Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты James E. Hunton, Stephanie M. Bryant, Nancy A. Bagranoff. Core Concepts of Information Technology Auditing. – М.: , 0. – 0 с. Jack J. Champlain. Auditing Information Systems. – М.: , 0. – 0 с. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с. S. Rao Vallabhaneni. Auditing Computer Security. – М.: , 1989. – 368 с. It Auditing Using Controls To Protect Information Assets, 2Nd Edition. – М.: , 2011. – 512 с. Saghar Estehghari. Impact of Client-side Vulnerabilities on Web-based E-voting Systems. – М.: LAP Lambert Academic Publishing, 2011. – 80 с. Cyrus Abanti Makori,Jane Onsongo and Lusiba Badru. ICT Security Applications. – М.: LAP Lambert Academic Publishing, 2012. – 112 с. Дополнительные результаты Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с. Data Privacy Management and Autonomous Spontaneus Security: 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, ... Computer Science / Security and Cryptology). – М.: , 2012. – 334 с. Constructive Side-Channel Analysis and Secure Design: Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings ... Computer Science / Security and Cryptology). – М.: , 2012. – 280 с. Public Key Infrastructures, Services and Applications: 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected ... Computer Science / Security and Cryptology). – М.: , 2012. – 219 с. Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – М.: , 2012. – 283 с. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 515 с. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с. Smart Card Research and Advanced Applications: 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, ... Computer Science / Security and Cryptology). – М.: , 2012. – 357 с. Video Analytics for Business Intelligence (Studies in Computational Intelligence). – М.: , 2012. – 388 с. Securities Compliance Index. Securities Compliance Index, Second Edition: A Topical Guide To U.S. Securities Regulation. – М.: , 2012. – 512 с. James E. Hunton, Stephanie M. Bryant, Nancy A. Bagranoff. Core Concepts of Information Technology Auditing. – М.: , 0. – 0 с. Sharon Oblinger, Mark W. Lehman. Computer Assisted Auditing with Great Plains Dynamics Revised. – М.: , 0. – 0 с. Jack J. Champlain. Auditing Information Systems. – М.: , 0. – 0 с. G. Jack Bologna, Robert J. Lindquist. Fraud Auditing and Forensic Accounting. – М.: , 0. – 0 с. Yusufali F. Musaji. Auditing and Security: AS/400, NT, UNIX, Networks, and Disaster Recovery Plans. – М.: , 0. – 0 с. Mario Piattini. Auditing Information Systems. – М.: , 0. – 0 с. David Chanoff, Ejovi Nuwere. Hacker Cracker : A Journey from the Mean Streets of Brooklyn to the Frontiers of Cyberspace. – М.: , 0. – 0 с. Terrell Ward Bynum, Simon Rogerson, Blackwell Pub. Computer Ethics and Professional Responsibility: Introductory Text and Readings. – М.: , 0. – 0 с. Information Warfare : corporate attack and defence in a digital world (Computer Weekly Professional (Paperback)). – М.: , 0. – 0 с. Susan Echaore-McDavid. Career Opportunities in Law Enforcement, Security, and Protective Services (The Career Opportunities Series). – М.: , 0. – 0 с. Leigh Wade. Careers in Private Security: How to Get Started, How to Get Ahead. – М.: , 0. – 0 с. Joel Seligman. The Transformation of Wall Street: A History of the Securities and Exchange Commission and Modern Corporate Finance. – М.: , 0. – 0 с. Julia Lowell, C. R. Neu, Daochi Tong, National Defense Research Institute, National Security Research Institute. Financial Crises and Contagion in Emerging Market Countries. – М.: , 0. – 0 с. Seymour Bosworth, Michel E. Kabay. Computer Security Handbook. – М.: , 0. – 0 с. Richard Hunter. World Without Secrets: Business, Crime and Privacy in the Age of Ubiquitous Computing. – М.: , 0. – 0 с. Gerald L. Kovacich, Edward P. Halibozek. The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, First Edition. – М.: , 0. – 0 с. Thomas J. Parenty. Digital Defense: What You Should Know About Protecting Your Company's Assets. – М.: , 0. – 0 с. Marko Nordquist. Towards Improved Security Management Practice: Designing an Organizational Model Procedure for the Implementation of Information Security Management in Heterogeneous Information Management. – М.: , 0. – 0 с. Computer Security. – М.: , 0. – 0 с. Donn B. Parker. Fighting Computer Crime : A New Framework for Protecting Information. – М.: , 0. – 0 с. Ultimate Financial Security Survey. – М.: , 0. – 0 с. Effective Security Management, Fourth Edition (Effective Security Management). – М.: , 0. – 0 с. Joseph S. Nye, William A. Owens, James R. Schlesinger, R. James Woolsey, James A. Lewis, Joseph S., Jr. Nye, James Andrew Lewis, Erin Schlather, Csis Commission on Technology Security in the Twenty-First Century. Computer Exports and National Security: New Tools for a New Century : A Report of the Csis Commission on Technology Security in the 21St-Century (Csis Panel Reports.). – М.: , 0. – 0 с. Ravi Kalakota, Andrew B. Whinston, Coordination, and Collaboration Conference 1 Organizational Computing. Readings in Electronic Commerce. – М.: , 0. – 0 с. Juanita Ellis, Tim Speed. The Internet Security Guidebook: From Planning to Deployment. – М.: , 0. – 0 с. Roland Traunmuller, R. Traunmuller, Quebec) Ifip World Computer Congress 2002 Montreal. Information Systems: The E-Business Challenge (International Federation for Information Processing, 95). – М.: , 0. – 0 с. Mostafa Hashem Sherif. Protocols for Secure Electronic Commerce, Second Edition. – М.: , 0. – 0 с. Anup K. Ghosh. E-Commerce Security and Privacy. – М.: , 0. – 0 с. Joey F. George. Computers in Society. – М.: , 0. – 0 с. George Mohay, Alison Anderson, Byron Collie, Olivier de Vel, Rod McKemmish. Computer and Intrusion Forensics (Artech House Computer Security Series). – М.: , 0. – 0 с. Vesna Hassler. Security Fundamentals for E-Commerce (Artech House Computer Security Series). – М.: , 0. – 0 с. G. David Garson, G. David Information Technology and Computer Applications in Garson. Public Information Technology: Policy and Management Issues. – М.: , 0. – 0 с. Thomas Peltier, Thomas Pelitier, Justin Peltier, John A. Blackley, Peltier, Associates. Information Security Fundamentals. – М.: , 0. – 0 с. Steven R. Gordon, Dr. Steven Gordon. Computing Information Technology: The Human Side. – М.: , 0. – 0 с. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с. The Security Economy (Safety Standards Series:). – М.: , 2004. – 0 с. Christopher A. Crayton. Security + Exam Guide (Testtaker's Guide Series). – М.: , 2003. – 0 с. Larry E. Rittenberg. Auditing Concepts for Changing Environment. – М.: , 2003. – 0 с. Gordon E. Smith. E-Commerce: A Control and Security Guide. – М.: , 2003. – 0 с. Economics of Information Security (Advances in Information Security). – М.: , 2004. – 0 с. Edward Borodzicz. Risk, Crisis and Security Management. – М.: , 2005. – 0 с. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с. Rickland Hollar. Enterprise Web Services Security (Internet Series). – М.: , 2005. – 432 с. Ron Ben Natan. Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase. – М.: , 2005. – 432 с. Jim Stewart. SAP Security: SAP Security Essentials. – М.: Equity Press, 2005. – 136 с. Committee on Federal Regulation of Securities Committee. The Fund Director's Guidebook: Third Edition (Fund Director's Guidebook). – М.: , 2006. – 128 с. House of Commons - Environmental Audit Committee. Reaching an International Agreement on Climate Change (Hc 355, Sixth Report of Session 2007-08 - Report, Together With Formal Minutes, Oral and Written Evidence). – М.: , 2008. – 179 с. Bruce Schneier. Schneier on Security. – М.: , 2008. – 336 с. Meridian Securities Market. World Stock Exchange Fact Book. – М.: , 2008. – 0 с. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с. John Rittinghouse, James Ransome. Cloud Computing: Implementation, Management, and Security. – М.: CRC Press, 2009. – 340 с. Andy Jones. Risk Management for Computer Security. – М.: , 2010. – 296 с. IT Audit, Control and Security. – М.: , 2010. – 792 с. Bryan Pfaffenberger. Webster?s New WorldTM Computer Dictionary. – М.: , 2003. – 432 с. Kevin D. Mitnick. The Art of Intrusion. – М.: , 2005. – 270 с. iSafe. i–SAFE Internet Life Skills Activities. – М.: , 2010. – 160 с. T. Bradley. Essential Computer Security: Everyone's Guide to Email, Internet, andWireless Security. – М.: , 2010. – 0 с. Ron Ben Natan. Implementing Database Security and Auditing. – М.: , 2010. – 432 с. Tony Flick, Justin Morehouse. Securing the Smart Grid: Next Generation Power Grid Security. – М.: Рид Элсивер, 2011. – 320 с. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с. Compsec. Compsec 1995 - The Twelfth World Conference of Comp Security Audit. – М.: , 2010. – 0 с. John R. Vacca. Computer and Information Security Handbook. – М.: , 2010. – 928 с. John M. Carroll. Computer Security. – М.: , 2010. – 648 с. Alan G. Konheim. Computer Security and Cryptography. – М.: , 1972. – 0 с. Computer Security Handbook. – М.: , 2002. – 1224 с. MJ COMPUTER. Ball Data Processing In Medicine: How To Select A Computerized Hospital Information Systm. – М.: , 1973. – 0 с. Dieter Gollmann. Computer Security. – М.: , 1998. – 336 с. CA TM. Simple Computer Security. – М.: , 2007. – 332 с. ED. Personal Computer Security. – М.: , 1996. – 360 с. Ben Halpert. Auditing Cloud Computing. – М.: , 2011. – 208 с. RH BAKER. Baker ?computer Security? Handbook. – М.: , 1985. – 288 с. Hutt. Computer Security Handbook, 3rd Edition, 2000 Cumu lative Supplement. – М.: , 2000. – 112 с. Deborah Russell. Computer Security Basics. – М.: , 1991. – 464 с. Computer Security Handbook. – М.: , 1995. – 1088 с. S MUFTIC. Muftic: ?security? Mechanisms For Computer Network S. – М.: , 1989. – 196 с. R COMPUTERS. Dehaene Computers In Radiology. – М.: , 1971. – 0 с. Apple Computer. Learning Carbon. – М.: , 2001. – 360 с. KW DAVIS. Davis ?auditing? Computer Applications – A Basic Systematic Approach. – М.: , 1982. – 602 с. Apple Computer. Learning Cocoa. – М.: , 2001. – 384 с. COMPUTER. Computer School ?mastering? Multiplan Tm (paper On Ly). – М.: , 1984. – 0 с. Center for Professional Computer Education. Multimate ProfessionalTM. – М.: , 1986. – 240 с. Center for Professional Computer Education. DisplayWrite III. – М.: , 1987. – 224 с. Center for Professional Computer Education. WordStar®. – М.: , 1987. – 192 с. Center for Professional Computer Education. LOTUS 1–2–3 Quick Reference Handbook. – М.: , 1986. – 240 с. COMPUTER PART. Computer Partners: Handbook Of Cobol Techniques & Programming Standards 3ed (pr Only). – М.: , 1993. – 0 с. S. Rao Vallabhaneni. Auditing Computer Security. – М.: , 1989. – 368 с. Principles Of Computer Security, Comptia Security+ And Beyond, Second Edition. – М.: , 2011. – 0 с. Hacking Exposed, Sixth Edition. – М.: , 2011. – 720 с. It Auditing Using Controls To Protect Information Assets, 2Nd Edition. – М.: , 2011. – 512 с. Mike Meyers' Comptia A+ Guide: Practical Application, Third Edition (Exam 220-702). – М.: , 2011. – 0 с. Computer Security: 20 Things Every Employee Should Know. – М.: , 2011. – 0 с. Mike Meyers' Comptia A+ Guide: Practical Application Lab Manual, Third Edition (Exam 220-702). – М.: , 2011. – 320 с. Principles Of Computer Security Comptia Security+ And Beyond Lab Manual, Second Edition. – М.: , 2011. – 352 с. Eoghan Casey. Digital Evidence and Computer Crime. – М.: , . – с. Inc. KT Solutions, KT Solutions has focused on what it takes to create efficient, professional multimedia training t KT Solutions specializes in the development of interactive multimedia training products for computer applications. Over the past decade. Beginning Windows NT Workstation 4.0 (Microsoft Windows NT). – М.: , . – с. Inc. KT Solutions, KT Solutions has focused on what it takes to create efficient, professional multimedia training t KT Solutions specializes in the development of interactive multimedia training products for computer applications. Over the past decade. Advanced Word for Office 97 (Microsoft Word 97). – М.: , . – с. Dave Tyson. Security Convergence: Managing Enterprise Security Risk. – М.: , 2007. – 232 с. Tejbanta Singh Chingtham. A Computational Intelligence Paradigm. – М.: LAP Lambert Academic Publishing, 2010. – 60 с. Faraz Fatemi Moghaddam. Secure Cloud Computing with Client-Based Control System. – М.: LAP Lambert Academic Publishing, 2013. – 100 с. Glenn Wilkinson. Identification of Hostile TCP Traffic using Support Vector Machines. – М.: LAP Lambert Academic Publishing, 2010. – 80 с. E.O. Ibidunmoye and B.K. Alese. Game-Theoretic Analysis of Network Attack-Defense Interactions. – М.: LAP Lambert Academic Publishing, 2013. – 108 с. Firkhan Ali Hamid Ali. Vulnerability Analysis on the Computer Network Security. – М.: LAP Lambert Academic Publishing, 2010. – 72 с. Saima Munawar. Detection and Classification Of Normal and Anomaly IP Packet. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Ricardo Chaves. Secure Computing on Reconfigurable Systems. – М.: LAP Lambert Academic Publishing, 2010. – 212 с. Lamek Ronoh. Security Concern of Cloud Computing Models. – М.: LAP Lambert Academic Publishing, 2014. – 88 с. Homam El-Taj and Omar Amer. Network Alert Management System For IDS False Positive Reduction. – М.: LAP Lambert Academic Publishing, 2013. – 156 с. Ondrej Vanek. Computational Methods for Transportation Security. – М.: LAP Lambert Academic Publishing, 2014. – 244 с. Saad Ahmed Khan and Saif Ahmad. Security Implications of Cloud computing. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Sadia Marium. Analysis of the Security threats to Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 64 с. A. S. N. Chakravarthy. Password Authentication Using Associative Memories. – М.: LAP Lambert Academic Publishing, 2012. – 188 с. Md. Rabiul Islam,Md. Fayzur Rahman and Faculty of Electrical-Computer Engineering RUET Rajshahi Bang. IMPROVEMENT OF NOISE ROBUST SPEAKER IDENTIFICATION. – М.: LAP Lambert Academic Publishing, 2010. – 88 с. Cyrus Abanti Makori,Jane Onsongo and Lusiba Badru. ICT Security Applications. – М.: LAP Lambert Academic Publishing, 2012. – 112 с. Pallavali Radha Krishna Reddy and Gullapalli Sireesha. The Security Issues of Cloud Computing Over Normal & ITSector. – М.: LAP Lambert Academic Publishing, 2012. – 96 с. Rupali Pathak. Recent Advances In Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 72 с. Oluwafemi Osho and Victor Waziri. Conceptual Models and Simulation of Computer Worm Propagation. – М.: LAP Lambert Academic Publishing, 2013. – 116 с. Hassen Alsafi and Mohammed Azhruddin. The Security Issues for Smart Grids Applications on Cloud Computing. – М.: LAP Lambert Academic Publishing, 2013. – 60 с. Shivan Fazil Sabr. Cloud Computing Security. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Meysam Namayandeh. Development of Computer Ethical Framework for Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 132 с. Stephen Murove,S. B. Mangena and B. Jones. Firewall Evaluation:Models for Major Decisions in Computer Security. – М.: LAP Lambert Academic Publishing, 2014. – 236 с. Mafaz M. K. Al-Anezi and Najla B. I. Al-Dabagh. Multilayer Artificial Immune Systems for Intrusion & Malware Detection. – М.: LAP Lambert Academic Publishing, 2012. – 148 с. Aftab Yaseen,S. M. Zakariya and M. Q. Rafiq. Association Rules Mining for AIS based Classification. – М.: LAP Lambert Academic Publishing, 2013. – 100 с. Irfan Syamsuddin. Guidelines for Computer Forensics Investigations in Developing Country. – М.: LAP Lambert Academic Publishing, 2011. – 104 с. Muhammad Imran Tariq. SLA based Information Security Metrics in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2014. – 192 с. Paul Denys. Security of Personal Information in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 144 с. Khanyisa Malufu. E-Banking Security. – М.: LAP Lambert Academic Publishing, 2013. – 112 с. Dilan Aksoy and Hidayet Takc?. Character Level Authorship Attribution of Turkish Texts. – М.: LAP Lambert Academic Publishing, 2012. – 56 с. S. V. S. Kishore Kumar. Information Systems Audit And Security In Banking. – М.: LAP Lambert Academic Publishing, 2013. – 476 с. Лучшие результаты Ничего не найдено Дополнительные результаты Новый НДС при капитальном строительстве". интервью с В.С. Леви, заместителем генерального директора "Energy Consulting/Audit", руководителем налоговой практики. "Бюджетный учет", № 4, апрель 2006. Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Тигран Наталия, персонально в данную минуту бокал коньячка во благо Вас!!!