Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  2. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с.
  3. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 515 с.
  4. Jack J. Champlain. Auditing Information Systems. – М.: , 0. – 0 с.
  5. Thomas J. Parenty. Digital Defense: What You Should Know About Protecting Your Company's Assets. – М.: , 0. – 0 с.
  6. Oded Goldreich. Foundations of Cryptography: Basic Tools. – М.: , 0. – 0 с.
  7. Amjad Umar. E-Business and Distributed Systems Handbook: Management Module. – М.: , 0. – 0 с.
  8. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с.
  9. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с.
  10. Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series). – М.: , 2005. – 298 с.
  11. Robert B. Laughlin. The Crime of Reason: And the Closing of the Scientific Mind. – М.: , 2008. – 224 с.
  12. Theory of Cryptography: 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2010. – 616 с.
  13. Markus Jakobsson. Phishing and Countermeasures. – М.: , 2007. – 736 с.
  14. Alan G. Konheim. Computer Security and Cryptography. – М.: , 1972. – 0 с.
  15. Principles Of Computer Security, Comptia Security+ And Beyond, Second Edition. – М.: , 2011. – 0 с.
  16. Hacking Exposed Linux. – М.: , 2011. – 813 с.
  17. LeelaRani Vanapalli. FPGA Implementation of Advanced Encryption Standard Algorithm. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  18. Rashi Kohli and Manoj Kumar. Cryptographic on System-Chip-Design Using VLSI Technique. – М.: LAP Lambert Academic Publishing, 2013. – 92 с.
  19. Martin Simka and Milos Drutarovsky. Selected Blocks for Public-Key Cryptosystems in FPGAs. – М.: LAP Lambert Academic Publishing, 2012. – 192 с.
  20. Veronica Fernandez-Marmol. Quantum Cryptography at High Speed. – М.: LAP Lambert Academic Publishing, 2010. – 240 с.
  21. Santosh Kumar Yadav. Some Problems In Symmetric And Asymmetric Cryptography. – М.: LAP Lambert Academic Publishing, 2012. – 148 с.
  22. Deepak Puthal and Bibhudatta Sahoo. Secure Data Collection & Critical Data Transmission in Mobile Sink WSN. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  23. Subhankar Chattopadhyay and Ashok Kumar Turuk. Key Pre-distribution and Key Revocation in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2011. – 72 с.
  24. Shahab Saquib Sohail and Musheer Ahmad. Chaos-based Encryption. – М.: LAP Lambert Academic Publishing, 2012. – 144 с.
  25. Ravinder Singh Mann. A Comparative Evaluation of Cryptographic Algorithms. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  26. Mazen Mohammed,Alaa Eldin Rohiem and Ali El-moghazy. CSRTP. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  27. Eystein Maloy Stenberg. Distributing a Private Key Generator in Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 116 с.
  28. Iyad Shaheen. HIGH PERFORMANCE APPROACH FOR DIGITAL SIGNATURE. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  29. Vinothkumar Jambulingam. Secure and Anonymous Routing for Mobile Adhoc Networks. – М.: LAP Lambert Academic Publishing, 2014. – 72 с.
  30. Sanjeev Karmakar and Manoj K. Kowar. A Comprehensive Lecture Notes on RSA-1024 Cryptography. – М.: LAP Lambert Academic Publishing, 2013. – 160 с.
  31. Aditya Kumar. Cryptography and Chaos a New Approach in Network Security. – М.: LAP Lambert Academic Publishing, 2015. – 80 с.
  32. Piotr Szczechowiak. Security in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2011. – 248 с.
  33. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  34. Pragati Patil-Bedekar. Energy & Time Performance Metrics in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  35. Vincent Omollo. Enhanced Network Security. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  36. Manish Gupta and Dharmendra Kumar. Design and Implementation of Digital Watermarking. – М.: LAP Lambert Academic Publishing, 2014. – 172 с.
  37. Kirat Pal Singh. MIPS Pipeline Cryptoprocessor. – М.: LAP Lambert Academic Publishing, 2012. – 480 с.
  38. Anjan Kumar Payra. Steganology for the Computer Forensics Examiners. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  39. Martin Drahansky. Biometric Cryptography Based on Fingerprints. – М.: LAP Lambert Academic Publishing, 2010. – 160 с.
  40. Ruchira Naskar. Secret Sharing in User Hierarchy. – М.: LAP Lambert Academic Publishing, 2013. – 64 с.
  41. Vasilios Katos. Symmetric cryptography in computer communications. – М.: LAP Lambert Academic Publishing, 2011. – 344 с.
  42. Dirk Lessner. Network Security for Embedded Systems. – М.: LAP Lambert Academic Publishing, 2009. – 232 с.
  43. Penmetsa V. Krishna Raja,A.S.N. Chakravarthy and P.S. Avadhani. Crypto Authentication System Using Hilbert Matrices. – М.: LAP Lambert Academic Publishing, 2014. – 160 с.
  44. Valerie Gauthier Umana. Post-Quantum Cryptography. – М.: Scholars' Press, 2014. – 200 с.
  45. Nizamud Din. Signcryption Schemes Based on Hyper Elliptic Curve Cryptography. – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  46. Gulzar Mehmood,Nizamud Din and Muhammad Nawaz Khan. Privacy Preserving Scheme for Body Sensor Networks Based on CDLP. – М.: LAP Lambert Academic Publishing, 2014. – 56 с.
  47. Tadeusz Struk. Elliptic Curve Cryptography as suitable solution for mobile devices. – М.: LAP Lambert Academic Publishing, 2010. – 88 с.
  48. Alptekin Kupcu. Efficient Cryptography for the Next Generation Secure Cloud. – М.: LAP Lambert Academic Publishing, 2010. – 220 с.

Дополнительные результаты

  1. Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с.
  2. Security and Privacy in Mobile Information and Communication Systems: Third International ICST Conference, MOBISEC 2011, Aalborg, Denmark, May 17-19, ... and Telecommunications Engineering). – М.: , 2012. – 195 с.
  3. Public Key Infrastructures, Services and Applications: 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected ... Computer Science / Security and Cryptology). – М.: , 2012. – 219 с.
  4. Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  5. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с.
  6. Technological Innovation for Value Creation: Third IFIP WG 5.5/SOCOLNET Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS ... in Information and Communication Technology). – М.: , 2012. – 607 с.
  7. Security and Development in Global Politics: A Critical Comparison. – М.: , 2012. – 360 с.
  8. Luis Lobo-Guerrero. Insuring Security: Biopolitics, security and risk. – М.: , 2012. – 178 с.
  9. Terrorism and the Olympics: Major Event Security and Lessons for the Future. – М.: , 2012. – 272 с.
  10. Giorgio S. Questa. Fixed Income Analysis for the Global Financial Market: Money Market, Foreign Exchange, Securities, and Derivatives. – М.: Wiley, 1999. – 368 с.
  11. Rattan Lal, David Hansen, Norman Uphoff, Steven Slack, Rattan Lal. Food Security and Environmental Quality in the Developing World. – М.: , 0. – 0 с.
  12. Mario J. Miranda, Paul L. Fackler. Applied Computational Economics and Finance. – М.: , 0. – 0 с.
  13. Soren S. Nielsen. Programming Languages and Systems in Computational Economics and Finance (Advances in Computational Economics, 18). – М.: , 0. – 0 с.
  14. Terrell Ward Bynum, Simon Rogerson, Blackwell Pub. Computer Ethics and Professional Responsibility: Introductory Text and Readings. – М.: , 0. – 0 с.
  15. Susan Echaore-McDavid. Career Opportunities in Law Enforcement, Security, and Protective Services (The Career Opportunities Series). – М.: , 0. – 0 с.
  16. Maurice, Ph.D. Youakim. Social Security and Medicare for the New Millenium. – М.: , 0. – 0 с.
  17. David L. Woodruff. Advances in Computational and Stochastic Optimization, Logic Programming, and Heuristic Search: Interfaces in Computer Science and Operations Research (Operations Research/Computer Science Interfaces Series, Orcs 09). – М.: , 0. – 0 с.
  18. Seymour Bosworth, Michel E. Kabay. Computer Security Handbook. – М.: , 0. – 0 с.
  19. Thomas J. Parenty. Digital Defense: What You Should Know About Protecting Your Company's Assets. – М.: , 0. – 0 с.
  20. Computer Security. – М.: , 0. – 0 с.
  21. Retail Security and Loss Prevention. – М.: , 0. – 0 с.
  22. Physical Security and the Inspection Process. – М.: , 0. – 0 с.
  23. Louis Barajas. The Latino Journey to Financial Greatness : The 10 Steps to Creating Wealth, Security, and a Prosperous Future for You and Your Family. – М.: , 0. – 0 с.
  24. Don Silver. The Generation X Money Book: Achieving Security and Independence. – М.: , 0. – 0 с.
  25. Jonathan Gruber, David A. Wise. Social Security and Retirement Around the World (NATIONAL BUREAU OF ECONOMIC RESEARCH CONFERENCE REPORT). – М.: , 0. – 0 с.
  26. Geoff Craighead. High-Rise Security and Fire Life Safety, Second Edition. – М.: , 0. – 0 с.
  27. Marian Quigley, Marian Quiqley. Information Security and Ethics: Social and Organizational Issues. – М.: , 0. – 0 с.
  28. Anup K. Ghosh. E-Commerce Security and Privacy. – М.: , 0. – 0 с.
  29. Bob Emmerson, David Greetham. Computer Telephony and Wireless Technologies: Future Directions in Communications. – М.: , 0. – 0 с.
  30. Vesna Hassler. Security Fundamentals for E-Commerce (Artech House Computer Security Series). – М.: , 0. – 0 с.
  31. Daniel, MD Farb, Bruce Gordon, Daniel Farb. OSHA Computer Related Illness Manual and CD, Introductory But Comprehensive OSHA (Occupational Safety and Health) Training for the Managers and Employees in a Worker Safety Program, on Computer Ergonomics and Safety. – М.: , 0. – 0 с.
  32. Kenneth Atchity. How to Escape Lifetime Security and Pursue Your Impossible Dream: A Guide to Transforming Your Career. – М.: , 2004. – 0 с.
  33. Computability, Complexity And Constructivity In Economic Analysis. – М.: , 2005. – 0 с.
  34. Joseph White. False Alarm : Why the Greatest Threat to Social Security and Medicare Is the Campaign to "Save" Them (Century Foundation Book). – М.: , 2003. – 0 с.
  35. Advances in Security and Payment Methods for Mobile Commerce. – М.: , 2004. – 0 с.
  36. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с.
  37. Ron Ben Natan. Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase. – М.: , 2005. – 432 с.
  38. Joe Conason. The Raw Deal: How the Bush Republicans Plan to Destroy Social Security and the Legacy of the New Deal. – М.: , 2005. – 141 с.
  39. Mario J. Miranda, Paul L. Fackler. Applied Computational Economics and Finance. – М.: , 2004. – 528 с.
  40. Helen James. Security and Stustaibable Developement in Myanmar/Burma (Routledge Contemporary Southeast Asia Series). – М.: , 2006. – 231 с.
  41. Susan Echaore-McDavid. Career Opportunities In Law Enforcement, Security And Protective Services (Career Opportunities). – М.: , 2005. – 272 с.
  42. Roy H. Campbell, Prasad G. Naldurg. Security and Survivability: Analyzing, Modeling, and Verifying Dynamic Recovery in Insecure Systems. – М.: , 2008. – 240 с.
  43. Bruce Schneier. Schneier on Security. – М.: , 2008. – 336 с.
  44. Ibp Usa. Thailand Army, National Security And Defense Policy Handbook. – М.: , 2008. – 300 с.
  45. Ibp Usa. Turkey Army, National Security And Defense Policy Handbook (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с.
  46. Ibp Usa. Ukraine Army, National Security And Defense Policy Handbook (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с.
  47. Social Security and Development. – М.: , 2008. – 256 с.
  48. Ibp Usa. CZECH REPUBLIC ARMY, NATIONAL SECURITY AND DEFENSE POLICY HANDBOOK (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с.
  49. Ibp Usa. ESTONIA ARMY, NATIONAL SECURITY AND DEFENSE POLICY HANDBOOK (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с.
  50. Ibp Usa. Finland Army, National Security And Defense Policy Handbook (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с.
  51. Ibp Usa. Germany Army, National Security And Defense Policy Handbook (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с.
  52. Ibp Usa. China Army, National Security and Defense Policy Handbook. – М.: , 2008. – 300 с.
  53. Ibp Usa. Cuba Army, National Security And Defense Policy Handbook (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с.
  54. Ibp Usa. US Securities and Exchange Commission Handbook. – М.: , 2008. – 300 с.
  55. Ibp Usa. Myanmar Army, National Security And Defense Policy Handbook. – М.: , 2008. – 300 с.
  56. Ibp Usa. Philippines Army National Security and Defense Policy Handbook. – М.: , 2008. – 300 с.
  57. Ibp Usa. Russia KGB (National Security and Intelligence Handbook: Past And Present (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с.
  58. Ibp Usa. Global National Security and Intelligence Agencies Handbook. – М.: , 2008. – 300 с.
  59. Alan Calder, Steve Watkins. IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002. – М.: , 2008. – 384 с.
  60. Ibp Usa. Germany Army, National Security and Defense Policy Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  61. Ibp Usa. Australia Army, National Security and Defense Policy Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  62. Ibp Usa. Bangladesh Army, National Security and Defense Policy Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  63. Ibp Usa. Czech Republic Army, National Security and Defense Policy Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  64. Ibp Usa. European System for Security and Cooperation Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  65. Ibp Usa. Finland Army, National Security and Defense Policy Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  66. Ibp Usa. France Army, National Security and Defense Policy Handbook (World Business Information Catalog). – М.: , 2008. – 300 с.
  67. Ibp Usa. Estonia Army, National Security and Defense Policy Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  68. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с.
  69. V.R. Leonard. The Social Security and Medicare Handbook: What You Need to Know Explained Simply. – М.: , 2008. – 288 с.
  70. Jack P. Hoggatt, Jon A. Shank. Century 21? Computer Applications and Keyboarding, Lessons 1-170. – М.: , 2009. – 0 с.
  71. Andy Jones. Risk Management for Computer Security. – М.: , 2010. – 296 с.
  72. Innovations and Advances in Computer Sciences and Engineering. – М.: , 2010. – 400 с.
  73. Joel S. Cohen. Computer Algebra and Symbolic Computation: Elementary Algorithms. – М.: A K Peters, Ltd., 2002. – 323 с.
  74. Harry O'Neil, Ray Perez. Computer Games and Team and Individual Learning. – М.: Elsevier Science, 2007. – 340 с.
  75. Molecular Imaging: Computer Reconstruction and Practice (NATO Science for Peace and Security Series B: Physics and Biophysics). – М.: , 2008. – 288 с.
  76. Dipankar Dasgupta, Fernando Nino. Immunological Computation: Theory and Applications. – М.: , 2008. – 296 с.
  77. Composites with Micro- and Nano-Structure: Computational Modeling and Experiments (Computational Methods in Applied Sciences). – М.: , 2008. – 302 с.
  78. Protein-p Interactions and Networks: Identification, Computer Analysis, and Prediction (Computational Biology). – М.: , 2008. – 220 с.
  79. Computational Science and Its Applications - ICCSA 2008: International Conference, Perugia, Italy, June 30 - July 3, 2008, Proceedings, Part II (Lecture Notes in Computer Science). – М.: , 2008. – 1280 с.
  80. Concurrency, Compositionality, and Correctness: Essays in Honor of Willem-Paul de Roever (Lecture Notes in Computer Science / Theoretical Computer Science and General Issues). – М.: , 2010. – 387 с.
  81. Helen Toner, Elspeth Guild, Anneliese Baldaccini. Whose Freedom, Security and Justice?. – М.: Hart Publishing, 2007. – 550 с.
  82. Computational Fluid Dynamics for Sport Simulation (Lecture Notes in Computational Science and Engineering). – М.: , 2010. – 134 с.
  83. Moorad Choudhry. Fixed Income Securities and Derivatives Handbook. – М.: , 2010. – 496 с.
  84. Eiji Arai. Mechatronics for Safety, Security and Dependability in a New Era. – М.: , 2010. – 464 с.
  85. Charles Nemeth. Private Security and the Law. – М.: , 2010. – 488 с.
  86. C.J. Ash. Computable Structures and the Hyperarithmetical Hierarchy,144. – М.: , 2010. – 366 с.
  87. P.G. Morasso. Self-Organization, Computational Maps, and Motor Control,119. – М.: , 2010. – 0 с.
  88. Carl Roper. Physical Security and the Inspection Process. – М.: , 2010. – 290 с.
  89. Charles A. Sennewald. Retail Crime, Security, and Loss Prevention. – М.: , 2010. – 704 с.
  90. Shigeru Yamamoto. Systems and Human Science - For Safety, Security and Dependability. – М.: , 2010. – 350 с.
  91. Jesus Mena. Investigative Data Mining for Security and Criminal Detection. – М.: , 2010. – 272 с.
  92. Joseph Donnermeyer. Security and Crime Prevention. – М.: , 2010. – 439 с.
  93. Luiz Velho. Mathematical Optimization in Computer Graphics and Vision. – М.: , 2010. – 304 с.
  94. T. Bradley. Essential Computer Security: Everyone's Guide to Email, Internet, andWireless Security. – М.: , 2010. – 0 с.
  95. Ron Ben Natan. Implementing Database Security and Auditing. – М.: , 2010. – 432 с.
  96. K.J Bathe. Computational Fluid and Solid Mechanics 2003. – М.: , 2010. – 2524 с.
  97. James Doyle. Nuclear Safeguards, Security and Nonproliferation. – М.: , 2010. – 624 с.
  98. K.J. Bathe. Computational Fluid and Solid Mechanics 2005 - CD Rom. – М.: , 2010. – 0 с.
  99. K.J. Bathe. Computational Fluid and Solid Mechanics 2005 - CD Rom. – М.: , 2010. – 0 с.
  100. J.F. Shroder. Integration of Computer Modeling and Field Observations in Geomorphology. – М.: , 2010. – 204 с.
  101. Raymond Greenlaw. Fundamentals of the Theory of Computation: Principles and Practice. – М.: , 2010. – 0 с.
  102. Philip Purpura. Retail Security and Shrinkage Protection. – М.: , 2010. – 336 с.
  103. David A. Patterson. Computer Organization and Design, Fourth Edition. – М.: , 2010. – 912 с.
  104. Brien Posey. GFI Network Security and PCI Compliance Power Tools. – М.: , 2010. – 488 с.
  105. K.J. Bathe. Computational Fluid and Solid Mechanics. – М.: , 2010. – 0 с.
  106. Martin Davis. Computability, Complexity, and Languages. – М.: , 2010. – 609 с.
  107. Umer Khan. The Ultimate Windows 2003 Security and Administration CD. – М.: , 2010. – 0 с.
  108. Umer Khan. The Ultimate Cisco and Security and IP Configuration CD. – М.: , 2010. – 0 с.
  109. Charles Nemeth. Private Security and the Investigative Process. – М.: , 2010. – 376 с.
  110. KLETZ. Computer Control and Human Error. – М.: , 2010. – 0 с.
  111. Geoff Craighead. High-Rise Security and Fire Life Safety. – М.: , 2010. – 696 с.
  112. Michael Gough. Video Conferencing over IP: Configure, Secure, and Troubleshoot. – М.: , 2010. – 0 с.
  113. Pamela A. Collins. Principles of Security and Crime Prevention. – М.: , 2010. – 490 с.
  114. J. Barry Hylton. Safe Schools: A Security and Loss Prevention Plan. – М.: , 2010. – 232 с.
  115. Richard H. Bartels. An Introduction to Splines for Use in Computer Graphics and GeometricModeling. – М.: , 2010. – 476 с.
  116. John M. Carroll. Computer Security. – М.: , 2010. – 648 с.
  117. Jason Furman. Pensions, Social Security, and the Privatization of Risk. – М.: , 2010. – 128 с.
  118. Ferenc Mate. Wisdom of Tuscany – Simplicity, Security, and the Good Life. – М.: , 2011. – 0 с.
  119. Orin Thomas. MCSA/MCSE Self–Paced Training Kit (Exam 70–350) – Implementing Microsoft Internet Security and Acceleration Server 2004. – М.: , 2005. – 1104 с.
  120. Don Dedrick. Computation, Cognition, and Pylyshyn. – М.: , 2009. – 360 с.
  121. Dedrick Dedrick. Computation, Cognition, and Pylyshyn. – М.: , 2009. – 360 с.
  122. Douglas W Blum. Russia and Globalization – Identity, Security and Society in an Era of Change. – М.: , 2008. – 402 с.
  123. Alan G. Konheim. Computer Security and Cryptography. – М.: , 1972. – 0 с.
  124. Edited by Benjamin J Goold and Liora Lazarus. Security and Human Rights. – М.: , 2011. – 426 с.
  125. Helen Toner, Elspeth Guild and Anneliese Baldaccini. Whose Freedom, Security and Justice?. – М.: , 2011. – 582 с.
  126. Principles Of Computer Security, Comptia Security+ And Beyond, Second Edition. – М.: , 2011. – 0 с.
  127. Principles Of Computer Security Comptia Security+ And Beyond Lab Manual, Second Edition. – М.: , 2011. – 352 с.
  128. Eoghan Casey. Digital Evidence and Computer Crime. – М.: , . –  с.
  129. Vinay Abburi. SECURE AND RELIABLE DEEP SPACE NETWORKS. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  130. Hedyeh Nasser Ranjbar and Megha M. Uplane. Video & Computer Games and Behavioral Problems. – М.: LAP Lambert Academic Publishing, 2012. – 304 с.
  131. Muhammad Azfar Anwar and Saif ur Rehman. Defense Spending, National Security and Economic Growth of Pakistan. – М.: LAP Lambert Academic Publishing, 2012. – 128 с.
  132. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  133. Hammad Kazmi. Security and Privacy issues in Near Field Communication (NFC) Systems. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  134. Rajesh Lekhwar,Harikesh Maurya and Sarita Lekhwar. Conception of Computer Fundamental and Its Inspiration. – М.: LAP Lambert Academic Publishing, 2012. – 136 с.
  135. Shivan Fazil Sabr. Cloud Computing Security. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  136. Stephen Murove,S. B. Mangena and B. Jones. Firewall Evaluation:Models for Major Decisions in Computer Security. – М.: LAP Lambert Academic Publishing, 2014. – 236 с.
  137. Sekar Koneti,Praveen Sam Rachapudy and Dileep Kumar Reddy Pallela. Computer Organization and Architecture. – М.: LAP Lambert Academic Publishing, 2014. – 368 с.
  138. S. Ramakrishnan and Ibrahiem M.M.El Emary. Computational Techniques and Algorithms for Image Processing. – М.: LAP Lambert Academic Publishing, 2010. – 592 с.
  139. Ekoningtyas Margu Wardani and Muyanja Ssenyonga. Soaring Food Prices, Food Security, and Poverty in Indonesia. – М.: LAP Lambert Academic Publishing, 2013. – 128 с.
  140. Jitendra Joshi and Keshav Dev Gupta. Introduction to Computer System and Architecture. – М.: LAP Lambert Academic Publishing, 2013. – 248 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Наука человековедения. интервью с Д. Уолтоном, профессором London Metropolitan University, экспертом CIPD. Chartered Institute of Personnel and Development, автором программы Master of Arts in Human Resource Strategies. И. Смирнова, "Кадровый менеджмент", № 5, июль-август 2007.
  2. Специализированный модуль FS-CD. Collections and Disbursements - "Сборы и Выплаты" и его возможности. О.А. Глущенко, "Финансовый менеджмент в страховой компании", № 2, II квартал 2007.
  3. Бюджетирование страховой компании на базе Oracle Enterprise Planning and Budgeting. Д.В. Лесоводский, "Финансовый менеджмент в страховой компании", № 3, III квартал 2006.
  4. Регулирование операций торгового финансирования: новые инициативы. интервью с Д. Шмандом, вице-председателем Банковской комиссии ICC по supply chain finance, главой подразделения Trade Finance and Cash Management Corporates EMEA в Global Transaction Banking. GTB division Deutsche Bank. Н. Макарова, "Международные банковские операции", N 2, апрель-июнь 2012 г.
  5. Ужин в темноте в стиле Малевича и Новый год в Хаммере". Что может выть лучше?". интервью с Н. Саниной, индивидуальным предпринимателем и креативным директором компании "San and stars". М. Сипатова, "Арсенал предпринимателя", N 12, декабрь 2011 г.
  6. На пути к новому стандарту в торговом финансировании. интервью с А.  Кастерманом, руководителем Trade and Supply Chain, SWIFT, сопредседателем рабочей группы ICC-BPO. Э. Шакирова, "Международные банковские операции", N 4, октябрь-декабрь 2011 г.
  7. Уильям Савадж: Мотивировать людей в Нижнем Новгороде и Новосибирске нужно по-разному". интервью с У. Саваджем, вице-президентом корпорации Intel, подразделение Software and Services Group. М. Холкина, "Управление персоналом", N 14, июль 2010 г.
  8. Цены под контролем: the present and the future. С. Стройкова, И. Леметюйнен, "Консультант", № 19, сентябрь 2009.

Образцы работ

Тема и предметТип и объем работы
Проблемы бедности в России
Экономика
Курсовая работа
40 стр.
Организационный конфликт как фактор развития организации
Теория организации
Курсовая работа
40 стр.
Последствия операции НАТО
Политология
Диплом
80 стр.
Математические модели океанических течений
Переводоведение (теория перевода)
Курсовая работа
42 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Майкл, 25.04
спасибо Вам большое )очень хороший сервис - буду рекомендовать знакомым. Все четко и оперативно.