты Ничего не найдено Дополнительные результаты Профессионал управления проектами. интервью с В. Богдановым, известным как эксперт в области управления проектами испециалистом по Microsoft Project, членом PMI. американской Ассоциации менеджеров проектов. "Управление персоналом", № 24, декабрь 2005. Основной арсенал "охотника" - его network: кого он знает на рынке и качество этих отношений. С. Плетнева, "Управление персоналом", № 12, июнь 2009. Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Валерия Спасибо Вам огромное за помощь, не знаю, что бы я делала.