Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты John M. D. Hunter. An Information Security Handbook (Computer Communications and Networks). – М.: , 0. – 0 с. Handbook of Information and Communication Security. – М.: , 2010. – 800 с. Дополнительные результаты Wireless Communications and Applications: First International Conference, ICWCA 2011, Sanya, China, August 1-3, 2011, Revised Selected Papers (Lecture ... and Telecommunications Engineering). – М.: , 2012. – 468 с. Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – М.: , 2012. – 283 с. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с. Technological Innovation for Value Creation: Third IFIP WG 5.5/SOCOLNET Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS ... in Information and Communication Technology). – М.: , 2012. – 607 с. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с. The Oxford Handbook of Work and Aging (Oxford Library of Psychology). – М.: , 2012. – 744 с. Gerald Faulhaber, Gary Madden, Jeffrey Petchey. Regulation and the Performance of Communication and Information Networks. – М.: , 2012. – 384 с. Clusters in Automotive and Information & Communication Technology: Innovation, Multinationalization and Networking Dynamics. – М.: , 2012. – 308 с. Eileen Moore Trauth. The Culture of An Information Economy: Influences and Impacts in the Republic of Ireland. – М.: , 0. – 0 с. Paul Voillis, Paul Viollis. Jane's Workplace Security Handbook. – М.: , 0. – 0 с. Gerald Kovacich. The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition. – М.: , 0. – 0 с. Ron Tepper. Model Letters and Memos : A Handbook for Scientists and Engineers. – М.: , 0. – 0 с. Svenja Falk, Alfred J. Beerli, Daniel Diemers. Knowledge Management and Networked Environments. – М.: , 0. – 0 с. Philip P. Purpura. The Security Handbook. – М.: , 0. – 0 с. Giampiero E. G. Beroggi, William A. Wallace. Operational Risk Management: The Integration of Decision, Communications, and Multimedia Technologies. – М.: , 0. – 0 с. Seymour Bosworth, Michel E. Kabay. Computer Security Handbook. – М.: , 0. – 0 с. Mark B. Desman. Building an Information Security Awareness Program. – М.: , 0. – 0 с. John M. D. Hunter. An Information Security Handbook (Computer Communications and Networks). – М.: , 0. – 0 с. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с. Marko Nordquist. Towards Improved Security Management Practice: Designing an Organizational Model Procedure for the Implementation of Information Security Management in Heterogeneous Information Management. – М.: , 0. – 0 с. Steve Purser. A Practical Guide to Managing Information Security (Artech House Technology Management Library). – М.: , 0. – 0 с. Marian Quigley, Marian Quiqley. Information Security and Ethics: Social and Organizational Issues. – М.: , 0. – 0 с. Ifip Tc6, Tc11 Joint Working Conference on Communications and Multimedi, Tomaz Klobucar. Advanced Communications and Multimedia Security: Ifip Tc6/Tc11 Sixth Joint Working Conference on Communications and Multimedia Security, September 26-27, 2002, Portoroz, Slovenia (International Federation for Information Processing, 100). – М.: , 0. – 0 с. Jonathan S. Held, John R. Bowers. Securing E-Business Applications and Communications. – М.: , 0. – 0 с. Bob Emmerson, David Greetham. Computer Telephony and Wireless Technologies: Future Directions in Communications. – М.: , 0. – 0 с. Harold F. Tipton, Micki Krause, Micki, Cissp Krause. Information Security Management Handbook, Fifth Edition. – М.: , 0. – 0 с. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с. Kai P J Hakkarainen. Communities of Networked Expertise : Professional and Educational Perspectives (Advances in Learning and Instruction). – М.: , 2004. – 0 с. George H. Bodnar. Accounting Information Systems (9th Edition). – М.: , 2003. – 0 с. Richard J. Varey. Relationship Marketing : Dialogue and Networks in the E-Commerce Era. – М.: , 2003. – 0 с. Peter R., MBA Ramsaroop. Securing Business Intelligence: Knowledge and CyberSecurity in the Post 9/11 World. – М.: , 2004. – 0 с. Economics of Information Security (Advances in Information Security). – М.: , 2004. – 0 с. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с. Internet and Network Economics: First International Workshop, WINE 2005, Hong Kong, China, December 15-17, 2005, Proceedings (Lecture Notes in Computer Science). – М.: , 2006. – 1106 с. Ira Winkler. Zen and the Art of Information Security. – М.: , 2007. – 192 с. The Oxford Handbook of Work and Organization (Oxford Handbooks). – М.: , 2006. – 678 с. Timothy P. Layton. Information Security. – М.: , 2006. – 222 с. Michael Gentile, Ron Collette, Tom August. The Ciso Handbook: A Practical Guide to Securing Your Company. – М.: , 2005. – 352 с. Handbook of Asset and Liability Management (Handbook of Asset and Liability Management). – М.: , 2006. – 508 с. Jeanette S. Martin and Lillian H. Chaney. Global Business Etiquette: A Guide to International Communication and Customs. – М.: Praeger Publishers, 2006. – 188 с. Regina E. Lundgren, Andrea H. McMakin. Risk Communication: A Handbook For Communicating Environmental, Safety, And Health Risks. – М.: , 2004. – 453 с. The SAGE Handbook of Gender and Communication. – М.: , 2006. – 504 с. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с. Ibp Usa. Caribbean Community And Common Market Business Law Handbook. – М.: , 2008. – 300 с. Ibp Usa. Cuba Army Defense Policy and National Security Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Ibp Usa. EU Anti Terrorism Activities, Cooperation an d Strategy Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Ibp Usa. Caribbean Community and Common Market Business Law Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Social Networking Communities and E-Dating Services: Concepts and Implications (Premier Reference Source). – М.: , 2008. – 424 с. Social and Human Elements of Information Security: Emerging Trends and Countermeasures (Premier Reference Source). – М.: , 2008. – 412 с. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с. Jacqueline Blake. B2B Communication in the Australian Timber and Wood Products Industry: Business-to-business Communication and the Requirements for an Ontology for the Australian Timber and Wood Products Industry. – М.: , 2008. – 220 с. Gerard Blokdijk, Ivanka Menken. Information Security Management Best Practice Workbook: Implementation and Management Roadmap for Threats, Challenges and Solutions - Ready to use supporting documents bringing Theory into Practice. – М.: , 2008. – 124 с. Handbook of Large-Scale Random Networks (Bolyai Society Mathematical Studies). – М.: , 2009. – 600 с. K. J. Ray Liu, Ahmed K. Sadek, Weifeng Su, Andres Kwasinski. Cooperative Communications and Networking. – М.: , 2009. – 642 с. Hamid R. Nemati. Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues (Advances in Information Security and Privacy). – М.: , 2009. – 414 с. Ronald Maier, Thomas Hadrich, Rene Peinl. Enterprise Knowledge Infrastructures. – М.: , 2009. – 445 с. W. Krag Brotby. Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement. – М.: Auerbach Publications, 2009. – 200 с. Alan Calder. Information Security based on ISO 27001/ISO 27002: A Management Guide. – М.: , 2009. – 83 с. Bel G. Raggad. Information Security Management: Concepts and Practice. – М.: , 2010. – 871 с. Alan Calder, Steve G Watkins. Information Security Risk Management for ISO27001 / ISO27002. – М.: , 2010. – 198 с. William Manning. CISM Certified Information Security Manager Certification Exam Preparation Course in a Book for Passing the CISM Exam - The How To Pass on Your First Try Certification Study Guide. – М.: , 2010. – 188 с. Editors Karl Maria Michael de Leeuw, Jan Bergstra. The History of Information Security: A Comprehensive Handbook. – М.: Elsevier Science, 2007. – 900 с. Simon Haykin, K. J. Ray Liu. Handbook on Array Processing and Sensor Networks (Adaptive and Learning Systems for Signal Processing, Communications and Control Series). – М.: , 2010. – 904 с. Dr. Iti Saha Misra. Wireless Communication and Networks: 3G & Beyond, 1/e. – М.: , 2010. – 416 с. Quantum Communication and Quantum Networking: First International Conference, QuantumComm 2009, Naples, Italy, October 26-30, 2009, Revised Selected Papers ... and Telecommunications Engineering). – М.: , 2010. – 312 с. Advancing Computing, Communication, Control and Management (Lecture Notes in Electrical Engineering). – М.: , 2010. – 294 с. Amiya Nayak, Ivan Stojmenovic. Wireless Sensor and Actuator Networks: Algorithms and Protocols for Scalable Coordination and Data Communication. – М.: , 2010. – 300 с. Alexander M. Wyglinski. Cognitive Radio Communications and Networks. – М.: , 2010. – 736 с. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с. John R. Vacca. Computer and Information Security Handbook. – М.: , 2010. – 928 с. Jerry FitzGerald. Business Data Communications and Networking. – М.: , 1998. – 512 с. The Handbook of Communication and Corporate Social Responsibility. – М.: , 2011. – 560 с. Jerry FitzGerald. Business Data Communications and Networking. – М.: , 1996. – 592 с. RJ DEASINGTON. Deasington Practical Guide To ?computer? Communications And Networking 2ed. – М.: , 1984. – 126 с. RJ DEASINGTON. Deasington Practical Guide To ?computer? Communications And Networking 2ed. – М.: , 1984. – 126 с. Open Source Development, Communities and Quality: IFIP 20th World Computer Congress, Working Group 2.3 on Open Source Software, September 7-10, 2008, ... in Information and Communication Technology). – М.: , 2011. – 417 с. RJ DEASINGTON. Deasington Practical Guide To ?computer? Communications And Networking. – М.: , 1982. – 132 с. Greenberger. Computers, Communications and the Public Interest. – М.: , 1971. – 0 с. RJ DEASINGTON. Deasington Practical Guide To ?computer? Communications And Networking. – М.: , 1982. – 132 с. Jerry FitzGerald. Business Data Communications and Networking. – М.: , 2004. – 560 с. Jerry FitzGerald. Business Data Communications and Networking. – М.: , 2001. – 480 с. Jeffrey R. Bedell. Handbook for Communication and Problem–Solving Skills Training. – М.: , 1996. – 288 с. Greg Holden. Guide to Firewalls and Network Security: Intrusion Detection and VPNs. – М.: Course Technology, 2003. – 512 с. Harold F. Tipton, Micki Krause. Information Security Management Handbook on CD-ROM, 2003 Edition. – М.: , . – с. Jonghoek Kim,Magnus Egerstedt and Fumin Zhang. Simultaneous Cooperative Exploration and Networking. – М.: Scholars Press, 2013. – 124 с. Soledad Escolar and Jesus Carretero. Generic architecture for sensor network applications. – М.: LAP Lambert Academic Publishing, 2010. – 280 с. Jagannath Samanta and Asish Kumar Singh. An Improved Mosfet I-V Model and its Application in Nano-Cmos Circuits. – М.: LAP Lambert Academic Publishing, 2013. – 72 с. Sanjay Singh,S.K. Singh and Nishant Tripathi. Design and Analysis of Clock Subsystem Elements. – М.: LAP Lambert Academic Publishing, 2012. – 152 с. Md. Islam and Md. Jabbar. Sexual harassment of the adolescent girls in Bangladesh. – М.: LAP Lambert Academic Publishing, 2014. – 76 с. Om Prakash Verma and P. K. Walia. Digital Database of Homoepathic Information Resources in India. – М.: LAP Lambert Academic Publishing, 2012. – 284 с. Manir Abdullahi Kamba and Yushiana Mansor. Circular Model of Information Seeking Behaviour. – М.: LAP Lambert Academic Publishing, 2012. – 408 с. Sudip Banerjee,Krishnendu Mondal and Subhendu Mondal. COMMUNITY AND DIVERSITY OF WATERFOWLS IN SANTRAGACHHI WETLAND, INDIA. – М.: LAP Lambert Academic Publishing, 2011. – 92 с. Harikrishnan C. P.,Kunhamu T. K. and Ajeesh R. Structural and Functional Analysis of Tropical Urban Homegardens. – М.: LAP Lambert Academic Publishing, 2014. – 92 с. Carlos A. F. Marques and Rogerio N. Nogueira. Fiber Optic Components for Optical Communications and Sensing. – М.: Scholars' Press, 2014. – 308 с. Rakesh Tada,Pankaj Nariya and Manish Shah. An approach to Study of Thiosemicarbazone And their metal complexes. – М.: LAP Lambert Academic Publishing, 2013. – 104 с. Hedyeh Nasser Ranjbar and Megha M. Uplane. Video & Computer Games and Behavioral Problems. – М.: LAP Lambert Academic Publishing, 2012. – 304 с. Masumbuko Y. Mwashambwa and Rastagaev A. Vyacheslavovich. An Introduction to Upper Gastrointestinal, Chest and Thyroid Surgery. – М.: LAP Lambert Academic Publishing, 2013. – 256 с. Sam''an Malik Masudi,Jalal Jafar Alshakhshir and Akram Hassan. APICAL SEALING ABILITY OF NANO HYBRID RESIN BASED ENDODONTIC SEALER. – М.: LAP Lambert Academic Publishing, 2010. – 88 с. Geetanjali Sharma and G.N. Purohit. Performance evaluation of wireless Communication Networks. – М.: LAP Lambert Academic Publishing, 2013. – 148 с. Rupesh S. Mishra and D. K. Chitre. Data Leakage Detection in Relational Database. – М.: LAP Lambert Academic Publishing, 2013. – 68 с. Faraz Fatemi Moghaddam. Secure Cloud Computing with Client-Based Control System. – М.: LAP Lambert Academic Publishing, 2013. – 100 с. Younus Javed and Hassan Tahir. Optimized Security Protocol for Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Wei Lu. Analysis of Inter-Vehicle Communication Using Network Simulator. – М.: LAP Lambert Academic Publishing, 2013. – 112 с. Lei Liang,Zhili Sun and Haitham Cruickshank. IP Performance over GEO Satellite Networks. – М.: LAP Lambert Academic Publishing, 2009. – 192 с. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с. Mahmood Ahmadi. High-performance Processing in Grid and Networked Environements. – М.: LAP Lambert Academic Publishing, 2011. – 168 с. Mais Mohammed Hobi and Sarab Majeed Hameed. Biometrics for User Authentication Using Artificial Neural Networks. – М.: LAP Lambert Academic Publishing, 2013. – 108 с. Dimitrios Papadopoulos and Bernhard Hammerli. Positioning the roles, interfaces & processes in the InfoSec scene. – М.: LAP Lambert Academic Publishing, 2014. – 168 с. Yedji Mbangsoua and Dr. Freddie Acosta. Information Security and its Investment Justification. – М.: LAP Lambert Academic Publishing, 2011. – 132 с. Yasser Alshehri. Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 156 с. Stephen Schiavone,Lalit Garg and Kelly Summers. Information Security in Enterprises - an Ontological Perspective. – М.: LAP Lambert Academic Publishing, 2014. – 232 с. Vasilios Katos. Symmetric cryptography in computer communications. – М.: LAP Lambert Academic Publishing, 2011. – 344 с. Mehdi Hussain and Mureed Hussain. Efficient Data Hiding Techniques with Enhanced Capacity. – М.: LAP Lambert Academic Publishing, 2012. – 96 с. Rajesh Lekhwar,Harikesh Maurya and Sarita Lekhwar. Conception of Computer Fundamental and Its Inspiration. – М.: LAP Lambert Academic Publishing, 2012. – 136 с. Furhan Mehmood and Rajia Rafique. Information Security in Financial Organizations. – М.: LAP Lambert Academic Publishing, 2010. – 68 с. Athina Lazakidou and Ibrahiem El Emary. Learning-Oriented Technologies, Devices and Networks. – М.: LAP Lambert Academic Publishing, 2011. – 304 с. Edmond K. Machie. Network Attack Traceback And React. – М.: LAP Lambert Academic Publishing, 2013. – 208 с. Tanveer Zia. A Security Framework for Wireless Sensor Networks (WSN). – М.: LAP Lambert Academic Publishing, 2013. – 160 с. frankie tvrz and marijke coetzee. Information Security of a Bluetooth-enabled handheld device. – М.: LAP Lambert Academic Publishing, 2010. – 180 с. Meysam Namayandeh. Development of Computer Ethical Framework for Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 132 с. Sekar Koneti,Praveen Sam Rachapudy and Dileep Kumar Reddy Pallela. Computer Organization and Architecture. – М.: LAP Lambert Academic Publishing, 2014. – 368 с. Muhammad Imran Tariq. SLA based Information Security Metrics in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2014. – 192 с. Kavitha Ramachandran and Sivadasan E. T. ICEdu : An Information Cloud for Educational Institutions. – М.: LAP Lambert Academic Publishing, 2014. – 72 с. S. Ramakrishnan and Ibrahiem M.M.El Emary. Computational Techniques and Algorithms for Image Processing. – М.: LAP Lambert Academic Publishing, 2010. – 592 с. Faeiz Alserhani,Irfan Awan and Monis Akhlaq. Correlation and Aggregation of Security Alerts in Networks. – М.: LAP Lambert Academic Publishing, 2012. – 256 с. Venugopal Prabhakar Gantasala,Krishna Naik Chanda Naik Gari and Swapna Bhargavi Gantasala. Organizational Culture, Knowledge Management and Network Embeddedness. – М.: LAP Lambert Academic Publishing, 2012. – 332 с. Alaa Al-Deen Mohammed Hassan. Information Security Management. – М.: LAP Lambert Academic Publishing, 2013. – 188 с. Jun Zheng,Jiantao Gu and Hong Wang. Financial Management and Information Security of Independent Colleges. – М.: LAP Lambert Academic Publishing, 2014. – 256 с. HARIKANTH DUMPETI,NARESH REDDY G and SAISHARAN K. COMPUTER APPLICATION IN BUSINESS. – М.: LAP Lambert Academic Publishing, 2010. – 452 с. Nader Sh. Kandelousi,A. Janee Ali and A. Abdollahi. Interpersonal Communication and Communication Satisfaction. – М.: LAP Lambert Academic Publishing, 2010. – 112 с. Ying Qian. Mitigating Information Security Risks during Operation Transition. – М.: LAP Lambert Academic Publishing, 2012. – 372 с. Nasser Oroujlou,Sedigheh Haghjou and Belghis Rovshan. Quick Guides to Write a Scientific Paper. – М.: LAP Lambert Academic Publishing, 2012. – 312 с. Jitendra Joshi and Keshav Dev Gupta. Introduction to Computer System and Architecture. – М.: LAP Lambert Academic Publishing, 2013. – 248 с. Craig E. Carroll. The Handbook of Communication and Corporate Reputation. – М.: , 2015. – с. Лучшие результаты Ничего не найдено Дополнительные результаты Наука человековедения. интервью с Д. Уолтоном, профессором London Metropolitan University, экспертом CIPD. Chartered Institute of Personnel and Development, автором программы Master of Arts in Human Resource Strategies. И. Смирнова, "Кадровый менеджмент", № 5, июль-август 2007. Специализированный модуль FS-CD. Collections and Disbursements - "Сборы и Выплаты" и его возможности. О.А. Глущенко, "Финансовый менеджмент в страховой компании", № 2, II квартал 2007. Бюджетирование страховой компании на базе Oracle Enterprise Planning and Budgeting. Д.В. Лесоводский, "Финансовый менеджмент в страховой компании", № 3, III квартал 2006. Построить идеальный каскад информации удается далеко не всегда. интервью с А. Синикас. Angela D. Sinickas, президентом международной консалтинговой компании Sinickas Communications, Inc. США, www.sinicom. com. В. Правоторов, "Кадровый менеджмент", № 4, май-июнь 2006. Регулирование операций торгового финансирования: новые инициативы. интервью с Д. Шмандом, вице-председателем Банковской комиссии ICC по supply chain finance, главой подразделения Trade Finance and Cash Management Corporates EMEA в Global Transaction Banking. GTB division Deutsche Bank. Н. Макарова, "Международные банковские операции", N 2, апрель-июнь 2012 г. О качестве сервиса, связанного с запросами на медицинскую информацию. Medical Information Service?. А. Беденков, "Ремедиум", № 1, январь 2012. Ужин в темноте в стиле Малевича и Новый год в Хаммере". Что может выть лучше?". интервью с Н. Саниной, индивидуальным предпринимателем и креативным директором компании "San and stars". М. Сипатова, "Арсенал предпринимателя", N 12, декабрь 2011 г. На пути к новому стандарту в торговом финансировании. интервью с А. Кастерманом, руководителем Trade and Supply Chain, SWIFT, сопредседателем рабочей группы ICC-BPO. Э. Шакирова, "Международные банковские операции", N 4, октябрь-декабрь 2011 г. Уильям Савадж: Мотивировать людей в Нижнем Новгороде и Новосибирске нужно по-разному". интервью с У. Саваджем, вице-президентом корпорации Intel, подразделение Software and Services Group. М. Холкина, "Управление персоналом", N 14, июль 2010 г. Цены под контролем: the present and the future. С. Стройкова, И. Леметюйнен, "Консультант", № 19, сентябрь 2009. Основной арсенал "охотника" - его network: кого он знает на рынке и качество этих отношений. С. Плетнева, "Управление персоналом", № 12, июнь 2009. Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Женя Здравствуйте Марина Михайловна! Спасибо за сотрудничество, защитилась на 5. Удачи вам.