Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Hacker'S Challenge 3. – М.: , 2011. – 400 с.
  2. Chris Prosise, Kevin Mandia, Matt Pepe. Incident Response & Computer Forensics. – М.: McGraw-Hill/Osborne, 2003. – 508 с.
  3. Michael Hale Ligh, Andrew Case, Jamie Levy, AAron Walters. The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory. – М.: Wiley, . – 912 с.

Дополнительные результаты

  1. Laszlo Gyorfi. Machine Learning for Financial Engineering (Advances in Computer Science and Engineering: Texts). – М.: , 2012. – 250 с.
  2. Susan Grossey. Anti-Money Laundering: A Guide for the Non-Executive Director lsle of Man Edition: Everything any Director or Partner of an Isle of Man Firm Covered ... Board's Responsibilities Relating to AML/CFT. – М.: , 2012. – 100 с.
  3. Susan Grossey. Anti-Money Laundering: A Guide for the Non-Executive Director (UK Edition): Everything any Director or Partner of a UK Firm Covered by the Money ... Board's Responsibilities Relating to AML/CFT. – М.: , 2012. – 96 с.
  4. Max Houck. Smart Guide To Forensic Careers. – М.: , 2012. – 272 с.
  5. Frontiers in Algorithmics and Algorithmic Aspects in Information and Management: Joint International Conference, FAW-AAIM 2012, Beijing, China, May ... Computer Science and General Issues). – М.: , 2012. – 400 с.
  6. Public Key Infrastructures, Services and Applications: 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected ... Computer Science / Security and Cryptology). – М.: , 2012. – 219 с.
  7. Cloud Computing and Services Science (Service Science: Research and Innovations in the Service Economy). – М.: , 2012. – 405 с.
  8. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с.
  9. Social Computing, Behavioral-Cultural Modeling and Prediction: 5th International Conference, SBP 2012, College Park, MD, USA, April 3-5, 2012, ... Applications, incl. Internet/Web, and HCI). – М.: , 2012. – 380 с.
  10. Technological Innovation for Value Creation: Third IFIP WG 5.5/SOCOLNET Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS ... in Information and Communication Technology). – М.: , 2012. – 607 с.
  11. Video Analytics for Business Intelligence (Studies in Computational Intelligence). – М.: , 2012. – 388 с.
  12. Trends in U.s. Services Trade (Trade Issues, Policies, and Laws). – М.: , 2012. – 0 с.
  13. Tim Hatcher. Ethics And Hrd: A New Approach To Leading Responsible Organizations. – М.: , 2012. – 472 с.
  14. Karen Mcneil. How to Land a Top-Paying Forensic accountants Job: Your Complete Guide to Opportunities, Resumes and Cover Letters, Interviews, Salaries, Promotions, What to Expect From Recruiters and More. – М.: , 2012. – 86 с.
  15. Sara Gibson. How to Land a Top-Paying Computer help desk representatives Job: Your Complete Guide to Opportunities, Resumes and Cover Letters, Interviews, ... What to Expect From Recruiters and More. – М.: , 2012. – 90 с.
  16. Heike Lober. Corporate Management, Corporate Social Responsibility and Customers: An Empirical Investigation. – М.: , 2012. – 164 с.
  17. Place Your Bets: The Shaping of Remote Gaming and Internet Gambling (Congressional Policies, Practices and Procedures: Internet Theory, Technology and Applications). – М.: , 2012. – 67 с.
  18. Globally Responsible Leadership: Managing According to the UN Global Compact (The Ivey Casebook Series). – М.: , 2012. – 576 с.
  19. Rose C. Osuji LLM/DM. Participation and Responsibility as Corporate Best Practices. – М.: , 2012. – 176 с.
  20. James A. Hall. Accounting Information Systems. – М.: , 0. – 0 с.
  21. Domingo Tavella. Quantitative Methods in Derivatives Pricing: An Introduction to Computational Finance. – М.: , 0. – 0 с.
  22. Jack J. Champlain. Auditing Information Systems. – М.: , 0. – 0 с.
  23. G. Jack Bologna, Robert J. Lindquist. Fraud Auditing and Forensic Accounting. – М.: , 0. – 0 с.
  24. Michiharu Sakurai, D. Paul Scarbrough. Integrated Cost Management: A Companywide Prescription for Higher Profits and Lower Costs. – М.: , 0. – 0 с.
  25. Constance S. Hawke, Constance S. Hawke. Computer and Internet Use on Campus: A Legal Guide to Issues of Intellectual Property, Free Speech, and Privacy. – М.: , 0. – 0 с.
  26. Jie Lu, Lakhmi C Jain, Guangquan Zhang. Handbook on Decision Making: Vol 2: Risk Management in Decision Making (Intelligent Systems Reference Library). – М.: , 2012. – 472 с.
  27. Daniel D. Kipo. Assessment of Fourth African Road Safety Conference-Ghana's Response: Introduction,Overview of Fourth African Road Safety Conference,The 2007 Accra Declaration on Road Safety, Findings. – М.: , 2012. – 92 с.
  28. Christian Dreeser. Efficient Consumer Response aus Sicht der Logistik: Grundlagen, Konzepte, Losungen (German Edition). – М.: , 2012. – 128 с.
  29. Markov Networks in Evolutionary Computation (Adaptation, Learning, and Optimization). – М.: , 2012. – 264 с.
  30. Daniel Litvin. Empires of Profit: Commerce, Conquest and Corporate Responsibility. – М.: , 0. – 0 с.
  31. James W. Cortada. Before the Computer. – М.: , 0. – 0 с.
  32. James W. Cortada. The Digital Hand: How Computers Changed the Work of American Manufacturing, Transportation, and Retail Industries. – М.: , 0. – 0 с.
  33. Regression Analysis: Statistical Modeling of A Response Variable. – М.: , 0. – 0 с.
  34. Terrell Ward Bynum, Simon Rogerson, Blackwell Pub. Computer Ethics and Professional Responsibility: Introductory Text and Readings. – М.: , 0. – 0 с.
  35. Lila B. Stair, Leslie Stair. Careers in Computers, Third Edition. – М.: , 0. – 0 с.
  36. Lila B. Stair, Leslie Stair. Careers in Computers, Third Edition. – М.: , 0. – 0 с.
  37. Rhona Flin. Sitting in the Hot Seat : Leaders and Teams for Critical Incident Management. – М.: , 0. – 0 с.
  38. Richard H. Berube. Computer Simulated Experiments for Electronic Devices Using Electronics Workbench (2nd Edition). – М.: , 0. – 0 с.
  39. Socially Responsible IT Management. – М.: , 0. – 0 с.
  40. Ravi Kalakota, Andrew B. Whinston, Coordination, and Collaboration Conference 1 Organizational Computing. Readings in Electronic Commerce. – М.: , 0. – 0 с.
  41. Roland Traunmuller, R. Traunmuller, Quebec) Ifip World Computer Congress 2002 Montreal. Information Systems: The E-Business Challenge (International Federation for Information Processing, 95). – М.: , 0. – 0 с.
  42. G. David Garson, G. David Information Technology and Computer Applications in Garson. Public Information Technology: Policy and Management Issues. – М.: , 0. – 0 с.
  43. Peter Varhol. Network-Centric Computing: Preparing the Enterprise for the Next Millennium. – М.: , 0. – 0 с.
  44. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с.
  45. Jacques Berleur, Brunnstein. Ethics of Computing - Codes. – М.: , 0. – 0 с.
  46. Thomas W. Golden. Auditors' Guide to Forensic Accounting Investigation. – М.: , 2005. – 0 с.
  47. Daniel, M.D. Farb. OSHA Medical Radiation Safety Manual and CD, Introductory But Comprehensive OSHA (Occupational Safety and Health) Training for the Managers and Employees ... Producing Equipment and Emergencies. – М.: , 2003. – 0 с.
  48. Daniel, M.D. Farb. OSHA Occupational Radiation Safety Manual and CD, Introductory But Comprehensive OSHA (Occupational Safety and Health) Training for the Managers and Employees ... In Any Industry With Radiation or X-Rays. – М.: , 2003. – 0 с.
  49. Bruce Gordon. Occupational Radiation Safety Guidebook. – М.: , 2005. – 0 с.
  50. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с.
  51. Responsibility and Dependable Systems. – М.: , 2007. – 256 с.
  52. Paul A. Erickson. Emergency Response Planning for Corporate and Municipal Managers, Second Edition (Butterworth-Heinemann Homeland Security). – М.: , 2006. – 432 с.
  53. Tommie Singleton, Aaron Singleton, G. Jack Bologna, Robert J. Lindquist. Fraud Auditing and Forensic Accounting. – М.: , 2006. – 336 с.
  54. Ozlem Ilk. Multivariate Longitudinal Data Analysis: Models for Binary Response and Exploratory Tools forBinary and Continuous Response. – М.: , 2008. – 180 с.
  55. Jason Harris. Green Computing and Green IT Best Practices on Regulations and Industry Initiatives, Virtualization, Power Management, Materials Recycling and Telecommuting. – М.: , 2008. – 196 с.
  56. Kim Kerr CPP. Workplace Violence: Planning for Prevention and Response. – М.: , 2010. – 344 с.
  57. Peter Schroeder-Heister, Kosta Dosen. Substructural Logics (Studies in Logic and Computation). – М.: Oxford University Press, 1994. – 400 с.
  58. Nathalie Frickey. Spontaneous Dissection and Stroke in Young Adults: Vascular Physiology, Clinical and Forensic Medicine:An Interdisciplinary Appraisal of the Pathway TowardsSpontaneous Cervical Carotid Dissection. – М.: , 2008. – 92 с.
  59. Wing Kam Fung, Yue-Qing Hu. Statistical DNA Forensics: Theory, Methods and Computation. – М.: Wiley, 2008. – 262 с.
  60. Brain-Inspired Information Technology (Studies in Computational Intelligence). – М.: , 2010. – 182 с.
  61. Warren E. Stewart. Computer–Aided Modeling of Reactive Systems. – М.: , 2008. – 268 с.
  62. Physicians Committee for Responsible Medicine. Healthy Eating for Life to Prevent and Treat Cancer. – М.: , 2002. – 256 с.
  63. Physicians Committee for Responsible Medicine. Healthy Eating for Life for Women. – М.: , 2002. – 272 с.
  64. Physicians Committee for Responsible Medicine. Healthy Eating for Life for Children. – М.: , 2002. – 272 с.
  65. Terrence V. Lillard. Digital Forensics for Network, Internet, and Cloud Computing. – М.: , 2010. – 368 с.
  66. Micah Solomon. Computer Forensics JumpStartTM. – М.: , 2004. – 304 с.
  67. MJ COMPUTER. Ball Data Processing In Medicine: How To Select A Computerized Hospital Information Systm. – М.: , 1973. – 0 с.
  68. Linda Volonino. Computer Forensics For Dummies®. – М.: , 2008. – 384 с.
  69. E TEJA. Teja ?teaching? Your Computer To Talk–a Manual Of Command And Response (paper Only). – М.: , 1982. – 0 с.
  70. Michael Sheetz. Computer Forensics. – М.: , 2007. – 176 с.
  71. R COMPUTERS. Dehaene Computers In Radiology. – М.: , 1971. – 0 с.
  72. Apple Computer. Learning Carbon. – М.: , 2001. – 360 с.
  73. Apple Computer. Learning Cocoa. – М.: , 2001. – 384 с.
  74. Kenneth R Van Wyk. Incident Response. – М.: , 2001. – 240 с.
  75. Arnold E Amstutz. Computer Simulation of Competitive Market Response. – М.: , 2004. – 472 с.
  76. Michael G. Solomon. Computer Forensics JumpStart. – М.: , 2011. – 336 с.
  77. COMPUTER. Computer School ?mastering? Multiplan Tm (paper On Ly). – М.: , 1984. – 0 с.
  78. Center for Professional Computer Education. Multimate ProfessionalTM. – М.: , 1986. – 240 с.
  79. Center for Professional Computer Education. DisplayWrite III. – М.: , 1987. – 224 с.
  80. Center for Professional Computer Education. WordStar®. – М.: , 1987. – 192 с.
  81. Center for Professional Computer Education. LOTUS 1–2–3 Quick Reference Handbook. – М.: , 1986. – 240 с.
  82. Erik Laykin. Investigative Computer Forensics. – М.: , 2011. – 320 с.
  83. COMPUTER PART. Computer Partners: Handbook Of Cobol Techniques & Programming Standards 3ed (pr Only). – М.: , 1993. – 0 с.
  84. Aaron Philipp, David Cowen, Chris Davis. Hacking Exposed: Computer Forensics. – М.: McGraw-Hill, 2010. – 544 с.
  85. Hacker'S Challenge 3. – М.: , 2011. – 400 с.
  86. Principles Of Computer Security Comptia Security+ And Beyond Lab Manual, Second Edition. – М.: , 2011. – 352 с.
  87. Chris Prosise, Kevin Mandia, Matt Pepe. Incident Response & Computer Forensics. – М.: McGraw-Hill/Osborne, 2003. – 508 с.
  88. Eoghan Casey. Digital Evidence and Computer Crime. – М.: , . –  с.
  89. Inc. KT Solutions, KT Solutions has focused on what it takes to create efficient, professional multimedia training t KT Solutions specializes in the development of interactive multimedia training products for computer applications. Over the past decade. Beginning Windows NT Workstation 4.0 (Microsoft Windows NT). – М.: , . –  с.
  90. Inc. KT Solutions, KT Solutions has focused on what it takes to create efficient, professional multimedia training t KT Solutions specializes in the development of interactive multimedia training products for computer applications. Over the past decade. Advanced Word for Office 97 (Microsoft Word 97). – М.: , . –  с.
  91. Harlan Carvey. Windows Forensic Analysis Including DVD Toolkit. – М.: , 2007. – 416 с.
  92. Laura Taylor. Fisma Certification & Accreditation Handbook. – М.: , 2006. – 498 с.
  93. Committee on DNA Technology in Forensic Science, National Research Council. DNA Technology in Forensic Science. – М.: National Academies Press, 1992. – 200 с.
  94. Dennis Bray. Wetware: A Computer in Every Living Cell. – М.: Yale University Press, 2011. – 280 с.
  95. Charles L. Brooks. CHFI: Computer Hacking Forensic Investigator Certification: Exam Guide (+ CD). – М.: McGraw-Hill Education, 2015. – 656 с.
  96. Yucheng Liu. Development of Simplified Crash Computer Models for Thin-Walled Beams. – М.: LAP Lambert Academic Publishing, 2010. – 180 с.
  97. Abdul Kareem and Mohammad Fazle Azeem. Soft Computing Based Control: Theory and Simulation. – М.: LAP Lambert Academic Publishing, 2012. – 124 с.
  98. Arpit Agarwal. Interactive Voice Response System For College Automation. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  99. Swagota Bera and Monisha Sharma. Statistical and Visual Detection of Real Time Stego Images. – М.: LAP Lambert Academic Publishing, 2015. – 104 с.
  100. Olaniyan Olatunji Sunday and Adegbola Ayodele Adedayo. Geometrical Computation of River Omi South Western Nigeria. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  101. Muhammad Irfan,Muhammad Mazhar Saleem and Farooq Naveed. Manual and Computer Aided Design of Prestressed Concrete Bridges. – М.: LAP Lambert Academic Publishing, 2012. – 112 с.
  102. Isaac Woja. Responses to Food Insecurity. – М.: LAP Lambert Academic Publishing, 2010. – 120 с.
  103. Binod Kumar Shah. Cholera, Shigellosis and Salmonellosis Incidence in Nepal. – М.: LAP Lambert Academic Publishing, 2012. – 160 с.
  104. Muhammad Saqib Shahzad,Mujgan Cengiz and Salih Cengiz. Forensic Analysis of Blood Stained Soils. – М.: LAP Lambert Academic Publishing, 2011. – 112 с.
  105. MD Mostafizur Rahman. Traffic Incident Modelling. – М.: LAP Lambert Academic Publishing, 2012. – 148 с.
  106. Kirti Rani. Computers & Biotechnology. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  107. Sunishtha S. Yadav. SNPs - Cancer Incidences & Pharmacogenomics. – М.: LAP Lambert Academic Publishing, 2012. – 116 с.
  108. Abhishek Prakash,Neeraj Grover and Shamindra Sengupta. Storage of Evidence and Records in Forensic Odontology. – М.: LAP Lambert Academic Publishing, 2014. – 88 с.
  109. G. V. Pramod. Forensic odontology: An overview. – М.: LAP Lambert Academic Publishing, 2012. – 148 с.
  110. Farhana Munir,Afshan Kaleem M.Munir and Azar Ilyas. Analysis Of Gene Responsive To COPD In Rural Areas. – М.: LAP Lambert Academic Publishing, 2014. – 116 с.
  111. Mark Leting Kipruto and Joshua Lopoghon Kiptilon. Kenya police preparedness during disasters incidents. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  112. Mustafa Alhassen and Atallh Fowzan Al-Motrfi. Incidence of Brain Lesions in Saudi Population. – М.: LAP Lambert Academic Publishing, 2012. – 52 с.
  113. Joy Olotu. Temporal styloid process: its forensic implication in Nigerians. – М.: LAP Lambert Academic Publishing, 2011. – 148 с.
  114. Kenneth Revett. A Computational Model of Focal Ischemia. – М.: LAP Lambert Academic Publishing, 2012. – 208 с.
  115. Sara Jalali. Item Response Theory. – М.: LAP Lambert Academic Publishing, 2011. – 180 с.
  116. Greg Linsdell. Police Tactical Group Critical Incident Training. – М.: LAP Lambert Academic Publishing, 2012. – 124 с.
  117. Hemant Kumar Saini and Satpal Singh Kushwaha. Protocol Discovery. – М.: LAP Lambert Academic Publishing, 2014. – 52 с.
  118. Mohd Nazri Ismail,Mohd Afizi Shukran and Kamaruzaman Maskat. Smarthome Computing System Using Mobile Devices. – М.: LAP Lambert Academic Publishing, 2014. – 88 с.
  119. Soltan Alharbi. Proactive System for Digital Forensic Investigation. – М.: Scholars' Press, 2014. – 84 с.
  120. Anjan Kumar Payra. Steganology for the Computer Forensics Examiners. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  121. Agufa Semenye. Criminal Profiling: A tool in investigating computer crimes. – М.: LAP Lambert Academic Publishing, 2012. – 136 с.
  122. Lata Gadhavi. Handling Complex Use Scenario in Grid Computing Environment. – М.: LAP Lambert Academic Publishing, 2014. – 72 с.
  123. Md. Rabiul Islam,Md. Fayzur Rahman and Faculty of Electrical-Computer Engineering RUET Rajshahi Bang. IMPROVEMENT OF NOISE ROBUST SPEAKER IDENTIFICATION. – М.: LAP Lambert Academic Publishing, 2010. – 88 с.
  124. Palaniappan Shamala and Abd Manaf Azizah. Digital Computer Forensic: Validation and Verification for Disk Imaging. – М.: LAP Lambert Academic Publishing, 2012. – 124 с.
  125. Raza Hasan. Forensic Computing. – М.: LAP Lambert Academic Publishing, 2012. – 152 с.
  126. Arvind Meniya and H. B. Jethva. Next Generation Mobile Application in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 72 с.
  127. Rafal AL-Khashab. An Authentication Model for Cloud Computing Application. – М.: LAP Lambert Academic Publishing, 2014. – 104 с.
  128. Rinaldi Yulius. DESIGN OF A CYBER SECURITY LABORATORY. – М.: LAP Lambert Academic Publishing, 2010. – 140 с.
  129. Irfan Syamsuddin. Guidelines for Computer Forensics Investigations in Developing Country. – М.: LAP Lambert Academic Publishing, 2011. – 104 с.
  130. April L. Tanner and David A. Dampier. Digital Forensic Investigations Visualized. – М.: LAP Lambert Academic Publishing, 2011. – 160 с.
  131. Sathish Kumar. Intrusion Detection and Response Techniques for Mobile Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 200 с.
  132. Mohd. Sadique Shaikh Anwar. Human Computer Interfacing (HCI) for Effective Business Execution. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  133. Andrew Marrington. Computer Forensic Profiling. – М.: LAP Lambert Academic Publishing, 2010. – 188 с.
  134. Ismael Marin Carrion. High Performance Computing Applied to Nonlinear Time Series Analysis. – М.: LAP Lambert Academic Publishing, 2010. – 184 с.
  135. Yigithan Dedeoglu. Algorithms for Smart Video Surveillance. – М.: LAP Lambert Academic Publishing, 2010. – 108 с.
  136. Alka Dwivedi and Shashi Prabha Agrawal. Modern Biological Science With DNA Computing. – М.: LAP Lambert Academic Publishing, 2013. – 112 с.
  137. Paresh Kerai. Remote Access Forensics for VNC and RDP on Windows Platform. – М.: LAP Lambert Academic Publishing, 2012. – 168 с.
  138. Jaggaiah Tripuraneni. Incidence of Poverty Estimation among Rural Labour Households in India. – М.: LAP Lambert Academic Publishing, 2014. – 272 с.
  139. Ian Malloy. Systems Management of Alert Responsive Tasks. – М.: , 2012. – 108 с.
  140. Michael Hale Ligh, Andrew Case, Jamie Levy, AAron Walters. The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory. – М.: Wiley, . – 912 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

Ничего не найдено

Образцы работ

Тема и предметТип и объем работы
Организацияавтобусного тура в Польшу
Туризм
Диплом
62 стр.
Симуляция психических расстройств
Юридическая психология
Реферат
21 стр.
Роль налога на доходы физических лиц в России для повышения качества жизни россиян
Налогообложение
Курсовая работа
23 стр.
Понятие и история брендинга. Анализ создания и стратегия продвижения бренда ***
Электроснабжение городов и промышленных предприятий
Другое
72 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Наталья
Доброе утро, Марина, Защита диплома прошла удачно. Благодарю за доработки.