Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Timothy Braithwaite. Securing E-Business Systems: A Guide for Managers and Executives. – М.: , 0. – 0 с. Eric D. Knapp, Raj Samani. Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure. – М.: Syngress, 2013. – 228 с. Lane Thames. Advancing Cyber Security. – М.: LAP Lambert Academic Publishing, 2013. – 256 с. Predrag Tasevski. Interactive Cyber Security Awareness Program. – М.: LAP Lambert Academic Publishing, 2012. – 184 с. Дополнительные результаты Francis Groves. Corporate Actions - A Concise Guide: An introduction to securities events. – М.: , 2012. – 230 с. Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с. Critical Infrastructure Protection: Advances in Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 371 с. Wojciech Syrzysko. Supply Chain Controlling: Eine Integration von Advanced Planning Systems und SCOR-Modell (German Edition). – М.: , 2012. – 100 с. David DiMartile. Understanding the Secrets to Career Advancement: Through the Eyes of an HR Director. – М.: , 2012. – 128 с. Mohammed M. Hunafa. Government Economic Report - An Intelligence Officer's Viewpoint. – М.: , 2012. – 34 с. Haiyan Song, Stephen F. Witt, Gang Li. The Advanced Econometrics of Tourism Demand. – М.: , 2012. – 234 с. Keith Quincy. Worse Than You Think: The Real Economy Hidden Beneath Washington's Rigged Statistics, and Where We Go From There. – М.: , 2012. – 404 с. Biotechnology in China III: Biofuels and Bioenergy (Advances in Biochemical Engineering Biotechnology). – М.: , 2012. – 235 с. Data Privacy Management and Autonomous Spontaneus Security: 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, ... Computer Science / Security and Cryptology). – М.: , 2012. – 334 с. agendaCPS: Integrierte Forschungsagenda Cyber-Physical Systems (acatech STUDIE) (German Edition). – М.: , 2012. – 297 с. Security and Privacy in Mobile Information and Communication Systems: Third International ICST Conference, MOBISEC 2011, Aalborg, Denmark, May 17-19, ... and Telecommunications Engineering). – М.: , 2012. – 195 с. Constructive Side-Channel Analysis and Secure Design: Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings ... Computer Science / Security and Cryptology). – М.: , 2012. – 280 с. Public Key Infrastructures, Services and Applications: 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected ... Computer Science / Security and Cryptology). – М.: , 2012. – 219 с. Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – М.: , 2012. – 283 с. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 515 с. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с. Smart Card Research and Advanced Applications: 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, ... Computer Science / Security and Cryptology). – М.: , 2012. – 357 с. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с. Security and Development in Global Politics: A Critical Comparison. – М.: , 2012. – 360 с. Ola Olsson. Essentials of Advanced Macroeconomic Theory (Routledge Advanced Texts in Economics and Finance). – М.: , 2012. – 192 с. Terrorism and the Olympics: Major Event Security and Lessons for the Future. – М.: , 2012. – 272 с. Securities Compliance Index. Securities Compliance Index, Second Edition: A Topical Guide To U.S. Securities Regulation. – М.: , 2012. – 512 с. Jeffrey C. Hooke. Security Analysis on Wall Street. – М.: , 0. – 0 с. K. Alec Chrystal, Rupert Pennant-Rea, British Association for the Advancement of Science Section F. Public Choice Analysis of Economic Policy (British Association for the Advancement of Science Books). – М.: , 0. – 0 с. T. Parthasarathy, B. Dutta, J. A. M. Potters, T. E. S. Raghaven, D. Ray, A. Sen, Bangalore Indian Institute of Science, Indian Statistical Institute, Jawaharlal Nehru Centre for Advanced Scientific re. Game Theoretical Applications to Economics and Operations Research (Theory and Decision Library. Series C, Game Theory, Mathematical Programming, and Operations Research, Vol 18). – М.: , 0. – 0 с. Asset Protection and Security Management Handbook. – М.: , 0. – 0 с. Alexis Gutzman. Unforeseen Circumstances : Strategies and Technologies for Protecting Your Business and Your People in a Less Secure World. – М.: , 0. – 0 с. Philip P. Purpura. The Security Handbook. – М.: , 0. – 0 с. Leigh Wade. Careers in Private Security: How to Get Started, How to Get Ahead. – М.: , 0. – 0 с. NATO Advanced Research Workshop on Science for Reduction of Risk and s, Alik Ismail-Zadeh. Risk Science and Sustainability: Science for Reduction of Risk and Sustainable Development for Society (NATO SCIENCE SERIES II MATHEMATICS, PHYSICS AND CHEMISTRY). – М.: , 0. – 0 с. Dag Harald Claes, Dag Harald Claes ARENA: Advanced Research on the Europeanisation of the Nation-State. The Politics of Oil-Producer Cooperation. – М.: , 0. – 0 с. Tapen Sinha. Pension Reform in Latin America and Its Lessons for International Policymakers (Huebner International Series on Risk, Insurance, and Economic Security, #23). – М.: , 0. – 0 с. NATO Advanced Study Institute On: "Water Resources and Land-Use Planni, P. and Haimes, Y.Y. Laconte, Pierre Laconte, Yacov Y. Haimes, North Atlantic Treaty Organization, NATO Advanced Study Institute. Water Resources and Land-Use Planning: A Systems Approach (NATO Advanced Study Institutes Series). – М.: , 0. – 0 с. Klaus M. Leisinger, Karin Schmitt, Rajul Pandya-Lorch. Six Billion and Counting: Population Growth and Food Security in the 21st Century. – М.: , 0. – 0 с. NATO Advanced Study Institute on Deposit and Geoenvironmental Models f, Gabor Gaal, Richard B. McCammon. Deposit and Geoenvironmental Models for Resource Exploitation and Environmental Security (NATO Science Series. Partnership Sub-Series 2, Environmental Security, V. 80.). – М.: , 0. – 0 с. Bruce Tuckman. Fixed Income Securities: Tools for Today's Markets. – М.: Wiley Publishing, Inc, 2002. – 512 с. Martin L. Leibowitz. Franchise Value : A Modern Approach to Security Analysis (Wiley Finance). – М.: , 0. – 0 с. Julia Lowell, C. R. Neu, Daochi Tong, National Defense Research Institute, National Security Research Institute. Financial Crises and Contagion in Emerging Market Countries. – М.: , 0. – 0 с. Robert F., Jr Dundervill, Peter F. Gerity, Anthony K. Hyder, Lawrence H. Luessen, North Atlantic Treaty Organization Scientific Affairs Division, NATO Advanced Study Institute on Defense Conversion Strategies. Defense Conversion Strategies (NATO Asi Series. Partnership Sub-Series 1, Disarmament Technologies, Vol 9). – М.: , 0. – 0 с. Timothy Braithwaite. Securing E-Business Systems: A Guide for Managers and Executives. – М.: , 0. – 0 с. Computer Security. – М.: , 0. – 0 с. Joseph S. Nye, William A. Owens, James R. Schlesinger, R. James Woolsey, James A. Lewis, Joseph S., Jr. Nye, James Andrew Lewis, Erin Schlather, Csis Commission on Technology Security in the Twenty-First Century. Computer Exports and National Security: New Tools for a New Century : A Report of the Csis Commission on Technology Security in the 21St-Century (Csis Panel Reports.). – М.: , 0. – 0 с. Ifip Tc6, Tc11 Joint Working Conference on Communications and Multimedi, Tomaz Klobucar. Advanced Communications and Multimedia Security: Ifip Tc6/Tc11 Sixth Joint Working Conference on Communications and Multimedia Security, September 26-27, 2002, Portoroz, Slovenia (International Federation for Information Processing, 100). – М.: , 0. – 0 с. Vesna Hassler. Security Fundamentals for E-Commerce (Artech House Computer Security Series). – М.: , 0. – 0 с. Ifip Tc5, Wg5.7 International Conference on Advances in Production Mana, Harinder S. Jagdev, J. C. Wortmann, H. J. Pels. Collaborative Systems for Production Management: Ifip Tc5/Wg5.7 International Conference on Advanced Sic in Production Management Systems, September 8 ... Federation for Information Processing, ?257). – М.: , 0. – 0 с. Debt Management and Government Securities Markets in the 21st Century. – М.: , 2004. – 0 с. Pension Security in the 21st Century: Redrawing the Public-Private Debate. – М.: , 2004. – 0 с. The Secure Online Business: E-Commerce, It Functionality & Business Continuity. – М.: , 2003. – 0 с. Advances in Security and Payment Methods for Mobile Commerce. – М.: , 2004. – 0 с. Economics of Information Security (Advances in Information Security). – М.: , 2004. – 0 с. Lech Janczewski. Managerial Guide for Handling Cyber-Terrorism and Information Warfare. – М.: , 2005. – 0 с. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с. Committee on Federal Regulation of Securities Committee. The Fund Director's Guidebook: Third Edition (Fund Director's Guidebook). – М.: , 2006. – 128 с. Larstan's The Black Book on Corporate Security (Black Book Series). – М.: , 2005. – 439 с. Jeanne Machado. Employment Opportunities in Education: How To Secure Your Career. – М.: , 2005. – 192 с. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с. Patrick Traynor, Patrick McDaniel, Thomas La Porta. Security for Telecommunications Networks (Advances in Information Security). – М.: , 2008. – 182 с. Edwin Amenta. When Movements Matter: The Townsend Plan and the Rise of Social Security (Princeton Studies in American Politics). – М.: , 2008. – 336 с. Environmental Change and Human Security: Recognizing and Acting on Hazard Impacts (NATO Science for Peace and Security Series C: Environmental Security). – М.: , 2008. – 480 с. Meridian Securities Market. World Stock Exchange Fact Book. – М.: , 2008. – 0 с. CompTIA Security+: Certification Kit (комплект из 3 книг + 2 CD-ROM). – М.: Sybex, 2009. – 1440 с. Hamid R. Nemati. Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues (Advances in Information Security and Privacy). – М.: , 2009. – 414 с. John Rittinghouse, James Ransome. Cloud Computing: Implementation, Management, and Security. – М.: CRC Press, 2009. – 340 с. Digital Business Security Development: Management Technologies. – М.: , 2010. – 318 с. National Safety Council. Accident Prevention Manual: Security Management 2nd Edition. – М.: , 2010. – 407 с. Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series). – М.: , 2005. – 298 с. John & Liz Soars. Headway. Student's Book. Advanced. – М.: Oxford University Press, 2001. – 160 с. CAPT(Center for the Advancement of Process Tech)l. Process Quality. – М.: , 2010. – 288 с. John Paul Mueller. NET Development Security SolutionsTM. – М.: , 2003. – 472 с. Advanced Life Support Group. Acute Medical Emergencies. – М.: , 2010. – 508 с. Advanced Life Support Group. Pocket Guide to Teaching for Medical Instructors. – М.: , 2008. – 104 с. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с. Advances in the Valuation and Management of Mortgage–Backed Securities. – М.: , 1999. – 318 с. Edited by Lilian Edwards and Charlotte Waelde. Law and the Internet - Third Edition. – М.: , 2011. – 708 с. Citrix Xenapp™ Platinum Edition Advanced Concepts: The Official Guide. – М.: , 2011. – 454 с. Cisa Certified Information Systems Auditor All-In-One Exam Guide, 2Nd Edition. – М.: , 2011. – 0 с. Security Information And Event Management (Siem) Implementation. – М.: , 2011. – 464 с. Fundamentals Of Network Security. – М.: , 2011. – 672 с. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . – с. Eric D. Knapp, Raj Samani. Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure. – М.: Syngress, 2013. – 228 с. Rajani Sharma and Rajender Trivedi. Data Security in a Cloud Environment using Multilevel UEC. – М.: LAP Lambert Academic Publishing, 2014. – 84 с. Shaikh Salim and Shankar Nawale. Secure Access of RFID System. – М.: LAP Lambert Academic Publishing, 2012. – 96 с. Jameel Ahmed. Transform-Domain and DSP Based Secure Speech Communication. – М.: LAP Lambert Academic Publishing, 2011. – 252 с. LeelaRani Vanapalli. FPGA Implementation of Advanced Encryption Standard Algorithm. – М.: LAP Lambert Academic Publishing, 2012. – 64 с. T.C. Manjunath and Arun Kumar G. Examination Security System. – М.: LAP Lambert Academic Publishing, 2013. – 60 с. Rohit Das and Abhik Sarkar. Advanced Home Security System. – М.: LAP Lambert Academic Publishing, 2013. – 52 с. C. R. Prajapati,K. P. Singh and A. K. Gupta. Plant Disease Management for Food Security. – М.: LAP Lambert Academic Publishing, 2013. – 676 с. Filip Tucek. The European Union as Security Actor of a New Type. – М.: LAP Lambert Academic Publishing, 2013. – 96 с. Chukwudi Oparaku. Implication of BOKO HARAM ACTIVITIES for national security in Nigeria. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. SANJU GUPTA. INDIAN SECURITY ENVIRONMENT AND WEST ASIA. – М.: LAP Lambert Academic Publishing, 2011. – 364 с. Kiril Stoichev. Increasing Nuclear Security with Advanced Management Systems. – М.: LAP Lambert Academic Publishing, 2015. – 188 с. Jashan Daniel. Global analysis of electricity security. – М.: LAP Lambert Academic Publishing, 2012. – 100 с. Elhadj Zeraoulia. Advanced Topics in Nonlinear Chaotic Systems. – М.: LAP Lambert Academic Publishing, 2012. – 148 с. Sudarshan Ranpise. Cyber Crime Prevention. – М.: LAP Lambert Academic Publishing, 2013. – 268 с. Halefom Hailu. The Threat of Cybercrime in Ethiopia. – М.: LAP Lambert Academic Publishing, 2014. – 124 с. Olivia Tan Swee Leng,Shereen Khan and Reza Mohamad Hossein. Cybercrime and Cyber Terrorism: The Security Measures in Malaysia. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Gurmanpreet Kaur,Anand Pawar and Simranpreet Kaur. Cyber Terrorism and Law. – М.: LAP Lambert Academic Publishing, 2012. – 128 с. Christiaan Pieter Naude Malan. CIVIL SOCIETY AND THE TRANSFORMATION OF SOCIAL SECURITY. – М.: LAP Lambert Academic Publishing, 2010. – 420 с. Patty A. Fairweather. State Supreme Court Chief Justices'' Views: Liberty/Security and The GWOT. – М.: LAP Lambert Academic Publishing, 2010. – 116 с. Winnie Awino. GENDER INEQUALITY IN EMPLOYMENT. – М.: LAP Lambert Academic Publishing, 2010. – 144 с. Munyabarenzi Faustin. The incidence of security interest in movable property. – М.: LAP Lambert Academic Publishing, 2013. – 84 с. Padmashali. A Secure communication for wireless sensor networks. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Niroj Kumar Pani and Dr. Ashok Kumar Turuk. A Hybrid Zone-Based Routing Protocol for Secure Communication in MANET. – М.: LAP Lambert Academic Publishing, 2010. – 92 с. Rupa Ch. and Avadhani P. S. Modern Security Methods in Applied Computer Science. – М.: Scholars' Press, 2014. – 124 с. Lane Thames. Advancing Cyber Security. – М.: LAP Lambert Academic Publishing, 2013. – 256 с. Narayan Ranjan Chakraborty. Analysis of Web security attacks: Bangladesh perspective. – М.: LAP Lambert Academic Publishing, 2012. – 124 с. Gurpreet juneja. Security:MPLS VPN Network. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Amish Kumar. AES Security Enhancement Using Double S-Box. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Vincent Omollo. Enhanced Network Security. – М.: LAP Lambert Academic Publishing, 2013. – 76 с. Raj Shree and Ravi Prakash Pandey. Security Advancement in ZRP based Wireless Networks. – М.: LAP Lambert Academic Publishing, 2014. – 92 с. Abdel-Latif Elkouny. Secured Image and Video Stream Across Wireless Networks. – М.: LAP Lambert Academic Publishing, 2011. – 120 с. Vikas Pareek. Cyber Crime in Indian Context. – М.: LAP Lambert Academic Publishing, 2013. – 56 с. Lamek Ronoh. Security Concern of Cloud Computing Models. – М.: LAP Lambert Academic Publishing, 2014. – 88 с. Mitko Bogdanoski,Aleksandar Risteski and Marjan Bogdanoski. Cyber operations - a permanent part of the global conflict. – М.: LAP Lambert Academic Publishing, 2014. – 60 с. Kefa Rabah. Mastering Securing ICT Infrastructure for Corporate Network. – М.: LAP Lambert Academic Publishing, 2014. – 360 с. Kun Ma. Advances in Multi-tenant Architecture. – М.: LAP Lambert Academic Publishing, 2014. – 96 с. Ajeet Singh Poonia. Investigation and Prevention of Cyber Crime. – М.: LAP Lambert Academic Publishing, 2014. – 116 с. Poonam Kumar. The Perpetration and Prevention of Cyber Crime and Cyber Terrorism. – М.: LAP Lambert Academic Publishing, 2012. – 64 с. Stephen Schiavone,Lalit Garg and Kelly Summers. Information Security in Enterprises - an Ontological Perspective. – М.: LAP Lambert Academic Publishing, 2014. – 232 с. Christopher Beggs. Safeguarding Infrastructure Assets from Cyber-terrorism. – М.: LAP Lambert Academic Publishing, 2010. – 348 с. Julien Shabani. Information Security for RFID Systems. – М.: LAP Lambert Academic Publishing, 2011. – 92 с. Hammad Kazmi. Security and Privacy issues in Near Field Communication (NFC) Systems. – М.: LAP Lambert Academic Publishing, 2012. – 68 с. Nour El-Deen Mahmoud Khalifa. Securing Real-Time Video Over IP Transmission. – М.: LAP Lambert Academic Publishing, 2014. – 120 с. Cyrus Abanti Makori,Jane Onsongo and Lusiba Badru. ICT Security Applications. – М.: LAP Lambert Academic Publishing, 2012. – 112 с. Apoorva Kumar Singhal and Mohit Kumar. Security For ARM Based Embedded Systems. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Predrag Tasevski. Interactive Cyber Security Awareness Program. – М.: LAP Lambert Academic Publishing, 2012. – 184 с. Jahidul Arafat. Higher Education Information Security. – М.: LAP Lambert Academic Publishing, 2013. – 176 с. Ayub Bogere,Md. Abdul Awal Khan and Md. Abu Raihan. A study on ICT security management system in universities of Uganda. – М.: LAP Lambert Academic Publishing, 2013. – 112 с. Ubaid Hayee. A Six Sigma Approach to Assure IT Security. – М.: LAP Lambert Academic Publishing, 2011. – 64 с. Rinaldi Yulius. DESIGN OF A CYBER SECURITY LABORATORY. – М.: LAP Lambert Academic Publishing, 2010. – 140 с. Vrajlal Sapovadia,Kandarp Patel and Akash Patel. Cyber World: Potentials and Risks. – М.: LAP Lambert Academic Publishing, 2010. – 160 с. Viswanatha Subramaniam and RAMARAJ RAVI. Cyber crime control techno-legal network. – М.: LAP Lambert Academic Publishing, 2011. – 60 с. Antonio De Simone. Hybrid Securities Valuation. – М.: Scholars' Press, 2014. – 252 с. 2020. – М.: , . – с. Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks. – М.: , . – с.
Лучшие результаты Ничего не найдено Дополнительные результаты Ничего не найдено Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Алексей Добрый день, Юля!!! Огромное спасибо за диплом после вашего сопровождения! Вы Нас очень выручили! Защита прошла успешно ( на ОТЛИЧНО).Мы Вас будем рекомендовать и рекламировать своим друзьям и товарищам!!!