Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с.
  2. Paul Shaw. E-Business Privacy and Trust: Planning and Management Strategies. – М.: , 0. – 0 с.
  3. Jie Lu, Lakhmi C Jain, Guangquan Zhang. Handbook on Decision Making: Vol 2: Risk Management in Decision Making (Intelligent Systems Reference Library). – М.: , 2012. – 472 с.
  4. Ann Poe. The McGraw-Hill Handbook of More Business Letters. – М.: , 0. – 0 с.
  5. Handbook of Management Information Systems. – М.: , 0. – 0 с.
  6. Seymour Bosworth, Michel E. Kabay. Computer Security Handbook. – М.: , 0. – 0 с.
  7. John M. D. Hunter. An Information Security Handbook (Computer Communications and Networks). – М.: , 0. – 0 с.
  8. Gerald L. Kovacich, Edward P. Halibozek. The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, First Edition. – М.: , 0. – 0 с.
  9. Amjad Umar. E-Business and Distributed Systems Handbook: Management Module. – М.: , 0. – 0 с.
  10. Amjad Umar. E-Business and Distributed Systems Handbook: Platforms Module. – М.: , 0. – 0 с.
  11. V.R. Leonard. The Social Security and Medicare Handbook: What You Need to Know Explained Simply. – М.: , 2008. – 288 с.
  12. Handbook on Information Technology in Finance (International Handbooks on Information Systems). – М.: , 2008. – 800 с.
  13. RITUPARNA DAS. Handbook of Fixed Income Securities: Indian Banking Perspective. – М.: , 2010. – 112 с.
  14. Handbook of Information and Communication Security. – М.: , 2010. – 800 с.
  15. John R. Vacca. Computer and Information Security Handbook. – М.: , 2010. – 928 с.
  16. Computer Security Handbook. – М.: , 2002. – 1224 с.
  17. RH BAKER. Baker ?computer Security? Handbook. – М.: , 1985. – 288 с.
  18. Hutt. Computer Security Handbook, 3rd Edition, 2000 Cumu lative Supplement. – М.: , 2000. – 112 с.
  19. Computer Security Handbook. – М.: , 1995. – 1088 с.
  20. Oracle Soa Suite 11G Handbook. – М.: , 2011. – 800 с.
  21. Ido Dubrawsky. How to Cheat at Securing Your Network. – М.: Syngress, 2007. – 432 с.

Дополнительные результаты

  1. Public Key Infrastructures, Services and Applications: 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected ... Computer Science / Security and Cryptology). – М.: , 2012. – 219 с.
  2. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с.
  3. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с.
  4. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с.
  5. Securities Compliance Index. Securities Compliance Index, Second Edition: A Topical Guide To U.S. Securities Regulation. – М.: , 2012. – 512 с.
  6. David Chanoff, Ejovi Nuwere. Hacker Cracker : A Journey from the Mean Streets of Brooklyn to the Frontiers of Cyberspace. – М.: , 0. – 0 с.
  7. Terrell Ward Bynum, Simon Rogerson, Blackwell Pub. Computer Ethics and Professional Responsibility: Introductory Text and Readings. – М.: , 0. – 0 с.
  8. Paul Voillis, Paul Viollis. Jane's Workplace Security Handbook. – М.: , 0. – 0 с.
  9. Ann Poe. The McGraw-Hill Handbook of More Business Letters. – М.: , 0. – 0 с.
  10. Asset Protection and Security Management Handbook. – М.: , 0. – 0 с.
  11. Handbook of Management Information Systems. – М.: , 0. – 0 с.
  12. Philip P. Purpura. The Security Handbook. – М.: , 0. – 0 с.
  13. Jessica Keyes. Securities Technology Handbook. – М.: , 0. – 0 с.
  14. Julia Lowell, C. R. Neu, Daochi Tong, National Defense Research Institute, National Security Research Institute. Financial Crises and Contagion in Emerging Market Countries. – М.: , 0. – 0 с.
  15. Frank J. Fabozzi, Chuck Ramsey, Michael Marz. The Handbook of Nonagency Mortgage-Backed Securities, 2nd Edition. – М.: , 0. – 0 с.
  16. Frank J. Fabozzi, David P. Jacob. The Handbook of Commercial Mortgage-Backed Securities, 2nd Edition. – М.: , 0. – 0 с.
  17. Seymour Bosworth, Michel E. Kabay. Computer Security Handbook. – М.: , 0. – 0 с.
  18. Richard Hunter. World Without Secrets: Business, Crime and Privacy in the Age of Ubiquitous Computing. – М.: , 0. – 0 с.
  19. John M. D. Hunter. An Information Security Handbook (Computer Communications and Networks). – М.: , 0. – 0 с.
  20. Gerald L. Kovacich, Edward P. Halibozek. The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, First Edition. – М.: , 0. – 0 с.
  21. Thomas J. Parenty. Digital Defense: What You Should Know About Protecting Your Company's Assets. – М.: , 0. – 0 с.
  22. Computer Security. – М.: , 0. – 0 с.
  23. Donn B. Parker. Fighting Computer Crime : A New Framework for Protecting Information. – М.: , 0. – 0 с.
  24. Joseph S. Nye, William A. Owens, James R. Schlesinger, R. James Woolsey, James A. Lewis, Joseph S., Jr. Nye, James Andrew Lewis, Erin Schlather, Csis Commission on Technology Security in the Twenty-First Century. Computer Exports and National Security: New Tools for a New Century : A Report of the Csis Commission on Technology Security in the 21St-Century (Csis Panel Reports.). – М.: , 0. – 0 с.
  25. Ravi Kalakota, Andrew B. Whinston, Coordination, and Collaboration Conference 1 Organizational Computing. Readings in Electronic Commerce. – М.: , 0. – 0 с.
  26. Roland Traunmuller, R. Traunmuller, Quebec) Ifip World Computer Congress 2002 Montreal. Information Systems: The E-Business Challenge (International Federation for Information Processing, 95). – М.: , 0. – 0 с.
  27. Amjad Umar. E-Business and Distributed Systems Handbook: Management Module. – М.: , 0. – 0 с.
  28. George Mohay, Alison Anderson, Byron Collie, Olivier de Vel, Rod McKemmish. Computer and Intrusion Forensics (Artech House Computer Security Series). – М.: , 0. – 0 с.
  29. Amjad Umar. E-Business and Distributed Systems Handbook: Platforms Module. – М.: , 0. – 0 с.
  30. Vesna Hassler. Security Fundamentals for E-Commerce (Artech House Computer Security Series). – М.: , 0. – 0 с.
  31. Harold F. Tipton, Micki Krause, Micki, Cissp Krause. Information Security Management Handbook, Fifth Edition. – М.: , 0. – 0 с.
  32. G. David Garson, G. David Information Technology and Computer Applications in Garson. Public Information Technology: Policy and Management Issues. – М.: , 0. – 0 с.
  33. Thomas Peltier, Thomas Pelitier, Justin Peltier, John A. Blackley, Peltier, Associates. Information Security Fundamentals. – М.: , 0. – 0 с.
  34. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с.
  35. Christopher A. Crayton. Security + Exam Guide (Testtaker's Guide Series). – М.: , 2003. – 0 с.
  36. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с.
  37. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с.
  38. The Interior Design Handbook '2006. Пространство и Стиль. Справочник-путеводитель по российским компаниям и представительствам. Выпуск 6. – М.: , 2005. – 544 с.
  39. Leigh Tesfatsion, Kenneth L. Judd. Handbook of Computational Economics, Volume 2: Agent-Based Computational Economics (Handbook of Computational Economics). – М.: North Holland, 2006. – 904 с.
  40. Frank Fabozzi. The Handbook of Mortgage-Backed Securities. – М.: McGraw-Hill, 2005. – 950 с.
  41. The Personal Security Handbook. – М.: , 2005. – 328 с.
  42. Committee on Federal Regulation of Securities Committee. The Fund Director's Guidebook: Third Edition (Fund Director's Guidebook). – М.: , 2006. – 128 с.
  43. Michael Gentile, Ron Collette, Tom August. The Ciso Handbook: A Practical Guide to Securing Your Company. – М.: , 2005. – 352 с.
  44. Frank Fabozzi. The Handbook of Fixed Income Securities. – М.: McGraw-Hill, 2005. – 1500 с.
  45. Dipak Laha & Purnendu Mandal. Handbook of Computational Intelligence in Manufacturing and Production Management. – М.: Idea Group Reference, 2007. – 516 с.
  46. Ibp Usa. Korea South Intelligence & Security Activities & Operations Handbook. – М.: , 2008. – 300 с.
  47. Ibp Usa. Sweden Intelligence & Security Activities & Operations Handbook. – М.: , 2008. – 300 с.
  48. Bruce Schneier. Schneier on Security. – М.: , 2008. – 336 с.
  49. Ibp Usa. Thailand Army, National Security And Defense Policy Handbook. – М.: , 2008. – 300 с.
  50. Ibp Usa. Turkey Army, National Security And Defense Policy Handbook (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с.
  51. Ibp Usa. Ukraine Army, National Security And Defense Policy Handbook (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с.
  52. Ibp Usa. CZECH REPUBLIC ARMY, NATIONAL SECURITY AND DEFENSE POLICY HANDBOOK (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с.
  53. Ibp Usa. ESTONIA ARMY, NATIONAL SECURITY AND DEFENSE POLICY HANDBOOK (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с.
  54. Ibp Usa. Finland Army, National Security And Defense Policy Handbook (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с.
  55. Ibp Usa. Germany Army, National Security And Defense Policy Handbook (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с.
  56. Ibp Usa. China Army, National Security and Defense Policy Handbook. – М.: , 2008. – 300 с.
  57. Ibp Usa. Cuba Army, National Security And Defense Policy Handbook (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с.
  58. Ibp Usa. US Securities and Exchange Commission Handbook. – М.: , 2008. – 300 с.
  59. Ibp Usa. Myanmar Army, National Security And Defense Policy Handbook. – М.: , 2008. – 300 с.
  60. Ibp Usa. Philippines Army National Security and Defense Policy Handbook. – М.: , 2008. – 300 с.
  61. Ibp Usa. Russia KGB (National Security and Intelligence Handbook: Past And Present (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с.
  62. Ibp Usa. Global National Security and Intelligence Agencies Handbook. – М.: , 2008. – 300 с.
  63. Ibp Usa. United States Department of Homeland Security Handbook. – М.: , 2008. – 300 с.
  64. Ibp Usa. Estonia Intelligence & Security Activities & Operations Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  65. Ibp Usa. Germany Army, National Security and Defense Policy Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  66. Ibp Usa. Australia Army, National Security and Defense Policy Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  67. Ibp Usa. Australia Intelligence & Security Activities & Operations Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  68. Ibp Usa. Bangladesh Army, National Security and Defense Policy Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  69. Ibp Usa. German Intelligence, Security Activities & Operations Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  70. Ibp Usa. Global National Intelligence and Security Agencies Handbook. – М.: , 2008. – 300 с.
  71. Lloyd's MIU Handbook of Maritime Security. – М.: , 2008. – 400 с.
  72. Ibp Usa. Argentina Intelligence & Security Activities & Operations Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  73. Ibp Usa. Cuba Army Defense Policy and National Security Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  74. Meridian Securities Market. World Stock Exchange Fact Book. – М.: , 2008. – 0 с.
  75. V.R. Leonard. The Social Security and Medicare Handbook: What You Need to Know Explained Simply. – М.: , 2008. – 288 с.
  76. Andy Jones. Risk Management for Computer Security. – М.: , 2010. – 296 с.
  77. Gheorghe Paun, Grzegorz Rozenberg, Arto Salomaa. The Oxford Handbook of Membrane Computing (Oxford Handbooks). – М.: , 2010. – 696 с.
  78. Handbook of Information and Communication Security. – М.: , 2010. – 800 с.
  79. Bryan Pfaffenberger. Webster?s New WorldTM Computer Dictionary. – М.: , 2003. – 432 с.
  80. Kevin D. Mitnick. The Art of Intrusion. – М.: , 2005. – 270 с.
  81. iSafe. i–SAFE Internet Life Skills Activities. – М.: , 2010. – 160 с.
  82. Philip Purpura. The Security Handbook. – М.: , 2010. – 400 с.
  83. T. Bradley. Essential Computer Security: Everyone's Guide to Email, Internet, andWireless Security. – М.: , 2010. – 0 с.
  84. Tony Flick, Justin Morehouse. Securing the Smart Grid: Next Generation Power Grid Security. – М.: Рид Элсивер, 2011. – 320 с.
  85. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с.
  86. John R. Vacca. Computer and Information Security Handbook. – М.: , 2010. – 928 с.
  87. John M. Carroll. Computer Security. – М.: , 2010. – 648 с.
  88. Tom Canavan. CMS Security Handbook. – М.: , 2011. – 456 с.
  89. Alan G. Konheim. Computer Security and Cryptography. – М.: , 1972. – 0 с.
  90. Computer Security Handbook. – М.: , 2002. – 1224 с.
  91. MJ COMPUTER. Ball Data Processing In Medicine: How To Select A Computerized Hospital Information Systm. – М.: , 1973. – 0 с.
  92. Dieter Gollmann. Computer Security. – М.: , 1998. – 336 с.
  93. CA TM. Simple Computer Security. – М.: , 2007. – 332 с.
  94. The Bond Market Association (TBMA). Government Securities Handbook. – М.: , 2012. – 288 с.
  95. ED. Personal Computer Security. – М.: , 1996. – 360 с.
  96. RH BAKER. Baker ?computer Security? Handbook. – М.: , 1985. – 288 с.
  97. Hutt. Computer Security Handbook, 3rd Edition, 2000 Cumu lative Supplement. – М.: , 2000. – 112 с.
  98. Deborah Russell. Computer Security Basics. – М.: , 1991. – 464 с.
  99. Computer Security Handbook. – М.: , 1995. – 1088 с.
  100. R COMPUTERS. Dehaene Computers In Radiology. – М.: , 1971. – 0 с.
  101. Apple Computer. Learning Carbon. – М.: , 2001. – 360 с.
  102. Apple Computer. Learning Cocoa. – М.: , 2001. – 384 с.
  103. COMPUTER. Computer School ?mastering? Multiplan Tm (paper On Ly). – М.: , 1984. – 0 с.
  104. Center for Professional Computer Education. Multimate ProfessionalTM. – М.: , 1986. – 240 с.
  105. Center for Professional Computer Education. DisplayWrite III. – М.: , 1987. – 224 с.
  106. Center for Professional Computer Education. WordStar®. – М.: , 1987. – 192 с.
  107. Center for Professional Computer Education. LOTUS 1–2–3 Quick Reference Handbook. – М.: , 1986. – 240 с.
  108. J ZONDERMAN. Zonderman Personal Computer ?investment? Handbook (paper Only). – М.: , 1985. – 160 с.
  109. A MARGOLIS. Margolis: ?computer? Technicians Handbook 3ed (pr Only). – М.: , 1990. – 580 с.
  110. COMPUTER PART. Computer Partners: Handbook Of Cobol Techniques & Programming Standards 3ed (pr Only). – М.: , 1993. – 0 с.
  111. S. Rao Vallabhaneni. Auditing Computer Security. – М.: , 1989. – 368 с.
  112. Building Security. – М.: , 2004. – 672 с.
  113. Principles Of Computer Security, Comptia Security+ And Beyond, Second Edition. – М.: , 2011. – 0 с.
  114. Hacking Exposed, Sixth Edition. – М.: , 2011. – 720 с.
  115. Mike Meyers' Comptia A+ Guide: Practical Application, Third Edition (Exam 220-702). – М.: , 2011. – 0 с.
  116. Computer Security: 20 Things Every Employee Should Know. – М.: , 2011. – 0 с.
  117. Mike Meyers' Comptia A+ Guide: Practical Application Lab Manual, Third Edition (Exam 220-702). – М.: , 2011. – 320 с.
  118. Principles Of Computer Security Comptia Security+ And Beyond Lab Manual, Second Edition. – М.: , 2011. – 352 с.
  119. Eoghan Casey. Digital Evidence and Computer Crime. – М.: , . –  с.
  120. Inc. KT Solutions, KT Solutions has focused on what it takes to create efficient, professional multimedia training t KT Solutions specializes in the development of interactive multimedia training products for computer applications. Over the past decade. Beginning Windows NT Workstation 4.0 (Microsoft Windows NT). – М.: , . –  с.
  121. Inc. KT Solutions, KT Solutions has focused on what it takes to create efficient, professional multimedia training t KT Solutions specializes in the development of interactive multimedia training products for computer applications. Over the past decade. Advanced Word for Office 97 (Microsoft Word 97). – М.: , . –  с.
  122. Dave Tyson. Security Convergence: Managing Enterprise Security Risk. – М.: , 2007. – 232 с.
  123. Abdinasir Hassan Ali. Wireless security Handbook 2011. – М.: LAP Lambert Academic Publishing, 2011. – 124 с.
  124. Tejbanta Singh Chingtham. A Computational Intelligence Paradigm. – М.: LAP Lambert Academic Publishing, 2010. – 60 с.
  125. Glenn Wilkinson. Identification of Hostile TCP Traffic using Support Vector Machines. – М.: LAP Lambert Academic Publishing, 2010. – 80 с.
  126. E.O. Ibidunmoye and B.K. Alese. Game-Theoretic Analysis of Network Attack-Defense Interactions. – М.: LAP Lambert Academic Publishing, 2013. – 108 с.
  127. Saima Munawar. Detection and Classification Of Normal and Anomaly IP Packet. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  128. Homam El-Taj and Omar Amer. Network Alert Management System For IDS False Positive Reduction. – М.: LAP Lambert Academic Publishing, 2013. – 156 с.
  129. A. S. N. Chakravarthy. Password Authentication Using Associative Memories. – М.: LAP Lambert Academic Publishing, 2012. – 188 с.
  130. Md. Rabiul Islam,Md. Fayzur Rahman and Faculty of Electrical-Computer Engineering RUET Rajshahi Bang. IMPROVEMENT OF NOISE ROBUST SPEAKER IDENTIFICATION. – М.: LAP Lambert Academic Publishing, 2010. – 88 с.
  131. Pallavali Radha Krishna Reddy and Gullapalli Sireesha. The Security Issues of Cloud Computing Over Normal & ITSector. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  132. Rupali Pathak. Recent Advances In Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  133. Oluwafemi Osho and Victor Waziri. Conceptual Models and Simulation of Computer Worm Propagation. – М.: LAP Lambert Academic Publishing, 2013. – 116 с.
  134. Shivan Fazil Sabr. Cloud Computing Security. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  135. Stephen Murove,S. B. Mangena and B. Jones. Firewall Evaluation:Models for Major Decisions in Computer Security. – М.: LAP Lambert Academic Publishing, 2014. – 236 с.
  136. Mafaz M. K. Al-Anezi and Najla B. I. Al-Dabagh. Multilayer Artificial Immune Systems for Intrusion & Malware Detection. – М.: LAP Lambert Academic Publishing, 2012. – 148 с.
  137. Aftab Yaseen,S. M. Zakariya and M. Q. Rafiq. Association Rules Mining for AIS based Classification. – М.: LAP Lambert Academic Publishing, 2013. – 100 с.
  138. Irfan Syamsuddin. Guidelines for Computer Forensics Investigations in Developing Country. – М.: LAP Lambert Academic Publishing, 2011. – 104 с.
  139. Khanyisa Malufu. E-Banking Security. – М.: LAP Lambert Academic Publishing, 2013. – 112 с.
  140. Dilan Aksoy and Hidayet Takc?. Character Level Authorship Attribution of Turkish Texts. – М.: LAP Lambert Academic Publishing, 2012. – 56 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

Ничего не найдено

Образцы работ

Тема и предметТип и объем работы
Последствия операции НАТО
Политология
Диплом
80 стр.
Платежные системы в Интернете
Информатика
Диплом
102 стр.
Роль ОБСЕ в урегулировании конфликтов в Европе
Политология
Курсовая работа
33 стр.
Проблемы реформирования ОБСЕ
Политология
Курсовая работа
29 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Ярослав
Все сделано хорошо, готовимся к защите. Спасибо за консультацию.