Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Mohammed M. Hunafa. Government Economic Report - An Intelligence Officer's Viewpoint. – М.: , 2012. – 34 с. Alexander Otgaar, Erik Braun, Leo van den Berg. Urban Management and Economics. – М.: , 2012. – 256 с. Hermone De Soto, Peter Gordon, Ilir Gedeshi, Zamira Sinoimeri. Poverty in Albania: A Qualitative Assessment. – М.: World Bank Publications, 2002. – 156 с. Marina V. N. Whitman. New World, New Rules: The Changing Role of the American Corporation. – М.: , 0. – 0 с. Evelina M. Tainer. Using Economic Indicators to Improve Investment Analysis, 2nd Edition. – М.: , 0. – 0 с. E-Business, E-Government 2002 Lisbon, Ifip Conference on E-Commerce, Paula M. C. Swatman, Luis Valadares Tavares, Joao L. Monteiro, L. Valadares Tavares. Towards the Knowledge Society: Ecommerce, Ebusiness, and Egovernment (International Federation for Information Processing, 233). – М.: , 0. – 0 с. David S. Katz, Ilan Caspi, David S. Katz, Ilan Caspi. Executive's Guide to Personal Security. – М.: , 0. – 0 с. Littler Mendelson Attorneys, Shanti Atkins, Garen Dodge, Ronald Manthey, Marlene Muraco. Beyond Big Brother: The New World of Workplace Privacy. – М.: , 0. – 0 с. Dianna Booher. Great Personal Letters for Busy People: 300 Ready-to-Use Letters for Every Occasion. – М.: , 0. – 0 с. Ulric J., Jr. Gelinas, Steve G. Sutton, Jane Fedorowicz. Business Processes and Information Technology. – М.: , 0. – 0 с. William Beaver. Overseas Americans: The Essential Guide to Living and Working Abroad. – М.: , 0. – 0 с. Ibp USA. Palau a Spy Guide. – М.: , 0. – 0 с. Ibp USA. Nauru a Spy Guide. – М.: , 0. – 0 с. Ibp USA. Cook Islands Sa Spy Guide. – М.: , 0. – 0 с. Ibp USA. Fiji a Spy Guide. – М.: , 0. – 0 с. Ibp USA. Guam a Spy Guide. – М.: , 0. – 0 с. Ibp USA. Kiribati a Spy Guide. – М.: , 0. – 0 с. Ibp USA. Korea South a Spy Guide. – М.: , 0. – 0 с. Ibp USA. Mexico a Spy Guide. – М.: , 0. – 0 с. Ibp USA. Micronesia a Spy Guide. – М.: , 0. – 0 с. Ibp USA. Portugal Aspy Guide. – М.: , 0. – 0 с. Ibp USA. Singapore a Spy Guide. – М.: , 0. – 0 с. Ibp USA. Botswana a Spy Guide. – М.: , 0. – 0 с. Ibp USA. Brazil a Spy Guide. – М.: , 0. – 0 с. Cayman Islands A "Spy" Guide. – М.: International Business Publications, USA, 2008. – 300 с. Ibp USA. Colombia a Spy Guide. – М.: , 0. – 0 с. Ibp USA. Papua New Guinea a Spy Guide. – М.: , 0. – 0 с. Ibp USA. Samoa Western a Spy Guide. – М.: , 0. – 0 с. USA Ibp. Mexico Export-Import. – М.: , 0. – 0 с. John Peterson, Elizabeth Bomberg. Decision-Making in the European Union (European Union). – М.: , 0. – 0 с. Ibp USA. Mexico: A Spy Guide. – М.: , 0. – 0 с. Duncan Chappell, Kimberly Ann Rodgers, KIMBERLY ANN ROGERS. Preventing and Responding to Violence at Work. – М.: , 0. – 0 с. M. J. Wilson, B. Maliszewska-Kordybach. Soil Quality, Sustainable Agriculture and Environmental Security in Central and Eastern Europe (NATO Science Series. 2, Environmental Security). – М.: , 0. – 0 с. Hendrik S. Houthakker, Peter J. Williamson. The Economics of Financial Markets. – М.: , 0. – 0 с. USA Ibp. Botswana a Spy Guide. – М.: , 0. – 0 с. International Business Publications, USA. Cameroon A "Spy" Guide. – М.: , 0. – 0 с. USA Ibp. Colombia a Spy Guide. – М.: , 0. – 0 с. Ibp USA. Grenada a Spy Guide. – М.: , 0. – 0 с. Ibp USA. Switzerland a Spy Guide. – М.: , 0. – 0 с. Ibp USA. Vanuatu a Spy Guide. – М.: , 0. – 0 с. USA Ibp. Cook Islands a Spy Guide. – М.: , 0. – 0 с. Rebecca Herold. The Privacy Papers: Managing Technology, Consumer, Employee and Legislative Actions. – М.: , 0. – 0 с. Charles Jennings, Elizabeth Dyson, Lori Fena. The Hundredth Window: Protecting Your Privacy and Security in the Age of the Internet. – М.: , 0. – 0 с. Gerald L. Kovacich, Edward P. Halibozek. The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, First Edition. – М.: , 0. – 0 с. Ifip Tc11 Wg11.5 Working Conference on Integrity and Internal Control, Michael Gertz, Erik Guldentops, Leon Strous. Integrity, Internal Control and Security in Information Systems: Connecting Governance and Technology (International Federation for Information Processing). – М.: , 0. – 0 с. Daniel Jennings, Joseph Boyce. Information Assurance. – М.: , 0. – 0 с. E-Business, E-Government Ifip Conference on E-Commerce, Beat Schmid, Katarina Stanoevska-Slabeva, Volker Tschammer. Towards the E-Society. – М.: , 0. – 0 с. The Security Economy (Safety Standards Series:). – М.: , 2004. – 0 с. Uma Lele. Addressing the Challenges of Globalization: An Independent Evaluation of the World Bank's Approach to Global Programs (Operations Evaluation Studies) (Operations Evaluation Studies). – М.: , 2005. – 0 с. Preston Gralla. Complete Idiot's Guide To Online Shopping (The Complete Idiot's Guide). – М.: , 2003. – 0 с. Peter R., MBA Ramsaroop. Securing Business Intelligence: Knowledge and CyberSecurity in the Post 9/11 World. – М.: , 2004. – 0 с. Building the E-Service Society : E-Commerce, E-Business, and E-Government (IFIP International Federation for Information Processing). – М.: , 2004. – 0 с. Банкноты стран мира. Денежное обращение, 2002. Каталог-справочник / Banknotes of the World: Notes in Circulation, 2002: Catalogue/Reference Book. – М.: ИнтерКрим-пресс, 2002. – 688 с. Melanie Cullen, Shae Irving. Get It Together: Organize Your Records So Your Family Won't Have To (Book with CD-Rom). – М.: , 2007. – 143 с. Klaus W. Bender. Moneymakers: The Secret World of Banknote Printing. – М.: Wiley VCH, 2006. – 308 с. Mobility, Labour Migration and Border Controls in Asia. – М.: , 2006. – 288 с. Helen James. Security and Stustaibable Developement in Myanmar/Burma (Routledge Contemporary Southeast Asia Series). – М.: , 2006. – 231 с. Alan Calder, Steve Watkins. IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002. – М.: , 2008. – 384 с. Hugh W. Morton. The Big Gamble: Dangers of the FairTax. – М.: , 2008. – 180 с. Craig S. Wright. The IT Regulatory and Standards Compliance Handbook: How to Survive Information Systems Audit and Assessments. – М.: , 2008. – 750 с. Jane Bullock, George Haddow, Damon P. Coppola, Sarp Yeletaysi. Introduction to Homeland Security, Third Edition: Principles of All-Hazards Response (Butterworth-Heinemann Homeland Security). – М.: , 2008. – 616 с. Jake Kouns, Daniel Minoli. Information Technology Risk Management in Enterprise Environments: A Review of Industry Practices and a Practical Guide to Risk Management Teams. – М.: , 2010. – 421 с. Michael E. Whitman, Herbert J. Mattord. Management of Information Security. – М.: , 2010. – 592 с. Lucia Quaglia. Governing Financial Services in the European Union: Banking, Securities and Post-Trading (Routledge/UACES Contemporary European Studies). – М.: , 2010. – 210 с. Klaus W. Grewlich. Governance in "Cyberspace: Access and Public Interest in Global Communications (Law and Electronic Commerce, V. 9). – М.: , 0. – 0 с. David L. Cannon. CISA Certified Information Systems Auditor Study Guide. – М.: John Wiley and Sons, Ltd, 2010. – 704 с. Jaap Bloem. Making IT Governance Work in a Sarbanes–Oxley World. – М.: , 2005. – 304 с. Joey Hirao, Mimi Choi, Perry Cox, Steven Passer, Jeanmarie Hirao. SAP Security Configuration and Deployment. – М.: Syngress, 2009. – 392 с. Krag Brotby. Information Security Governance. – М.: , 2009. – 190 с. Adam Tomkins. Our Republican Constitution. – М.: , 2011. – 168 с. Oracle Soa Suite 11G Handbook. – М.: , 2011. – 800 с. Energy Shift: Game-Changing Options For Fueling The Future. – М.: , 2011. – 208 с. Where The Jobs Are Now: The Fastest-Growing Industries And How To Break Into Them. – М.: , 2011. – 288 с. Fundamentals Of Network Security. – М.: , 2011. – 672 с. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . – с. Glenn Greenwald. No Place to Hide. – М.: Hamish Hamilton, 2014. – 272 с. Celina Myrann Sorboe. Security and Inclusive Citizenship. – М.: LAP Lambert Academic Publishing, 2013. – 144 с. Anthony Egeru. Subsistence holders and fuel wood Demand. – М.: LAP Lambert Academic Publishing, 2011. – 112 с. Zoe Hughes. The Exclusion of Refugees and Asylum Seekers from Irish Society. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Hanumant Waghmare. Utilization of Social Security Programmes in India. – М.: LAP Lambert Academic Publishing, 2013. – 104 с. Jean d`Amour Ntibitura. Strategies for extending the pension coverage in developing countries. – М.: LAP Lambert Academic Publishing, 2014. – 68 с. Eunice Engoke-Odongi. Gender Integration in the Agricultural Extension System. – М.: LAP Lambert Academic Publishing, 2011. – 104 с. Abiodun Fatai. Postconflict peacebuilding and development in West Africa. – М.: LAP Lambert Academic Publishing, 2012. – 100 с. Scovia Magara. Women Economic Empowerment Through Microfinance Institutions. – М.: LAP Lambert Academic Publishing, 2012. – 136 с. Daniel Wallinder. Think of the Children in Africa. – М.: LAP Lambert Academic Publishing, 2012. – 56 с. Veronica Fernandez-Marmol. Quantum Cryptography at High Speed. – М.: LAP Lambert Academic Publishing, 2010. – 240 с. Samson Katengeza,Barnabas Kiiza and Lawrence Mapemba. Malawi Agricultural Commodity Exchange and Rice Market Integration. – М.: LAP Lambert Academic Publishing, 2011. – 96 с. Wole Kinati,K.P.M Chinnan and Adam Bekele. Impact of FRG Project Interventions on the Livelihoods of Farmers. – М.: LAP Lambert Academic Publishing, 2012. – 104 с. Kanwal Naeem,Badar Naseem Siddiqui and Ishrat Fatima. ICTs, Food Security and Small Farmers. – М.: LAP Lambert Academic Publishing, 2014. – 172 с. Zablon W. Shilenje. Climate Early Warning and Communication in the Context of Sudan. – М.: LAP Lambert Academic Publishing, 2014. – 80 с. Esperanza Silva. Planning for Sustainable Development of Inland Aquaculture in Angola. – М.: LAP Lambert Academic Publishing, 2011. – 80 с. Glenn Greenwald. No Place to Hide: Edward Snowden, the NSA and the Surveillance State. – М.: Hamish Hamilton, 2014. – 272 с. Simen A Adnoy Ellingsen. Nuclear Terrorism and Rational Choice. – М.: LAP Lambert Academic Publishing, 2011. – 276 с. Daniel Temesgen Gelan,Tezera Getahun Truneh and Mulugeta Tefera. Analysis of Social Protection Programs in Pastoralist Areas. – М.: LAP Lambert Academic Publishing, 2012. – 116 с. Samuel Kiiru,Njuguna Ng’ethe and Basil Omutsotsi. United Nations and Kenya. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Tulia Ackson. Social security law and Policy Reform in Tanzania. – М.: LAP Lambert Academic Publishing, 2010. – 360 с. Sudarshan Ranpise. Cyber Crime Prevention. – М.: LAP Lambert Academic Publishing, 2013. – 268 с. Poonam Mahajan. Corporate Disclosure Practices in India. – М.: LAP Lambert Academic Publishing, 2012. – 296 с. Halefom Hailu. The Threat of Cybercrime in Ethiopia. – М.: LAP Lambert Academic Publishing, 2014. – 124 с. Ravishankar Mor. Right to information in India. – М.: LAP Lambert Academic Publishing, 2012. – 84 с. Suresh Laudari. IWRM in Inter-Basin Water Transfer Project. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Nnamdi Aduba and Samuel Oguche. Key Issues in Nigerian Constitutional Law. – М.: LAP Lambert Academic Publishing, 2014. – 512 с. Md. Anwar Hossain. Extra Judicial Killings in Bangladesh. – М.: LAP Lambert Academic Publishing, 2014. – 116 с. Olufemi Fawole,Joseph Fayeye and Kingsley Nwachukwu. Security Agency and The Control And Manangement Of Arms In Nigeria. – М.: LAP Lambert Academic Publishing, 2011. – 80 с. Maryna Polyatska. Corporate Governance. – М.: LAP Lambert Academic Publishing, 2010. – 60 с. Chris Okereafor. Redefining conflict transformation in Africa. – М.: Dictus Publishing, 2012. – 268 с. Ehsan Khorasani Esmaeili. Secure Keyboard logging system. – М.: LAP Lambert Academic Publishing, 2013. – 124 с. Shubha Puthran and Ketan Shah. Intrusion Detection System using datamining techniques. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Inadyuti Dutt and Soumya Paul. Some Research on Optical Fibre Security. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Kirat Pal Singh. MIPS Pipeline Cryptoprocessor. – М.: LAP Lambert Academic Publishing, 2012. – 480 с. Marius Nagy and Selim Akl. Using quantum mechanics to enhance information processing. – М.: Scholars' Press, 2012. – 168 с. Govind Singh Tanwar,Chitreshh Banerjee and Ajeet Singh Poonia. Enhanced & Generalised E-Governance Security Framework (EG)2SF. – М.: LAP Lambert Academic Publishing, 2014. – 88 с. Charles Ndekarisho Tarimo. ICT Security Readiness Checklist for Developing Countries. – М.: LAP Lambert Academic Publishing, 2010. – 280 с. Georgiana Lucan. Computer-Based Attacks on Governments. – М.: LAP Lambert Academic Publishing, 2010. – 76 с. Muhammad Imran Tariq. SLA based Information Security Metrics in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2014. – 192 с. Paul Denys. Security of Personal Information in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 144 с. Carlos Grima-Izquierdo. A generic architecture for e-Government and e-Democracy. – М.: LAP Lambert Academic Publishing, 2012. – 316 с. Sevias Guvuriro. Security Schemes funding, Rights accumulation and Poverty eradication. – М.: LAP Lambert Academic Publishing, 2010. – 68 с. Vadim Tarasov. Economic Security: Case of Russia. – М.: LAP Lambert Academic Publishing, 2013. – 112 с. Mary John. Corporate Governance in India. – М.: LAP Lambert Academic Publishing, 2012. – 360 с. Andi Maliqi. Determinants of Government Debt Rating. – М.: LAP Lambert Academic Publishing, 2012. – 64 с. Kelley Stone. Creating an Information Sharing and Analysis Center. – М.: , 2015. – 144 с. Johnny Long. Google Hacking for Penetration Testers, Volume 2. – М.: Syngress, 2007. – 448 с. Дополнительные результаты Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 515 с. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с. Jack J. Champlain. Auditing Information Systems. – М.: , 0. – 0 с. Gerald Kovacich. The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition. – М.: , 0. – 0 с. Protecting Business Information : A Manager's Guide. – М.: , 0. – 0 с. Erhan Kozan, Azuma Ohuchi. Operations Research/Management Science at Work (Advances in Information Security). – М.: , 0. – 0 с. Leigh Wade. Careers in Private Security: How to Get Started, How to Get Ahead. – М.: , 0. – 0 с. Ibp USA. Palau a Spy Guide. – М.: , 0. – 0 с. Ibp USA. Nauru a Spy Guide. – М.: , 0. – 0 с. Ibp USA. Cook Islands Sa Spy Guide. – М.: , 0. – 0 с. Ibp USA. Fiji a Spy Guide. – М.: , 0. – 0 с. Ibp USA. Guam a Spy Guide. – М.: , 0. – 0 с. Ibp USA. Kiribati a Spy Guide. – М.: , 0. – 0 с. Ibp USA. Korea South a Spy Guide. – М.: , 0. – 0 с. Ibp USA. Mexico a Spy Guide. – М.: , 0. – 0 с. Ibp USA. Micronesia a Spy Guide. – М.: , 0. – 0 с. Ibp USA. Portugal Aspy Guide. – М.: , 0. – 0 с. Ibp USA. Singapore a Spy Guide. – М.: , 0. – 0 с. Ibp USA. Botswana a Spy Guide. – М.: , 0. – 0 с. Ibp USA. Brazil a Spy Guide. – М.: , 0. – 0 с. Cayman Islands A "Spy" Guide. – М.: International Business Publications, USA, 2008. – 300 с. Ibp USA. Colombia a Spy Guide. – М.: , 0. – 0 с. Ibp USA. Papua New Guinea a Spy Guide. – М.: , 0. – 0 с. Ibp USA. Samoa Western a Spy Guide. – М.: , 0. – 0 с. USA Ibp. Mexico Export-Import. – М.: , 0. – 0 с. Ibp USA. Mexico: A Spy Guide. – М.: , 0. – 0 с. USA Ibp. Botswana a Spy Guide. – М.: , 0. – 0 с. International Business Publications, USA. Cameroon A "Spy" Guide. – М.: , 0. – 0 с. USA Ibp. Colombia a Spy Guide. – М.: , 0. – 0 с. Ibp USA. Grenada a Spy Guide. – М.: , 0. – 0 с. Ibp USA. Switzerland a Spy Guide. – М.: , 0. – 0 с. Ibp USA. Vanuatu a Spy Guide. – М.: , 0. – 0 с. USA Ibp. Cook Islands a Spy Guide. – М.: , 0. – 0 с. Handbook of Loss Prevention and Crime Prevention, Fourth Edition. – М.: , 0. – 0 с. Charles J. Austin, Stuart B. Boxerman. Information Systems for Healthcare Management, Sixth Edition. – М.: , 0. – 0 с. Mark B. Desman. Building an Information Security Awareness Program. – М.: , 0. – 0 с. John M. D. Hunter. An Information Security Handbook (Computer Communications and Networks). – М.: , 0. – 0 с. Gerald L. Kovacich, Edward P. Halibozek. The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, First Edition. – М.: , 0. – 0 с. Thomas J. Parenty. Digital Defense: What You Should Know About Protecting Your Company's Assets. – М.: , 0. – 0 с. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с. Ifip Tc11 Wg11.5 Working Conference on Integrity and Internal Control, Michael Gertz. Integrity and Internal Control in Information Systems V: Ifip Tc11/Wg11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (Iicis), November 11-12, 2002, Bonn, Germany (International Federation for Information Processing. – М.: , 0. – 0 с. Marko Nordquist. Towards Improved Security Management Practice: Designing an Organizational Model Procedure for the Implementation of Information Security Management in Heterogeneous Information Management. – М.: , 0. – 0 с. John Graves. Management Roadmap to Information Security (Kentis Management Roadmaps). – М.: , 0. – 0 с. Steve Purser. A Practical Guide to Managing Information Security (Artech House Technology Management Library). – М.: , 0. – 0 с. Christopher J. Alberts, Audrey J. Dorofee. Managing Information Security Risks: The OCTAVE Approach. – М.: , 0. – 0 с. Ramon C. Barquin, Alex Bennet, Shereen G. Remez. Building Knowledge Management Environments for Electronic Government. – М.: , 0. – 0 с. Daniel Jennings, Joseph Boyce. Information Assurance. – М.: , 0. – 0 с. Lisa Harris, Dennis Charles, Charles Dennis. Marketing the eBusiness: An Introduction (Routledge Textbooks in eBusiness). – М.: , 0. – 0 с. Marian Quigley, Marian Quiqley. Information Security and Ethics: Social and Organizational Issues. – М.: , 0. – 0 с. C. Warren Axelrod, Axelrod. Outsourcing Information Security. – М.: , 0. – 0 с. Harold F. Tipton, Micki Krause, Micki, Cissp Krause. Information Security Management Handbook, Fifth Edition. – М.: , 0. – 0 с. Aspatore Books Staff. Inside the Minds: Security Matters - Industry Leaders from eBay, Inc., Motorola, Internet Security Systems & More on Protecting Your Most Valuable Assets. – М.: , 0. – 0 с. Thomas Peltier, Thomas Pelitier, Justin Peltier, John A. Blackley, Peltier, Associates. Information Security Fundamentals. – М.: , 0. – 0 с. Charles Cresson Wood. Best Practices In Internet Commerce Security. – М.: , 0. – 0 с. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с. Aspatore Books. Corporate Security in the Information Age: Industry Leaders from Bose Corporation, Dow Jones, and more on Security Options, Protecting Assets, & Implementing a Strategy (Inside the Minds). – М.: , 2005. – 0 с. Barbara C. McNurlin. Information Systems Management in Practice (7th Edition). – М.: , 2005. – 0 с. The Secure Online Business: E-Commerce, It Functionality & Business Continuity. – М.: , 2003. – 0 с. Peter R., MBA Ramsaroop. Securing Business Intelligence: Knowledge and CyberSecurity in the Post 9/11 World. – М.: , 2004. – 0 с. Economics of Information Security (Advances in Information Security). – М.: , 2004. – 0 с. Sari Greene. Security Policies and Procedures : Principles and Practices (Security). – М.: , 2005. – 0 с. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с. Sudhanshu Kairab. A Practical Guide to Security Assessments. – М.: , 2004. – 498 с. Ira Winkler. Zen and the Art of Information Security. – М.: , 2007. – 192 с. Timothy P. Layton. Information Security. – М.: , 2006. – 222 с. Michael Gentile, Ron Collette, Tom August. The Ciso Handbook: A Practical Guide to Securing Your Company. – М.: , 2005. – 352 с. Michael E. Whitman, Herbert J. Mattord. Principles of Information Security, Second Edition. – М.: , 2004. – 600 с. Mobility, Labour Migration and Border Controls in Asia. – М.: , 2006. – 288 с. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с. Patrick Traynor, Patrick McDaniel, Thomas La Porta. Security for Telecommunications Networks (Advances in Information Security). – М.: , 2008. – 182 с. James Michael Stewart, Ed Tittel, Mike Chapple. CISSP: Certified Information Systems Security Professional Study Guide. – М.: , 2008. – 841 с. Alan Calder, Steve Watkins. IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002. – М.: , 2008. – 384 с. Information Technology Governance and Service Management: Frameworks and Adaptations (Premier Reference Source). – М.: , 2008. – 519 с. Social and Human Elements of Information Security: Emerging Trends and Countermeasures (Premier Reference Source). – М.: , 2008. – 412 с. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с. Gerard Blokdijk, Ivanka Menken. Information Security Management Best Practice Workbook: Implementation and Management Roadmap for Threats, Challenges and Solutions - Ready to use supporting documents bringing Theory into Practice. – М.: , 2008. – 124 с. Hamid R. Nemati. Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues (Advances in Information Security and Privacy). – М.: , 2009. – 414 с. W. Krag Brotby. Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement. – М.: Auerbach Publications, 2009. – 200 с. Alan Calder. Information Security based on ISO 27001/ISO 27002: A Management Guide. – М.: , 2009. – 83 с. Jake Kouns, Daniel Minoli. Information Technology Risk Management in Enterprise Environments: A Review of Industry Practices and a Practical Guide to Risk Management Teams. – М.: , 2010. – 421 с. Bel G. Raggad. Information Security Management: Concepts and Practice. – М.: , 2010. – 871 с. Michael E. Whitman, Herbert J. Mattord. Management of Information Security. – М.: , 2010. – 592 с. Sid Sirisukha. Protecting Management Information Systems: VPN Competitive Advantage. – М.: , 2010. – 316 с. Alan Calder, Steve G Watkins. Information Security Risk Management for ISO27001 / ISO27002. – М.: , 2010. – 198 с. William Manning. CISM Certified Information Security Manager Certification Exam Preparation Course in a Book for Passing the CISM Exam - The How To Pass on Your First Try Certification Study Guide. – М.: , 2010. – 188 с. Evan Wheeler. Security Risk Management: Building an Information Security Risk Management Program from the Ground Up. – М.: , 2011. – 360 с. Editors Karl Maria Michael de Leeuw, Jan Bergstra. The History of Information Security: A Comprehensive Handbook. – М.: Elsevier Science, 2007. – 900 с. Global Perspectives In Information Security. – М.: , 2008. – 896 с. Ronald L. Krutz. Cloud Security. – М.: , 2010. – 384 с. John R. Vacca. Managing Information Security. – М.: , 2010. – 320 с. G. Manoilov. Elsevier's Dictionary of Information Security. – М.: , 2010. – 772 с. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с. George L Stefanek. Information Security Best Practices. – М.: , 2010. – 160 с. Sari Greene. Sustainable Information Security. – М.: , 2010. – 400 с. John R. Vacca. Computer and Information Security Handbook. – М.: , 2010. – 928 с. Krag Brotby. Information Security Governance. – М.: , 2009. – 190 с. Principles Of Computer Security, Comptia Security+ And Beyond, Second Edition. – М.: , 2011. – 0 с. Harold F. Tipton, Micki Krause. Information Security Management Handbook on CD-ROM, 2003 Edition. – М.: , . – с. Rohana Mohamad Rashid. Determining Influencing Factors of Information Security Culture. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Nitin Kanzariya and Ashish Nimavat. Security of Digital Image Using Hybrid Steganography. – М.: LAP Lambert Academic Publishing, 2013. – 84 с. Lorenzo Cozzella. Data and Information Security using Hylemetric Approach. – М.: LAP Lambert Academic Publishing, 2014. – 204 с. Lora Pissareva. European Security Governance. – М.: LAP Lambert Academic Publishing, 2012. – 56 с. Kunal Sharma. E-governance in India : A Case Study of Lokmitra in Himachal Pradesh. – М.: LAP Lambert Academic Publishing, 2011. – 264 с. Brijender Kahanwal. A Research Study On Java File Security System Using Rijndael Algorithm. – М.: LAP Lambert Academic Publishing, 2012. – 244 с. Shubha Puthran and Ketan Shah. Intrusion Detection System using datamining techniques. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Rupa Ch. and Avadhani P. S. Modern Security Methods in Applied Computer Science. – М.: Scholars' Press, 2014. – 124 с. Kirat Pal Singh. MIPS Pipeline Cryptoprocessor. – М.: LAP Lambert Academic Publishing, 2012. – 480 с. Yedji Mbangsoua and Dr. Freddie Acosta. Information Security and its Investment Justification. – М.: LAP Lambert Academic Publishing, 2011. – 132 с. Udai Pratap Rao,Dhiren R. Patel and Vidhya Goutham Guntaka. SVD Based Database Watermarking for Security in Database. – М.: LAP Lambert Academic Publishing, 2011. – 56 с. Yasser Alshehri. Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 156 с. Stephen Schiavone,Lalit Garg and Kelly Summers. Information Security in Enterprises - an Ontological Perspective. – М.: LAP Lambert Academic Publishing, 2014. – 232 с. Julien Shabani. Information Security for RFID Systems. – М.: LAP Lambert Academic Publishing, 2011. – 92 с. Osden Jokonya. Information Technology Governance to Achieve Business Objectives. – М.: LAP Lambert Academic Publishing, 2011. – 140 с. Debasish Jena. On Protocols for Information Security Services. – М.: LAP Lambert Academic Publishing, 2011. – 136 с. Aliyu Onipede. Biometrics as a tool for Information Security in Aviation industry. – М.: LAP Lambert Academic Publishing, 2012. – 88 с. Furhan Mehmood and Rajia Rafique. Information Security in Financial Organizations. – М.: LAP Lambert Academic Publishing, 2010. – 68 с. Cyrus Abanti Makori,Jane Onsongo and Lusiba Badru. ICT Security Applications. – М.: LAP Lambert Academic Publishing, 2012. – 112 с. Predrag Tasevski. Interactive Cyber Security Awareness Program. – М.: LAP Lambert Academic Publishing, 2012. – 184 с. Omar Zakaria. Information Security Culture. – М.: LAP Lambert Academic Publishing, 2013. – 248 с. Jahidul Arafat. Higher Education Information Security. – М.: LAP Lambert Academic Publishing, 2013. – 176 с. Saeed Soltanmohammadi. Improving Information System Security by Evaluating Human Factors. – М.: LAP Lambert Academic Publishing, 2014. – 116 с. frankie tvrz and marijke coetzee. Information Security of a Bluetooth-enabled handheld device. – М.: LAP Lambert Academic Publishing, 2010. – 180 с. Ahmed AlNunu. How Much Information Security?. – М.: LAP Lambert Academic Publishing, 2010. – 68 с. Jeffy Mwakalinga. A Framework for Adaptive Information Security Systems. – М.: LAP Lambert Academic Publishing, 2011. – 364 с. Ubaid Hayee. A Six Sigma Approach to Assure IT Security. – М.: LAP Lambert Academic Publishing, 2011. – 64 с. Meysam Namayandeh. Development of Computer Ethical Framework for Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 132 с. Muhammad Imran Tariq. SLA based Information Security Metrics in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2014. – 192 с. Khanyisa Malufu. E-Banking Security. – М.: LAP Lambert Academic Publishing, 2013. – 112 с. Shada Al-Salamah. Towards Information Sharing in Virtual Organisations. – М.: LAP Lambert Academic Publishing, 2010. – 312 с. Alaa Al-Deen Mohammed Hassan. Information Security Management. – М.: LAP Lambert Academic Publishing, 2013. – 188 с. Jun Zheng,Jiantao Gu and Hong Wang. Financial Management and Information Security of Independent Colleges. – М.: LAP Lambert Academic Publishing, 2014. – 256 с. Andrew Armstrong. The Impact of Information Systems on Organisational Maturity. – М.: LAP Lambert Academic Publishing, 2012. – 292 с. Ying Qian. Mitigating Information Security Risks during Operation Transition. – М.: LAP Lambert Academic Publishing, 2012. – 372 с. Johnny Long. Google Hacking for Penetration Testers, Volume 2. – М.: Syngress, 2007. – 448 с. Лучшие результаты Ничего не найдено Дополнительные результаты О качестве сервиса, связанного с запросами на медицинскую информацию. Medical Information Service?. А. Беденков, "Ремедиум", № 1, январь 2012. Директора заблудились между governance и management. А. Верников, "Банковское обозрение", № 8, август 2008. Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Антон, 04.06 Спасибо большое за понимание, мои сокурсники на ваши работы не жалуются ) надеюсь управимся)