Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Mark B. Desman. Building an Information Security Awareness Program. – М.: , 0. – 0 с.
  2. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с.

Дополнительные результаты

  1. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с.
  2. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  3. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с.
  4. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с.
  5. Ellen Hoffman. Bankroll Your Future Retirement with Help from Uncle Sam, Second Edition. – М.: , 0. – 0 с.
  6. Marilyn R. Seymann. Managing the New Bank Technology: An Executive Blueprint for the Future (Glenlake Business Monographs). – М.: , 0. – 0 с.
  7. Alex Berozashvili. Women Entrepreneurship in Sweden: An Evaluation of the program "Support Women Entrepreneurs 2007-2009". – М.: , 2012. – 96 с.
  8. Daniel B. Cornfield, Randy Hodson. Worlds of Work: Building an International Sociology of Work (Plenum Studies in Work and Industry). – М.: , 0. – 0 с.
  9. Douglas Hearth, Janis K. Zaima, Janis Zaima. Contemporary Investments: Security and Portfolio Analysis. – М.: , 0. – 0 с.
  10. Eileen Moore Trauth. The Culture of An Information Economy: Influences and Impacts in the Republic of Ireland. – М.: , 0. – 0 с.
  11. Gerald Kovacich. The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition. – М.: , 0. – 0 с.
  12. Melissa Cook, Hewlett-Packard Professional Books. Building Enterprise Information Architecture: Reengineering Information Systems. – М.: , 0. – 0 с.
  13. Thomas Plummer. The Business of Fitness: Understanding the Financial Side of Owning a Fitness Business. – М.: , 0. – 0 с.
  14. Safe Schools: A Security and Loss Prevention Plan. – М.: , 0. – 0 с.
  15. Protecting Business Information : A Manager's Guide. – М.: , 0. – 0 с.
  16. Bill Smith. Buy a Business Close to Home. – М.: , 0. – 0 с.
  17. Dan L. Flores. The Retirement Revolution: A Strategic Guide to Understanding and Investing Lump Sum Distributions from Qualified Retirement Plans. – М.: , 0. – 0 с.
  18. Michael J. Earl, Oxford Institute of Information Management, Pa Consulting Group. Information Management: The Organizational Dimension. – М.: , 0. – 0 с.
  19. Charles J. Austin, Stuart B. Boxerman. Information Systems for Healthcare Management, Sixth Edition. – М.: , 0. – 0 с.
  20. Mark B. Desman. Building an Information Security Awareness Program. – М.: , 0. – 0 с.
  21. John M. D. Hunter. An Information Security Handbook (Computer Communications and Networks). – М.: , 0. – 0 с.
  22. Gerald L. Kovacich, Edward P. Halibozek. The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, First Edition. – М.: , 0. – 0 с.
  23. David Ferris, Larry Whipple, Larry C. Whipple. Building an Intelligent E-Business. – М.: , 0. – 0 с.
  24. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с.
  25. Marko Nordquist. Towards Improved Security Management Practice: Designing an Organizational Model Procedure for the Implementation of Information Security Management in Heterogeneous Information Management. – М.: , 0. – 0 с.
  26. Chris F. Kemerer, Chris L. Kemerer. Information Technology and Industrial Competitiveness: How It Shapes Competition. – М.: , 0. – 0 с.
  27. Christopher G. Pike. Virtual Monopoly: Building an Intellectual Property Strategy for Creative Advantage--From Patents to Trademarks, From Copyrights to Design Rights. – М.: , 0. – 0 с.
  28. Steve Purser. A Practical Guide to Managing Information Security (Artech House Technology Management Library). – М.: , 0. – 0 с.
  29. Physical Security and the Inspection Process. – М.: , 0. – 0 с.
  30. Effective Security Management, Fourth Edition (Effective Security Management). – М.: , 0. – 0 с.
  31. Robert M. Blonchek, Martin F. O'Neill. Act Like an Owner : Building an Ownership Culture. – М.: , 0. – 0 с.
  32. Daniel Jennings, Joseph Boyce. Information Assurance. – М.: , 0. – 0 с.
  33. Aspatore Books Staff, InsideTheMinds.com, Stephen Jones, T. Michael Glenn, Karen Edwards, Michael Linton, Jody Bilney, John Hayes, Richard Rivers, Richard Costello. Leading Marketers: Industry Leaders Share Their Knowledge on the Future of Marketing, Advertising and Building Successful Brands. – М.: Aspatore Books, 0. – 228 с.
  34. Robert C. Megantz. Technology Management : Developing and Implementing Effective Licensing Programs (Intellectual Property-General, Law, Accounting & Finance, Management, Licensing, Special Topics). – М.: , 0. – 0 с.
  35. Shannon Kinnard. Marketing with E mail: A Spam Free Guide to Increasing Sales, Building Loyalty, and Increasing Awareness. – М.: , 0. – 0 с.
  36. Elizabeth Eisner Reding. Building an E-Business: From the Ground Up. – М.: , 0. – 0 с.
  37. James R. Sanders. Evaluating School Programs: An Educator's Guide. – М.: , 0. – 0 с.
  38. Lorraine Barbarash. Multicultural Games. – М.: , 0. – 0 с.
  39. Edward C. Schumacher, Timothy L. Seiler. Building Your Endowment (Jossey-Bass Nonprofit and Public Management Series). – М.: , 0. – 0 с.
  40. Lynda S. Moerschbaecher, Barbara G. Hammerman, James Soft, James C. Soft. Building an Endowment: Right from the Start. – М.: , 0. – 0 с.
  41. Marian Quigley, Marian Quiqley. Information Security and Ethics: Social and Organizational Issues. – М.: , 0. – 0 с.
  42. C. Warren Axelrod, Axelrod. Outsourcing Information Security. – М.: , 0. – 0 с.
  43. Harold F. Tipton, Micki Krause, Micki, Cissp Krause. Information Security Management Handbook, Fifth Edition. – М.: , 0. – 0 с.
  44. Thomas Peltier, Thomas Pelitier, Justin Peltier, John A. Blackley, Peltier, Associates. Information Security Fundamentals. – М.: , 0. – 0 с.
  45. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с.
  46. Aspatore Books. Corporate Security in the Information Age: Industry Leaders from Bose Corporation, Dow Jones, and more on Security Options, Protecting Assets, & Implementing a Strategy (Inside the Minds). – М.: , 2005. – 0 с.
  47. Timothy P. Layton Sr. Information Security Awareness. – М.: , 2005. – 0 с.
  48. Economics of Information Security (Advances in Information Security). – М.: , 2004. – 0 с.
  49. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с.
  50. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с.
  51. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с.
  52. Ira Winkler. Zen and the Art of Information Security. – М.: , 2007. – 192 с.
  53. Timothy P. Layton. Information Security. – М.: , 2006. – 222 с.
  54. Michael Gentile, Ron Collette, Tom August. The Ciso Handbook: A Practical Guide to Securing Your Company. – М.: , 2005. – 352 с.
  55. Michael E. Whitman, Herbert J. Mattord. Principles of Information Security, Second Edition. – М.: , 2004. – 600 с.
  56. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с.
  57. James Michael Stewart, Ed Tittel, Mike Chapple. CISSP: Certified Information Systems Security Professional Study Guide. – М.: , 2008. – 841 с.
  58. Social and Human Elements of Information Security: Emerging Trends and Countermeasures (Premier Reference Source). – М.: , 2008. – 412 с.
  59. Jennie Deneka. Creating an Informed Customer Service Model: Using Action Research. – М.: , 2008. – 104 с.
  60. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с.
  61. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с.
  62. Gerard Blokdijk, Ivanka Menken. Information Security Management Best Practice Workbook: Implementation and Management Roadmap for Threats, Challenges and Solutions - Ready to use supporting documents bringing Theory into Practice. – М.: , 2008. – 124 с.
  63. Hamid R. Nemati. Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues (Advances in Information Security and Privacy). – М.: , 2009. – 414 с.
  64. W. Krag Brotby. Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement. – М.: Auerbach Publications, 2009. – 200 с.
  65. Richard Goldhawk. Rookie's Guide to Profitable List Building: Learn How to Build an Effective Opt-In List for Profitable Internet Marketing. – М.: , 2009. – 116 с.
  66. Alan Calder. Information Security based on ISO 27001/ISO 27002: A Management Guide. – М.: , 2009. – 83 с.
  67. Jake Kouns, Daniel Minoli. Information Technology Risk Management in Enterprise Environments: A Review of Industry Practices and a Practical Guide to Risk Management Teams. – М.: , 2010. – 421 с.
  68. Bel G. Raggad. Information Security Management: Concepts and Practice. – М.: , 2010. – 871 с.
  69. Michael E. Whitman, Herbert J. Mattord. Management of Information Security. – М.: , 2010. – 592 с.
  70. Alan Calder, Steve G Watkins. Information Security Risk Management for ISO27001 / ISO27002. – М.: , 2010. – 198 с.
  71. William Manning. CISM Certified Information Security Manager Certification Exam Preparation Course in a Book for Passing the CISM Exam - The How To Pass on Your First Try Certification Study Guide. – М.: , 2010. – 188 с.
  72. Barbara Walters Price. Marketing Tools for Starting and Building an Appraisal Practice. – М.: , 2001. – 300 с.
  73. Evan Wheeler. Security Risk Management: Building an Information Security Risk Management Program from the Ground Up. – М.: , 2011. – 360 с.
  74. Editors Karl Maria Michael de Leeuw, Jan Bergstra. The History of Information Security: A Comprehensive Handbook. – М.: Elsevier Science, 2007. – 900 с.
  75. Global Perspectives In Information Security. – М.: , 2008. – 896 с.
  76. Francois Bancilhon. Building an Object-Oriented Database System. – М.: , 2010. – 640 с.
  77. John R. Vacca. Managing Information Security. – М.: , 2010. – 320 с.
  78. G. Manoilov. Elsevier's Dictionary of Information Security. – М.: , 2010. – 772 с.
  79. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с.
  80. George L Stefanek. Information Security Best Practices. – М.: , 2010. – 160 с.
  81. Sari Greene. Sustainable Information Security. – М.: , 2010. – 400 с.
  82. John R. Vacca. Computer and Information Security Handbook. – М.: , 2010. – 928 с.
  83. Sm Lynn–jones. Nuclear Diplomacy & Crisis Management – An International Security (Paper). – М.: , 1990. – 364 с.
  84. S Lynn–jones. Soviet Military Policy – An International Security Reader (Paper). – М.: , 1989. – 0 с.
  85. C W Shih. An Interactive Chinese Language Program – China?s Modern Writers Workbook. – М.: , 2002. – 208 с.
  86. S Lynn–jones. Lynn–jones: ?soviet? Military Policy – An International Security Reader (cloth). – М.: , 1989. – 0 с.
  87. Sm Lynn–jones. Nuclear Diplomacy & Crisis Management – An International Security Reader. – М.: , 1990. – 364 с.
  88. Krag Brotby. Information Security Governance. – М.: , 2009. – 190 с.
  89. Lester R Brown. Eco–Economy – Building an Economy for the Earth. – М.: , 2002. – 0 с.
  90. Harry Moritz Schey. Div Grad Curl & All That – An Informal Text on Vector Calculus 2e. – М.: , 1993. – 176 с.
  91. Edward D Hess. Smart Growth – Building an Enduring Business by Managing the Risks of Growth. – М.: , 2010. – 224 с.
  92. Julie Bort. Building an Extranet. – М.: , 1997. – 326 с.
  93. Kenneth D. Weiss. Building an Import/Export Business. – М.: , 1997. – 304 с.
  94. Paul R. Thie. An Introduction to Linear Programming and Game Theory. – М.: , 1988. – 416 с.
  95. Kenneth D. Weiss. Building an Import/Export Business. – М.: , 1991. – 278 с.
  96. Kenneth D. Weiss. Building an Import/Export Business. – М.: , 1991. – 288 с.
  97. JOHN. Building an Intranet For Dummies. – М.: , 1997. – 384 с.
  98. Lester R Brown. Eco–Economy – Building an Economy for the Earth. – М.: , 2001. – 352 с.
  99. Hm Schey. Div, Grad, Curl and All That – An Informal Text on Vector Calculus 4e. – М.: , 2005. – 0 с.
  100. Eric R Wolf. Pathways of Power – Building an Anthropology of the Modern World. – М.: , 2001. – 486 с.
  101. Kenneth D. Weiss. Building an Import/Export Business. – М.: , 1997. – 288 с.
  102. Robyn Greenspan. You?re Being Googled! Building an Online Presence and Networking Strategy That Advances Your Career. – М.: , 2012. – 256 с.
  103. Kenneth D. Weiss. Building an Import/Export Business. – М.: , 1987. – 272 с.
  104. Kenneth D. Weiss. Building an Import/Export Business. – М.: , 1987. – 272 с.
  105. Harry Moritz Schey. Div Grad Curl & All That – An Informal Text on Vector Calculus 3e. – М.: , 1996. – 176 с.
  106. Build An Ebay Business Quicksteps. – М.: , 2011. – 240 с.
  107. Secure Metrics: A Beginners Guide. – М.: , 2011. – 400 с.
  108. Fundamentals Of Network Security. – М.: , 2011. – 672 с.
  109. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . –  с.
  110. Harold F. Tipton, Micki Krause. Information Security Management Handbook on CD-ROM, 2003 Edition. – М.: , . –  с.
  111. Yi Qian, James Joshi, David Tipper, Prashant Krishnamurthy. Information Assurance: Dependability and Security in Networked Systems. – М.: Morgan Kaufmann, 2007. – 576 с.
  112. Rohana Mohamad Rashid. Determining Influencing Factors of Information Security Culture. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  113. Amit Gosavi. An Energy Harvesting Aware Data Dissemination Strategy. – М.: LAP Lambert Academic Publishing, 2013. – 56 с.
  114. Shan Qiao. Evaluation of an HIV peer education program among Yi minority youth. – М.: Scholars' Press, 2014. – 296 с.
  115. Moira Gundu. An Information Appraoch To Household Food Security. – М.: LAP Lambert Academic Publishing, 2011. – 156 с.
  116. Katharina Leinius. An Imbalance between Security and Liberty?. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  117. Dimitrios Papadopoulos and Bernhard Hammerli. Positioning the roles, interfaces & processes in the InfoSec scene. – М.: LAP Lambert Academic Publishing, 2014. – 168 с.
  118. Yedji Mbangsoua and Dr. Freddie Acosta. Information Security and its Investment Justification. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  119. Yasser Alshehri. Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 156 с.
  120. Julien Shabani. Information Security for RFID Systems. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.
  121. Debasish Jena. On Protocols for Information Security Services. – М.: LAP Lambert Academic Publishing, 2011. – 136 с.
  122. Moawiah Assali,Jihad Bisoomi and Iyad Tumar. New Scheme in Security Policies. – М.: LAP Lambert Academic Publishing, 2014. – 72 с.
  123. Furhan Mehmood and Rajia Rafique. Information Security in Financial Organizations. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  124. Predrag Tasevski. Interactive Cyber Security Awareness Program. – М.: LAP Lambert Academic Publishing, 2012. – 184 с.
  125. Omar Zakaria. Information Security Culture. – М.: LAP Lambert Academic Publishing, 2013. – 248 с.
  126. Saeed Soltanmohammadi. Improving Information System Security by Evaluating Human Factors. – М.: LAP Lambert Academic Publishing, 2014. – 116 с.
  127. frankie tvrz and marijke coetzee. Information Security of a Bluetooth-enabled handheld device. – М.: LAP Lambert Academic Publishing, 2010. – 180 с.
  128. Musharrif Hussain and Sulman Mahmood. Secure Software and Comm. on Handheld Devices. – М.: LAP Lambert Academic Publishing, 2011. – 60 с.
  129. Ahmed AlNunu. How Much Information Security?. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  130. Jeffy Mwakalinga. A Framework for Adaptive Information Security Systems. – М.: LAP Lambert Academic Publishing, 2011. – 364 с.
  131. Meysam Namayandeh. Development of Computer Ethical Framework for Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 132 с.
  132. Muhammad Imran Tariq. SLA based Information Security Metrics in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2014. – 192 с.
  133. Kavitha Ramachandran and Sivadasan E. T. ICEdu : An Information Cloud for Educational Institutions. – М.: LAP Lambert Academic Publishing, 2014. – 72 с.
  134. Alpay Doruk. Security Review Program Requirements for Intrusion Management Systems. – М.: LAP Lambert Academic Publishing, 2010. – 88 с.
  135. Alaa Al-Deen Mohammed Hassan. Information Security Management. – М.: LAP Lambert Academic Publishing, 2013. – 188 с.
  136. Jun Zheng,Jiantao Gu and Hong Wang. Financial Management and Information Security of Independent Colleges. – М.: LAP Lambert Academic Publishing, 2014. – 256 с.
  137. Vesselina Stoytcheva. Business plan for a start-up of an information brokering company. – М.: LAP Lambert Academic Publishing, 2012. – 72 с.
  138. Ying Qian. Mitigating Information Security Risks during Operation Transition. – М.: LAP Lambert Academic Publishing, 2012. – 372 с.
  139. Kelley Stone. Creating an Information Sharing and Analysis Center. – М.: , 2015. – 144 с.
  140. Ban Mustafa and Najla Aldabagh. Building an Ontology Based Access Control Model for Multi-Agent System. – М.: , 2015. – 120 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Team-building как основа современных персонал-технологий. "Управление персоналом", № 3, февраль 2005.
  2. О качестве сервиса, связанного с запросами на медицинскую информацию. Medical Information Service?. А. Беденков, "Ремедиум", № 1, январь 2012.

Образцы работ

Тема и предметТип и объем работы
Последствия операции НАТО
Политология
Диплом
80 стр.
Слияния и поглощения Мировая и Российская практика
Мировая экономика
Диплом
99 стр.
Привлекательности труда в организации
Психология
Курсовая работа
35 стр.
Формирование системы экономической безопасности на Белоярской АЭС
Психофизиология
Диплом
96 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Елена
Марина, спасибо большое за проделанную работу!!! Я защитила диплом после вашего сопровождения на 5!