Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Business Process Management Workshops: BPM 2011 International Workshops, Clermont-Ferrand, France, August 29, 2011, Revised Selected Papers, Part II (Lecture Notes in Business Information Processing). – М.: , 2012. – 541 с.
  2. Business Process Management Workshops: BPM 2011 International Workshops, Clermont-Ferrand, France, August 29, 2011, Revised Selected Papers, Part I (Lecture Notes in Business Information Processing). – М.: , 2012. – 543 с.
  3. Andrew LaCivita. Interview Intervention: Communication That Gets You Hired: A Milewalk Business Book. – М.: , 2012. – 136 с.
  4. David S. Katz, Ilan Caspi, David S. Katz, Ilan Caspi. Executive's Guide to Personal Security. – М.: , 0. – 0 с.
  5. Mark B. Desman. Building an Information Security Awareness Program. – М.: , 0. – 0 с.
  6. Gerald L. Kovacich, Edward P. Halibozek. The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, First Edition. – М.: , 0. – 0 с.
  7. Encyclopedia of Security Management : Techniques and technology. – М.: , 0. – 0 с.
  8. HAROLD L. LUSTIG. 4 Steps to Financial Security for Lesbian and Gay Couples. – М.: , 0. – 0 с.
  9. The Security Economy (Safety Standards Series:). – М.: , 2004. – 0 с.
  10. Tracey Dalton. The Food and Beverage Handbook (Gourmet Diaries series). – М.: , 2004. – 0 с.
  11. Timothy P. Layton Sr. Information Security Awareness. – М.: , 2005. – 0 с.
  12. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с.
  13. Sasu Tarkoma. Overlay Networks: Toward Information Networking. – М.: , 2010. – 260 с.
  14. Energy Shift: Game-Changing Options For Fueling The Future. – М.: , 2011. – 208 с.
  15. James Gadze. Embedded Wireless Sensor Network for monitoring and control. – М.: LAP Lambert Academic Publishing, 2010. – 168 с.
  16. Olubukola Olatise. Disaster Planning in Nigerian Libraries. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  17. Shivaji Dadabhau Argade,T. Gopikrishna and B. Vijayabhinandan. Sustainable Rural Livelihood Security Through Employment Generation. – М.: LAP Lambert Academic Publishing, 2013. – 200 с.
  18. Gurmanpreet Kaur,Anand Pawar and Simranpreet Kaur. Cyber Terrorism and Law. – М.: LAP Lambert Academic Publishing, 2012. – 128 с.
  19. Manish Gupta and Dharmendra Kumar. Design and Implementation of Digital Watermarking. – М.: LAP Lambert Academic Publishing, 2014. – 172 с.
  20. Yasser Alshehri. Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 156 с.
  21. Cyrus Abanti Makori,Jane Onsongo and Lusiba Badru. ICT Security Applications. – М.: LAP Lambert Academic Publishing, 2012. – 112 с.
  22. Murtaza Hussain Shaikh. Probing the Privacy Policy: Retorts & Encounters. – М.: LAP Lambert Academic Publishing, 2012. – 136 с.
  23. Predrag Tasevski. Interactive Cyber Security Awareness Program. – М.: LAP Lambert Academic Publishing, 2012. – 184 с.
  24. Meysam Namayandeh. Development of Computer Ethical Framework for Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 132 с.
  25. Damilola Julius,Mary Clarkson and Hamza Aldabbas. Prevention Of Crime In Business-to-consumer E-commerce. – М.: LAP Lambert Academic Publishing, 2012. – 188 с.
  26. Kerem Beygo and Cihan Eraslan. Enhancing Security and Usability Features of NFC. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  27. Omoneye OLASANMI. IT INNOVATIONS AND CUSTOMER SATISFACTION IN NIGERIAN BANKS. – М.: LAP Lambert Academic Publishing, 2010. – 108 с.
  28. Zil A. Shah. Analysis of Data Recovery Awareness and Corporate Behavior. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  29. Shipra Gupta. Mutual Funds: Positive and Negative Aspects. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  30. Leonard Fotabong. Cameroon Banking Industry. Competitive Analyses,Insights &Prospects. – М.: LAP Lambert Academic Publishing, 2014. – 52 с.
  31. Geoffrey Koome Riungu. Internet Banking. – М.: LAP Lambert Academic Publishing, 2012. – 100 с.
  32. Ban Mustafa and Najla Aldabagh. Building an Ontology Based Access Control Model for Multi-Agent System. – М.: , 2015. – 120 с.

Дополнительные результаты

  1. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с.
  2. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 515 с.
  3. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  4. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с.
  5. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с.
  6. Jack J. Champlain. Auditing Information Systems. – М.: , 0. – 0 с.
  7. Gerald Kovacich. The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition. – М.: , 0. – 0 с.
  8. Safe Schools: A Security and Loss Prevention Plan. – М.: , 0. – 0 с.
  9. Protecting Business Information : A Manager's Guide. – М.: , 0. – 0 с.
  10. Erhan Kozan, Azuma Ohuchi. Operations Research/Management Science at Work (Advances in Information Security). – М.: , 0. – 0 с.
  11. Leigh Wade. Careers in Private Security: How to Get Started, How to Get Ahead. – М.: , 0. – 0 с.
  12. Handbook of Loss Prevention and Crime Prevention, Fourth Edition. – М.: , 0. – 0 с.
  13. Charles J. Austin, Stuart B. Boxerman. Information Systems for Healthcare Management, Sixth Edition. – М.: , 0. – 0 с.
  14. Mark B. Desman. Building an Information Security Awareness Program. – М.: , 0. – 0 с.
  15. John M. D. Hunter. An Information Security Handbook (Computer Communications and Networks). – М.: , 0. – 0 с.
  16. Gerald L. Kovacich, Edward P. Halibozek. The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, First Edition. – М.: , 0. – 0 с.
  17. Thomas J. Parenty. Digital Defense: What You Should Know About Protecting Your Company's Assets. – М.: , 0. – 0 с.
  18. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с.
  19. Ifip Tc11 Wg11.5 Working Conference on Integrity and Internal Control, Michael Gertz. Integrity and Internal Control in Information Systems V: Ifip Tc11/Wg11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (Iicis), November 11-12, 2002, Bonn, Germany (International Federation for Information Processing. – М.: , 0. – 0 с.
  20. Marko Nordquist. Towards Improved Security Management Practice: Designing an Organizational Model Procedure for the Implementation of Information Security Management in Heterogeneous Information Management. – М.: , 0. – 0 с.
  21. John Graves. Management Roadmap to Information Security (Kentis Management Roadmaps). – М.: , 0. – 0 с.
  22. Steve Purser. A Practical Guide to Managing Information Security (Artech House Technology Management Library). – М.: , 0. – 0 с.
  23. Christopher J. Alberts, Audrey J. Dorofee. Managing Information Security Risks: The OCTAVE Approach. – М.: , 0. – 0 с.
  24. Daniel Jennings, Joseph Boyce. Information Assurance. – М.: , 0. – 0 с.
  25. Marian Quigley, Marian Quiqley. Information Security and Ethics: Social and Organizational Issues. – М.: , 0. – 0 с.
  26. C. Warren Axelrod, Axelrod. Outsourcing Information Security. – М.: , 0. – 0 с.
  27. Harold F. Tipton, Micki Krause, Micki, Cissp Krause. Information Security Management Handbook, Fifth Edition. – М.: , 0. – 0 с.
  28. Aspatore Books Staff. Inside the Minds: Security Matters - Industry Leaders from eBay, Inc., Motorola, Internet Security Systems & More on Protecting Your Most Valuable Assets. – М.: , 0. – 0 с.
  29. Thomas Peltier, Thomas Pelitier, Justin Peltier, John A. Blackley, Peltier, Associates. Information Security Fundamentals. – М.: , 0. – 0 с.
  30. Charles Cresson Wood. Best Practices In Internet Commerce Security. – М.: , 0. – 0 с.
  31. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с.
  32. Aspatore Books. Corporate Security in the Information Age: Industry Leaders from Bose Corporation, Dow Jones, and more on Security Options, Protecting Assets, & Implementing a Strategy (Inside the Minds). – М.: , 2005. – 0 с.
  33. Barbara C. McNurlin. Information Systems Management in Practice (7th Edition). – М.: , 2005. – 0 с.
  34. The Secure Online Business: E-Commerce, It Functionality & Business Continuity. – М.: , 2003. – 0 с.
  35. Peter R., MBA Ramsaroop. Securing Business Intelligence: Knowledge and CyberSecurity in the Post 9/11 World. – М.: , 2004. – 0 с.
  36. Timothy P. Layton Sr. Information Security Awareness. – М.: , 2005. – 0 с.
  37. Economics of Information Security (Advances in Information Security). – М.: , 2004. – 0 с.
  38. Sari Greene. Security Policies and Procedures : Principles and Practices (Security). – М.: , 2005. – 0 с.
  39. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с.
  40. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с.
  41. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с.
  42. Sudhanshu Kairab. A Practical Guide to Security Assessments. – М.: , 2004. – 498 с.
  43. Ira Winkler. Zen and the Art of Information Security. – М.: , 2007. – 192 с.
  44. Timothy P. Layton. Information Security. – М.: , 2006. – 222 с.
  45. Michael Gentile, Ron Collette, Tom August. The Ciso Handbook: A Practical Guide to Securing Your Company. – М.: , 2005. – 352 с.
  46. Michael E. Whitman, Herbert J. Mattord. Principles of Information Security, Second Edition. – М.: , 2004. – 600 с.
  47. Linda Carol Edwards. The Creative Arts: A Process Approach for Teachers and Children (4th Edition). – М.: , 2005. – 400 с.
  48. Mehdi Khosrow-Pour. Web Technologies for Commerce and Services Online. – М.: Idea Group Reference, 2007. – 392 с.
  49. Michael E. Whitman, Herbert J. Mattord. Management Of Information Security, 2/E. – М.: , 2007. – 600 с.
  50. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с.
  51. Patrick Traynor, Patrick McDaniel, Thomas La Porta. Security for Telecommunications Networks (Advances in Information Security). – М.: , 2008. – 182 с.
  52. James Michael Stewart, Ed Tittel, Mike Chapple. CISSP: Certified Information Systems Security Professional Study Guide. – М.: , 2008. – 841 с.
  53. Alan Calder, Steve Watkins. IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002. – М.: , 2008. – 384 с.
  54. Social and Human Elements of Information Security: Emerging Trends and Countermeasures (Premier Reference Source). – М.: , 2008. – 412 с.
  55. Bartu Soral. Banking Crises and Bankruptcy for Profit in Turkey. – М.: , 2008. – 96 с.
  56. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с.
  57. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с.
  58. Gerard Blokdijk, Ivanka Menken. Information Security Management Best Practice Workbook: Implementation and Management Roadmap for Threats, Challenges and Solutions - Ready to use supporting documents bringing Theory into Practice. – М.: , 2008. – 124 с.
  59. Ivanka Menken. Virtualization Architecture, Adoption and Monetization of Virtualization Projects using Best Practice Service Strategy, Service Design, Service Transition, ... and Continual Service Improvement Processes. – М.: , 2008. – 164 с.
  60. Hamid R. Nemati. Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues (Advances in Information Security and Privacy). – М.: , 2009. – 414 с.
  61. brian Honan. Implementing ISO27001 in a Windows® Environment. – М.: , 2009. – 316 с.
  62. W. Krag Brotby. Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement. – М.: Auerbach Publications, 2009. – 200 с.
  63. Alan Calder. Information Security based on ISO 27001/ISO 27002: A Management Guide. – М.: , 2009. – 83 с.
  64. Jake Kouns, Daniel Minoli. Information Technology Risk Management in Enterprise Environments: A Review of Industry Practices and a Practical Guide to Risk Management Teams. – М.: , 2010. – 421 с.
  65. Bel G. Raggad. Information Security Management: Concepts and Practice. – М.: , 2010. – 871 с.
  66. Michael E. Whitman, Herbert J. Mattord. Management of Information Security. – М.: , 2010. – 592 с.
  67. Sid Sirisukha. Protecting Management Information Systems: VPN Competitive Advantage. – М.: , 2010. – 316 с.
  68. Alan Calder, Steve G Watkins. Information Security Risk Management for ISO27001 / ISO27002. – М.: , 2010. – 198 с.
  69. William Manning. CISM Certified Information Security Manager Certification Exam Preparation Course in a Book for Passing the CISM Exam - The How To Pass on Your First Try Certification Study Guide. – М.: , 2010. – 188 с.
  70. Evan Wheeler. Security Risk Management: Building an Information Security Risk Management Program from the Ground Up. – М.: , 2011. – 360 с.
  71. Editors Karl Maria Michael de Leeuw, Jan Bergstra. The History of Information Security: A Comprehensive Handbook. – М.: Elsevier Science, 2007. – 900 с.
  72. Global Perspectives In Information Security. – М.: , 2008. – 896 с.
  73. Kevin D. Mitnick. The Art of Intrusion. – М.: , 2005. – 270 с.
  74. John R. Vacca. Managing Information Security. – М.: , 2010. – 320 с.
  75. G. Manoilov. Elsevier's Dictionary of Information Security. – М.: , 2010. – 772 с.
  76. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с.
  77. George L Stefanek. Information Security Best Practices. – М.: , 2010. – 160 с.
  78. Sari Greene. Sustainable Information Security. – М.: , 2010. – 400 с.
  79. John R. Vacca. Computer and Information Security Handbook. – М.: , 2010. – 928 с.
  80. Krag Brotby. Information Security Governance. – М.: , 2009. – 190 с.
  81. Principles Of Computer Security, Comptia Security+ And Beyond, Second Edition. – М.: , 2011. – 0 с.
  82. Shon Harris. CISSP All-in-One Exam Guide (+ CD-ROM). – М.: McGraw-Hill Companies, 2010. – 1216 с.
  83. Cissp Practice Exams. – М.: , 2011. – 414 с.
  84. Hacking Exposed Web Applications, 3Rd Edition. – М.: , 2011. – 482 с.
  85. Harold F. Tipton, Micki Krause. Information Security Management Handbook on CD-ROM, 2003 Edition. – М.: , . –  с.
  86. Laura Taylor. Fisma Certification & Accreditation Handbook. – М.: , 2006. – 498 с.
  87. Charles L. Brooks. CHFI: Computer Hacking Forensic Investigator Certification: Exam Guide (+ CD). – М.: McGraw-Hill Education, 2015. – 656 с.
  88. Jaydeb Bhaumik and Satyajit Das. Substitution Permutation Network Type Block Cipher. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  89. Arjun Mane and Karbhari Kale. Face Recognition Using Principal Component Analysis. – М.: LAP Lambert Academic Publishing, 2015. – 144 с.
  90. Rohana Mohamad Rashid. Determining Influencing Factors of Information Security Culture. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  91. Nitin Kanzariya and Ashish Nimavat. Security of Digital Image Using Hybrid Steganography. – М.: LAP Lambert Academic Publishing, 2013. – 84 с.
  92. Lorenzo Cozzella. Data and Information Security using Hylemetric Approach. – М.: LAP Lambert Academic Publishing, 2014. – 204 с.
  93. Epfania Lepaleni. Encourage People's Participation in Waste Management,Eenhana-Namibia. – М.: LAP Lambert Academic Publishing, 2013. – 128 с.
  94. Sachin Mahajan. Application of WINISIS in Library Housekeeping Operations and Services. – М.: LAP Lambert Academic Publishing, 2014. – 232 с.
  95. Shesh Mishra. Information Literacy in Higher Education. – М.: LAP Lambert Academic Publishing, 2013. – 216 с.
  96. Saadia Khaleel. Factors influencing the adoption of Internet Banking in Pakistan. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  97. Guruju Ganapathirao and Bhaskara Rao Ponnana. Emerging Trends of Insider Trading in Corporate Sector. – М.: LAP Lambert Academic Publishing, 2013. – 116 с.
  98. Janmejaya Samal. Public health and allied career choices for AYUSH graduates in India. – М.: LAP Lambert Academic Publishing, 2015. – 68 с.
  99. MATOME JACK MASHIAPATA. CAREER AWARENESS AMONG FIRST YEAR STUDENTS IN INFORMATION TECHNOLOGY. – М.: LAP Lambert Academic Publishing, 2011. – 272 с.
  100. Rupesh S. Mishra and D. K. Chitre. Data Leakage Detection in Relational Database. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  101. Pradeep Sadanand. Implementation of GSTRBAC using .NET framework. – М.: LAP Lambert Academic Publishing, 2012. – 56 с.
  102. Brijender Kahanwal. A Research Study On Java File Security System Using Rijndael Algorithm. – М.: LAP Lambert Academic Publishing, 2012. – 244 с.
  103. Shubha Puthran and Ketan Shah. Intrusion Detection System using datamining techniques. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  104. Prasad Lokulwar,Vivek Shelkhe and Mangesh Ghonge. Security Aware Routing protocol for MANET. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  105. Ravinder Singh Mann. A Comparative Evaluation of Cryptographic Algorithms. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  106. Rupa Ch. and Avadhani P. S. Modern Security Methods in Applied Computer Science. – М.: Scholars' Press, 2014. – 124 с.
  107. Arjun Nichal. Steganography for JPEG2000 Baseline System. – М.: LAP Lambert Academic Publishing, 2013. – 60 с.
  108. Shamiel Ebrahim. Digital Signature with RSA. – М.: LAP Lambert Academic Publishing, 2011. – 76 с.
  109. Antarpreet Singh Manchanda. Design Methodology for Differential Power Analysis Resistant Circuits. – М.: LAP Lambert Academic Publishing, 2014. – 120 с.
  110. Kirat Pal Singh. MIPS Pipeline Cryptoprocessor. – М.: LAP Lambert Academic Publishing, 2012. – 480 с.
  111. Aiman Abdul Razzak Al-Sabaawi. Hide A Text In An Image File (BMP). – М.: LAP Lambert Academic Publishing, 2013. – 80 с.
  112. Yedji Mbangsoua and Dr. Freddie Acosta. Information Security and its Investment Justification. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  113. Udai Pratap Rao,Dhiren R. Patel and Vidhya Goutham Guntaka. SVD Based Database Watermarking for Security in Database. – М.: LAP Lambert Academic Publishing, 2011. – 56 с.
  114. Yasser Alshehri. Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 156 с.
  115. Stephen Schiavone,Lalit Garg and Kelly Summers. Information Security in Enterprises - an Ontological Perspective. – М.: LAP Lambert Academic Publishing, 2014. – 232 с.
  116. Julien Shabani. Information Security for RFID Systems. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.
  117. Debasish Jena. On Protocols for Information Security Services. – М.: LAP Lambert Academic Publishing, 2011. – 136 с.
  118. Aliyu Onipede. Biometrics as a tool for Information Security in Aviation industry. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  119. Furhan Mehmood and Rajia Rafique. Information Security in Financial Organizations. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  120. Cyrus Abanti Makori,Jane Onsongo and Lusiba Badru. ICT Security Applications. – М.: LAP Lambert Academic Publishing, 2012. – 112 с.
  121. Murtaza Hussain Shaikh. Probing the Privacy Policy: Retorts & Encounters. – М.: LAP Lambert Academic Publishing, 2012. – 136 с.
  122. Predrag Tasevski. Interactive Cyber Security Awareness Program. – М.: LAP Lambert Academic Publishing, 2012. – 184 с.
  123. Omar Zakaria. Information Security Culture. – М.: LAP Lambert Academic Publishing, 2013. – 248 с.
  124. Jahidul Arafat. Higher Education Information Security. – М.: LAP Lambert Academic Publishing, 2013. – 176 с.
  125. Saeed Soltanmohammadi. Improving Information System Security by Evaluating Human Factors. – М.: LAP Lambert Academic Publishing, 2014. – 116 с.
  126. frankie tvrz and marijke coetzee. Information Security of a Bluetooth-enabled handheld device. – М.: LAP Lambert Academic Publishing, 2010. – 180 с.
  127. Ahmed AlNunu. How Much Information Security?. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  128. Jeffy Mwakalinga. A Framework for Adaptive Information Security Systems. – М.: LAP Lambert Academic Publishing, 2011. – 364 с.
  129. Ubaid Hayee. A Six Sigma Approach to Assure IT Security. – М.: LAP Lambert Academic Publishing, 2011. – 64 с.
  130. Meysam Namayandeh. Development of Computer Ethical Framework for Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 132 с.
  131. Muhammad Imran Tariq. SLA based Information Security Metrics in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2014. – 192 с.
  132. Damilola Julius,Mary Clarkson and Hamza Aldabbas. Prevention Of Crime In Business-to-consumer E-commerce. – М.: LAP Lambert Academic Publishing, 2012. – 188 с.
  133. Noor Ul Amin. Secure MANET Communication Based on Hybrid Cryptosystem. – М.: LAP Lambert Academic Publishing, 2013. – 64 с.
  134. Khanyisa Malufu. E-Banking Security. – М.: LAP Lambert Academic Publishing, 2013. – 112 с.
  135. Shada Al-Salamah. Towards Information Sharing in Virtual Organisations. – М.: LAP Lambert Academic Publishing, 2010. – 312 с.
  136. Zil A. Shah. Analysis of Data Recovery Awareness and Corporate Behavior. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  137. Alaa Al-Deen Mohammed Hassan. Information Security Management. – М.: LAP Lambert Academic Publishing, 2013. – 188 с.
  138. Jun Zheng,Jiantao Gu and Hong Wang. Financial Management and Information Security of Independent Colleges. – М.: LAP Lambert Academic Publishing, 2014. – 256 с.
  139. Ying Qian. Mitigating Information Security Risks during Operation Transition. – М.: LAP Lambert Academic Publishing, 2012. – 372 с.
  140. Chris Cubbage. Security Risk Management in Corporate Governance. – М.: LAP Lambert Academic Publishing, 2010. – 140 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. О качестве сервиса, связанного с запросами на медицинскую информацию. Medical Information Service?. А. Беденков, "Ремедиум", № 1, январь 2012.

Образцы работ

Тема и предметТип и объем работы
Основы избирательных компаний
PR
Диплом
72 стр.
Public relations в политике как особый «срез» общественных отношений
PR
Курсовая работа
35 стр.
Специализация учреждений ООН: правовая характеристика, привелегии и иммунитет
Международная экономика
Реферат
19 стр.
Формирование системы экономической безопасности на Белоярской АЭС
Психофизиология
Диплом
96 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Наиль
Спасибо за курсовую. на высшем уровне! Получили 5! Так же мы были бы рады и в будущем с Вами работать.