Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Chris Shiflett. Essential PHP Security. – М.: , 2005. – 124 с.
  2. Chris Shiflett. Essential PHP Security. – М.: , 1987. – 196 с.
  3. Small Business Web Sites Made Easy. – М.: , 2011. – 272 с.

Дополнительные результаты

  1. Francis Groves. Corporate Actions - A Concise Guide: An introduction to securities events. – М.: , 2012. – 230 с.
  2. Various Authors. Finance Essentials. – М.: , 2012. – 704 с.
  3. Douglas Gray. Making Money in Real Estate: The Essential Canadian Guide to Investing in Residential Property. – М.: , 2012. – 424 с.
  4. Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с.
  5. E Williams. The Essential Non-Profit Public Relations Guide: Tips on Great Public Relations for Non-Profits. – М.: , 2012. – 52 с.
  6. Ajagun Samuel Olushola. An Evaluation of Anti- Corruption Policies: A Case Study of Edo State, Nigeria. – М.: , 2012. – 196 с.
  7. Andrew Griffiths. Bulletproof Your Business Now: Essential Advice You Need to Survive. – М.: , 2012. – 172 с.
  8. Data Privacy Management and Autonomous Spontaneus Security: 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, ... Computer Science / Security and Cryptology). – М.: , 2012. – 334 с.
  9. Security and Privacy in Mobile Information and Communication Systems: Third International ICST Conference, MOBISEC 2011, Aalborg, Denmark, May 17-19, ... and Telecommunications Engineering). – М.: , 2012. – 195 с.
  10. Constructive Side-Channel Analysis and Secure Design: Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings ... Computer Science / Security and Cryptology). – М.: , 2012. – 280 с.
  11. Public Key Infrastructures, Services and Applications: 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected ... Computer Science / Security and Cryptology). – М.: , 2012. – 219 с.
  12. Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  13. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с.
  14. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с.
  15. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 515 с.
  16. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  17. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с.
  18. Smart Card Research and Advanced Applications: 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, ... Computer Science / Security and Cryptology). – М.: , 2012. – 357 с.
  19. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с.
  20. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с.
  21. Martyn R Pitt, Dimitrios Koufopoulos. Essentials of Strategic Management. – М.: , 2012. – 472 с.
  22. Security and Development in Global Politics: A Critical Comparison. – М.: , 2012. – 360 с.
  23. Ola Olsson. Essentials of Advanced Macroeconomic Theory (Routledge Advanced Texts in Economics and Finance). – М.: , 2012. – 192 с.
  24. Joseph F. Stenken JD CLU ChFc. Social Security & Medicare Facts 2012. – М.: , 2012. – 451 с.
  25. Andrew LaCivita. Interview Intervention: Communication That Gets You Hired: A Milewalk Business Book. – М.: , 2012. – 136 с.
  26. Luis Lobo-Guerrero. Insuring Security: Biopolitics, security and risk. – М.: , 2012. – 178 с.
  27. CCH Editorial Staff. Social Security Explained 2012. – М.: , 2012. – 298 с.
  28. Terrorism and the Olympics: Major Event Security and Lessons for the Future. – М.: , 2012. – 272 с.
  29. Sheila R Ronis. Economic Security: Neglected Dimension of National Security?. – М.: , 2012. – 128 с.
  30. Denise Garcia. Disarmament Diplomacy and Human Security: Regimes, Norms and Moral Progress in International Relations. – М.: , 2012. – 0 с.
  31. Securities Compliance Index. Securities Compliance Index, Second Edition: A Topical Guide To U.S. Securities Regulation. – М.: , 2012. – 512 с.
  32. American Bar Association, Thomas Lee Hazen. Securities Regulation: Corporate Counsel Guides. – М.: , 2012. – 540 с.
  33. Lionel Martellini, Philippe Priaulet, StA©phane Priaulet. Fixed-Income Securities : Valuation, Risk Management and Portfolio Strategies (The Wiley Finance Series). – М.: , 0. – 0 с.
  34. Jeffrey C. Hooke. Security Analysis on Wall Street. – М.: , 0. – 0 с.
  35. Martin Stone, Spencer Strauss. Secure Your Financial Future Investing in Real Estate. – М.: , 0. – 0 с.
  36. William Rini. Fundamentals of the Securities Industry. – М.: , 0. – 0 с.
  37. Bryan Bergeron. Essentials of XBRL. – М.: , 0. – 0 с.
  38. Frank J. Fabozzi, John N. Dunlevy, Frank J. Fabozzi, John N. Dunlevy. Real Estate Backed Securities. – М.: , 0. – 0 с.
  39. Stephen Brookson. Understanding Accounts (Essential Managers). – М.: , 0. – 0 с.
  40. George T. Friedlob, Lydia L. F. Schleifer, George T. Friedlob, L.F. Schleifer. Essentials of Financial Analysis. – М.: , 0. – 0 с.
  41. David F. Teitelbaum. The Procrastinator's Guide to Financial Security: How Anyone Over 40 Can Still Build a Strong Portfolio--and Retire Comfortably. – М.: , 0. – 0 с.
  42. Giorgio S. Questa. Fixed Income Analysis for the Global Financial Market: Money Market, Foreign Exchange, Securities, and Derivatives. – М.: Wiley, 1999. – 368 с.
  43. Bambi Holzer. Retire Rich : The Baby Boomer's Guide to a Secure Future. – М.: , 0. – 0 с.
  44. Peter A. Diamond. Taxation, Incomplete Markets, and Social Security (Munich Lectures). – М.: , 0. – 0 с.
  45. William T. Moore. Real Options and Option-Embedded Securities. – М.: , 0. – 0 с.
  46. Marc Robinson. Essential Finance Series: Investing Basics. – М.: , 0. – 0 с.
  47. Duane R. Milano, Milano, Charles S. Robnett, Duane R. Essentials of Accounting II Milano. The Essentials of Accounting I (Essentials). – М.: , 0. – 0 с.
  48. Marilyn Greenstein, Todd M. Feinman. Electronic Commerce: Security Risk Management and Control. – М.: , 0. – 0 с.
  49. Paul Shaw. E-Business Privacy and Trust: Planning and Management Strategies. – М.: , 0. – 0 с.
  50. Neale S. Godfrey, Tad Richards. Making Change: A Woman's Guide to Designing Her Financial Future. – М.: , 0. – 0 с.
  51. Steven M. Bragg, Steven M. Bragg. Essentials of Payroll: Management and Accounting. – М.: , 0. – 0 с.
  52. Kenneth S. Hackel, Joshua Livnat. Cash Flow and Security Analysis. – М.: , 0. – 0 с.
  53. Mary S. Schaeffer. Essentials of Accounts Payable (Essentials Series). – М.: , 0. – 0 с.
  54. George T. Friedlob, Lydia L. F. Schleifer, Franklin J. Plewa. Essentials of Corporate Performance Measurement. – М.: , 0. – 0 с.
  55. Bryan Bergeron. Essentials of CRM: A Guide to Customer Relationship Management (Essentials Series). – М.: , 0. – 0 с.
  56. Reginald Tomas Yu-Lee. Essentials of Capacity Management. – М.: , 0. – 0 с.
  57. Lenore G. Martin. New Frontiers in Middle East Security. – М.: , 0. – 0 с.
  58. John B. Shoven. Administrative Aspects of Investment-Based Social Security Reform (Conference Report (National Bureau of Economic Research).). – М.: , 0. – 0 с.
  59. Paul Voillis, Paul Viollis. Jane's Workplace Security Handbook. – М.: , 0. – 0 с.
  60. Gerald Kovacich. The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition. – М.: , 0. – 0 с.
  61. Safe Schools: A Security and Loss Prevention Plan. – М.: , 0. – 0 с.
  62. William Beaver. Overseas Americans: The Essential Guide to Living and Working Abroad. – М.: , 0. – 0 с.
  63. Robert M. Ball, Thomas N. Bethell. Insuring the Essentials: Bob Ball on Social Security. – М.: , 0. – 0 с.
  64. Werner Draguhn, Robert Ash. China's Economic Security. – М.: , 0. – 0 с.
  65. Julia Lowell, C. R. Neu, Daochi Tong, National Defense Research Institute, National Security Research Institute. Financial Crises and Contagion in Emerging Market Countries. – М.: , 0. – 0 с.
  66. William J. O'Neil. 24 Essential Lessons for Investment Success: Learn the Most Important Investment Techniques from the Founder of Investor's Business Daily. – М.: , 0. – 0 с.
  67. Philip Ryland. Essential Investment. – М.: , 0. – 0 с.
  68. Marko Nordquist. Towards Improved Security Management Practice: Designing an Organizational Model Procedure for the Implementation of Information Security Management in Heterogeneous Information Management. – М.: , 0. – 0 с.
  69. Computer Security. – М.: , 0. – 0 с.
  70. Risk Analysis and the Security Survey. – М.: , 0. – 0 с.
  71. Joseph S. Nye, William A. Owens, James R. Schlesinger, R. James Woolsey, James A. Lewis, Joseph S., Jr. Nye, James Andrew Lewis, Erin Schlather, Csis Commission on Technology Security in the Twenty-First Century. Computer Exports and National Security: New Tools for a New Century : A Report of the Csis Commission on Technology Security in the 21St-Century (Csis Panel Reports.). – М.: , 0. – 0 с.
  72. Geoff Craighead. High-Rise Security and Fire Life Safety, Second Edition. – М.: , 0. – 0 с.
  73. Ellen Hoffman. Bankroll your Future: How to Get the Most from Uncle Sam for Your Retirement Years--Social Security, Medicare, and Much More. – М.: , 0. – 0 с.
  74. Efraim Turban, David King. E-Commerce Essentials. – М.: , 0. – 0 с.
  75. C. Warren Axelrod, Axelrod. Outsourcing Information Security. – М.: , 0. – 0 с.
  76. Jesus Mena. Homeland Security Techniques and Technologies (Networking Series). – М.: , 0. – 0 с.
  77. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с.
  78. Frank A. Stasiowski. Architect's Essentials of Winning Proposals (The Architect's Essentials of Professional Practice). – М.: , 2003. – 0 с.
  79. Jim Stewart. SAP Security: SAP Security Essentials. – М.: Equity Press, 2005. – 136 с.
  80. Scott Besley, Eugene F. Brigham. Essentials of Managerial Finance. – М.: , 2007. – 0 с.
  81. Jeremy Bolland. Writing Securities Research: A Best Practice Guide. – М.: , 2007. – 120 с.
  82. Sean, Ph.D., CFA Cleary. Canadian Securities Exam: Fast-Track Study Guide. – М.: , 2007. – 352 с.
  83. Committee on Federal Regulation of Securities Committee. The Fund Director's Guidebook: Third Edition (Fund Director's Guidebook). – М.: , 2006. – 128 с.
  84. Michael Gentile, Ron Collette, Tom August. The Ciso Handbook: A Practical Guide to Securing Your Company. – М.: , 2005. – 352 с.
  85. Leonard J. Santow, Mark E. Santow. Social Security and the Middle-Class Squeeze: Fact and Fiction about America's Entitlement Programs. – М.: , 2005. – 232 с.
  86. Sustainable Metals Management : Securing Our Future - Steps Towards a Closed Loop Economy (Eco-Efficiency in Industry and Science) (Eco-Efficiency in Industry and Science). – М.: , 2006. – 607 с.
  87. John J. Fay. Encyclopedia of Security Management. – М.: Butterworth-Heinemann, 2007. – 688 с.
  88. Meridian Securities Market. World Stock Exchange Fact Book. – М.: , 2008. – 0 с.
  89. Faycal Haggui. EU Opposition to Genitically Modified Wheat: Its Impact on Global Food Security. – М.: , 2008. – 124 с.
  90. CompTIA Security+: Certification Kit (комплект из 3 книг + 2 CD-ROM). – М.: Sybex, 2009. – 1440 с.
  91. W. Krag Brotby. Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement. – М.: Auerbach Publications, 2009. – 200 с.
  92. Robert C. Seacord. The CERT C Secure Coding Standard. – М.: Addison-Wesley Professional, 2008. – 720 с.
  93. David R. Brooks. An Introduction to PHP for Scientists and Engineers: Beyond JavaScript. – М.: Springer, 2008. – 141 с.
  94. Matthew Keefe. Flash® and PHP Bible. – М.: , 2008. – 508 с.
  95. Timothy Boronczyk. PHP and MySQL®. – М.: , 2008. – 342 с.
  96. David A. Montague. Essentials of Online payment Security and Fraud Prevention. – М.: , 2010. – 336 с.
  97. T. Bradley. Essential Computer Security: Everyone's Guide to Email, Internet, andWireless Security. – М.: , 2010. – 0 с.
  98. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с.
  99. Chris Shiflett. Essential PHP Security. – М.: , 2005. – 124 с.
  100. Chris Shiflett. Essential PHP Security. – М.: , 1987. – 196 с.
  101. Russell Dean Vines. Wireless Security Essentials. – М.: , 2002. – 368 с.
  102. Silvia Hagen. iPv6 Essentials. – М.: O'Reilly Media, 2006. – 448 с.
  103. Construction Site Security. – М.: , 2006. – 438 с.
  104. Principles Of Computer Security, Comptia Security+ And Beyond, Second Edition. – М.: , 2011. – 0 с.
  105. Php: A Beginner'S Guide. – М.: , 2011. – 478 с.
  106. Comptia Security+ All-In-One Exam Guide, Second Edition (Exam Sy0-201). – М.: , 2011. – 0 с.
  107. Small Business Web Sites Made Easy. – М.: , 2011. – 272 с.
  108. Mike Meyers' Comptia A+ Guide: Essentials, Third Edition (Exam 220-701). – М.: , 2011. – 0 с.
  109. CWNA: Certified Wireless Network Administrator & CWSP Certified Wireless Security Professional All-in-One Exam Guide. – М.: , 2011. – 0 с.
  110. PHP, MySQL, JavaScript & HTML5 All-in-One For Dummies. – М.: , 2013. – 720 с.
  111. Stoyan Stefanov. JavaScript for PHP Developers. – М.: O'Reilly Media, 2013. – 160 с.
  112. I. Bayo Oloyede. Freedom of Expression and National Security in Nigeria. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  113. Alaa K. Farhan. Security Protocol for Mobile Data. – М.: LAP Lambert Academic Publishing, 2013. – 116 с.
  114. P.A. Pagar,R.K. Mathukia and M.K. Khistaria. Summer Sesame Response to Irrigation and Fertilizer. – М.: LAP Lambert Academic Publishing, 2014. – 116 с.
  115. Morteza Rafiei. Food Security Measurement Guide. – М.: LAP Lambert Academic Publishing, 2014. – 108 с.
  116. Sitaram Kumawat,R.K. Mathukia and M.K. Khistaria. Greengram Response to Phosphorus and Sulphur. – М.: LAP Lambert Academic Publishing, 2014. – 148 с.
  117. Shailendra Bajpai and J. P. Gupta. Site Security. – М.: LAP Lambert Academic Publishing, 2011. – 88 с.
  118. Juan M. Pons. Small States, Hegemony and the Security Dilemma. – М.: Scholars' Press, 2014. – 160 с.
  119. Scott Nicholas Romaniuk. New Polar Horizons: Conflict and Security in the Arctic. – М.: LAP Lambert Academic Publishing, 2011. – 160 с.
  120. Scott Nicholas Romaniuk. Competing Powers: Security in the Wider Black Sea Region. – М.: LAP Lambert Academic Publishing, 2011. – 408 с.
  121. Ekaterina Anyanova. The regime of maritime security in international, EU and national law. – М.: LAP Lambert Academic Publishing, 2014. – 324 с.
  122. Monica Opoku,Paul Ingenbleek and Kerstin Hell. Novel root & tuber crops and food security in West Africa. – М.: LAP Lambert Academic Publishing, 2012. – 192 с.
  123. Patty A. Fairweather. State Supreme Court Chief Justices'' Views: Liberty/Security and The GWOT. – М.: LAP Lambert Academic Publishing, 2010. – 116 с.
  124. Prosscovia Nambatya. An Analysis of the Mandate of the UN Security Council in Libya. – М.: LAP Lambert Academic Publishing, 2014. – 76 с.
  125. Nateq Be-Nazir Ibn Minar. Bluetooth Networking and its Security Architecture. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  126. Mohammed azharuddin Adhoni. Secure communication in p2p networks. – М.: LAP Lambert Academic Publishing, 2012. – 124 с.
  127. Ankit Panch. Enterprise Secure Wireless Authentication (ESWA). – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  128. Shilpa Jaiswal. Elimination of Security Threats Using Trusted Proactive Routing. – М.: LAP Lambert Academic Publishing, 2014. – 56 с.
  129. Britto R. Kumar and Albert S. Rabara. An Architecture for Secure Mobile Payment System using PKI. – М.: LAP Lambert Academic Publishing, 2013. – 184 с.
  130. E. Madhusudhana Reddy. Development of Secure Protocols for MHIS Using RMPJK–RSA Cryptosystem. – М.: LAP Lambert Academic Publishing, 2011. – 204 с.
  131. Yasser Alshehri. Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 156 с.
  132. Muhammad Qaiser Saleem,Jafreezal Jaafar and Mohd Fadzil Hassan. Modeling Security Objectives along BPM of SOA Applications. – М.: LAP Lambert Academic Publishing, 2013. – 236 с.
  133. Narendra Kumar Pareek. Information hiding using chaos. – М.: LAP Lambert Academic Publishing, 2012. – 160 с.
  134. Eric Amankwa. Assessment of Security Controls. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  135. Rajat Jyoti Sarkar and Kalyanbrata Bhattacharyya. Performance of Public Distribution System as a Food Security Measure. – М.: LAP Lambert Academic Publishing, 2012. – 148 с.
  136. Suresh Vadde. Investment Management. – М.: LAP Lambert Academic Publishing, 2013. – 236 с.
  137. Robell Damtie and Fentay Misganaw. The Role of Women Household Heads on Food Security. – М.: LAP Lambert Academic Publishing, 2012. – 124 с.
  138. Manojkumar Shastri. Right to Education & Basic Needs for Human Reference to Vedas. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  139. Nedim Makarevic. Influence of IT Security on banks' competitiveness. – М.: LAP Lambert Academic Publishing, 2014. – 144 с.
  140. Audu Jonathan Adoga and Fredah I. Agbeje. Introduction to Internet Security for PHP Web Developers. – М.: , 2014. – 52 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

Ничего не найдено

Образцы работ

Тема и предметТип и объем работы
Последствия операции НАТО
Политология
Диплом
80 стр.
Платежные системы в Интернете
Информатика
Диплом
102 стр.
Роль ОБСЕ в урегулировании конфликтов в Европе
Политология
Курсовая работа
33 стр.
Управление финансами малого бизнеса
Анализ финансово-хозяйственной деятельности предприятия
Диплом
101 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Вероника
Спасибо вам большое.