Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Dimitrios Baltazis. Dynamic Authorizations for Secure Internet Applications. – М.: LAP Lambert Academic Publishing, 2012. – 152 с.

Дополнительные результаты

  1. Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с.
  2. Robert G. Allen, Robert G. Allen. Multiple Streams of Internet Income. – М.: , 0. – 0 с.
  3. Charles Arthur. Digital Wars: Apple, Google, Microsoft and the Battle for the Internet. – М.: , 2012. – 272 с.
  4. The SAP Architectural Community. SAP Guidelines for Best-Built Applications that Integrate with SAP Business Suite: 2012Spring. – М.: , 2012. – 226 с.
  5. P.J.J. Welfens. The New Economy and Economic Growth in Europe and the Us (American and European Economic and Political Studies). – М.: , 0. – 0 с.
  6. Bjarne S. Jensen. The Dynamic Systems of Basic Economic Growth Models (Mathematics and Its Applications, Vol 302). – М.: , 0. – 0 с.
  7. Henry C., Jr. Lucas. Strategies for Electronic Commerce and the Internet. – М.: , 0. – 0 с.
  8. Lawrence K. Grossman, Newton N. Minow, TCF. Digital Gift to the Nation: Fulfilling the Promise of the Digital and Internet Age. – М.: , 0. – 0 с.
  9. Robert M. Ball, Thomas N. Bethell. Insuring the Essentials: Bob Ball on Social Security. – М.: , 0. – 0 с.
  10. Stanley W. Black, Mathias Moersch, American Institute for Contemporary German Studies. Competition and Convergence in Financial Markets. – М.: , 0. – 0 с.
  11. Larissa T. Moss, Shaku Atre. Business Intelligence Roadmap: The Complete Project Lifecycle for Decision-Support Applications. – М.: Addison-Wesley Professional, 2003. – 576 с.
  12. Cheng Hsu, Somendra Pant. Innovative Planning for Electronic Commerce and Enterprises - A Reference Model. – М.: , 0. – 0 с.
  13. B. T. Slader. The Internet Hero: Darc Fyber Is the Hero With the Knights of the Router Table. – М.: , 0. – 0 с.
  14. Henry C. Lucas, Henry, Jr. Lucas. Strategies for Electronic Commerce and the Internet. – М.: , 0. – 0 с.
  15. Stan Rapp, Chuck Martin. Max-E-Marketing in the Net Future: The Seven Imperatives for Outsmarting the Competition. – М.: , 0. – 0 с.
  16. Langdon Morris. The Knowledge Channel: Corporate Strategies for the Internet. – М.: , 0. – 0 с.
  17. Henry Chan, Raymond Lee, Tharam Dillon, Elizabeth Chang, Henry Chan, Raymond Lee, Tharam Dillon. Electronic Commerce: Fundamentals & Applications. – М.: , 0. – 0 с.
  18. Patrick W. Miller. Grant Writing: Strategies for Developing Winning Proposals (2nd Edition). – М.: , 0. – 0 с.
  19. Stephen Walther. ASP.NET Unleashed, Second Edition. – М.: , 0. – 0 с.
  20. Mostafa Hashem Sherif. Protocols for Secure Electronic Commerce, Second Edition. – М.: , 0. – 0 с.
  21. John R. Vacca. Public Key Infrastructure: Building Trusted Applications and Web Services. – М.: , 0. – 0 с.
  22. Payment Technologies for E-Commerce. – М.: , 2003. – 0 с.
  23. European Agreement Concerning the International Carriage of Dangerous Goods by Road: Restructured ADR - Applicable as from 1 January 2005. – М.: , 2004. – 0 с.
  24. Beyond the Basics: Research-Based Rules for Internet Retailing Advantage. – М.: , 2005. – 0 с.
  25. Bernard McGarvey, Bruce Hannon. Dynamic Modeling for Business Management: An Introduction (Modeling Dynamic Systems). – М.: Springer, 2004. – 314 с.
  26. Renewable Bioresources : Scope and Modification for Non-Food Applications. – М.: , 2004. – 0 с.
  27. Rickland Hollar. Enterprise Web Services Security (Internet Series). – М.: , 2005. – 432 с.
  28. Scott Watson. The Art of War for Security Managers: 10 Steps to Enhancing Organizational Effectiveness. – М.: , 2007. – 200 с.
  29. Betty E. Biringer, Rudolph V. Matalucci, Sharon L. O'Connor. Security Risk Assessment and Management: A Professional Practice Guide for Protecting Buildings and Infrastructures. – М.: , 2007. – 384 с.
  30. Advances in Dynamic Games: Applications to Economics, Finance, Optimization, and Stochastic Control (Annals of the International Society of Dynamic Games). – М.: , 2004. – 679 с.
  31. Network Security. – М.: , 2008. – 370 с.
  32. Andy Walker. Windows Lockdown!: Your XP and Vista Guide Against Hacks, Attacks, and Other Internet Mayhem (Absolute Beginner's Guide). – М.: , 2008. – 480 с.
  33. Carol Williams-Nickelson, Mitchell J. Prinstein, W. Gregory Keilin. Internships in Psychology: The APAGS Workbook for Writing Successful Applications and Finding the Right Fit. – М.: , 2008. – 148 с.
  34. Ibp Usa. Arab Authority for Agricultural Investment and Development (AAAID) Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  35. Ibp Usa. European System for Security and Cooperation Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  36. Peter Flaschel, Gangolf Groh, Christian Proano, Willi Semmler. Topics in Applied Macrodynamic Theory (Dynamic Modeling and Econometrics in Economics and Finance). – М.: , 2008. – 512 с.
  37. Gabor Pusztai. Managing Higher Education: Theory and Applications in Higher Education Reform. – М.: , 2008. – 84 с.
  38. The SAP Architectural Community. SAP® Guidelines for Best-Built Applications, Spring 2010. – М.: , 2010. – 132 с.
  39. Isaac Scott. How To Write A Cover Letter For A Job Application That Will Blow Their Mind. – М.: , 2010. – 34 с.
  40. Carl Roper. Risk Management for Security Professionals. – М.: , 2010. – 304 с.
  41. Carl Young. Metrics and Methods for Security Risk Management. – М.: , 2010. – 296 с.
  42. Matjaz B. Juric, Marcel Krizevnik. WS-BPEL 2.0 for SOA Composite Applications with Oracle SOA Suite 11g. – М.: Packt Publishing, 2010. – 616 с.
  43. Geospatial Services and Applications for the Internet. – М.: , 2008. – 179 с.
  44. Zach Shelby, Carsten Bormann. 6LoWPAN: The Wireless Embedded Internet. – М.: Wiley, 2009. – 248 с.
  45. M. S. Amer. Raman Spectroscopy for Soft Matter Applications. – М.: , 2009. – 302 с.
  46. Matthew Keefe. Flash® and PHP Bible. – М.: , 2008. – 508 с.
  47. Ajit Sadana. Binding and Dissociation Kinetics for Different Biosensor Applications Using Fractals. – М.: , 2010. – 384 с.
  48. H.S. Freeman. Colorants for Non-Textile Applications. – М.: , 2010. – 636 с.
  49. Jesus Mena. Investigative Data Mining for Security and Criminal Detection. – М.: , 2010. – 272 с.
  50. James C Foster. Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploitsand Tool Coding for Security Professionals. – М.: , 2010. – 700 с.
  51. Terrence V. Lillard. Digital Forensics for Network, Internet, and Cloud Computing. – М.: , 2010. – 368 с.
  52. Ajit Sadana. Fractal Binding and Dissociation Kinetics for Different Biosensor Applications. – М.: , 2010. – 650 с.
  53. Ahmad Ibrahim. Fuzzy Logic for Embedded Systems Applications. – М.: , 2010. – 312 с.
  54. Edward Insam. TCP/IP Embedded Internet Applications. – М.: , 2010. – 328 с.
  55. John Hoopes. Virtualization for Security. – М.: , 2010. – 384 с.
  56. J.J. Spivey. Fuel Reforming for Fuel Cell Applications. – М.: , 2010. – 450 с.
  57. Carol J. Walker. Horse Photography: The Dynamic Guide for Horse Lovers (Horses Ponies). – М.: , 2011. – 112 с.
  58. Eve Andersson. Software Engineering for Internet Applications. – М.: , 2006. – 376 с.
  59. Jeffrey Lewis. The Minimum Means of Reprisal – China?s Search for Security in the Nuclear Age. – М.: , 2007. – 200 с.
  60. Jerome Adda. Dynamic Economics – Quantitative Methods and Applications. – М.: , 2003. – 296 с.
  61. Jeffrey Lewis. The Minimum Means of Reprisal – China?s Search for Security in the Nuclear Age. – М.: , 2007. – 200 с.
  62. Stefan Norberg. Securing Windows NT/2000 Servers for the Internet. – М.: , 2000. – 216 с.
  63. Delaney. Wiley GAAP 00 for Windows – Interpretation & Application of Generally Accepted Accounting Principles Quick Start Card. – М.: , 2000. – 2 с.
  64. C Haber. Old Age & the Search for Security – An American Social History. – М.: , 1994. – 212 с.
  65. Mark S. Merkow. Building SET Applications for Secure Transactions. – М.: , 1998. – 416 с.
  66. Delaney. Wiley GAAP 99 for Windows – Interpretation & Application of Generally Accepted Accounting Principles Windows CD Network. – М.: , 1999. – 0 с.
  67. Delaney. Wiley GAAP 99 for Windows – Interpretation & Application of Generally Accepted Accounting Principles 1999 Windows Ntwk D3. – М.: , 1999. – 0 с.
  68. P Delaney. Wiley GAAP 98 for Windows: Interpretation & Application of Generally Accepted Accounting Standards for Windows Network Edition User?s Guide. – М.: , 1998. – 40 с.
  69. W Ruppel. Wiley GAAP for Governments 99 for Windows – Interpretation & Application of Generally Accepted Acct Prin 1999 Network CD. – М.: , 1999. – 0 с.
  70. B Epstein. Wiley IAS 98 for Windows – Interpretation & Application of International Accounting Standards Network. – М.: , 1999. – 40 с.
  71. David Rook. 10 Principles of Secure Web Application Development. – М.: , 2010. – 408 с.
  72. Epstein. Wiley IAS 2000 for Windows – Interpretation & Application of International Accounting Standards 2000 Ntwk Quick Start Card. – М.: , 2000. – 0 с.
  73. Professor Mario Cerrato. The Mathematics of Derivatives Securities with Applications in MATLAB. – М.: , 2011. – 512 с.
  74. LC Lee. Intellectual Property For the Internet. – М.: , 1997. – 336 с.
  75. Dana Moore. Professional Rich Internet Applications. – М.: , 2007. – 566 с.
  76. Microsoft. Application Architecture for .NET – Designing Applications and Services. – М.: , 2003. – 176 с.
  77. MICHAEL. Dynamic HTML For Dummies«, 2nd Edition. – М.: , 1999. – 432 с.
  78. UNKNOWN. iMac For Dummies Internet Value Pack. – М.: , 1999. – 0 с.
  79. Andrew J Nathan. The Great Wall & the Empty Fortress – China?s Search for Security (Paper). – М.: , 1998. – 288 с.
  80. MICHAEL. Dynamic Html For Dummies. – М.: , 1997. – 416 с.
  81. Daniel Minoli. BGP Interdomain Routing Technology for the Internet. – М.: , 1997. – 240 с.
  82. Christopher Wells. Securing Ajax Applications. – М.: , 2007. – 250 с.
  83. Margarita M Balmaceda. Independent Belarus – Domestic Determinants, Regional Dynamics & Implications for the West. – М.: , 2003. – 496 с.
  84. Jacob Palme. Internet Application Protocols. – М.: , 2003. – 640 с.
  85. PK SINHA. Sinha: ?microprocessors? For Engineers–interfacing For Real Time Applications (cloth). – М.: , 1987. – 870 с.
  86. Wolfgang Safran. Saudi Arabia – The Ceaseless Quest for Security. – М.: , 1985. – 592 с.
  87. Ruppel. Wiley GGAAP 99 for Windows – Interpretation & Application of Generally Accepted Accounting Principles State & Local Gvnmnts Network QS. – М.: , 1999. – 0 с.
  88. GALEN. PageMaker 6.5 For Dummies, Internet Edition. – М.: , 1997. – 408 с.
  89. Asp.Net 3.5: A Beginner'S Guide. – М.: , 2011. – 448 с.
  90. HTML5 For Dummies Quick Reference. – М.: , 2013. – 224 с.
  91. Zdziarski. Hacking and Securing iOS Applications. – М.: , 2012. –  с.
  92. Rupinder Singh and Sunpreet Singh. Some investigations for investment casting applications. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  93. Erika Bustos and Luis A. Godinez. New Materials for Advanced Electrochemical Applications. – М.: LAP Lambert Academic Publishing, 2011. – 60 с.
  94. Ahmad Shakibaeinia. A Mesh-Free Lagrangian Methods for Free Surface and Interfacial Flows. – М.: LAP Lambert Academic Publishing, 2011. – 180 с.
  95. Cliff Orori Mosiori. Thin Film Device Physics For Solar Cell Applications. – М.: LAP Lambert Academic Publishing, 2013. – 412 с.
  96. Vikramarajan Jambulingam. Frequency Control For Wind Mill Applications. – М.: LAP Lambert Academic Publishing, 2014. – 80 с.
  97. Ronan O'Driscoll. Internet Controlled Security Robot. – М.: LAP Lambert Academic Publishing, 2014. – 52 с.
  98. Aron Michael and Chee Yee Kwok. Novel Micro-bridge Actuator For Optical Switching Application. – М.: LAP Lambert Academic Publishing, 2011. – 304 с.
  99. Ganesh E. Patil and Gotan H. Jain. Thin films for solar cell applications. – М.: LAP Lambert Academic Publishing, 2011. – 112 с.
  100. Cimpoeru Andreea. Encoderless Vector Control of PMSG for Wind Turbine Applications. – М.: LAP Lambert Academic Publishing, 2011. – 84 с.
  101. Dr. Partha Sarathi Khuntia. Intelligent Control Strategies for Aircraft and Other Dynamic Sysems. – М.: LAP Lambert Academic Publishing, 2010. – 192 с.
  102. Amma Naningrum. Standardization Metadata Schema for Securing Interoperability. – М.: LAP Lambert Academic Publishing, 2012. – 112 с.
  103. Yishak Gecho and Abrham Shumbulo. The production Status and Roles of ‘Enset’ for Livelihood Security. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  104. Sachin Wandkar and Shailendra Mathur. Air Sleeve Boom for Greenhouse Pesticide Applications. – М.: LAP Lambert Academic Publishing, 2012. – 124 с.
  105. Harish Bhandari. Hafnium Oxide And Hafnium Silicate For High-k Application. – М.: LAP Lambert Academic Publishing, 2010. – 232 с.
  106. Nguyen Duc Hoa. Nanowire structures for gas sensors applications. – М.: LAP Lambert Academic Publishing, 2011. – 128 с.
  107. Shiva Balasubramanian. Polymer Composite Capacitors for Pulse Power Applications. – М.: LAP Lambert Academic Publishing, 2011. – 152 с.
  108. Chinthakuntla Ashok. CdS Nanoparticles and Thinfilms for Solar Cell Application. – М.: LAP Lambert Academic Publishing, 2013. – 124 с.
  109. Zulkefli Mansor. Cost Estimation for Web-Based Application. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  110. Apurva Shah and Ketan Kotecha. Dynamic Scheduling for Real-Time Systems. – М.: LAP Lambert Academic Publishing, 2012. – 124 с.
  111. Apurva Mohan. Attribute based Authorization Systems for Protected Health Information. – М.: LAP Lambert Academic Publishing, 2011. – 120 с.
  112. Prathap Jonnadula and Naga Mani Darajula. Secure Group Communication. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  113. Mohammed azharuddin Adhoni. Secure communication in p2p networks. – М.: LAP Lambert Academic Publishing, 2012. – 124 с.
  114. Niroj Kumar Pani and Dr. Ashok Kumar Turuk. A Hybrid Zone-Based Routing Protocol for Secure Communication in MANET. – М.: LAP Lambert Academic Publishing, 2010. – 92 с.
  115. Albert Wasef. Managing and Complementing PKI for Securing Vehicular Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2011. – 204 с.
  116. Nuno Lopes. An Adjustable QoS-aware Architecture for Mobile Internet. – М.: LAP Lambert Academic Publishing, 2012. – 236 с.
  117. Tarek S. Sobh. Effective and Extensive VPN for Securing Web Applications. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  118. Vitor Carvalho and Pedro Medeiros. Including Context in A Routing Algorithm for the Internet of Things. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  119. Mostafa Soliman. A Technology-Scalable Matrix Processor for Data Parallel Applications. – М.: LAP Lambert Academic Publishing, 2011. – 228 с.
  120. Dimitrios Baltazis. Dynamic Authorizations for Secure Internet Applications. – М.: LAP Lambert Academic Publishing, 2012. – 152 с.
  121. Britto R. Kumar and Albert S. Rabara. An Architecture for Secure Mobile Payment System using PKI. – М.: LAP Lambert Academic Publishing, 2013. – 184 с.
  122. Usman Habib. Secure Mobile Authentication for Linux Workstation log on. – М.: LAP Lambert Academic Publishing, 2011. – 120 с.
  123. D. Maheswari Maheshlenin and V. Radha. Compound Image Segmentation and Compression for Secure Transmission. – М.: LAP Lambert Academic Publishing, 2012. – 240 с.
  124. Pieter Jorissen. Dynamic Interactions for Networked Virtual Environments. – М.: LAP Lambert Academic Publishing, 2011. – 212 с.
  125. Udai Pratap Rao,Dhiren R. Patel and Vidhya Goutham Guntaka. SVD Based Database Watermarking for Security in Database. – М.: LAP Lambert Academic Publishing, 2011. – 56 с.
  126. Hammad Kazmi. Security and Privacy issues in Near Field Communication (NFC) Systems. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  127. Md. Hamidul Islam. Security Issues of Web Applications in Asp.Net Platform. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  128. Zhishun Wang and Qifei Lu. A Method for Analyzing Security of SOA-based Systems. – М.: LAP Lambert Academic Publishing, 2011. – 68 с.
  129. Hangwei Qian. Dynamic Resource Management for Cloud-hosted Internet Applications. – М.: LAP Lambert Academic Publishing, 2012. – 132 с.
  130. Hassen Alsafi and Mohammed Azhruddin. The Security Issues for Smart Grids Applications on Cloud Computing. – М.: LAP Lambert Academic Publishing, 2013. – 60 с.
  131. Thyagaraju G.S. Gowda. A Novel Approach To Model user Context for Context Aware Applications. – М.: LAP Lambert Academic Publishing, 2012. – 204 с.
  132. Rafal AL-Khashab. An Authentication Model for Cloud Computing Application. – М.: LAP Lambert Academic Publishing, 2014. – 104 с.
  133. Lukas Pavilanskas. Wireless MAC for Real Time Applications. – М.: LAP Lambert Academic Publishing, 2009. – 156 с.
  134. Ferdin Joe John Joseph. Iterated Training Algorithm for Surveillance Video Applications. – М.: LAP Lambert Academic Publishing, 2011. – 84 с.
  135. Burcu Kulahc?oglu. Timed Automata as a Verification Tool for Security Protocols. – М.: LAP Lambert Academic Publishing, 2011. – 104 с.
  136. Sachin Tripathi and Gosta Pada Biswas. Enhancements on Internet Applications. – М.: LAP Lambert Academic Publishing, 2011. – 148 с.
  137. Martin Striz. Platform for Rich Internet Applications Development. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  138. Benny Benyamin Nasution,Asad I. Khan and Bala S. Srinivasan. Internet Security Control System. – М.: LAP Lambert Academic Publishing, 2010. – 256 с.
  139. Haneen Qarabash. An Intranet Based System For Securities Trading. – М.: LAP Lambert Academic Publishing, 2013. – 84 с.
  140. Darien Pritchard. Dynamic Bodyuse for Effective, Strain-Free Massage. – М.: , 2015. – 640 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Internet: очевидное и невероятное. Выпуск 5, март 2001.
  2. INTERNET: торговля ценными бумагами. А. Шачин, "Финансовая газета", № 1, январь 2001.
  3. Мы можем управлять собственными мыслями. интервью с С. Харитоновым, врачом-психотерапевтом, психиатором, кандидатом медицинских наук, старшим научным сотрудником Московского НИИ психиатрии Росздрава РФ, членом-корреспондентом Международной академии наук. МАНЭБ, членом Британского общества когнитивных и поведенческих психотерапевтов. Membership British Association for Behavioural & Cognitive Psychoterapies / BABCP. Ф. Кульпин, "Управление персоналом", N 8, апрель 2011 г.
  4. Зачетная реструктуризация долга: институт DEBT-FOR-EQUITY SWAP в России". интервью с М. Григорьевым, старшим юристом корпоративной практики юридической фирмы "Вегас-Лекс". О. Бодрягина, "эж-ЮРИСТ", № 3, январь 2010.
  5. Управление проектами при подборе персонала. PM for HR. Е. Кривов, "Кадровик. Рекрутинг для кадровика", № 9, сентябрь 2008.
  6. Опыт реализации МСФО на базе Microsoft Dynamics AX. Н. Овчаренко, "Финансовая газета", № 9, февраль 2008.

Образцы работ

Тема и предметТип и объем работы
Особенности виртуального общения
Психология
Курсовая работа
28 стр.
Последствия операции НАТО
Политология
Диплом
80 стр.
Пластиковые карточки
Финансы и кредит
Диплом
142 стр.
Платежные системы в Интернете
Информатика
Диплом
102 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Татьяна (Москва)
Задания прошли на отлично!!! Спасибо большое. Пишите сколько перечислять. Ирина, у Вас так ловко получается, может быть сможете ещё пять заданий выполнить. Пожалуйста.