Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Zdziarski. Hacking and Securing iOS Applications. – М.: , 2012. – с. Дополнительные результаты Constructive Side-Channel Analysis and Secure Design: Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings ... Computer Science / Security and Cryptology). – М.: , 2012. – 280 с. Kenneth S. Hackel, Joshua Livnat. Cash Flow and Security Analysis. – М.: , 0. – 0 с. Jianmin Zhao, Bruce J. Dickson, Chien-Min Zhao. Remaking the Chinese State: Strategies, Society, and Security (Asia's Transformations). – М.: , 0. – 0 с. Asset Protection and Security Management Handbook. – М.: , 0. – 0 с. Anne McKinney. Real Resumes for Police, Law Enforcement and Security Jobs: Including Real Resumes Used to Change Careers and Transfer Skills to Other Industries). – М.: , 0. – 0 с. Christopher M. Dent. Asia-Pacific Economic and Security Co-Operation: New Regional Agendas. – М.: , 0. – 0 с. Gavin Cawthra. Securing South Africa's Democracy: Defense, Development and Security in Transition (International Political Economy Series). – М.: , 0. – 0 с. Alan Gart. Regulation, Deregulation, Reregulation : The Future of the Banking, Insurance, and Securities Industries. – М.: , 0. – 0 с. Ifip Tc11 Wg11.5 Working Conference on Integrity and Internal Control, Michael Gertz. Integrity and Internal Control in Information Systems V: Ifip Tc11/Wg11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (Iicis), November 11-12, 2002, Bonn, Germany (International Federation for Information Processing. – М.: , 0. – 0 с. Jothy Rosenberg and David Remy. Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption. – М.: Sams, 2004. – 380 с. The Deregulation of the Banking and Securities Industries. – М.: , 2003. – 0 с. Stephen Penman. Financial Statement Analysis and Security Valuation. – М.: , 2003. – 0 с. Safety and Security in Tourism: Relationships, Management, and Marketing (Journal of Travel & Tourism Marketing Monographic Separates). – М.: , 2003. – 0 с. Edward Borodzicz. Risk, Crisis and Security Management. – М.: , 2005. – 0 с. Stephen Gough. Sustainability and Security within Liberal Societies: Learning to Live with the Future (Routledge Studies in Social and Political Thought). – М.: , 2008. – 148 с. Michael Blyth. Risk and Security Management: Protecting People and Sites Worldwide. – М.: , 2008. – 402 с. Environmental Change and Human Security: Recognizing and Acting on Hazard Impacts (NATO Science for Peace and Security Series C: Environmental Security). – М.: , 2008. – 480 с. Ibp Usa. Global National Intelligence and Security Agencies Handbook. – М.: , 2008. – 300 с. Ibp Usa. EU Intelligence and Security Policy and Cooperation Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Hamid R. Nemati. Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues (Advances in Information Security and Privacy). – М.: , 2009. – 414 с. John Rittinghouse, James Ransome. Cloud Computing: Implementation, Management, and Security. – М.: CRC Press, 2009. – 340 с. Jan H. Kalicki. Energy and Security : Toward a New Foreign Policy Strategy. – М.: , 2005. – 640 с. Molecular Imaging: Computer Reconstruction and Practice (NATO Science for Peace and Security Series B: Physics and Biophysics). – М.: , 2008. – 288 с. IT Audit, Control and Security. – М.: , 2010. – 792 с. Francesco Marchioni. JBoss AS 5 Development. – М.: , 2010. – 416 с. Erkki Nissinen. Basic aspects of Catechol-O-methyltransferase and the clinical applications of its inhibitors,94. – М.: , 2010. – 360 с. Robert Nisbet. Handbook of Statistical Analysis and Data Mining Applications. – М.: , 2010. – 864 с. Xueji Zhang. Electrochemical Sensors, Biosensors and their Biomedical Applications. – М.: , 2010. – 616 с. Jay Beale. Hacking and Penetration Testing Ultimate CD. – М.: , 2010. – 1 с. D S Bist. Safety and Security at Sea. – М.: , 2010. – 262 с. J. Thomas August. HIV I: Molecular Biology and Pathogenesis: Clinical Applications,49. – М.: , 2010. – 568 с. Dennis P. Nolan. Safety and Security Review for the Process Industries. – М.: , 2010. – 250 с. Cornelius T. Leondes. Fuzzy Logic and Expert Systems Applications,6. – М.: , 2010. – 416 с. Author Unknown. Frontiers in Electronics: High Temperature and Large Area Applications. – М.: , 2010. – 0 с. Anthony Caputo. Digital Video Surveillance and Security. – М.: , 2010. – 352 с. Gerard Honey. Emergency and Security Lighting. – М.: , 2010. – 224 с. Gerard Honey. Electronic Protection and Security Systems. – М.: , 2010. – 208 с. T.J. Ulrych. Information-Based Inversion and Processing with Applications,36. – М.: , 2010. – 436 с. Umer Khan. The Ultimate Cisco and Security and IP Configuration CD. – М.: , 2010. – 0 с. Jay Beale. 2008 Open Source Penetration Testing and Security Professional CD. – М.: , 2010. – 0 с. Charles Carrington. Enterprise Directory and Security Implementation Guide. – М.: , 2010. – 272 с. Robert Fischer. Loss Prevention and Security Procedures. – М.: , 2010. – 320 с. Behnam Pourdeyhimi. Imaging and Image Analysis Applications for Plastics. – М.: , 2010. – 315 с. P.J. Ortmeier. Public Safety and Security Administration. – М.: , 2010. – 208 с. Edwin Herzfeld. Managerial Economics Study Guide and Casebook – Theory, Applications and Cases 7e. – М.: , 2009. – 0 с. Jason D Ellis. Combating Proliferation – Strategic Intelligence and Security Policy. – М.: , 2007. – 320 с. Liang Pan. The United Nations in Japan?s Foreign and Security Policymaking, 1945–1992. – М.: , 2006. – 300 с. Ted Pattison, Andrew Connell, Scot Hillier, and David Mann. Inside Microsoft SharePoint 2010. – М.: Microsoft Press, 2011. – 648 с. Stuart. Politics and Security in the Southern Region of th e Atlantic Alliance. – М.: , 1988. – 0 с. Jason D Ellis. Combating Proliferation – Strategic Intelligence and Security Policy. – М.: , 2004. – 320 с. Stephen T. Welstead. Neural Network and Fuzzy Logic Applications in C/C++. – М.: , 1994. – 0 с. Stephen T. Welstead. Neural Network and Fuzzy Logic Applications in C/C++. – М.: , 1994. – 494 с. Stephen T. Welstead. Neural Network and Fuzzy Logic Applications in C/C++. – М.: , 1994. – 494 с. David Rook. 10 Principles of Secure Web Application Development. – М.: , 2010. – 408 с. Christoffer Andersson. GPRS and 3G Wireless Applications. – М.: , 2001. – 352 с. Michael E Brown. Rational Choice and Security Studies – Stephen Walt & His Critics. – М.: , 2000. – 146 с. Professor Mario Cerrato. The Mathematics of Derivatives Securities with Applications in MATLAB. – М.: , 2011. – 512 с. Smith. Delete Control and Security of Interconnected Networks Disk. – М.: , 1998. – 0 с. M. L. Munjal. Acoustics of Ducts and Mufflers With Application to Exhaust and Ventilation System Design. – М.: , 1987. – 352 с. Paul A. Calter. Introductory Algebra and Trigonometry with Applications. – М.: , 1999. – 768 с. AL Clunan. The Social Construction of Russia?s Resurgence – Aspirations, Identity, and Security Interests. – М.: , 2009. – 288 с. Carl Friedman. Introductory Algebra and Trigonometry with Applications. – М.: , 2002. – 144 с. Bruno Coppieters. Statehood and Security – Georgia after the Rose Revolution. – М.: , 2005. – 280 с. Bruno Coppieters. Statehood and Security – Georgia after the Rose Revolution. – М.: , 2005. – 280 с. Christopher Wells. Securing Ajax Applications. – М.: , 2007. – 250 с. Genserik L.L. Reniers. Multi–Plant Safety and Security Management in the Chemical and Process Industries. – М.: , 2010. – 290 с. Pramode K. Verma, Ling Wang. Voice over IP Networks: Quality of Service, Pricing and Security (Lecture Notes in Electrical Engineering). – М.: , 2011. – 200 с. Dieter Dettke. Germany Says ?No? – The Iraq War and the Future of German Foreign and Security Policy. – М.: , 2009. – 304 с. Jan H Kalicki. Energy and Security – Toward a New Foreign Policy Strategy. – М.: , 2005. – 640 с. Jan H Kalicki. Energy and Security – Toward a New Foreign Policy Strategy. – М.: , 2005. – 640 с. Kelly McGrew. Optimizing and Securing Cisco® AVVID Applications. – М.: , 2002. – 312 с. Leo J. Langevin. VSE JCL and Subroutines for Application Programmers. – М.: , 1993. – 220 с. Philip B Heymann. Terrorism, Freedom and Security – Winning Without War. – М.: , 2004. – 227 с. Lewis. Maximal Abellian Subalgebras of the Classical Alge bras and their Physical Applications. – М.: , 2003. – 448 с. Microsoft Official Academic Course. ISV Supporting Users and Troubleshooting Desktop Applications on a Microsoft® Windows® XP Operating System, Exam 70–272, Package. – М.: , 2007. – 0 с. Citrix Xenapp™ Platinum Edition Advanced Concepts: The Official Guide. – М.: , 2011. – 454 с. Locksmith And Security Professionals' Exam Study Guide. – М.: , 2011. – 368 с. Yi Qian, James Joshi, David Tipper, Prashant Krishnamurthy. Information Assurance: Dependability and Security in Networked Systems. – М.: Morgan Kaufmann, 2007. – 576 с. Tretola. Developing iOS Applications with Flex 4.5. – М.: , 2011. – с. Northrup. MCPD 70-519 Exam Ref: Designing and Developing Web Applications Using Microsoft .NET Framework 4. – М.: , 2011. – с. Northrup. MCPD 70-518 Exam Ref: Designing and Developing Windows Applications Using Microsoft .NET Framework 4. – М.: , 2012. – с. Turner. Developing Enterprise iOS Applications. – М.: , 2012. – с. Zdziarski. Hacking and Securing iOS Applications. – М.: , 2012. – с. WIELENGA. JAVA EE AND HTML5 ENTERPRISE APPLICATION DEVELOPMENT. – М.: , 2014. – с. Anand Kumar Gupta and Ashish Tiwari. Micromechanical and Electrical Study on Ternary Polymer Blends. – М.: LAP Lambert Academic Publishing, 2014. – 184 с. Muhammad Wasim and Abdulbasit Shaikh. Rasterstereography Based Partial Face Recognition. – М.: LAP Lambert Academic Publishing, 2014. – 64 с. Wenhua Wang and Yu Lei. Web Application Testing And Security Testing Techniques Design. – М.: LAP Lambert Academic Publishing, 2011. – 96 с. Rajani Sharma and Rajender Trivedi. Data Security in a Cloud Environment using Multilevel UEC. – М.: LAP Lambert Academic Publishing, 2014. – 84 с. Kanjalochan Jena and Brinda Bhowmick. Optimization Of 3 Dimensional Tunnel Fet And Its Digital Applications. – М.: LAP Lambert Academic Publishing, 2014. – 72 с. Ajit Danti and Hiremath P. S. Face Detection & Recognition. – М.: LAP Lambert Academic Publishing, 2012. – 140 с. Mowdudur Rahman Dewan,Riasad Amin and Navid Bin Sakhawat. Ensuring Energy Security. – М.: LAP Lambert Academic Publishing, 2012. – 84 с. Abdul Kareem and Mohammad Fazle Azeem. Soft Computing Based Control: Theory and Simulation. – М.: LAP Lambert Academic Publishing, 2012. – 124 с. Shaikh Salim and Shankar Nawale. Secure Access of RFID System. – М.: LAP Lambert Academic Publishing, 2012. – 96 с. Ahmed Ullah Abu Saeed,Al Mamun and A.H.M. Zadidul Karim. Study and Applications of PLCs. – М.: LAP Lambert Academic Publishing, 2013. – 96 с. Mohammad Jafar Taghizadehmarvast. Analog to Digital Converter For High Speed and Low Power Application. – М.: LAP Lambert Academic Publishing, 2015. – 140 с. Zahid Abbas and Shafqat Abbas. Automatic Surveillance Vehicle design and Applications. – М.: LAP Lambert Academic Publishing, 2013. – 132 с. Iraj Sadegh Amiri,Ali Nikoukar and Sayed Ehsan Alavi. Soliton and Radio over Fiber (RoF) Applications. – М.: LAP Lambert Academic Publishing, 2014. – 84 с. Anshul Sharma and Sunil Agrawal. Filters In Halftone Visual Cryptography Via Error Diffusion. – М.: LAP Lambert Academic Publishing, 2013. – 108 с. Niraj Topare and Sunita Raut. Photocatalytic Reactor Design and It's Application. – М.: LAP Lambert Academic Publishing, 2012. – 68 с. Vijay Khare. Strategic and Security Thoughts of Dr. Babasaheb Ambedkar. – М.: Scholars' Press, 2013. – 188 с. Remya Scaria. Lipase Enzyme Production using Bacteria and its Industrial Application. – М.: LAP Lambert Academic Publishing, 2013. – 88 с. Dr.Ram Raj Meena and Subrata Mukharjee. Application of PGRs and chemicals on guava. – М.: LAP Lambert Academic Publishing, 2011. – 120 с. Mutari Abubakari. Handling and 1-MCP Application on the Quality and Shelf Life of Tomato. – М.: LAP Lambert Academic Publishing, 2011. – 100 с. A. Irshad,Biju P. Habeeb and P. Gokulakrishnan. Applications of nanotechnology in food packaging and food safety. – М.: Scholars' Press, 2013. – 128 с. Ashwini Singh,Ravindra Kumar and Vinaya Kumar Singh. Effect of RSC water and gypsum application on crop production. – М.: LAP Lambert Academic Publishing, 2014. – 76 с. Mr. Muhammad Shahbaz,Prof. Dr. Anwar-ul-Hassan and Wazir Ahmed. Improving growth and Yield of Okra through Slurry and compost application. – М.: LAP Lambert Academic Publishing, 2011. – 112 с. Okorie Ndukwe,Paul Baiyeri and Cosmas Muoneke. Plantain Hybrids: Influence of Fertilizer Type and Time of Application. – М.: LAP Lambert Academic Publishing, 2012. – 120 с. Sitaram Kumawat,R.K. Mathukia and M.K. Khistaria. Greengram Response to Phosphorus and Sulphur. – М.: LAP Lambert Academic Publishing, 2014. – 148 с. Shailendra Bajpai and J. P. Gupta. Site Security. – М.: LAP Lambert Academic Publishing, 2011. – 88 с. Kawther Ahmed and Karima Hagagg. Microwave Synthesis and Its Textile Application. – М.: LAP Lambert Academic Publishing, 2013. – 88 с. More Ashok. Ru Amide Organometallics and Catalytic, pharma Applications. – М.: LAP Lambert Academic Publishing, 2011. – 164 с. Said Shehata,Omaima Darwish and Yasser Ahmed. Compost and its application in Egypt. – М.: LAP Lambert Academic Publishing, 2012. – 84 с. Daisuke Akimoto. ''New Komeito'' in Japanese Politics: Its Foreign and Security Policy. – М.: LAP Lambert Academic Publishing, 2014. – 56 с. Scott Nicholas Romaniuk. New Polar Horizons: Conflict and Security in the Arctic. – М.: LAP Lambert Academic Publishing, 2011. – 160 с. Nathaniel Umukoro and Joseph Okon. Development and Security. – М.: LAP Lambert Academic Publishing, 2012. – 208 с. Biljana Avramoska Gjoreska and Igor Gjoreski. Collective Security and Role of the New European Security Treaty. – М.: LAP Lambert Academic Publishing, 2015. – 84 с. Leyla Arpac. European Union's Common Foreign and Security Policy and Turkey. – М.: LAP Lambert Academic Publishing, 2011. – 84 с. Ankur Gupta and Bhupendra Gupta. Random Networks and its Applications. – М.: LAP Lambert Academic Publishing, 2013. – 100 с. Guy Degla and Mmaduabuchi E. Okpala. Variational Methods, Lusternik-Schnirelman Theory and Applications. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Melkamu Aboma Tolera. Common African Defence and Security Policy. – М.: LAP Lambert Academic Publishing, 2012. – 116 с. Zekarias Beshah. Peace and Security Council of the African Union. – М.: LAP Lambert Academic Publishing, 2011. – 88 с. Gurmanpreet Kaur,Anand Pawar and Simranpreet Kaur. Cyber Terrorism and Law. – М.: LAP Lambert Academic Publishing, 2012. – 128 с. Hamid Reza Barzegar,Mahdiyeh Barzegar and Neshat Alidad. Energy Efficient And Secured Communication For Manets In Military. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Irfan Hafeez and Wajahat Nosharwan. WiMAX Wi-Fi Integrated System QoS and Security. – М.: LAP Lambert Academic Publishing, 2011. – 76 с. Tarek S. Sobh. Effective and Extensive VPN for Securing Web Applications. – М.: LAP Lambert Academic Publishing, 2012. – 88 с. Soke Onyemelukwe. On-Demand Routing and Security in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2013. – 128 с. Keshava Munegowda. Design and Implementation of WLAN Authentication and Security. – М.: LAP Lambert Academic Publishing, 2010. – 124 с. Anum Haroon and Sadaf Iqbal. Face detection,classification and transformation android application. – М.: LAP Lambert Academic Publishing, 2013. – 68 с. Nadire Cavus and Abdullah Younus. Mobile Devices and Mobile Applications. – М.: LAP Lambert Academic Publishing, 2013. – 76 с. Stephen Schiavone,Lalit Garg and Kelly Summers. Information Security in Enterprises - an Ontological Perspective. – М.: LAP Lambert Academic Publishing, 2014. – 232 с. Firas Abdullah Thweny Al-Saedi and Mazin Mohammed Radhi Al-Haidary. Design and implementation of Linux based VSAT monitoring system. – М.: LAP Lambert Academic Publishing, 2013. – 100 с. Ahmad Siddiqui,Mohd Rahil and Sultan Aljahdali. E-Business and Security. – М.: LAP Lambert Academic Publishing, 2013. – 120 с. Fatty Mustafa Salem,Maged Hamada Ibrahim and Ibrahim Ismail Ibrahim. Efficient and Secure Message Transmission in Vehicular Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 96 с. Mohammed Faisal. Integrative Framework of Requirement Engineering and Security System. – М.: LAP Lambert Academic Publishing, 2013. – 236 с. Muhammad Qaiser Saleem,Jafreezal Jaafar and Mohd Fadzil Hassan. Modeling Security Objectives along BPM of SOA Applications. – М.: LAP Lambert Academic Publishing, 2013. – 236 с. Paolo Gasti. Privacy and Security of Internet Communications. – М.: LAP Lambert Academic Publishing, 2011. – 148 с. Kerem Beygo and Cihan Eraslan. Enhancing Security and Usability Features of NFC. – М.: LAP Lambert Academic Publishing, 2010. – 68 с. T. Bezboruah and M. Kalita. NET and Java web applications. – М.: LAP Lambert Academic Publishing, 2011. – 148 с. Kh. S. Karimov,Muhammad Abid and Z. M. Karieva. Applications of nano and organic composites based devices. – М.: LAP Lambert Academic Publishing, 2013. – 140 с. S. V. S. Kishore Kumar. Information Systems Audit And Security In Banking. – М.: LAP Lambert Academic Publishing, 2013. – 476 с. Лучшие результаты Ничего не найдено Дополнительные результаты Наука человековедения. интервью с Д. Уолтоном, профессором London Metropolitan University, экспертом CIPD. Chartered Institute of Personnel and Development, автором программы Master of Arts in Human Resource Strategies. И. Смирнова, "Кадровый менеджмент", № 5, июль-август 2007. Специализированный модуль FS-CD. Collections and Disbursements - "Сборы и Выплаты" и его возможности. О.А. Глущенко, "Финансовый менеджмент в страховой компании", № 2, II квартал 2007. Бюджетирование страховой компании на базе Oracle Enterprise Planning and Budgeting. Д.В. Лесоводский, "Финансовый менеджмент в страховой компании", № 3, III квартал 2006. Регулирование операций торгового финансирования: новые инициативы. интервью с Д. Шмандом, вице-председателем Банковской комиссии ICC по supply chain finance, главой подразделения Trade Finance and Cash Management Corporates EMEA в Global Transaction Banking. GTB division Deutsche Bank. Н. Макарова, "Международные банковские операции", N 2, апрель-июнь 2012 г. Ужин в темноте в стиле Малевича и Новый год в Хаммере". Что может выть лучше?". интервью с Н. Саниной, индивидуальным предпринимателем и креативным директором компании "San and stars". М. Сипатова, "Арсенал предпринимателя", N 12, декабрь 2011 г. На пути к новому стандарту в торговом финансировании. интервью с А. Кастерманом, руководителем Trade and Supply Chain, SWIFT, сопредседателем рабочей группы ICC-BPO. Э. Шакирова, "Международные банковские операции", N 4, октябрь-декабрь 2011 г. Уильям Савадж: Мотивировать людей в Нижнем Новгороде и Новосибирске нужно по-разному". интервью с У. Саваджем, вице-президентом корпорации Intel, подразделение Software and Services Group. М. Холкина, "Управление персоналом", N 14, июль 2010 г. Цены под контролем: the present and the future. С. Стройкова, И. Леметюйнен, "Консультант", № 19, сентябрь 2009. Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Алина, 27.12 Здравствуйте! Хочу поблагодарить Вас за проделанную работу! Курсовая защищена, оценка - отлично! Спасибо огромное за понимание и готовность помочь)))