Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Donn B. Parker. Fighting Computer Crime : A New Framework for Protecting Information. – М.: , 0. – 0 с.
  2. Joseph Menn. Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet. – М.: PublicAffairs, 2010. – 304 с.
  3. Donn B. Parker. Fighting Computer Crime. – М.: , 1998. – 528 с.
  4. Hacking Exposed, Sixth Edition. – М.: , 2011. – 720 с.

Дополнительные результаты

  1. Laszlo Gyorfi. Machine Learning for Financial Engineering (Advances in Computer Science and Engineering: Texts). – М.: , 2012. – 250 с.
  2. Frontiers in Algorithmics and Algorithmic Aspects in Information and Management: Joint International Conference, FAW-AAIM 2012, Beijing, China, May ... Computer Science and General Issues). – М.: , 2012. – 400 с.
  3. Public Key Infrastructures, Services and Applications: 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected ... Computer Science / Security and Cryptology). – М.: , 2012. – 219 с.
  4. Cloud Computing and Services Science (Service Science: Research and Innovations in the Service Economy). – М.: , 2012. – 405 с.
  5. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с.
  6. Social Computing, Behavioral-Cultural Modeling and Prediction: 5th International Conference, SBP 2012, College Park, MD, USA, April 3-5, 2012, ... Applications, incl. Internet/Web, and HCI). – М.: , 2012. – 380 с.
  7. Technological Innovation for Value Creation: Third IFIP WG 5.5/SOCOLNET Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS ... in Information and Communication Technology). – М.: , 2012. – 607 с.
  8. Video Analytics for Business Intelligence (Studies in Computational Intelligence). – М.: , 2012. – 388 с.
  9. Crime and Transition in Central and Eastern Europe. – М.: , 2012. – 308 с.
  10. Sara Gibson. How to Land a Top-Paying Computer help desk representatives Job: Your Complete Guide to Opportunities, Resumes and Cover Letters, Interviews, ... What to Expect From Recruiters and More. – М.: , 2012. – 90 с.
  11. Domingo Tavella. Quantitative Methods in Derivatives Pricing: An Introduction to Computational Finance. – М.: , 0. – 0 с.
  12. G. Jack Bologna, Robert J. Lindquist. Fraud Auditing and Forensic Accounting. – М.: , 0. – 0 с.
  13. Joseph W. Koletar, Joseph Koletar. Fraud Exposed: What You Don't Know Could Cost Your Company Millions. – М.: , 0. – 0 с.
  14. Constance S. Hawke, Constance S. Hawke. Computer and Internet Use on Campus: A Legal Guide to Issues of Intellectual Property, Free Speech, and Privacy. – М.: , 0. – 0 с.
  15. Markov Networks in Evolutionary Computation (Adaptation, Learning, and Optimization). – М.: , 2012. – 264 с.
  16. James W. Cortada. Before the Computer. – М.: , 0. – 0 с.
  17. James W. Cortada. The Digital Hand: How Computers Changed the Work of American Manufacturing, Transportation, and Retail Industries. – М.: , 0. – 0 с.
  18. Alexander Del Mar. Barbara Villiers: A History of Monetary Crimes. – М.: , 0. – 0 с.
  19. Arthur Herzog. Vesco: From Wall Street to Castro's Cuba, the Rise, Fall, and Exile of the King of White Collar Crime. – М.: , 0. – 0 с.
  20. Frank Levy, Richard J. Murnane. The New Division of Labor: How Computers Are Creating the Next Job Market. – М.: , 0. – 0 с.
  21. Kenneth C. Wolensky, Nicole H. Wolensky, Robert P. Wolensky. Fighting for the Union Label: The Women's Garment Industry and the Ilgwu in Pennsylvania. – М.: , 0. – 0 с.
  22. Michael Prietula, Kathleen, Les Gasser, Kathleen Carley, Leslie George Gasser. Simulating Organizations: Computational Models of Institutions and Groups. – М.: , 0. – 0 с.
  23. Zhiang Lin, Kathleen M. Carley. Designing Stress Resistant Organizations: Computational Theorizing and Crisis Applications (Information and Organization Design Series). – М.: , 0. – 0 с.
  24. Anantha Kumar Duraiappah. Computational Models in the Economics of Environment and Development (Economy & Environment, 27). – М.: , 0. – 0 с.
  25. Abdullah Abdul-Gader, Abdullah H. Al-Abdul-Gader. Managing Computer Based Information Systems in Developing Countries: A Cultural Perspective. – М.: , 0. – 0 с.
  26. Roger A. McCain. Agent-Based Computer Simulation of Dichotomous Economic Growth (ADVANCES IN COMPUTATIONAL ECONOMICS Volume 13). – М.: , 0. – 0 с.
  27. Mario J. Miranda, Paul L. Fackler. Applied Computational Economics and Finance. – М.: , 0. – 0 с.
  28. Hans M. Amman, David A. Kendrick, John Rust. Handbook of Computational Economics. – М.: North Holland, 1996. – 832 с.
  29. Kumaraswamy Velupillai. Computable Economics: The Arne Ryde Memorial Lectures (Arne Ryde Memorial Lectures). – М.: , 0. – 0 с.
  30. G. M. P. Swann, Martha Prevezer, David Stout, G. M. Peter Swann, David K. Stout. The Dynamics of Industrial Clustering: International Comparisons in Computing and Biotechnology. – М.: , 0. – 0 с.
  31. Steffen Jrgensen, Georges Zaccour. Optimal Control and Differential Games: Essays in Honor of Steffen Jorgensen (Advances in Computational Management Science). – М.: , 0. – 0 с.
  32. Soren S. Nielsen. Programming Languages and Systems in Computational Economics and Finance (Advances in Computational Economics, 18). – М.: , 0. – 0 с.
  33. Abdul Bangura. Computer Programming to Insure Project Accountability in Africa. – М.: , 0. – 0 с.
  34. Abdol S. Soofi, Liangyue Cao. Modelling and Forecasting Financial Data: Techniques of Nonlinear Dynamics (Studies in Computational Finance, Volume 2). – М.: , 0. – 0 с.
  35. Thomas Brenner. Computational Techniques for Modelling Learning in Economics (Advances in Computational Economics, V. 11). – М.: , 0. – 0 с.
  36. Francesco Luna, Benedikt Stefansson. Economic Simulations in Swarm: Agent-Based Modelling and Object (ADVANCES IN COMPUTATIONAL ECONOMICS Volume 14). – М.: , 0. – 0 с.
  37. David Horowitz, Dana Shilling. Fight Back! at Work. – М.: , 0. – 0 с.
  38. Virginia?Ferrell Andersen. Digital Recall: Computers Aren't the Only Ones With Memory. – М.: , 0. – 0 с.
  39. Suparna Damany, Jack Bellis. It's Not Carpal Tunnel Syndrome! RSI Theory & Therapy for Computer Professionals. – М.: , 0. – 0 с.
  40. Paul Linden. Comfort at Your Computer: Body Awarness Training for Pain-Free Computer Use. – М.: , 0. – 0 с.
  41. Robert R. Van Ryzin. Crime of 1873: The Comstock Connection. – М.: , 0. – 0 с.
  42. Sara Baase. A Gift of Fire. – М.: , 0. – 0 с.
  43. Deborah G. Johnson, Helen Nissenbaum. Computers, Ethics and Social Values. – М.: , 0. – 0 с.
  44. Sally S. Simpson. Corporate Crime, Law, and Social Control (Cambridge Studies in Criminology (New York, N.Y.).). – М.: , 0. – 0 с.
  45. Terrell Ward Bynum, Simon Rogerson, Blackwell Pub. Computer Ethics and Professional Responsibility: Introductory Text and Readings. – М.: , 0. – 0 с.
  46. Joseph Migga Kizza, Joseph Kizza. Ethical and Social Issues in the Information Age. – М.: , 0. – 0 с.
  47. Tom Forester, Perry Morrison. Computer Ethics, Second Edition: Cautionary Tales and Ethical Dilemmas in Computing. – М.: , 0. – 0 с.
  48. Alessandro Lomi, Erik R. Larsen. Dynamics of Organizations: Computational Modeling and Organizational Theories. – М.: AAAI Press, 2001. – 352 с.
  49. Clinard Marshall B., Peter C. Yeager. Corporate Crime. – М.: , 0. – 0 с.
  50. Brian K. Payne. Crime in the Home Health Care Field: Workplace Violence, Fraud, and Abuse. – М.: , 0. – 0 с.
  51. Computer-Supported Cooperative Work : A Book of Readings. – М.: , 0. – 0 с.
  52. Lila B. Stair, Leslie Stair. Careers in Computers, Third Edition. – М.: , 0. – 0 с.
  53. Janet Ruhl. Computer Job Survival Guide. – М.: , 0. – 0 с.
  54. Don Knowles. Today's Technician: Automotive Computer Systems. – М.: , 0. – 0 с.
  55. Joan Vaughn. COMPUTER TECH CAREER STARTER 2E. – М.: , 0. – 0 с.
  56. Lila B. Stair, Leslie Stair. Careers in Computers, Third Edition. – М.: , 0. – 0 с.
  57. Peter Meyer. Getting Started in Computer Consulting. – М.: , 0. – 0 с.
  58. Considering Computer Contracting? : How to become a successful freelance computer professional ("Computer Weekly" Professional S.). – М.: , 0. – 0 с.
  59. Erricos John Kontoghiorghes, Berc Rustem, Stavros Siokos. Computational Methods in Decision-Making, Economics and Finance (Applied Optimization, 74). – М.: , 0. – 0 с.
  60. Information Warfare : corporate attack and defence in a digital world (Computer Weekly Professional (Paperback)). – М.: , 0. – 0 с.
  61. Janet Ruhl. Janet Ruhl's Answers for Computer Contractors: How to Get the Highest Rates and the Fairest Deals from Consulting Firms, Agencies, and Clients. – М.: , 0. – 0 с.
  62. Carol L. Covin. The Best Computer Jobs in America: 20 Minutes from Home. – М.: , 0. – 0 с.
  63. Richard H. Berube. Computer Simulated Experiments for Digital Electronics Using Electronics Workbench. – М.: , 0. – 0 с.
  64. W. Prasad Kodali. Engineering Electromagnetic Compatibility : Principles, Measurements, Technologies, and Computer Models. – М.: , 0. – 0 с.
  65. Natalie F. Harris, Nils Conrad Persson. ES&T Mag.Presents Computer Troubleshooting & Repair. – М.: , 0. – 0 с.
  66. Kenneth C. Mansfield, James L. Antonakos. Introduction to Computers for Engineering and Technology. – М.: , 0. – 0 с.
  67. Dan L. Beeson. Assembling and Repairing Personal Computers (2nd Edition). – М.: , 0. – 0 с.
  68. Richard H. Berube. Computer Simulated Experiments for Electronic Devices Using Electronics Workbench (2nd Edition). – М.: , 0. – 0 с.
  69. Richard H. Berube, Richard Berube. Computer Simulated Experiments for Electric Circuits Using Electronics Workbench (2nd Edition). – М.: , 0. – 0 с.
  70. The Linear Complementarity Problem (Computer Science and Scientific Computing). – М.: , 0. – 0 с.
  71. Anantha Kumar Duraiappah. Computational Models in the Economics of Environment and Development (Economy & Environment, ?27). – М.: , 0. – 0 с.
  72. Hans M. Amman, Berc Rustem, Andrew Whinston, Hans Amman. Computational Approaches to Economic Problems (Advances in Computational Economics, Vol. 6). – М.: , 0. – 0 с.
  73. Kitty Calavita, Henry N. Pontell, Robert H. Tillman. Big Money Crime: Fraud and Politics in the Savings and Loan Crisis. – М.: , 0. – 0 с.
  74. Karen Elizabeth Smith. European Union Foreign Policy in a Changing World [ILLUSTRATED]. – М.: Polity, 2003. – 288 с.
  75. Vernon L. Mogensen. Office Politics: Computers, Labor, and the Fight for Safety and Health. – М.: , 0. – 0 с.
  76. Albert Vetere Lannon. Fight or Be Slaves: The History of the Oakland-East Bay Labor Movement. – М.: , 0. – 0 с.
  77. Alan H. Kvanli. Introduction to Business Statistics: A Computer Integrated, Data Analysis Approach. – М.: , 0. – 0 с.
  78. Shu-Heng Chen. Evolutionary Computation in Economics and Finance. – М.: , 0. – 0 с.
  79. United States Senate. Crime and Secrecy: The Use of Offshore Banks and Companies. – М.: , 0. – 0 с.
  80. Andrew Fight, Andrew Fight. Understanding International Bank Risk. – М.: , 0. – 0 с.
  81. President's Commission on Organized Crim, Notes See Notes. The Cash Connection: Organized Crime, Financial Institutions, and Money Laundering. – М.: , 0. – 0 с.
  82. R. T. Naylor. Wages of Crime: Black Markets, Illegal Finance, and the Underworld Economy. – М.: , 0. – 0 с.
  83. Andrew Fight. The Ratings Game. – М.: , 0. – 0 с.
  84. Richard Hunter. World Without Secrets: Business, Crime and Privacy in the Age of Ubiquitous Computing. – М.: , 0. – 0 с.
  85. Computer Security. – М.: , 0. – 0 с.
  86. Donn B. Parker. Fighting Computer Crime : A New Framework for Protecting Information. – М.: , 0. – 0 с.
  87. Ravi Kalakota, Andrew B. Whinston, Coordination, and Collaboration Conference 1 Organizational Computing. Readings in Electronic Commerce. – М.: , 0. – 0 с.
  88. Roland Traunmuller, R. Traunmuller, Quebec) Ifip World Computer Congress 2002 Montreal. Information Systems: The E-Business Challenge (International Federation for Information Processing, 95). – М.: , 0. – 0 с.
  89. G. David Garson, G. David Information Technology and Computer Applications in Garson. Public Information Technology: Policy and Management Issues. – М.: , 0. – 0 с.
  90. Andrew Fight. Syndicated Lending (Essential Capital Markets). – М.: , 2004. – 0 с.
  91. Katri K. Sieberg. Criminal Dilemmas: Understanding and Preventing Crime (Studies in Economic Theory). – М.: , 2005. – 199 с.
  92. Andrew Fight. Credit Risk Management: Essential Capital Markets. – М.: Elsevier Butterworth-Heinemann, 2007. – 270 с.
  93. Ronald L. Mendell. Investigating Computer Crime In The 21st Century: Investigating Computer Crime In The Twenty-first Century. – М.: , 2005. – 265 с.
  94. Robert B. Laughlin. The Crime of Reason: And the Closing of the Scientific Mind. – М.: , 2008. – 224 с.
  95. Joseph Menn. Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet. – М.: PublicAffairs, 2010. – 304 с.
  96. Kevin D. Mitnick. The Art of Intrusion. – М.: , 2005. – 270 с.
  97. Eoghan Casey. Digital Evidence and Computer Crime. – М.: , 2010. – 688 с.
  98. Eoghan Casey. Handbook of Computer Crime Investigation. – М.: , 2010. – 448 с.
  99. Andrew Fight. Measurement & Internal Audit. – М.: , 2002. – 106 с.
  100. Andrew Fight. E–Finance. – М.: , 2002. – 118 с.
  101. Andrew Fight. E–Processes. – М.: , 2002. – 118 с.
  102. Andrew Fight. Understanding International Bank Risk. – М.: , 2003. – 248 с.
  103. MJ COMPUTER. Ball Data Processing In Medicine: How To Select A Computerized Hospital Information Systm. – М.: , 1973. – 0 с.
  104. Donn B. Parker. Fighting Computer Crime. – М.: , 1998. – 528 с.
  105. R COMPUTERS. Dehaene Computers In Radiology. – М.: , 1971. – 0 с.
  106. Apple Computer. Learning Carbon. – М.: , 2001. – 360 с.
  107. Apple Computer. Learning Cocoa. – М.: , 2001. – 384 с.
  108. COMPUTER. Computer School ?mastering? Multiplan Tm (paper On Ly). – М.: , 1984. – 0 с.
  109. Center for Professional Computer Education. Multimate ProfessionalTM. – М.: , 1986. – 240 с.
  110. Center for Professional Computer Education. DisplayWrite III. – М.: , 1987. – 224 с.
  111. Center for Professional Computer Education. WordStar®. – М.: , 1987. – 192 с.
  112. Center for Professional Computer Education. LOTUS 1–2–3 Quick Reference Handbook. – М.: , 1986. – 240 с.
  113. COMPUTER PART. Computer Partners: Handbook Of Cobol Techniques & Programming Standards 3ed (pr Only). – М.: , 1993. – 0 с.
  114. Ulrich Sieber. The International Handbook on Computer Crime. – М.: , 1986. – 290 с.
  115. Hacking Exposed, Sixth Edition. – М.: , 2011. – 720 с.
  116. Aaron Philipp, David Cowen, Chris Davis. Hacking Exposed: Computer Forensics. – М.: McGraw-Hill, 2010. – 544 с.
  117. Eoghan Casey. Digital Evidence and Computer Crime. – М.: , . –  с.
  118. Jonathan Littman. The Watchman : The Twisted Life and Crimes of Serial Hacker Kevin Poulsen. – М.: , . –  с.
  119. Inc. KT Solutions, KT Solutions has focused on what it takes to create efficient, professional multimedia training t KT Solutions specializes in the development of interactive multimedia training products for computer applications. Over the past decade. Beginning Windows NT Workstation 4.0 (Microsoft Windows NT). – М.: , . –  с.
  120. Inc. KT Solutions, KT Solutions has focused on what it takes to create efficient, professional multimedia training t KT Solutions specializes in the development of interactive multimedia training products for computer applications. Over the past decade. Advanced Word for Office 97 (Microsoft Word 97). – М.: , . –  с.
  121. Olakunle Michael Folami. Crime in the Banking Sector and the Nation''s Economy. – М.: LAP Lambert Academic Publishing, 2011. – 140 с.
  122. Zelalem Mogessie Teferra. ICRC’s Confidentiality Rule and the Fight against Impunity. – М.: LAP Lambert Academic Publishing, 2011. – 112 с.
  123. Henry Osborn Quarshie. Cyber crime in a world without borders. – М.: LAP Lambert Academic Publishing, 2012. – 320 с.
  124. Andras Huszar. EU Environmental Crime and Punishment. – М.: Scholars' Press, 2014. – 120 с.
  125. Besart Qerimi. Countering Strategies Against Transnational Organized Crime. – М.: LAP Lambert Academic Publishing, 2012. – 200 с.
  126. Xi Zheng. The Power of the Police in China. – М.: LAP Lambert Academic Publishing, 2013. – 112 с.
  127. SESWANTSHO GODFREY LEBEYA. Organised Crime in the Southern African Development Community. – М.: LAP Lambert Academic Publishing, 2010. – 192 с.
  128. Lamek Ronoh. Security Concern of Cloud Computing Models. – М.: LAP Lambert Academic Publishing, 2014. – 88 с.
  129. Ajeet Singh Poonia. Investigation and Prevention of Cyber Crime. – М.: LAP Lambert Academic Publishing, 2014. – 116 с.
  130. Agufa Semenye. Criminal Profiling: A tool in investigating computer crimes. – М.: LAP Lambert Academic Publishing, 2012. – 136 с.
  131. Md. Rabiul Islam,Md. Fayzur Rahman and Faculty of Electrical-Computer Engineering RUET Rajshahi Bang. IMPROVEMENT OF NOISE ROBUST SPEAKER IDENTIFICATION. – М.: LAP Lambert Academic Publishing, 2010. – 88 с.
  132. Raza Hasan. Forensic Computing. – М.: LAP Lambert Academic Publishing, 2012. – 152 с.
  133. Irfan Syamsuddin. Guidelines for Computer Forensics Investigations in Developing Country. – М.: LAP Lambert Academic Publishing, 2011. – 104 с.
  134. Damilola Julius,Mary Clarkson and Hamza Aldabbas. Prevention Of Crime In Business-to-consumer E-commerce. – М.: LAP Lambert Academic Publishing, 2012. – 188 с.
  135. Khanyisa Malufu. E-Banking Security. – М.: LAP Lambert Academic Publishing, 2013. – 112 с.
  136. Andrew Marrington. Computer Forensic Profiling. – М.: LAP Lambert Academic Publishing, 2010. – 188 с.
  137. Olugbenga Ige. Action Cyber Crime Prevention Programme in Civics and Social Studies. – М.: LAP Lambert Academic Publishing, 2012. – 140 с.
  138. GOODMAN, MARC. FUTURE CRIMES. – М.: , 2015. –  с.
  139. Conrad Joseph. The Nature of a Crime. – М.: T8RUGRAM, 2018. – 100 с.
  140. Conrad J. The Nature of a Crime. – М.: T8RUGRAM, 2018. – 100 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

Ничего не найдено

Образцы работ

Тема и предметТип и объем работы
Математические модели океанических течений
Переводоведение (теория перевода)
Курсовая работа
42 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Екатерина, 10.05
Я все посмотрела,большое спасибо! Именно так и просил преподаватель.