Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Duncan Chappell, Kimberly Ann Rodgers, KIMBERLY ANN ROGERS. Preventing and Responding to Violence at Work. – М.: , 0. – 0 с.
  2. Gregory V. Kitter. Investment Mathematics for Finance & Treasury Professionals: A Practical Approach. – М.: , 0. – 0 с.
  3. Roxannee. Burkey, Charles V. Breakfield. Designing a Total Data Solution: Technology, Implementation, and Deployment. – М.: , 0. – 0 с.
  4. Computer Security. – М.: , 0. – 0 с.
  5. Ronald De Bruin, Ronald De Bruin. Consumer Trust in Electronic Commerce: Time for Best Practice (Law and Electronic Commerce, 17). – М.: , 0. – 0 с.
  6. Peter J. Sander, Peter Sander. The Everything Personal Finance Book: Manage, Budget, Save, and Invest Your Money Wisely (Everything Series). – М.: , 0. – 0 с.
  7. Charles Carrington, Timothy Speed, Juanita Ellis, Steffano Korper. Enterprise Directory and Security Implementation Guide: Designing and Implementing Directories in Your Organization (The Korper and Ellis E-Commerce Books Series). – М.: , 0. – 0 с.
  8. Charles Cresson Wood. Best Practices In Internet Commerce Security. – М.: , 0. – 0 с.
  9. Stephen Penman. Financial Statement Analysis and Security Valuation. – М.: , 2003. – 0 с.
  10. The Secure Online Business: E-Commerce, It Functionality & Business Continuity. – М.: , 2003. – 0 с.
  11. Steven Podnos. Building And Preserving Your Wealth: A Practical Guide To Financial Planning For Affluent Investors. – М.: , 2005. – 0 с.
  12. Alex Homer. ASP.NET 1.1 Insider Solutions. – М.: , 2004. – 624 с.
  13. USAF (Ret.) Maj Gen Perry M. Smith, USA (Ret.) Col. Daniel M. Gerstein. Assignment Pentagon: How to Excel in a Bureaucracy, Fourth Edition, Revised. – М.: , 2007. – 288 с.
  14. David Kean. How Not to Come Second: The Art of Winning Business Pitches. – М.: , 2006. – 192 с.
  15. Stephen Schiffman. The 250 Sales Questions To Close The Deal. – М.: , 2005. – 202 с.
  16. Windows Server 2008 Resource Kit. – М.: Microsoft Press, 2008. – 4000 с.
  17. Alan Calder, Steve Watkins. IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002. – М.: , 2008. – 384 с.
  18. Gerard Blokdijk, Ivanka Menken. Information Security Management Best Practice Workbook: Implementation and Management Roadmap for Threats, Challenges and Solutions - Ready to use supporting documents bringing Theory into Practice. – М.: , 2008. – 124 с.
  19. Ivanka Menken. Virtualization Architecture, Adoption and Monetization of Virtualization Projects using Best Practice Service Strategy, Service Design, Service Transition, ... and Continual Service Improvement Processes. – М.: , 2008. – 164 с.
  20. Handbook on Information Technology in Finance (International Handbooks on Information Systems). – М.: , 2008. – 800 с.
  21. Evan Wheeler. Security Risk Management: Building an Information Security Risk Management Program from the Ground Up. – М.: , 2011. – 360 с.
  22. Christyne A. Czarnowsky. Managing Your Wired Workforce: A Practical Guide. – М.: , 2003. – 0 с.
  23. Geographic Information and Cartography for Risk and Crisis Management: Towards Better Solutions (Lecture Notes in Geoinformation and Cartography). – М.: , 2010. – 400 с.
  24. David L. Cannon. CISA Certified Information Systems Auditor Study Guide. – М.: John Wiley and Sons, Ltd, 2010. – 704 с.
  25. George L Stefanek. Information Security Best Practices. – М.: , 2010. – 160 с.
  26. Christa Anderson and Kristin L. Griffin. Windows Server 2008 R2: Remote Desktop Services: Resource Kit (+ CD-ROM). – М.: Microsoft Press, 2010. – 718 с.
  27. Mobile Application Security. – М.: , 2011. – 432 с.
  28. Fundamentals Of Network Security. – М.: , 2011. – 672 с.
  29. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . –  с.
  30. Adam Jorgensen, Mark Stacey, Devin Knight, Patrick LeBlanc, Brad Schacht. SharePoint 2010 Business Intelligence 24-Hour Trainer (+ DVD-ROM). – М.: Wiley Publishing, Inc, 2011. – 412 с.
  31. Kelly Barbara Schnare. Integrated Water Resource Management in a Developing Tropical Basin. – М.: LAP Lambert Academic Publishing, 2014. – 92 с.
  32. Shahin Shahsavani. Sulphur nutrition and wheat production in northern Iran. – М.: LAP Lambert Academic Publishing, 2013. – 332 с.
  33. Rutendo Nhongonhema. Gender Sensitive Analysis of Conservation Agriculture: Insiza, Zimbabwe. – М.: LAP Lambert Academic Publishing, 2011. – 128 с.
  34. Catherine Doldirina. The Common Good and Access to Remote Sensing Data. – М.: LAP Lambert Academic Publishing, 2011. – 252 с.
  35. Omar Zakaria. Information Security Culture. – М.: LAP Lambert Academic Publishing, 2013. – 248 с.
  36. Mattia Bozza. Information System Management. – М.: LAP Lambert Academic Publishing, 2013. – 132 с.
  37. David Rule. How to Cheat at Configuring VmWare ESX Server. – М.: Syngress, 2007. – 408 с.

Дополнительные результаты

  1. Paul Holmstrom, Erik Bork. Merger Integration Capability: Best Practices in Integration. – М.: , 2012. – 120 с.
  2. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с.
  3. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  4. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с.
  5. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с.
  6. Mary E. Chenoweth, Nancy Y. Moore, Amy G. Cox, Judith D. Mele, Jerry M. Sollinger. Best Practices in Supplier Relationship Management and Their Early Implementation in the Air Force Material Command. – М.: , 2012. – 90 с.
  7. Rose C. Osuji LLM/DM. Participation and Responsibility as Corporate Best Practices. – М.: , 2012. – 176 с.
  8. Robert Goldscheider. The LESI Guide to Licensing Best Practices: Strategic Issues and Contemporary Realities. – М.: , 0. – 0 с.
  9. Robert H. Spencer, Randolph P. Johnston. Technology Best Practices (Wiley Best Practices). – М.: , 0. – 0 с.
  10. Dave Nelson, Patricia E. Moody, Jonathan Stegner. The Purchasing Machine: How the Top Ten Companies Use Best Practices to Manage Their Supply Chains. – М.: , 0. – 0 с.
  11. Rosabeth Moss Kanter, Tom Brown, Robert Heller. Best Practice: Ideas And Insights From The World's Foremost Business Thinkers. – М.: , 0. – 0 с.
  12. David R. Schwandt, Michael J. Marquardt. Organizational Learning From World Class Theories to Global Best Practices. – М.: , 0. – 0 с.
  13. Jane Cranwell-Ward, Patricia Bossons, Sue Gover. Mentoring : A Henley Review of Best Practice. – М.: , 0. – 0 с.
  14. Best Practice : Process Innovation Management. – М.: , 0. – 0 с.
  15. Jeffery D. Abbott, Robert T. Moran. Uniting North American Business: NAFTA Best Practices. – М.: , 0. – 0 с.
  16. Mark B. Desman. Building an Information Security Awareness Program. – М.: , 0. – 0 с.
  17. Cliff Figallo, Nancy Rhine. Building the Knowledge Management Network : Best Practices, Tools, and Techniques for Putting Conversation to Work. – М.: , 0. – 0 с.
  18. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с.
  19. Marko Nordquist. Towards Improved Security Management Practice: Designing an Organizational Model Procedure for the Implementation of Information Security Management in Heterogeneous Information Management. – М.: , 0. – 0 с.
  20. Steve Purser. A Practical Guide to Managing Information Security (Artech House Technology Management Library). – М.: , 0. – 0 с.
  21. Stephen Page. Best Practices in Policies and Procedures. – М.: , 0. – 0 с.
  22. Sandor Boyson, Martin E. Dresner, Lisa Harrington, Thomas M. Corsi, Elliot Rabinovich. Logistics and the Extended Enterprise: Benchmarks and Best Practices for the Manufacturing Professional. – М.: , 0. – 0 с.
  23. Dennis Reynolds. On-Site Foodservice Management : A Best Practices Approach. – М.: , 0. – 0 с.
  24. The Management Center, Leyna Bernstein, Leyna Bernstein. Best Practices : The Model Employee Handbook for California Nonprofits (Jossey-Bass Nonprofit & Public Management Series). – М.: , 0. – 0 с.
  25. Patricia Keehley, Steven Medlin, Sue MacBride, Laura Longmire. Benchmarking for Best Practices in the Public Sector : Achieving Performance Breakthroughs in Federal, State, and Local Agencies (Jossey-Bass Public Administration Series). – М.: , 0. – 0 с.
  26. Robert Hiebeler, Thomas Kelly, Charles Ketteman, Thomas B. Kelly, Arthur Andersen & Co. Best Practices: Building Your Business With Customer-Focused Solutions. – М.: , 0. – 0 с.
  27. Jack B., Phd Revelle. Manufacturing Handbook of Best Practices: An Innovation, Productivity, and Quality Focus. – М.: , 0. – 0 с.
  28. Douglas K. Hoffman, Michael R. Czinkota, Peter R. Dickson, Patrick Dunne, Abbie Griffin, K. Douglas Hoffman. Marketing Principles and Best Practices With Infotrac. – М.: , 0. – 0 с.
  29. K. Douglas Hoffman, Michael R. Czinkota, Peter R. Dickson, Patrick Dunne, Abbie Griffin, Michael D. Hutt, Bilaji Krishnan, John H., Jr. Lindgren, Robert F. Lusch, Ilkka A. Ronkainen. Marketing: Best Practices. – М.: , 0. – 0 с.
  30. Norm Trainor. The 8 Best Practices of High-Performing Salespeople. – М.: John Wiley and Sons, Ltd, 2000. – 228 с.
  31. Lillian N. Cassel, Ricardo A. L. Reis. Informatics Curricula and Teaching Methods: IFIP TC3/WG3.2 Conference on Informatics Curricula, Teaching Methods, and Best Practice (ICTEM 2002), July 10-12, 2002, Florianoplis, SC, Brazil. – М.: , 0. – 0 с.
  32. Marian Quigley, Marian Quiqley. Information Security and Ethics: Social and Organizational Issues. – М.: , 0. – 0 с.
  33. C. Warren Axelrod, Axelrod. Outsourcing Information Security. – М.: , 0. – 0 с.
  34. Harold F. Tipton, Micki Krause, Micki, Cissp Krause. Information Security Management Handbook, Fifth Edition. – М.: , 0. – 0 с.
  35. Charles Cresson Wood. Best Practices In Internet Commerce Security. – М.: , 0. – 0 с.
  36. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с.
  37. Knowledge Management : Concepts and Best Practices. – М.: , 2003. – 0 с.
  38. Institute of Management and Administrati. Cost Reduction and Control Best Practices : The Best Ways for a Financial Manager to Save Money (Wiley Best Practices). – М.: , 2005. – 0 с.
  39. Mary S. Schaeffer. Accounts Payable Best Practices (Wiley Best Practices). – М.: , 2004. – 0 с.
  40. Steven M. Bragg. Billing and Collections Best Practices (Wiley Best Practices). – М.: , 2004. – 0 с.
  41. Steven M. Bragg. Payroll Best Practices. – М.: , 2005. – 0 с.
  42. Steven M. Bragg. Inventory Best Practices (Wiley Best Practices). – М.: , 2004. – 0 с.
  43. Angelo Kinicki. Organizational Behavior: Key Concepts, Skills, & Best Practices with Student CD and Management Skill Booster Card. – М.: , 2003. – 0 с.
  44. Aspatore Books. Venture Capital Best Practices: Leading VCs & Lawyers on Doing Venture Capital Deals (Inside the Minds). – М.: , 2005. – 0 с.
  45. Naomi Langford-Wood. Critical Corporate Communications : A Best Practice Blueprint (CBI Fast Track). – М.: , 2003. – 0 с.
  46. Economics of Information Security (Advances in Information Security). – М.: , 2004. – 0 с.
  47. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с.
  48. Steven M. Bragg. Inventory Accounting : A Comprehensive Guide (Wiley Best Practices). – М.: , 2005. – 0 с.
  49. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с.
  50. Kari Russ. Inside the Minds: Public Relations Best Practices--Industry Insiders Offer Proven Tips for the Most Effective Communications Strategies (Inside the Minds). – М.: , 2005. – 0 с.
  51. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с.
  52. Dean Leffingwell. Scaling Software Agility: Best Practices for Large Enterprises. – М.: Addison-Wesley Professional, 2007. – 384 с.
  53. Linkage Inc. Linkage Inc's Best Practices in Succession Planning. – М.: , 2007. – 288 с.
  54. John Hoover. Best Practices: Difficult People: Working Effectively with Prickly Bosses, Coworkers, and Clients. – М.: Harper Paperbacks, 2007. – 160 с.
  55. Steven M. Bragg. Accounting Best Practices. – М.: , 2007. – 512 с.
  56. Ira Winkler. Zen and the Art of Information Security. – М.: , 2007. – 192 с.
  57. Leading the Global Workforce: Best Practices from Linkage, Inc. (Jossey Bass Business and Management Series). – М.: , 2005. – 320 с.
  58. Anthony Tarantino. Manager's Guide to Compliance: Sarbanes-Oxley, COSO, ERM, COBIT, IFRS, BASEL II, OMB A-123, ASX 10, OECD Principles, Turnbull Guidance, Best Practices, and Case Studies. – М.: Wiley, 2006. – 336 с.
  59. Larry Fogli, Jennifer Ukei. Customer Service Delivery: Research and Best Practices (J-B SIOP Professional Practice Series). – М.: , 2005. – 352 с.
  60. Ralph W Peters. Maintenance Benchmarking and Best Practices. – М.: , 2006. – 566 с.
  61. Timothy P. Layton. Information Security. – М.: , 2006. – 222 с.
  62. K. Douglas Hoffman. Thomson Advantage Books: Marketing Principles and Best Practices (with InfoTrac) (Advantage Series). – М.: , 2005. – 640 с.
  63. Michael E. Whitman, Herbert J. Mattord. Principles of Information Security, Second Edition. – М.: , 2004. – 600 с.
  64. Deon Reynders, Steve Mackay, Edwin Wright. Practical Industrial Data Communications: Best Practice Techniques. – М.: , 2005. – 432 с.
  65. Paul M. Collier, Anthony J. Berry, Gary T. Burke. Risk and Management Accounting: Best practice guidelines for enterprise-wide internal control procedures. – М.: CIMA Publishing, 2006. – 188 с.
  66. Inside the Minds: Energy Venture Capital Best Practices: Leading VCs on Spotting Opportunity, Assessing Risk, and Exiting the Investment. – М.: Aspatore Books, 2006. – 104 с.
  67. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с.
  68. James R. Persse. Hollywood Secrets of Project Management Success (PRO-best Practices) (Best Practices (Microsoft)). – М.: , 2008. – 224 с.
  69. Aspatore Books Staff. Public Relations Best Practices 2008-2009: Industry Leaders on Understanding Client Needs, Staying on Top of Trends, and Utilizing New PR Approaches (Inside the Minds). – М.: , 2008. – 188 с.
  70. Aspatore Books Staff. Medical Device Venture Capital Best Practices 2008-2009: Industry Experts on Establishing Valuations, Deal Terms, and Exit Strategies (Inside the Minds). – М.: , 2008. – 140 с.
  71. Joseph Campana. Privacy MakeOver: The Essential Guide to Best Practices: How to Protect Assets and Foster Consumer Loyalty. – М.: , 2008. – 320 с.
  72. Stephen J. Andriole. Best Practices in Business Technology Management. – М.: , 2008. – 368 с.
  73. F. Curtis Barry. Best Practices in Multichannel Operations & Fulfillment. – М.: , 2008. – 372 с.
  74. Robert W Casey. Best Practices for Nonprofit Boards: Managing Finances and Investments. – М.: , 2008. – 0 с.
  75. Stephen J. Andriole. Technology Due Diligence: Best Practices for Chief Information Officers, Venture Capitalists, and Technology Vendors. – М.: , 2008. – 422 с.
  76. Social and Human Elements of Information Security: Emerging Trends and Countermeasures (Premier Reference Source). – М.: , 2008. – 412 с.
  77. Charles Kenney. The Best Practice: How the New Quality Movement is Transforming Medicine. – М.: , 2008. – 336 с.
  78. Hagit Landman. Enterprise Project Management Using Microsoft Office Project Server 2007: Best Practices for Implementing an EPM Solution. – М.: , 2008. – 472 с.
  79. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с.
  80. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с.
  81. Ivanka Menken, Gerard Blokdijk. Knowledge Management Best Practice WorkBook: Roadmap, Transition, Management, Implementation and Project Plan - Ready to use supporting documents bringing Theory into Practice. – М.: , 2008. – 96 с.
  82. Gerard Blokdijk, Ivanka Menken. IT Governance Metrics Measurement and Benchmarking Best Practice Workbook: Roadmap, Implementation and Management - Ready to use supporting documents bringing Theory into Practice. – М.: , 2008. – 216 с.
  83. Gerard Blokdijk, Ivanka Menken. Information Security Management Best Practice Workbook: Implementation and Management Roadmap for Threats, Challenges and Solutions - Ready to use supporting documents bringing Theory into Practice. – М.: , 2008. – 124 с.
  84. Ivanka Menken. Virtualization Architecture, Adoption and Monetization of Virtualization Projects using Best Practice Service Strategy, Service Design, Service Transition, ... and Continual Service Improvement Processes. – М.: , 2008. – 164 с.
  85. Gerard Blokdijk, Ivanka Menken. Supplier Management Best Practice Handbook: Evaluating, Sourcing, Managing and Delivering Supplier Excellence in Relationships, Quality and Costs - Ready to use bringing Theory into Action. – М.: , 2008. – 204 с.
  86. Gerard Blokdijk, Ivanka Menken. Capacity Management Handbook, Monitor, Analyze, Tune, Manage Demand and Plan Your Organizations IT Capacity Demands Best Practices Handbook - Ready to use bringing Theory into Action. – М.: , 2008. – 104 с.
  87. Aspatore Books Staff. Capitalizing on Business Innovation: Leading CEOs on Best Practices for Developing New Strategies, Innovating at All Levels, and Gaining an Edge in the Marketplace (Inside the Minds). – М.: , 2009. – 148 с.
  88. W. Krag Brotby. Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement. – М.: Auerbach Publications, 2009. – 200 с.
  89. Alan Calder. Information Security based on ISO 27001/ISO 27002: A Management Guide. – М.: , 2009. – 83 с.
  90. Bel G. Raggad. Information Security Management: Concepts and Practice. – М.: , 2010. – 871 с.
  91. Michael E. Whitman, Herbert J. Mattord. Management of Information Security. – М.: , 2010. – 592 с.
  92. Alan Calder, Steve G Watkins. Information Security Risk Management for ISO27001 / ISO27002. – М.: , 2010. – 198 с.
  93. Change Management Best Practices - Templates, Documents and Examples of Change Management in the Public Domain. PLUS access to content.theartofservice.com for downloading. – М.: , 2010. – 194 с.
  94. David Blanchard. Supply Chain Management Best Practices. – М.: John Wiley and Sons, Ltd, 2010. – 304 с.
  95. Capacity Management Best Practices - Templates, Documents and Examples of Capacity Management in the Public Domain PLUS access to content.theartofservice.com for downloading. – М.: , 2010. – 196 с.
  96. Service Desk Best Practices - Templates, Documents and Examples of the Service Desk in the Public Domain PLUS access to content.theartofservice.com for downloading. – М.: , 2010. – 194 с.
  97. William Manning. CISM Certified Information Security Manager Certification Exam Preparation Course in a Book for Passing the CISM Exam - The How To Pass on Your First Try Certification Study Guide. – М.: , 2010. – 188 с.
  98. John J. Burnett. Nonprofit Marketing Best Practices. – М.: , 2007. – 336 с.
  99. Tony Wild. Best Practice in Inventory Management. – М.: , 2010. – 265 с.
  100. Lean Accounting: Best Practices for Sustainable Integration. – М.: Wiley, 2007. – 352 с.
  101. Evan Wheeler. Security Risk Management: Building an Information Security Risk Management Program from the Ground Up. – М.: , 2011. – 360 с.
  102. Bonnie Biafore. Successful Project Management: Applying Best Practices and Real-World Techniques with Microsoft Project: Applying Best Practices, Proven Methods, and ... with Microsoft Project. – М.: , 2011. – 464 с.
  103. Anthony Tarantino. Manager's Guide to Compliance: Best Practices and Case Studies. – М.: John Wiley and Sons, Ltd, 2006. – 334 с.
  104. Editors Karl Maria Michael de Leeuw, Jan Bergstra. The History of Information Security: A Comprehensive Handbook. – М.: Elsevier Science, 2007. – 900 с.
  105. Global Perspectives In Information Security. – М.: , 2008. – 896 с.
  106. ESOMAR. Market Research Best Practice. – М.: , 2007. – 720 с.
  107. Darren Broemmer. J2EETM Best Practices. – М.: , 2002. – 496 с.
  108. Lee Bash. Best Practices in Adult Learning. – М.: , 2010. – 214 с.
  109. Harold Kerzner. Project Management: Best Practices. – М.: , 2010. – 704 с.
  110. Nicholas P Cheremisinoff. Handbook of Pollution Prevention and Cleaner Production - Best Practices in The Petroleum Industry. – М.: , 2010. – 272 с.
  111. Patricia Russotti, Richard Anderson. Digital Photography Best Practices and Workflow Handbook: A Guide to Staying Ahead of the Workflow Curve. – М.: Focal Press, 2010. – 264 с.
  112. John R. Vacca. Managing Information Security. – М.: , 2010. – 320 с.
  113. G. Manoilov. Elsevier's Dictionary of Information Security. – М.: , 2010. – 772 с.
  114. Neil Rankin. irs Best Practice in HR Handbook. – М.: , 2010. – 0 с.
  115. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с.
  116. George L Stefanek. Information Security Best Practices. – М.: , 2010. – 160 с.
  117. Sari Greene. Sustainable Information Security. – М.: , 2010. – 400 с.
  118. John R. Vacca. Computer and Information Security Handbook. – М.: , 2010. – 928 с.
  119. Robert Eckstein. Java Enterprise Best Practices. – М.: , 2003. – 288 с.
  120. Louis Carter. Best Practices in Organizational Development and Change. – М.: , 2009. – 576 с.
  121. Norm Trainor. The 8 Best Practices of High–Performing Salespeople. – М.: , 2000. – 224 с.
  122. Raef Lawson. Scorecard Best Practices. – М.: , 2007. – 208 с.
  123. Mary S. Schaeffer. Travel and Entertainment Best Practices. – М.: , 2007. – 208 с.
  124. Linkage Inc. Linkage Inc?s Best Practices in Leadership Development Handbook. – М.: , 2009. – 480 с.
  125. Mary S. Schaeffer. Accounts Payable Best Practices. – М.: , 2004. – 256 с.
  126. Warren Ruppel. Not–for–Profit Audit Committee Best Practices. – М.: , 2005. – 176 с.
  127. Joel Oleson. SharePoint 2010 – Best Practices for Upgrading and Migrating. – М.: , 2010. – 300 с.
  128. Janice M. Roehl–Anderson. IT Best Practices for Financial Managers. – М.: , 2010. – 352 с.
  129. Brad Price. Active Directory® Best Practices 24sevenTM. – М.: , 2004. – 344 с.
  130. Ed Wilson. Windows PowerShell 2.0 Best Practices. – М.: , 2009. – 752 с.
  131. Best Practices For Equity Research Analysts: Essentials For Buy-Side And Sell-Side Analysts. – М.: , 2011. – 402 с.
  132. Fundamentals Of Network Security. – М.: , 2011. – 672 с.
  133. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . –  с.
  134. Rohana Mohamad Rashid. Determining Influencing Factors of Information Security Culture. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  135. Kim Chi Diep. A Conceptual Framework for Best Practices in Information Literacy. – М.: LAP Lambert Academic Publishing, 2011. – 444 с.
  136. Nicole Nichter. Best Practices in the ESL Classroom for Adult Refugees. – М.: LAP Lambert Academic Publishing, 2012. – 508 с.
  137. Yasser Alshehri. Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 156 с.
  138. Omar Zakaria. Information Security Culture. – М.: LAP Lambert Academic Publishing, 2013. – 248 с.
  139. frankie tvrz and marijke coetzee. Information Security of a Bluetooth-enabled handheld device. – М.: LAP Lambert Academic Publishing, 2010. – 180 с.
  140. Muhammad Imran Tariq. SLA based Information Security Metrics in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2014. – 192 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. О качестве сервиса, связанного с запросами на медицинскую информацию. Medical Information Service?. А. Беденков, "Ремедиум", № 1, январь 2012.
  2. Best Practice в выборе "образа" компании. "Расчет", № 8, август 2009.
  3. Best practices финансового сообщества. Е. Тихомирова, "Консультант", № 7, апрель 2008.

Образцы работ

Тема и предметТип и объем работы
Основы избирательных компаний
PR
Диплом
72 стр.
Public relations в политике как особый «срез» общественных отношений
PR
Курсовая работа
35 стр.
Организацияавтобусного тура в Польшу
Туризм
Диплом
62 стр.
Формирование системы экономической безопасности на Белоярской АЭС
Психофизиология
Диплом
96 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Обычная студенточка, 23.09
Мариночка, огромнейшее Вам спасибо за подбор материала. Если честно, я не думала, что в этом мире бесплатно не только поют птички :)