Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Ivanka Menken. Virtualization Architecture, Adoption and Monetization of Virtualization Projects using Best Practice Service Strategy, Service Design, Service Transition, ... and Continual Service Improvement Processes. – М.: , 2008. – 164 с.
  2. John Rittinghouse, James Ransome. Cloud Computing: Implementation, Management, and Security. – М.: CRC Press, 2009. – 340 с.
  3. Cheryl Price. Never Give Up : A biography of Thomas L. Thomas. – М.: , 2004. – 220 с.
  4. Ronald L. Krutz. Cloud Security. – М.: , 2010. – 384 с.
  5. Graham Speake. Securing the Cloud. – М.: , 2010. – 350 с.
  6. Tim Mather. Cloud Security and Privacy. – М.: , 2009. – 334 с.
  7. Vmware Vsphere 4 Implementation. – М.: , 2011. – 682 с.
  8. Microsoft® Sql Server 2008 R2 Analytics & Data Visualization. – М.: , 2011. – 576 с.
  9. Oracle Rman 11G Backup And Recovery. – М.: , 2011. – 688 с.
  10. Cloud Computing, A Practical Approach. – М.: , 2011. – 352 с.
  11. It Auditing Using Controls To Protect Information Assets, 2Nd Edition. – М.: , 2011. – 512 с.
  12. Windows 8 All-in-One For Dummies. – М.: , 2013. – 1080 с.
  13. Vivek Bhushan. Securing Published Data In Cloud Using Data Incognito. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  14. Isaac Gachugu. Architecture for Cloud-Based Rapid Application Development Framework. – М.: LAP Lambert Academic Publishing, 2013. – 116 с.
  15. Rajani Sharma and Rajender Trivedi. Data Security in a Cloud Environment using Multilevel UEC. – М.: LAP Lambert Academic Publishing, 2014. – 84 с.
  16. Anand Kannan. Evaluation of the Security Mechanisms in Cloud Networks. – М.: LAP Lambert Academic Publishing, 2013. – 192 с.
  17. T. Ambikadevi Amma. Inhibitors of Cloud Computing. – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  18. Yacouba Moumouni. Buffering PV Output During Cloud Transient with Energy Storage. – М.: LAP Lambert Academic Publishing, 2013. – 124 с.
  19. Adamu Usman. Cost-Benefit Analysis of Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  20. Srivaramangai Padmanabhan. Reliable Infrastructure for Cloud Computing. – М.: LAP Lambert Academic Publishing, 2013. – 100 с.
  21. Showkat Ahmad Kumar. Track Two Diplomacy In India-Pakistan Relations. – М.: LAP Lambert Academic Publishing, 2013. – 96 с.
  22. Cristinel Buzatu. Transnational Cooperation Against Human Trafficking. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  23. Faraz Fatemi Moghaddam. Secure Cloud Computing with Client-Based Control System. – М.: LAP Lambert Academic Publishing, 2013. – 100 с.
  24. Dmitry Khovratovich. New Methods in Symmetric Cryptanalysis. – М.: LAP Lambert Academic Publishing, 2011. – 220 с.
  25. Lane Thames. Advancing Cyber Security. – М.: LAP Lambert Academic Publishing, 2013. – 256 с.
  26. Wei Ren. Lightweight and Robust Security for Applications in Internet of Things. – М.: LAP Lambert Academic Publishing, 2013. – 188 с.
  27. Puneet Kumar. Cloud Computing. – М.: LAP Lambert Academic Publishing, 2013. – 60 с.
  28. Hossein Pour Taheri and Ab Razak Che Hussin. Cloud Base E-Commerce Trust Model. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  29. Lamek Ronoh. Security Concern of Cloud Computing Models. – М.: LAP Lambert Academic Publishing, 2014. – 88 с.
  30. Kun Ma. Advances in Multi-tenant Architecture. – М.: LAP Lambert Academic Publishing, 2014. – 96 с.
  31. Pavan Kumar Bollineni and Kumar Neupane. Implications for adopting cloud computing in e-Health. – М.: LAP Lambert Academic Publishing, 2011. – 88 с.
  32. Gunasekar Kumar and Anirudh Chelikani. Analysis of Security Issues in Cloud Based E-Learning. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  33. Raed Alsaqour and Yap Earn. Searchable Symmetric Encryption. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  34. Saad Ahmed Khan and Saif Ahmad. Security Implications of Cloud computing. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  35. Rajani Sharma and Rajender Trivedi. Secure Data Retrieval with token ensuring possession proof. – М.: LAP Lambert Academic Publishing, 2014. – 56 с.
  36. Sadia Marium. Analysis of the Security threats to Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  37. Ganesh Chandra Deka. Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 140 с.
  38. Pallavali Radha Krishna Reddy and Gullapalli Sireesha. The Security Issues of Cloud Computing Over Normal & ITSector. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  39. Sunil Kumar Jangir,Naveen Hemrajani and Monika Gupta. Fundamentals of Software Testing: An Overview. – М.: LAP Lambert Academic Publishing, 2013. – 124 с.
  40. Hassen Alsafi and Mohammed Azhruddin. The Security Issues for Smart Grids Applications on Cloud Computing. – М.: LAP Lambert Academic Publishing, 2013. – 60 с.
  41. Shahla Asadi and Elaheh Yadegaridehkordi. Customers perspectives on cloud computing adoption by Banking sector. – М.: LAP Lambert Academic Publishing, 2015. – 128 с.
  42. Shivan Fazil Sabr. Cloud Computing Security. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  43. Harish Vepuri. Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  44. Harjot Dhawan. A Road to Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  45. Rafal AL-Khashab. An Authentication Model for Cloud Computing Application. – М.: LAP Lambert Academic Publishing, 2014. – 104 с.
  46. Kefa Rabah. The Ultimate Ubuntu 14.04 LTS Server Installation and Administration. – М.: LAP Lambert Academic Publishing, 2014. – 352 с.
  47. Shinsuke Tamura. Elements of Schemes for Preserving Privacies in e-Society Systems. – М.: LAP Lambert Academic Publishing, 2015. – 156 с.
  48. Muhammad Imran Tariq. SLA based Information Security Metrics in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2014. – 192 с.
  49. Paul Denys. Security of Personal Information in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 144 с.
  50. Jeremiah Akita and Koudjo Koumadi. Evaluating Cloud Storage Security In Ghana. – М.: LAP Lambert Academic Publishing, 2014. – 104 с.
  51. Paolo Gasti. Privacy and Security of Internet Communications. – М.: LAP Lambert Academic Publishing, 2011. – 148 с.
  52. Alptekin Kupcu. Efficient Cryptography for the Next Generation Secure Cloud. – М.: LAP Lambert Academic Publishing, 2010. – 220 с.
  53. Khandakar Entenam Unayes Ahmed. IDENTITY AND ACCESS MANAGEMENT IN CLOUD COMPUTING. – М.: LAP Lambert Academic Publishing, 2011. – 172 с.
  54. Marco Balduzzi. Automated Measurements of Novel Internet Threats. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  55. Francesco Pagano. A Distributed Approach to Privacy on the Cloud. – М.: LAP Lambert Academic Publishing, 2013. – 216 с.
  56. Meshack Muderedzwa. Effectiveness of Online Employment Background Screening Systems. – М.: LAP Lambert Academic Publishing, 2011. – 272 с.

Дополнительные результаты

  1. Francis Groves. Corporate Actions - A Concise Guide: An introduction to securities events. – М.: , 2012. – 230 с.
  2. Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с.
  3. Data Privacy Management and Autonomous Spontaneus Security: 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, ... Computer Science / Security and Cryptology). – М.: , 2012. – 334 с.
  4. Alex Jauch. Why We Fail: or how an architect learned to stop worrying and love the cloud. – М.: , 2012. – 52 с.
  5. Security and Privacy in Mobile Information and Communication Systems: Third International ICST Conference, MOBISEC 2011, Aalborg, Denmark, May 17-19, ... and Telecommunications Engineering). – М.: , 2012. – 195 с.
  6. Constructive Side-Channel Analysis and Secure Design: Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings ... Computer Science / Security and Cryptology). – М.: , 2012. – 280 с.
  7. Public Key Infrastructures, Services and Applications: 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected ... Computer Science / Security and Cryptology). – М.: , 2012. – 219 с.
  8. Cloud Computing and Services Science (Service Science: Research and Innovations in the Service Economy). – М.: , 2012. – 405 с.
  9. Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  10. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с.
  11. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с.
  12. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 515 с.
  13. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  14. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с.
  15. Smart Card Research and Advanced Applications: 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, ... Computer Science / Security and Cryptology). – М.: , 2012. – 357 с.
  16. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с.
  17. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с.
  18. Security and Development in Global Politics: A Critical Comparison. – М.: , 2012. – 360 с.
  19. Joseph F. Stenken JD CLU ChFc. Social Security & Medicare Facts 2012. – М.: , 2012. – 451 с.
  20. Mr Kevin Griffiths MSc. International Management: Getting your head out of the managerial cloud. – М.: , 2012. – 160 с.
  21. Luis Lobo-Guerrero. Insuring Security: Biopolitics, security and risk. – М.: , 2012. – 178 с.
  22. CCH Editorial Staff. Social Security Explained 2012. – М.: , 2012. – 298 с.
  23. Terrorism and the Olympics: Major Event Security and Lessons for the Future. – М.: , 2012. – 272 с.
  24. Sheila R Ronis. Economic Security: Neglected Dimension of National Security?. – М.: , 2012. – 128 с.
  25. Denise Garcia. Disarmament Diplomacy and Human Security: Regimes, Norms and Moral Progress in International Relations. – М.: , 2012. – 0 с.
  26. Securities Compliance Index. Securities Compliance Index, Second Edition: A Topical Guide To U.S. Securities Regulation. – М.: , 2012. – 512 с.
  27. American Bar Association, Thomas Lee Hazen. Securities Regulation: Corporate Counsel Guides. – М.: , 2012. – 540 с.
  28. Lionel Martellini, Philippe Priaulet, StA©phane Priaulet. Fixed-Income Securities : Valuation, Risk Management and Portfolio Strategies (The Wiley Finance Series). – М.: , 0. – 0 с.
  29. Jeffrey C. Hooke. Security Analysis on Wall Street. – М.: , 0. – 0 с.
  30. Martin Stone, Spencer Strauss. Secure Your Financial Future Investing in Real Estate. – М.: , 0. – 0 с.
  31. William Rini. Fundamentals of the Securities Industry. – М.: , 0. – 0 с.
  32. Frank J. Fabozzi, John N. Dunlevy, Frank J. Fabozzi, John N. Dunlevy. Real Estate Backed Securities. – М.: , 0. – 0 с.
  33. David F. Teitelbaum. The Procrastinator's Guide to Financial Security: How Anyone Over 40 Can Still Build a Strong Portfolio--and Retire Comfortably. – М.: , 0. – 0 с.
  34. Giorgio S. Questa. Fixed Income Analysis for the Global Financial Market: Money Market, Foreign Exchange, Securities, and Derivatives. – М.: Wiley, 1999. – 368 с.
  35. Bambi Holzer. Retire Rich : The Baby Boomer's Guide to a Secure Future. – М.: , 0. – 0 с.
  36. Peter A. Diamond. Taxation, Incomplete Markets, and Social Security (Munich Lectures). – М.: , 0. – 0 с.
  37. William T. Moore. Real Options and Option-Embedded Securities. – М.: , 0. – 0 с.
  38. Marilyn Greenstein, Todd M. Feinman. Electronic Commerce: Security Risk Management and Control. – М.: , 0. – 0 с.
  39. Kenneth S. Hackel, Joshua Livnat. Cash Flow and Security Analysis. – М.: , 0. – 0 с.
  40. Changmin Chun. Cross-border Transactions of Intermediated Securities: A Comparative Analysis in Substantive Law and Private International Law. – М.: , 2012. – 524 с.
  41. Paul Osterman. Securing Prosperity: The American Labor Market: How It Has Changed and What to Do About It. – М.: , 0. – 0 с.
  42. Jianmin Zhao, Bruce J. Dickson, Chien-Min Zhao. Remaking the Chinese State: Strategies, Society, and Security (Asia's Transformations). – М.: , 0. – 0 с.
  43. Lenore G. Martin. New Frontiers in Middle East Security. – М.: , 0. – 0 с.
  44. Martin S. Feldstein, Horst Siebert. Social Security Pension Reform in Europe. – М.: , 0. – 0 с.
  45. Rattan Lal, David Hansen, Norman Uphoff, Steven Slack, Rattan Lal. Food Security and Environmental Quality in the Developing World. – М.: , 0. – 0 с.
  46. Frank J. Fabozzi, Frank J. Fabozzi. Investing In Commercial Mortgage-Backed Securities. – М.: , 0. – 0 с.
  47. Henry J. Bailey, Richard B. Hagedorn. Secured Transactions in a Nutshell Nutshell Series) (4th ed). – М.: , 0. – 0 с.
  48. Douglas Hearth, Janis K. Zaima, Janis Zaima. Contemporary Investments: Security and Portfolio Analysis. – М.: , 0. – 0 с.
  49. Dean Baker, Mark Weisbrot. Social Security: The Phony Crisis. – М.: , 0. – 0 с.
  50. Andrew W. Lo. The Industrial Organization and Regulation of the Securities Industry (National Bureau of Economic Research Conference Report). – М.: , 0. – 0 с.
  51. Sylvester J. Schieber, John B. Shoven. The Real Deal: The History and Future of Social Security. – М.: , 0. – 0 с.
  52. Henry J. Aaron, John B. Shoven, Benjamin M. Friedman, Alvin Hansen Symposium on Public Policy 1998 Harvard University). Should the United States Privatize Social Security? (Alvin Hansen Symposium Series on Public Policy). – М.: , 0. – 0 с.
  53. John B. Shoven. Administrative Aspects of Investment-Based Social Security Reform (Conference Report (National Bureau of Economic Research).). – М.: , 0. – 0 с.
  54. Risk Management, Speculation, and Derivative Securities. – М.: , 0. – 0 с.
  55. Allen W., Ph.D. Smith. The Alleged Budget Surplus, Social Security, and Voodoo Economics. – М.: , 0. – 0 с.
  56. Pam Lassiter. The New Job Security. – М.: , 0. – 0 с.
  57. David S. Katz, Ilan Caspi, David S. Katz, Ilan Caspi. Executive's Guide to Personal Security. – М.: , 0. – 0 с.
  58. Paul Voillis, Paul Viollis. Jane's Workplace Security Handbook. – М.: , 0. – 0 с.
  59. Gerald Kovacich. The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition. – М.: , 0. – 0 с.
  60. Safety and the Security Professional : A Guide to Occupational Safety and Health Strategies. – М.: , 0. – 0 с.
  61. Asset Protection and Security Management Handbook. – М.: , 0. – 0 с.
  62. Alexis Gutzman. Unforeseen Circumstances : Strategies and Technologies for Protecting Your Business and Your People in a Less Secure World. – М.: , 0. – 0 с.
  63. Safe Schools: A Security and Loss Prevention Plan. – М.: , 0. – 0 с.
  64. Dennis Dalton. Rethinking Corporate Security in the Post 9-11 Era. – М.: , 2003. – 0 с.
  65. Security Operations Management. – М.: , 0. – 0 с.
  66. Security Management : Business Strategies for Success. – М.: , 0. – 0 с.
  67. Sandra M. Rocks. The ABCs of the Ucc Article 8 Investment Securities. – М.: , 0. – 0 с.
  68. Susan Echaore-McDavid. Career Opportunities in Law Enforcement, Security, and Protective Services (The Career Opportunities Series). – М.: , 0. – 0 с.
  69. Philip P. Purpura. The Security Handbook. – М.: , 0. – 0 с.
  70. Leigh Wade. Careers in Private Security: How to Get Started, How to Get Ahead. – М.: , 0. – 0 с.
  71. Anne McKinney. Real Resumes for Police, Law Enforcement and Security Jobs: Including Real Resumes Used to Change Careers and Transfer Skills to Other Industries). – М.: , 0. – 0 с.
  72. Christopher M. Dent. Asia-Pacific Economic and Security Co-Operation: New Regional Agendas. – М.: , 0. – 0 с.
  73. Dean Baker, Mark Weisbrot, Dean Baker. Social Security: The Phony Crisis. – М.: , 0. – 0 с.
  74. Henry J. Aaron, Robert D. Reischauer. Countdown to Reform: The Greater Social Security Debate. – М.: , 0. – 0 с.
  75. Bert H. McLachlan. Saving Social Security: (From Congress). – М.: , 0. – 0 с.
  76. John Dixon, Mark Hyde. The Marketization of Social Security. – М.: , 0. – 0 с.
  77. Martin S. Feldstein, Jeffrey B. Liebman. The Distributional Aspects of Social Security and Social Security Reform (National Bureau of Economic Research Conference Report). – М.: , 0. – 0 с.
  78. Robert M. Ball, Thomas N. Bethell. Insuring the Essentials: Bob Ball on Social Security. – М.: , 0. – 0 с.
  79. Gavin Cawthra. Securing South Africa's Democracy: Defense, Development and Security in Transition (International Political Economy Series). – М.: , 0. – 0 с.
  80. Werner Draguhn, Robert Ash. China's Economic Security. – М.: , 0. – 0 с.
  81. John Attarian. Social Security: False Consciousness and Crisis. – М.: , 0. – 0 с.
  82. Maurice, Ph.D. Youakim. Social Security and Medicare for the New Millenium. – М.: , 0. – 0 с.
  83. Stephen?J Feinberg. Homeland Security and Economic Prosperity: Defending Our Country and the Survival of American Capitalism. – М.: , 0. – 0 с.
  84. Allen W., Ph.D. Smith. The Looting of Social Security: How the Government Is Draining Americas Retirement Account. – М.: , 0. – 0 с.
  85. Julia Lowell, C. R. Neu, Daochi Tong, National Defense Research Institute, National Security Research Institute. Financial Crises and Contagion in Emerging Market Countries. – М.: , 0. – 0 с.
  86. Joseph S. Nye, William A. Owens, James R. Schlesinger, R. James Woolsey, James A. Lewis, Joseph S., Jr. Nye, James Andrew Lewis, Erin Schlather, Csis Commission on Technology Security in the Twenty-First Century. Computer Exports and National Security: New Tools for a New Century : A Report of the Csis Commission on Technology Security in the 21St-Century (Csis Panel Reports.). – М.: , 0. – 0 с.
  87. Committee on Federal Regulation of Securities Committee. The Fund Director's Guidebook: Third Edition (Fund Director's Guidebook). – М.: , 2006. – 128 с.
  88. Henry Cloud. Integrity: The Courage to Meet the Demands of Reality. – М.: , 2006. – 304 с.
  89. Henry Cloud. Integridad: Valor para hacer frente a las demandas de la realidad; Como seis cualidades esenciales determinan el exito de tu negocio. – М.: , 2008. – 304 с.
  90. Meridian Securities Market. World Stock Exchange Fact Book. – М.: , 2008. – 0 с.
  91. CompTIA Security+: Certification Kit (комплект из 3 книг + 2 CD-ROM). – М.: Sybex, 2009. – 1440 с.
  92. John Rittinghouse, James Ransome. Cloud Computing: Implementation, Management, and Security. – М.: CRC Press, 2009. – 340 с.
  93. Ronald L. Krutz. Cloud Security. – М.: , 2010. – 384 с.
  94. Phillip A. Cloud. Developing and Managing Engineering Procedures. – М.: , 2010. – 193 с.
  95. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с.
  96. Phillip A. Cloud. Engineering Procedures Handbook. – М.: , 2010. – 431 с.
  97. Graham Speake. Securing the Cloud. – М.: , 2010. – 350 с.
  98. D SS CLOUD. Cloud ?sunbrite? Laundry Company – A ?computerized Practice Set?. – М.: , 1984. – 26 с.
  99. D CLOUD. Cloud Coggins ?auto? Supply A Pract Set For A Merc Handfirm (acc Col ?accounting? Chaps 1–26). – М.: , 1985. – 78 с.
  100. P Cloud. Oasis in Space – Earth History from the Beginning. – М.: , 1989. – 530 с.
  101. D SS CLOUD. Cloud: College ?accounting? Procedures–a Competenc Y Based Approach – Chapters ?1–12? 2ed. – М.: , 1989. – 524 с.
  102. D SS CLOUD. Cloud: ?study Guide? & ?working Papers? T/a Colleg E ?accounting? Proc Chap ?1–16? 2ed. – М.: , 1989. – 610 с.
  103. D SS CLOUD. Cloud: ?study Guide? & ?working Papers? T/a Colleg E ?accounting? Proc ?chap 17–24? 2ed. – М.: , 1989. – 278 с.
  104. Tim Mather. Cloud Security and Privacy. – М.: , 2009. – 334 с.
  105. D CLOUD. Cloud College ?accounting? Procedures – A Competen Cy Based Approach Chapters ?1–11?. – М.: , 1984. – 424 с.
  106. P Cloud. Cloud: ?oasis? In Space – Earth History From The Beginning. – М.: , 1988. – 530 с.
  107. Cloud Computing, A Practical Approach. – М.: , 2011. – 352 с.
  108. Vivek Bhushan. Securing Published Data In Cloud Using Data Incognito. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  109. Isaac Gachugu. Architecture for Cloud-Based Rapid Application Development Framework. – М.: LAP Lambert Academic Publishing, 2013. – 116 с.
  110. Rajani Sharma and Rajender Trivedi. Data Security in a Cloud Environment using Multilevel UEC. – М.: LAP Lambert Academic Publishing, 2014. – 84 с.
  111. Anand Kannan. Evaluation of the Security Mechanisms in Cloud Networks. – М.: LAP Lambert Academic Publishing, 2013. – 192 с.
  112. T. Ambikadevi Amma. Inhibitors of Cloud Computing. – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  113. Adamu Usman. Cost-Benefit Analysis of Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  114. Srivaramangai Padmanabhan. Reliable Infrastructure for Cloud Computing. – М.: LAP Lambert Academic Publishing, 2013. – 100 с.
  115. Faraz Fatemi Moghaddam. Secure Cloud Computing with Client-Based Control System. – М.: LAP Lambert Academic Publishing, 2013. – 100 с.
  116. Lane Thames. Advancing Cyber Security. – М.: LAP Lambert Academic Publishing, 2013. – 256 с.
  117. Wei Ren. Lightweight and Robust Security for Applications in Internet of Things. – М.: LAP Lambert Academic Publishing, 2013. – 188 с.
  118. Puneet Kumar. Cloud Computing. – М.: LAP Lambert Academic Publishing, 2013. – 60 с.
  119. Hossein Pour Taheri and Ab Razak Che Hussin. Cloud Base E-Commerce Trust Model. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  120. Lamek Ronoh. Security Concern of Cloud Computing Models. – М.: LAP Lambert Academic Publishing, 2014. – 88 с.
  121. Pavan Kumar Bollineni and Kumar Neupane. Implications for adopting cloud computing in e-Health. – М.: LAP Lambert Academic Publishing, 2011. – 88 с.
  122. Gunasekar Kumar and Anirudh Chelikani. Analysis of Security Issues in Cloud Based E-Learning. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  123. Saad Ahmed Khan and Saif Ahmad. Security Implications of Cloud computing. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  124. Rajani Sharma and Rajender Trivedi. Secure Data Retrieval with token ensuring possession proof. – М.: LAP Lambert Academic Publishing, 2014. – 56 с.
  125. Sadia Marium. Analysis of the Security threats to Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  126. Ganesh Chandra Deka. Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 140 с.
  127. Pallavali Radha Krishna Reddy and Gullapalli Sireesha. The Security Issues of Cloud Computing Over Normal & ITSector. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  128. Hassen Alsafi and Mohammed Azhruddin. The Security Issues for Smart Grids Applications on Cloud Computing. – М.: LAP Lambert Academic Publishing, 2013. – 60 с.
  129. Shahla Asadi and Elaheh Yadegaridehkordi. Customers perspectives on cloud computing adoption by Banking sector. – М.: LAP Lambert Academic Publishing, 2015. – 128 с.
  130. Shivan Fazil Sabr. Cloud Computing Security. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  131. Harish Vepuri. Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  132. Harjot Dhawan. A Road to Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  133. Rafal AL-Khashab. An Authentication Model for Cloud Computing Application. – М.: LAP Lambert Academic Publishing, 2014. – 104 с.
  134. Muhammad Imran Tariq. SLA based Information Security Metrics in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2014. – 192 с.
  135. Paul Denys. Security of Personal Information in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 144 с.
  136. Jeremiah Akita and Koudjo Koumadi. Evaluating Cloud Storage Security In Ghana. – М.: LAP Lambert Academic Publishing, 2014. – 104 с.
  137. Paolo Gasti. Privacy and Security of Internet Communications. – М.: LAP Lambert Academic Publishing, 2011. – 148 с.
  138. Alptekin Kupcu. Efficient Cryptography for the Next Generation Secure Cloud. – М.: LAP Lambert Academic Publishing, 2010. – 220 с.
  139. Khandakar Entenam Unayes Ahmed. IDENTITY AND ACCESS MANAGEMENT IN CLOUD COMPUTING. – М.: LAP Lambert Academic Publishing, 2011. – 172 с.
  140. Francesco Pagano. A Distributed Approach to Privacy on the Cloud. – М.: LAP Lambert Academic Publishing, 2013. – 216 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

Ничего не найдено

Образцы работ

Тема и предметТип и объем работы
Последствия операции НАТО
Политология
Диплом
80 стр.
Платежные системы в Интернете
Информатика
Диплом
102 стр.
Роль ОБСЕ в урегулировании конфликтов в Европе
Политология
Курсовая работа
33 стр.
Проблемы реформирования ОБСЕ
Политология
Курсовая работа
29 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Маша, 06.06
Юля, Добрый день! Вы писали мне курсовую, все от нее в восторге. Сейчас мне очень нужен реферат. Тема не сложная, но нет времени. Я отправила заявку, очень бы хотелось чтобы по возможности его делали Вы.