Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Ron Ben Natan. Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase. – М.: , 2005. – 432 с.
  2. Ron Ben Natan. Implementing Database Security and Auditing. – М.: , 2010. – 432 с.

Дополнительные результаты

  1. Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с.
  2. Security and Privacy in Mobile Information and Communication Systems: Third International ICST Conference, MOBISEC 2011, Aalborg, Denmark, May 17-19, ... and Telecommunications Engineering). – М.: , 2012. – 195 с.
  3. Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  4. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 515 с.
  5. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с.
  6. Security and Development in Global Politics: A Critical Comparison. – М.: , 2012. – 360 с.
  7. Luis Lobo-Guerrero. Insuring Security: Biopolitics, security and risk. – М.: , 2012. – 178 с.
  8. Terrorism and the Olympics: Major Event Security and Lessons for the Future. – М.: , 2012. – 272 с.
  9. Giorgio S. Questa. Fixed Income Analysis for the Global Financial Market: Money Market, Foreign Exchange, Securities, and Derivatives. – М.: Wiley, 1999. – 368 с.
  10. Rattan Lal, David Hansen, Norman Uphoff, Steven Slack, Rattan Lal. Food Security and Environmental Quality in the Developing World. – М.: , 0. – 0 с.
  11. D. H. Stamatis. Documenting and Auditing for Iso 9000 and Qs-9000: Tools for Ensuring Certification or Registration. – М.: , 0. – 0 с.
  12. Susan Echaore-McDavid. Career Opportunities in Law Enforcement, Security, and Protective Services (The Career Opportunities Series). – М.: , 0. – 0 с.
  13. Maurice, Ph.D. Youakim. Social Security and Medicare for the New Millenium. – М.: , 0. – 0 с.
  14. Retail Security and Loss Prevention. – М.: , 0. – 0 с.
  15. Physical Security and the Inspection Process. – М.: , 0. – 0 с.
  16. Louis Barajas. The Latino Journey to Financial Greatness : The 10 Steps to Creating Wealth, Security, and a Prosperous Future for You and Your Family. – М.: , 0. – 0 с.
  17. Don Silver. The Generation X Money Book: Achieving Security and Independence. – М.: , 0. – 0 с.
  18. Jonathan Gruber, David A. Wise. Social Security and Retirement Around the World (NATIONAL BUREAU OF ECONOMIC RESEARCH CONFERENCE REPORT). – М.: , 0. – 0 с.
  19. Geoff Craighead. High-Rise Security and Fire Life Safety, Second Edition. – М.: , 0. – 0 с.
  20. Thomas Moore. MCDBA, MCSE, MCSD, MCAD Training Guide: SQL Server 2000 Database Design and Implementation (+ CD-ROM). – М.: Que Certification, 2002. – 886 с.
  21. Marian Quigley, Marian Quiqley. Information Security and Ethics: Social and Organizational Issues. – М.: , 0. – 0 с.
  22. Charles Carrington, Timothy Speed, Juanita Ellis, Steffano Korper. Enterprise Directory and Security Implementation Guide: Designing and Implementing Directories in Your Organization (The Korper and Ellis E-Commerce Books Series). – М.: , 0. – 0 с.
  23. Anup K. Ghosh. E-Commerce Security and Privacy. – М.: , 0. – 0 с.
  24. Kenneth Atchity. How to Escape Lifetime Security and Pursue Your Impossible Dream: A Guide to Transforming Your Career. – М.: , 2004. – 0 с.
  25. Governance and Auditing (Corporate Governance in the New Global Economy Series). – М.: , 2005. – 0 с.
  26. V. Kumar. Customer Relationship Management : A Databased Approach. – М.: , 2005. – 0 с.
  27. Joseph White. False Alarm : Why the Greatest Threat to Social Security and Medicare Is the Campaign to "Save" Them (Century Foundation Book). – М.: , 2003. – 0 с.
  28. Advances in Security and Payment Methods for Mobile Commerce. – М.: , 2004. – 0 с.
  29. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с.
  30. Ron Ben Natan. Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase. – М.: , 2005. – 432 с.
  31. Jim Stewart. SAP Security: SAP Security Essentials. – М.: Equity Press, 2005. – 136 с.
  32. Joe Conason. The Raw Deal: How the Bush Republicans Plan to Destroy Social Security and the Legacy of the New Deal. – М.: , 2005. – 141 с.
  33. Helen James. Security and Stustaibable Developement in Myanmar/Burma (Routledge Contemporary Southeast Asia Series). – М.: , 2006. – 231 с.
  34. Susan Echaore-McDavid. Career Opportunities In Law Enforcement, Security And Protective Services (Career Opportunities). – М.: , 2005. – 272 с.
  35. Roy H. Campbell, Prasad G. Naldurg. Security and Survivability: Analyzing, Modeling, and Verifying Dynamic Recovery in Insecure Systems. – М.: , 2008. – 240 с.
  36. Tracey L. Reid. Unclaimed Property: A Reporting Process and Audit Survival Guide. – М.: , 2008. – 224 с.
  37. Ibp Usa. Thailand Army, National Security And Defense Policy Handbook. – М.: , 2008. – 300 с.
  38. Ibp Usa. Turkey Army, National Security And Defense Policy Handbook (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с.
  39. Ibp Usa. Ukraine Army, National Security And Defense Policy Handbook (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с.
  40. Social Security and Development. – М.: , 2008. – 256 с.
  41. Ibp Usa. CZECH REPUBLIC ARMY, NATIONAL SECURITY AND DEFENSE POLICY HANDBOOK (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с.
  42. Ibp Usa. ESTONIA ARMY, NATIONAL SECURITY AND DEFENSE POLICY HANDBOOK (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с.
  43. Ibp Usa. Finland Army, National Security And Defense Policy Handbook (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с.
  44. Ibp Usa. Germany Army, National Security And Defense Policy Handbook (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с.
  45. Ibp Usa. China Army, National Security and Defense Policy Handbook. – М.: , 2008. – 300 с.
  46. Ibp Usa. Cuba Army, National Security And Defense Policy Handbook (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с.
  47. Ibp Usa. US Securities and Exchange Commission Handbook. – М.: , 2008. – 300 с.
  48. Ibp Usa. Myanmar Army, National Security And Defense Policy Handbook. – М.: , 2008. – 300 с.
  49. Ibp Usa. Philippines Army National Security and Defense Policy Handbook. – М.: , 2008. – 300 с.
  50. Ibp Usa. Russia KGB (National Security and Intelligence Handbook: Past And Present (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с.
  51. Ibp Usa. Global National Security and Intelligence Agencies Handbook. – М.: , 2008. – 300 с.
  52. Ibp Usa. Germany Army, National Security and Defense Policy Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  53. Ibp Usa. Australia Army, National Security and Defense Policy Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  54. Ibp Usa. Bangladesh Army, National Security and Defense Policy Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  55. Ibp Usa. Czech Republic Army, National Security and Defense Policy Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  56. Ibp Usa. European System for Security and Cooperation Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  57. Ibp Usa. Finland Army, National Security and Defense Policy Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  58. Ibp Usa. France Army, National Security and Defense Policy Handbook (World Business Information Catalog). – М.: , 2008. – 300 с.
  59. Ibp Usa. Estonia Army, National Security and Defense Policy Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  60. The Editors of Apartment Building Management Insider. Apartment Management Compliance and Profitability Guide. – М.: , 2008. – 716 с.
  61. Craig S. Wright. The IT Regulatory and Standards Compliance Handbook: How to Survive Information Systems Audit and Assessments. – М.: , 2008. – 750 с.
  62. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с.
  63. V.R. Leonard. The Social Security and Medicare Handbook: What You Need to Know Explained Simply. – М.: , 2008. – 288 с.
  64. Michael Erbschloe. Implementing Homeland Security for Enterprise IT. – М.: , 2010. – 299 с.
  65. Helen Toner, Elspeth Guild, Anneliese Baldaccini. Whose Freedom, Security and Justice?. – М.: Hart Publishing, 2007. – 550 с.
  66. Moorad Choudhry. Fixed Income Securities and Derivatives Handbook. – М.: , 2010. – 496 с.
  67. Microsoft Official Academic Course. 70–443 and 70–450: Microsoft SQL Server Database Design and Optimization, Package. – М.: , 2010. – 456 с.
  68. Jan L. Harrington. Relational Database Design and Implementation. – М.: , 2010. – 440 с.
  69. Eiji Arai. Mechatronics for Safety, Security and Dependability in a New Era. – М.: , 2010. – 464 с.
  70. Charles Nemeth. Private Security and the Law. – М.: , 2010. – 488 с.
  71. Carl Roper. Physical Security and the Inspection Process. – М.: , 2010. – 290 с.
  72. Charles A. Sennewald. Retail Crime, Security, and Loss Prevention. – М.: , 2010. – 704 с.
  73. Shigeru Yamamoto. Systems and Human Science - For Safety, Security and Dependability. – М.: , 2010. – 350 с.
  74. Jesus Mena. Investigative Data Mining for Security and Criminal Detection. – М.: , 2010. – 272 с.
  75. Joseph Donnermeyer. Security and Crime Prevention. – М.: , 2010. – 439 с.
  76. Ron Ben Natan. Implementing Database Security and Auditing. – М.: , 2010. – 432 с.
  77. James Doyle. Nuclear Safeguards, Security and Nonproliferation. – М.: , 2010. – 624 с.
  78. Philip Purpura. Retail Security and Shrinkage Protection. – М.: , 2010. – 336 с.
  79. Brien Posey. GFI Network Security and PCI Compliance Power Tools. – М.: , 2010. – 488 с.
  80. Ron Basu. Implementing Six Sigma and Lean. – М.: , 2010. – 376 с.
  81. Toby J. Teorey. Database Modeling and Design. – М.: , 2010. – 296 с.
  82. Umer Khan. The Ultimate Windows 2003 Security and Administration CD. – М.: , 2010. – 0 с.
  83. Umer Khan. The Ultimate Cisco and Security and IP Configuration CD. – М.: , 2010. – 0 с.
  84. Toby J. Teorey. Database Modeling and Design. – М.: , 2010. – 384 с.
  85. Charles Nemeth. Private Security and the Investigative Process. – М.: , 2010. – 376 с.
  86. Geoff Craighead. High-Rise Security and Fire Life Safety. – М.: , 2010. – 696 с.
  87. Michael Gough. Video Conferencing over IP: Configure, Secure, and Troubleshoot. – М.: , 2010. – 0 с.
  88. Pamela A. Collins. Principles of Security and Crime Prevention. – М.: , 2010. – 490 с.
  89. J. Barry Hylton. Safe Schools: A Security and Loss Prevention Plan. – М.: , 2010. – 232 с.
  90. Jason Furman. Pensions, Social Security, and the Privatization of Risk. – М.: , 2010. – 128 с.
  91. John Chirillo. Implementing Biometric Security. – М.: , 2003. – 432 с.
  92. Ferenc Mate. Wisdom of Tuscany – Simplicity, Security, and the Good Life. – М.: , 2011. – 0 с.
  93. Orin Thomas. MCSA/MCSE Self–Paced Training Kit (Exam 70–350) – Implementing Microsoft Internet Security and Acceleration Server 2004. – М.: , 2005. – 1104 с.
  94. Richard Baker. Implementing Change with Clinical Audit. – М.: , 1998. – 200 с.
  95. Douglas W Blum. Russia and Globalization – Identity, Security and Society in an Era of Change. – М.: , 2008. – 402 с.
  96. Lorrie Cranor. Security and Usability. – М.: , 2005. – 738 с.
  97. Charles P. Hollocker. Software Reviews and Audits Handbook. – М.: , 1990. – 256 с.
  98. Alan G. Konheim. Computer Security and Cryptography. – М.: , 1972. – 0 с.
  99. Mark Duffield. Development, Security and Unending War. – М.: , 2007. – 280 с.
  100. Frank J. Fabozzi CFA. Treasury Securities and Derivatives. – М.: , 1997. – 312 с.
  101. Frank J. Fabozzi CFA. Valuation of Fixed Income Securities and Derivatives. – М.: , 1998. – 288 с.
  102. John Lewis Gaddis. Surprise, Security, and the American Experience. – М.: , 2005. – 160 с.
  103. Patricia Owens. Security and War. – М.: , 2013. – 224 с.
  104. Patricia Owens. Security and War. – М.: , 2013. – 224 с.
  105. Tim Mather. Cloud Security and Privacy. – М.: , 2009. – 334 с.
  106. Michael Miller. Absolute PC Security and Privacy. – М.: , 2002. – 560 с.
  107. Stefan Elbe. Security and Global Health. – М.: , 2010. – 200 с.
  108. Stefan Elbe. Security and Global Health. – М.: , 2010. – 200 с.
  109. Frederick Lynch. One Nation under AARP – The Fight over Medicare, Social Security, and America?s Future. – М.: , 2011. – 236 с.
  110. Howard Fallon. How to Implement Information Systems and Live to Tell About It. – М.: , 1995. – 292 с.
  111. Microsoft. MCAD/MCSE/MCDBA Self–Paced Training Kit – Microsoft SQL Server 2000 Database Design and Implementation Exam 70–229 2e. – М.: , 2003. – 880 с.
  112. John Lewis Gaddis. Surprise, Security, and the American Experience. – М.: , 2004. – 160 с.
  113. Edited by Benjamin J Goold and Liora Lazarus. Security and Human Rights. – М.: , 2011. – 426 с.
  114. Helen Toner, Elspeth Guild and Anneliese Baldaccini. Whose Freedom, Security and Justice?. – М.: , 2011. – 582 с.
  115. Bohi. Oil Prices, Energy Security, and Import Policy. – М.: , 1982. – 0 с.
  116. David James Clarke IV. Novell?s CNE Clarke Notes for NetWare® 5 Advanced Administration and Design, and Implementation: Courses 570 and 575. – М.: , 2000. – 380 с.
  117. Doug Stokes. Global Energy Security and American Hegemony. – М.: , 2010. – 320 с.
  118. Doug Stokes. Global Energy Security and American Hegemony. – М.: , 2010. – 320 с.
  119. Mohammed J. Kabir. Red Hat® Linux® Security and Optimization. – М.: , 2001. – 720 с.
  120. Principles Of Computer Security, Comptia Security+ And Beyond, Second Edition. – М.: , 2011. – 0 с.
  121. Principles Of Computer Security Comptia Security+ And Beyond Lab Manual, Second Edition. – М.: , 2011. – 352 с.
  122. Social Security And Welfare:. – М.: , 2011. – 368 с.
  123. Studin Leeton Ncube. Implementation of Design and Technology Curriculum. – М.: LAP Lambert Academic Publishing, 2012. – 160 с.
  124. A. C. Suthar,D. D. Shah and G. R. Kulkarni. Implementation of Secured Color Image Authentication and Protection. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.
  125. Manoj Kollam. A Low-cost Embedded Smart Car Security And Theft Control System. – М.: LAP Lambert Academic Publishing, 2011. – 84 с.
  126. Yang Liu. Towards Enhanced Security and Reliability in Wireless Communications. – М.: LAP Lambert Academic Publishing, 2010. – 144 с.
  127. David Bauchi. Food security and poverty reduction in Nigeria. – М.: LAP Lambert Academic Publishing, 2013. – 112 с.
  128. Jokha S. Suleiman. An Evaluation of the Role of EIA Database in Promoting EIA practice. – М.: LAP Lambert Academic Publishing, 2011. – 108 с.
  129. Jeff Nelson. Social Security and Pensions. – М.: Dictus Publishing, 2011. – 184 с.
  130. Sylvia Kiamba. Societal Security and Migration. – М.: LAP Lambert Academic Publishing, 2012. – 132 с.
  131. Benard Sorre. CASH CROP PRODUCTION, FOOD SECURITY AND NUTRITION IN RURAL HOUSEHOLDS. – М.: LAP Lambert Academic Publishing, 2011. – 88 с.
  132. Dinah Koteikor Kotey. Library security and user attitudes. – М.: LAP Lambert Academic Publishing, 2012. – 140 с.
  133. Vinay Abburi. SECURE AND RELIABLE DEEP SPACE NETWORKS. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  134. Muhammad Azfar Anwar and Saif ur Rehman. Defense Spending, National Security and Economic Growth of Pakistan. – М.: LAP Lambert Academic Publishing, 2012. – 128 с.
  135. Nooruldeen Qader and Loay George. Design and Implement a Secure Database Using Multi Level Security. – М.: LAP Lambert Academic Publishing, 2014. – 124 с.
  136. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  137. Hammad Kazmi. Security and Privacy issues in Near Field Communication (NFC) Systems. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  138. Amos Omamo. The effectiveness of IDPS's in enhancing database security. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  139. S. Balamurugan and S. Charanyaa. Principles of Database Security. – М.: Scholars' Press, 2014. – 148 с.
  140. Ekoningtyas Margu Wardani and Muyanja Ssenyonga. Soaring Food Prices, Food Security, and Poverty in Indonesia. – М.: LAP Lambert Academic Publishing, 2013. – 128 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Наука человековедения. интервью с Д. Уолтоном, профессором London Metropolitan University, экспертом CIPD. Chartered Institute of Personnel and Development, автором программы Master of Arts in Human Resource Strategies. И. Смирнова, "Кадровый менеджмент", № 5, июль-август 2007.
  2. Специализированный модуль FS-CD. Collections and Disbursements - "Сборы и Выплаты" и его возможности. О.А. Глущенко, "Финансовый менеджмент в страховой компании", № 2, II квартал 2007.
  3. Бюджетирование страховой компании на базе Oracle Enterprise Planning and Budgeting. Д.В. Лесоводский, "Финансовый менеджмент в страховой компании", № 3, III квартал 2006.
  4. Новый НДС при капитальном строительстве". интервью с В.С. Леви, заместителем генерального директора "Energy Consulting/Audit", руководителем налоговой практики. "Бюджетный учет", № 4, апрель 2006.
  5. Об итогах работы по унификации сведений в международных справочниках BIC Directory и BIC Database Plus. А.Б. Кузнецова, "Расчеты и операционная работа в коммерческом банке", № 10, октябрь 2005.
  6. Регулирование операций торгового финансирования: новые инициативы. интервью с Д. Шмандом, вице-председателем Банковской комиссии ICC по supply chain finance, главой подразделения Trade Finance and Cash Management Corporates EMEA в Global Transaction Banking. GTB division Deutsche Bank. Н. Макарова, "Международные банковские операции", N 2, апрель-июнь 2012 г.
  7. Ужин в темноте в стиле Малевича и Новый год в Хаммере". Что может выть лучше?". интервью с Н. Саниной, индивидуальным предпринимателем и креативным директором компании "San and stars". М. Сипатова, "Арсенал предпринимателя", N 12, декабрь 2011 г.
  8. На пути к новому стандарту в торговом финансировании. интервью с А.  Кастерманом, руководителем Trade and Supply Chain, SWIFT, сопредседателем рабочей группы ICC-BPO. Э. Шакирова, "Международные банковские операции", N 4, октябрь-декабрь 2011 г.
  9. Уильям Савадж: Мотивировать людей в Нижнем Новгороде и Новосибирске нужно по-разному". интервью с У. Саваджем, вице-президентом корпорации Intel, подразделение Software and Services Group. М. Холкина, "Управление персоналом", N 14, июль 2010 г.
  10. Цены под контролем: the present and the future. С. Стройкова, И. Леметюйнен, "Консультант", № 19, сентябрь 2009.

Образцы работ

Тема и предметТип и объем работы
Последствия операции НАТО
Политология
Диплом
80 стр.
Привлекательности труда в организации
Психология
Курсовая работа
35 стр.
Оценка эффективности системы управления в организации
Управление
Дипломный проект
82 стр.
Математические модели океанических течений
Переводоведение (теория перевода)
Курсовая работа
42 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Серафим
Большое спасибо за прошлогодний цикл работ. Все получилось замечательно после консультаций с вами. Чуть позже скину еще две темы. С Вами приятно иметь дело :) Между прочим... по секрету одна из тем будет такая же противная. Но Вы же умница, Вы справитесь :))