Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Hacker'S Challenge 3. – М.: , 2011. – 400 с. Chris Prosise, Kevin Mandia, Matt Pepe. Incident Response & Computer Forensics. – М.: McGraw-Hill/Osborne, 2003. – 508 с. Michael Hale Ligh, Andrew Case, Jamie Levy, AAron Walters. The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory. – М.: Wiley, . – 912 с. Дополнительные результаты Laszlo Gyorfi. Machine Learning for Financial Engineering (Advances in Computer Science and Engineering: Texts). – М.: , 2012. – 250 с. Susan Grossey. Anti-Money Laundering: A Guide for the Non-Executive Director lsle of Man Edition: Everything any Director or Partner of an Isle of Man Firm Covered ... Board's Responsibilities Relating to AML/CFT. – М.: , 2012. – 100 с. Susan Grossey. Anti-Money Laundering: A Guide for the Non-Executive Director (UK Edition): Everything any Director or Partner of a UK Firm Covered by the Money ... Board's Responsibilities Relating to AML/CFT. – М.: , 2012. – 96 с. Max Houck. Smart Guide To Forensic Careers. – М.: , 2012. – 272 с. Frontiers in Algorithmics and Algorithmic Aspects in Information and Management: Joint International Conference, FAW-AAIM 2012, Beijing, China, May ... Computer Science and General Issues). – М.: , 2012. – 400 с. Public Key Infrastructures, Services and Applications: 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected ... Computer Science / Security and Cryptology). – М.: , 2012. – 219 с. Cloud Computing and Services Science (Service Science: Research and Innovations in the Service Economy). – М.: , 2012. – 405 с. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с. Social Computing, Behavioral-Cultural Modeling and Prediction: 5th International Conference, SBP 2012, College Park, MD, USA, April 3-5, 2012, ... Applications, incl. Internet/Web, and HCI). – М.: , 2012. – 380 с. Technological Innovation for Value Creation: Third IFIP WG 5.5/SOCOLNET Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS ... in Information and Communication Technology). – М.: , 2012. – 607 с. Video Analytics for Business Intelligence (Studies in Computational Intelligence). – М.: , 2012. – 388 с. Trends in U.s. Services Trade (Trade Issues, Policies, and Laws). – М.: , 2012. – 0 с. Tim Hatcher. Ethics And Hrd: A New Approach To Leading Responsible Organizations. – М.: , 2012. – 472 с. Karen Mcneil. How to Land a Top-Paying Forensic accountants Job: Your Complete Guide to Opportunities, Resumes and Cover Letters, Interviews, Salaries, Promotions, What to Expect From Recruiters and More. – М.: , 2012. – 86 с. Sara Gibson. How to Land a Top-Paying Computer help desk representatives Job: Your Complete Guide to Opportunities, Resumes and Cover Letters, Interviews, ... What to Expect From Recruiters and More. – М.: , 2012. – 90 с. Heike Lober. Corporate Management, Corporate Social Responsibility and Customers: An Empirical Investigation. – М.: , 2012. – 164 с. Place Your Bets: The Shaping of Remote Gaming and Internet Gambling (Congressional Policies, Practices and Procedures: Internet Theory, Technology and Applications). – М.: , 2012. – 67 с. Globally Responsible Leadership: Managing According to the UN Global Compact (The Ivey Casebook Series). – М.: , 2012. – 576 с. Rose C. Osuji LLM/DM. Participation and Responsibility as Corporate Best Practices. – М.: , 2012. – 176 с. James A. Hall. Accounting Information Systems. – М.: , 0. – 0 с. Domingo Tavella. Quantitative Methods in Derivatives Pricing: An Introduction to Computational Finance. – М.: , 0. – 0 с. Jack J. Champlain. Auditing Information Systems. – М.: , 0. – 0 с. G. Jack Bologna, Robert J. Lindquist. Fraud Auditing and Forensic Accounting. – М.: , 0. – 0 с. Michiharu Sakurai, D. Paul Scarbrough. Integrated Cost Management: A Companywide Prescription for Higher Profits and Lower Costs. – М.: , 0. – 0 с. Constance S. Hawke, Constance S. Hawke. Computer and Internet Use on Campus: A Legal Guide to Issues of Intellectual Property, Free Speech, and Privacy. – М.: , 0. – 0 с. Jie Lu, Lakhmi C Jain, Guangquan Zhang. Handbook on Decision Making: Vol 2: Risk Management in Decision Making (Intelligent Systems Reference Library). – М.: , 2012. – 472 с. Daniel D. Kipo. Assessment of Fourth African Road Safety Conference-Ghana's Response: Introduction,Overview of Fourth African Road Safety Conference,The 2007 Accra Declaration on Road Safety, Findings. – М.: , 2012. – 92 с. Christian Dreeser. Efficient Consumer Response aus Sicht der Logistik: Grundlagen, Konzepte, Losungen (German Edition). – М.: , 2012. – 128 с. Markov Networks in Evolutionary Computation (Adaptation, Learning, and Optimization). – М.: , 2012. – 264 с. Daniel Litvin. Empires of Profit: Commerce, Conquest and Corporate Responsibility. – М.: , 0. – 0 с. James W. Cortada. Before the Computer. – М.: , 0. – 0 с. James W. Cortada. The Digital Hand: How Computers Changed the Work of American Manufacturing, Transportation, and Retail Industries. – М.: , 0. – 0 с. Regression Analysis: Statistical Modeling of A Response Variable. – М.: , 0. – 0 с. Terrell Ward Bynum, Simon Rogerson, Blackwell Pub. Computer Ethics and Professional Responsibility: Introductory Text and Readings. – М.: , 0. – 0 с. Lila B. Stair, Leslie Stair. Careers in Computers, Third Edition. – М.: , 0. – 0 с. Lila B. Stair, Leslie Stair. Careers in Computers, Third Edition. – М.: , 0. – 0 с. Rhona Flin. Sitting in the Hot Seat : Leaders and Teams for Critical Incident Management. – М.: , 0. – 0 с. Richard H. Berube. Computer Simulated Experiments for Electronic Devices Using Electronics Workbench (2nd Edition). – М.: , 0. – 0 с. Socially Responsible IT Management. – М.: , 0. – 0 с. Ravi Kalakota, Andrew B. Whinston, Coordination, and Collaboration Conference 1 Organizational Computing. Readings in Electronic Commerce. – М.: , 0. – 0 с. Roland Traunmuller, R. Traunmuller, Quebec) Ifip World Computer Congress 2002 Montreal. Information Systems: The E-Business Challenge (International Federation for Information Processing, 95). – М.: , 0. – 0 с. G. David Garson, G. David Information Technology and Computer Applications in Garson. Public Information Technology: Policy and Management Issues. – М.: , 0. – 0 с. Peter Varhol. Network-Centric Computing: Preparing the Enterprise for the Next Millennium. – М.: , 0. – 0 с. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с. Jacques Berleur, Brunnstein. Ethics of Computing - Codes. – М.: , 0. – 0 с. Thomas W. Golden. Auditors' Guide to Forensic Accounting Investigation. – М.: , 2005. – 0 с. Daniel, M.D. Farb. OSHA Medical Radiation Safety Manual and CD, Introductory But Comprehensive OSHA (Occupational Safety and Health) Training for the Managers and Employees ... Producing Equipment and Emergencies. – М.: , 2003. – 0 с. Daniel, M.D. Farb. OSHA Occupational Radiation Safety Manual and CD, Introductory But Comprehensive OSHA (Occupational Safety and Health) Training for the Managers and Employees ... In Any Industry With Radiation or X-Rays. – М.: , 2003. – 0 с. Bruce Gordon. Occupational Radiation Safety Guidebook. – М.: , 2005. – 0 с. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с. Responsibility and Dependable Systems. – М.: , 2007. – 256 с. Paul A. Erickson. Emergency Response Planning for Corporate and Municipal Managers, Second Edition (Butterworth-Heinemann Homeland Security). – М.: , 2006. – 432 с. Tommie Singleton, Aaron Singleton, G. Jack Bologna, Robert J. Lindquist. Fraud Auditing and Forensic Accounting. – М.: , 2006. – 336 с. Ozlem Ilk. Multivariate Longitudinal Data Analysis: Models for Binary Response and Exploratory Tools forBinary and Continuous Response. – М.: , 2008. – 180 с. Jason Harris. Green Computing and Green IT Best Practices on Regulations and Industry Initiatives, Virtualization, Power Management, Materials Recycling and Telecommuting. – М.: , 2008. – 196 с. Kim Kerr CPP. Workplace Violence: Planning for Prevention and Response. – М.: , 2010. – 344 с. Peter Schroeder-Heister, Kosta Dosen. Substructural Logics (Studies in Logic and Computation). – М.: Oxford University Press, 1994. – 400 с. Nathalie Frickey. Spontaneous Dissection and Stroke in Young Adults: Vascular Physiology, Clinical and Forensic Medicine:An Interdisciplinary Appraisal of the Pathway TowardsSpontaneous Cervical Carotid Dissection. – М.: , 2008. – 92 с. Wing Kam Fung, Yue-Qing Hu. Statistical DNA Forensics: Theory, Methods and Computation. – М.: Wiley, 2008. – 262 с. Brain-Inspired Information Technology (Studies in Computational Intelligence). – М.: , 2010. – 182 с. Warren E. Stewart. Computer–Aided Modeling of Reactive Systems. – М.: , 2008. – 268 с. Physicians Committee for Responsible Medicine. Healthy Eating for Life to Prevent and Treat Cancer. – М.: , 2002. – 256 с. Physicians Committee for Responsible Medicine. Healthy Eating for Life for Women. – М.: , 2002. – 272 с. Physicians Committee for Responsible Medicine. Healthy Eating for Life for Children. – М.: , 2002. – 272 с. Terrence V. Lillard. Digital Forensics for Network, Internet, and Cloud Computing. – М.: , 2010. – 368 с. Micah Solomon. Computer Forensics JumpStartTM. – М.: , 2004. – 304 с. MJ COMPUTER. Ball Data Processing In Medicine: How To Select A Computerized Hospital Information Systm. – М.: , 1973. – 0 с. Linda Volonino. Computer Forensics For Dummies®. – М.: , 2008. – 384 с. E TEJA. Teja ?teaching? Your Computer To Talk–a Manual Of Command And Response (paper Only). – М.: , 1982. – 0 с. Michael Sheetz. Computer Forensics. – М.: , 2007. – 176 с. R COMPUTERS. Dehaene Computers In Radiology. – М.: , 1971. – 0 с. Apple Computer. Learning Carbon. – М.: , 2001. – 360 с. Apple Computer. Learning Cocoa. – М.: , 2001. – 384 с. Kenneth R Van Wyk. Incident Response. – М.: , 2001. – 240 с. Arnold E Amstutz. Computer Simulation of Competitive Market Response. – М.: , 2004. – 472 с. Michael G. Solomon. Computer Forensics JumpStart. – М.: , 2011. – 336 с. COMPUTER. Computer School ?mastering? Multiplan Tm (paper On Ly). – М.: , 1984. – 0 с. Center for Professional Computer Education. Multimate ProfessionalTM. – М.: , 1986. – 240 с. Center for Professional Computer Education. DisplayWrite III. – М.: , 1987. – 224 с. Center for Professional Computer Education. WordStar®. – М.: , 1987. – 192 с. Center for Professional Computer Education. LOTUS 1–2–3 Quick Reference Handbook. – М.: , 1986. – 240 с. Erik Laykin. Investigative Computer Forensics. – М.: , 2011. – 320 с. COMPUTER PART. Computer Partners: Handbook Of Cobol Techniques & Programming Standards 3ed (pr Only). – М.: , 1993. – 0 с. Aaron Philipp, David Cowen, Chris Davis. Hacking Exposed: Computer Forensics. – М.: McGraw-Hill, 2010. – 544 с. Hacker'S Challenge 3. – М.: , 2011. – 400 с. Principles Of Computer Security Comptia Security+ And Beyond Lab Manual, Second Edition. – М.: , 2011. – 352 с. Chris Prosise, Kevin Mandia, Matt Pepe. Incident Response & Computer Forensics. – М.: McGraw-Hill/Osborne, 2003. – 508 с. Eoghan Casey. Digital Evidence and Computer Crime. – М.: , . – с. Inc. KT Solutions, KT Solutions has focused on what it takes to create efficient, professional multimedia training t KT Solutions specializes in the development of interactive multimedia training products for computer applications. Over the past decade. Beginning Windows NT Workstation 4.0 (Microsoft Windows NT). – М.: , . – с. Inc. KT Solutions, KT Solutions has focused on what it takes to create efficient, professional multimedia training t KT Solutions specializes in the development of interactive multimedia training products for computer applications. Over the past decade. Advanced Word for Office 97 (Microsoft Word 97). – М.: , . – с. Harlan Carvey. Windows Forensic Analysis Including DVD Toolkit. – М.: , 2007. – 416 с. Laura Taylor. Fisma Certification & Accreditation Handbook. – М.: , 2006. – 498 с. Committee on DNA Technology in Forensic Science, National Research Council. DNA Technology in Forensic Science. – М.: National Academies Press, 1992. – 200 с. Dennis Bray. Wetware: A Computer in Every Living Cell. – М.: Yale University Press, 2011. – 280 с. Charles L. Brooks. CHFI: Computer Hacking Forensic Investigator Certification: Exam Guide (+ CD). – М.: McGraw-Hill Education, 2015. – 656 с. Yucheng Liu. Development of Simplified Crash Computer Models for Thin-Walled Beams. – М.: LAP Lambert Academic Publishing, 2010. – 180 с. Abdul Kareem and Mohammad Fazle Azeem. Soft Computing Based Control: Theory and Simulation. – М.: LAP Lambert Academic Publishing, 2012. – 124 с. Arpit Agarwal. Interactive Voice Response System For College Automation. – М.: LAP Lambert Academic Publishing, 2012. – 96 с. Swagota Bera and Monisha Sharma. Statistical and Visual Detection of Real Time Stego Images. – М.: LAP Lambert Academic Publishing, 2015. – 104 с. Olaniyan Olatunji Sunday and Adegbola Ayodele Adedayo. Geometrical Computation of River Omi South Western Nigeria. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Muhammad Irfan,Muhammad Mazhar Saleem and Farooq Naveed. Manual and Computer Aided Design of Prestressed Concrete Bridges. – М.: LAP Lambert Academic Publishing, 2012. – 112 с. Isaac Woja. Responses to Food Insecurity. – М.: LAP Lambert Academic Publishing, 2010. – 120 с. Binod Kumar Shah. Cholera, Shigellosis and Salmonellosis Incidence in Nepal. – М.: LAP Lambert Academic Publishing, 2012. – 160 с. Muhammad Saqib Shahzad,Mujgan Cengiz and Salih Cengiz. Forensic Analysis of Blood Stained Soils. – М.: LAP Lambert Academic Publishing, 2011. – 112 с. MD Mostafizur Rahman. Traffic Incident Modelling. – М.: LAP Lambert Academic Publishing, 2012. – 148 с. Kirti Rani. Computers & Biotechnology. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Sunishtha S. Yadav. SNPs - Cancer Incidences & Pharmacogenomics. – М.: LAP Lambert Academic Publishing, 2012. – 116 с. Abhishek Prakash,Neeraj Grover and Shamindra Sengupta. Storage of Evidence and Records in Forensic Odontology. – М.: LAP Lambert Academic Publishing, 2014. – 88 с. G. V. Pramod. Forensic odontology: An overview. – М.: LAP Lambert Academic Publishing, 2012. – 148 с. Farhana Munir,Afshan Kaleem M.Munir and Azar Ilyas. Analysis Of Gene Responsive To COPD In Rural Areas. – М.: LAP Lambert Academic Publishing, 2014. – 116 с. Mark Leting Kipruto and Joshua Lopoghon Kiptilon. Kenya police preparedness during disasters incidents. – М.: LAP Lambert Academic Publishing, 2012. – 96 с. Mustafa Alhassen and Atallh Fowzan Al-Motrfi. Incidence of Brain Lesions in Saudi Population. – М.: LAP Lambert Academic Publishing, 2012. – 52 с. Joy Olotu. Temporal styloid process: its forensic implication in Nigerians. – М.: LAP Lambert Academic Publishing, 2011. – 148 с. Kenneth Revett. A Computational Model of Focal Ischemia. – М.: LAP Lambert Academic Publishing, 2012. – 208 с. Sara Jalali. Item Response Theory. – М.: LAP Lambert Academic Publishing, 2011. – 180 с. Greg Linsdell. Police Tactical Group Critical Incident Training. – М.: LAP Lambert Academic Publishing, 2012. – 124 с. Hemant Kumar Saini and Satpal Singh Kushwaha. Protocol Discovery. – М.: LAP Lambert Academic Publishing, 2014. – 52 с. Mohd Nazri Ismail,Mohd Afizi Shukran and Kamaruzaman Maskat. Smarthome Computing System Using Mobile Devices. – М.: LAP Lambert Academic Publishing, 2014. – 88 с. Soltan Alharbi. Proactive System for Digital Forensic Investigation. – М.: Scholars' Press, 2014. – 84 с. Anjan Kumar Payra. Steganology for the Computer Forensics Examiners. – М.: LAP Lambert Academic Publishing, 2013. – 76 с. Agufa Semenye. Criminal Profiling: A tool in investigating computer crimes. – М.: LAP Lambert Academic Publishing, 2012. – 136 с. Lata Gadhavi. Handling Complex Use Scenario in Grid Computing Environment. – М.: LAP Lambert Academic Publishing, 2014. – 72 с. Md. Rabiul Islam,Md. Fayzur Rahman and Faculty of Electrical-Computer Engineering RUET Rajshahi Bang. IMPROVEMENT OF NOISE ROBUST SPEAKER IDENTIFICATION. – М.: LAP Lambert Academic Publishing, 2010. – 88 с. Palaniappan Shamala and Abd Manaf Azizah. Digital Computer Forensic: Validation and Verification for Disk Imaging. – М.: LAP Lambert Academic Publishing, 2012. – 124 с. Raza Hasan. Forensic Computing. – М.: LAP Lambert Academic Publishing, 2012. – 152 с. Arvind Meniya and H. B. Jethva. Next Generation Mobile Application in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 72 с. Rafal AL-Khashab. An Authentication Model for Cloud Computing Application. – М.: LAP Lambert Academic Publishing, 2014. – 104 с. Rinaldi Yulius. DESIGN OF A CYBER SECURITY LABORATORY. – М.: LAP Lambert Academic Publishing, 2010. – 140 с. Irfan Syamsuddin. Guidelines for Computer Forensics Investigations in Developing Country. – М.: LAP Lambert Academic Publishing, 2011. – 104 с. April L. Tanner and David A. Dampier. Digital Forensic Investigations Visualized. – М.: LAP Lambert Academic Publishing, 2011. – 160 с. Sathish Kumar. Intrusion Detection and Response Techniques for Mobile Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 200 с. Mohd. Sadique Shaikh Anwar. Human Computer Interfacing (HCI) for Effective Business Execution. – М.: LAP Lambert Academic Publishing, 2011. – 132 с. Andrew Marrington. Computer Forensic Profiling. – М.: LAP Lambert Academic Publishing, 2010. – 188 с. Ismael Marin Carrion. High Performance Computing Applied to Nonlinear Time Series Analysis. – М.: LAP Lambert Academic Publishing, 2010. – 184 с. Yigithan Dedeoglu. Algorithms for Smart Video Surveillance. – М.: LAP Lambert Academic Publishing, 2010. – 108 с. Alka Dwivedi and Shashi Prabha Agrawal. Modern Biological Science With DNA Computing. – М.: LAP Lambert Academic Publishing, 2013. – 112 с. Paresh Kerai. Remote Access Forensics for VNC and RDP on Windows Platform. – М.: LAP Lambert Academic Publishing, 2012. – 168 с. Jaggaiah Tripuraneni. Incidence of Poverty Estimation among Rural Labour Households in India. – М.: LAP Lambert Academic Publishing, 2014. – 272 с. Ian Malloy. Systems Management of Alert Responsive Tasks. – М.: , 2012. – 108 с. Michael Hale Ligh, Andrew Case, Jamie Levy, AAron Walters. The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory. – М.: Wiley, . – 912 с.
Лучшие результаты Ничего не найдено Дополнительные результаты Ничего не найдено Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Наталья Доброе утро, Марина, Защита диплома прошла удачно. Благодарю за доработки.