Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Seth Fogie. XSS Attacks. – М.: , 2010. – 480 с. Natarajan Meghanathan,DeShante C. Johnson and Alexander R. Geoghegan. An Analysis of Software Security Attacks and Mitigation Controls. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Jose Fonseca. Evaluating the [In]security of Web Applications. – М.: LAP Lambert Academic Publishing, 2011. – 408 с. Дополнительные результаты Al Ries, Jack Trout. Marketing Warfare. – М.: McGraw-Hill, 1997. – 216 с. David C. Korten. Agenda For A New Economy: From Phantom Wealth to Real Wealth. – М.: , 2012. – 280 с. Victoria A. Greenfield, Henry H. Willis, Tom LaTourrette. Assessing the Benefits of U.S. Customs and Border Protection Regulatory Actions to Reduce Terrorism Risks. – М.: , 2012. – 158 с. Constructive Side-Channel Analysis and Secure Design: Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings ... Computer Science / Security and Cryptology). – М.: , 2012. – 280 с. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 515 с. Smart Card Research and Advanced Applications: 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, ... Computer Science / Security and Cryptology). – М.: , 2012. – 357 с. Anya Schiffrin. Bad News: How America's Business Press Missed The Story Of The Century. – М.: , 2012. – 396 с. Richard Roberts. Wall Street: The Markets, Mechanisms and Players (The Economist Series). – М.: , 0. – 0 с. Gerald L. Curtis. Policymaking in Japan: Defining the Role of Politicians. – М.: , 0. – 0 с. Robert Stanley. Dimensions of Law in the Service of Order: Origins of the Federal Income Tax, 1861-1913. – М.: , 0. – 0 с. Michael Walzer. Just and Unjust Wars: A Moral Argument With Historical Illustrations (Basic Books Classics). – М.: Basic Books, 2000. – 362 с. Garet Garrett, Bruce Ramsey. Salvos Against the New Deal. – М.: , 0. – 0 с. Frederick Cooper, Randall Packard. International Development and the Social Sciences: Essays on the History and Politics of Knowledge. – М.: , 0. – 0 с. David M. Levy. How the Dismal Science Got Its Name : Classical Economics and the Ur-Text of Racial Politics. – М.: , 0. – 0 с. Clyde Woods. Development Arrested: Race, Power and the Blues in the Mississippi Delta. – М.: , 0. – 0 с. Janet Lowe. Jack Welch Speaks: Wisdom from the World's Greatest Business Leader. – М.: Wiley, 2001. – 256 с. Heinz Kurz, Neri Salvadori. The Legacy of Piero Sraffa (Intellectual Legacies in Modern Economics, 9). – М.: , 0. – 0 с. Tony Foster. By-Pass. – М.: , 0. – 0 с. Lani Guinier, Joshua Cohen, Joel Rogers. Who's Qualified? (New Democracy Forum). – М.: , 0. – 0 с. Victor G. Devinatz. High-Tech Betrayal: Working and Organizing on the Shop Floor. – М.: , 0. – 0 с. Stanley Aronowitz. From the Ashes of the Old: American Labor and America's Future. – М.: , 0. – 0 с. Leonard Koren, Peter Goodman, Peter Goodman. Seal the Deal: 130 Surefire Negotiating Strategies. – М.: , 2004. – 0 с. The Developmental State. – М.: Cornell University Press, 1999. – 346 с. John Madeley. A People's World: Alternatives to Economic Globalization (Global Issues S.). – М.: , 0. – 0 с. Guillermo E. Perry, Daniel Lederman. Adjustments After Speculative Attacks in Latin America and Asia: A Tale of Two Regions? (World Bank Latin American and Caribbean Studies. Viewpoints). – М.: , 0. – 0 с. Inter-American Development Bank. Facing Up to Inequality in Latin America. Economic and Social Progress 1998 Report (Serial). – М.: , 0. – 0 с. Rudolph W. Giuliani. Leadership. – М.: Hyperion, 2002. – 408 с. Research and Education Association Staff. Economics Problem Solver (Rea's Problem Solvers). – М.: , 0. – 0 с. Robert Pollin. Contours of Descent: US Economic Fractures and the Landscape of Global Austerity. – М.: , 0. – 0 с. John R. Jr Lott. Are Predatory Commitments Credible?: Who Should the Courts Believe?. – М.: , 0. – 0 с. F. A. Hayek. The Collected Works of F. A. Hayek: Volume 5: Good Money: Part 1: The New World. – М.: University of Chicago Press, 1999. – 268 с. Irene Van Staveren, Irene Van Staveren. Caring for Economics: An Aristotelian Perspective (Economics as Social Theory). – М.: , 0. – 0 с. George S. Tavlas. The Collapse of Exchange Rate Regimes: Causes, Consequences, and Policy Responses (Open Economies Review , No 7:1). – М.: , 0. – 0 с. Steven A. Waller. The Real World of the New Economy. – М.: Writers Club Press, 2001. – 476 с. Michael Perelman. The Pathology of the U.S. Economy: The Costs of a Low-Wage System. – М.: , 0. – 0 с. Marco Marsan, Peter Lloyd. Think Naked: Childlike Brilliance in the Rough Adult World. – М.: , 0. – 0 с. Ira T. Kay. CEO Pay and Shareholder Value: Helping the U.S. Win the Global Economic War. – М.: , 0. – 0 с. Brad Henson. Heart Attack Survivor: A Field Guide. – М.: , 0. – 0 с. Michael P. Dooley, Jeffrey A. Frankel. Managing Currency Crises in Emerging Markets (National Bureau of Economic Research Conference Report). – М.: , 0. – 0 с. Larry Johnson, Bob Phillips. Absolute Honesty: Building a Corporate Culture That Values Straight Talk and Rewards Integrity. – М.: , 0. – 0 с. Jarol B. Manheim. The Death of a Thousand Cuts: Corporate Campaigns and the Attack on the Corporation. – М.: , 0. – 0 с. Thomas J. Donaldson, R. Edward Freeman. Business As a Humanity (The Ruffin Series in Business Ethics). – М.: , 0. – 0 с. Bret Aita. The Rip: True Stories of Stock Brokerage Corruption. – М.: , 0. – 0 с. Mark R. McNeilly. Sun Tzu and the Art of Business: Six Strategic Principles for Managers. – М.: , 0. – 0 с. Roxanne Emmerich. Thank God It's Monday: How to Build a Motivating Workplace. – М.: , 0. – 0 с. Paul Voillis, Paul Viollis. Jane's Workplace Security Handbook. – М.: , 0. – 0 с. Randy J. Paterson Ph.D. The Assertiveness Workbook: How to Express Your Ideas and Stand Up for Yourself at Work and in Relationships. – М.: New Harbinger Publications, 2000. – 200 с. Information Warfare : corporate attack and defence in a digital world (Computer Weekly Professional (Paperback)). – М.: , 0. – 0 с. Eric Dezenhall. Nail 'Em!: Confronting High-Profile Attacks on Celebrities & Businesses. – М.: , 0. – 0 с. Jay Conrad Levinson. Guerrilla Marketing Attack: New Strategies, Tactics, and Weapons for Winning Big Profits for Your Small Business. – М.: Houghton Mifflin Co, 1989. – 208 с. The Economic Impacts of Terrorist Attacks. – М.: , 2006. – 315 с. Ibp Usa. Global Terrorism Attacks Encyclopedic Handbook. – М.: , 2008. – 300 с. Francis T. Cullen. Corporate Crime Under Attack. – М.: , 2010. – 350 с. Graeme D. Ruxton, Thomas N. Sherratt, Michael P. Speed. Avoiding Attack: The Evolutionary Ecology of Crypsis, Warning Signals and Mimicry. – М.: Oxford University Press, 2005. – 260 с. Thomas B. Allen. Shark Attacks: Their Causes and Avoidance. – М.: The Lyons Press, 2001. – 312 с. Zaharina Velikova. A Lattice Attack on the McEliece Public Key Cryptosystem: Lattice Basis Reduction Algorithms in Cryptography. – М.: , 2008. – 132 с. Rob Kraus. Seven Deadliest Microsoft Attacks. – М.: , 2010. – 192 с. Mike Shema. Seven Deadliest Web Application Attacks. – М.: , 2010. – 192 с. Ken Dunham. Mobile Malware Attacks and Defense. – М.: , 2010. – 440 с. Edward Amoroso. Cyber Attacks. – М.: , 2010. – 336 с. Seth Fogie. XSS Attacks. – М.: , 2010. – 480 с. Justin Clarke. SQL Injection Attacks and Defense. – М.: , 2010. – 496 с. Mark Kostich. Beyond Attack. – М.: , 2010. – 96 с. W Lowrie. Attack Upon Christendom (Paper). – М.: , 1992. – 304 с. Richard Af Falkenrath. America?s Achilles? Heel – Nuclear, Biological & Chemical Terrorism & Convert Attack. – М.: , 1998. – 384 с. Gray. Angle of Attack. – М.: , 2007. – 304 с. Ephraim Kam. Surprise Attack – The Victim?s Perspective. – М.: , 2004. – 304 с. Hf Pitkin. Attack of the Blob – Hannah Arendt?s Concept of the Social. – М.: , 2000. – 366 с. Ncta. The 9/11 Commission Report – The Attack from Planning to Aftermath – Shorter Edition. – М.: , 2011. – 0 с. Sam Palatnik. The King in Jeopardy – The Best Techniques for Attack & Defense Rev. – М.: , 1999. – 256 с. Robert P Flood. Speculative Bubbles, Speculative Attacks & Policy Switching. – М.: , 1994. – 506 с. OCMA. Ocma ?elec 4 Underground? Armoured Cable Protected Against Solvent Penet & Corros Attack. – М.: , 1974. – 0 с. John Chirillo. Hack Attacks Encyclopedia. – М.: , 2001. – 960 с. Coombs. Attacking Rural Poverty. – М.: , 1974. – 0 с. Richard Hooker. The Folger Library Edition of The Works of Richard Hooker – Of the Laws of Ecclesiastical Polity Attack & Response V 4. – М.: , 1990. – 332 с. Coombs. Attacking Rural Poverty. – М.: , 1974. – 0 с. A Moghadam. The Globalization of Martyrdom – Al Qaeda, Salafi Jihad, and the Diffusion of Suicide Attacks. – М.: , 2009. – 360 с. National Commis. 9/11 Commission Report – The Full Final Report of the National Commission on Terrorist Attacks Upon the United States (spiral and indexed). – М.: , 2004. – 0 с. John Chirillo. Hack Attacks Denied. – М.: , 2001. – 512 с. John Chirillo. Hack Attacks Revealed. – М.: , 2001. – 960 с. Jr Pusey. Wu Han – Attacking the Present through the Past. – М.: , 1974. – 94 с. Greg Michalowski. Attacking Currency Trends. – М.: , 2011. – 304 с. Bruce Ackerman. Before the Next Attack – Protecting Civil Liberties in an Age of Terrorism. – М.: , 2006. – 224 с. Joseph Scalia. Intimate Violence – Attacks Upon Psychic Interiority. – М.: , 2002. – 176 с. John Chirillo. Hack Attacks Testing. – М.: , 2003. – 560 с. E Kam. Surprise Attack – The Victims Perspective. – М.: , 1988. – 304 с. Richard H. Buskirk. Frontal Attack, Divide and Conquer, The Fait Accompli and 118 Other Tactics Managers Must Know. – М.: , 1989. – 244 с. Joseph Mason. Let My Heart Attack Save Your Life. – М.: , 1998. – 240 с. Mike Gray. Angle of Attack – Harrison Storms & the Race to the Moon. – М.: , 1993. – 304 с. Paul Kligfield. The Cardiac Recovery Handbook – The Complete Guide to Life After Heart Attack or Heart Surgery. – М.: , 2006. – 296 с. Assaf Moghadam. The Globalization of Martyrdom – Al Qaeda, Salafi Jihad, and the Diffusion of Suicide Attacks. – М.: , 2011. – 360 с. Advising the Householder on Protection Against Nuclear Attack. – М.: V&A Publications, 2008. – 24 с. Lesley Thompson. Zombie Attack! Starter. – М.: Oxford University Press, 2013. – 40 с. Subi Khan and R.P. Mahapatra. SQL Injection Attack and Countermeasures. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Saad Idrees. Portable Heart Attack Monitoring System with Dedicated Optical Network. – М.: LAP Lambert Academic Publishing, 2011. – 68 с. Luca Giancane. Side-Channel Attacks and Countermeasures. – М.: LAP Lambert Academic Publishing, 2012. – 172 с. Farukh Bashir. US Attack on Afghanistan and Public Response in Pakistan. – М.: LAP Lambert Academic Publishing, 2012. – 84 с. Sakshi Ojha. Framing Breaking News: The Mumbai Terror Attacks of 2008. – М.: LAP Lambert Academic Publishing, 2010. – 96 с. Dr.M. NEELAMALAR. MEDIA COVERAGE OF 26/11 MUMBAI TERROR ATTACKS:. – М.: LAP Lambert Academic Publishing, 2010. – 184 с. Hafeez-ur- Rahman,M. Ahsan Khan and Mirza Abdul Qayyum. Bt-cotton characters & metrological factors effects on Jassid attack. – М.: LAP Lambert Academic Publishing, 2011. – 96 с. Mohammad Ruhul Amin. Spatial Analysis of Suicide Attack Incidences in Kabul City. – М.: LAP Lambert Academic Publishing, 2012. – 100 с. Bushra Rehman,Mansoor Ahmad Siddiqui and Kavita Parihar. Meloidogyne incognita attacking Chickpea. – М.: LAP Lambert Academic Publishing, 2012. – 136 с. Nyasha Madzokere. Amos'' attack of Affluent Classes:. – М.: LAP Lambert Academic Publishing, 2011. – 68 с. Charlotte Heath-Kelly. What Motivated the Terrorist Attacks of September 11th, 2001?. – М.: LAP Lambert Academic Publishing, 2010. – 76 с. Ayyaswamy Kathirvel,Srinivasan Rengaramanujam and Mohanambal Kathirvel. Prevention of attacks usign umpiring security model for manets. – М.: LAP Lambert Academic Publishing, 2012. – 192 с. Vishal Vora. Implementation and Analysis of Various Attacks on Digital Images. – М.: LAP Lambert Academic Publishing, 2012. – 112 с. Nisarg Gandhewar and Rahila Sheikh. Performance Valuation of AODV Under Sinkhole Attack In MANET Using NS2. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Mohamed Amine Ferrag. Study of Attacks in Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 84 с. Cong Hoan Vu and Adeyinka Soneye. Collaborative Attacks on MANETs. – М.: LAP Lambert Academic Publishing, 2010. – 76 с. Kundan Munjal,Shilpa Verma and Namita Munjal. Cooperative Black Hole Attack Detection by Modifying AODV. – М.: LAP Lambert Academic Publishing, 2012. – 64 с. Ulya Sabeel and Nidhi Chandra. ADLS: Attack Detection & Localization Scheme in WSN. – М.: LAP Lambert Academic Publishing, 2014. – 68 с. Sushant Sudhakar Bahekar and Prashant Panse. Energy Efficient Mechanism for Detection of Wormhole Attacks. – М.: LAP Lambert Academic Publishing, 2014. – 72 с. Ali Modirkhazeni. Mitigation of Passive Wormhole Attack in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2015. – 112 с. Madhav P. Namdev. Phishing Attacks and Detection. – М.: LAP Lambert Academic Publishing, 2015. – 68 с. Amol Zade. A New Cluster Approach for Wormhole Attack Removal in MANET using NS2. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Narayan Ranjan Chakraborty. Analysis of Web security attacks: Bangladesh perspective. – М.: LAP Lambert Academic Publishing, 2012. – 124 с. Anup Parkash Singh Virk. Direct Collaborative Attacks on MANET. – М.: LAP Lambert Academic Publishing, 2012. – 96 с. Prashant Kumar Singh and Avimanyou Kumar Vatsa. Taxonomy Based Intrusion Attacks and Detection Scheme in P2P Network. – М.: LAP Lambert Academic Publishing, 2012. – 56 с. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с. Pallavi Kaliyar and Gagan Singla. A secure routing protocol for MANETs against byzantine attacks. – М.: LAP Lambert Academic Publishing, 2013. – 84 с. E.O. Ibidunmoye and B.K. Alese. Game-Theoretic Analysis of Network Attack-Defense Interactions. – М.: LAP Lambert Academic Publishing, 2013. – 108 с. ANNADURAI P and Dr. V. PALANISAMY. Impact of Black Hole Attack on Multicast in Ad hoc Network (IBAMA). – М.: LAP Lambert Academic Publishing, 2011. – 84 с. Sivaraju Sharmila and U. Mamaheshwari G. Detection Schemes for Selective Forward Attack in WSN. – М.: LAP Lambert Academic Publishing, 2012. – 72 с. Shanmugam Bharathy Dhivya. A Study of Foiling Vehicles from Sybil Attack Using Pseudonyms. – М.: LAP Lambert Academic Publishing, 2012. – 100 с. Natarajan Meghanathan,DeShante C. Johnson and Alexander R. Geoghegan. An Analysis of Software Security Attacks and Mitigation Controls. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Jayeeta Majumder and Gargi Saha. SQL Injection Attacks and possible Remedies. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Samuel Mbuguah and Franklin Wabwoba. Attackability Metrics Model For Secure Service Oriented Architecture. – М.: LAP Lambert Academic Publishing, 2014. – 164 с. Mohammed Firdos Alam Sheikh. Improving Web Security by Blocking SQL Injection Attack(SQLIA). – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Georgiana Lucan. Computer-Based Attacks on Governments. – М.: LAP Lambert Academic Publishing, 2010. – 76 с. Akram Hossain,A. K. M. Zaidi Satter and Shibli Shahriar. Side Channel Attack Prevention. – М.: LAP Lambert Academic Publishing, 2012. – 104 с. Edmond K. Machie. Network Attack Traceback And React. – М.: LAP Lambert Academic Publishing, 2013. – 208 с. Ahmed S. Yesuf. Context-based attack tree modelling for software development. – М.: LAP Lambert Academic Publishing, 2014. – 100 с. Joao Antunes. Network Attack Injection. – М.: Scholars' Press, 2013. – 268 с. Jose Fonseca. Evaluating the [In]security of Web Applications. – М.: LAP Lambert Academic Publishing, 2011. – 408 с. Mohammed Abu Hamada. Client Side Action Against Cross Site Scripting Attacks. – М.: LAP Lambert Academic Publishing, 2013. – 68 с. B. B. Gupta. An Introduction to DDoS Attacks and Defense Mechanisms. – М.: LAP Lambert Academic Publishing, 2011. – 232 с. Rati Mekvabishvili. Self-fulfilling Speculative Attacks and Informational Structure. – М.: LAP Lambert Academic Publishing, 2011. – 60 с. Genevieve Kocienda. What Are the Odds? From Shark Attack to Lightning Strike: Low Intermediate Book with Online Access. – М.: Cambridge Discovery, 2014. – 28 с. Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks. – М.: , . – с.
Лучшие результаты Ничего не найдено Дополнительные результаты Ничего не найдено
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Игорь обе курсовые сдал, спасибо