Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Lorenzo Cozzella. Data and Information Security using Hylemetric Approach. – М.: LAP Lambert Academic Publishing, 2014. – 204 с. Дополнительные результаты African Conflicts and Informal Power: Big Men and Networks (Africa Now). – М.: , 2012. – 288 с. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 515 с. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с. Peter A. Diamond. Taxation, Incomplete Markets, and Social Security (Munich Lectures). – М.: , 0. – 0 с. Risk Management, Speculation, and Derivative Securities. – М.: , 0. – 0 с. Gerald Kovacich. The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition. – М.: , 0. – 0 с. Marianne Munday. Opportunities in Data and Word Processing Careers. – М.: , 0. – 0 с. Judith Hale. Performance Based Evaluation: Tools and Techniques to Measure the Impact of Training. – М.: , 0. – 0 с. Ulric J., Jr. Gelinas, Steve G. Sutton, Jane Fedorowicz. Business Processes and Information Technology. – М.: , 0. – 0 с. Jean-Jacques Laffont. The Economics of Uncertainty and Information. – М.: The MIT Press, 1989. – 304 с. Nico Heerink, Herman Van Keulen, Marijke Kuiper, H. Van Keulen. Economic Policy and Sustainable Land Use: Recent Advances in Quantitative Analysis for Developing Countries (Contributions to Economics). – М.: , 0. – 0 с. Harrison Roth. LEAPS: Long-Term Equity Anticipation Securites: What They Are and How to Use Them for Profit and Protection. – М.: , 0. – 0 с. E. Barucci. Financial Markets Theory: Equilibrium, Efficiency, and Information (Springer Finance). – М.: , 0. – 0 с. Nikitas-Spiros Koutsoukis, Gautam Mitra. Decision Modelling and Information Systems: The Information Value Chain (Operations Research/Computer Science Interfaces Series). – М.: , 0. – 0 с. Peter Checkland, Sue Holwell. Information, Systems and Information Systems - making sense of the field. – М.: , 0. – 0 с. Mark B. Desman. Building an Information Security Awareness Program. – М.: , 0. – 0 с. Jill Dyche, Jill Dyche. e-Data: Turning Data into Information with Data Warehousing (Addison-Wesley Information Technology Series). – М.: , 0. – 0 с. Gerald L. Kovacich, Edward P. Halibozek. The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, First Edition. – М.: , 0. – 0 с. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с. Marko Nordquist. Towards Improved Security Management Practice: Designing an Organizational Model Procedure for the Implementation of Information Security Management in Heterogeneous Information Management. – М.: , 0. – 0 с. Modern Information Systems for Managers. – М.: , 0. – 0 с. Steve Purser. A Practical Guide to Managing Information Security (Artech House Technology Management Library). – М.: , 0. – 0 с. Risk Analysis and the Security Survey. – М.: , 0. – 0 с. British Library, Ian Stewart, Alan Gomersall, British Library Science Reference and Information Service Market Rese. Market Research: A Guide to British Library Collections. – М.: , 0. – 0 с. Marian Quigley, Marian Quiqley. Information Security and Ethics: Social and Organizational Issues. – М.: , 0. – 0 с. Ifip Tc6, Tc11 Joint Working Conference on Communications and Multimedi, Tomaz Klobucar. Advanced Communications and Multimedia Security: Ifip Tc6/Tc11 Sixth Joint Working Conference on Communications and Multimedia Security, September 26-27, 2002, Portoroz, Slovenia (International Federation for Information Processing, 100). – М.: , 0. – 0 с. C. Warren Axelrod, Axelrod. Outsourcing Information Security. – М.: , 0. – 0 с. Zongqing Zhou. E-Commerce and Information Technology in Hospitality and Tourism. – М.: Delmar Cengage Learning, 2003. – 224 с. Harold F. Tipton, Micki Krause, Micki, Cissp Krause. Information Security Management Handbook, Fifth Edition. – М.: , 0. – 0 с. Charles Cresson Wood. Best Practices In Internet Commerce Security. – М.: , 0. – 0 с. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с. Roger Evernden. Information First : Integrating Knowledge and Information Architecture for Business Advantage. – М.: , 2003. – 0 с. Graham Cheetham. Professions, Competence and Informal Learning. – М.: , 2005. – 0 с. Peter A. Diamond. Taxation, Incomplete Markets, and Social Security (Munich Lectures). – М.: , 2005. – 0 с. Thomas C. Glaessner. Electronic Safety and Soundness: Securing Finance in a New Age (World Bank Working Papers). – М.: , 2004. – 0 с. Barbara C. McNurlin. Information Systems Management in Practice (7th Edition). – М.: , 2005. – 0 с. Catastrophe Modeling : A New Approach to Managing Risk (Huebner International Series on Risk, Insurance and Economic Security). – М.: , 2004. – 0 с. Peter R., MBA Ramsaroop. Securing Business Intelligence: Knowledge and CyberSecurity in the Post 9/11 World. – М.: , 2004. – 0 с. G.E. Gorman. International Yearbook of Library and Information Management, 2003-2004: Metadata Applications and Management : Metadata Applications and Management (International ... of Library and Information Management). – М.: , 2003. – 0 с. Matthew Hinton. Introducing Information Management: The business approach. – М.: , 2005. – 0 с. Intelligent Agents for Data Mining and Information Retrieval. – М.: , 2004. – 0 с. Strategic Marketing in Library and Information Science. – М.: , 2003. – 0 с. Frances C. Wilkinson. The Complete Guide to Acquisitions Management (Library and Information Science Text Series). – М.: , 2003. – 0 с. Economics of Information Security (Advances in Information Security). – М.: , 2004. – 0 с. Sari Greene. Security Policies and Procedures : Principles and Practices (Security). – М.: , 2005. – 0 с. Lech Janczewski. Managerial Guide for Handling Cyber-Terrorism and Information Warfare. – М.: , 2005. – 0 с. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с. Strategic Marketing in Library and Information Science. – М.: , 2003. – 0 с. Robert A. Schultz. Contemporary Issues in Ethics and Information Technology. – М.: , 2005. – 0 с. Margi Levy. Strategies for Growth in SMEs, First Edition : The Role of Information and Information Sytems. – М.: , 2004. – 0 с. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с. Catastrophe Modeling:: A New Approach to Managing Risk (Huebner International Series on Risk, Insurance and Economic Security). – М.: , 2005. – 252 с. Economics and Contemporary Land Use Policy: Development and Conservation at the Rural-Urban Fringe (Resources for the Future S.). – М.: , 2006. – 288 с. Helen Nesadurai. Globalisation and Economic Security in East Asia: Governance and Institutions. – М.: , 2005. – 256 с. The Water Encyclopedia, Third Edition: Hydrologic Data and Internet Resources. – М.: , 2007. – 1880 с. Ira Winkler. Zen and the Art of Information Security. – М.: , 2007. – 192 с. Timothy P. Layton. Information Security. – М.: , 2006. – 222 с. Michael E. Whitman, Herbert J. Mattord. Principles of Information Security, Second Edition. – М.: , 2004. – 600 с. From Data and Information Analysis to Knowledge Engineering : Proceedings of the 29th Annual Conference of the Gesellschaft fA?r Klassifikation e.V., University ... Data Analysis. – М.: , 2006. – 761 с. John Crawford. The Culture of Evaluation in Library and Information Services. – М.: Chandos Publishing (Oxford) Ltd., 2006. – 204 с. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с. Danette McGilvray. Executing Data Quality Projects: Ten Steps to Quality Data and Trusted Information (TM). – М.: , 2008. – 352 с. Kathleen de la Pena McCook. Opportunities in Library and Information Science (Opportunities in). – М.: , 2008. – 160 с. Managing the Transition from Print to Electronic Journals and Resources: A Guide for Library and Information Professionals (Routledge Studies in Library and Information Science). – М.: , 2008. – 356 с. Managing the Transition from Print to Electronic Journals and Resources: A Guide for Library and Information Professionals (Routledge Studies in Library and Information Science). – М.: , 2008. – 300 с. Environmental Change and Human Security: Recognizing and Acting on Hazard Impacts (NATO Science for Peace and Security Series C: Environmental Security). – М.: , 2008. – 480 с. Ibp Usa. Cuba Army Defense Policy and National Security Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Social and Human Elements of Information Security: Emerging Trends and Countermeasures (Premier Reference Source). – М.: , 2008. – 412 с. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с. Gerard Blokdijk, Ivanka Menken. Information Security Management Best Practice Workbook: Implementation and Management Roadmap for Threats, Challenges and Solutions - Ready to use supporting documents bringing Theory into Practice. – М.: , 2008. – 124 с. Charles Halliman. Business Intelligence Using Smart Techniques: Environmental Scanning Using Text Mining and Competitor Analysis Using Scenarios and Manual Simulation, Revised Edition. – М.: , 2009. – 230 с. W. Krag Brotby. Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement. – М.: Auerbach Publications, 2009. – 200 с. Alan Calder. Information Security based on ISO 27001/ISO 27002: A Management Guide. – М.: , 2009. – 83 с. Bel G. Raggad. Information Security Management: Concepts and Practice. – М.: , 2010. – 871 с. Michael E. Whitman, Herbert J. Mattord. Management of Information Security. – М.: , 2010. – 592 с. Econophysics Approaches to Large-Scale Business Data and Financial Crisis: Proceedings of Tokyo Tech-Hitotsubashi Interdisciplinary Conference + APFA7. – М.: , 2010. – 342 с. Alan Calder, Steve G Watkins. Information Security Risk Management for ISO27001 / ISO27002. – М.: , 2010. – 198 с. William Manning. CISM Certified Information Security Manager Certification Exam Preparation Course in a Book for Passing the CISM Exam - The How To Pass on Your First Try Certification Study Guide. – М.: , 2010. – 188 с. Handbook of Information and Communication Security. – М.: , 2010. – 800 с. Reinhard Viertl. Fuzzy Data and Statistics. – М.: , 2011. – 256 с. Jesus Mena. Investigative Data Mining for Security and Criminal Detection. – М.: , 2010. – 272 с. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с. John R. Vacca. Computer and Information Security Handbook. – М.: , 2010. – 928 с. Hvac Equations, Data, And Rules Of Thumb, 2Nd Ed. – М.: , 2011. – 790 с. Principles Of Computer Security, Comptia Security+ And Beyond, Second Edition. – М.: , 2011. – 0 с. Rohana Mohamad Rashid. Determining Influencing Factors of Information Security Culture. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Prof Lucy Lynn Maliwichi,Prof Peter BIkam and Dovhani Johannes Mulaudzi. Energy Needs and Food Security in Mutale Municipality, South Africa. – М.: LAP Lambert Academic Publishing, 2011. – 76 с. Lorenzo Cozzella. Data and Information Security using Hylemetric Approach. – М.: LAP Lambert Academic Publishing, 2014. – 204 с. Muhammad Inayat Ullah and Muhammad Shahid. IMPROVING THE EFFICIENCY OF MEDICAL EXPERT SYSTEM. – М.: LAP Lambert Academic Publishing, 2010. – 60 с. Charles Mundia and Masamu Aniya. Spatial-Temporal Analysis and Modeling of Urban Growth. – М.: LAP Lambert Academic Publishing, 2010. – 156 с. K.V. Raju and Manasi S. Integrated Water Resources Management in Tungabhadra Sub Basin. – М.: LAP Lambert Academic Publishing, 2011. – 196 с. Michael Opoku and Richard Nsiah. The Effect of Capitation Payment on the Nat. Health Insurance in Ghana. – М.: LAP Lambert Academic Publishing, 2014. – 88 с. M. Rezaul Islam and Shankor Paul. Women Perception on Violence and Discrimination in Bangladesh. – М.: LAP Lambert Academic Publishing, 2011. – 68 с. Ishrat Fatima,Badar Naseem Siddiqui and Kanwal Naeem. Rural Youth and Food Security. – М.: LAP Lambert Academic Publishing, 2014. – 112 с. Md. Abubakkor Siddik,Mt. Parvina Akhtar and Md. Moniruzzaman. Cyclone Sidr and Housing Sector. – М.: LAP Lambert Academic Publishing, 2012. – 164 с. Godefroid Ndayikengurukiye. Remote Sensing Data Fusion. – М.: LAP Lambert Academic Publishing, 2012. – 404 с. Vishal Kothari and Rajesh Patel. Biotic factor management for sustainable agricultural development. – М.: LAP Lambert Academic Publishing, 2014. – 96 с. Radoslav Ivancik and Pavel Necas. Postmodern Conflicts on African Continent. – М.: LAP Lambert Academic Publishing, 2013. – 180 с. Anju Lis Kurian and C. Vinodan. Regional Integration and Energy Security:The European Union Experience. – М.: LAP Lambert Academic Publishing, 2014. – 268 с. Aniza Abd. Aziz,Zurkurnai Yusof and Syed Hatim Noor. Survival And Prognostic Factors of Acute Myocardial Infarction. – М.: LAP Lambert Academic Publishing, 2011. – 104 с. Omead Hussain. Predicting Breast Cancer Survivability Using Data Mining Techniques. – М.: LAP Lambert Academic Publishing, 2011. – 136 с. Mohamed A. El-Sisy,Waeil F. Abd El-Waheed and Abd Allah A. Mousa. Ant Colony Algorithm to Support Multi-Criteria Decision Making. – М.: LAP Lambert Academic Publishing, 2013. – 128 с. Mah-e-Bushra Asghar and Rubina Bhatti. Marketing of Library and Information Services and Products. – М.: LAP Lambert Academic Publishing, 2012. – 124 с. Vipin Yadav and Mitchell F. Denning. Molecular Signaling Pathways in Human Skin Carcinogenesis. – М.: LAP Lambert Academic Publishing, 2011. – 192 с. Rupesh S. Mishra and D. K. Chitre. Data Leakage Detection in Relational Database. – М.: LAP Lambert Academic Publishing, 2013. – 68 с. Wole Olatokun. Databases and Information Retrieval. – М.: LAP Lambert Academic Publishing, 2012. – 304 с. Ankit Panch. Enterprise Secure Wireless Authentication (ESWA). – М.: LAP Lambert Academic Publishing, 2013. – 72 с. Yedji Mbangsoua and Dr. Freddie Acosta. Information Security and its Investment Justification. – М.: LAP Lambert Academic Publishing, 2011. – 132 с. Yasser Alshehri. Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 156 с. Vivek Gangwar. Data Mining Of Biological Data And Pattern Matching. – М.: LAP Lambert Academic Publishing, 2012. – 68 с. Shafi'i Muhammad Abdulhamid. Privacy And National Security Challenges in Online Social Networks. – М.: LAP Lambert Academic Publishing, 2013. – 64 с. Julien Shabani. Information Security for RFID Systems. – М.: LAP Lambert Academic Publishing, 2011. – 92 с. Manoj Kumar Verma and U. N. Singh. Impact of Internet on Library and Information Services of IITs. – М.: LAP Lambert Academic Publishing, 2012. – 164 с. Affan Yasin,Hafiz Adnan Shafiq and Muhammad Ijlal Hasnain. Software Architecture for Centralized Health Database. – М.: LAP Lambert Academic Publishing, 2013. – 64 с. Furhan Mehmood and Rajia Rafique. Information Security in Financial Organizations. – М.: LAP Lambert Academic Publishing, 2010. – 68 с. Edrisi Munoz,Luis Puigjaner and Antonio Espuna. Knowledge management tool for integrated decision-making in industry. – М.: LAP Lambert Academic Publishing, 2012. – 212 с. Omar Zakaria. Information Security Culture. – М.: LAP Lambert Academic Publishing, 2013. – 248 с. Saeed Soltanmohammadi. Improving Information System Security by Evaluating Human Factors. – М.: LAP Lambert Academic Publishing, 2014. – 116 с. frankie tvrz and marijke coetzee. Information Security of a Bluetooth-enabled handheld device. – М.: LAP Lambert Academic Publishing, 2010. – 180 с. Ahmed AlNunu. How Much Information Security?. – М.: LAP Lambert Academic Publishing, 2010. – 68 с. Jeffy Mwakalinga. A Framework for Adaptive Information Security Systems. – М.: LAP Lambert Academic Publishing, 2011. – 364 с. Meixia Deng and Liping Di. Facilitating Data-intensive Research and Education in Earth Science. – М.: LAP Lambert Academic Publishing, 2010. – 212 с. Sena Desmennu and Nicholas Ikhu-Omoregbe. Healthcare Information Management System. – М.: LAP Lambert Academic Publishing, 2010. – 68 с. Muhammad Imran Tariq. SLA based Information Security Metrics in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2014. – 192 с. Mela Ali and Loay George. A Spatial Invarient Model for Local Attributes of Fingerprint Ridges. – М.: LAP Lambert Academic Publishing, 2013. – 152 с. Padi Koti Prahladha and Kondeti Suneetha. Public Distribution System and Food Security in Andhra Pradesh. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Tekalign Gutu Sakketa. Improving and Protecting Multiple-Use Water Resources. – М.: LAP Lambert Academic Publishing, 2012. – 92 с. Kazeem Durodoye, PhD. Impact Of Business And Information Systems Strategy On Firm Performance. – М.: LAP Lambert Academic Publishing, 2011. – 348 с. Alaa Al-Deen Mohammed Hassan. Information Security Management. – М.: LAP Lambert Academic Publishing, 2013. – 188 с. Jun Zheng,Jiantao Gu and Hong Wang. Financial Management and Information Security of Independent Colleges. – М.: LAP Lambert Academic Publishing, 2014. – 256 с. Ying Qian. Mitigating Information Security Risks during Operation Transition. – М.: LAP Lambert Academic Publishing, 2012. – 372 с. Emaziye Otunaruke Peter. Climate Change and Food Security in Niger Delta Region, Nigeria. – М.: LAP Lambert Academic Publishing, 2013. – 160 с. Ahmed Mohammed. Non-timber Forest Products and Food Security. – М.: LAP Lambert Academic Publishing, 2013. – 104 с. Sanjay Srivastava. Alleviating Rural Poverty and Food Security in Changing Climate. – М.: LAP Lambert Academic Publishing, 2010. – 96 с. Designing News: Changing the World of Editorial Design and Information Graphics. – М.: , . – с. Лучшие результаты Ничего не найдено Дополнительные результаты Применение интеллектуального анализа данных. data mining в управлении страховой компанией. Ю.В. Грызенкова, З.Ф. Шарифьянова, "Управление в страховой компании", № 4, октябрь-декабрь 2007. Наука человековедения. интервью с Д. Уолтоном, профессором London Metropolitan University, экспертом CIPD. Chartered Institute of Personnel and Development, автором программы Master of Arts in Human Resource Strategies. И. Смирнова, "Кадровый менеджмент", № 5, июль-август 2007. Специализированный модуль FS-CD. Collections and Disbursements - "Сборы и Выплаты" и его возможности. О.А. Глущенко, "Финансовый менеджмент в страховой компании", № 2, II квартал 2007. Бюджетирование страховой компании на базе Oracle Enterprise Planning and Budgeting. Д.В. Лесоводский, "Финансовый менеджмент в страховой компании", № 3, III квартал 2006. Регулирование операций торгового финансирования: новые инициативы. интервью с Д. Шмандом, вице-председателем Банковской комиссии ICC по supply chain finance, главой подразделения Trade Finance and Cash Management Corporates EMEA в Global Transaction Banking. GTB division Deutsche Bank. Н. Макарова, "Международные банковские операции", N 2, апрель-июнь 2012 г. О качестве сервиса, связанного с запросами на медицинскую информацию. Medical Information Service?. А. Беденков, "Ремедиум", № 1, январь 2012. Ужин в темноте в стиле Малевича и Новый год в Хаммере". Что может выть лучше?". интервью с Н. Саниной, индивидуальным предпринимателем и креативным директором компании "San and stars". М. Сипатова, "Арсенал предпринимателя", N 12, декабрь 2011 г. На пути к новому стандарту в торговом финансировании. интервью с А. Кастерманом, руководителем Trade and Supply Chain, SWIFT, сопредседателем рабочей группы ICC-BPO. Э. Шакирова, "Международные банковские операции", N 4, октябрь-декабрь 2011 г. Уильям Савадж: Мотивировать людей в Нижнем Новгороде и Новосибирске нужно по-разному". интервью с У. Саваджем, вице-президентом корпорации Intel, подразделение Software and Services Group. М. Холкина, "Управление персоналом", N 14, июль 2010 г. Цены под контролем: the present and the future. С. Стройкова, И. Леметюйнен, "Консультант", № 19, сентябрь 2009. Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Роман, 27.04 Отлично, спасибо большое