Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Aaron Philipp, David Cowen, Chris Davis. Hacking Exposed: Computer Forensics. – М.: McGraw-Hill, 2010. – 544 с.

Дополнительные результаты

  1. Larry Elliott and Dan Atkinson. The Gods That Failed: How Blind Faith in Markets Has Cost Us Our Future. – М.: , 2012. – 444 с.
  2. Laszlo Gyorfi. Machine Learning for Financial Engineering (Advances in Computer Science and Engineering: Texts). – М.: , 2012. – 250 с.
  3. Max Houck. Smart Guide To Forensic Careers. – М.: , 2012. – 272 с.
  4. Frontiers in Algorithmics and Algorithmic Aspects in Information and Management: Joint International Conference, FAW-AAIM 2012, Beijing, China, May ... Computer Science and General Issues). – М.: , 2012. – 400 с.
  5. Public Key Infrastructures, Services and Applications: 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected ... Computer Science / Security and Cryptology). – М.: , 2012. – 219 с.
  6. Cloud Computing and Services Science (Service Science: Research and Innovations in the Service Economy). – М.: , 2012. – 405 с.
  7. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с.
  8. Social Computing, Behavioral-Cultural Modeling and Prediction: 5th International Conference, SBP 2012, College Park, MD, USA, April 3-5, 2012, ... Applications, incl. Internet/Web, and HCI). – М.: , 2012. – 380 с.
  9. Technological Innovation for Value Creation: Third IFIP WG 5.5/SOCOLNET Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS ... in Information and Communication Technology). – М.: , 2012. – 607 с.
  10. Video Analytics for Business Intelligence (Studies in Computational Intelligence). – М.: , 2012. – 388 с.
  11. Karen Mcneil. How to Land a Top-Paying Forensic accountants Job: Your Complete Guide to Opportunities, Resumes and Cover Letters, Interviews, Salaries, Promotions, What to Expect From Recruiters and More. – М.: , 2012. – 86 с.
  12. Sara Gibson. How to Land a Top-Paying Computer help desk representatives Job: Your Complete Guide to Opportunities, Resumes and Cover Letters, Interviews, ... What to Expect From Recruiters and More. – М.: , 2012. – 90 с.
  13. James A. Hall. Accounting Information Systems. – М.: , 0. – 0 с.
  14. Domingo Tavella. Quantitative Methods in Derivatives Pricing: An Introduction to Computational Finance. – М.: , 0. – 0 с.
  15. Jack J. Champlain. Auditing Information Systems. – М.: , 0. – 0 с.
  16. G. Jack Bologna, Robert J. Lindquist. Fraud Auditing and Forensic Accounting. – М.: , 0. – 0 с.
  17. Constance S. Hawke, Constance S. Hawke. Computer and Internet Use on Campus: A Legal Guide to Issues of Intellectual Property, Free Speech, and Privacy. – М.: , 0. – 0 с.
  18. Markov Networks in Evolutionary Computation (Adaptation, Learning, and Optimization). – М.: , 2012. – 264 с.
  19. James W. Cortada. Before the Computer. – М.: , 0. – 0 с.
  20. James W. Cortada. The Digital Hand: How Computers Changed the Work of American Manufacturing, Transportation, and Retail Industries. – М.: , 0. – 0 с.
  21. David Chanoff, Ejovi Nuwere. Hacker Cracker : A Journey from the Mean Streets of Brooklyn to the Frontiers of Cyberspace. – М.: , 0. – 0 с.
  22. Frank Levy, Richard J. Murnane. The New Division of Labor: How Computers Are Creating the Next Job Market. – М.: , 0. – 0 с.
  23. Michael Prietula, Kathleen, Les Gasser, Kathleen Carley, Leslie George Gasser. Simulating Organizations: Computational Models of Institutions and Groups. – М.: , 0. – 0 с.
  24. Zhiang Lin, Kathleen M. Carley. Designing Stress Resistant Organizations: Computational Theorizing and Crisis Applications (Information and Organization Design Series). – М.: , 0. – 0 с.
  25. Anantha Kumar Duraiappah. Computational Models in the Economics of Environment and Development (Economy & Environment, 27). – М.: , 0. – 0 с.
  26. Abdullah Abdul-Gader, Abdullah H. Al-Abdul-Gader. Managing Computer Based Information Systems in Developing Countries: A Cultural Perspective. – М.: , 0. – 0 с.
  27. Roger A. McCain. Agent-Based Computer Simulation of Dichotomous Economic Growth (ADVANCES IN COMPUTATIONAL ECONOMICS Volume 13). – М.: , 0. – 0 с.
  28. Mario J. Miranda, Paul L. Fackler. Applied Computational Economics and Finance. – М.: , 0. – 0 с.
  29. Hans M. Amman, David A. Kendrick, John Rust. Handbook of Computational Economics. – М.: North Holland, 1996. – 832 с.
  30. Kumaraswamy Velupillai. Computable Economics: The Arne Ryde Memorial Lectures (Arne Ryde Memorial Lectures). – М.: , 0. – 0 с.
  31. G. M. P. Swann, Martha Prevezer, David Stout, G. M. Peter Swann, David K. Stout. The Dynamics of Industrial Clustering: International Comparisons in Computing and Biotechnology. – М.: , 0. – 0 с.
  32. Steffen Jrgensen, Georges Zaccour. Optimal Control and Differential Games: Essays in Honor of Steffen Jorgensen (Advances in Computational Management Science). – М.: , 0. – 0 с.
  33. Soren S. Nielsen. Programming Languages and Systems in Computational Economics and Finance (Advances in Computational Economics, 18). – М.: , 0. – 0 с.
  34. Abdul Bangura. Computer Programming to Insure Project Accountability in Africa. – М.: , 0. – 0 с.
  35. Abdol S. Soofi, Liangyue Cao. Modelling and Forecasting Financial Data: Techniques of Nonlinear Dynamics (Studies in Computational Finance, Volume 2). – М.: , 0. – 0 с.
  36. Thomas Brenner. Computational Techniques for Modelling Learning in Economics (Advances in Computational Economics, V. 11). – М.: , 0. – 0 с.
  37. Francesco Luna, Benedikt Stefansson. Economic Simulations in Swarm: Agent-Based Modelling and Object (ADVANCES IN COMPUTATIONAL ECONOMICS Volume 14). – М.: , 0. – 0 с.
  38. Virginia?Ferrell Andersen. Digital Recall: Computers Aren't the Only Ones With Memory. – М.: , 0. – 0 с.
  39. Suparna Damany, Jack Bellis. It's Not Carpal Tunnel Syndrome! RSI Theory & Therapy for Computer Professionals. – М.: , 0. – 0 с.
  40. Paul Linden. Comfort at Your Computer: Body Awarness Training for Pain-Free Computer Use. – М.: , 0. – 0 с.
  41. Peter D. Barnett. Ethics in Forensic Science: Professional Standards for the Practice of Criminalistics. – М.: , 0. – 0 с.
  42. Deborah G. Johnson, Helen Nissenbaum. Computers, Ethics and Social Values. – М.: , 0. – 0 с.
  43. Terrell Ward Bynum, Simon Rogerson, Blackwell Pub. Computer Ethics and Professional Responsibility: Introductory Text and Readings. – М.: , 0. – 0 с.
  44. Tom Forester, Perry Morrison. Computer Ethics, Second Edition: Cautionary Tales and Ethical Dilemmas in Computing. – М.: , 0. – 0 с.
  45. Alessandro Lomi, Erik R. Larsen. Dynamics of Organizations: Computational Modeling and Organizational Theories. – М.: AAAI Press, 2001. – 352 с.
  46. Computer-Supported Cooperative Work : A Book of Readings. – М.: , 0. – 0 с.
  47. Lila B. Stair, Leslie Stair. Careers in Computers, Third Edition. – М.: , 0. – 0 с.
  48. Janet Ruhl. Computer Job Survival Guide. – М.: , 0. – 0 с.
  49. Don Knowles. Today's Technician: Automotive Computer Systems. – М.: , 0. – 0 с.
  50. Joan Vaughn. COMPUTER TECH CAREER STARTER 2E. – М.: , 0. – 0 с.
  51. Lila B. Stair, Leslie Stair. Careers in Computers, Third Edition. – М.: , 0. – 0 с.
  52. Peter Meyer. Getting Started in Computer Consulting. – М.: , 0. – 0 с.
  53. Considering Computer Contracting? : How to become a successful freelance computer professional ("Computer Weekly" Professional S.). – М.: , 0. – 0 с.
  54. Erricos John Kontoghiorghes, Berc Rustem, Stavros Siokos. Computational Methods in Decision-Making, Economics and Finance (Applied Optimization, 74). – М.: , 0. – 0 с.
  55. Information Warfare : corporate attack and defence in a digital world (Computer Weekly Professional (Paperback)). – М.: , 0. – 0 с.
  56. Blythe Camenson. Opportunities in Forensic Science Careers. – М.: , 0. – 0 с.
  57. Janet Ruhl. Janet Ruhl's Answers for Computer Contractors: How to Get the Highest Rates and the Fairest Deals from Consulting Firms, Agencies, and Clients. – М.: , 0. – 0 с.
  58. Carol L. Covin. The Best Computer Jobs in America: 20 Minutes from Home. – М.: , 0. – 0 с.
  59. Susan Echaore-McDavid. Career Opportunities in Law Enforcement, Security, and Protective Services (The Career Opportunities Series). – М.: , 0. – 0 с.
  60. Richard H. Berube. Computer Simulated Experiments for Digital Electronics Using Electronics Workbench. – М.: , 0. – 0 с.
  61. W. Prasad Kodali. Engineering Electromagnetic Compatibility : Principles, Measurements, Technologies, and Computer Models. – М.: , 0. – 0 с.
  62. Natalie F. Harris, Nils Conrad Persson. ES&T Mag.Presents Computer Troubleshooting & Repair. – М.: , 0. – 0 с.
  63. Kenneth C. Mansfield, James L. Antonakos. Introduction to Computers for Engineering and Technology. – М.: , 0. – 0 с.
  64. Dan L. Beeson. Assembling and Repairing Personal Computers (2nd Edition). – М.: , 0. – 0 с.
  65. Richard H. Berube. Computer Simulated Experiments for Electronic Devices Using Electronics Workbench (2nd Edition). – М.: , 0. – 0 с.
  66. Richard H. Berube, Richard Berube. Computer Simulated Experiments for Electric Circuits Using Electronics Workbench (2nd Edition). – М.: , 0. – 0 с.
  67. The Linear Complementarity Problem (Computer Science and Scientific Computing). – М.: , 0. – 0 с.
  68. George D. Hack. Site Selection for Growing Companies. – М.: , 0. – 0 с.
  69. Ravi Kalakota, Andrew B. Whinston, Coordination, and Collaboration Conference 1 Organizational Computing. Readings in Electronic Commerce. – М.: , 0. – 0 с.
  70. T. F. Peterson. Nightwork: A History of Hacks and Pranks at MIT. – М.: The MIT Press, 2003. – 190 с.
  71. Roland Traunmuller, R. Traunmuller, Quebec) Ifip World Computer Congress 2002 Montreal. Information Systems: The E-Business Challenge (International Federation for Information Processing, 95). – М.: , 0. – 0 с.
  72. G. David Garson, G. David Information Technology and Computer Applications in Garson. Public Information Technology: Policy and Management Issues. – М.: , 0. – 0 с.
  73. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с.
  74. Bonnie Biafore. Online Investing Hacks (Hacks). – М.: , 0. – 0 с.
  75. Richard Hack. Clash of the Titans: How the Unbridled Ambition of Ted Turner and Rupert Murdoch Has Created Global Empires that Control What We Read and Watch Each Day. – М.: , 2003. – 0 с.
  76. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с.
  77. Richard Hack. Hughes: The Private Diaries, Memos and Letters; The Definitive Biography of the First American Billionaire. – М.: , 2006. – 456 с.
  78. MacDonnell Ulsch. THREAT! Managing RISK in a HOSTILE World. – М.: , 2008. – 197 с.
  79. Andrew Feinstein. The Shadow World: Inside the Global Arms Trade. – М.: Hamish Hamilton, 2011. – 702 с.
  80. Wing Kam Fung, Yue-Qing Hu. Statistical DNA Forensics: Theory, Methods and Computation. – М.: Wiley, 2008. – 262 с.
  81. Terrence V. Lillard. Digital Forensics for Network, Internet, and Cloud Computing. – М.: , 2010. – 368 с.
  82. Editor Dave Kleiman. The Official CHFI: Exam 312-49: Study Guide. – М.: Syngress, 2010. – 964 с.
  83. Micah Solomon. Computer Forensics JumpStartTM. – М.: , 2004. – 304 с.
  84. Nightwork: A History of Hacks and Pranks at MIT. – М.: The MIT Press, 2011. – 248 с.
  85. MJ COMPUTER. Ball Data Processing In Medicine: How To Select A Computerized Hospital Information Systm. – М.: , 1973. – 0 с.
  86. Ian Hacking. The Social Construction of What ?. – М.: , 1999. – 270 с.
  87. Ian Hacking. Rewriting the Soul – Multiple Personality & The Sciences of Memory (Paper). – М.: , 1998. – 346 с.
  88. Ian Hacking. Mad Travelers – Reflections on the Reality of Transient Mental Illnesses (COBE). – М.: , 2002. – 256 с.
  89. Linda Volonino. Computer Forensics For Dummies®. – М.: , 2008. – 384 с.
  90. Michael Sheetz. Computer Forensics. – М.: , 2007. – 176 с.
  91. Ian Hacking. Historical Ontology. – М.: , 2002. – 320 с.
  92. R COMPUTERS. Dehaene Computers In Radiology. – М.: , 1971. – 0 с.
  93. Apple Computer. Learning Carbon. – М.: , 2001. – 360 с.
  94. Apple Computer. Learning Cocoa. – М.: , 2001. – 384 с.
  95. Michael G. Solomon. Computer Forensics JumpStart. – М.: , 2011. – 336 с.
  96. COMPUTER. Computer School ?mastering? Multiplan Tm (paper On Ly). – М.: , 1984. – 0 с.
  97. Center for Professional Computer Education. Multimate ProfessionalTM. – М.: , 1986. – 240 с.
  98. Center for Professional Computer Education. DisplayWrite III. – М.: , 1987. – 224 с.
  99. Center for Professional Computer Education. WordStar®. – М.: , 1987. – 192 с.
  100. Center for Professional Computer Education. LOTUS 1–2–3 Quick Reference Handbook. – М.: , 1986. – 240 с.
  101. Ian Hacking. The Social Construction of What?. – М.: , 2000. – 272 с.
  102. Erik Laykin. Investigative Computer Forensics. – М.: , 2011. – 320 с.
  103. COMPUTER PART. Computer Partners: Handbook Of Cobol Techniques & Programming Standards 3ed (pr Only). – М.: , 1993. – 0 с.
  104. Hacking Exposed Windows: Microsoft Windows Security Secrets And Solutions, Third Edition. – М.: , 2011. – 451 с.
  105. Hacking Exposed Web 2.0: Web 2.0 Security Secrets And Solutions. – М.: , 2011. – 258 с.
  106. Hacking Exposed Malware And Rootkits. – М.: , 2011. – 400 с.
  107. Mind Performance Projects For The Evil Genius: 19 Brain-Bending Bio Hacks. – М.: , 2011. – 240 с.
  108. Hacking Exposed, Sixth Edition. – М.: , 2011. – 720 с.
  109. Aaron Philipp, David Cowen, Chris Davis. Hacking Exposed: Computer Forensics. – М.: McGraw-Hill, 2010. – 544 с.
  110. Johnny Cache, Joshua Wright, Vincent Liu. Hacking Exposed: Wireless. – М.: McGraw-Hill, 2010. – 512 с.
  111. Hacking Exposed Web Applications, 3Rd Edition. – М.: , 2011. – 482 с.
  112. Hacker'S Challenge 3. – М.: , 2011. – 400 с.
  113. David Endler, Mark Collier. Hacking Exposed VoIP: Voice Over Ip Security Secrets & Solutions. – М.: McGraw-Hill Osborne Media, 2006. – 574 с.
  114. Hacking Exposed Cisco Networks. – М.: , 2011. – 400 с.
  115. Hacking Exposed Linux. – М.: , 2011. – 813 с.
  116. Chris Prosise, Kevin Mandia, Matt Pepe. Incident Response & Computer Forensics. – М.: McGraw-Hill/Osborne, 2003. – 508 с.
  117. Eoghan Casey. Digital Evidence and Computer Crime. – М.: , . –  с.
  118. Inc. KT Solutions, KT Solutions has focused on what it takes to create efficient, professional multimedia training t KT Solutions specializes in the development of interactive multimedia training products for computer applications. Over the past decade. Beginning Windows NT Workstation 4.0 (Microsoft Windows NT). – М.: , . –  с.
  119. Inc. KT Solutions, KT Solutions has focused on what it takes to create efficient, professional multimedia training t KT Solutions specializes in the development of interactive multimedia training products for computer applications. Over the past decade. Advanced Word for Office 97 (Microsoft Word 97). – М.: , . –  с.
  120. Ben Jackson, Champ Clark. Asterisk Hacking. – М.: , 2007. – 272 с.
  121. Committee on DNA Technology in Forensic Science, National Research Council. DNA Technology in Forensic Science. – М.: National Academies Press, 1992. – 200 с.
  122. Jefferson Hack. Another Fashion Book. – М.: , 2009. – 272 с.
  123. Charles L. Brooks. CHFI: Computer Hacking Forensic Investigator Certification: Exam Guide (+ CD). – М.: McGraw-Hill Education, 2015. – 656 с.
  124. Cambridge Learner's Dictionary (+ CD-ROM). – М.: Cambridge University Press, 2012. – 890 с.
  125. Swagota Bera and Monisha Sharma. Statistical and Visual Detection of Real Time Stego Images. – М.: LAP Lambert Academic Publishing, 2015. – 104 с.
  126. Mubichakani Joseph Mukuyuni. Computer Based Learning In Mathematics. – М.: LAP Lambert Academic Publishing, 2012. – 112 с.
  127. Mohamed Abd El-Hack,Ali Askar and Khalid Mahrose. Heat stress alleviation in laying hens using antioxidants. – М.: LAP Lambert Academic Publishing, 2011. – 192 с.
  128. Kirti Rani. Computers & Biotechnology. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  129. Sedigheh Vahdat. Computer-assisted Reading Comprehension. – М.: LAP Lambert Academic Publishing, 2011. – 192 с.
  130. Anjan Kumar Payra. Steganology for the Computer Forensics Examiners. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  131. Agufa Semenye. Criminal Profiling: A tool in investigating computer crimes. – М.: LAP Lambert Academic Publishing, 2012. – 136 с.
  132. Md. Rabiul Islam,Md. Fayzur Rahman and Faculty of Electrical-Computer Engineering RUET Rajshahi Bang. IMPROVEMENT OF NOISE ROBUST SPEAKER IDENTIFICATION. – М.: LAP Lambert Academic Publishing, 2010. – 88 с.
  133. Palaniappan Shamala and Abd Manaf Azizah. Digital Computer Forensic: Validation and Verification for Disk Imaging. – М.: LAP Lambert Academic Publishing, 2012. – 124 с.
  134. Raza Hasan. Forensic Computing. – М.: LAP Lambert Academic Publishing, 2012. – 152 с.
  135. Irfan Syamsuddin. Guidelines for Computer Forensics Investigations in Developing Country. – М.: LAP Lambert Academic Publishing, 2011. – 104 с.
  136. April L. Tanner and David A. Dampier. Digital Forensic Investigations Visualized. – М.: LAP Lambert Academic Publishing, 2011. – 160 с.
  137. Andrew Marrington. Computer Forensic Profiling. – М.: LAP Lambert Academic Publishing, 2010. – 188 с.
  138. Paresh Kerai. Remote Access Forensics for VNC and RDP on Windows Platform. – М.: LAP Lambert Academic Publishing, 2012. – 168 с.
  139. Kazeem Osuolale. A Study Of Computer Software In Secondary School Mathematics. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  140. Michael Hale Ligh, Andrew Case, Jamie Levy, AAron Walters. The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory. – М.: Wiley, . – 912 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

Ничего не найдено

Образцы работ

Тема и предметТип и объем работы
Симуляция психических расстройств
Юридическая психология
Реферат
21 стр.
Математические модели океанических течений
Переводоведение (теория перевода)
Курсовая работа
42 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Светлана
Благодарим Вас за консультации - только сегодня получили последние результаты. Везде "отлично" или зачет. Спасибо Вам огромное!! Светлана