Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Mark B. Desman. Building an Information Security Awareness Program. – М.: , 0. – 0 с. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с. Дополнительные результаты Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с. Ellen Hoffman. Bankroll Your Future Retirement with Help from Uncle Sam, Second Edition. – М.: , 0. – 0 с. Marilyn R. Seymann. Managing the New Bank Technology: An Executive Blueprint for the Future (Glenlake Business Monographs). – М.: , 0. – 0 с. Alex Berozashvili. Women Entrepreneurship in Sweden: An Evaluation of the program "Support Women Entrepreneurs 2007-2009". – М.: , 2012. – 96 с. Daniel B. Cornfield, Randy Hodson. Worlds of Work: Building an International Sociology of Work (Plenum Studies in Work and Industry). – М.: , 0. – 0 с. Douglas Hearth, Janis K. Zaima, Janis Zaima. Contemporary Investments: Security and Portfolio Analysis. – М.: , 0. – 0 с. Eileen Moore Trauth. The Culture of An Information Economy: Influences and Impacts in the Republic of Ireland. – М.: , 0. – 0 с. Gerald Kovacich. The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition. – М.: , 0. – 0 с. Melissa Cook, Hewlett-Packard Professional Books. Building Enterprise Information Architecture: Reengineering Information Systems. – М.: , 0. – 0 с. Thomas Plummer. The Business of Fitness: Understanding the Financial Side of Owning a Fitness Business. – М.: , 0. – 0 с. Safe Schools: A Security and Loss Prevention Plan. – М.: , 0. – 0 с. Protecting Business Information : A Manager's Guide. – М.: , 0. – 0 с. Bill Smith. Buy a Business Close to Home. – М.: , 0. – 0 с. Dan L. Flores. The Retirement Revolution: A Strategic Guide to Understanding and Investing Lump Sum Distributions from Qualified Retirement Plans. – М.: , 0. – 0 с. Michael J. Earl, Oxford Institute of Information Management, Pa Consulting Group. Information Management: The Organizational Dimension. – М.: , 0. – 0 с. Charles J. Austin, Stuart B. Boxerman. Information Systems for Healthcare Management, Sixth Edition. – М.: , 0. – 0 с. Mark B. Desman. Building an Information Security Awareness Program. – М.: , 0. – 0 с. John M. D. Hunter. An Information Security Handbook (Computer Communications and Networks). – М.: , 0. – 0 с. Gerald L. Kovacich, Edward P. Halibozek. The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, First Edition. – М.: , 0. – 0 с. David Ferris, Larry Whipple, Larry C. Whipple. Building an Intelligent E-Business. – М.: , 0. – 0 с. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с. Marko Nordquist. Towards Improved Security Management Practice: Designing an Organizational Model Procedure for the Implementation of Information Security Management in Heterogeneous Information Management. – М.: , 0. – 0 с. Chris F. Kemerer, Chris L. Kemerer. Information Technology and Industrial Competitiveness: How It Shapes Competition. – М.: , 0. – 0 с. Christopher G. Pike. Virtual Monopoly: Building an Intellectual Property Strategy for Creative Advantage--From Patents to Trademarks, From Copyrights to Design Rights. – М.: , 0. – 0 с. Steve Purser. A Practical Guide to Managing Information Security (Artech House Technology Management Library). – М.: , 0. – 0 с. Physical Security and the Inspection Process. – М.: , 0. – 0 с. Effective Security Management, Fourth Edition (Effective Security Management). – М.: , 0. – 0 с. Robert M. Blonchek, Martin F. O'Neill. Act Like an Owner : Building an Ownership Culture. – М.: , 0. – 0 с. Daniel Jennings, Joseph Boyce. Information Assurance. – М.: , 0. – 0 с. Aspatore Books Staff, InsideTheMinds.com, Stephen Jones, T. Michael Glenn, Karen Edwards, Michael Linton, Jody Bilney, John Hayes, Richard Rivers, Richard Costello. Leading Marketers: Industry Leaders Share Their Knowledge on the Future of Marketing, Advertising and Building Successful Brands. – М.: Aspatore Books, 0. – 228 с. Robert C. Megantz. Technology Management : Developing and Implementing Effective Licensing Programs (Intellectual Property-General, Law, Accounting & Finance, Management, Licensing, Special Topics). – М.: , 0. – 0 с. Shannon Kinnard. Marketing with E mail: A Spam Free Guide to Increasing Sales, Building Loyalty, and Increasing Awareness. – М.: , 0. – 0 с. Elizabeth Eisner Reding. Building an E-Business: From the Ground Up. – М.: , 0. – 0 с. James R. Sanders. Evaluating School Programs: An Educator's Guide. – М.: , 0. – 0 с. Lorraine Barbarash. Multicultural Games. – М.: , 0. – 0 с. Edward C. Schumacher, Timothy L. Seiler. Building Your Endowment (Jossey-Bass Nonprofit and Public Management Series). – М.: , 0. – 0 с. Lynda S. Moerschbaecher, Barbara G. Hammerman, James Soft, James C. Soft. Building an Endowment: Right from the Start. – М.: , 0. – 0 с. Marian Quigley, Marian Quiqley. Information Security and Ethics: Social and Organizational Issues. – М.: , 0. – 0 с. C. Warren Axelrod, Axelrod. Outsourcing Information Security. – М.: , 0. – 0 с. Harold F. Tipton, Micki Krause, Micki, Cissp Krause. Information Security Management Handbook, Fifth Edition. – М.: , 0. – 0 с. Thomas Peltier, Thomas Pelitier, Justin Peltier, John A. Blackley, Peltier, Associates. Information Security Fundamentals. – М.: , 0. – 0 с. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с. Aspatore Books. Corporate Security in the Information Age: Industry Leaders from Bose Corporation, Dow Jones, and more on Security Options, Protecting Assets, & Implementing a Strategy (Inside the Minds). – М.: , 2005. – 0 с. Timothy P. Layton Sr. Information Security Awareness. – М.: , 2005. – 0 с. Economics of Information Security (Advances in Information Security). – М.: , 2004. – 0 с. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с. Ira Winkler. Zen and the Art of Information Security. – М.: , 2007. – 192 с. Timothy P. Layton. Information Security. – М.: , 2006. – 222 с. Michael Gentile, Ron Collette, Tom August. The Ciso Handbook: A Practical Guide to Securing Your Company. – М.: , 2005. – 352 с. Michael E. Whitman, Herbert J. Mattord. Principles of Information Security, Second Edition. – М.: , 2004. – 600 с. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с. James Michael Stewart, Ed Tittel, Mike Chapple. CISSP: Certified Information Systems Security Professional Study Guide. – М.: , 2008. – 841 с. Social and Human Elements of Information Security: Emerging Trends and Countermeasures (Premier Reference Source). – М.: , 2008. – 412 с. Jennie Deneka. Creating an Informed Customer Service Model: Using Action Research. – М.: , 2008. – 104 с. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с. Gerard Blokdijk, Ivanka Menken. Information Security Management Best Practice Workbook: Implementation and Management Roadmap for Threats, Challenges and Solutions - Ready to use supporting documents bringing Theory into Practice. – М.: , 2008. – 124 с. Hamid R. Nemati. Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues (Advances in Information Security and Privacy). – М.: , 2009. – 414 с. W. Krag Brotby. Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement. – М.: Auerbach Publications, 2009. – 200 с. Richard Goldhawk. Rookie's Guide to Profitable List Building: Learn How to Build an Effective Opt-In List for Profitable Internet Marketing. – М.: , 2009. – 116 с. Alan Calder. Information Security based on ISO 27001/ISO 27002: A Management Guide. – М.: , 2009. – 83 с. Jake Kouns, Daniel Minoli. Information Technology Risk Management in Enterprise Environments: A Review of Industry Practices and a Practical Guide to Risk Management Teams. – М.: , 2010. – 421 с. Bel G. Raggad. Information Security Management: Concepts and Practice. – М.: , 2010. – 871 с. Michael E. Whitman, Herbert J. Mattord. Management of Information Security. – М.: , 2010. – 592 с. Alan Calder, Steve G Watkins. Information Security Risk Management for ISO27001 / ISO27002. – М.: , 2010. – 198 с. William Manning. CISM Certified Information Security Manager Certification Exam Preparation Course in a Book for Passing the CISM Exam - The How To Pass on Your First Try Certification Study Guide. – М.: , 2010. – 188 с. Barbara Walters Price. Marketing Tools for Starting and Building an Appraisal Practice. – М.: , 2001. – 300 с. Evan Wheeler. Security Risk Management: Building an Information Security Risk Management Program from the Ground Up. – М.: , 2011. – 360 с. Editors Karl Maria Michael de Leeuw, Jan Bergstra. The History of Information Security: A Comprehensive Handbook. – М.: Elsevier Science, 2007. – 900 с. Global Perspectives In Information Security. – М.: , 2008. – 896 с. Francois Bancilhon. Building an Object-Oriented Database System. – М.: , 2010. – 640 с. John R. Vacca. Managing Information Security. – М.: , 2010. – 320 с. G. Manoilov. Elsevier's Dictionary of Information Security. – М.: , 2010. – 772 с. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с. George L Stefanek. Information Security Best Practices. – М.: , 2010. – 160 с. Sari Greene. Sustainable Information Security. – М.: , 2010. – 400 с. John R. Vacca. Computer and Information Security Handbook. – М.: , 2010. – 928 с. Sm Lynn–jones. Nuclear Diplomacy & Crisis Management – An International Security (Paper). – М.: , 1990. – 364 с. S Lynn–jones. Soviet Military Policy – An International Security Reader (Paper). – М.: , 1989. – 0 с. C W Shih. An Interactive Chinese Language Program – China?s Modern Writers Workbook. – М.: , 2002. – 208 с. S Lynn–jones. Lynn–jones: ?soviet? Military Policy – An International Security Reader (cloth). – М.: , 1989. – 0 с. Sm Lynn–jones. Nuclear Diplomacy & Crisis Management – An International Security Reader. – М.: , 1990. – 364 с. Krag Brotby. Information Security Governance. – М.: , 2009. – 190 с. Lester R Brown. Eco–Economy – Building an Economy for the Earth. – М.: , 2002. – 0 с. Harry Moritz Schey. Div Grad Curl & All That – An Informal Text on Vector Calculus 2e. – М.: , 1993. – 176 с. Edward D Hess. Smart Growth – Building an Enduring Business by Managing the Risks of Growth. – М.: , 2010. – 224 с. Julie Bort. Building an Extranet. – М.: , 1997. – 326 с. Kenneth D. Weiss. Building an Import/Export Business. – М.: , 1997. – 304 с. Paul R. Thie. An Introduction to Linear Programming and Game Theory. – М.: , 1988. – 416 с. Kenneth D. Weiss. Building an Import/Export Business. – М.: , 1991. – 278 с. Kenneth D. Weiss. Building an Import/Export Business. – М.: , 1991. – 288 с. JOHN. Building an Intranet For Dummies. – М.: , 1997. – 384 с. Lester R Brown. Eco–Economy – Building an Economy for the Earth. – М.: , 2001. – 352 с. Hm Schey. Div, Grad, Curl and All That – An Informal Text on Vector Calculus 4e. – М.: , 2005. – 0 с. Eric R Wolf. Pathways of Power – Building an Anthropology of the Modern World. – М.: , 2001. – 486 с. Kenneth D. Weiss. Building an Import/Export Business. – М.: , 1997. – 288 с. Robyn Greenspan. You?re Being Googled! Building an Online Presence and Networking Strategy That Advances Your Career. – М.: , 2012. – 256 с. Kenneth D. Weiss. Building an Import/Export Business. – М.: , 1987. – 272 с. Kenneth D. Weiss. Building an Import/Export Business. – М.: , 1987. – 272 с. Harry Moritz Schey. Div Grad Curl & All That – An Informal Text on Vector Calculus 3e. – М.: , 1996. – 176 с. Build An Ebay Business Quicksteps. – М.: , 2011. – 240 с. Secure Metrics: A Beginners Guide. – М.: , 2011. – 400 с. Fundamentals Of Network Security. – М.: , 2011. – 672 с. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . – с. Harold F. Tipton, Micki Krause. Information Security Management Handbook on CD-ROM, 2003 Edition. – М.: , . – с. Yi Qian, James Joshi, David Tipper, Prashant Krishnamurthy. Information Assurance: Dependability and Security in Networked Systems. – М.: Morgan Kaufmann, 2007. – 576 с. Rohana Mohamad Rashid. Determining Influencing Factors of Information Security Culture. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Amit Gosavi. An Energy Harvesting Aware Data Dissemination Strategy. – М.: LAP Lambert Academic Publishing, 2013. – 56 с. Shan Qiao. Evaluation of an HIV peer education program among Yi minority youth. – М.: Scholars' Press, 2014. – 296 с. Moira Gundu. An Information Appraoch To Household Food Security. – М.: LAP Lambert Academic Publishing, 2011. – 156 с. Katharina Leinius. An Imbalance between Security and Liberty?. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Dimitrios Papadopoulos and Bernhard Hammerli. Positioning the roles, interfaces & processes in the InfoSec scene. – М.: LAP Lambert Academic Publishing, 2014. – 168 с. Yedji Mbangsoua and Dr. Freddie Acosta. Information Security and its Investment Justification. – М.: LAP Lambert Academic Publishing, 2011. – 132 с. Yasser Alshehri. Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 156 с. Julien Shabani. Information Security for RFID Systems. – М.: LAP Lambert Academic Publishing, 2011. – 92 с. Debasish Jena. On Protocols for Information Security Services. – М.: LAP Lambert Academic Publishing, 2011. – 136 с. Moawiah Assali,Jihad Bisoomi and Iyad Tumar. New Scheme in Security Policies. – М.: LAP Lambert Academic Publishing, 2014. – 72 с. Furhan Mehmood and Rajia Rafique. Information Security in Financial Organizations. – М.: LAP Lambert Academic Publishing, 2010. – 68 с. Predrag Tasevski. Interactive Cyber Security Awareness Program. – М.: LAP Lambert Academic Publishing, 2012. – 184 с. Omar Zakaria. Information Security Culture. – М.: LAP Lambert Academic Publishing, 2013. – 248 с. Saeed Soltanmohammadi. Improving Information System Security by Evaluating Human Factors. – М.: LAP Lambert Academic Publishing, 2014. – 116 с. frankie tvrz and marijke coetzee. Information Security of a Bluetooth-enabled handheld device. – М.: LAP Lambert Academic Publishing, 2010. – 180 с. Musharrif Hussain and Sulman Mahmood. Secure Software and Comm. on Handheld Devices. – М.: LAP Lambert Academic Publishing, 2011. – 60 с. Ahmed AlNunu. How Much Information Security?. – М.: LAP Lambert Academic Publishing, 2010. – 68 с. Jeffy Mwakalinga. A Framework for Adaptive Information Security Systems. – М.: LAP Lambert Academic Publishing, 2011. – 364 с. Meysam Namayandeh. Development of Computer Ethical Framework for Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 132 с. Muhammad Imran Tariq. SLA based Information Security Metrics in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2014. – 192 с. Kavitha Ramachandran and Sivadasan E. T. ICEdu : An Information Cloud for Educational Institutions. – М.: LAP Lambert Academic Publishing, 2014. – 72 с. Alpay Doruk. Security Review Program Requirements for Intrusion Management Systems. – М.: LAP Lambert Academic Publishing, 2010. – 88 с. Alaa Al-Deen Mohammed Hassan. Information Security Management. – М.: LAP Lambert Academic Publishing, 2013. – 188 с. Jun Zheng,Jiantao Gu and Hong Wang. Financial Management and Information Security of Independent Colleges. – М.: LAP Lambert Academic Publishing, 2014. – 256 с. Vesselina Stoytcheva. Business plan for a start-up of an information brokering company. – М.: LAP Lambert Academic Publishing, 2012. – 72 с. Ying Qian. Mitigating Information Security Risks during Operation Transition. – М.: LAP Lambert Academic Publishing, 2012. – 372 с. Kelley Stone. Creating an Information Sharing and Analysis Center. – М.: , 2015. – 144 с. Ban Mustafa and Najla Aldabagh. Building an Ontology Based Access Control Model for Multi-Agent System. – М.: , 2015. – 120 с. Лучшие результаты Ничего не найдено Дополнительные результаты Team-building как основа современных персонал-технологий. "Управление персоналом", № 3, февраль 2005. О качестве сервиса, связанного с запросами на медицинскую информацию. Medical Information Service?. А. Беденков, "Ремедиум", № 1, январь 2012. Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Елена Марина, спасибо большое за проделанную работу!!! Я защитила диплом после вашего сопровождения на 5!