Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Jie Lu, Lakhmi C Jain, Guangquan Zhang. Handbook on Decision Making: Vol 2: Risk Management in Decision Making (Intelligent Systems Reference Library). – М.: , 2012. – 472 с. Ann Poe. The McGraw-Hill Handbook of More Business Letters. – М.: , 0. – 0 с. Handbook of Management Information Systems. – М.: , 0. – 0 с. John M. D. Hunter. An Information Security Handbook (Computer Communications and Networks). – М.: , 0. – 0 с. Gerald L. Kovacich, Edward P. Halibozek. The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, First Edition. – М.: , 0. – 0 с. Handbook on Information Technology in Finance (International Handbooks on Information Systems). – М.: , 2008. – 800 с. Handbook of Information and Communication Security. – М.: , 2010. – 800 с. John R. Vacca. Computer and Information Security Handbook. – М.: , 2010. – 928 с. Oracle Soa Suite 11G Handbook. – М.: , 2011. – 800 с. Ido Dubrawsky. How to Cheat at Securing Your Network. – М.: Syngress, 2007. – 432 с. Дополнительные результаты Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 515 с. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с. Constance S. Hawke, Constance S. Hawke. Computer and Internet Use on Campus: A Legal Guide to Issues of Intellectual Property, Free Speech, and Privacy. – М.: , 0. – 0 с. Abdullah Abdul-Gader, Abdullah H. Al-Abdul-Gader. Managing Computer Based Information Systems in Developing Countries: A Cultural Perspective. – М.: , 0. – 0 с. Joseph Migga Kizza, Joseph Kizza. Ethical and Social Issues in the Information Age. – М.: , 0. – 0 с. Tom Forester, Perry Morrison. Computer Ethics, Second Edition: Cautionary Tales and Ethical Dilemmas in Computing. – М.: , 0. – 0 с. Paul Voillis, Paul Viollis. Jane's Workplace Security Handbook. – М.: , 0. – 0 с. Gerald Kovacich. The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition. – М.: , 0. – 0 с. Ron Tepper. Model Letters and Memos : A Handbook for Scientists and Engineers. – М.: , 0. – 0 с. Ulric J., Jr. Gelinas, Steve G. Sutton, Jane Fedorowicz. Business Processes and Information Technology. – М.: , 0. – 0 с. Philip P. Purpura. The Security Handbook. – М.: , 0. – 0 с. Andy Jones, Gerald L. Kovacich, Perry G. Luzwick. Global Information Warfare: How Businesses, Governments, and Others Achieve Objectives and Attain Competitive Advantages. – М.: Auerbach Publications, 2002. – 684 с. Nikitas-Spiros Koutsoukis, Gautam Mitra. Decision Modelling and Information Systems: The Information Value Chain (Operations Research/Computer Science Interfaces Series). – М.: , 0. – 0 с. Frederick Betz. Executive Strategy : Strategic Management and Information Technology. – М.: , 0. – 0 с. Seymour Bosworth, Michel E. Kabay. Computer Security Handbook. – М.: , 0. – 0 с. Peter Checkland, Sue Holwell. Information, Systems and Information Systems - making sense of the field. – М.: , 0. – 0 с. Mark B. Desman. Building an Information Security Awareness Program. – М.: , 0. – 0 с. John M. D. Hunter. An Information Security Handbook (Computer Communications and Networks). – М.: , 0. – 0 с. Gerald L. Kovacich, Edward P. Halibozek. The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, First Edition. – М.: , 0. – 0 с. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с. Marko Nordquist. Towards Improved Security Management Practice: Designing an Organizational Model Procedure for the Implementation of Information Security Management in Heterogeneous Information Management. – М.: , 0. – 0 с. Information Services for Innovative Organizations (Library and Information Science). – М.: , 0. – 0 с. Steve Purser. A Practical Guide to Managing Information Security (Artech House Technology Management Library). – М.: , 0. – 0 с. Risk Analysis and the Security Survey. – М.: , 0. – 0 с. Darlene E. Weingand. Marketing/Planning Library and Information Services:. – М.: , 0. – 0 с. British Library, Ian Stewart, Alan Gomersall, British Library Science Reference and Information Service Market Rese. Market Research: A Guide to British Library Collections. – М.: , 0. – 0 с. Alan Gershenfeld, Mark Loparco, Cecilia Barajas. Game Plan: The Insider's Guide to Breaking In and Succeeding in the Computer and Video Game Business. – М.: , 0. – 0 с. Marian Quigley, Marian Quiqley. Information Security and Ethics: Social and Organizational Issues. – М.: , 0. – 0 с. Ifip Tc6, Tc11 Joint Working Conference on Communications and Multimedi, Tomaz Klobucar. Advanced Communications and Multimedia Security: Ifip Tc6/Tc11 Sixth Joint Working Conference on Communications and Multimedia Security, September 26-27, 2002, Portoroz, Slovenia (International Federation for Information Processing, 100). – М.: , 0. – 0 с. C. Warren Axelrod, Axelrod. Outsourcing Information Security. – М.: , 0. – 0 с. Harold F. Tipton, Micki Krause, Micki, Cissp Krause. Information Security Management Handbook, Fifth Edition. – М.: , 0. – 0 с. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с. Christopher Meyer. It's Alive : The Coming Convergence of Information, Biology, and Business. – М.: , 2003. – 0 с. Thomas C. Glaessner. Electronic Safety and Soundness: Securing Finance in a New Age (World Bank Working Papers). – М.: , 2004. – 0 с. Peter R., MBA Ramsaroop. Securing Business Intelligence: Knowledge and CyberSecurity in the Post 9/11 World. – М.: , 2004. – 0 с. Economics of Information Security (Advances in Information Security). – М.: , 2004. – 0 с. Sari Greene. Security Policies and Procedures : Principles and Practices (Security). – М.: , 2005. – 0 с. Lech Janczewski. Managerial Guide for Handling Cyber-Terrorism and Information Warfare. – М.: , 2005. – 0 с. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с. Robert A. Schultz. Contemporary Issues in Ethics and Information Technology. – М.: , 2005. – 0 с. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с. Ira Winkler. Zen and the Art of Information Security. – М.: , 2007. – 192 с. Timothy P. Layton. Information Security. – М.: , 2006. – 222 с. Michael E. Whitman, Herbert J. Mattord. Principles of Information Security, Second Edition. – М.: , 2004. – 600 с. Kenneth K. Humphreys. Project and Cost Engineers' Handbook, Fourth Edition (Cost Engineering). – М.: , 2004. – 360 с. Dipak Laha & Purnendu Mandal. Handbook of Computational Intelligence in Manufacturing and Production Management. – М.: Idea Group Reference, 2007. – 516 с. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с. Kathleen de la Pena McCook. Opportunities in Library and Information Science (Opportunities in). – М.: , 2008. – 160 с. Ibp Usa. Thailand Army, National Security And Defense Policy Handbook. – М.: , 2008. – 300 с. Ibp Usa. Turkey Army, National Security And Defense Policy Handbook (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с. Ibp Usa. Ukraine Army, National Security And Defense Policy Handbook (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с. Ibp Usa. Denmark Government and Business Contacts Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Ibp Usa. Belgium Justice System and National Police Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Ibp Usa. CZECH REPUBLIC ARMY, NATIONAL SECURITY AND DEFENSE POLICY HANDBOOK (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с. Ibp Usa. ESTONIA ARMY, NATIONAL SECURITY AND DEFENSE POLICY HANDBOOK (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с. Ibp Usa. Finland Army, National Security And Defense Policy Handbook (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с. Ibp Usa. Germany Army, National Security And Defense Policy Handbook (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с. Ibp Usa. China Army, National Security and Defense Policy Handbook. – М.: , 2008. – 300 с. Ibp Usa. Cuba Army, National Security And Defense Policy Handbook (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с. Ibp Usa. US Securities and Exchange Commission Handbook. – М.: , 2008. – 300 с. Ibp Usa. Myanmar Army, National Security And Defense Policy Handbook. – М.: , 2008. – 300 с. Ibp Usa. Philippines Army National Security and Defense Policy Handbook. – М.: , 2008. – 300 с. Ibp Usa. Global National Security and Intelligence Agencies Handbook. – М.: , 2008. – 300 с. Ibp Usa. Germany Army, National Security and Defense Policy Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Ibp Usa. Australia Army, National Security and Defense Policy Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Ibp Usa. Australia Aviation and Aerospace Industry Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Ibp Usa. Australia Government and Business Contacts Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Ibp Usa. Australia Justice System and National Police Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Ibp Usa. Austria Aviation and Aerospace Industry Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Ibp Usa. Austria Justice System and National Police Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Ibp Usa. Azerbaijan Government and Business Contacts Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Ibp Usa. Bangladesh Army, National Security and Defense Policy Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Ibp Usa. Bangladesh Government and Business Contacts Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Ibp Usa. Bangladesh Justice System and National Police Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Ibp Usa. France Middle East & Arabic Countries Economic and Political Relations Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Ibp Usa. France US Economic and Political Relations Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Ibp Usa. Germany Aviation and Aerospace Industry Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Ibp Usa. Germany Government and Business Contacts Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Ibp Usa. Germany Justice System and National Police Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Ibp Usa. Ghana Banking and Financial Sector Business and Investment Opportunities Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Ibp Usa. Global Business Lawyer Associations and Arbitration Centers Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Ibp Usa. Global Customs Laws and Trade Regulations Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Ibp Usa. Global Foreign Trade Barriers to the US Products and Services Exports Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Ibp Usa. Arab Authority for Agricultural Investment and Development (AAAID) Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Ibp Usa. Arab Fund for Economic and Social Development Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Ibp Usa. Arab Gulf Business and Development Programs Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Ibp Usa. Argentina Government and Business Contacts Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Ibp Usa. Costa Rica Ecological and Nature Protection Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Ibp Usa. Costa Rica Government and Business Contacts Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Ibp Usa. Cuba Army Defense Policy and National Security Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Ibp Usa. Czech Republic Army, National Security and Defense Policy Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Ibp Usa. Finland Army, National Security and Defense Policy Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Ibp Usa. France Army, National Security and Defense Policy Handbook (World Business Information Catalog). – М.: , 2008. – 300 с. Ibp Usa. Estonia Army, National Security and Defense Policy Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Social and Human Elements of Information Security: Emerging Trends and Countermeasures (Premier Reference Source). – М.: , 2008. – 412 с. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с. Gerard Blokdijk, Ivanka Menken. Information Security Management Best Practice Workbook: Implementation and Management Roadmap for Threats, Challenges and Solutions - Ready to use supporting documents bringing Theory into Practice. – М.: , 2008. – 124 с. W. Krag Brotby. Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement. – М.: Auerbach Publications, 2009. – 200 с. Bel G. Raggad. Information Security Management: Concepts and Practice. – М.: , 2010. – 871 с. Michael E. Whitman, Herbert J. Mattord. Management of Information Security. – М.: , 2010. – 592 с. Jon Marks. Check Your English Vocabulary for Computers and Information Technology. – М.: Bloomsbury Publishing PLC, 2012. – 80 с. Editors Karl Maria Michael de Leeuw, Jan Bergstra. The History of Information Security: A Comprehensive Handbook. – М.: Elsevier Science, 2007. – 900 с. Handbook of Information and Communication Security. – М.: , 2010. – 800 с. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с. John R. Vacca. Computer and Information Security Handbook. – М.: , 2010. – 928 с. Computer Security Handbook. – М.: , 2002. – 1224 с. Robert A. Stern. An Introduction to Computers and Information Processing. – М.: , 1985. – 168 с. RA STERN. Stern Introduction To Computers And ?information? Processing 2ed. – М.: , 1984. – 738 с. RH BAKER. Baker ?computer Security? Handbook. – М.: , 1985. – 288 с. Hutt. Computer Security Handbook, 3rd Edition, 2000 Cumu lative Supplement. – М.: , 2000. – 112 с. Computer Security Handbook. – М.: , 1995. – 1088 с. Principles Of Computer Security, Comptia Security+ And Beyond, Second Edition. – М.: , 2011. – 0 с. Harold F. Tipton, Micki Krause. Information Security Management Handbook on CD-ROM, 2003 Edition. – М.: , . – с. Prof Lucy Lynn Maliwichi,Prof Peter BIkam and Dovhani Johannes Mulaudzi. Energy Needs and Food Security in Mutale Municipality, South Africa. – М.: LAP Lambert Academic Publishing, 2011. – 76 с. Mohd. Hudzari Haji Razali,Wan Ishak Wan Ismail and Noordin Asimi Mohd Noor. Computer and Electronic in Agriculture: Farm Mechanization Essentials. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Ishrat Fatima,Badar Naseem Siddiqui and Kanwal Naeem. Rural Youth and Food Security. – М.: LAP Lambert Academic Publishing, 2014. – 112 с. T. Bezboruah and R. Gogoi. Information storage and retrieval systems. – М.: LAP Lambert Academic Publishing, 2011. – 120 с. Anju Lis Kurian and C. Vinodan. Regional Integration and Energy Security:The European Union Experience. – М.: LAP Lambert Academic Publishing, 2014. – 268 с. Dilip Kumar Gayen,Jitendra Nath Roy and Rajat Kumar Pal. Optics in Computing. – М.: LAP Lambert Academic Publishing, 2012. – 192 с. Mah-e-Bushra Asghar and Rubina Bhatti. Marketing of Library and Information Services and Products. – М.: LAP Lambert Academic Publishing, 2012. – 124 с. Nateq Be-Nazir Ibn Minar. Bluetooth Networking and its Security Architecture. – М.: LAP Lambert Academic Publishing, 2012. – 84 с. Nadire Cavus and Mustafa Asaad Alani. Cloud computing and its adaptation. – М.: LAP Lambert Academic Publishing, 2014. – 80 с. Yedji Mbangsoua and Dr. Freddie Acosta. Information Security and its Investment Justification. – М.: LAP Lambert Academic Publishing, 2011. – 132 с. Yasser Alshehri. Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 156 с. Manoj Kumar Verma and U. N. Singh. Impact of Internet on Library and Information Services of IITs. – М.: LAP Lambert Academic Publishing, 2012. – 164 с. Furhan Mehmood and Rajia Rafique. Information Security in Financial Organizations. – М.: LAP Lambert Academic Publishing, 2010. – 68 с. frankie tvrz and marijke coetzee. Information Security of a Bluetooth-enabled handheld device. – М.: LAP Lambert Academic Publishing, 2010. – 180 с. Meysam Namayandeh. Development of Computer Ethical Framework for Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 132 с. Muhammad Imran Tariq. SLA based Information Security Metrics in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2014. – 192 с. Mela Ali and Loay George. A Spatial Invarient Model for Local Attributes of Fingerprint Ridges. – М.: LAP Lambert Academic Publishing, 2013. – 152 с. Gurpreet Kaur and Parvinder Singh Baweja. Dental Informatics. – М.: LAP Lambert Academic Publishing, 2013. – 68 с. Alaa Al-Deen Mohammed Hassan. Information Security Management. – М.: LAP Lambert Academic Publishing, 2013. – 188 с. Jun Zheng,Jiantao Gu and Hong Wang. Financial Management and Information Security of Independent Colleges. – М.: LAP Lambert Academic Publishing, 2014. – 256 с. Ying Qian. Mitigating Information Security Risks during Operation Transition. – М.: LAP Lambert Academic Publishing, 2012. – 372 с. Лучшие результаты Ничего не найдено Дополнительные результаты Наука человековедения. интервью с Д. Уолтоном, профессором London Metropolitan University, экспертом CIPD. Chartered Institute of Personnel and Development, автором программы Master of Arts in Human Resource Strategies. И. Смирнова, "Кадровый менеджмент", № 5, июль-август 2007. Специализированный модуль FS-CD. Collections and Disbursements - "Сборы и Выплаты" и его возможности. О.А. Глущенко, "Финансовый менеджмент в страховой компании", № 2, II квартал 2007. Бюджетирование страховой компании на базе Oracle Enterprise Planning and Budgeting. Д.В. Лесоводский, "Финансовый менеджмент в страховой компании", № 3, III квартал 2006. Регулирование операций торгового финансирования: новые инициативы. интервью с Д. Шмандом, вице-председателем Банковской комиссии ICC по supply chain finance, главой подразделения Trade Finance and Cash Management Corporates EMEA в Global Transaction Banking. GTB division Deutsche Bank. Н. Макарова, "Международные банковские операции", N 2, апрель-июнь 2012 г. О качестве сервиса, связанного с запросами на медицинскую информацию. Medical Information Service?. А. Беденков, "Ремедиум", № 1, январь 2012. Ужин в темноте в стиле Малевича и Новый год в Хаммере". Что может выть лучше?". интервью с Н. Саниной, индивидуальным предпринимателем и креативным директором компании "San and stars". М. Сипатова, "Арсенал предпринимателя", N 12, декабрь 2011 г. На пути к новому стандарту в торговом финансировании. интервью с А. Кастерманом, руководителем Trade and Supply Chain, SWIFT, сопредседателем рабочей группы ICC-BPO. Э. Шакирова, "Международные банковские операции", N 4, октябрь-декабрь 2011 г. Уильям Савадж: Мотивировать людей в Нижнем Новгороде и Новосибирске нужно по-разному". интервью с У. Саваджем, вице-президентом корпорации Intel, подразделение Software and Services Group. М. Холкина, "Управление персоналом", N 14, июль 2010 г. Цены под контролем: the present and the future. С. Стройкова, И. Леметюйнен, "Консультант", № 19, сентябрь 2009. Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Kate Марин, спасибо Вам огромное за Вашу работу! Защитилась на 5!)