Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Managing Technology in the Operations Function (Securities Institute Global Capital Markets Series). – М.: , 0. – 0 с.
  2. Aspatore Books Staff. Inside the Minds: Security Matters - Industry Leaders from eBay, Inc., Motorola, Internet Security Systems & More on Protecting Your Most Valuable Assets. – М.: , 0. – 0 с.
  3. Mehdi Khosrow-Pour. Web Technologies for Commerce and Services Online. – М.: Idea Group Reference, 2007. – 392 с.
  4. Global Perspectives In Information Security. – М.: , 2008. – 896 с.
  5. Mark J. Miller, Stephen Castles. The Age of Migration: International Population Movements in the Modern World. – М.: The Guilford Press, 2009. – 370 с.
  6. Qerim Qerimi. A World Interconnected: Sovereignty, Security And Globalization. – М.: LAP Lambert Academic Publishing, 2013. – 80 с.
  7. Vadim Tarasov. Economic Security: Case of Russia. – М.: LAP Lambert Academic Publishing, 2013. – 112 с.

Дополнительные результаты

  1. John Wang. Project Management Techniques and Innovations in Information Technology. – М.: , 2012. – 342 с.
  2. Frontiers in Algorithmics and Algorithmic Aspects in Information and Management: Joint International Conference, FAW-AAIM 2012, Beijing, China, May ... Computer Science and General Issues). – М.: , 2012. – 400 с.
  3. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с.
  4. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  5. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с.
  6. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с.
  7. P. Jayarama Reddy. Solar Power Generation: Technology, New Concepts & Policy. – М.: , 2012. – 264 с.
  8. John Wang. Innovations in Information Systems for Business Functionality and Operations Management. – М.: , 2012. – 378 с.
  9. Madhu Agrawal. Global Competitiveness in the Pharmaceutical Industry: The Effect of National Regulatory, Economic, and Market Factors. – М.: , 0. – 0 с.
  10. Leigh Wade. Careers in Private Security: How to Get Started, How to Get Ahead. – М.: , 0. – 0 с.
  11. Philip Kelly. Landscapes of Globalization : Globalized Development in the Philippines. – М.: , 0. – 0 с.
  12. P. J. Boon, B. R. Davies, Geoffrey E. Petts, Bryan Davies. Global Perspectives in River Conservation. – М.: , 0. – 0 с.
  13. George G. Kaufman. Bank Problems: A Global Perspective. – М.: , 0. – 0 с.
  14. Mo Adam Mahmood, Edward J. Szewczak. Measuring Information Technology Investment Payoff: Contemporary Approaches (Series in Information Technology Management). – М.: , 0. – 0 с.
  15. John C. Crotts, Dimitrios Buhalis, Roger March. Global Alliances in Tourism and Hospitality Management. – М.: , 0. – 0 с.
  16. Mark B. Desman. Building an Information Security Awareness Program. – М.: , 0. – 0 с.
  17. Felix B., Ph.D. Tan. Global Perspective of Information Technology Management. – М.: , 0. – 0 с.
  18. Mehdi Khosrowpour. Organizational Achievement and Failure in Information Technology Management (Cases on Information Technology Series, Vol 2, Part 1). – М.: , 0. – 0 с.
  19. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с.
  20. Ifip Tc11 Wg11.5 Working Conference on Integrity and Internal Control, Michael Gertz. Integrity and Internal Control in Information Systems V: Ifip Tc11/Wg11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (Iicis), November 11-12, 2002, Bonn, Germany (International Federation for Information Processing. – М.: , 0. – 0 с.
  21. Mehdi Khosrow-Pour. Advanced Topics in Information Resources Management, Volume 2. – М.: , 0. – 0 с.
  22. Edward J., Ph.D. Szewczak, Coral R., Ph.D. Snodgrass. Human Factors in Information Systems. – М.: , 0. – 0 с.
  23. Mehdi Khosrow-Pour. Advanced Topics in Information Resources Management (Advanced Topics in Information Resources Management, Vol 3). – М.: , 0. – 0 с.
  24. Steve Purser. A Practical Guide to Managing Information Security (Artech House Technology Management Library). – М.: , 0. – 0 с.
  25. Hans Muhlbacher, Lee Dahringer, Helmuth Leihs. International Marketing: A Global Perspective. – М.: , 0. – 0 с.
  26. Marian Quigley, Marian Quiqley. Information Security and Ethics: Social and Organizational Issues. – М.: , 0. – 0 с.
  27. C. Warren Axelrod, Axelrod. Outsourcing Information Security. – М.: , 0. – 0 с.
  28. Eugene Kaluzniacky. Managing Psychological Factors in Information Systems Work: An Orientation to Emotional Intelligence. – М.: , 0. – 0 с.
  29. Harold F. Tipton, Micki Krause, Micki, Cissp Krause. Information Security Management Handbook, Fifth Edition. – М.: , 0. – 0 с.
  30. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с.
  31. Krista Scott-Dixon. Doing It: Women Working In Information Technology (Women's Issues Publishing Program) (Women's Issues Publishing Program). – М.: , 2004. – 0 с.
  32. Monle Lee. Principles Of Advertising: A Global Perspective. – М.: , 2005. – 0 с.
  33. Practicing E-government: A Global Perspective. – М.: , 2005. – 0 с.
  34. Advanced Topics in Information Resources Management (Advanced Topics in Information Resources Management). – М.: , 2004. – 0 с.
  35. Lan-Hung Nora Chiang. The Challenges of Globalization: Cultures in Transition in the Pacific-Asia Region : Cultures in Transition in the Pacific-Asia Region. – М.: , 2004. – 0 с.
  36. Causal Mapping for Research in Information Technology. – М.: , 2005. – 0 с.
  37. Economics of Information Security (Advances in Information Security). – М.: , 2004. – 0 с.
  38. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с.
  39. Laura P. Hartman. Perspectives in Business Ethics. – М.: McGraw-Hill Irwin, 2004. – 816 с.
  40. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с.
  41. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с.
  42. Consumer Bankruptcy in Global Perspective. – М.: , 2004. – 0 с.
  43. Peter B. Orlik. Career Perspectives In Electronic Media. – М.: Blackwell Publishers, 2004. – 238 с.
  44. Ira Winkler. Zen and the Art of Information Security. – М.: , 2007. – 192 с.
  45. Timothy P. Layton. Information Security. – М.: , 2006. – 222 с.
  46. Curtis J. Bonk, Charles R. Graham. The Handbook of Blended Learning: Global Perspectives, Local Designs. – М.: , 2005. – 624 с.
  47. Michael E. Whitman, Herbert J. Mattord. Principles of Information Security, Second Edition. – М.: , 2004. – 600 с.
  48. Monle Lee, Carla Johnson. Principles Of Advertising: A Global Perspective. – М.: , 2005. – 427 с.
  49. Ilan Alon. Service Franchising: A Global Perspective. – М.: Springer, 2005. – 288 с.
  50. Uncovering Labour in Information Revolutions, 1750-2000 (International Review of Social History Supplements). – М.: , 2004. – 268 с.
  51. Hans Muhlbacher, Helmuth Leihs and Lee Dahringer. International Marketing: A Global Perspective. – М.: Thomson Learning, 2006. – 738 с.
  52. Marios I. Katsioloudes, Spyros Hadjidakis. International Business: A Global Perspective. – М.: Elsevier, 2007. – 728 с.
  53. Roger I. Cartwright. Key Concepts in Information and Communication Technology. – М.: Palgrave Macmillan, 2005. – 232 с.
  54. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с.
  55. Patrick Traynor, Patrick McDaniel, Thomas La Porta. Security for Telecommunications Networks (Advances in Information Security). – М.: , 2008. – 182 с.
  56. Thomas H. McInish. Capital Markets: A Global Perspective. – М.: , 2008. – 448 с.
  57. Ibp Usa. Global National Intelligence and Security Agencies Handbook. – М.: , 2008. – 300 с.
  58. Social and Human Elements of Information Security: Emerging Trends and Countermeasures (Premier Reference Source). – М.: , 2008. – 412 с.
  59. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с.
  60. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с.
  61. Gerard Blokdijk, Ivanka Menken. Information Security Management Best Practice Workbook: Implementation and Management Roadmap for Threats, Challenges and Solutions - Ready to use supporting documents bringing Theory into Practice. – М.: , 2008. – 124 с.
  62. Algorithmic Aspects in Information and Management: 4th International Conference, AAIM 2008, Shanghai, China, June 23-25, 2008, Proceedings (Lecture Notes in Computer Science). – М.: , 2008. – 350 с.
  63. Philip Kotler, Gary Armstrong, Ang Swee Hoon, Leong Siew Meng, Tan Chin Tiong, Oliver Yau. Principles of Marketing: A Global Perspective. – М.: , 2008. – 736 с.
  64. Svend Hollensen. Essentials of Global Marketing. – М.: , 2009. – 528 с.
  65. Hamid R. Nemati. Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues (Advances in Information Security and Privacy). – М.: , 2009. – 414 с.
  66. W. Krag Brotby. Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement. – М.: Auerbach Publications, 2009. – 200 с.
  67. Alan Calder. Information Security based on ISO 27001/ISO 27002: A Management Guide. – М.: , 2009. – 83 с.
  68. Bel G. Raggad. Information Security Management: Concepts and Practice. – М.: , 2010. – 871 с.
  69. Michael E. Whitman, Herbert J. Mattord. Management of Information Security. – М.: , 2010. – 592 с.
  70. Alan Calder, Steve G Watkins. Information Security Risk Management for ISO27001 / ISO27002. – М.: , 2010. – 198 с.
  71. William Manning. CISM Certified Information Security Manager Certification Exam Preparation Course in a Book for Passing the CISM Exam - The How To Pass on Your First Try Certification Study Guide. – М.: , 2010. – 188 с.
  72. Alan Hevner, Samir Chatterjee. Design Research in Information Systems: Theory and Practice (Integrated Series in Information Systems). – М.: , 2010. – 393 с.
  73. Editors Karl Maria Michael de Leeuw, Jan Bergstra. The History of Information Security: A Comprehensive Handbook. – М.: Elsevier Science, 2007. – 900 с.
  74. Wilfrid S. Kendall, Ilya Molchanov. New Perspectives in Stochastic Geometry. – М.: , 2010. – 608 с.
  75. Global Perspectives In Information Security. – М.: , 2008. – 896 с.
  76. Kevin D. Mitnick. The Art of Intrusion. – М.: , 2005. – 270 с.
  77. David Avison. Research in Information Systems. – М.: , 2010. – 344 с.
  78. CORNELIUS. MEANING AND METHOD IN INFORMATION STUDIESInformation Management Policies & (AXIM). – М.: , 2010. – 0 с.
  79. John R. Vacca. Managing Information Security. – М.: , 2010. – 320 с.
  80. G. Manoilov. Elsevier's Dictionary of Information Security. – М.: , 2010. – 772 с.
  81. Adib Kanafani. Global Competition in Transportation Markets,13. – М.: , 2010. – 274 с.
  82. Debasis Bagchi. Global Perspectives on Childhood Obesity. – М.: , 2010. – 544 с.
  83. Glenn B. Stracher. Coal and Peat Fires: A Global Perspective. – М.: , 2010. – 556 с.
  84. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с.
  85. Stuart K. Card. Readings in Information Visualization. – М.: , 2010. – 712 с.
  86. Lou Sepulveda. Surviving in the Security Alarm Business. – М.: , 2010. – 256 с.
  87. Carole Brooke. Critical Management Perspectives on Information Systems. – М.: , 2010. – 304 с.
  88. George L Stefanek. Information Security Best Practices. – М.: , 2010. – 160 с.
  89. Sari Greene. Sustainable Information Security. – М.: , 2010. – 400 с.
  90. Gustavo V. Barbosa-Canova. Global Issues in Food Science and Technology. – М.: , 2010. – 520 с.
  91. John R. Vacca. Computer and Information Security Handbook. – М.: , 2010. – 928 с.
  92. J. Tsuji. Perspectives in Organopalladium Chemistry for the 21st Century. – М.: , 2010. – 0 с.
  93. Author Unknown. Perspectives in Brain Research,45. – М.: , 2010. – 0 с.
  94. Robert Geroch. Perspectives in Computation. – М.: , 2009. – 208 с.
  95. Robert Geroch. Perspectives in Computation. – М.: , 2009. – 208 с.
  96. Vaclav Smil. Energy at the Crossroads – Global Perspectives and Uncertainties. – М.: , 2003. – 448 с.
  97. Joanna Waley–cohen. The Sextants of Beijing – Global Currents in Chinese History. – М.: , 1999. – 334 с.
  98. William I Robinson. Latin America and Global Capitalism – A Critical Globalization Perspective. – М.: , 2010. – 444 с.
  99. Brian R Silliman. Human Impacts on Salt Marshes – A Global Perspective. – М.: , 2009. – 408 с.
  100. Marjorie M Balzer. Tenacity of Ethnicity – A Siberian Saga in Global Perspective (Paper). – М.: , 1999. – 342 с.
  101. Langland. A Feminist Perspective in the Academy. – М.: , 1983. – 168 с.
  102. Dorothy N Gamble. Community Practice Skills – Local to Global Perspectives. – М.: , 2009. – 480 с.
  103. Alexander Lennon. Global Powers in the 21st Century – Strategy and Relations. – М.: , 2008. – 432 с.
  104. Luigi Boscolo. The Times of Time – A New Perspective in Systemic Therapy & Consultation. – М.: , 1993. – 346 с.
  105. Ronald B Mitchell. Global Environmental Assessments – Information and Influence. – М.: , 2006. – 352 с.
  106. Jonas Lowgren. Thoughtful Interaction Design – A Design Perspective on Information Technology. – М.: , 2004. – 240 с.
  107. Global Advances in HIV/AIDS Monitoring and Evaluation. – М.: , 2004. – 192 с.
  108. Andre Gunder Frank. ReOrient – Global Economy in the Asian Age (Paper). – М.: , 1998. – 446 с.
  109. M Gazzaniga. Perspectives in Memory Research. – М.: , 1988. – 0 с.
  110. Ronald B Mitchell. Global Environmental Assessments – Information and Influence. – М.: , 2006. – 352 с.
  111. H B Holmes. Feminist Perspectives in Medical Ethics. – М.: , 1992. – 340 с.
  112. H Kelman. New Perspectives in Psychoanalysis. – М.: , 1965. – 0 с.
  113. Arthur Andersen?s Global Lessons in Activity–Based Management. – М.: , 1999. – 268 с.
  114. David D Dill. National Innovation and the Academic Research Enterprise – Public Policy in Global Perspective. – М.: , 2010. – 592 с.
  115. Colin Bennett. The Governance of Privacy – Policy Instruments in Global Perspective. – М.: , 2006. – 368 с.
  116. Edited by Johanna Niemi-Kiesilainen, Iain Ramsay and William C. Whitford. Consumer Bankruptcy in Global Perspective. – М.: , 2011. – 378 с.
  117. Open Source Development, Communities and Quality: IFIP 20th World Computer Congress, Working Group 2.3 on Open Source Software, September 7-10, 2008, ... in Information and Communication Technology). – М.: , 2011. – 417 с.
  118. Harold F. Tipton, Micki Krause. Information Security Management Handbook on CD-ROM, 2003 Edition. – М.: , . –  с.
  119. Rohana Mohamad Rashid. Determining Influencing Factors of Information Security Culture. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  120. Lucy K.L. Mandillah. Gender Perspectives In Advertising. – М.: LAP Lambert Academic Publishing, 2012. – 168 с.
  121. Dennis Ocholla and Johannes Britz. Research Issues in Information Studies. – М.: LAP Lambert Academic Publishing, 2011. – 224 с.
  122. John Adeyanju and Joel Ojekunle. Perspectives in Seaport and Shipping Developments in Nigeria. – М.: LAP Lambert Academic Publishing, 2014. – 216 с.
  123. Mihail Orzeata. Globalization, Crises and World Security. – М.: LAP Lambert Academic Publishing, 2013. – 148 с.
  124. CHRISTOPHER BABATUNDE OGUNYEMI. TOPICAL ISSUES IN LITERATURE AND GLOBALIZATION:. – М.: LAP Lambert Academic Publishing, 2010. – 76 с.
  125. Yedji Mbangsoua and Dr. Freddie Acosta. Information Security and its Investment Justification. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  126. Yasser Alshehri. Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 156 с.
  127. Julien Shabani. Information Security for RFID Systems. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.
  128. Debasish Jena. On Protocols for Information Security Services. – М.: LAP Lambert Academic Publishing, 2011. – 136 с.
  129. Aliyu Onipede. Biometrics as a tool for Information Security in Aviation industry. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  130. Furhan Mehmood and Rajia Rafique. Information Security in Financial Organizations. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  131. Omar Zakaria. Information Security Culture. – М.: LAP Lambert Academic Publishing, 2013. – 248 с.
  132. Saeed Soltanmohammadi. Improving Information System Security by Evaluating Human Factors. – М.: LAP Lambert Academic Publishing, 2014. – 116 с.
  133. frankie tvrz and marijke coetzee. Information Security of a Bluetooth-enabled handheld device. – М.: LAP Lambert Academic Publishing, 2010. – 180 с.
  134. Ahmed AlNunu. How Much Information Security?. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  135. Jeffy Mwakalinga. A Framework for Adaptive Information Security Systems. – М.: LAP Lambert Academic Publishing, 2011. – 364 с.
  136. Meysam Namayandeh. Development of Computer Ethical Framework for Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 132 с.
  137. Muhammad Imran Tariq. SLA based Information Security Metrics in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2014. – 192 с.
  138. Alaa Al-Deen Mohammed Hassan. Information Security Management. – М.: LAP Lambert Academic Publishing, 2013. – 188 с.
  139. Jun Zheng,Jiantao Gu and Hong Wang. Financial Management and Information Security of Independent Colleges. – М.: LAP Lambert Academic Publishing, 2014. – 256 с.
  140. Ying Qian. Mitigating Information Security Risks during Operation Transition. – М.: LAP Lambert Academic Publishing, 2012. – 372 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Наука человековедения. интервью с Д. Уолтоном, профессором London Metropolitan University, экспертом CIPD. Chartered Institute of Personnel and Development, автором программы Master of Arts in Human Resource Strategies. И. Смирнова, "Кадровый менеджмент", № 5, июль-август 2007.
  2. Договор страхования Десенналь". интервью с Ж. Туччеллой, руководителем сектора страхования рисков "Десенналь" и скрытых дефектов департамента SCOR Business Solutions компании SCOR Global P&C S.E.. С. Дедиков, "Юридическая и правовая работа в страховании", N 3, III квартал 2012 г.
  3. Регулирование операций торгового финансирования: новые инициативы. интервью с Д. Шмандом, вице-председателем Банковской комиссии ICC по supply chain finance, главой подразделения Trade Finance and Cash Management Corporates EMEA в Global Transaction Banking. GTB division Deutsche Bank. Н. Макарова, "Международные банковские операции", N 2, апрель-июнь 2012 г.
  4. О качестве сервиса, связанного с запросами на медицинскую информацию. Medical Information Service?. А. Беденков, "Ремедиум", № 1, январь 2012.
  5. Trade-in как способ обмена автомобиля. С.Н. Гордеева, "Торговля: бухгалтерский учет и налогообложение", N 2, февраль 2011 г.
  6. Услуги эквайринга: как исправить ошибки и правильно построить бизнес. интервью с Е. Виноградовой, заместителем генерального директора ЗАО "Компания объединенных кредитных карточек". UCS. компания группы Global Payments. Г.Н. Коваленко, "Расчеты и операционная работа в коммерческом банке", N 2, март-апрель 2010 г.
  7. Проблемы применения универсальной юрисдикции in absentia. Г.А. Королев, "Журнал российского права", № 10, октябрь 2009.
  8. Тонкости trade-in. С.А.Королев, "НДС. Проблемы и решения", № 8, август 2009.
  9. In-store banking - новая модель банковского бизнеса. А. Пятков, "Банковское обозрение", № 11, ноябрь 2008.

Образцы работ

Тема и предметТип и объем работы
Слияния и поглощения Мировая и Российская практика
Мировая экономика
Диплом
99 стр.
Привлекательности труда в организации
Психология
Курсовая работа
35 стр.
Технологии связей с общественностью в деятельности современных российских организаций
Экономика предприятия
Диплом
98 стр.
Особенности организации PR компании в туристическом бизнесе
Реклама и PR
Дипломный проект
71 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Вероника
Работа после вашего сопровождения очень понравилась, все хорошо.