Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Ankit Panch. Enterprise Secure Wireless Authentication (ESWA). – М.: LAP Lambert Academic Publishing, 2013. – 72 с. Дополнительные результаты Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с. Wireless Communications and Applications: First International Conference, ICWCA 2011, Sanya, China, August 1-3, 2011, Revised Selected Papers (Lecture ... and Telecommunications Engineering). – М.: , 2012. – 468 с. Security and Privacy in Mobile Information and Communication Systems: Third International ICST Conference, MOBISEC 2011, Aalborg, Denmark, May 17-19, ... and Telecommunications Engineering). – М.: , 2012. – 195 с. Public Key Infrastructures, Services and Applications: 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected ... Computer Science / Security and Cryptology). – М.: , 2012. – 219 с. Securities Compliance Index. Securities Compliance Index, Second Edition: A Topical Guide To U.S. Securities Regulation. – М.: , 2012. – 512 с. Kevin A. Hassett, R. Glenn Hubbard, American Enterprise Institute for Public Policy Research. Transition Costs of Fundamental Tax Reform. – М.: , 0. – 0 с. Jaclyn Easton. Going Wireless: Transform Your Business with Mobile Technology. – М.: , 0. – 0 с. Ron Bernstein, David Binns, Marshal Hyman, Martin Staubus, Foundation for Enterprise Development, Marshal Hyman. The Entrepreneur's Guide to Equity Compensation. – М.: , 0. – 0 с. Mark V. Pauly, Bradley Herring, American Enterprise Institute for Public Policy Research. Cutting Taxes for Insuring: Options and Effects of Tax Credits for Health Insurance (Aei Studies on Tax Reform). – М.: , 0. – 0 с. Peter J. Wallison, American Enterprise Institute for Public Policy Research. Serving Two Masters, Yet Out of Control: Fannie Mae and Freddie Mac. – М.: , 0. – 0 с. Julia Lowell, C. R. Neu, Daochi Tong, National Defense Research Institute, National Security Research Institute. Financial Crises and Contagion in Emerging Market Countries. – М.: , 0. – 0 с. Donald E. Weeden. Weeden & Co.: The New York Stock Exchange and the Struggle Over a National Securities Market. – М.: , 0. – 0 с. George S Faigen, Boris Fridman, Arielle Emmett. Wireless Data for the Enterprise. – М.: , 0. – 0 с. Ifip Tc5 Wg5.3, Prodnet Working Conference on Virtual Enterprises 2003, Hamideh Afsarmanesh. Processes and Foundations for Virtual Organizations (International Federation for Information Processing). – М.: , 0. – 0 с. Ifip Tc5, Wg5.12 International Conference on Enterprise Integration and, ?Kurt Kosanke, K. Kosanke, Kurt Kosanke. Enterprise Inter- And Intra-Organizational Integration: Building International Consensus (International Federation for Information Processing). – М.: , 0. – 0 с. Marko Nordquist. Towards Improved Security Management Practice: Designing an Organizational Model Procedure for the Implementation of Information Security Management in Heterogeneous Information Management. – М.: , 0. – 0 с. Steve Purser. A Practical Guide to Managing Information Security (Artech House Technology Management Library). – М.: , 0. – 0 с. Joseph S. Nye, William A. Owens, James R. Schlesinger, R. James Woolsey, James A. Lewis, Joseph S., Jr. Nye, James Andrew Lewis, Erin Schlather, Csis Commission on Technology Security in the Twenty-First Century. Computer Exports and National Security: New Tools for a New Century : A Report of the Csis Commission on Technology Security in the 21St-Century (Csis Panel Reports.). – М.: , 0. – 0 с. John Roland, Mark J. Newcomb. CCSP Cisco Secure VPN Exam Certification Guide (CCSP Self-Study). – М.: , 0. – 0 с. Jothy Rosenberg and David Remy. Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption. – М.: Sams, 2004. – 380 с. Juanita Ellis, Tim Speed. The Internet Security Guidebook: From Planning to Deployment. – М.: , 0. – 0 с. Charles Carrington, Timothy Speed, Juanita Ellis, Steffano Korper. Enterprise Directory and Security Implementation Guide: Designing and Implementing Directories in Your Organization (The Korper and Ellis E-Commerce Books Series). – М.: , 0. – 0 с. Adam Kornak, John Distefano, Adam Kornak. Cap Gemini Ernst & Young Guide to Wireless Enterprise Application Architecture. – М.: , 0. – 0 с. Gunjan Samtani, Marcus Healey, Shyam Samtani. B2B Integration: A Practical Guide to Collaborative E-Commerce. – М.: , 0. – 0 с. Bob Emmerson, David Greetham. Computer Telephony and Wireless Technologies: Future Directions in Communications. – М.: , 0. – 0 с. Vesna Hassler. Security Fundamentals for E-Commerce (Artech House Computer Security Series). – М.: , 0. – 0 с. Charles Cresson Wood. Best Practices In Internet Commerce Security. – М.: , 0. – 0 с. William Wheeler. Integrating Wireless Technology in the Enterprise : PDAs, Blackberries, and Mobile Devices. – М.: , 0. – 0 с. Dermot McCormack. 10 Technologies Every Executive Should Know. – М.: , 2004. – 0 с. Economic Security For A Better World (International Labor Office). – М.: Brookings Institution Press, 2004. – 450 с. Kari A. Russ. Wireless Leadership Strategies: Industry Insiders on Cutting Costs and Growing Profits while Staying Customer-Focused. – М.: , 2005. – 0 с. Geoffrey Elliott. Mobile Commerce and Wireless Computing Systems. – М.: , 2003. – 0 с. Advances in Security and Payment Methods for Mobile Commerce. – М.: , 2004. – 0 с. Asia Unplugged: The Wireless and Mobile Media Boom in the Asia-Pacific (Asia-Pacific Internet Handbook) (Asia-Pacific Internet Handbook). – М.: , 2005. – 0 с. Christopher Eiben. It Pays to be Paranoid : Securing Business Success by Preparing for the Worst. – М.: , 2004. – 0 с. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с. Rickland Hollar. Enterprise Web Services Security (Internet Series). – М.: , 2005. – 432 с. Ron Ben Natan. Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase. – М.: , 2005. – 432 с. Jim Stewart. SAP Security: SAP Security Essentials. – М.: Equity Press, 2005. – 136 с. Yossi Sheffi. The Resilient Enterprise: Overcoming Vulnerability for Competitive Advantage. – М.: The MIT Press, 2007. – 352 с. Paul Piccard, Jeremy Faircloth. Combating Spyware in the Enterprise. – М.: , 2006. – 386 с. Committee on Federal Regulation of Securities Committee. The Fund Director's Guidebook: Third Edition (Fund Director's Guidebook). – М.: , 2006. – 128 с. Tourism, Security and Safety: From Theory to Practice (The Management of Hospitality and Tourism Enterprises). – М.: , 2005. – 376 с. Ernst & Young LLP, Jan Babiak, John Butters, Mark W. Doll. Defending the Digital Frontier: Practical Security for Management, 2nd Edition. – М.: , 2004. – 253 с. James Buchan. The Authentic Adam Smith: His Life and Ideas (Enterprise) (Enterprise). – М.: , 2006. – 256 с. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с. Fred A. Cummins. Building the Agile Enterprise: With SOA, BPM and MBM (The MK/OMG Press). – М.: , 2008. – 336 с. Roy H. Campbell, Prasad G. Naldurg. Security and Survivability: Analyzing, Modeling, and Verifying Dynamic Recovery in Insecure Systems. – М.: , 2008. – 240 с. Eric A. Marks. Service-Oriented Architecture (SOA) Governance for the Services Driven Enterprise. – М.: , 2008. – 330 с. Aaron Newman, Jeremy Thomas. ENTERPRISE 2.0 IMPLEMENTATION. – М.: , 2008. – 406 с. Meridian Securities Market. World Stock Exchange Fact Book. – М.: , 2008. – 0 с. Trust, Privacy and Security in Digital Business: 5th International Conference, TrustBus 2008 Turin, Italy, September 1-5, 2008, Proceedings (Lecture Notes in Computer Science). – М.: , 2008. – 205 с. Daniel Clark. Network Access Control 100 Success Secrets - 100 Most Asked NAC Questions on Implementation and Deployment of unify endpoint security technology, user ... and network security enforcement. – М.: , 2008. – 180 с. CompTIA Security+: Certification Kit (комплект из 3 книг + 2 CD-ROM). – М.: Sybex, 2009. – 1440 с. Hamid R. Nemati. Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues (Advances in Information Security and Privacy). – М.: , 2009. – 414 с. LASTSocial Enterprise Alliance. Succeeding at Social Enterprise: Hard-Won Lessons for Nonprofits and Social Entrepreneurs. – М.: , 2010. – 304 с. William P Crowell. Physical and Logical Security Convergence: Powered By Enterprise Security Management. – М.: , 2010. – 592 с. Michael Erbschloe. Implementing Homeland Security for Enterprise IT. – М.: , 2010. – 299 с. Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards and Applications (Wireless Networks and Mobile Communications). – М.: , 2008. – 424 с. Zach Shelby, Carsten Bormann. 6LoWPAN: The Wireless Embedded Internet. – М.: Wiley, 2009. – 248 с. Waltenegus Dargie. Fundamentals of Wireless Sensor Networks. – М.: , 2010. – 336 с. Tariq Azad. Securing Citrix XenApp Server in the Enterprise. – М.: , 2010. – 528 с. Joe Levy. SonicWALL Secure Wireless Networks Integrated Solutions Guide. – М.: , 2010. – 512 с. Joey Hirao, Mimi Choi, Perry Cox, Steven Passer, Jeanmarie Hirao. SAP Security Configuration and Deployment. – М.: Syngress, 2009. – 392 с. William Wheeler. Integrating Wireless Technology in the Enterprise. – М.: , 2010. – 403 с. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с. Marcus Sachs. Securing IM and P2P Applications for the Enterprise. – М.: , 2010. – 650 с. John Rittinghouse, PhD, C. Wireless Operational Security. – М.: , 2010. – 468 с. Charles Carrington. Enterprise Directory and Security Implementation Guide. – М.: , 2010. – 272 с. The Enterprise Foundation. A Consumer?s Guide to Home Improvement, Renovation, and Repair. – М.: , 1995. – 288 с. Chetan Sharma. Wireless Internet Enterprise Applications. – М.: , 2000. – 256 с. Scott Sbihli. Developing a Successful Wireless Enterprise Strategy. – М.: , 2002. – 352 с. Russell Dean Vines. Wireless Security Essentials. – М.: , 2002. – 368 с. Adam Kornak. Cap Gemini Ernst & Young Guide to Wireless Enterprise Application Architecture. – М.: , 2001. – 672 с. Jahanzeb Khan. Building Secure Wireless Networks with 802.11. – М.: , 2003. – 352 с. Black Enterprise. Wealth Building Journal. – М.: , 2001. – 224 с. David D. Coleman. CWSP Certified Wireless Security Professional Official Study Guide. – М.: , 2010. – 696 с. Bret Hartman. Enterprise Security with EJBTM and CORBA®. – М.: , 2001. – 400 с. Wireless Application Protocol Forum, Ltd. Official Wireless Application Protocol 2.0. – М.: , 1999. – 768 с. Dan Harkey. Wireless Java Programming for Enterprise Applications. – М.: , 2002. – 720 с. Joseph Davies. Deploying Secure 802.11 Wireless Networks with Microsoft Windoows. – М.: , 2003. – 416 с. Citrix Xenapp Platinum Edition For Windows: The Official Guide. – М.: , 2011. – 576 с. Microsoft Sql Server 2008 A Beginner'S Guide 4/E. – М.: , 2011. – 709 с. Wireless Network Administration A Beginner'S Guide. – М.: , 2011. – 336 с. Wireless Network Security A Beginners Guide. – М.: , 2011. – 400 с. Mobile Application Security. – М.: , 2011. – 432 с. CWNA: Certified Wireless Network Administrator & CWSP Certified Wireless Security Professional All-in-One Exam Guide. – М.: , 2011. – 0 с. Dave Tyson. Security Convergence: Managing Enterprise Security Risk. – М.: , 2007. – 232 с. Craig Schiller, Seth Fogie, Colby DeRodeff, Michael Gregg. InfoSecurity 2008 Threat Analysis. – М.: Syngress, 2007. – 480 с. Eduardo Fernandez-Buglioni. Security Patterns in Practice: Designing Secure Architectures Using Software Patterns. – М.: Wiley, 2013. – 582 с. Papri Ghosh and Ritam Dutta. Adaptive Approach towards Biometric Authentication System. – М.: LAP Lambert Academic Publishing, 2012. – 88 с. A. C. Suthar,D. D. Shah and G. R. Kulkarni. Implementation of Secured Color Image Authentication and Protection. – М.: LAP Lambert Academic Publishing, 2011. – 92 с. Ruben Johnnson Robert Jeremiah,Sakthivel Murugan Shamjith and Allen Vimal. Security System of Oilfield using Wireless in PLC & TESTBED for SCADA. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. AbdolMajid Shahgholi,Dr. K. K. Shukla and Dr. Rajeev Srivastava. LARGE SCALE WIRELESS SENSOR NETWORK FOR TACTICAL MILITARY APPLICATIONS. – М.: LAP Lambert Academic Publishing, 2012. – 92 с. Abdinasir Hassan Ali. Wireless security Handbook 2011. – М.: LAP Lambert Academic Publishing, 2011. – 124 с. Naseer Ahmad. Security Issues in Wireless Networks. – М.: LAP Lambert Academic Publishing, 2010. – 60 с. Yang Liu. Towards Enhanced Security and Reliability in Wireless Communications. – М.: LAP Lambert Academic Publishing, 2010. – 144 с. Mohamed Youshah Shameel Mecca and Tirumala Rao Kothaluru. Evaluation of EAP Authentication Methods. – М.: LAP Lambert Academic Publishing, 2013. – 72 с. Namje Park. Mobile RFID Security. – М.: LAP Lambert Academic Publishing, 2012. – 216 с. Kanav Sood. Kerberos Authentication Protocol. – М.: LAP Lambert Academic Publishing, 2011. – 120 с. Padmashali. A Secure communication for wireless sensor networks. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Manik Gupta. Security Model Beyond Energy Dependency In Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 120 с. Subir Biswas. Security and Privacy in Vehicular Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2013. – 204 с. Kshitiz Saxena and Juhi Sharma. Performance Evaluation Of Security Algorithms In A Wi-Fi Testbed. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Garima Verma. Implementation of Authentication and Transaction Security. – М.: LAP Lambert Academic Publishing, 2013. – 60 с. Younus Javed and Hassan Tahir. Optimized Security Protocol for Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Suman Bala. Secure Routing in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 72 с. Rayala Upendar Rao and K. Palanivel. Secure Routing In Cluster Based Wireless Sensor Network By Using ECC. – М.: LAP Lambert Academic Publishing, 2012. – 96 с. Srikanth Hariharan,Ness B. Shroff and Saurabh Bagchi. Secure Neighbor Discovery in Wireless Networks. – М.: LAP Lambert Academic Publishing, 2011. – 52 с. Munnujahan Ara. Reliable and Secure Wireless Communications Systems. – М.: Scholars' Press, 2014. – 140 с. Rupa Ch. and Avadhani P. S. Modern Security Methods in Applied Computer Science. – М.: Scholars' Press, 2014. – 124 с. Ming-Chin Chuang. Authentication and Mobility Management Mechanisms in VANETs. – М.: Scholars' Press, 2014. – 96 с. K. Shaila and K. R. Venugopal. Secure Data Communication in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2014. – 240 с. Elliot Attipoe. Securing the Public Wireless Network. – М.: LAP Lambert Academic Publishing, 2013. – 92 с. Ankit Panch. Enterprise Secure Wireless Authentication (ESWA). – М.: LAP Lambert Academic Publishing, 2013. – 72 с. Chandan Koner. Authentications in Remote and Mobile System Communications. – М.: LAP Lambert Academic Publishing, 2014. – 128 с. Piotr Szczechowiak. Security in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2011. – 248 с. Iman Almomani. Security Solutions for Wireless Mobile Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2011. – 360 с. Jamil Ibriq. Secure Routing in Wireless Sensor Networks. – М.: Scholars' Press, 2013. – 104 с. Marimuthu Kanagaraj and Eswari Venkatachalam. Multifactor Authentication Protocol for a Secured WSN. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Yi Ren. Security Mechanisms in Unattended Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2013. – 164 с. Shriram Sharma. Energy-efficient Secure Routing in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 96 с. Firdous Kausar. Key Management in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 124 с. Pallavi Kaliyar and Gagan Singla. A secure routing protocol for MANETs against byzantine attacks. – М.: LAP Lambert Academic Publishing, 2013. – 84 с. Omar Cheikhrouhou. Secure Group communication in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2013. – 160 с. Wei Ren. Lightweight and Robust Security for Applications in Internet of Things. – М.: LAP Lambert Academic Publishing, 2013. – 188 с. Raj Shree and Ravi Prakash Pandey. Security Advancement in ZRP based Wireless Networks. – М.: LAP Lambert Academic Publishing, 2014. – 92 с. Keshava Munegowda. Design and Implementation of WLAN Authentication and Security. – М.: LAP Lambert Academic Publishing, 2010. – 124 с. Gergely Acs. Secure Routing in Multi-hop Wireless Networks. – М.: LAP Lambert Academic Publishing, 2010. – 116 с. Abdel-Latif Elkouny. Secured Image and Video Stream Across Wireless Networks. – М.: LAP Lambert Academic Publishing, 2011. – 120 с. Usman Habib. Secure Mobile Authentication for Linux Workstation log on. – М.: LAP Lambert Academic Publishing, 2011. – 120 с. Kefa Rabah. Mastering Securing ICT Infrastructure for Corporate Network. – М.: LAP Lambert Academic Publishing, 2014. – 360 с. Md. Rabiul Islam and M. Abdul Goffar Khan. Retina Recognition: Secure Biometric Authentication System. – М.: LAP Lambert Academic Publishing, 2012. – 72 с. Stephen Schiavone,Lalit Garg and Kelly Summers. Information Security in Enterprises - an Ontological Perspective. – М.: LAP Lambert Academic Publishing, 2014. – 232 с. Drake Patrick Mirembe. Security Framework for Telemedicine, eHealth, and Wellness Services. – М.: LAP Lambert Academic Publishing, 2010. – 72 с. Tanveer Zia. A Security Framework for Wireless Sensor Networks (WSN). – М.: LAP Lambert Academic Publishing, 2013. – 160 с. Nirmalya Kar and Sharmistha Roy. Secure Electronic Voting. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Vinayak Bharadi,Hemchandra Kekre and Rita Vora. Retinal Scan Recognition. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Amit Choudhary. Routing Security Issues in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2014. – 80 с. inayat ullah khan and Syed Majid Ali Shah Bukhari. SWOT Analysis of IP Multimedia Sub System Security Authentication. – М.: LAP Lambert Academic Publishing, 2010. – 52 с. Лучшие результаты Ничего не найдено Дополнительные результаты LEAN ENTERPRISE - дань моде или будущее лучших компаний?. "Управление персоналом", № 13, июль 2006. Бюджетирование страховой компании на базе Oracle Enterprise Planning and Budgeting. Д.В. Лесоводский, "Финансовый менеджмент в страховой компании", № 3, III квартал 2006. Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Надежда (Москва) Хочу Вас поблагодарить за великолепные консультации для работ по статистике для меня и Иры ("Корреляционно-регрессионный анализ...", "Основные пр.фонды"). Они были оценены высшим баллом. Нас допустили к экзамену. Похвалы, которые мы услышали адресуем ВАМ. Очень бы хотелось в дальнейшем рассчитывать на Вашу помощь, т.к. впереди такие дисциплины как ЭММ, Эконометрика. СПАСИБО ОГРОМНОЕ. Счастья Вам, здоровья, добра и мира вашей семье.