Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Shilpa Jaiswal. Elimination of Security Threats Using Trusted Proactive Routing. – М.: LAP Lambert Academic Publishing, 2014. – 56 с. Дополнительные результаты Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с. Harrison Snow. The Power of Team Building: Using Rope Techniques. – М.: Pfeiffer, 1992. – 216 с. Patricia A. Davis. The Art of Economic Persuasion: Positive Incentives and German Economic Diplomacy. – М.: University of Michigan Press, 2000. – 216 с. Henry L. Diamond, Patrick F. Noonan, Lincoln Institute of Land Policy. Land Use in America. – М.: , 0. – 0 с. William Rini. Mathematics of the Securities Industry. – М.: , 0. – 0 с. Donald Bruce Keim, William T. Ziemba. Security Market Imperfections in World Wide Equity Markets (Publications of the Newton Institute , No 9). – М.: , 0. – 0 с. Barrie A. Wigmore. The Crash and Its Aftermath : A History of Securities Markets in the United States, 1929-1933 (Contributions in Economics and Economic History). – М.: , 0. – 0 с. L. Jean Camp. Trust and Risk in Internet Commerce. – М.: , 0. – 0 с. Seymour Bosworth, Michel E. Kabay. Computer Security Handbook. – М.: , 0. – 0 с. Steve Purser. A Practical Guide to Managing Information Security (Artech House Technology Management Library). – М.: , 0. – 0 с. Encyclopedia of Security Management : Techniques and technology. – М.: , 0. – 0 с. James A. Rosenthal, Juan M. Ocampo. Securitization of Credit: Inside the New Technology of Finance. – М.: , 0. – 0 с. Geoff Der, Brian S. Everitt. Handbook of Statistical Analyses Using SAS, Second Edition. – М.: , 0. – 0 с. Economics of Information Security (Advances in Information Security). – М.: , 2004. – 0 с. Ronald L. Mendell. The Quiet Threat: Fighting Industrial Espionage in America. – М.: , 2003. – 0 с. Convention on the Elimination of All Forms of Discrimination Against Women and Its Optional Protocol. – М.: , 2003. – 0 с. Rickland Hollar. Enterprise Web Services Security (Internet Series). – М.: , 2005. – 432 с. Ira Winkler. Zen and the Art of Information Security. – М.: , 2007. – 192 с. Environmental Security and Public Safety (NATO Security through Science Series / NATO Security through Science Series C: Environmental Security). – М.: , 2007. – 200 с. Committee on Federal Regulation of Securities Committee. The Fund Director's Guidebook: Third Edition (Fund Director's Guidebook). – М.: , 2006. – 128 с. Frank J. Fabozzi, Steven V. Mann. Securities Finance: Securities Lending and Repurchase Agreements (Frank J. Fabozzi Series). – М.: , 2005. – 351 с. Jeffrey M. Stanton, Kathryn R. Stam. The Visible Employee: Using Workplace Monitoring and Surveillance to Protect Information Assets-Without Compromising Employee Privacy or Trust. – М.: , 2006. – 272 с. John G. Miller. Flipping the Switch...: Unleash the Power of Personal Accountability Using the QBQ!. – М.: , 2005. – 144 с. John J. Fay. Encyclopedia of Security Management. – М.: Butterworth-Heinemann, 2007. – 688 с. Roy H. Campbell, Prasad G. Naldurg. Security and Survivability: Analyzing, Modeling, and Verifying Dynamic Recovery in Insecure Systems. – М.: , 2008. – 240 с. Dick Morris, Eileen Mcgann. Fleeced: How Barack Obama, Media Mockery of Terrorist Threats, Liberals Who Want to Kill Talk Radio, the Do-Nothing Congress, Companies That Help Iran, and Washington Lobbyists for Foreign Governments Are Scamming Us ... and What to Do About It. – М.: , 2008. – 352 с. Prospectus for the Public Offering of Securities in Europe: Volume 1: European and National Legislation in the Member States of the European Economic Area (Law Practitioner Series). – М.: , 2008. – 514 с. Max Isaacman. Investing with Intelligent ETFs: Strategies for Profiting from the New Breed of Securities (McGraw-Hill Finance & Investing). – М.: , 2008. – 256 с. Jim Stickley. The Truth About Identity Theft (Truth About). – М.: , 2008. – 208 с. Social and Human Elements of Information Security: Emerging Trends and Countermeasures (Premier Reference Source). – М.: , 2008. – 412 с. Gerard Blokdijk, Ivanka Menken. Information Security Management Best Practice Workbook: Implementation and Management Roadmap for Threats, Challenges and Solutions - Ready to use supporting documents bringing Theory into Practice. – М.: , 2008. – 124 с. Ivanka Menken. Virtualization Architecture, Adoption and Monetization of Virtualization Projects using Best Practice Service Strategy, Service Design, Service Transition, ... and Continual Service Improvement Processes. – М.: , 2008. – 164 с. Brett Wilder. The Quiet Millionaire: Eliminate Financial Stress and Accumulate Wealth for a Lifetime of Security and Independence. – М.: , 2009. – 438 с. Marc Hoffman. Harnessing the Power of the Charitable Remainder Trust - 8th. – М.: , 2010. – 348 с. Council of Europe. Asylum and the European Convention on Human Rights (Human Rights Files No. 9) (2010). – М.: , 2010. – 283 с. Patrick S. Collins. Regulation of Securities, Markets, and Transactions. – М.: , 2011. – 448 с. David Naftz. Handbook of Groundwater Remediation using Permeable Reactive Barriers. – М.: , 2010. – 544 с. Russ Rogers. Network Security Evaluation Using the NSA IEM. – М.: , 2010. – 450 с. Suzanne Keene. Fragments of the World: Uses of Museum Collections. – М.: , 2010. – 208 с. Pamela A. Collins. Principles of Security and Crime Prevention. – М.: , 2010. – 490 с. Imtiaz Ahmed. Use of Waste Materials Used in Highway Construction. – М.: , 2010. – 125 с. Paul Robinson. Dictionary of International Security. – М.: , 2007. – 208 с. Robert Legvold. Swords and Sustenance – The Economics of Security in Belarus and Ukraine. – М.: , 2004. – 256 с. Keeley. Experimental Determination of Stone Tool Uses (Paper Only). – М.: , 1980. – 320 с. Dan Lindley. Promoting Peace with Information – Transparency as a Tool of Security Regimes. – М.: , 2007. – 304 с. Robert Legvold. Swords and Sustenance – The Economics of Security in Belarus and Ukraine. – М.: , 2004. – 256 с. AS KRAMER. Kramer: Taxation Of ?securities? Commodities & Opt Ions1989 Cumulative ?supplement? (pr Only). – М.: , 1989. – 396 с. JH HALPERIN. Halperin Private Placement Of ?securities 1985 Supplement?. – М.: , 1985. – 50 с. JH HALPERIN. Halperin Private Placement Of ?securities?. – М.: , 1984. – 350 с. AS KRAMER. Kramer: Taxation Of ?securities? Commodities & Opt Ions?1987 Cumulative Supp No.2? (pr Only). – М.: , 1987. – 338 с. John Viega. The Myths of Security. – М.: , 2009. – 260 с. F Blakey. The Florida Phosphate Industry a History of the Development & use of Vital Mineral. – М.: , 1974. – 190 с. David Rook. 10 Principles of Secure Web Application Development. – М.: , 2010. – 408 с. Microsoft. Improving Web Application Security – Threats and Countermeasures. – М.: , 2003. – 960 с. Mitch Tulloch. Microsoft Encyclopedia of Security. – М.: , 2003. – 480 с. Vl Smith. Investment & Production – A Study in the Theory of the Capital–Using Enterprise. – М.: , 1974. – 352 с. J Hermes. Reading Women?s Magazines: An Analysis of Everyday Media Use. – М.: , 1995. – 0 с. AS KRAMER. Kramer: Taxation Of ?securities? Commodities & Opt Ions. – М.: , 1986. – 896 с. J HALPERIN. Halperin: Private Placement Of ?securities? 1988 Cumulative Supplement (pr Only). – М.: , 1988. – 82 с. Bender. East Europe in Search of Security. – М.: , 1972. – 0 с. Bender. East Europe in Search of Security. – М.: , 1972. – 0 с. Hacking Exposed Web 2.0: Web 2.0 Security Secrets And Solutions. – М.: , 2011. – 258 с. Perfect Phrases For Building Strong Teams: Hundreds Of Ready-To-Use Phrases For Fostering Collaboration, Encouraging Communication, And Growing A Winning Team. – М.: , 2011. – 176 с. Perfect Phrases For Writing Company Announcements: Hundreds Of Ready-To-Use Phrases For Powerful Internal And External Communications. – М.: , 2011. – 224 с. Perfect Phrases For Sales Presentations: Hundreds Of Ready-To-Use Phrases For Delivering Powerful Presentations That Close Every Sale. – М.: , 2011. – 208 с. Security Information And Event Management (Siem) Implementation. – М.: , 2011. – 464 с. Perfect Phrases For Conflict Resolution: Hundreds Of Ready-To-Use Phrases For Encouraging A More Productive And Efficient Work Environment. – М.: , 2011. – 176 с. Perfect Phrases For Leadership Development: Hundreds Of Ready-To-Use Phrases For Guiding Employees To Reach The Next Level. – М.: , 2011. – 192 с. Fundamentals Of Network Security. – М.: , 2011. – 672 с. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . – с. Eduardo Fernandez-Buglioni. Security Patterns in Practice: Designing Secure Architectures Using Software Patterns. – М.: Wiley, 2013. – 582 с. Ahmed Mohamad Abed Al-janaby. Modeling and Simulation of Photovoltaic Module using Matlab Simulink. – М.: LAP Lambert Academic Publishing, 2015. – 156 с. Abhishek Roy,Sunil Karforma and Subhadeep Banik. Implementation Of Authentication In E-Governance–an Uml Based Approach. – М.: LAP Lambert Academic Publishing, 2013. – 116 с. Varun Barthwal,Jaydeep Kishore and Bhagawati Prasad Joshi. Estimation of Software Metrics using Function Point Analysis. – М.: LAP Lambert Academic Publishing, 2013. – 84 с. V. Siva Brahmaiah Rama,Deepak Sharma and Sheetal Joshi. Elimination of harmonics using power electronics equipments. – М.: LAP Lambert Academic Publishing, 2012. – 56 с. Shaek Rana Mohammad Baki Billah and Mohammad Hafizur Rahman. Design & Development of Network Security System using IP Tables. – М.: LAP Lambert Academic Publishing, 2013. – 164 с. Rapudo Onyango. Impact of Adoption and Use of Mobile Phone Technology. – М.: LAP Lambert Academic Publishing, 2014. – 108 с. Nitin Kanzariya and Ashish Nimavat. Security of Digital Image Using Hybrid Steganography. – М.: LAP Lambert Academic Publishing, 2013. – 84 с. Samundiswary Punniakodi and Dananjayan Perumal. Trust Based Routing Protocols for Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2015. – 120 с. Tasnuva Ahmed,Rabiul Hossain and Dipesh Barua. Security System Using Ultrasound. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. JAYACHANDRA PRASAD TALARI,Dr.G.Rama Chandra Reddy and Dr.K.Satya Prasad. PROCESSING OF COMPLEX SIGNALS USING RELATION FUNCTION. – М.: LAP Lambert Academic Publishing, 2010. – 84 с. Sarat Kumar Sahoo. Speed Control of Induction Motor Using Microcontroller. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Soumya Shatakshi Panda and Alisha Mahapatro. A Custom Digital Implementation of IC SN74LS682 using CADENCE Tools. – М.: LAP Lambert Academic Publishing, 2013. – 108 с. Ida Ayu Dwi Giriantari. Condition Monitoring of Composite Insulator using PD Analysis. – М.: LAP Lambert Academic Publishing, 2010. – 216 с. A. C. Suthar,D. D. Shah and G. R. Kulkarni. Implementation of Secured Color Image Authentication and Protection. – М.: LAP Lambert Academic Publishing, 2011. – 92 с. Constantinos Votis. Experimental Consideration of Channel Capacity Using MIMO Technology. – М.: LAP Lambert Academic Publishing, 2013. – 280 с. Anupam Kumar,Vijay Kumar and Manoj Kumar Panda. Tracking Performance Of Maglev System Using Type-2 Fuzzy Logic Control. – М.: LAP Lambert Academic Publishing, 2012. – 84 с. Simant Srivastava. ANALYSIS OF THICK PLATE USING FINITE ELEMENT METHOD. – М.: LAP Lambert Academic Publishing, 2010. – 68 с. Saima Afzal. Non-Traditional Security Threats to Pakistan Post 9/11. – М.: LAP Lambert Academic Publishing, 2012. – 104 с. Yuliya Lyamzina. Hidden and Indirect Effects of War and Political Violence. – М.: LAP Lambert Academic Publishing, 2014. – 104 с. Mohammed Azmathullah,Asrar Sheriff and Sultan Mohideen. Biocontrol of Mosquito Larvae using Calotropis procera. – М.: LAP Lambert Academic Publishing, 2013. – 72 с. Mrutunjaya Bhuyan. Properties of finite nuclei using effective interaction. – М.: LAP Lambert Academic Publishing, 2014. – 156 с. Anshita Purohit,Pradeep Verma and Naimesh Patel. Analysis of genetic diversity of Castor cultivars using RAPD. – М.: LAP Lambert Academic Publishing, 2012. – 96 с. Narayan Babu Dhital. Evaluating protected area network of Nepal by using GIS. – М.: LAP Lambert Academic Publishing, 2013. – 64 с. Muhammad Yaseen. HDS Of Fuel Oils Using InSitu Hydrogen Generated Via Alcohol Reforming. – М.: LAP Lambert Academic Publishing, 2014. – 156 с. Yakubu Azeh and Gabriel Ademola Olatunji. Acetylation Of Wood Cellulose Using Ketene. – М.: LAP Lambert Academic Publishing, 2013. – 120 с. Elaheh Kowsari and Issa Yavari. Green chemistry-A new paradigm of organic synthesis using ILs. – М.: LAP Lambert Academic Publishing, 2011. – 128 с. Tommy Dalgaard. Simulation and Generalisation of Agricultural Resource Use. – М.: LAP Lambert Academic Publishing, 2010. – 192 с. Arshad Amin and Arif Amin. Study of Urban Land Use Dynamics (A Geospatial Approach). – М.: LAP Lambert Academic Publishing, 2013. – 68 с. S. Balachandar,G. Usharani and G. Kalaivani. Land Use, Land Cover Mapping of ‘H’ and ‘J’ Blocks of FC&RI using GIS. – М.: LAP Lambert Academic Publishing, 2014. – 56 с. Evangelin Hema Mariya,Dhivya Rajasankaran and Aswini Ramaswamy. Trusted Data Forwarding using POR in Manet. – М.: LAP Lambert Academic Publishing, 2013. – 72 с. Nazia Akbar,Habib Ahmad and Imtiaz Ahmad. Genetic Characterization Of Capsicum Germplasm Using Molecular Markers. – М.: LAP Lambert Academic Publishing, 2014. – 112 с. Unaza Saqib,Hiba Saqib and Humaira Tariq. Biosorption of Chromium (VI) using Plant Biomass. – М.: LAP Lambert Academic Publishing, 2012. – 128 с. Xun Liu. Assessment of New Energy Use Policy in Land Use Planning. – М.: LAP Lambert Academic Publishing, 2012. – 92 с. Imran Ali Sandano. Separatist Movement of Balochistan. – М.: LAP Lambert Academic Publishing, 2014. – 128 с. MURTAZA IQBAL. The Real Counterinsurgency, Winning Hearts and Repairing Minds. – М.: LAP Lambert Academic Publishing, 2011. – 160 с. Jerrin Yomas. SSL based implementation of RFC2289 with dual factor token using GSM. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Ayyaswamy Kathirvel,Srinivasan Rengaramanujam and Mohanambal Kathirvel. Prevention of attacks usign umpiring security model for manets. – М.: LAP Lambert Academic Publishing, 2012. – 192 с. Jignesh Patel and Arjun Dhami. Evaluation of Quality and Fertility of Bovine Semen using CASA. – М.: LAP Lambert Academic Publishing, 2014. – 156 с. Benito Mng'ong'o,Estomih Massawe and David Henwood. Mathematical modelling of a beam using finite element method. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Emil Setic. Tax implications of transfer pricing use: Transfer pricing regulation in the world, European union and Republic Croatia. – М.: LAP Lambert Academic Publishing, 2014. – 214 с. Marina Agaltsova. Elimination of Child Labor:. – М.: LAP Lambert Academic Publishing, 2010. – 100 с. Munyabarenzi Faustin. The incidence of security interest in movable property. – М.: LAP Lambert Academic Publishing, 2013. – 84 с. Yury Nizovtsev,Artemiy Nisovtsev and Vladimir Nisovtsev. New approach to the Elimination of near-surface Inflammations. – М.: LAP Lambert Academic Publishing, 2014. – 56 с. Ataklti Tesfay. The Practice of Teachers in Using Short story to teach Reading Skills. – М.: LAP Lambert Academic Publishing, 2014. – 72 с. Nooruldeen Qader and Loay George. Design and Implement a Secure Database Using Multi Level Security. – М.: LAP Lambert Academic Publishing, 2014. – 124 с. Rayala Upendar Rao and K. Palanivel. Secure Routing In Cluster Based Wireless Sensor Network By Using ECC. – М.: LAP Lambert Academic Publishing, 2012. – 96 с. Abbas Mehdizadeh Zare Anari and Ayyoub Akbari Moghanjoughi. Route optimization security in mobile IPv6 networks. – М.: LAP Lambert Academic Publishing, 2012. – 116 с. Ramandeep Kaur. Packet dropping attack in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2014. – 52 с. P. Ganesh Kumar and S. Ramesh. Secure Routing Protocol for ICMN. – М.: LAP Lambert Academic Publishing, 2014. – 64 с. Mohammad AlAhmad. Security threats of finger print biometric in network system. – М.: LAP Lambert Academic Publishing, 2014. – 88 с. Shilpa Jaiswal. Elimination of Security Threats Using Trusted Proactive Routing. – М.: LAP Lambert Academic Publishing, 2014. – 56 с. Shilpa Jaiswal and Sumeet Agrawal. Detection of Network Worm to Eliminate Security Threats in MANET. – М.: LAP Lambert Academic Publishing, 2012. – 52 с. Christian Chetachi Umunna. Distributed Intrusion Detection System in Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 104 с. Gergely Acs. Secure Routing in Multi-hop Wireless Networks. – М.: LAP Lambert Academic Publishing, 2010. – 116 с. Nitin Goel. EPSAR: An Efficient Power Saving Adaptive Routing Protocol for MANETs. – М.: LAP Lambert Academic Publishing, 2012. – 124 с. E. Madhusudhana Reddy. Development of Secure Protocols for MHIS Using RMPJK–RSA Cryptosystem. – М.: LAP Lambert Academic Publishing, 2011. – 204 с. Gunasekar Kumar and Anirudh Chelikani. Analysis of Security Issues in Cloud Based E-Learning. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Abdulwahab Lawan and Kabiru Jinjiri Ringim. On the Unified Theory of Acceptance and Use of Technology. – М.: LAP Lambert Academic Publishing, 2012. – 228 с. Rajendra Purohit. Performance Evolution of IP SAN using Mirroring. – М.: LAP Lambert Academic Publishing, 2012. – 68 с. Keijo Haataja. Security Threats and Countermeasures in Bluetooth-Enabled Systems. – М.: LAP Lambert Academic Publishing, 2009. – 188 с. Noor Ul Amin. Secure MANET Communication Based on Hybrid Cryptosystem. – М.: LAP Lambert Academic Publishing, 2013. – 64 с. Eric Amankwa. Assessment of Security Controls. – М.: LAP Lambert Academic Publishing, 2012. – 104 с. Marco Balduzzi. Automated Measurements of Novel Internet Threats. – М.: LAP Lambert Academic Publishing, 2013. – 120 с. Haneen Qarabash. An Intranet Based System For Securities Trading. – М.: LAP Lambert Academic Publishing, 2013. – 84 с. Waqar Akram and ZAKIR HUSSAIN. Constraint’s Analysis of Agricultural Credit Use in Pakistan. – М.: LAP Lambert Academic Publishing, 2011. – 92 с. Stephane Rouhier. Environmental impact of rising energy use in China. – М.: LAP Lambert Academic Publishing, 2011. – 380 с. Jan Fuka. Management of Crisis Situations in Company Using Game Theory. – М.: Scholars' Press, 2014. – 52 с. Tirfu Hedeto. Determinants of Inorganic Fertilizers Use. – М.: LAP Lambert Academic Publishing, 2013. – 88 с. Лучшие результаты Ничего не найдено Дополнительные результаты Наука человековедения. интервью с Д. Уолтоном, профессором London Metropolitan University, экспертом CIPD. Chartered Institute of Personnel and Development, автором программы Master of Arts in Human Resource Strategies. И. Смирнова, "Кадровый менеджмент", № 5, июль-август 2007. Партнерство вместо подчинения. интервью с Дезо Хорватом, деканом Schulich School of Business. Р. Крецул, "Кадровый менеджмент", № 1, февраль 2006. Медицинская информатика в Web of Science: доля России в мировом публикационном потоке. Н.Г. Куракова, Л.А. Цветкова, "Врач и информационные технологии", № 4, июль-август 2012. Back side of the moon, или темная сторона поведения персонала. интервью с Н. Русаковой, директором по персоналу ОАО "Хлебпром", А. Сукачёвым, директором "Торговой компании АС", Н. Харитоновой, руководителем службы персонала тверской компании ЗАО "ДКС". А. Колесникова, Т. Тюрина, С. Машарипов, "Управление персоналом", N 16, август 2010 г. Использование Bill of Exchange в аккредитивной форме расчетов. Н.В. Букина, "Международные банковские операции", № 6, ноябрь-декабрь 2009. Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Полина Доброе утро, Лилия! С радостью хотела сообщить, что диплом после вашего сопровождения успешно сдан и защищен на отлично. Спасибо!