Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Wade Rathke. Citizen Wealth: Winning the Campaign to Save Working Families. – М.: , 2012. – 336 с. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с. Online Business All-In-One For Dummies. – М.: , 2012. – 704 с. Amanda Kay McVety. Enlightened Aid: U.S. Development as Foreign Policy in Ethiopia. – М.: , 2012. – 312 с. Kim D. H. Butler. Live Your Life Insurance: An Age-Old Approach Revitalized. – М.: , 2012. – 54 с. Almas Hesmati. The Economy of Southern Kurdistan (Global Economic Studies). – М.: , 2012. – 309 с. Martin Stone, Spencer Strauss. Secure Your Financial Future Investing in Real Estate. – М.: , 0. – 0 с. William Rini. Fundamentals of the Securities Industry. – М.: , 0. – 0 с. David F. Teitelbaum. The Procrastinator's Guide to Financial Security: How Anyone Over 40 Can Still Build a Strong Portfolio--and Retire Comfortably. – М.: , 0. – 0 с. Giorgio S. Questa. Fixed Income Analysis for the Global Financial Market: Money Market, Foreign Exchange, Securities, and Derivatives. – М.: Wiley, 1999. – 368 с. Paul Shaw. E-Business Privacy and Trust: Planning and Management Strategies. – М.: , 0. – 0 с. John Lauritz Larson. Internal Improvement: National Public Works and the Promise of Popular Government in the Early United States. – М.: , 0. – 0 с. Charles Ferguson. The Broadband Problem: Anatomy of a Market Failure and a Policy Dilemma. – М.: , 0. – 0 с. Jaime Millan, Nils-Henrik M. Von Der Fehr. Keeping the Lights On. – М.: , 0. – 0 с. Kokubun Ryosei, Wang Jisi. Rise of China and a Changing East Asian Order. – М.: , 0. – 0 с. Gil Eyal, Ivan Szelenyi, Eleanor R. Townsley. Making Capitalism Without Capitalists: Class Formation and Elite Struggles in Post-Communist Central Europe. – М.: , 0. – 0 с. Chip R. Bell. Managers as Mentors: Building Partnerships for Learning. – М.: Berrett-Koehler Publishers, 2002. – 220 с. Jim H. Houtz, Kathy Heasley. Seize the American Dream: 10 Entrepreneurial Success Strategies. – М.: , 0. – 0 с. Inside the Minds Staff, Wayne von Borstel, Glenn G. Kautt. The Invincibility Shield for Investors: Minimizing Losses, Maximizing Gains and Drafting a More Secure Financial Plan. – М.: , 0. – 0 с. Allen W., Ph.D. Smith. The Alleged Budget Surplus, Social Security, and Voodoo Economics. – М.: , 0. – 0 с. Pam Lassiter. The New Job Security. – М.: , 0. – 0 с. Chris Harris. Building Innovative Teams: Strategies and Tools for Developing and Integrating High Performance Innovative Groups. – М.: , 0. – 0 с. C. Fred Bergsten, Takatoshi Ito, Marcus Noland. No More Bashing: Building a New Japan-United States Economic Relationship. – М.: , 0. – 0 с. Gavin Cawthra. Securing South Africa's Democracy: Defense, Development and Security in Transition (International Political Economy Series). – М.: , 0. – 0 с. Renata Dwan, Oleksandr Pavliuk, Eastwest Institute. Building Security in the New States of Eurasia: Subregional Cooperation in the Former Soviet Space. – М.: , 0. – 0 с. Pam Parry. The Bottom Line: How to Build a Business Case for ISO 14001. – М.: , 0. – 0 с. Harry Browne. Fail-Safe Investing: Lifelong Financial Security in 30 Minutes. – М.: , 0. – 0 с. Allen W., Ph.D. Smith. The Alleged Budget Surplus, Social Security, & Voodoo Economics. – М.: , 0. – 0 с. David Gardner, Tom Gardner, Inc Motley Fool, Dayana Yochim, Robert Brokamp. The Motley Fool Personal Finance Workbook : A Foolproof Guide to Organizing Your Cash and Building Wealth. – М.: , 0. – 0 с. Les Abromovitz. Protecting and Rebuilding Your Retirement: Everything You Need to Do to Secure Your Financial Future. – М.: , 0. – 0 с. Max Boisot. Knowledge Assets: Securing Competitive Advantage in the Information Economy. – М.: , 0. – 0 с. Max H. Boisot. Knowledge Assets: Securing Competitive Advantage in the Information Economy. – М.: , 0. – 0 с. Mark B. Desman. Building an Information Security Awareness Program. – М.: , 0. – 0 с. David Ferris, Larry Whipple, Larry C. Whipple. Building an Intelligent E-Business. – М.: , 0. – 0 с. Mary Pat McCarthy, Stuart Campbell. Security Transformation: Digital Defense Strategies to Protect your Company's Reputation and Market Share. – М.: , 0. – 0 с. Christopher G. Pike. Virtual Monopoly: Building an Intellectual Property Strategy for Creative Advantage--From Patents to Trademarks, From Copyrights to Design Rights. – М.: , 0. – 0 с. Office & Office Building Security. – М.: , 0. – 0 с. The E-Commerce Book: Building the E-Empire (2nd Edition). – М.: , 0. – 0 с. Lillian D. Bjorseth. Breakthrough Networking: Building Relationships That Last, Second Edition. – М.: , 0. – 0 с. Geoff Craighead. High-Rise Security and Fire Life Safety, Second Edition. – М.: , 0. – 0 с. Lynda S. Moerschbaecher, Barbara G. Hammerman, James Soft, James C. Soft. Building an Endowment: Right from the Start. – М.: , 0. – 0 с. Jothy Rosenberg and David Remy. Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption. – М.: Sams, 2004. – 380 с. Matt Riggsby. Notes and Domino R5 Developer's Guide to Building Applications. – М.: , 0. – 0 с. Charles Carrington, Timothy Speed, Juanita Ellis, Steffano Korper. Enterprise Directory and Security Implementation Guide: Designing and Implementing Directories in Your Organization (The Korper and Ellis E-Commerce Books Series). – М.: , 0. – 0 с. John R. Vacca. Public Key Infrastructure: Building Trusted Applications and Web Services. – М.: , 0. – 0 с. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с. C.P.A. Michele Cagan. Everything Investing Book: Make Money, Plan Ahead, And Secure Your Financial Future! (Everything: Business and Personal Finance). – М.: , 2005. – 0 с. Carolyn Janik. Making Money in Real Estate: How to Build Financial Independence With Residential and Commercial Property. – М.: , 2003. – 0 с. Steven Podnos. Building And Preserving Your Wealth: A Practical Guide To Financial Planning For Affluent Investors. – М.: , 2005. – 0 с. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с. Seni Hazzan. Rebuilding from Ground Zero, An Empowering Guide to Building and Securing Wealth. – М.: , 2003. – 0 с. Building the E-Service Society : E-Commerce, E-Business, and E-Government (IFIP International Federation for Information Processing). – М.: , 2004. – 0 с. Clayton C. Peddy, Derek Armentrout. Building Solutions with Microsoft Commerce Server 2002. – М.: Microsoft Press, 2003. – 656 с. Rickland Hollar. Enterprise Web Services Security (Internet Series). – М.: , 2005. – 432 с. Ray Russell. An Introduction to Mutual Funds Worldwide (Securities Institute). – М.: , 2007. – 198 с. Betty E. Biringer, Rudolph V. Matalucci, Sharon L. O'Connor. Security Risk Assessment and Management: A Professional Practice Guide for Protecting Buildings and Infrastructures. – М.: , 2007. – 384 с. Editor Robert I. Rotberg. Building a New Afghanistan. – М.: Brookings Institution Press, 2007. – 256 с. From the editors of Kiplingers Personal Finance Magazine. Retire Worry-Free: Money-Smart Ways to Build the Nest Egg You'll Need (Retire Worry Free). – М.: , 2005. – 288 с. Ron Carson, Steve Sanduski. Tested in the Trenches: A 9-Step Plan for Building and Sustaining a Million-Dollar Financial Services Practice. – М.: , 2005. – 288 с. Robert M. Doroghazi, Dan W. French. The Physician's Guide To Investing: A Practical Approach To Building Wealth. – М.: , 2005. – 228 с. Michael Gentile, Ron Collette, Tom August. The Ciso Handbook: A Practical Guide to Securing Your Company. – М.: , 2005. – 352 с. Protection of Civilian Infrastructure from Acts of Terrorism (NATO Security through Science Series / NATO Security through Science Series C: Environmental Security). – М.: , 2006. – 269 с. Fred A. Cummins. Building the Agile Enterprise: With SOA, BPM and MBM (The MK/OMG Press). – М.: , 2008. – 336 с. Building High-Performance People and Organizations [Three Volumes]. – М.: , 2008. – 832 с. James Michael Stewart, Ed Tittel, Mike Chapple. CISSP: Certified Information Systems Security Professional Study Guide. – М.: , 2008. – 841 с. Signe-Mary McKernan, Michael Sherraden. Asset Building and Low-Income Families. – М.: , 2008. – 300 с. Sustainable Use and Development of Watersheds (NATO Science for Peace and Security Series C: Environmental Security). – М.: , 2008. – 532 с. The Editors of Apartment Building Management Insider. Apartment Management Compliance and Profitability Guide. – М.: , 2008. – 716 с. Bishara A. Bahbah. Wealth Management in Any Market: Timeless Strategies for Building Financial Security. – М.: , 2009. – 300 с. Bob LeVitus, Jeff Evans. WebMaster Windows: How to Build Your Own World Wide Web Server Without Really Trying (+ CD-ROM). – М.: AP Professional, 1997. – 512 с. Alexander Lohr. Measurability of IT/IT-Security: Business process mapping as technical systems. – М.: , 2010. – 56 с. Evan Wheeler. Security Risk Management: Building an Information Security Risk Management Program from the Ground Up. – М.: , 2011. – 360 с. Padmashree Gehl Sampath, Banji Oyeyinka. The Gene Revolution and Global Food Security: Biotechnology Innovation in Latecomers. – М.: , 2010. – 288 с. Edward Luis. Office & Office Building Security. – М.: , 2010. – 256 с. Mark S. Merkow. Building SET Applications for Secure Transactions. – М.: , 1998. – 416 с. Jahanzeb Khan. Building Secure Wireless Networks with 802.11. – М.: , 2003. – 352 с. Microsoft. Building Secure Microsoft ASP .NET Applications. – М.: , 2003. – 624 с. Building Security. – М.: , 2004. – 672 с. Locksmith And Security Professionals' Exam Study Guide. – М.: , 2011. – 368 с. Applied Oracle Security: Developing Secure Database And Middleware Environments. – М.: , 2011. – 640 с. Oracle Database 11G Building Xml Applications. – М.: , 2011. – 416 с. Principles Of Computer Security Comptia Security+ And Beyond Lab Manual, Second Edition. – М.: , 2011. – 352 с. Fundamentals Of Network Security. – М.: , 2011. – 672 с. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . – с. Jan De Clercq, JAN DE CLERCQ. Windows Server 2003 Security Infrastructures : Core Security Features. – М.: , . – с. Yi Qian, James Joshi, David Tipper, Prashant Krishnamurthy. Information Assurance: Dependability and Security in Networked Systems. – М.: Morgan Kaufmann, 2007. – 576 с. Timothy Stapko. Practical Embedded Security: Building Secure Resource-Constrained Systems. – М.: Newnes, 2007. – 480 с. Todd S. Phillips, Michael A. Griebel. Building Type Basics for Justice Facilities. – М.: Wiley, 2003. – 336 с. Subi Khan and R.P. Mahapatra. SQL Injection Attack and Countermeasures. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Ronan O'Driscoll. Internet Controlled Security Robot. – М.: LAP Lambert Academic Publishing, 2014. – 52 с. Girish Gujar,P. K. Ghosh and Hong Yan. Maritime Security: A New Outlook. – М.: LAP Lambert Academic Publishing, 2014. – 216 с. Goshu Wolde Tefera. Women’s Participation in Ensuring Food Security at household level. – М.: LAP Lambert Academic Publishing, 2014. – 100 с. Amit Roy and Suhrita Chakrabarty. Institution Building and Women Empowerment for Livelihood Enhancement. – М.: LAP Lambert Academic Publishing, 2011. – 68 с. John Igene. Capacity Building for Food Security in Nigeria: The Missing Links. – М.: LAP Lambert Academic Publishing, 2010. – 96 с. Mustafa Zuhaer Nayef Al-Dabagh. Security Robot System for Intelligent Building. – М.: LAP Lambert Academic Publishing, 2014. – 120 с. Paul Holland. International Security & Failed States. – М.: LAP Lambert Academic Publishing, 2012. – 68 с. Katharina Leinius. An Imbalance between Security and Liberty?. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Steeve Nzegho Dieko. The Contribution of Democracy to Peace-Building in Iraq. – М.: LAP Lambert Academic Publishing, 2012. – 480 с. Gintaras Kavarskas. Security in the United Kingdom and the United States of America. – М.: LAP Lambert Academic Publishing, 2014. – 104 с. Anna Lefatshe Moagi. A Gendered Perspective on Challenges Surrounding Land Tenure Security. – М.: LAP Lambert Academic Publishing, 2010. – 76 с. Chukwudi Oparaku. Implication of BOKO HARAM ACTIVITIES for national security in Nigeria. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Ioana Ban. Black Sea Region: A Nascent Security Community?. – М.: LAP Lambert Academic Publishing, 2010. – 68 с. Patrick Maluki. Peace Building Strategies And Sustainable Peace In Rwanda And Burundi. – М.: Scholars' Press, 2014. – 184 с. Nuno Canas Mendes and Andre Saramago. Dimensions of State-Building. – М.: LAP Lambert Academic Publishing, 2012. – 272 с. Kwang Ho Chun. Democratic Peace Building and Security in East Asia. – М.: LAP Lambert Academic Publishing, 2011. – 288 с. Ruzian Markom. Financing Build Operate Transfer Projects: An Islamic Legal Analysis. – М.: LAP Lambert Academic Publishing, 2014. – 288 с. Chirag Sharma. Efficient Watermarking Technique for Quality Loss of Data. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Xiaodong He. Automated intrusion prevention mechanism in enhancing network security. – М.: Scholars' Press, 2014. – 128 с. Shilpa Jaiswal. Elimination of Security Threats Using Trusted Proactive Routing. – М.: LAP Lambert Academic Publishing, 2014. – 56 с. Pramod Damle. IT Security Training in Indian Banks. – М.: Scholars' Press, 2013. – 380 с. Volkan ERTURK,Dr. Ali ARIFOGLU and Dr. Attila OZGIT. A Framework Based On Continuous Security Monitoring. – М.: LAP Lambert Academic Publishing, 2010. – 148 с. Moawiah Assali,Jihad Bisoomi and Iyad Tumar. New Scheme in Security Policies. – М.: LAP Lambert Academic Publishing, 2014. – 72 с. Tanveer Zia. A Security Framework for Wireless Sensor Networks (WSN). – М.: LAP Lambert Academic Publishing, 2013. – 160 с. Firas Abdullah Thweny Al-Saedi,Mohammed Zeki Al-Faiz and Zaid Hashim Jaber. Building a Wired LAN-Based Mobile Vehicle Interface. – М.: LAP Lambert Academic Publishing, 2014. – 100 с. Komunte Mary and Prof Venansius Baryamureeba. Web Security. – М.: LAP Lambert Academic Publishing, 2010. – 140 с. Kerem Beygo and Cihan Eraslan. Enhancing Security and Usability Features of NFC. – М.: LAP Lambert Academic Publishing, 2010. – 68 с. Embaye Kidanu,Haileselassie Amare and Mikinay Hailemariam. Food Security and Capacity Building for Sustainable Livelihood. – М.: LAP Lambert Academic Publishing, 2012. – 56 с. Subrahmanian Muthuraman and Anjani N. Build Behaviour Model for Temporary Employees. – М.: LAP Lambert Academic Publishing, 2012. – 252 с. Ying Qian. Mitigating Information Security Risks during Operation Transition. – М.: LAP Lambert Academic Publishing, 2012. – 372 с. Olusola Makinde. Spatial Organisation of High Court Buildings in south western Nigeria. – М.: LAP Lambert Academic Publishing, 2013. – 68 с. Hyellamada Samuel. Security Watch in Bus Terminus Design. – М.: LAP Lambert Academic Publishing, 2015. – 128 с. Sanjay Srivastava. Alleviating Rural Poverty and Food Security in Changing Climate. – М.: LAP Lambert Academic Publishing, 2010. – 96 с. Ban Mustafa and Najla Aldabagh. Building an Ontology Based Access Control Model for Multi-Agent System. – М.: , 2015. – 120 с. Дополнительные результаты David A. Aaker. Building Strong Brands. – М.: Free Press, 1995. – 400 с. Thomas Stridsman. Tradings Systems That Work: Building and Evaluating Effective Trading Systems. – М.: McGraw-Hill, 2000. – 358 с. Wade Rathke. Citizen Wealth: Winning the Campaign to Save Working Families. – М.: , 2012. – 336 с. Francis Groves. Corporate Actions - A Concise Guide: An introduction to securities events. – М.: , 2012. – 230 с. Gordon Curphy, Robert Hogan. The Rocket Model: Practical Advice for Building High Performing Teams. – М.: , 2012. – 198 с. Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с. Michael J. Short. Planning for Tall Buildings. – М.: , 2012. – 240 с. Cynthia Fraser. Business Statistics for Competitive Advantage with Excel 2010: Basics, Model Building, and Cases. – М.: , 2012. – 485 с. Luciano Romero Mascarell. Peronism Or Peronism: The Strategy of Dominance. Fiscal Federalism and the Politics of Coalition-Building in Argentina. – М.: , 2012. – 128 с. Tan Yigitcanlar, Kostas Metaxiotis, Francisco Carrillo. Building Prosperous Knowledge Cities: Policies, Plans and Metrics. – М.: , 2012. – 416 с. Data Privacy Management and Autonomous Spontaneus Security: 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, ... Computer Science / Security and Cryptology). – М.: , 2012. – 334 с. Security and Privacy in Mobile Information and Communication Systems: Third International ICST Conference, MOBISEC 2011, Aalborg, Denmark, May 17-19, ... and Telecommunications Engineering). – М.: , 2012. – 195 с. Constructive Side-Channel Analysis and Secure Design: Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings ... Computer Science / Security and Cryptology). – М.: , 2012. – 280 с. Public Key Infrastructures, Services and Applications: 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected ... Computer Science / Security and Cryptology). – М.: , 2012. – 219 с. Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – М.: , 2012. – 283 с. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 515 с. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с. Smart Card Research and Advanced Applications: 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, ... Computer Science / Security and Cryptology). – М.: , 2012. – 357 с. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с. Paul Meshanko. The Respect Effect: Leveraging Culture, Emotions and Neuroscience to Build a Better Business. – М.: , 2012. – 144 с. Online Business All-In-One For Dummies. – М.: , 2012. – 704 с. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с. Amanda Kay McVety. Enlightened Aid: U.S. Development as Foreign Policy in Ethiopia. – М.: , 2012. – 312 с. Security and Development in Global Politics: A Critical Comparison. – М.: , 2012. – 360 с. Jacques C. Augustin. The Art and Craft of Building a Life Insurance Agency. – М.: , 2012. – 136 с. Joseph F. Stenken JD CLU ChFc. Social Security & Medicare Facts 2012. – М.: , 2012. – 451 с. Kim D. H. Butler. Live Your Life Insurance: An Age-Old Approach Revitalized. – М.: , 2012. – 54 с. Annie Pearce, Yong Han Ahn, HanmiGlobal Co Ltd. Sustainable Buildings and Infrastructure: Paths to the Future. – М.: , 2012. – 512 с. John Kador. Effective Apology: Mending Fences, Building Bridges, and Restoring Trust. – М.: , 2012. – 368 с. Michael Silverman. Capturing Community: How To Build, Manage, and Market Your Online Community. – М.: , 2012. – 180 с. Helio Fred Garcia. Power of Communication,The: Skills to Build Trust, Inspire Loyalty, and Lead Effectively. – М.: , 2012. – 336 с. Hazel Henderson. Building A Win-Win World: Life Beyond Global Economic Warfare. – М.: , 2012. – 676 с. Marnie L Pehrson. Trust Your Heart: Building Relationships That Build Your Business. – М.: , 2012. – 252 с. Donald N Lombardi. Building the Best Business Team (Volume 1). – М.: , 2012. – 24 с. Luis Lobo-Guerrero. Insuring Security: Biopolitics, security and risk. – М.: , 2012. – 178 с. Erika Napoletano. The Power of Unpopular: A Guide to Building Your Brand for the Audience Who Will Love You (and why no one else matters). – М.: , 2012. – 224 с. Chris Zook, James Allen. Repeatability: Build Enduring Businesses for a World of Constant Change. – М.: , 2012. – 288 с. Almas Hesmati. The Economy of Southern Kurdistan (Global Economic Studies). – М.: , 2012. – 309 с. CCH Editorial Staff. Social Security Explained 2012. – М.: , 2012. – 298 с. Securities Compliance Index. Securities Compliance Index, Second Edition: A Topical Guide To U.S. Securities Regulation. – М.: , 2012. – 512 с. Martin Stone, Spencer Strauss. Secure Your Financial Future Investing in Real Estate. – М.: , 0. – 0 с. William Rini. Fundamentals of the Securities Industry. – М.: , 0. – 0 с. David F. Teitelbaum. The Procrastinator's Guide to Financial Security: How Anyone Over 40 Can Still Build a Strong Portfolio--and Retire Comfortably. – М.: , 0. – 0 с. Giorgio S. Questa. Fixed Income Analysis for the Global Financial Market: Money Market, Foreign Exchange, Securities, and Derivatives. – М.: Wiley, 1999. – 368 с. Allen W., Ph.D. Smith. The Alleged Budget Surplus, Social Security, and Voodoo Economics. – М.: , 0. – 0 с. Pam Lassiter. The New Job Security. – М.: , 0. – 0 с. Chris Harris. Building Innovative Teams: Strategies and Tools for Developing and Integrating High Performance Innovative Groups. – М.: , 0. – 0 с. Gavin Cawthra. Securing South Africa's Democracy: Defense, Development and Security in Transition (International Political Economy Series). – М.: , 0. – 0 с. Renata Dwan, Oleksandr Pavliuk, Eastwest Institute. Building Security in the New States of Eurasia: Subregional Cooperation in the Former Soviet Space. – М.: , 0. – 0 с. Pam Parry. The Bottom Line: How to Build a Business Case for ISO 14001. – М.: , 0. – 0 с. Julia Lowell, C. R. Neu, Daochi Tong, National Defense Research Institute, National Security Research Institute. Financial Crises and Contagion in Emerging Market Countries. – М.: , 0. – 0 с. Allen W., Ph.D. Smith. The Alleged Budget Surplus, Social Security, & Voodoo Economics. – М.: , 0. – 0 с. Les Abromovitz. Protecting and Rebuilding Your Retirement: Everything You Need to Do to Secure Your Financial Future. – М.: , 0. – 0 с. Max Boisot. Knowledge Assets: Securing Competitive Advantage in the Information Economy. – М.: , 0. – 0 с. Max H. Boisot. Knowledge Assets: Securing Competitive Advantage in the Information Economy. – М.: , 0. – 0 с. Mark B. Desman. Building an Information Security Awareness Program. – М.: , 0. – 0 с. David Ferris, Larry Whipple, Larry C. Whipple. Building an Intelligent E-Business. – М.: , 0. – 0 с. Mary Pat McCarthy, Stuart Campbell. Security Transformation: Digital Defense Strategies to Protect your Company's Reputation and Market Share. – М.: , 0. – 0 с. Christopher G. Pike. Virtual Monopoly: Building an Intellectual Property Strategy for Creative Advantage--From Patents to Trademarks, From Copyrights to Design Rights. – М.: , 0. – 0 с. Office & Office Building Security. – М.: , 0. – 0 с. Joseph S. Nye, William A. Owens, James R. Schlesinger, R. James Woolsey, James A. Lewis, Joseph S., Jr. Nye, James Andrew Lewis, Erin Schlather, Csis Commission on Technology Security in the Twenty-First Century. Computer Exports and National Security: New Tools for a New Century : A Report of the Csis Commission on Technology Security in the 21St-Century (Csis Panel Reports.). – М.: , 0. – 0 с. Aspatore Books Staff, InsideTheMinds.com, Stephen Jones, T. Michael Glenn, Karen Edwards, Michael Linton, Jody Bilney, John Hayes, Richard Rivers, Richard Costello. Leading Marketers: Industry Leaders Share Their Knowledge on the Future of Marketing, Advertising and Building Successful Brands. – М.: Aspatore Books, 0. – 228 с. Lillian D. Bjorseth. Breakthrough Networking: Building Relationships That Last, Second Edition. – М.: , 0. – 0 с. Geoff Craighead. High-Rise Security and Fire Life Safety, Second Edition. – М.: , 0. – 0 с. Lynda S. Moerschbaecher, Barbara G. Hammerman, James Soft, James C. Soft. Building an Endowment: Right from the Start. – М.: , 0. – 0 с. Jothy Rosenberg and David Remy. Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption. – М.: Sams, 2004. – 380 с. Matt Riggsby. Notes and Domino R5 Developer's Guide to Building Applications. – М.: , 0. – 0 с. Charles Carrington, Timothy Speed, Juanita Ellis, Steffano Korper. Enterprise Directory and Security Implementation Guide: Designing and Implementing Directories in Your Organization (The Korper and Ellis E-Commerce Books Series). – М.: , 0. – 0 с. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с. Steven Podnos. Building And Preserving Your Wealth: A Practical Guide To Financial Planning For Affluent Investors. – М.: , 2005. – 0 с. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с. Seni Hazzan. Rebuilding from Ground Zero, An Empowering Guide to Building and Securing Wealth. – М.: , 2003. – 0 с. Building the E-Service Society : E-Commerce, E-Business, and E-Government (IFIP International Federation for Information Processing). – М.: , 2004. – 0 с. Clayton C. Peddy, Derek Armentrout. Building Solutions with Microsoft Commerce Server 2002. – М.: Microsoft Press, 2003. – 656 с. Rickland Hollar. Enterprise Web Services Security (Internet Series). – М.: , 2005. – 432 с. Betty E. Biringer, Rudolph V. Matalucci, Sharon L. O'Connor. Security Risk Assessment and Management: A Professional Practice Guide for Protecting Buildings and Infrastructures. – М.: , 2007. – 384 с. Editor Robert I. Rotberg. Building a New Afghanistan. – М.: Brookings Institution Press, 2007. – 256 с. From the editors of Kiplingers Personal Finance Magazine. Retire Worry-Free: Money-Smart Ways to Build the Nest Egg You'll Need (Retire Worry Free). – М.: , 2005. – 288 с. Committee on Federal Regulation of Securities Committee. The Fund Director's Guidebook: Third Edition (Fund Director's Guidebook). – М.: , 2006. – 128 с. Ron Carson, Steve Sanduski. Tested in the Trenches: A 9-Step Plan for Building and Sustaining a Million-Dollar Financial Services Practice. – М.: , 2005. – 288 с. Robert M. Doroghazi, Dan W. French. The Physician's Guide To Investing: A Practical Approach To Building Wealth. – М.: , 2005. – 228 с. Michael Gentile, Ron Collette, Tom August. The Ciso Handbook: A Practical Guide to Securing Your Company. – М.: , 2005. – 352 с. Emergency Capacity Building Project. Building Trust in Diverse Teams: The Toolkit for Emergency Response. – М.: , 2007. – 140 с. James Michael Stewart, Ed Tittel, Mike Chapple. CISSP: Certified Information Systems Security Professional Study Guide. – М.: , 2008. – 841 с. Signe-Mary McKernan, Michael Sherraden. Asset Building and Low-Income Families. – М.: , 2008. – 300 с. The Editors of Apartment Building Management Insider. Apartment Management Compliance and Profitability Guide. – М.: , 2008. – 716 с. Meridian Securities Market. World Stock Exchange Fact Book. – М.: , 2008. – 0 с. CompTIA Security+: Certification Kit (комплект из 3 книг + 2 CD-ROM). – М.: Sybex, 2009. – 1440 с. Bishara A. Bahbah. Wealth Management in Any Market: Timeless Strategies for Building Financial Security. – М.: , 2009. – 300 с. Evan Wheeler. Security Risk Management: Building an Information Security Risk Management Program from the Ground Up. – М.: , 2011. – 360 с. Chartered Institute of Building. Code of Practice for Project Management for Construction and Development. – М.: , 2009. – 304 с. Edward Luis. Office & Office Building Security. – М.: , 2010. – 256 с. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с. Mark S. Merkow. Building SET Applications for Secure Transactions. – М.: , 1998. – 416 с. Jahanzeb Khan. Building Secure Wireless Networks with 802.11. – М.: , 2003. – 352 с. Microsoft. Building Secure Microsoft ASP .NET Applications. – М.: , 2003. – 624 с. The National Building Museum. America?s 5 & 10 Cent Stores. – М.: , 1997. – 200 с. Building Security. – М.: , 2004. – 672 с. Locksmith And Security Professionals' Exam Study Guide. – М.: , 2011. – 368 с. Applied Oracle Security: Developing Secure Database And Middleware Environments. – М.: , 2011. – 640 с. Oracle Database 11G Building Xml Applications. – М.: , 2011. – 416 с. Principles Of Computer Security Comptia Security+ And Beyond Lab Manual, Second Edition. – М.: , 2011. – 352 с. Fundamentals Of Network Security. – М.: , 2011. – 672 с. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . – с. Jan De Clercq, JAN DE CLERCQ. Windows Server 2003 Security Infrastructures : Core Security Features. – М.: , . – с. Yi Qian, James Joshi, David Tipper, Prashant Krishnamurthy. Information Assurance: Dependability and Security in Networked Systems. – М.: Morgan Kaufmann, 2007. – 576 с. Timothy Stapko. Practical Embedded Security: Building Secure Resource-Constrained Systems. – М.: Newnes, 2007. – 480 с. Todd S. Phillips, Michael A. Griebel. Building Type Basics for Justice Facilities. – М.: Wiley, 2003. – 336 с. Subi Khan and R.P. Mahapatra. SQL Injection Attack and Countermeasures. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Ronan O'Driscoll. Internet Controlled Security Robot. – М.: LAP Lambert Academic Publishing, 2014. – 52 с. Girish Gujar,P. K. Ghosh and Hong Yan. Maritime Security: A New Outlook. – М.: LAP Lambert Academic Publishing, 2014. – 216 с. Goshu Wolde Tefera. Women’s Participation in Ensuring Food Security at household level. – М.: LAP Lambert Academic Publishing, 2014. – 100 с. Amit Roy and Suhrita Chakrabarty. Institution Building and Women Empowerment for Livelihood Enhancement. – М.: LAP Lambert Academic Publishing, 2011. – 68 с. John Igene. Capacity Building for Food Security in Nigeria: The Missing Links. – М.: LAP Lambert Academic Publishing, 2010. – 96 с. Mustafa Zuhaer Nayef Al-Dabagh. Security Robot System for Intelligent Building. – М.: LAP Lambert Academic Publishing, 2014. – 120 с. Paul Holland. International Security & Failed States. – М.: LAP Lambert Academic Publishing, 2012. – 68 с. Katharina Leinius. An Imbalance between Security and Liberty?. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Gintaras Kavarskas. Security in the United Kingdom and the United States of America. – М.: LAP Lambert Academic Publishing, 2014. – 104 с. Anna Lefatshe Moagi. A Gendered Perspective on Challenges Surrounding Land Tenure Security. – М.: LAP Lambert Academic Publishing, 2010. – 76 с. Chukwudi Oparaku. Implication of BOKO HARAM ACTIVITIES for national security in Nigeria. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Ioana Ban. Black Sea Region: A Nascent Security Community?. – М.: LAP Lambert Academic Publishing, 2010. – 68 с. Nuno Canas Mendes and Andre Saramago. Dimensions of State-Building. – М.: LAP Lambert Academic Publishing, 2012. – 272 с. Kwang Ho Chun. Democratic Peace Building and Security in East Asia. – М.: LAP Lambert Academic Publishing, 2011. – 288 с. Chirag Sharma. Efficient Watermarking Technique for Quality Loss of Data. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Xiaodong He. Automated intrusion prevention mechanism in enhancing network security. – М.: Scholars' Press, 2014. – 128 с. Shilpa Jaiswal. Elimination of Security Threats Using Trusted Proactive Routing. – М.: LAP Lambert Academic Publishing, 2014. – 56 с. Pramod Damle. IT Security Training in Indian Banks. – М.: Scholars' Press, 2013. – 380 с. Volkan ERTURK,Dr. Ali ARIFOGLU and Dr. Attila OZGIT. A Framework Based On Continuous Security Monitoring. – М.: LAP Lambert Academic Publishing, 2010. – 148 с. Moawiah Assali,Jihad Bisoomi and Iyad Tumar. New Scheme in Security Policies. – М.: LAP Lambert Academic Publishing, 2014. – 72 с. Tanveer Zia. A Security Framework for Wireless Sensor Networks (WSN). – М.: LAP Lambert Academic Publishing, 2013. – 160 с. Komunte Mary and Prof Venansius Baryamureeba. Web Security. – М.: LAP Lambert Academic Publishing, 2010. – 140 с. Kerem Beygo and Cihan Eraslan. Enhancing Security and Usability Features of NFC. – М.: LAP Lambert Academic Publishing, 2010. – 68 с. Embaye Kidanu,Haileselassie Amare and Mikinay Hailemariam. Food Security and Capacity Building for Sustainable Livelihood. – М.: LAP Lambert Academic Publishing, 2012. – 56 с. Ying Qian. Mitigating Information Security Risks during Operation Transition. – М.: LAP Lambert Academic Publishing, 2012. – 372 с. Olusola Makinde. Spatial Organisation of High Court Buildings in south western Nigeria. – М.: LAP Lambert Academic Publishing, 2013. – 68 с. Hyellamada Samuel. Security Watch in Bus Terminus Design. – М.: LAP Lambert Academic Publishing, 2015. – 128 с. Sanjay Srivastava. Alleviating Rural Poverty and Food Security in Changing Climate. – М.: LAP Lambert Academic Publishing, 2010. – 96 с. Лучшие результаты Ничего не найдено Дополнительные результаты Team-building как основа современных персонал-технологий. "Управление персоналом", № 3, февраль 2005. Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Наталья Здравствуйте, Марина! На днях я защитила диплом после вашего сопровождения на оценку "хорошо". Не без Вашей помощи. :) Спасибо! Желаю успехов в работе!!!