Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Seth Fogie. XSS Attacks. – М.: , 2010. – 480 с.
  2. Natarajan Meghanathan,DeShante C. Johnson and Alexander R. Geoghegan. An Analysis of Software Security Attacks and Mitigation Controls. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  3. Jose Fonseca. Evaluating the [In]security of Web Applications. – М.: LAP Lambert Academic Publishing, 2011. – 408 с.

Дополнительные результаты

  1. Al Ries, Jack Trout. Marketing Warfare. – М.: McGraw-Hill, 1997. – 216 с.
  2. David C. Korten. Agenda For A New Economy: From Phantom Wealth to Real Wealth. – М.: , 2012. – 280 с.
  3. Victoria A. Greenfield, Henry H. Willis, Tom LaTourrette. Assessing the Benefits of U.S. Customs and Border Protection Regulatory Actions to Reduce Terrorism Risks. – М.: , 2012. – 158 с.
  4. Constructive Side-Channel Analysis and Secure Design: Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings ... Computer Science / Security and Cryptology). – М.: , 2012. – 280 с.
  5. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с.
  6. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 515 с.
  7. Smart Card Research and Advanced Applications: 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, ... Computer Science / Security and Cryptology). – М.: , 2012. – 357 с.
  8. Anya Schiffrin. Bad News: How America's Business Press Missed The Story Of The Century. – М.: , 2012. – 396 с.
  9. Richard Roberts. Wall Street: The Markets, Mechanisms and Players (The Economist Series). – М.: , 0. – 0 с.
  10. Gerald L. Curtis. Policymaking in Japan: Defining the Role of Politicians. – М.: , 0. – 0 с.
  11. Robert Stanley. Dimensions of Law in the Service of Order: Origins of the Federal Income Tax, 1861-1913. – М.: , 0. – 0 с.
  12. Michael Walzer. Just and Unjust Wars: A Moral Argument With Historical Illustrations (Basic Books Classics). – М.: Basic Books, 2000. – 362 с.
  13. Garet Garrett, Bruce Ramsey. Salvos Against the New Deal. – М.: , 0. – 0 с.
  14. Frederick Cooper, Randall Packard. International Development and the Social Sciences: Essays on the History and Politics of Knowledge. – М.: , 0. – 0 с.
  15. David M. Levy. How the Dismal Science Got Its Name : Classical Economics and the Ur-Text of Racial Politics. – М.: , 0. – 0 с.
  16. Clyde Woods. Development Arrested: Race, Power and the Blues in the Mississippi Delta. – М.: , 0. – 0 с.
  17. Janet Lowe. Jack Welch Speaks: Wisdom from the World's Greatest Business Leader. – М.: Wiley, 2001. – 256 с.
  18. Heinz Kurz, Neri Salvadori. The Legacy of Piero Sraffa (Intellectual Legacies in Modern Economics, 9). – М.: , 0. – 0 с.
  19. Tony Foster. By-Pass. – М.: , 0. – 0 с.
  20. Lani Guinier, Joshua Cohen, Joel Rogers. Who's Qualified? (New Democracy Forum). – М.: , 0. – 0 с.
  21. Victor G. Devinatz. High-Tech Betrayal: Working and Organizing on the Shop Floor. – М.: , 0. – 0 с.
  22. Stanley Aronowitz. From the Ashes of the Old: American Labor and America's Future. – М.: , 0. – 0 с.
  23. Leonard Koren, Peter Goodman, Peter Goodman. Seal the Deal: 130 Surefire Negotiating Strategies. – М.: , 2004. – 0 с.
  24. The Developmental State. – М.: Cornell University Press, 1999. – 346 с.
  25. John Madeley. A People's World: Alternatives to Economic Globalization (Global Issues S.). – М.: , 0. – 0 с.
  26. Guillermo E. Perry, Daniel Lederman. Adjustments After Speculative Attacks in Latin America and Asia: A Tale of Two Regions? (World Bank Latin American and Caribbean Studies. Viewpoints). – М.: , 0. – 0 с.
  27. Inter-American Development Bank. Facing Up to Inequality in Latin America. Economic and Social Progress 1998 Report (Serial). – М.: , 0. – 0 с.
  28. Rudolph W. Giuliani. Leadership. – М.: Hyperion, 2002. – 408 с.
  29. Research and Education Association Staff. Economics Problem Solver (Rea's Problem Solvers). – М.: , 0. – 0 с.
  30. Robert Pollin. Contours of Descent: US Economic Fractures and the Landscape of Global Austerity. – М.: , 0. – 0 с.
  31. John R. Jr Lott. Are Predatory Commitments Credible?: Who Should the Courts Believe?. – М.: , 0. – 0 с.
  32. F. A. Hayek. The Collected Works of F. A. Hayek: Volume 5: Good Money: Part 1: The New World. – М.: University of Chicago Press, 1999. – 268 с.
  33. Irene Van Staveren, Irene Van Staveren. Caring for Economics: An Aristotelian Perspective (Economics as Social Theory). – М.: , 0. – 0 с.
  34. George S. Tavlas. The Collapse of Exchange Rate Regimes: Causes, Consequences, and Policy Responses (Open Economies Review , No 7:1). – М.: , 0. – 0 с.
  35. Steven A. Waller. The Real World of the New Economy. – М.: Writers Club Press, 2001. – 476 с.
  36. Michael Perelman. The Pathology of the U.S. Economy: The Costs of a Low-Wage System. – М.: , 0. – 0 с.
  37. Marco Marsan, Peter Lloyd. Think Naked: Childlike Brilliance in the Rough Adult World. – М.: , 0. – 0 с.
  38. Ira T. Kay. CEO Pay and Shareholder Value: Helping the U.S. Win the Global Economic War. – М.: , 0. – 0 с.
  39. Brad Henson. Heart Attack Survivor: A Field Guide. – М.: , 0. – 0 с.
  40. Michael P. Dooley, Jeffrey A. Frankel. Managing Currency Crises in Emerging Markets (National Bureau of Economic Research Conference Report). – М.: , 0. – 0 с.
  41. Larry Johnson, Bob Phillips. Absolute Honesty: Building a Corporate Culture That Values Straight Talk and Rewards Integrity. – М.: , 0. – 0 с.
  42. Jarol B. Manheim. The Death of a Thousand Cuts: Corporate Campaigns and the Attack on the Corporation. – М.: , 0. – 0 с.
  43. Thomas J. Donaldson, R. Edward Freeman. Business As a Humanity (The Ruffin Series in Business Ethics). – М.: , 0. – 0 с.
  44. Bret Aita. The Rip: True Stories of Stock Brokerage Corruption. – М.: , 0. – 0 с.
  45. Mark R. McNeilly. Sun Tzu and the Art of Business: Six Strategic Principles for Managers. – М.: , 0. – 0 с.
  46. Roxanne Emmerich. Thank God It's Monday: How to Build a Motivating Workplace. – М.: , 0. – 0 с.
  47. Paul Voillis, Paul Viollis. Jane's Workplace Security Handbook. – М.: , 0. – 0 с.
  48. Randy J. Paterson Ph.D. The Assertiveness Workbook: How to Express Your Ideas and Stand Up for Yourself at Work and in Relationships. – М.: New Harbinger Publications, 2000. – 200 с.
  49. Information Warfare : corporate attack and defence in a digital world (Computer Weekly Professional (Paperback)). – М.: , 0. – 0 с.
  50. Eric Dezenhall. Nail 'Em!: Confronting High-Profile Attacks on Celebrities & Businesses. – М.: , 0. – 0 с.
  51. Jay Conrad Levinson. Guerrilla Marketing Attack: New Strategies, Tactics, and Weapons for Winning Big Profits for Your Small Business. – М.: Houghton Mifflin Co, 1989. – 208 с.
  52. The Economic Impacts of Terrorist Attacks. – М.: , 2006. – 315 с.
  53. Ibp Usa. Global Terrorism Attacks Encyclopedic Handbook. – М.: , 2008. – 300 с.
  54. Francis T. Cullen. Corporate Crime Under Attack. – М.: , 2010. – 350 с.
  55. Graeme D. Ruxton, Thomas N. Sherratt, Michael P. Speed. Avoiding Attack: The Evolutionary Ecology of Crypsis, Warning Signals and Mimicry. – М.: Oxford University Press, 2005. – 260 с.
  56. Thomas B. Allen. Shark Attacks: Their Causes and Avoidance. – М.: The Lyons Press, 2001. – 312 с.
  57. Zaharina Velikova. A Lattice Attack on the McEliece Public Key Cryptosystem: Lattice Basis Reduction Algorithms in Cryptography. – М.: , 2008. – 132 с.
  58. Rob Kraus. Seven Deadliest Microsoft Attacks. – М.: , 2010. – 192 с.
  59. Mike Shema. Seven Deadliest Web Application Attacks. – М.: , 2010. – 192 с.
  60. Ken Dunham. Mobile Malware Attacks and Defense. – М.: , 2010. – 440 с.
  61. Edward Amoroso. Cyber Attacks. – М.: , 2010. – 336 с.
  62. Seth Fogie. XSS Attacks. – М.: , 2010. – 480 с.
  63. Justin Clarke. SQL Injection Attacks and Defense. – М.: , 2010. – 496 с.
  64. Mark Kostich. Beyond Attack. – М.: , 2010. – 96 с.
  65. W Lowrie. Attack Upon Christendom (Paper). – М.: , 1992. – 304 с.
  66. Richard Af Falkenrath. America?s Achilles? Heel – Nuclear, Biological & Chemical Terrorism & Convert Attack. – М.: , 1998. – 384 с.
  67. Gray. Angle of Attack. – М.: , 2007. – 304 с.
  68. Ephraim Kam. Surprise Attack – The Victim?s Perspective. – М.: , 2004. – 304 с.
  69. Hf Pitkin. Attack of the Blob – Hannah Arendt?s Concept of the Social. – М.: , 2000. – 366 с.
  70. Ncta. The 9/11 Commission Report – The Attack from Planning to Aftermath – Shorter Edition. – М.: , 2011. – 0 с.
  71. Sam Palatnik. The King in Jeopardy – The Best Techniques for Attack & Defense Rev. – М.: , 1999. – 256 с.
  72. Robert P Flood. Speculative Bubbles, Speculative Attacks & Policy Switching. – М.: , 1994. – 506 с.
  73. OCMA. Ocma ?elec 4 Underground? Armoured Cable Protected Against Solvent Penet & Corros Attack. – М.: , 1974. – 0 с.
  74. John Chirillo. Hack Attacks Encyclopedia. – М.: , 2001. – 960 с.
  75. Coombs. Attacking Rural Poverty. – М.: , 1974. – 0 с.
  76. Richard Hooker. The Folger Library Edition of The Works of Richard Hooker – Of the Laws of Ecclesiastical Polity Attack & Response V 4. – М.: , 1990. – 332 с.
  77. Coombs. Attacking Rural Poverty. – М.: , 1974. – 0 с.
  78. A Moghadam. The Globalization of Martyrdom – Al Qaeda, Salafi Jihad, and the Diffusion of Suicide Attacks. – М.: , 2009. – 360 с.
  79. National Commis. 9/11 Commission Report – The Full Final Report of the National Commission on Terrorist Attacks Upon the United States (spiral and indexed). – М.: , 2004. – 0 с.
  80. John Chirillo. Hack Attacks Denied. – М.: , 2001. – 512 с.
  81. John Chirillo. Hack Attacks Revealed. – М.: , 2001. – 960 с.
  82. Jr Pusey. Wu Han – Attacking the Present through the Past. – М.: , 1974. – 94 с.
  83. Greg Michalowski. Attacking Currency Trends. – М.: , 2011. – 304 с.
  84. Bruce Ackerman. Before the Next Attack – Protecting Civil Liberties in an Age of Terrorism. – М.: , 2006. – 224 с.
  85. Joseph Scalia. Intimate Violence – Attacks Upon Psychic Interiority. – М.: , 2002. – 176 с.
  86. John Chirillo. Hack Attacks Testing. – М.: , 2003. – 560 с.
  87. E Kam. Surprise Attack – The Victims Perspective. – М.: , 1988. – 304 с.
  88. Richard H. Buskirk. Frontal Attack, Divide and Conquer, The Fait Accompli and 118 Other Tactics Managers Must Know. – М.: , 1989. – 244 с.
  89. Joseph Mason. Let My Heart Attack Save Your Life. – М.: , 1998. – 240 с.
  90. Mike Gray. Angle of Attack – Harrison Storms & the Race to the Moon. – М.: , 1993. – 304 с.
  91. Paul Kligfield. The Cardiac Recovery Handbook – The Complete Guide to Life After Heart Attack or Heart Surgery. – М.: , 2006. – 296 с.
  92. Assaf Moghadam. The Globalization of Martyrdom – Al Qaeda, Salafi Jihad, and the Diffusion of Suicide Attacks. – М.: , 2011. – 360 с.
  93. Advising the Householder on Protection Against Nuclear Attack. – М.: V&A Publications, 2008. – 24 с.
  94. Lesley Thompson. Zombie Attack! Starter. – М.: Oxford University Press, 2013. – 40 с.
  95. Subi Khan and R.P. Mahapatra. SQL Injection Attack and Countermeasures. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  96. Saad Idrees. Portable Heart Attack Monitoring System with Dedicated Optical Network. – М.: LAP Lambert Academic Publishing, 2011. – 68 с.
  97. Luca Giancane. Side-Channel Attacks and Countermeasures. – М.: LAP Lambert Academic Publishing, 2012. – 172 с.
  98. Farukh Bashir. US Attack on Afghanistan and Public Response in Pakistan. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  99. Sakshi Ojha. Framing Breaking News: The Mumbai Terror Attacks of 2008. – М.: LAP Lambert Academic Publishing, 2010. – 96 с.
  100. Dr.M. NEELAMALAR. MEDIA COVERAGE OF 26/11 MUMBAI TERROR ATTACKS:. – М.: LAP Lambert Academic Publishing, 2010. – 184 с.
  101. Hafeez-ur- Rahman,M. Ahsan Khan and Mirza Abdul Qayyum. Bt-cotton characters & metrological factors effects on Jassid attack. – М.: LAP Lambert Academic Publishing, 2011. – 96 с.
  102. Mohammad Ruhul Amin. Spatial Analysis of Suicide Attack Incidences in Kabul City. – М.: LAP Lambert Academic Publishing, 2012. – 100 с.
  103. Bushra Rehman,Mansoor Ahmad Siddiqui and Kavita Parihar. Meloidogyne incognita attacking Chickpea. – М.: LAP Lambert Academic Publishing, 2012. – 136 с.
  104. Nyasha Madzokere. Amos'' attack of Affluent Classes:. – М.: LAP Lambert Academic Publishing, 2011. – 68 с.
  105. Charlotte Heath-Kelly. What Motivated the Terrorist Attacks of September 11th, 2001?. – М.: LAP Lambert Academic Publishing, 2010. – 76 с.
  106. Ayyaswamy Kathirvel,Srinivasan Rengaramanujam and Mohanambal Kathirvel. Prevention of attacks usign umpiring security model for manets. – М.: LAP Lambert Academic Publishing, 2012. – 192 с.
  107. Vishal Vora. Implementation and Analysis of Various Attacks on Digital Images. – М.: LAP Lambert Academic Publishing, 2012. – 112 с.
  108. Nisarg Gandhewar and Rahila Sheikh. Performance Valuation of AODV Under Sinkhole Attack In MANET Using NS2. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  109. Mohamed Amine Ferrag. Study of Attacks in Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  110. Cong Hoan Vu and Adeyinka Soneye. Collaborative Attacks on MANETs. – М.: LAP Lambert Academic Publishing, 2010. – 76 с.
  111. Kundan Munjal,Shilpa Verma and Namita Munjal. Cooperative Black Hole Attack Detection by Modifying AODV. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  112. Ulya Sabeel and Nidhi Chandra. ADLS: Attack Detection & Localization Scheme in WSN. – М.: LAP Lambert Academic Publishing, 2014. – 68 с.
  113. Sushant Sudhakar Bahekar and Prashant Panse. Energy Efficient Mechanism for Detection of Wormhole Attacks. – М.: LAP Lambert Academic Publishing, 2014. – 72 с.
  114. Ali Modirkhazeni. Mitigation of Passive Wormhole Attack in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2015. – 112 с.
  115. Madhav P. Namdev. Phishing Attacks and Detection. – М.: LAP Lambert Academic Publishing, 2015. – 68 с.
  116. Amol Zade. A New Cluster Approach for Wormhole Attack Removal in MANET using NS2. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  117. Narayan Ranjan Chakraborty. Analysis of Web security attacks: Bangladesh perspective. – М.: LAP Lambert Academic Publishing, 2012. – 124 с.
  118. Anup Parkash Singh Virk. Direct Collaborative Attacks on MANET. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  119. Prashant Kumar Singh and Avimanyou Kumar Vatsa. Taxonomy Based Intrusion Attacks and Detection Scheme in P2P Network. – М.: LAP Lambert Academic Publishing, 2012. – 56 с.
  120. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  121. Pallavi Kaliyar and Gagan Singla. A secure routing protocol for MANETs against byzantine attacks. – М.: LAP Lambert Academic Publishing, 2013. – 84 с.
  122. E.O. Ibidunmoye and B.K. Alese. Game-Theoretic Analysis of Network Attack-Defense Interactions. – М.: LAP Lambert Academic Publishing, 2013. – 108 с.
  123. ANNADURAI P and Dr. V. PALANISAMY. Impact of Black Hole Attack on Multicast in Ad hoc Network (IBAMA). – М.: LAP Lambert Academic Publishing, 2011. – 84 с.
  124. Sivaraju Sharmila and U. Mamaheshwari G. Detection Schemes for Selective Forward Attack in WSN. – М.: LAP Lambert Academic Publishing, 2012. – 72 с.
  125. Shanmugam Bharathy Dhivya. A Study of Foiling Vehicles from Sybil Attack Using Pseudonyms. – М.: LAP Lambert Academic Publishing, 2012. – 100 с.
  126. Natarajan Meghanathan,DeShante C. Johnson and Alexander R. Geoghegan. An Analysis of Software Security Attacks and Mitigation Controls. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  127. Jayeeta Majumder and Gargi Saha. SQL Injection Attacks and possible Remedies. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  128. Samuel Mbuguah and Franklin Wabwoba. Attackability Metrics Model For Secure Service Oriented Architecture. – М.: LAP Lambert Academic Publishing, 2014. – 164 с.
  129. Mohammed Firdos Alam Sheikh. Improving Web Security by Blocking SQL Injection Attack(SQLIA). – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  130. Georgiana Lucan. Computer-Based Attacks on Governments. – М.: LAP Lambert Academic Publishing, 2010. – 76 с.
  131. Akram Hossain,A. K. M. Zaidi Satter and Shibli Shahriar. Side Channel Attack Prevention. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  132. Edmond K. Machie. Network Attack Traceback And React. – М.: LAP Lambert Academic Publishing, 2013. – 208 с.
  133. Ahmed S. Yesuf. Context-based attack tree modelling for software development. – М.: LAP Lambert Academic Publishing, 2014. – 100 с.
  134. Joao Antunes. Network Attack Injection. – М.: Scholars' Press, 2013. – 268 с.
  135. Jose Fonseca. Evaluating the [In]security of Web Applications. – М.: LAP Lambert Academic Publishing, 2011. – 408 с.
  136. Mohammed Abu Hamada. Client Side Action Against Cross Site Scripting Attacks. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  137. B. B. Gupta. An Introduction to DDoS Attacks and Defense Mechanisms. – М.: LAP Lambert Academic Publishing, 2011. – 232 с.
  138. Rati Mekvabishvili. Self-fulfilling Speculative Attacks and Informational Structure. – М.: LAP Lambert Academic Publishing, 2011. – 60 с.
  139. Genevieve Kocienda. What Are the Odds? From Shark Attack to Lightning Strike: Low Intermediate Book with Online Access. – М.: Cambridge Discovery, 2014. – 28 с.
  140. Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks. – М.: , . –  с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

Ничего не найдено

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Игорь
обе курсовые сдал, спасибо