Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с.
  2. Data Privacy Management and Autonomous Spontaneus Security: 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, ... Computer Science / Security and Cryptology). – М.: , 2012. – 334 с.
  3. Constructive Side-Channel Analysis and Secure Design: Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings ... Computer Science / Security and Cryptology). – М.: , 2012. – 280 с.
  4. Public Key Infrastructures, Services and Applications: 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected ... Computer Science / Security and Cryptology). – М.: , 2012. – 219 с.
  5. Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  6. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с.
  7. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с.
  8. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 515 с.
  9. Traffic Monitoring and Analysis: 4th International Workshop, TMA 2012, Vienna, Austria, March 12, 2012, Proceedings (Lecture Notes in Computer Science ... Networks and Telecommunications). – М.: , 2012. – 200 с.
  10. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  11. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с.
  12. Smart Card Research and Advanced Applications: 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, ... Computer Science / Security and Cryptology). – М.: , 2012. – 357 с.
  13. Video Analytics for Business Intelligence (Studies in Computational Intelligence). – М.: , 2012. – 388 с.
  14. David Chanoff, Ejovi Nuwere. Hacker Cracker : A Journey from the Mean Streets of Brooklyn to the Frontiers of Cyberspace. – М.: , 0. – 0 с.
  15. Robert Muksian. Mathematics of Interest Rates, Insurance, Social Security, and Pensions. – М.: , 0. – 0 с.
  16. Terrell Ward Bynum, Simon Rogerson, Blackwell Pub. Computer Ethics and Professional Responsibility: Introductory Text and Readings. – М.: , 0. – 0 с.
  17. Information Warfare : corporate attack and defence in a digital world (Computer Weekly Professional (Paperback)). – М.: , 0. – 0 с.
  18. Susan Echaore-McDavid. Career Opportunities in Law Enforcement, Security, and Protective Services (The Career Opportunities Series). – М.: , 0. – 0 с.
  19. Leigh Wade. Careers in Private Security: How to Get Started, How to Get Ahead. – М.: , 0. – 0 с.
  20. Seymour Bosworth, Michel E. Kabay. Computer Security Handbook. – М.: , 0. – 0 с.
  21. Richard Hunter. World Without Secrets: Business, Crime and Privacy in the Age of Ubiquitous Computing. – М.: , 0. – 0 с.
  22. Gerald L. Kovacich, Edward P. Halibozek. The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, First Edition. – М.: , 0. – 0 с.
  23. Thomas J. Parenty. Digital Defense: What You Should Know About Protecting Your Company's Assets. – М.: , 0. – 0 с.
  24. Marko Nordquist. Towards Improved Security Management Practice: Designing an Organizational Model Procedure for the Implementation of Information Security Management in Heterogeneous Information Management. – М.: , 0. – 0 с.
  25. Computer Security. – М.: , 0. – 0 с.
  26. Donn B. Parker. Fighting Computer Crime : A New Framework for Protecting Information. – М.: , 0. – 0 с.
  27. Ultimate Financial Security Survey. – М.: , 0. – 0 с.
  28. Effective Security Management, Fourth Edition (Effective Security Management). – М.: , 0. – 0 с.
  29. Joseph S. Nye, William A. Owens, James R. Schlesinger, R. James Woolsey, James A. Lewis, Joseph S., Jr. Nye, James Andrew Lewis, Erin Schlather, Csis Commission on Technology Security in the Twenty-First Century. Computer Exports and National Security: New Tools for a New Century : A Report of the Csis Commission on Technology Security in the 21St-Century (Csis Panel Reports.). – М.: , 0. – 0 с.
  30. Juanita Ellis, Tim Speed. The Internet Security Guidebook: From Planning to Deployment. – М.: , 0. – 0 с.
  31. Mostafa Hashem Sherif. Protocols for Secure Electronic Commerce, Second Edition. – М.: , 0. – 0 с.
  32. Anup K. Ghosh. E-Commerce Security and Privacy. – М.: , 0. – 0 с.
  33. Joey F. George. Computers in Society. – М.: , 0. – 0 с.
  34. George Mohay, Alison Anderson, Byron Collie, Olivier de Vel, Rod McKemmish. Computer and Intrusion Forensics (Artech House Computer Security Series). – М.: , 0. – 0 с.
  35. Vesna Hassler. Security Fundamentals for E-Commerce (Artech House Computer Security Series). – М.: , 0. – 0 с.
  36. Thomas Peltier, Thomas Pelitier, Justin Peltier, John A. Blackley, Peltier, Associates. Information Security Fundamentals. – М.: , 0. – 0 с.
  37. Steven R. Gordon, Dr. Steven Gordon. Computing Information Technology: The Human Side. – М.: , 0. – 0 с.
  38. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с.
  39. The Security Economy (Safety Standards Series:). – М.: , 2004. – 0 с.
  40. Christopher A. Crayton. Security + Exam Guide (Testtaker's Guide Series). – М.: , 2003. – 0 с.
  41. Geoffrey Elliott. Mobile Commerce and Wireless Computing Systems. – М.: , 2003. – 0 с.
  42. Economics of Information Security (Advances in Information Security). – М.: , 2004. – 0 с.
  43. Edward Borodzicz. Risk, Crisis and Security Management. – М.: , 2005. – 0 с.
  44. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с.
  45. Rickland Hollar. Enterprise Web Services Security (Internet Series). – М.: , 2005. – 432 с.
  46. Internet and Network Economics: First International Workshop, WINE 2005, Hong Kong, China, December 15-17, 2005, Proceedings (Lecture Notes in Computer Science). – М.: , 2006. – 1106 с.
  47. Larstan's The Black Book on Corporate Security (Black Book Series). – М.: , 2005. – 439 с.
  48. Susan Echaore-McDavid. Career Opportunities In Law Enforcement, Security And Protective Services (Career Opportunities). – М.: , 2005. – 272 с.
  49. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с.
  50. Bruce Schneier. Schneier on Security. – М.: , 2008. – 336 с.
  51. Alan Calder, Steve Watkins. IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002. – М.: , 2008. – 384 с.
  52. Computer & Network Procedures to Manage IT Systems. – М.: , 2008. – 720 с.
  53. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с.
  54. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с.
  55. E-Commerce and Web Technologies: 9th International Conference, EC-Web 2008 Turin, Italy, September 3-4, 2008, Proceedings (Lecture Notes in Computer Science). – М.: , 2008. – 145 с.
  56. Trust, Privacy and Security in Digital Business: 5th International Conference, TrustBus 2008 Turin, Italy, September 1-5, 2008, Proceedings (Lecture Notes in Computer Science). – М.: , 2008. – 205 с.
  57. V.R. Leonard. The Social Security and Medicare Handbook: What You Need to Know Explained Simply. – М.: , 2008. – 288 с.
  58. Gerard Blokdijk, Ivanka Menken. Information Security Management Best Practice Workbook: Implementation and Management Roadmap for Threats, Challenges and Solutions - Ready to use supporting documents bringing Theory into Practice. – М.: , 2008. – 124 с.
  59. John Rittinghouse, James Ransome. Cloud Computing: Implementation, Management, and Security. – М.: CRC Press, 2009. – 340 с.
  60. RITUPARNA DAS. Handbook of Fixed Income Securities: Indian Banking Perspective. – М.: , 2010. – 112 с.
  61. Andy Jones. Risk Management for Computer Security. – М.: , 2010. – 296 с.
  62. Jeff Crume. Inside Internet Security: What Hackers Don't Want You To Know. – М.: , 0. – 0 с.
  63. Learning to Live in the Knowledge Society: IFIP 20th World Computer Congress, IFIP TC 3 ED-L2L Conference, September 7-10, 2008, Milano, Italy (IFIP International ... Federation for Information Processing). – М.: , 2008. – 374 с.
  64. Molecular Imaging: Computer Reconstruction and Practice (NATO Science for Peace and Security Series B: Physics and Biophysics). – М.: , 2008. – 288 с.
  65. Handbook of Information and Communication Security. – М.: , 2010. – 800 с.
  66. Brain-Inspired Information Technology (Studies in Computational Intelligence). – М.: , 2010. – 182 с.
  67. Bryan Pfaffenberger. Webster?s New WorldTM Computer Dictionary. – М.: , 2003. – 432 с.
  68. Kevin D. Mitnick. The Art of Intrusion. – М.: , 2005. – 270 с.
  69. iSafe. i–SAFE Internet Life Skills Activities. – М.: , 2010. – 160 с.
  70. Ronald L. Krutz. Cloud Security. – М.: , 2010. – 384 с.
  71. T. Bradley. Essential Computer Security: Everyone's Guide to Email, Internet, andWireless Security. – М.: , 2010. – 0 с.
  72. Tony Flick, Justin Morehouse. Securing the Smart Grid: Next Generation Power Grid Security. – М.: Рид Элсивер, 2011. – 320 с.
  73. John R. Vacca. Computer and Information Security Handbook. – М.: , 2010. – 928 с.
  74. John M. Carroll. Computer Security. – М.: , 2010. – 648 с.
  75. Gary Bradski, Adrian Kaehler. Learning OpenCV: Computer Vision with the OpenCV Library. – М.: O'Reilly Media, 2008. – 556 с.
  76. Alan G. Konheim. Computer Security and Cryptography. – М.: , 1972. – 0 с.
  77. Computer Security Handbook. – М.: , 2002. – 1224 с.
  78. Dieter Gollmann. Computer Security. – М.: , 1998. – 336 с.
  79. CA TM. Simple Computer Security. – М.: , 2007. – 332 с.
  80. ED. Personal Computer Security. – М.: , 1996. – 360 с.
  81. RH BAKER. Baker ?computer Security? Handbook. – М.: , 1985. – 288 с.
  82. Hutt. Computer Security Handbook, 3rd Edition, 2000 Cumu lative Supplement. – М.: , 2000. – 112 с.
  83. Deborah Russell. Computer Security Basics. – М.: , 1991. – 464 с.
  84. Computer Security Handbook. – М.: , 1995. – 1088 с.
  85. S MUFTIC. Muftic: ?security? Mechanisms For Computer Network S. – М.: , 1989. – 196 с.
  86. Open Source Development, Communities and Quality: IFIP 20th World Computer Congress, Working Group 2.3 on Open Source Software, September 7-10, 2008, ... in Information and Communication Technology). – М.: , 2011. – 417 с.
  87. S. Rao Vallabhaneni. Auditing Computer Security. – М.: , 1989. – 368 с.
  88. Principles Of Computer Security, Comptia Security+ And Beyond, Second Edition. – М.: , 2011. – 0 с.
  89. Mobile Computing. – М.: , 2011. – 672 с.
  90. Hacking Exposed, Sixth Edition. – М.: , 2011. – 720 с.
  91. Aaron Philipp, David Cowen, Chris Davis. Hacking Exposed: Computer Forensics. – М.: McGraw-Hill, 2010. – 544 с.
  92. Cloud Computing, A Practical Approach. – М.: , 2011. – 352 с.
  93. Mike Meyers' Comptia A+ Guide: Practical Application, Third Edition (Exam 220-702). – М.: , 2011. – 0 с.
  94. Computer Security: 20 Things Every Employee Should Know. – М.: , 2011. – 0 с.
  95. Mike Meyers' Comptia A+ Guide: Practical Application Lab Manual, Third Edition (Exam 220-702). – М.: , 2011. – 320 с.
  96. Principles Of Computer Security Comptia Security+ And Beyond Lab Manual, Second Edition. – М.: , 2011. – 352 с.
  97. Network Security: The Complete Reference. – М.: , 2011. – 896 с.
  98. Eoghan Casey. Digital Evidence and Computer Crime. – М.: , . –  с.
  99. Dave Tyson. Security Convergence: Managing Enterprise Security Risk. – М.: , 2007. – 232 с.
  100. Ido Dubrawsky. How to Cheat at Securing Your Network. – М.: Syngress, 2007. – 432 с.
  101. Emily M. Harwood. Digital CCTV: A Security Professional's Guide. – М.: Butterworth-Heinemann, 2007. – 272 с.
  102. Charles L. Brooks. CHFI: Computer Hacking Forensic Investigator Certification: Exam Guide (+ CD). – М.: McGraw-Hill Education, 2015. – 656 с.
  103. Vivek Bhushan. Securing Published Data In Cloud Using Data Incognito. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  104. Rajani Sharma and Rajender Trivedi. Data Security in a Cloud Environment using Multilevel UEC. – М.: LAP Lambert Academic Publishing, 2014. – 84 с.
  105. Shaek Rana Mohammad Baki Billah and Mohammad Hafizur Rahman. Design & Development of Network Security System using IP Tables. – М.: LAP Lambert Academic Publishing, 2013. – 164 с.
  106. Anand Kannan. Evaluation of the Security Mechanisms in Cloud Networks. – М.: LAP Lambert Academic Publishing, 2013. – 192 с.
  107. T. Ambikadevi Amma. Inhibitors of Cloud Computing. – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  108. Naseer Ahmad. Security Issues in Wireless Networks. – М.: LAP Lambert Academic Publishing, 2010. – 60 с.
  109. Tejbanta Singh Chingtham. A Computational Intelligence Paradigm. – М.: LAP Lambert Academic Publishing, 2010. – 60 с.
  110. Adamu Usman. Cost-Benefit Analysis of Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  111. Adriana Marais. Security and Entanglement in Quantum Key Distribution. – М.: LAP Lambert Academic Publishing, 2010. – 108 с.
  112. Vinay Abburi. SECURE AND RELIABLE DEEP SPACE NETWORKS. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  113. Srivaramangai Padmanabhan. Reliable Infrastructure for Cloud Computing. – М.: LAP Lambert Academic Publishing, 2013. – 100 с.
  114. Sergey Nikolenko. Provably secure constructions in cryptography. – М.: LAP Lambert Academic Publishing, 2011. – 112 с.
  115. Reza Mohammad Hossein and Kamran Gholamahmadi. A Combinational Security-Model In Service-Oriented Architecture. – М.: LAP Lambert Academic Publishing, 2014. – 136 с.
  116. Victoria Yemi-Peters. Mobile Banking Security Services. – М.: LAP Lambert Academic Publishing, 2011. – 88 с.
  117. Balasubramaniam Sridhar and Douglas Niehaus. Precise Control of Discovered Computation Structure and Behavior. – М.: LAP Lambert Academic Publishing, 2014. – 164 с.
  118. Pallavali Radha Krishna Reddy and Gullapalli Sireesha. The Security Issues of Cloud Computing Over Normal & ITSector. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  119. Oluwafemi Osho and Victor Waziri. Conceptual Models and Simulation of Computer Worm Propagation. – М.: LAP Lambert Academic Publishing, 2013. – 116 с.
  120. Shivan Fazil Sabr. Cloud Computing Security. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  121. Stephen Murove,S. B. Mangena and B. Jones. Firewall Evaluation:Models for Major Decisions in Computer Security. – М.: LAP Lambert Academic Publishing, 2014. – 236 с.
  122. Irfan Syamsuddin. Guidelines for Computer Forensics Investigations in Developing Country. – М.: LAP Lambert Academic Publishing, 2011. – 104 с.
  123. Khanyisa Malufu. E-Banking Security. – М.: LAP Lambert Academic Publishing, 2013. – 112 с.

Дополнительные результаты

  1. Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с.
  2. Data Privacy Management and Autonomous Spontaneus Security: 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, ... Computer Science / Security and Cryptology). – М.: , 2012. – 334 с.
  3. Constructive Side-Channel Analysis and Secure Design: Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings ... Computer Science / Security and Cryptology). – М.: , 2012. – 280 с.
  4. Public Key Infrastructures, Services and Applications: 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected ... Computer Science / Security and Cryptology). – М.: , 2012. – 219 с.
  5. Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  6. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с.
  7. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с.
  8. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 515 с.
  9. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  10. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с.
  11. Smart Card Research and Advanced Applications: 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, ... Computer Science / Security and Cryptology). – М.: , 2012. – 357 с.
  12. Video Analytics for Business Intelligence (Studies in Computational Intelligence). – М.: , 2012. – 388 с.
  13. Securities Compliance Index. Securities Compliance Index, Second Edition: A Topical Guide To U.S. Securities Regulation. – М.: , 2012. – 512 с.
  14. David Chanoff, Ejovi Nuwere. Hacker Cracker : A Journey from the Mean Streets of Brooklyn to the Frontiers of Cyberspace. – М.: , 0. – 0 с.
  15. Terrell Ward Bynum, Simon Rogerson, Blackwell Pub. Computer Ethics and Professional Responsibility: Introductory Text and Readings. – М.: , 0. – 0 с.
  16. Information Warfare : corporate attack and defence in a digital world (Computer Weekly Professional (Paperback)). – М.: , 0. – 0 с.
  17. Susan Echaore-McDavid. Career Opportunities in Law Enforcement, Security, and Protective Services (The Career Opportunities Series). – М.: , 0. – 0 с.
  18. Leigh Wade. Careers in Private Security: How to Get Started, How to Get Ahead. – М.: , 0. – 0 с.
  19. Julia Lowell, C. R. Neu, Daochi Tong, National Defense Research Institute, National Security Research Institute. Financial Crises and Contagion in Emerging Market Countries. – М.: , 0. – 0 с.
  20. Seymour Bosworth, Michel E. Kabay. Computer Security Handbook. – М.: , 0. – 0 с.
  21. Richard Hunter. World Without Secrets: Business, Crime and Privacy in the Age of Ubiquitous Computing. – М.: , 0. – 0 с.
  22. Gerald L. Kovacich, Edward P. Halibozek. The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, First Edition. – М.: , 0. – 0 с.
  23. Thomas J. Parenty. Digital Defense: What You Should Know About Protecting Your Company's Assets. – М.: , 0. – 0 с.
  24. Marko Nordquist. Towards Improved Security Management Practice: Designing an Organizational Model Procedure for the Implementation of Information Security Management in Heterogeneous Information Management. – М.: , 0. – 0 с.
  25. Computer Security. – М.: , 0. – 0 с.
  26. Donn B. Parker. Fighting Computer Crime : A New Framework for Protecting Information. – М.: , 0. – 0 с.
  27. Ultimate Financial Security Survey. – М.: , 0. – 0 с.
  28. Effective Security Management, Fourth Edition (Effective Security Management). – М.: , 0. – 0 с.
  29. Joseph S. Nye, William A. Owens, James R. Schlesinger, R. James Woolsey, James A. Lewis, Joseph S., Jr. Nye, James Andrew Lewis, Erin Schlather, Csis Commission on Technology Security in the Twenty-First Century. Computer Exports and National Security: New Tools for a New Century : A Report of the Csis Commission on Technology Security in the 21St-Century (Csis Panel Reports.). – М.: , 0. – 0 с.
  30. Ravi Kalakota, Andrew B. Whinston, Coordination, and Collaboration Conference 1 Organizational Computing. Readings in Electronic Commerce. – М.: , 0. – 0 с.
  31. Juanita Ellis, Tim Speed. The Internet Security Guidebook: From Planning to Deployment. – М.: , 0. – 0 с.
  32. Roland Traunmuller, R. Traunmuller, Quebec) Ifip World Computer Congress 2002 Montreal. Information Systems: The E-Business Challenge (International Federation for Information Processing, 95). – М.: , 0. – 0 с.
  33. Mostafa Hashem Sherif. Protocols for Secure Electronic Commerce, Second Edition. – М.: , 0. – 0 с.
  34. Anup K. Ghosh. E-Commerce Security and Privacy. – М.: , 0. – 0 с.
  35. Joey F. George. Computers in Society. – М.: , 0. – 0 с.
  36. George Mohay, Alison Anderson, Byron Collie, Olivier de Vel, Rod McKemmish. Computer and Intrusion Forensics (Artech House Computer Security Series). – М.: , 0. – 0 с.
  37. Vesna Hassler. Security Fundamentals for E-Commerce (Artech House Computer Security Series). – М.: , 0. – 0 с.
  38. G. David Garson, G. David Information Technology and Computer Applications in Garson. Public Information Technology: Policy and Management Issues. – М.: , 0. – 0 с.
  39. Thomas Peltier, Thomas Pelitier, Justin Peltier, John A. Blackley, Peltier, Associates. Information Security Fundamentals. – М.: , 0. – 0 с.
  40. Steven R. Gordon, Dr. Steven Gordon. Computing Information Technology: The Human Side. – М.: , 0. – 0 с.
  41. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с.
  42. The Security Economy (Safety Standards Series:). – М.: , 2004. – 0 с.
  43. Christopher A. Crayton. Security + Exam Guide (Testtaker's Guide Series). – М.: , 2003. – 0 с.
  44. Economics of Information Security (Advances in Information Security). – М.: , 2004. – 0 с.
  45. Edward Borodzicz. Risk, Crisis and Security Management. – М.: , 2005. – 0 с.
  46. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с.
  47. Rickland Hollar. Enterprise Web Services Security (Internet Series). – М.: , 2005. – 432 с.
  48. Internet and Network Economics: First International Workshop, WINE 2005, Hong Kong, China, December 15-17, 2005, Proceedings (Lecture Notes in Computer Science). – М.: , 2006. – 1106 с.
  49. Committee on Federal Regulation of Securities Committee. The Fund Director's Guidebook: Third Edition (Fund Director's Guidebook). – М.: , 2006. – 128 с.
  50. Larstan's The Black Book on Corporate Security (Black Book Series). – М.: , 2005. – 439 с.
  51. Susan Echaore-McDavid. Career Opportunities In Law Enforcement, Security And Protective Services (Career Opportunities). – М.: , 2005. – 272 с.
  52. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с.
  53. Bruce Schneier. Schneier on Security. – М.: , 2008. – 336 с.
  54. Alan Calder, Steve Watkins. IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002. – М.: , 2008. – 384 с.
  55. Meridian Securities Market. World Stock Exchange Fact Book. – М.: , 2008. – 0 с.
  56. Computer & Network Procedures to Manage IT Systems. – М.: , 2008. – 720 с.
  57. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с.
  58. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с.
  59. Trust, Privacy and Security in Digital Business: 5th International Conference, TrustBus 2008 Turin, Italy, September 1-5, 2008, Proceedings (Lecture Notes in Computer Science). – М.: , 2008. – 205 с.
  60. V.R. Leonard. The Social Security and Medicare Handbook: What You Need to Know Explained Simply. – М.: , 2008. – 288 с.
  61. Gerard Blokdijk, Ivanka Menken. Information Security Management Best Practice Workbook: Implementation and Management Roadmap for Threats, Challenges and Solutions - Ready to use supporting documents bringing Theory into Practice. – М.: , 2008. – 124 с.
  62. CompTIA Security+: Certification Kit (комплект из 3 книг + 2 CD-ROM). – М.: Sybex, 2009. – 1440 с.
  63. John Rittinghouse, James Ransome. Cloud Computing: Implementation, Management, and Security. – М.: CRC Press, 2009. – 340 с.
  64. RITUPARNA DAS. Handbook of Fixed Income Securities: Indian Banking Perspective. – М.: , 2010. – 112 с.
  65. Andy Jones. Risk Management for Computer Security. – М.: , 2010. – 296 с.
  66. Jeff Crume. Inside Internet Security: What Hackers Don't Want You To Know. – М.: , 0. – 0 с.
  67. Learning to Live in the Knowledge Society: IFIP 20th World Computer Congress, IFIP TC 3 ED-L2L Conference, September 7-10, 2008, Milano, Italy (IFIP International ... Federation for Information Processing). – М.: , 2008. – 374 с.
  68. Molecular Imaging: Computer Reconstruction and Practice (NATO Science for Peace and Security Series B: Physics and Biophysics). – М.: , 2008. – 288 с.
  69. Handbook of Information and Communication Security. – М.: , 2010. – 800 с.
  70. Brain-Inspired Information Technology (Studies in Computational Intelligence). – М.: , 2010. – 182 с.
  71. Bryan Pfaffenberger. Webster?s New WorldTM Computer Dictionary. – М.: , 2003. – 432 с.
  72. Kevin D. Mitnick. The Art of Intrusion. – М.: , 2005. – 270 с.
  73. iSafe. i–SAFE Internet Life Skills Activities. – М.: , 2010. – 160 с.
  74. Ronald L. Krutz. Cloud Security. – М.: , 2010. – 384 с.
  75. T. Bradley. Essential Computer Security: Everyone's Guide to Email, Internet, andWireless Security. – М.: , 2010. – 0 с.
  76. Tony Flick, Justin Morehouse. Securing the Smart Grid: Next Generation Power Grid Security. – М.: Рид Элсивер, 2011. – 320 с.
  77. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с.
  78. John R. Vacca. Computer and Information Security Handbook. – М.: , 2010. – 928 с.
  79. John M. Carroll. Computer Security. – М.: , 2010. – 648 с.
  80. Gary Bradski, Adrian Kaehler. Learning OpenCV: Computer Vision with the OpenCV Library. – М.: O'Reilly Media, 2008. – 556 с.
  81. Alan G. Konheim. Computer Security and Cryptography. – М.: , 1972. – 0 с.
  82. Computer Security Handbook. – М.: , 2002. – 1224 с.
  83. MJ COMPUTER. Ball Data Processing In Medicine: How To Select A Computerized Hospital Information Systm. – М.: , 1973. – 0 с.
  84. Dieter Gollmann. Computer Security. – М.: , 1998. – 336 с.
  85. CA TM. Simple Computer Security. – М.: , 2007. – 332 с.
  86. ED. Personal Computer Security. – М.: , 1996. – 360 с.
  87. RH BAKER. Baker ?computer Security? Handbook. – М.: , 1985. – 288 с.
  88. Hutt. Computer Security Handbook, 3rd Edition, 2000 Cumu lative Supplement. – М.: , 2000. – 112 с.
  89. Deborah Russell. Computer Security Basics. – М.: , 1991. – 464 с.
  90. Computer Security Handbook. – М.: , 1995. – 1088 с.
  91. S MUFTIC. Muftic: ?security? Mechanisms For Computer Network S. – М.: , 1989. – 196 с.
  92. R COMPUTERS. Dehaene Computers In Radiology. – М.: , 1971. – 0 с.
  93. Apple Computer. Learning Carbon. – М.: , 2001. – 360 с.
  94. Apple Computer. Learning Cocoa. – М.: , 2001. – 384 с.
  95. Open Source Development, Communities and Quality: IFIP 20th World Computer Congress, Working Group 2.3 on Open Source Software, September 7-10, 2008, ... in Information and Communication Technology). – М.: , 2011. – 417 с.
  96. COMPUTER. Computer School ?mastering? Multiplan Tm (paper On Ly). – М.: , 1984. – 0 с.
  97. Center for Professional Computer Education. Multimate ProfessionalTM. – М.: , 1986. – 240 с.
  98. Center for Professional Computer Education. DisplayWrite III. – М.: , 1987. – 224 с.
  99. Center for Professional Computer Education. WordStar®. – М.: , 1987. – 192 с.
  100. Center for Professional Computer Education. LOTUS 1–2–3 Quick Reference Handbook. – М.: , 1986. – 240 с.
  101. COMPUTER PART. Computer Partners: Handbook Of Cobol Techniques & Programming Standards 3ed (pr Only). – М.: , 1993. – 0 с.
  102. S. Rao Vallabhaneni. Auditing Computer Security. – М.: , 1989. – 368 с.
  103. Principles Of Computer Security, Comptia Security+ And Beyond, Second Edition. – М.: , 2011. – 0 с.
  104. Hacking Exposed, Sixth Edition. – М.: , 2011. – 720 с.
  105. Mike Meyers' Comptia A+ Guide: Practical Application, Third Edition (Exam 220-702). – М.: , 2011. – 0 с.
  106. Computer Security: 20 Things Every Employee Should Know. – М.: , 2011. – 0 с.
  107. Mike Meyers' Comptia A+ Guide: Practical Application Lab Manual, Third Edition (Exam 220-702). – М.: , 2011. – 320 с.
  108. Principles Of Computer Security Comptia Security+ And Beyond Lab Manual, Second Edition. – М.: , 2011. – 352 с.
  109. Eoghan Casey. Digital Evidence and Computer Crime. – М.: , . –  с.
  110. Inc. KT Solutions, KT Solutions has focused on what it takes to create efficient, professional multimedia training t KT Solutions specializes in the development of interactive multimedia training products for computer applications. Over the past decade. Beginning Windows NT Workstation 4.0 (Microsoft Windows NT). – М.: , . –  с.
  111. Inc. KT Solutions, KT Solutions has focused on what it takes to create efficient, professional multimedia training t KT Solutions specializes in the development of interactive multimedia training products for computer applications. Over the past decade. Advanced Word for Office 97 (Microsoft Word 97). – М.: , . –  с.
  112. Dave Tyson. Security Convergence: Managing Enterprise Security Risk. – М.: , 2007. – 232 с.
  113. Tejbanta Singh Chingtham. A Computational Intelligence Paradigm. – М.: LAP Lambert Academic Publishing, 2010. – 60 с.
  114. Faraz Fatemi Moghaddam. Secure Cloud Computing with Client-Based Control System. – М.: LAP Lambert Academic Publishing, 2013. – 100 с.
  115. Glenn Wilkinson. Identification of Hostile TCP Traffic using Support Vector Machines. – М.: LAP Lambert Academic Publishing, 2010. – 80 с.
  116. E.O. Ibidunmoye and B.K. Alese. Game-Theoretic Analysis of Network Attack-Defense Interactions. – М.: LAP Lambert Academic Publishing, 2013. – 108 с.
  117. Firkhan Ali Hamid Ali. Vulnerability Analysis on the Computer Network Security. – М.: LAP Lambert Academic Publishing, 2010. – 72 с.
  118. Saima Munawar. Detection and Classification Of Normal and Anomaly IP Packet. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  119. Ricardo Chaves. Secure Computing on Reconfigurable Systems. – М.: LAP Lambert Academic Publishing, 2010. – 212 с.
  120. Lamek Ronoh. Security Concern of Cloud Computing Models. – М.: LAP Lambert Academic Publishing, 2014. – 88 с.
  121. Homam El-Taj and Omar Amer. Network Alert Management System For IDS False Positive Reduction. – М.: LAP Lambert Academic Publishing, 2013. – 156 с.
  122. Ondrej Vanek. Computational Methods for Transportation Security. – М.: LAP Lambert Academic Publishing, 2014. – 244 с.
  123. Saad Ahmed Khan and Saif Ahmad. Security Implications of Cloud computing. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  124. Sadia Marium. Analysis of the Security threats to Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  125. A. S. N. Chakravarthy. Password Authentication Using Associative Memories. – М.: LAP Lambert Academic Publishing, 2012. – 188 с.
  126. Md. Rabiul Islam,Md. Fayzur Rahman and Faculty of Electrical-Computer Engineering RUET Rajshahi Bang. IMPROVEMENT OF NOISE ROBUST SPEAKER IDENTIFICATION. – М.: LAP Lambert Academic Publishing, 2010. – 88 с.
  127. Pallavali Radha Krishna Reddy and Gullapalli Sireesha. The Security Issues of Cloud Computing Over Normal & ITSector. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  128. Rupali Pathak. Recent Advances In Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  129. Oluwafemi Osho and Victor Waziri. Conceptual Models and Simulation of Computer Worm Propagation. – М.: LAP Lambert Academic Publishing, 2013. – 116 с.
  130. Hassen Alsafi and Mohammed Azhruddin. The Security Issues for Smart Grids Applications on Cloud Computing. – М.: LAP Lambert Academic Publishing, 2013. – 60 с.
  131. Shivan Fazil Sabr. Cloud Computing Security. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  132. Meysam Namayandeh. Development of Computer Ethical Framework for Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 132 с.
  133. Stephen Murove,S. B. Mangena and B. Jones. Firewall Evaluation:Models for Major Decisions in Computer Security. – М.: LAP Lambert Academic Publishing, 2014. – 236 с.
  134. Mafaz M. K. Al-Anezi and Najla B. I. Al-Dabagh. Multilayer Artificial Immune Systems for Intrusion & Malware Detection. – М.: LAP Lambert Academic Publishing, 2012. – 148 с.
  135. Aftab Yaseen,S. M. Zakariya and M. Q. Rafiq. Association Rules Mining for AIS based Classification. – М.: LAP Lambert Academic Publishing, 2013. – 100 с.
  136. Irfan Syamsuddin. Guidelines for Computer Forensics Investigations in Developing Country. – М.: LAP Lambert Academic Publishing, 2011. – 104 с.
  137. Muhammad Imran Tariq. SLA based Information Security Metrics in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2014. – 192 с.
  138. Paul Denys. Security of Personal Information in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 144 с.
  139. Khanyisa Malufu. E-Banking Security. – М.: LAP Lambert Academic Publishing, 2013. – 112 с.
  140. Dilan Aksoy and Hidayet Takc?. Character Level Authorship Attribution of Turkish Texts. – М.: LAP Lambert Academic Publishing, 2012. – 56 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

Ничего не найдено

Образцы работ

Тема и предметТип и объем работы
Последствия операции НАТО
Политология
Диплом
80 стр.
Платежные системы в Интернете
Информатика
Диплом
102 стр.
Роль ОБСЕ в урегулировании конфликтов в Европе
Политология
Курсовая работа
33 стр.
Проблемы реформирования ОБСЕ
Политология
Курсовая работа
29 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Кристина
Здравствуйте! Сдала диплом после вашего сопровождения. Спасибо большое за помощь и терпение.