Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – М.: , 2012. – 283 с. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 515 с. Jack J. Champlain. Auditing Information Systems. – М.: , 0. – 0 с. Thomas J. Parenty. Digital Defense: What You Should Know About Protecting Your Company's Assets. – М.: , 0. – 0 с. Oded Goldreich. Foundations of Cryptography: Basic Tools. – М.: , 0. – 0 с. Amjad Umar. E-Business and Distributed Systems Handbook: Management Module. – М.: , 0. – 0 с. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с. Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series). – М.: , 2005. – 298 с. Robert B. Laughlin. The Crime of Reason: And the Closing of the Scientific Mind. – М.: , 2008. – 224 с. Theory of Cryptography: 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2010. – 616 с. Markus Jakobsson. Phishing and Countermeasures. – М.: , 2007. – 736 с. Alan G. Konheim. Computer Security and Cryptography. – М.: , 1972. – 0 с. Principles Of Computer Security, Comptia Security+ And Beyond, Second Edition. – М.: , 2011. – 0 с. Hacking Exposed Linux. – М.: , 2011. – 813 с. LeelaRani Vanapalli. FPGA Implementation of Advanced Encryption Standard Algorithm. – М.: LAP Lambert Academic Publishing, 2012. – 64 с. Rashi Kohli and Manoj Kumar. Cryptographic on System-Chip-Design Using VLSI Technique. – М.: LAP Lambert Academic Publishing, 2013. – 92 с. Martin Simka and Milos Drutarovsky. Selected Blocks for Public-Key Cryptosystems in FPGAs. – М.: LAP Lambert Academic Publishing, 2012. – 192 с. Veronica Fernandez-Marmol. Quantum Cryptography at High Speed. – М.: LAP Lambert Academic Publishing, 2010. – 240 с. Santosh Kumar Yadav. Some Problems In Symmetric And Asymmetric Cryptography. – М.: LAP Lambert Academic Publishing, 2012. – 148 с. Deepak Puthal and Bibhudatta Sahoo. Secure Data Collection & Critical Data Transmission in Mobile Sink WSN. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Subhankar Chattopadhyay and Ashok Kumar Turuk. Key Pre-distribution and Key Revocation in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2011. – 72 с. Shahab Saquib Sohail and Musheer Ahmad. Chaos-based Encryption. – М.: LAP Lambert Academic Publishing, 2012. – 144 с. Ravinder Singh Mann. A Comparative Evaluation of Cryptographic Algorithms. – М.: LAP Lambert Academic Publishing, 2012. – 84 с. Mazen Mohammed,Alaa Eldin Rohiem and Ali El-moghazy. CSRTP. – М.: LAP Lambert Academic Publishing, 2013. – 76 с. Eystein Maloy Stenberg. Distributing a Private Key Generator in Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 116 с. Iyad Shaheen. HIGH PERFORMANCE APPROACH FOR DIGITAL SIGNATURE. – М.: LAP Lambert Academic Publishing, 2011. – 132 с. Vinothkumar Jambulingam. Secure and Anonymous Routing for Mobile Adhoc Networks. – М.: LAP Lambert Academic Publishing, 2014. – 72 с. Sanjeev Karmakar and Manoj K. Kowar. A Comprehensive Lecture Notes on RSA-1024 Cryptography. – М.: LAP Lambert Academic Publishing, 2013. – 160 с. Aditya Kumar. Cryptography and Chaos a New Approach in Network Security. – М.: LAP Lambert Academic Publishing, 2015. – 80 с. Piotr Szczechowiak. Security in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2011. – 248 с. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с. Pragati Patil-Bedekar. Energy & Time Performance Metrics in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 88 с. Vincent Omollo. Enhanced Network Security. – М.: LAP Lambert Academic Publishing, 2013. – 76 с. Manish Gupta and Dharmendra Kumar. Design and Implementation of Digital Watermarking. – М.: LAP Lambert Academic Publishing, 2014. – 172 с. Kirat Pal Singh. MIPS Pipeline Cryptoprocessor. – М.: LAP Lambert Academic Publishing, 2012. – 480 с. Anjan Kumar Payra. Steganology for the Computer Forensics Examiners. – М.: LAP Lambert Academic Publishing, 2013. – 76 с. Martin Drahansky. Biometric Cryptography Based on Fingerprints. – М.: LAP Lambert Academic Publishing, 2010. – 160 с. Ruchira Naskar. Secret Sharing in User Hierarchy. – М.: LAP Lambert Academic Publishing, 2013. – 64 с. Vasilios Katos. Symmetric cryptography in computer communications. – М.: LAP Lambert Academic Publishing, 2011. – 344 с. Dirk Lessner. Network Security for Embedded Systems. – М.: LAP Lambert Academic Publishing, 2009. – 232 с. Penmetsa V. Krishna Raja,A.S.N. Chakravarthy and P.S. Avadhani. Crypto Authentication System Using Hilbert Matrices. – М.: LAP Lambert Academic Publishing, 2014. – 160 с. Valerie Gauthier Umana. Post-Quantum Cryptography. – М.: Scholars' Press, 2014. – 200 с. Nizamud Din. Signcryption Schemes Based on Hyper Elliptic Curve Cryptography. – М.: LAP Lambert Academic Publishing, 2013. – 72 с. Gulzar Mehmood,Nizamud Din and Muhammad Nawaz Khan. Privacy Preserving Scheme for Body Sensor Networks Based on CDLP. – М.: LAP Lambert Academic Publishing, 2014. – 56 с. Tadeusz Struk. Elliptic Curve Cryptography as suitable solution for mobile devices. – М.: LAP Lambert Academic Publishing, 2010. – 88 с. Alptekin Kupcu. Efficient Cryptography for the Next Generation Secure Cloud. – М.: LAP Lambert Academic Publishing, 2010. – 220 с. Дополнительные результаты Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с. Security and Privacy in Mobile Information and Communication Systems: Third International ICST Conference, MOBISEC 2011, Aalborg, Denmark, May 17-19, ... and Telecommunications Engineering). – М.: , 2012. – 195 с. Public Key Infrastructures, Services and Applications: 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected ... Computer Science / Security and Cryptology). – М.: , 2012. – 219 с. Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – М.: , 2012. – 283 с. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с. Technological Innovation for Value Creation: Third IFIP WG 5.5/SOCOLNET Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS ... in Information and Communication Technology). – М.: , 2012. – 607 с. Security and Development in Global Politics: A Critical Comparison. – М.: , 2012. – 360 с. Luis Lobo-Guerrero. Insuring Security: Biopolitics, security and risk. – М.: , 2012. – 178 с. Terrorism and the Olympics: Major Event Security and Lessons for the Future. – М.: , 2012. – 272 с. Giorgio S. Questa. Fixed Income Analysis for the Global Financial Market: Money Market, Foreign Exchange, Securities, and Derivatives. – М.: Wiley, 1999. – 368 с. Rattan Lal, David Hansen, Norman Uphoff, Steven Slack, Rattan Lal. Food Security and Environmental Quality in the Developing World. – М.: , 0. – 0 с. Mario J. Miranda, Paul L. Fackler. Applied Computational Economics and Finance. – М.: , 0. – 0 с. Soren S. Nielsen. Programming Languages and Systems in Computational Economics and Finance (Advances in Computational Economics, 18). – М.: , 0. – 0 с. Terrell Ward Bynum, Simon Rogerson, Blackwell Pub. Computer Ethics and Professional Responsibility: Introductory Text and Readings. – М.: , 0. – 0 с. Susan Echaore-McDavid. Career Opportunities in Law Enforcement, Security, and Protective Services (The Career Opportunities Series). – М.: , 0. – 0 с. Maurice, Ph.D. Youakim. Social Security and Medicare for the New Millenium. – М.: , 0. – 0 с. David L. Woodruff. Advances in Computational and Stochastic Optimization, Logic Programming, and Heuristic Search: Interfaces in Computer Science and Operations Research (Operations Research/Computer Science Interfaces Series, Orcs 09). – М.: , 0. – 0 с. Seymour Bosworth, Michel E. Kabay. Computer Security Handbook. – М.: , 0. – 0 с. Thomas J. Parenty. Digital Defense: What You Should Know About Protecting Your Company's Assets. – М.: , 0. – 0 с. Computer Security. – М.: , 0. – 0 с. Retail Security and Loss Prevention. – М.: , 0. – 0 с. Physical Security and the Inspection Process. – М.: , 0. – 0 с. Louis Barajas. The Latino Journey to Financial Greatness : The 10 Steps to Creating Wealth, Security, and a Prosperous Future for You and Your Family. – М.: , 0. – 0 с. Don Silver. The Generation X Money Book: Achieving Security and Independence. – М.: , 0. – 0 с. Jonathan Gruber, David A. Wise. Social Security and Retirement Around the World (NATIONAL BUREAU OF ECONOMIC RESEARCH CONFERENCE REPORT). – М.: , 0. – 0 с. Geoff Craighead. High-Rise Security and Fire Life Safety, Second Edition. – М.: , 0. – 0 с. Marian Quigley, Marian Quiqley. Information Security and Ethics: Social and Organizational Issues. – М.: , 0. – 0 с. Anup K. Ghosh. E-Commerce Security and Privacy. – М.: , 0. – 0 с. Bob Emmerson, David Greetham. Computer Telephony and Wireless Technologies: Future Directions in Communications. – М.: , 0. – 0 с. Vesna Hassler. Security Fundamentals for E-Commerce (Artech House Computer Security Series). – М.: , 0. – 0 с. Daniel, MD Farb, Bruce Gordon, Daniel Farb. OSHA Computer Related Illness Manual and CD, Introductory But Comprehensive OSHA (Occupational Safety and Health) Training for the Managers and Employees in a Worker Safety Program, on Computer Ergonomics and Safety. – М.: , 0. – 0 с. Kenneth Atchity. How to Escape Lifetime Security and Pursue Your Impossible Dream: A Guide to Transforming Your Career. – М.: , 2004. – 0 с. Computability, Complexity And Constructivity In Economic Analysis. – М.: , 2005. – 0 с. Joseph White. False Alarm : Why the Greatest Threat to Social Security and Medicare Is the Campaign to "Save" Them (Century Foundation Book). – М.: , 2003. – 0 с. Advances in Security and Payment Methods for Mobile Commerce. – М.: , 2004. – 0 с. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с. Ron Ben Natan. Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase. – М.: , 2005. – 432 с. Joe Conason. The Raw Deal: How the Bush Republicans Plan to Destroy Social Security and the Legacy of the New Deal. – М.: , 2005. – 141 с. Mario J. Miranda, Paul L. Fackler. Applied Computational Economics and Finance. – М.: , 2004. – 528 с. Helen James. Security and Stustaibable Developement in Myanmar/Burma (Routledge Contemporary Southeast Asia Series). – М.: , 2006. – 231 с. Susan Echaore-McDavid. Career Opportunities In Law Enforcement, Security And Protective Services (Career Opportunities). – М.: , 2005. – 272 с. Roy H. Campbell, Prasad G. Naldurg. Security and Survivability: Analyzing, Modeling, and Verifying Dynamic Recovery in Insecure Systems. – М.: , 2008. – 240 с. Bruce Schneier. Schneier on Security. – М.: , 2008. – 336 с. Ibp Usa. Thailand Army, National Security And Defense Policy Handbook. – М.: , 2008. – 300 с. Ibp Usa. Turkey Army, National Security And Defense Policy Handbook (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с. Ibp Usa. Ukraine Army, National Security And Defense Policy Handbook (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с. Social Security and Development. – М.: , 2008. – 256 с. Ibp Usa. CZECH REPUBLIC ARMY, NATIONAL SECURITY AND DEFENSE POLICY HANDBOOK (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с. Ibp Usa. ESTONIA ARMY, NATIONAL SECURITY AND DEFENSE POLICY HANDBOOK (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с. Ibp Usa. Finland Army, National Security And Defense Policy Handbook (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с. Ibp Usa. Germany Army, National Security And Defense Policy Handbook (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с. Ibp Usa. China Army, National Security and Defense Policy Handbook. – М.: , 2008. – 300 с. Ibp Usa. Cuba Army, National Security And Defense Policy Handbook (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с. Ibp Usa. US Securities and Exchange Commission Handbook. – М.: , 2008. – 300 с. Ibp Usa. Myanmar Army, National Security And Defense Policy Handbook. – М.: , 2008. – 300 с. Ibp Usa. Philippines Army National Security and Defense Policy Handbook. – М.: , 2008. – 300 с. Ibp Usa. Russia KGB (National Security and Intelligence Handbook: Past And Present (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с. Ibp Usa. Global National Security and Intelligence Agencies Handbook. – М.: , 2008. – 300 с. Alan Calder, Steve Watkins. IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002. – М.: , 2008. – 384 с. Ibp Usa. Germany Army, National Security and Defense Policy Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Ibp Usa. Australia Army, National Security and Defense Policy Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Ibp Usa. Bangladesh Army, National Security and Defense Policy Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Ibp Usa. Czech Republic Army, National Security and Defense Policy Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Ibp Usa. European System for Security and Cooperation Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Ibp Usa. Finland Army, National Security and Defense Policy Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Ibp Usa. France Army, National Security and Defense Policy Handbook (World Business Information Catalog). – М.: , 2008. – 300 с. Ibp Usa. Estonia Army, National Security and Defense Policy Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с. V.R. Leonard. The Social Security and Medicare Handbook: What You Need to Know Explained Simply. – М.: , 2008. – 288 с. Jack P. Hoggatt, Jon A. Shank. Century 21? Computer Applications and Keyboarding, Lessons 1-170. – М.: , 2009. – 0 с. Andy Jones. Risk Management for Computer Security. – М.: , 2010. – 296 с. Innovations and Advances in Computer Sciences and Engineering. – М.: , 2010. – 400 с. Joel S. Cohen. Computer Algebra and Symbolic Computation: Elementary Algorithms. – М.: A K Peters, Ltd., 2002. – 323 с. Harry O'Neil, Ray Perez. Computer Games and Team and Individual Learning. – М.: Elsevier Science, 2007. – 340 с. Molecular Imaging: Computer Reconstruction and Practice (NATO Science for Peace and Security Series B: Physics and Biophysics). – М.: , 2008. – 288 с. Dipankar Dasgupta, Fernando Nino. Immunological Computation: Theory and Applications. – М.: , 2008. – 296 с. Composites with Micro- and Nano-Structure: Computational Modeling and Experiments (Computational Methods in Applied Sciences). – М.: , 2008. – 302 с. Protein-p Interactions and Networks: Identification, Computer Analysis, and Prediction (Computational Biology). – М.: , 2008. – 220 с. Computational Science and Its Applications - ICCSA 2008: International Conference, Perugia, Italy, June 30 - July 3, 2008, Proceedings, Part II (Lecture Notes in Computer Science). – М.: , 2008. – 1280 с. Concurrency, Compositionality, and Correctness: Essays in Honor of Willem-Paul de Roever (Lecture Notes in Computer Science / Theoretical Computer Science and General Issues). – М.: , 2010. – 387 с. Helen Toner, Elspeth Guild, Anneliese Baldaccini. Whose Freedom, Security and Justice?. – М.: Hart Publishing, 2007. – 550 с. Computational Fluid Dynamics for Sport Simulation (Lecture Notes in Computational Science and Engineering). – М.: , 2010. – 134 с. Moorad Choudhry. Fixed Income Securities and Derivatives Handbook. – М.: , 2010. – 496 с. Eiji Arai. Mechatronics for Safety, Security and Dependability in a New Era. – М.: , 2010. – 464 с. Charles Nemeth. Private Security and the Law. – М.: , 2010. – 488 с. C.J. Ash. Computable Structures and the Hyperarithmetical Hierarchy,144. – М.: , 2010. – 366 с. P.G. Morasso. Self-Organization, Computational Maps, and Motor Control,119. – М.: , 2010. – 0 с. Carl Roper. Physical Security and the Inspection Process. – М.: , 2010. – 290 с. Charles A. Sennewald. Retail Crime, Security, and Loss Prevention. – М.: , 2010. – 704 с. Shigeru Yamamoto. Systems and Human Science - For Safety, Security and Dependability. – М.: , 2010. – 350 с. Jesus Mena. Investigative Data Mining for Security and Criminal Detection. – М.: , 2010. – 272 с. Joseph Donnermeyer. Security and Crime Prevention. – М.: , 2010. – 439 с. Luiz Velho. Mathematical Optimization in Computer Graphics and Vision. – М.: , 2010. – 304 с. T. Bradley. Essential Computer Security: Everyone's Guide to Email, Internet, andWireless Security. – М.: , 2010. – 0 с. Ron Ben Natan. Implementing Database Security and Auditing. – М.: , 2010. – 432 с. K.J Bathe. Computational Fluid and Solid Mechanics 2003. – М.: , 2010. – 2524 с. James Doyle. Nuclear Safeguards, Security and Nonproliferation. – М.: , 2010. – 624 с. K.J. Bathe. Computational Fluid and Solid Mechanics 2005 - CD Rom. – М.: , 2010. – 0 с. K.J. Bathe. Computational Fluid and Solid Mechanics 2005 - CD Rom. – М.: , 2010. – 0 с. J.F. Shroder. Integration of Computer Modeling and Field Observations in Geomorphology. – М.: , 2010. – 204 с. Raymond Greenlaw. Fundamentals of the Theory of Computation: Principles and Practice. – М.: , 2010. – 0 с. Philip Purpura. Retail Security and Shrinkage Protection. – М.: , 2010. – 336 с. David A. Patterson. Computer Organization and Design, Fourth Edition. – М.: , 2010. – 912 с. Brien Posey. GFI Network Security and PCI Compliance Power Tools. – М.: , 2010. – 488 с. K.J. Bathe. Computational Fluid and Solid Mechanics. – М.: , 2010. – 0 с. Martin Davis. Computability, Complexity, and Languages. – М.: , 2010. – 609 с. Umer Khan. The Ultimate Windows 2003 Security and Administration CD. – М.: , 2010. – 0 с. Umer Khan. The Ultimate Cisco and Security and IP Configuration CD. – М.: , 2010. – 0 с. Charles Nemeth. Private Security and the Investigative Process. – М.: , 2010. – 376 с. KLETZ. Computer Control and Human Error. – М.: , 2010. – 0 с. Geoff Craighead. High-Rise Security and Fire Life Safety. – М.: , 2010. – 696 с. Michael Gough. Video Conferencing over IP: Configure, Secure, and Troubleshoot. – М.: , 2010. – 0 с. Pamela A. Collins. Principles of Security and Crime Prevention. – М.: , 2010. – 490 с. J. Barry Hylton. Safe Schools: A Security and Loss Prevention Plan. – М.: , 2010. – 232 с. Richard H. Bartels. An Introduction to Splines for Use in Computer Graphics and GeometricModeling. – М.: , 2010. – 476 с. John M. Carroll. Computer Security. – М.: , 2010. – 648 с. Jason Furman. Pensions, Social Security, and the Privatization of Risk. – М.: , 2010. – 128 с. Ferenc Mate. Wisdom of Tuscany – Simplicity, Security, and the Good Life. – М.: , 2011. – 0 с. Orin Thomas. MCSA/MCSE Self–Paced Training Kit (Exam 70–350) – Implementing Microsoft Internet Security and Acceleration Server 2004. – М.: , 2005. – 1104 с. Don Dedrick. Computation, Cognition, and Pylyshyn. – М.: , 2009. – 360 с. Dedrick Dedrick. Computation, Cognition, and Pylyshyn. – М.: , 2009. – 360 с. Douglas W Blum. Russia and Globalization – Identity, Security and Society in an Era of Change. – М.: , 2008. – 402 с. Alan G. Konheim. Computer Security and Cryptography. – М.: , 1972. – 0 с. Edited by Benjamin J Goold and Liora Lazarus. Security and Human Rights. – М.: , 2011. – 426 с. Helen Toner, Elspeth Guild and Anneliese Baldaccini. Whose Freedom, Security and Justice?. – М.: , 2011. – 582 с. Principles Of Computer Security, Comptia Security+ And Beyond, Second Edition. – М.: , 2011. – 0 с. Principles Of Computer Security Comptia Security+ And Beyond Lab Manual, Second Edition. – М.: , 2011. – 352 с. Eoghan Casey. Digital Evidence and Computer Crime. – М.: , . – с. Vinay Abburi. SECURE AND RELIABLE DEEP SPACE NETWORKS. – М.: LAP Lambert Academic Publishing, 2010. – 68 с. Hedyeh Nasser Ranjbar and Megha M. Uplane. Video & Computer Games and Behavioral Problems. – М.: LAP Lambert Academic Publishing, 2012. – 304 с. Muhammad Azfar Anwar and Saif ur Rehman. Defense Spending, National Security and Economic Growth of Pakistan. – М.: LAP Lambert Academic Publishing, 2012. – 128 с. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с. Hammad Kazmi. Security and Privacy issues in Near Field Communication (NFC) Systems. – М.: LAP Lambert Academic Publishing, 2012. – 68 с. Rajesh Lekhwar,Harikesh Maurya and Sarita Lekhwar. Conception of Computer Fundamental and Its Inspiration. – М.: LAP Lambert Academic Publishing, 2012. – 136 с. Shivan Fazil Sabr. Cloud Computing Security. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Stephen Murove,S. B. Mangena and B. Jones. Firewall Evaluation:Models for Major Decisions in Computer Security. – М.: LAP Lambert Academic Publishing, 2014. – 236 с. Sekar Koneti,Praveen Sam Rachapudy and Dileep Kumar Reddy Pallela. Computer Organization and Architecture. – М.: LAP Lambert Academic Publishing, 2014. – 368 с. S. Ramakrishnan and Ibrahiem M.M.El Emary. Computational Techniques and Algorithms for Image Processing. – М.: LAP Lambert Academic Publishing, 2010. – 592 с. Ekoningtyas Margu Wardani and Muyanja Ssenyonga. Soaring Food Prices, Food Security, and Poverty in Indonesia. – М.: LAP Lambert Academic Publishing, 2013. – 128 с. Jitendra Joshi and Keshav Dev Gupta. Introduction to Computer System and Architecture. – М.: LAP Lambert Academic Publishing, 2013. – 248 с. Лучшие результаты Ничего не найдено Дополнительные результаты Наука человековедения. интервью с Д. Уолтоном, профессором London Metropolitan University, экспертом CIPD. Chartered Institute of Personnel and Development, автором программы Master of Arts in Human Resource Strategies. И. Смирнова, "Кадровый менеджмент", № 5, июль-август 2007. Специализированный модуль FS-CD. Collections and Disbursements - "Сборы и Выплаты" и его возможности. О.А. Глущенко, "Финансовый менеджмент в страховой компании", № 2, II квартал 2007. Бюджетирование страховой компании на базе Oracle Enterprise Planning and Budgeting. Д.В. Лесоводский, "Финансовый менеджмент в страховой компании", № 3, III квартал 2006. Регулирование операций торгового финансирования: новые инициативы. интервью с Д. Шмандом, вице-председателем Банковской комиссии ICC по supply chain finance, главой подразделения Trade Finance and Cash Management Corporates EMEA в Global Transaction Banking. GTB division Deutsche Bank. Н. Макарова, "Международные банковские операции", N 2, апрель-июнь 2012 г. Ужин в темноте в стиле Малевича и Новый год в Хаммере". Что может выть лучше?". интервью с Н. Саниной, индивидуальным предпринимателем и креативным директором компании "San and stars". М. Сипатова, "Арсенал предпринимателя", N 12, декабрь 2011 г. На пути к новому стандарту в торговом финансировании. интервью с А. Кастерманом, руководителем Trade and Supply Chain, SWIFT, сопредседателем рабочей группы ICC-BPO. Э. Шакирова, "Международные банковские операции", N 4, октябрь-декабрь 2011 г. Уильям Савадж: Мотивировать людей в Нижнем Новгороде и Новосибирске нужно по-разному". интервью с У. Саваджем, вице-президентом корпорации Intel, подразделение Software and Services Group. М. Холкина, "Управление персоналом", N 14, июль 2010 г. Цены под контролем: the present and the future. С. Стройкова, И. Леметюйнен, "Консультант", № 19, сентябрь 2009. Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Майкл, 25.04 спасибо Вам большое )очень хороший сервис - буду рекомендовать знакомым. Все четко и оперативно.