Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Rohana Mohamad Rashid. Determining Influencing Factors of Information Security Culture. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.

Дополнительные результаты

  1. Aswath Damodaran. Investment Valuation: Tools and Techniques for Determining the Value of Any Asset (Wiley Finance). – М.: , 2012. – 974 с.
  2. Aswath Damodaran. Investment Valuation: Tools and Techniques for Determining the Value of any Asset, University Edition (Wiley Finance Series). – М.: , 2012. – 974 с.
  3. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с.
  4. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  5. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с.
  6. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с.
  7. James E. Hunton, Stephanie M. Bryant, Nancy A. Bagranoff. Core Concepts of Information Technology Auditing. – М.: , 0. – 0 с.
  8. David B. Lawrence. The Economic Value of Information. – М.: , 0. – 0 с.
  9. Steve Clarke, Elayne Coakes, M. Gordon Hunter, Andrew Wenn. Socio-Technical and Human Cognition Elements of Information Systems. – М.: , 0. – 0 с.
  10. Dorothy J. Solinger, David A. Smith, Steven Topik, University of California Institute on Global Conflict and Cooperation. States and Sovereignty in the Global Economy. – М.: , 0. – 0 с.
  11. Michael J. Earl, Oxford Institute of Information Management, Pa Consulting Group. Information Management: The Organizational Dimension. – М.: , 0. – 0 с.
  12. Mark B. Desman. Building an Information Security Awareness Program. – М.: , 0. – 0 с.
  13. Felix B., Ph.D. Tan. Global Perspective of Information Technology Management. – М.: , 0. – 0 с.
  14. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с.
  15. Marko Nordquist. Towards Improved Security Management Practice: Designing an Organizational Model Procedure for the Implementation of Information Security Management in Heterogeneous Information Management. – М.: , 0. – 0 с.
  16. Edward Szewczak, Mehdi Khosrowpour. The Human Side of Information Technology Management (Series in Managing the Human Side of Information Technology). – М.: , 0. – 0 с.
  17. Steve Purser. A Practical Guide to Managing Information Security (Artech House Technology Management Library). – М.: , 0. – 0 с.
  18. Thomas Frank. The Conquest of Cool: Business Culture, Counterculture, and the Rise of Hip Consumerism. – М.: University of Chicago Press, 1998. – 330 с.
  19. Marian Quigley, Marian Quiqley. Information Security and Ethics: Social and Organizational Issues. – М.: , 0. – 0 с.
  20. C. Warren Axelrod, Axelrod. Outsourcing Information Security. – М.: , 0. – 0 с.
  21. Eugene Kaluzniacky. Managing Psychological Factors in Information Systems Work: An Orientation to Emotional Intelligence. – М.: , 0. – 0 с.
  22. Harold F. Tipton, Micki Krause, Micki, Cissp Krause. Information Security Management Handbook, Fifth Edition. – М.: , 0. – 0 с.
  23. Thomas Peltier, Thomas Pelitier, Justin Peltier, John A. Blackley, Peltier, Associates. Information Security Fundamentals. – М.: , 0. – 0 с.
  24. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с.
  25. Current Security Management & Ethical Issues of Information Technology. – М.: , 2003. – 0 с.
  26. Economics of Information Security (Advances in Information Security). – М.: , 2004. – 0 с.
  27. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с.
  28. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с.
  29. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с.
  30. Peter O. Christensen, G. A. Feltham. Economics of Accounting: Volume I: Information in Markets (Springer Series in Accounting Scholarship). – М.: , 2004. – 616 с.
  31. Ira Winkler. Zen and the Art of Information Security. – М.: , 2007. – 192 с.
  32. Timothy P. Layton. Information Security. – М.: , 2006. – 222 с.
  33. Michael Khairallah. Physical Security Systems Handbook: The Design and Implementation of Electronic Security Systems. – М.: , 2005. – 312 с.
  34. Michael E. Whitman, Herbert J. Mattord. Principles of Information Security, Second Edition. – М.: , 2004. – 600 с.
  35. Hal R. Varian, Joseph Farrell, Carl Shapiro. The Economics of Information Technology: An Introduction (Raffaele Mattioli Lectures). – М.: , 2005. – 112 с.
  36. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с.
  37. Vincenzo Galasso. The Political Future of Social Security in Aging Societies. – М.: , 2008. – 280 с.
  38. Encyclopedia of Information Communication Technology. – М.: , 2008. – 926 с.
  39. Social and Human Elements of Information Security: Emerging Trends and Countermeasures (Premier Reference Source). – М.: , 2008. – 412 с.
  40. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с.
  41. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с.
  42. Gerard Blokdijk, Ivanka Menken. Information Security Management Best Practice Workbook: Implementation and Management Roadmap for Threats, Challenges and Solutions - Ready to use supporting documents bringing Theory into Practice. – М.: , 2008. – 124 с.
  43. T.R. Ramanathan. The Role of Organisational Change Management in Offshore Outsourcing of Information Technology Services: Qualitative Case Studies from a Multinational Pharmaceutical Company. – М.: , 2009. – 188 с.
  44. Alan Calder. Information Security based on ISO 27001/ISO 27002: A Management Guide. – М.: , 2009. – 83 с.
  45. Bel G. Raggad. Information Security Management: Concepts and Practice. – М.: , 2010. – 871 с.
  46. Michael E. Whitman, Herbert J. Mattord. Management of Information Security. – М.: , 2010. – 592 с.
  47. Michael Korner von Almasy. What determines the number of cars?: Regression Analysis on the Czech Republic Data. – М.: , 2010. – 52 с.
  48. Alan Calder, Steve G Watkins. Information Security Risk Management for ISO27001 / ISO27002. – М.: , 2010. – 198 с.
  49. William Manning. CISM Certified Information Security Manager Certification Exam Preparation Course in a Book for Passing the CISM Exam - The How To Pass on Your First Try Certification Study Guide. – М.: , 2010. – 188 с.
  50. Kevin Hogan. The 12 Factors of Business Success. – М.: , 2008. – 240 с.
  51. Editors Karl Maria Michael de Leeuw, Jan Bergstra. The History of Information Security: A Comprehensive Handbook. – М.: Elsevier Science, 2007. – 900 с.
  52. Alan Liu. The Laws of Cool: Knowledge , Work and the Culture of Information. – М.: , 0. – 0 с.
  53. Handbook of Information and Communication Security. – М.: , 2010. – 800 с.
  54. G. Manoilov. Elsevier's Dictionary of Information Security. – М.: , 2010. – 772 с.
  55. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с.
  56. Paul Robinson. Dictionary of International Security. – М.: , 2007. – 208 с.
  57. Alan Liu. The Laws of Cool – Knowledge Work and the Culture of Information. – М.: , 2004. – 552 с.
  58. Peter J Katzenstein. The Culture of National Security – Norms and Identity in World Politics. – М.: , 1996. – 580 с.
  59. T DALER. Daler: Security Of ?information? & Data. – М.: , 1988. – 134 с.
  60. Ademola Abass. Regional Organisations and the Development of Collective Security. – М.: , 2011. – 272 с.
  61. The Encyclopedia of Literary and Cultural Theory (Wiley-Blackwell Encyclopedia of Literature). – М.: , 2011. – 1544 с.
  62. Principles Of Computer Security, Comptia Security+ And Beyond, Second Edition. – М.: , 2011. – 0 с.
  63. 24 Deadly Sins Of Software Security: Programming Flaws And How To Fix Them. – М.: , 2011. – 432 с.
  64. Fundamentals Of Network Security. – М.: , 2011. – 672 с.
  65. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . –  с.
  66. Harold F. Tipton, Micki Krause. Information Security Management Handbook on CD-ROM, 2003 Edition. – М.: , . –  с.
  67. Geoff Kaplan. Power to the People: The Graphic Design of the Radical Press and the Rise of the Counter-Culture, 1964-1974. – М.: University of Chicago Press, 2013. – 264 с.
  68. SUBRAMANIAM ARUNACHALAM. Critical Success Factors of Quality Management System. – М.: LAP Lambert Academic Publishing, 2010. – 104 с.
  69. Rohana Mohamad Rashid. Determining Influencing Factors of Information Security Culture. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  70. Janet Isoka,Simon Wanami and Jason Wapukha. Impact Of Information And Communication Technology. – М.: LAP Lambert Academic Publishing, 2013. – 124 с.
  71. Nitin Kanzariya and Ashish Nimavat. Security of Digital Image Using Hybrid Steganography. – М.: LAP Lambert Academic Publishing, 2013. – 84 с.
  72. Biruk Fikadu Gebreyess. Factors Influencing Adoptionm of Fuel Efficient Injera Baking Stove. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  73. Mercy Njeri Njogu. Factors Influencing Performance of Informal Labourers in Kenya. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  74. Rositza S Dobrikova. The Display Of Emotions Cross-Culturally. – М.: LAP Lambert Academic Publishing, 2010. – 100 с.
  75. Zabibu Idrisa. Coverage of Social Security Schemes. – М.: LAP Lambert Academic Publishing, 2012. – 132 с.
  76. Joseph Mwaniki. Factors Influencing Adoption Of ICT In Women Enterprise Projects. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  77. Tegegne Chekol Malede. Contributary Factors of Risky Sexual Practice. – М.: LAP Lambert Academic Publishing, 2013. – 80 с.
  78. Dilda Pecaric. Development of Information Sciences in Croatia. – М.: LAP Lambert Academic Publishing, 2011. – 292 с.
  79. Susan Mwaura. Factors Influencing Enrolment of Female in Postgraduate Studies. – М.: LAP Lambert Academic Publishing, 2013. – 80 с.
  80. Agnes Mwai. Determinants that influence utilization of e-journals by the faculty. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  81. Melkamu Kassie. Demographic and socio economic determinants of food security. – М.: LAP Lambert Academic Publishing, 2012. – 132 с.
  82. Hanumant Waghmare. Utilization of Social Security Programmes in India. – М.: LAP Lambert Academic Publishing, 2013. – 104 с.
  83. Manir Abdullahi Kamba and Yushiana Mansor. Circular Model of Information Seeking Behaviour. – М.: LAP Lambert Academic Publishing, 2012. – 408 с.
  84. Firehiwot Megersa and Amare Hagos. A Study - On Analysis of Information. – М.: LAP Lambert Academic Publishing, 2015. – 108 с.
  85. Hailu Birara. Influencing Factors of Soil and Water Conservation. – М.: LAP Lambert Academic Publishing, 2013. – 84 с.
  86. Pankaj Raj Dhital. Factors Affecting Adoption of Agricultural Technology. – М.: LAP Lambert Academic Publishing, 2011. – 112 с.
  87. Kirill Ganzei. Landscape forming factors of Kurile Islands (North-Western Pacifica). – М.: LAP Lambert Academic Publishing, 2011. – 104 с.
  88. Kazi Samiul Hoque. Geospatial Analysis and Influencing Factors of Unplanned Landuse. – М.: LAP Lambert Academic Publishing, 2014. – 76 с.
  89. Yugan Pillay. Paramedic Rapid Sequence Intubation. – М.: LAP Lambert Academic Publishing, 2010. – 248 с.
  90. Duane Andrew Roy Allen. The Human Element of Maritime Security and the 21st Century Challenges. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  91. Tulia Ackson. Coordination of Social Security Systems in the SADC Region. – М.: LAP Lambert Academic Publishing, 2009. – 96 с.
  92. Bhekithemba Matsebula. Factors Influencing the Growth of Informal Rental Housing in Swaziland. – М.: LAP Lambert Academic Publishing, 2012. – 176 с.
  93. Rosnah Sutan,W.Cairns S.Smith and Campbell Doris. Determinant factors of unexplained ante partum stillbirths. – М.: Scholars' Press, 2013. – 368 с.
  94. Samir Othman and Tariq Al-Hadithi. Epidemiology and Risk Factors of Hepatitis B. – М.: LAP Lambert Academic Publishing, 2012. – 168 с.
  95. Addisu Alemayehu. Factors Influencing Utilization of ANC and Delivery Care Services. – М.: LAP Lambert Academic Publishing, 2012. – 72 с.
  96. Rehema Ogha Stephano. Deviation of Information in Translations. – М.: LAP Lambert Academic Publishing, 2012. – 72 с.
  97. Taner Altun. Role of Information and Communications Technology in Education. – М.: LAP Lambert Academic Publishing, 2010. – 300 с.
  98. Peter Sietins. User Competence and Models of Information System Success. – М.: LAP Lambert Academic Publishing, 2013. – 176 с.
  99. ILKAY VURAL. Success Factors in Information Systems Outsourcing. – М.: LAP Lambert Academic Publishing, 2010. – 92 с.
  100. Yedji Mbangsoua and Dr. Freddie Acosta. Information Security and its Investment Justification. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  101. Yasser Alshehri. Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 156 с.
  102. Julien Shabani. Information Security for RFID Systems. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.
  103. Debasish Jena. On Protocols for Information Security Services. – М.: LAP Lambert Academic Publishing, 2011. – 136 с.
  104. Delene Heukelman. Developing a model to design user interfaces for rural communities. – М.: LAP Lambert Academic Publishing, 2014. – 184 с.
  105. Furhan Mehmood and Rajia Rafique. Information Security in Financial Organizations. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  106. Irma Salamah. Factors Utilization of Information Technology. – М.: LAP Lambert Academic Publishing, 2013. – 56 с.
  107. Omar Zakaria. Information Security Culture. – М.: LAP Lambert Academic Publishing, 2013. – 248 с.
  108. frankie tvrz and marijke coetzee. Information Security of a Bluetooth-enabled handheld device. – М.: LAP Lambert Academic Publishing, 2010. – 180 с.
  109. Ahmed AlNunu. How Much Information Security?. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  110. Jeffy Mwakalinga. A Framework for Adaptive Information Security Systems. – М.: LAP Lambert Academic Publishing, 2011. – 364 с.
  111. Meysam Namayandeh. Development of Computer Ethical Framework for Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 132 с.
  112. Muhammad Imran Tariq. SLA based Information Security Metrics in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2014. – 192 с.
  113. Mohamed Khalefa Sarrab. Runtime Verification of Information flow. – М.: LAP Lambert Academic Publishing, 2011. – 288 с.
  114. Abanti Cyrus Makori and Lusiba Badru. Biometric Based Access Control of Information Systems. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  115. M.Selvi, Dr.S.Dhanavandan. USER NEEDS OF INFORMATION SOURCES. – М.: LAP Lambert Academic Publishing, 2012. – 128 с.
  116. S. Balamurugan and S. Charanyaa. Principles of Database Security. – М.: Scholars' Press, 2014. – 148 с.
  117. Zhe Wang. The Value Of Information. – М.: LAP Lambert Academic Publishing, 2013. – 52 с.
  118. Silvija Kalpokaite and Tadas Sarapovas. E-COMMERCE SUCCESS FACTORS OF B2C. – М.: LAP Lambert Academic Publishing, 2011. – 84 с.
  119. Syed Saad Mahmood. Calculating an Index of Economic Security: Methodological Choices. – М.: LAP Lambert Academic Publishing, 2013. – 92 с.
  120. Edward Martey. Factors Influencing Commercialization of Smallholder Agriculture. – М.: LAP Lambert Academic Publishing, 2013. – 112 с.
  121. Ahmed Nawaz Hakro and Abdallah Mohammed Omezzine. Oil Price Shocks and Macroeconomic Fundamentals of Oman Economy. – М.: LAP Lambert Academic Publishing, 2014. – 120 с.
  122. Michael Korner von Almasy. What determines the number of cars?. – М.: LAP Lambert Academic Publishing, 2010. – 48 с.
  123. David Wakaisuka and Wakaisuka Juliet. Factors of Accessibility to MFIs services in Kamuli District Uganda. – М.: LAP Lambert Academic Publishing, 2013. – 60 с.
  124. Daphne Raban. The Subjective Value of Information. – М.: LAP Lambert Academic Publishing, 2010. – 120 с.
  125. Aleksandr Miina. Critical Success Factors of Lean Thinking Implementation. – М.: LAP Lambert Academic Publishing, 2013. – 332 с.
  126. AKINYELE SAMUEL TAIWO and Gbede Ibironke. The Strategic Use of Information Technology. – М.: LAP Lambert Academic Publishing, 2011. – 104 с.
  127. Kirubel Habte. Growth and Contributing Factors of Micro and Small Enterprises. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  128. Alaa Al-Deen Mohammed Hassan. Information Security Management. – М.: LAP Lambert Academic Publishing, 2013. – 188 с.
  129. Jun Zheng,Jiantao Gu and Hong Wang. Financial Management and Information Security of Independent Colleges. – М.: LAP Lambert Academic Publishing, 2014. – 256 с.
  130. Andrew Armstrong. The Impact of Information Systems on Organisational Maturity. – М.: LAP Lambert Academic Publishing, 2012. – 292 с.
  131. Rehima Mussema. ANALYSIS OF RED PEPPER MARKETING: Ethiopia. – М.: LAP Lambert Academic Publishing, 2011. – 172 с.
  132. Lucky Ossai-Igwe Esuh. The Indirect Effects of Location and Culture on Small Firm Performance. – М.: LAP Lambert Academic Publishing, 2012. – 144 с.
  133. Ying Qian. Mitigating Information Security Risks during Operation Transition. – М.: LAP Lambert Academic Publishing, 2012. – 372 с.
  134. Jyri Lintunen. Motives and location factors of Chinese outward FDI. – М.: LAP Lambert Academic Publishing, 2012. – 140 с.
  135. Rose Mouti. Headteachers’ Adoption of Information and Communication Technology. – М.: LAP Lambert Academic Publishing, 2014. – 112 с.
  136. Michael Gachie. School Factors Influencing Implementation of Environmental Education. – М.: LAP Lambert Academic Publishing, 2014. – 88 с.
  137. BABU JOSE and DANIEL LAZAR. Futures Market - Determinants of Indian Futures Market. – М.: LAP Lambert Academic Publishing, 2013. – 132 с.
  138. Nedim Makarevic. Influence of IT Security on banks' competitiveness. – М.: LAP Lambert Academic Publishing, 2014. – 144 с.
  139. Jamie Silverman. Mis/Representation of Art and Culture:. – М.: LAP Lambert Academic Publishing, 2010. – 124 с.
  140. Serif Esendemir. Push Factors of Institutionalization of Older Adults in Turkey. – М.: , 2015. – 88 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Наука человековедения. интервью с Д. Уолтоном, профессором London Metropolitan University, экспертом CIPD. Chartered Institute of Personnel and Development, автором программы Master of Arts in Human Resource Strategies. И. Смирнова, "Кадровый менеджмент", № 5, июль-август 2007.
  2. Партнерство вместо подчинения. интервью с Дезо Хорватом, деканом Schulich School of Business. Р. Крецул, "Кадровый менеджмент", № 1, февраль 2006.
  3. Медицинская информатика в Web of Science: доля России в мировом публикационном потоке. Н.Г. Куракова, Л.А. Цветкова, "Врач и информационные технологии", № 4, июль-август 2012.
  4. О качестве сервиса, связанного с запросами на медицинскую информацию. Medical Information Service?. А. Беденков, "Ремедиум", № 1, январь 2012.
  5. Back side of the moon, или темная сторона поведения персонала. интервью с Н. Русаковой, директором по персоналу ОАО "Хлебпром", А. Сукачёвым, директором "Торговой компании АС", Н. Харитоновой, руководителем службы персонала тверской компании ЗАО "ДКС". А. Колесникова, Т. Тюрина, С.  Машарипов, "Управление персоналом", N 16, август 2010 г.
  6. Использование Bill of Exchange в аккредитивной форме расчетов. Н.В. Букина, "Международные банковские операции", № 6, ноябрь-декабрь 2009.
  7. IFG готова участвовать в развитии российского рынка факторинга. интервью с Э. Тиммермансом, генеральным секретарем международной факторинговой ассоциации International Factors Group. IFG. Е.Е. Смирнов, "Факторинг и торговое финансирование", № 3, III квартал 2008.

Образцы работ

Тема и предметТип и объем работы
Привлекательности труда в организации
Психология
Курсовая работа
35 стр.
Образ человека в позднем творчестве Филонова
Культурология
Диплом
84 стр.
Роль информации в гражданских правоотношениях
Гражданское право
Дипломный проект
84 стр.
Продвижение брендов в шоу-бизнесе
Электроснабжение городов и промышленных предприятий
Диплом
79 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Евгения
Лилия,огромное спасибо!Было приятно с вами иметь дело.С уважением,Евгения.