Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Susan Echaore-McDavid. Career Opportunities in Law Enforcement, Security, and Protective Services (The Career Opportunities Series). – М.: , 0. – 0 с. Susan Echaore-McDavid. Career Opportunities In Law Enforcement, Security And Protective Services (Career Opportunities). – М.: , 2005. – 272 с. Agufa Semenye. Criminal Profiling: A tool in investigating computer crimes. – М.: LAP Lambert Academic Publishing, 2012. – 136 с. Andrew Marrington. Computer Forensic Profiling. – М.: LAP Lambert Academic Publishing, 2010. – 188 с. Дополнительные результаты Laszlo Gyorfi. Machine Learning for Financial Engineering (Advances in Computer Science and Engineering: Texts). – М.: , 2012. – 250 с. Max Houck. Smart Guide To Forensic Careers. – М.: , 2012. – 272 с. Data Privacy Management and Autonomous Spontaneus Security: 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, ... Computer Science / Security and Cryptology). – М.: , 2012. – 334 с. Frontiers in Algorithmics and Algorithmic Aspects in Information and Management: Joint International Conference, FAW-AAIM 2012, Beijing, China, May ... Computer Science and General Issues). – М.: , 2012. – 400 с. Public Key Infrastructures, Services and Applications: 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected ... Computer Science / Security and Cryptology). – М.: , 2012. – 219 с. Cloud Computing and Services Science (Service Science: Research and Innovations in the Service Economy). – М.: , 2012. – 405 с. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с. Social Computing, Behavioral-Cultural Modeling and Prediction: 5th International Conference, SBP 2012, College Park, MD, USA, April 3-5, 2012, ... Applications, incl. Internet/Web, and HCI). – М.: , 2012. – 380 с. Technological Innovation for Value Creation: Third IFIP WG 5.5/SOCOLNET Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS ... in Information and Communication Technology). – М.: , 2012. – 607 с. Video Analytics for Business Intelligence (Studies in Computational Intelligence). – М.: , 2012. – 388 с. Karen Mcneil. How to Land a Top-Paying Forensic accountants Job: Your Complete Guide to Opportunities, Resumes and Cover Letters, Interviews, Salaries, Promotions, What to Expect From Recruiters and More. – М.: , 2012. – 86 с. Sara Gibson. How to Land a Top-Paying Computer help desk representatives Job: Your Complete Guide to Opportunities, Resumes and Cover Letters, Interviews, ... What to Expect From Recruiters and More. – М.: , 2012. – 90 с. Donald M. Burrows. Burn Your Resume! You Need a Professional Profile(TM): Winning the Inner and Outer Game of Finding Work or New Business. – М.: , 2012. – 240 с. Domingo Tavella. Quantitative Methods in Derivatives Pricing: An Introduction to Computational Finance. – М.: , 0. – 0 с. Mark Helweg, David Stendahl, Marketplace Books. Dynamic Trading Indicators: Winning with Value Charts and Price Action Profile. – М.: , 0. – 0 с. Jack J. Champlain. Auditing Information Systems. – М.: , 0. – 0 с. G. Jack Bologna, Robert J. Lindquist. Fraud Auditing and Forensic Accounting. – М.: , 0. – 0 с. Jack W. Plunkett. Plunkett's Infotech Industry Almanac 2003. – М.: , 0. – 0 с. Constance S. Hawke, Constance S. Hawke. Computer and Internet Use on Campus: A Legal Guide to Issues of Intellectual Property, Free Speech, and Privacy. – М.: , 0. – 0 с. Markov Networks in Evolutionary Computation (Adaptation, Learning, and Optimization). – М.: , 2012. – 264 с. James W. Cortada. Before the Computer. – М.: , 0. – 0 с. James W. Cortada. The Digital Hand: How Computers Changed the Work of American Manufacturing, Transportation, and Retail Industries. – М.: , 0. – 0 с. Alan Axelrod. Profiles in Leadership. – М.: , 0. – 0 с. Frank Levy, Richard J. Murnane. The New Division of Labor: How Computers Are Creating the Next Job Market. – М.: , 0. – 0 с. Michael D. Kelleher. Profiling the Lethal Employee. – М.: , 0. – 0 с. Michael Prietula, Kathleen, Les Gasser, Kathleen Carley, Leslie George Gasser. Simulating Organizations: Computational Models of Institutions and Groups. – М.: , 0. – 0 с. Zhiang Lin, Kathleen M. Carley. Designing Stress Resistant Organizations: Computational Theorizing and Crisis Applications (Information and Organization Design Series). – М.: , 0. – 0 с. Business Climate Shifts : Profiles of Change Makers. – М.: , 0. – 0 с. Anantha Kumar Duraiappah. Computational Models in the Economics of Environment and Development (Economy & Environment, 27). – М.: , 0. – 0 с. Abdullah Abdul-Gader, Abdullah H. Al-Abdul-Gader. Managing Computer Based Information Systems in Developing Countries: A Cultural Perspective. – М.: , 0. – 0 с. Roger A. McCain. Agent-Based Computer Simulation of Dichotomous Economic Growth (ADVANCES IN COMPUTATIONAL ECONOMICS Volume 13). – М.: , 0. – 0 с. Mario J. Miranda, Paul L. Fackler. Applied Computational Economics and Finance. – М.: , 0. – 0 с. Hans M. Amman, David A. Kendrick, John Rust. Handbook of Computational Economics. – М.: North Holland, 1996. – 832 с. Kumaraswamy Velupillai. Computable Economics: The Arne Ryde Memorial Lectures (Arne Ryde Memorial Lectures). – М.: , 0. – 0 с. G. M. P. Swann, Martha Prevezer, David Stout, G. M. Peter Swann, David K. Stout. The Dynamics of Industrial Clustering: International Comparisons in Computing and Biotechnology. – М.: , 0. – 0 с. Steffen Jrgensen, Georges Zaccour. Optimal Control and Differential Games: Essays in Honor of Steffen Jorgensen (Advances in Computational Management Science). – М.: , 0. – 0 с. Soren S. Nielsen. Programming Languages and Systems in Computational Economics and Finance (Advances in Computational Economics, 18). – М.: , 0. – 0 с. Abdul Bangura. Computer Programming to Insure Project Accountability in Africa. – М.: , 0. – 0 с. Abdol S. Soofi, Liangyue Cao. Modelling and Forecasting Financial Data: Techniques of Nonlinear Dynamics (Studies in Computational Finance, Volume 2). – М.: , 0. – 0 с. Thomas Brenner. Computational Techniques for Modelling Learning in Economics (Advances in Computational Economics, V. 11). – М.: , 0. – 0 с. Francesco Luna, Benedikt Stefansson. Economic Simulations in Swarm: Agent-Based Modelling and Object (ADVANCES IN COMPUTATIONAL ECONOMICS Volume 14). – М.: , 0. – 0 с. Virginia?Ferrell Andersen. Digital Recall: Computers Aren't the Only Ones With Memory. – М.: , 0. – 0 с. Suparna Damany, Jack Bellis. It's Not Carpal Tunnel Syndrome! RSI Theory & Therapy for Computer Professionals. – М.: , 0. – 0 с. Paul Linden. Comfort at Your Computer: Body Awarness Training for Pain-Free Computer Use. – М.: , 0. – 0 с. Peter D. Barnett. Ethics in Forensic Science: Professional Standards for the Practice of Criminalistics. – М.: , 0. – 0 с. Deborah G. Johnson, Helen Nissenbaum. Computers, Ethics and Social Values. – М.: , 0. – 0 с. Terrell Ward Bynum, Simon Rogerson, Blackwell Pub. Computer Ethics and Professional Responsibility: Introductory Text and Readings. – М.: , 0. – 0 с. Tom Forester, Perry Morrison. Computer Ethics, Second Edition: Cautionary Tales and Ethical Dilemmas in Computing. – М.: , 0. – 0 с. Alessandro Lomi, Erik R. Larsen. Dynamics of Organizations: Computational Modeling and Organizational Theories. – М.: AAAI Press, 2001. – 352 с. Computer-Supported Cooperative Work : A Book of Readings. – М.: , 0. – 0 с. Handbook of Business Data Communications: A Managerial Perspective. – М.: , 0. – 0 с. Ron Ernst. RealTime Coaching with Profile. – М.: , 0. – 0 с. Lila B. Stair, Leslie Stair. Careers in Computers, Third Edition. – М.: , 0. – 0 с. Janet Ruhl. Computer Job Survival Guide. – М.: , 0. – 0 с. Don Knowles. Today's Technician: Automotive Computer Systems. – М.: , 0. – 0 с. Marjorie Eberts. Careers for Computer Buffs & Other Technological Types. – М.: , 0. – 0 с. Joan Vaughn. COMPUTER TECH CAREER STARTER 2E. – М.: , 0. – 0 с. Lila B. Stair, Leslie Stair. Careers in Computers, Third Edition. – М.: , 0. – 0 с. Marjorie Eberts. Careers for Computer Buffs & Other Technological Types. – М.: , 0. – 0 с. Peter Meyer. Getting Started in Computer Consulting. – М.: , 0. – 0 с. Considering Computer Contracting? : How to become a successful freelance computer professional ("Computer Weekly" Professional S.). – М.: , 0. – 0 с. Erricos John Kontoghiorghes, Berc Rustem, Stavros Siokos. Computational Methods in Decision-Making, Economics and Finance (Applied Optimization, 74). – М.: , 0. – 0 с. Information Warfare : corporate attack and defence in a digital world (Computer Weekly Professional (Paperback)). – М.: , 0. – 0 с. David C. Nelson, James D. Bell. Profiles in Entrepreneurship: Leaving More Than Footprints. – М.: , 0. – 0 с. Blythe Camenson. Opportunities in Forensic Science Careers. – М.: , 0. – 0 с. Janet Ruhl. Janet Ruhl's Answers for Computer Contractors: How to Get the Highest Rates and the Fairest Deals from Consulting Firms, Agencies, and Clients. – М.: , 0. – 0 с. Carol L. Covin. The Best Computer Jobs in America: 20 Minutes from Home. – М.: , 0. – 0 с. Susan Echaore-McDavid. Career Opportunities in Law Enforcement, Security, and Protective Services (The Career Opportunities Series). – М.: , 0. – 0 с. Cynthia D. McCauley, Patricia J. Ohlott, Marian N. Ruderman, Center for Creative Leadership. Job Challenge Profile: Participant's Workbook. – М.: , 0. – 0 с. Marian N. Ruderman. Job Challenge Profile : Learning from Work Experience Self Instrument. – М.: , 0. – 0 с. Richard H. Berube. Computer Simulated Experiments for Digital Electronics Using Electronics Workbench. – М.: , 0. – 0 с. W. Prasad Kodali. Engineering Electromagnetic Compatibility : Principles, Measurements, Technologies, and Computer Models. – М.: , 0. – 0 с. Natalie F. Harris, Nils Conrad Persson. ES&T Mag.Presents Computer Troubleshooting & Repair. – М.: , 0. – 0 с. Kenneth C. Mansfield, James L. Antonakos. Introduction to Computers for Engineering and Technology. – М.: , 0. – 0 с. Dan L. Beeson. Assembling and Repairing Personal Computers (2nd Edition). – М.: , 0. – 0 с. Richard H. Berube. Computer Simulated Experiments for Electronic Devices Using Electronics Workbench (2nd Edition). – М.: , 0. – 0 с. Richard H. Berube, Richard Berube. Computer Simulated Experiments for Electric Circuits Using Electronics Workbench (2nd Edition). – М.: , 0. – 0 с. Cynthia D. McCauley, Patricia J. Ohlott, Marian N. Ruderman, Center for Creative Leadership. Job Challenge Profile, Facilitator's Guide Package (Includes Participant Workbook Pkg, and Facilitator's Guide) : Learning from Work Experience. – М.: , 0. – 0 с. The Linear Complementarity Problem (Computer Science and Scientific Computing). – М.: , 0. – 0 с. Anantha Kumar Duraiappah. Computational Models in the Economics of Environment and Development (Economy & Environment, ?27). – М.: , 0. – 0 с. Hans M. Amman, Berc Rustem, Andrew Whinston, Hans Amman. Computational Approaches to Economic Problems (Advances in Computational Economics, Vol. 6). – М.: , 0. – 0 с. Ravi Kalakota, Andrew B. Whinston, Coordination, and Collaboration Conference 1 Organizational Computing. Readings in Electronic Commerce. – М.: , 0. – 0 с. Roland Traunmuller, R. Traunmuller, Quebec) Ifip World Computer Congress 2002 Montreal. Information Systems: The E-Business Challenge (International Federation for Information Processing, 95). – М.: , 0. – 0 с. G. David Garson, G. David Information Technology and Computer Applications in Garson. Public Information Technology: Policy and Management Issues. – М.: , 0. – 0 с. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с. Steve Wozniak, Gina Smith. iWoz: From Computer Geek to Cult Icon: How I Invented the Personal Computer, Co-Founded Apple, and Had Fun Doing It. – М.: W. W. Norton & Company, Inc., 2006. – 288 с. Susan Echaore-McDavid. Career Opportunities In Law Enforcement, Security And Protective Services (Career Opportunities). – М.: , 2005. – 272 с. Andrew Adamatzky, Benjamin De Lacy Costello, Tetsuya Asai. Reaction-Diffusion Computers. – М.: , 2005. – 348 с. Wing Kam Fung, Yue-Qing Hu. Statistical DNA Forensics: Theory, Methods and Computation. – М.: Wiley, 2008. – 262 с. Terrence V. Lillard. Digital Forensics for Network, Internet, and Cloud Computing. – М.: , 2010. – 368 с. PROFILE. WORLDWIDE CAPACITOR INDUSTRY 1992. – М.: , 2010. – 0 с. Profile. Automotive Plastics and Composites - World Markets and Trends. – М.: , 2010. – 0 с. Micah Solomon. Computer Forensics JumpStartTM. – М.: , 2004. – 304 с. MJ COMPUTER. Ball Data Processing In Medicine: How To Select A Computerized Hospital Information Systm. – М.: , 1973. – 0 с. Linda Volonino. Computer Forensics For Dummies®. – М.: , 2008. – 384 с. Michael Sheetz. Computer Forensics. – М.: , 2007. – 176 с. R COMPUTERS. Dehaene Computers In Radiology. – М.: , 1971. – 0 с. Apple Computer. Learning Carbon. – М.: , 2001. – 360 с. Apple Computer. Learning Cocoa. – М.: , 2001. – 384 с. Michael G. Solomon. Computer Forensics JumpStart. – М.: , 2011. – 336 с. COMPUTER. Computer School ?mastering? Multiplan Tm (paper On Ly). – М.: , 1984. – 0 с. Center for Professional Computer Education. Multimate ProfessionalTM. – М.: , 1986. – 240 с. Center for Professional Computer Education. DisplayWrite III. – М.: , 1987. – 224 с. Center for Professional Computer Education. WordStar®. – М.: , 1987. – 192 с. Center for Professional Computer Education. LOTUS 1–2–3 Quick Reference Handbook. – М.: , 1986. – 240 с. Erik Laykin. Investigative Computer Forensics. – М.: , 2011. – 320 с. COMPUTER PART. Computer Partners: Handbook Of Cobol Techniques & Programming Standards 3ed (pr Only). – М.: , 1993. – 0 с. Aaron Philipp, David Cowen, Chris Davis. Hacking Exposed: Computer Forensics. – М.: McGraw-Hill, 2010. – 544 с. Hacker'S Challenge 3. – М.: , 2011. – 400 с. Chris Prosise, Kevin Mandia, Matt Pepe. Incident Response & Computer Forensics. – М.: McGraw-Hill/Osborne, 2003. – 508 с. Steven Levy. Hackers: Heroes of the Computer Revolution. – М.: O'Reilly Media, 2010. – 528 с. Eoghan Casey. Digital Evidence and Computer Crime. – М.: , . – с. Inc. KT Solutions, KT Solutions has focused on what it takes to create efficient, professional multimedia training t KT Solutions specializes in the development of interactive multimedia training products for computer applications. Over the past decade. Beginning Windows NT Workstation 4.0 (Microsoft Windows NT). – М.: , . – с. Inc. KT Solutions, KT Solutions has focused on what it takes to create efficient, professional multimedia training t KT Solutions specializes in the development of interactive multimedia training products for computer applications. Over the past decade. Advanced Word for Office 97 (Microsoft Word 97). – М.: , . – с. Committee on DNA Technology in Forensic Science, National Research Council. DNA Technology in Forensic Science. – М.: National Academies Press, 1992. – 200 с. Brent E. Turvey. Forensic Victimology, Second Edition: Examining Violent Crime Victims in Investigative and Legal Contexts. – М.: Academic Press, Elsevier, 2013. – 656 с. Forensic Psychology For Dummies. – М.: , 2013. – 412 с. Charles L. Brooks. CHFI: Computer Hacking Forensic Investigator Certification: Exam Guide (+ CD). – М.: McGraw-Hill Education, 2015. – 656 с. Mehdi Sheikhalishahi and Lucio Grandinetti. Energy Efficient Management and Scheduling of Computational Resources. – М.: Scholars Press, 2014. – 76 с. Swagota Bera and Monisha Sharma. Statistical and Visual Detection of Real Time Stego Images. – М.: LAP Lambert Academic Publishing, 2015. – 104 с. Mudassar Naseer,Atif Hanif and Muhammad Ashraf Tahir. Saliva for Forensics. – М.: LAP Lambert Academic Publishing, 2013. – 72 с. Ivana Koljensic. Quantitative DNA method in forensic DNA laboratory. – М.: LAP Lambert Academic Publishing, 2013. – 88 с. Muhammad Akhyar Farrukh. Nano-Forensics. – М.: LAP Lambert Academic Publishing, 2013. – 116 с. Parul Sharma. Conformational Profile of Bombesin and Its Mammalian Analogues. – М.: LAP Lambert Academic Publishing, 2012. – 176 с. Vivek Sahajpal,M. K. Thakar and S.P. Goyal. Forensic Examination of Hair of Protected Indian Wildlife Species. – М.: LAP Lambert Academic Publishing, 2012. – 256 с. Kirti Rani. Computers & Biotechnology. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Tapan Modi,Monali Chalishazar and Pritam Panja. Forensic Odontology. – М.: LAP Lambert Academic Publishing, 2014. – 144 с. Leaunda Hemphill. Personalized Learner Profile for Computer-Based Training. – М.: LAP Lambert Academic Publishing, 2010. – 132 с. Anjan Kumar Payra. Steganology for the Computer Forensics Examiners. – М.: LAP Lambert Academic Publishing, 2013. – 76 с. Davina Rungen. Web 2.0 and Social Computing. – М.: LAP Lambert Academic Publishing, 2011. – 108 с. Agufa Semenye. Criminal Profiling: A tool in investigating computer crimes. – М.: LAP Lambert Academic Publishing, 2012. – 136 с. Md. Rabiul Islam,Md. Fayzur Rahman and Faculty of Electrical-Computer Engineering RUET Rajshahi Bang. IMPROVEMENT OF NOISE ROBUST SPEAKER IDENTIFICATION. – М.: LAP Lambert Academic Publishing, 2010. – 88 с. Palaniappan Shamala and Abd Manaf Azizah. Digital Computer Forensic: Validation and Verification for Disk Imaging. – М.: LAP Lambert Academic Publishing, 2012. – 124 с. Raza Hasan. Forensic Computing. – М.: LAP Lambert Academic Publishing, 2012. – 152 с. Irfan Syamsuddin. Guidelines for Computer Forensics Investigations in Developing Country. – М.: LAP Lambert Academic Publishing, 2011. – 104 с. April L. Tanner and David A. Dampier. Digital Forensic Investigations Visualized. – М.: LAP Lambert Academic Publishing, 2011. – 160 с. Andrew Marrington. Computer Forensic Profiling. – М.: LAP Lambert Academic Publishing, 2010. – 188 с. Paresh Kerai. Remote Access Forensics for VNC and RDP on Windows Platform. – М.: LAP Lambert Academic Publishing, 2012. – 168 с. Michael Hale Ligh, Andrew Case, Jamie Levy, AAron Walters. The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory. – М.: Wiley, . – 912 с.
Лучшие результаты Ничего не найдено Дополнительные результаты Ничего не найдено Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Елена (Ленинск-Кузнецк) Ирина! Здравствуйте, реферат подошел, спасибо. С Новым годом! Спасибо, что помогаете студентам.