Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Mohammed M. Hunafa. Government Economic Report - An Intelligence Officer's Viewpoint. – М.: , 2012. – 34 с.
  2. Alexander Otgaar, Erik Braun, Leo van den Berg. Urban Management and Economics. – М.: , 2012. – 256 с.
  3. Hermone De Soto, Peter Gordon, Ilir Gedeshi, Zamira Sinoimeri. Poverty in Albania: A Qualitative Assessment. – М.: World Bank Publications, 2002. – 156 с.
  4. Marina V. N. Whitman. New World, New Rules: The Changing Role of the American Corporation. – М.: , 0. – 0 с.
  5. Evelina M. Tainer. Using Economic Indicators to Improve Investment Analysis, 2nd Edition. – М.: , 0. – 0 с.
  6. E-Business, E-Government 2002 Lisbon, Ifip Conference on E-Commerce, Paula M. C. Swatman, Luis Valadares Tavares, Joao L. Monteiro, L. Valadares Tavares. Towards the Knowledge Society: Ecommerce, Ebusiness, and Egovernment (International Federation for Information Processing, 233). – М.: , 0. – 0 с.
  7. David S. Katz, Ilan Caspi, David S. Katz, Ilan Caspi. Executive's Guide to Personal Security. – М.: , 0. – 0 с.
  8. Littler Mendelson Attorneys, Shanti Atkins, Garen Dodge, Ronald Manthey, Marlene Muraco. Beyond Big Brother: The New World of Workplace Privacy. – М.: , 0. – 0 с.
  9. Dianna Booher. Great Personal Letters for Busy People: 300 Ready-to-Use Letters for Every Occasion. – М.: , 0. – 0 с.
  10. Ulric J., Jr. Gelinas, Steve G. Sutton, Jane Fedorowicz. Business Processes and Information Technology. – М.: , 0. – 0 с.
  11. William Beaver. Overseas Americans: The Essential Guide to Living and Working Abroad. – М.: , 0. – 0 с.
  12. Ibp USA. Palau a Spy Guide. – М.: , 0. – 0 с.
  13. Ibp USA. Nauru a Spy Guide. – М.: , 0. – 0 с.
  14. Ibp USA. Cook Islands Sa Spy Guide. – М.: , 0. – 0 с.
  15. Ibp USA. Fiji a Spy Guide. – М.: , 0. – 0 с.
  16. Ibp USA. Guam a Spy Guide. – М.: , 0. – 0 с.
  17. Ibp USA. Kiribati a Spy Guide. – М.: , 0. – 0 с.
  18. Ibp USA. Korea South a Spy Guide. – М.: , 0. – 0 с.
  19. Ibp USA. Mexico a Spy Guide. – М.: , 0. – 0 с.
  20. Ibp USA. Micronesia a Spy Guide. – М.: , 0. – 0 с.
  21. Ibp USA. Portugal Aspy Guide. – М.: , 0. – 0 с.
  22. Ibp USA. Singapore a Spy Guide. – М.: , 0. – 0 с.
  23. Ibp USA. Botswana a Spy Guide. – М.: , 0. – 0 с.
  24. Ibp USA. Brazil a Spy Guide. – М.: , 0. – 0 с.
  25. Cayman Islands A "Spy" Guide. – М.: International Business Publications, USA, 2008. – 300 с.
  26. Ibp USA. Colombia a Spy Guide. – М.: , 0. – 0 с.
  27. Ibp USA. Papua New Guinea a Spy Guide. – М.: , 0. – 0 с.
  28. Ibp USA. Samoa Western a Spy Guide. – М.: , 0. – 0 с.
  29. USA Ibp. Mexico Export-Import. – М.: , 0. – 0 с.
  30. John Peterson, Elizabeth Bomberg. Decision-Making in the European Union (European Union). – М.: , 0. – 0 с.
  31. Ibp USA. Mexico: A Spy Guide. – М.: , 0. – 0 с.
  32. Duncan Chappell, Kimberly Ann Rodgers, KIMBERLY ANN ROGERS. Preventing and Responding to Violence at Work. – М.: , 0. – 0 с.
  33. M. J. Wilson, B. Maliszewska-Kordybach. Soil Quality, Sustainable Agriculture and Environmental Security in Central and Eastern Europe (NATO Science Series. 2, Environmental Security). – М.: , 0. – 0 с.
  34. Hendrik S. Houthakker, Peter J. Williamson. The Economics of Financial Markets. – М.: , 0. – 0 с.
  35. USA Ibp. Botswana a Spy Guide. – М.: , 0. – 0 с.
  36. International Business Publications, USA. Cameroon A "Spy" Guide. – М.: , 0. – 0 с.
  37. USA Ibp. Colombia a Spy Guide. – М.: , 0. – 0 с.
  38. Ibp USA. Grenada a Spy Guide. – М.: , 0. – 0 с.
  39. Ibp USA. Switzerland a Spy Guide. – М.: , 0. – 0 с.
  40. Ibp USA. Vanuatu a Spy Guide. – М.: , 0. – 0 с.
  41. USA Ibp. Cook Islands a Spy Guide. – М.: , 0. – 0 с.
  42. Rebecca Herold. The Privacy Papers: Managing Technology, Consumer, Employee and Legislative Actions. – М.: , 0. – 0 с.
  43. Charles Jennings, Elizabeth Dyson, Lori Fena. The Hundredth Window: Protecting Your Privacy and Security in the Age of the Internet. – М.: , 0. – 0 с.
  44. Gerald L. Kovacich, Edward P. Halibozek. The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, First Edition. – М.: , 0. – 0 с.
  45. Ifip Tc11 Wg11.5 Working Conference on Integrity and Internal Control, Michael Gertz, Erik Guldentops, Leon Strous. Integrity, Internal Control and Security in Information Systems: Connecting Governance and Technology (International Federation for Information Processing). – М.: , 0. – 0 с.
  46. Daniel Jennings, Joseph Boyce. Information Assurance. – М.: , 0. – 0 с.
  47. E-Business, E-Government Ifip Conference on E-Commerce, Beat Schmid, Katarina Stanoevska-Slabeva, Volker Tschammer. Towards the E-Society. – М.: , 0. – 0 с.
  48. The Security Economy (Safety Standards Series:). – М.: , 2004. – 0 с.
  49. Uma Lele. Addressing the Challenges of Globalization: An Independent Evaluation of the World Bank's Approach to Global Programs (Operations Evaluation Studies) (Operations Evaluation Studies). – М.: , 2005. – 0 с.
  50. Preston Gralla. Complete Idiot's Guide To Online Shopping (The Complete Idiot's Guide). – М.: , 2003. – 0 с.
  51. Peter R., MBA Ramsaroop. Securing Business Intelligence: Knowledge and CyberSecurity in the Post 9/11 World. – М.: , 2004. – 0 с.
  52. Building the E-Service Society : E-Commerce, E-Business, and E-Government (IFIP International Federation for Information Processing). – М.: , 2004. – 0 с.
  53. Банкноты стран мира. Денежное обращение, 2002. Каталог-справочник / Banknotes of the World: Notes in Circulation, 2002: Catalogue/Reference Book. – М.: ИнтерКрим-пресс, 2002. – 688 с.
  54. Melanie Cullen, Shae Irving. Get It Together: Organize Your Records So Your Family Won't Have To (Book with CD-Rom). – М.: , 2007. – 143 с.
  55. Klaus W. Bender. Moneymakers: The Secret World of Banknote Printing. – М.: Wiley VCH, 2006. – 308 с.
  56. Mobility, Labour Migration and Border Controls in Asia. – М.: , 2006. – 288 с.
  57. Helen James. Security and Stustaibable Developement in Myanmar/Burma (Routledge Contemporary Southeast Asia Series). – М.: , 2006. – 231 с.
  58. Alan Calder, Steve Watkins. IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002. – М.: , 2008. – 384 с.
  59. Hugh W. Morton. The Big Gamble: Dangers of the FairTax. – М.: , 2008. – 180 с.
  60. Craig S. Wright. The IT Regulatory and Standards Compliance Handbook: How to Survive Information Systems Audit and Assessments. – М.: , 2008. – 750 с.
  61. Jane Bullock, George Haddow, Damon P. Coppola, Sarp Yeletaysi. Introduction to Homeland Security, Third Edition: Principles of All-Hazards Response (Butterworth-Heinemann Homeland Security). – М.: , 2008. – 616 с.
  62. Jake Kouns, Daniel Minoli. Information Technology Risk Management in Enterprise Environments: A Review of Industry Practices and a Practical Guide to Risk Management Teams. – М.: , 2010. – 421 с.
  63. Michael E. Whitman, Herbert J. Mattord. Management of Information Security. – М.: , 2010. – 592 с.
  64. Lucia Quaglia. Governing Financial Services in the European Union: Banking, Securities and Post-Trading (Routledge/UACES Contemporary European Studies). – М.: , 2010. – 210 с.
  65. Klaus W. Grewlich. Governance in "Cyberspace: Access and Public Interest in Global Communications (Law and Electronic Commerce, V. 9). – М.: , 0. – 0 с.
  66. David L. Cannon. CISA Certified Information Systems Auditor Study Guide. – М.: John Wiley and Sons, Ltd, 2010. – 704 с.
  67. Jaap Bloem. Making IT Governance Work in a Sarbanes–Oxley World. – М.: , 2005. – 304 с.
  68. Joey Hirao, Mimi Choi, Perry Cox, Steven Passer, Jeanmarie Hirao. SAP Security Configuration and Deployment. – М.: Syngress, 2009. – 392 с.
  69. Krag Brotby. Information Security Governance. – М.: , 2009. – 190 с.
  70. Adam Tomkins. Our Republican Constitution. – М.: , 2011. – 168 с.
  71. Oracle Soa Suite 11G Handbook. – М.: , 2011. – 800 с.
  72. Energy Shift: Game-Changing Options For Fueling The Future. – М.: , 2011. – 208 с.
  73. Where The Jobs Are Now: The Fastest-Growing Industries And How To Break Into Them. – М.: , 2011. – 288 с.
  74. Fundamentals Of Network Security. – М.: , 2011. – 672 с.
  75. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . –  с.
  76. Glenn Greenwald. No Place to Hide. – М.: Hamish Hamilton, 2014. – 272 с.
  77. Celina Myrann Sorboe. Security and Inclusive Citizenship. – М.: LAP Lambert Academic Publishing, 2013. – 144 с.
  78. Anthony Egeru. Subsistence holders and fuel wood Demand. – М.: LAP Lambert Academic Publishing, 2011. – 112 с.
  79. Zoe Hughes. The Exclusion of Refugees and Asylum Seekers from Irish Society. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  80. Hanumant Waghmare. Utilization of Social Security Programmes in India. – М.: LAP Lambert Academic Publishing, 2013. – 104 с.
  81. Jean d`Amour Ntibitura. Strategies for extending the pension coverage in developing countries. – М.: LAP Lambert Academic Publishing, 2014. – 68 с.
  82. Eunice Engoke-Odongi. Gender Integration in the Agricultural Extension System. – М.: LAP Lambert Academic Publishing, 2011. – 104 с.
  83. Abiodun Fatai. Postconflict peacebuilding and development in West Africa. – М.: LAP Lambert Academic Publishing, 2012. – 100 с.
  84. Scovia Magara. Women Economic Empowerment Through Microfinance Institutions. – М.: LAP Lambert Academic Publishing, 2012. – 136 с.
  85. Daniel Wallinder. Think of the Children in Africa. – М.: LAP Lambert Academic Publishing, 2012. – 56 с.
  86. Veronica Fernandez-Marmol. Quantum Cryptography at High Speed. – М.: LAP Lambert Academic Publishing, 2010. – 240 с.
  87. Samson Katengeza,Barnabas Kiiza and Lawrence Mapemba. Malawi Agricultural Commodity Exchange and Rice Market Integration. – М.: LAP Lambert Academic Publishing, 2011. – 96 с.
  88. Wole Kinati,K.P.M Chinnan and Adam Bekele. Impact of FRG Project Interventions on the Livelihoods of Farmers. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  89. Kanwal Naeem,Badar Naseem Siddiqui and Ishrat Fatima. ICTs, Food Security and Small Farmers. – М.: LAP Lambert Academic Publishing, 2014. – 172 с.
  90. Zablon W. Shilenje. Climate Early Warning and Communication in the Context of Sudan. – М.: LAP Lambert Academic Publishing, 2014. – 80 с.
  91. Esperanza Silva. Planning for Sustainable Development of Inland Aquaculture in Angola. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  92. Glenn Greenwald. No Place to Hide: Edward Snowden, the NSA and the Surveillance State. – М.: Hamish Hamilton, 2014. – 272 с.
  93. Simen A Adnoy Ellingsen. Nuclear Terrorism and Rational Choice. – М.: LAP Lambert Academic Publishing, 2011. – 276 с.
  94. Daniel Temesgen Gelan,Tezera Getahun Truneh and Mulugeta Tefera. Analysis of Social Protection Programs in Pastoralist Areas. – М.: LAP Lambert Academic Publishing, 2012. – 116 с.
  95. Samuel Kiiru,Njuguna Ng’ethe and Basil Omutsotsi. United Nations and Kenya. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  96. Tulia Ackson. Social security law and Policy Reform in Tanzania. – М.: LAP Lambert Academic Publishing, 2010. – 360 с.
  97. Sudarshan Ranpise. Cyber Crime Prevention. – М.: LAP Lambert Academic Publishing, 2013. – 268 с.
  98. Poonam Mahajan. Corporate Disclosure Practices in India. – М.: LAP Lambert Academic Publishing, 2012. – 296 с.
  99. Halefom Hailu. The Threat of Cybercrime in Ethiopia. – М.: LAP Lambert Academic Publishing, 2014. – 124 с.
  100. Ravishankar Mor. Right to information in India. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  101. Suresh Laudari. IWRM in Inter-Basin Water Transfer Project. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  102. Nnamdi Aduba and Samuel Oguche. Key Issues in Nigerian Constitutional Law. – М.: LAP Lambert Academic Publishing, 2014. – 512 с.
  103. Md. Anwar Hossain. Extra Judicial Killings in Bangladesh. – М.: LAP Lambert Academic Publishing, 2014. – 116 с.
  104. Olufemi Fawole,Joseph Fayeye and Kingsley Nwachukwu. Security Agency and The Control And Manangement Of Arms In Nigeria. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  105. Maryna Polyatska. Corporate Governance. – М.: LAP Lambert Academic Publishing, 2010. – 60 с.
  106. Chris Okereafor. Redefining conflict transformation in Africa. – М.: Dictus Publishing, 2012. – 268 с.
  107. Ehsan Khorasani Esmaeili. Secure Keyboard logging system. – М.: LAP Lambert Academic Publishing, 2013. – 124 с.
  108. Shubha Puthran and Ketan Shah. Intrusion Detection System using datamining techniques. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  109. Inadyuti Dutt and Soumya Paul. Some Research on Optical Fibre Security. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  110. Kirat Pal Singh. MIPS Pipeline Cryptoprocessor. – М.: LAP Lambert Academic Publishing, 2012. – 480 с.
  111. Marius Nagy and Selim Akl. Using quantum mechanics to enhance information processing. – М.: Scholars' Press, 2012. – 168 с.
  112. Govind Singh Tanwar,Chitreshh Banerjee and Ajeet Singh Poonia. Enhanced & Generalised E-Governance Security Framework (EG)2SF. – М.: LAP Lambert Academic Publishing, 2014. – 88 с.
  113. Charles Ndekarisho Tarimo. ICT Security Readiness Checklist for Developing Countries. – М.: LAP Lambert Academic Publishing, 2010. – 280 с.
  114. Georgiana Lucan. Computer-Based Attacks on Governments. – М.: LAP Lambert Academic Publishing, 2010. – 76 с.
  115. Muhammad Imran Tariq. SLA based Information Security Metrics in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2014. – 192 с.
  116. Paul Denys. Security of Personal Information in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 144 с.
  117. Carlos Grima-Izquierdo. A generic architecture for e-Government and e-Democracy. – М.: LAP Lambert Academic Publishing, 2012. – 316 с.
  118. Sevias Guvuriro. Security Schemes funding, Rights accumulation and Poverty eradication. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  119. Vadim Tarasov. Economic Security: Case of Russia. – М.: LAP Lambert Academic Publishing, 2013. – 112 с.
  120. Mary John. Corporate Governance in India. – М.: LAP Lambert Academic Publishing, 2012. – 360 с.
  121. Andi Maliqi. Determinants of Government Debt Rating. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  122. Kelley Stone. Creating an Information Sharing and Analysis Center. – М.: , 2015. – 144 с.
  123. Johnny Long. Google Hacking for Penetration Testers, Volume 2. – М.: Syngress, 2007. – 448 с.

Дополнительные результаты

  1. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с.
  2. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 515 с.
  3. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  4. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с.
  5. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с.
  6. Jack J. Champlain. Auditing Information Systems. – М.: , 0. – 0 с.
  7. Gerald Kovacich. The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition. – М.: , 0. – 0 с.
  8. Protecting Business Information : A Manager's Guide. – М.: , 0. – 0 с.
  9. Erhan Kozan, Azuma Ohuchi. Operations Research/Management Science at Work (Advances in Information Security). – М.: , 0. – 0 с.
  10. Leigh Wade. Careers in Private Security: How to Get Started, How to Get Ahead. – М.: , 0. – 0 с.
  11. Ibp USA. Palau a Spy Guide. – М.: , 0. – 0 с.
  12. Ibp USA. Nauru a Spy Guide. – М.: , 0. – 0 с.
  13. Ibp USA. Cook Islands Sa Spy Guide. – М.: , 0. – 0 с.
  14. Ibp USA. Fiji a Spy Guide. – М.: , 0. – 0 с.
  15. Ibp USA. Guam a Spy Guide. – М.: , 0. – 0 с.
  16. Ibp USA. Kiribati a Spy Guide. – М.: , 0. – 0 с.
  17. Ibp USA. Korea South a Spy Guide. – М.: , 0. – 0 с.
  18. Ibp USA. Mexico a Spy Guide. – М.: , 0. – 0 с.
  19. Ibp USA. Micronesia a Spy Guide. – М.: , 0. – 0 с.
  20. Ibp USA. Portugal Aspy Guide. – М.: , 0. – 0 с.
  21. Ibp USA. Singapore a Spy Guide. – М.: , 0. – 0 с.
  22. Ibp USA. Botswana a Spy Guide. – М.: , 0. – 0 с.
  23. Ibp USA. Brazil a Spy Guide. – М.: , 0. – 0 с.
  24. Cayman Islands A "Spy" Guide. – М.: International Business Publications, USA, 2008. – 300 с.
  25. Ibp USA. Colombia a Spy Guide. – М.: , 0. – 0 с.
  26. Ibp USA. Papua New Guinea a Spy Guide. – М.: , 0. – 0 с.
  27. Ibp USA. Samoa Western a Spy Guide. – М.: , 0. – 0 с.
  28. USA Ibp. Mexico Export-Import. – М.: , 0. – 0 с.
  29. Ibp USA. Mexico: A Spy Guide. – М.: , 0. – 0 с.
  30. USA Ibp. Botswana a Spy Guide. – М.: , 0. – 0 с.
  31. International Business Publications, USA. Cameroon A "Spy" Guide. – М.: , 0. – 0 с.
  32. USA Ibp. Colombia a Spy Guide. – М.: , 0. – 0 с.
  33. Ibp USA. Grenada a Spy Guide. – М.: , 0. – 0 с.
  34. Ibp USA. Switzerland a Spy Guide. – М.: , 0. – 0 с.
  35. Ibp USA. Vanuatu a Spy Guide. – М.: , 0. – 0 с.
  36. USA Ibp. Cook Islands a Spy Guide. – М.: , 0. – 0 с.
  37. Handbook of Loss Prevention and Crime Prevention, Fourth Edition. – М.: , 0. – 0 с.
  38. Charles J. Austin, Stuart B. Boxerman. Information Systems for Healthcare Management, Sixth Edition. – М.: , 0. – 0 с.
  39. Mark B. Desman. Building an Information Security Awareness Program. – М.: , 0. – 0 с.
  40. John M. D. Hunter. An Information Security Handbook (Computer Communications and Networks). – М.: , 0. – 0 с.
  41. Gerald L. Kovacich, Edward P. Halibozek. The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, First Edition. – М.: , 0. – 0 с.
  42. Thomas J. Parenty. Digital Defense: What You Should Know About Protecting Your Company's Assets. – М.: , 0. – 0 с.
  43. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с.
  44. Ifip Tc11 Wg11.5 Working Conference on Integrity and Internal Control, Michael Gertz. Integrity and Internal Control in Information Systems V: Ifip Tc11/Wg11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (Iicis), November 11-12, 2002, Bonn, Germany (International Federation for Information Processing. – М.: , 0. – 0 с.
  45. Marko Nordquist. Towards Improved Security Management Practice: Designing an Organizational Model Procedure for the Implementation of Information Security Management in Heterogeneous Information Management. – М.: , 0. – 0 с.
  46. John Graves. Management Roadmap to Information Security (Kentis Management Roadmaps). – М.: , 0. – 0 с.
  47. Steve Purser. A Practical Guide to Managing Information Security (Artech House Technology Management Library). – М.: , 0. – 0 с.
  48. Christopher J. Alberts, Audrey J. Dorofee. Managing Information Security Risks: The OCTAVE Approach. – М.: , 0. – 0 с.
  49. Ramon C. Barquin, Alex Bennet, Shereen G. Remez. Building Knowledge Management Environments for Electronic Government. – М.: , 0. – 0 с.
  50. Daniel Jennings, Joseph Boyce. Information Assurance. – М.: , 0. – 0 с.
  51. Lisa Harris, Dennis Charles, Charles Dennis. Marketing the eBusiness: An Introduction (Routledge Textbooks in eBusiness). – М.: , 0. – 0 с.
  52. Marian Quigley, Marian Quiqley. Information Security and Ethics: Social and Organizational Issues. – М.: , 0. – 0 с.
  53. C. Warren Axelrod, Axelrod. Outsourcing Information Security. – М.: , 0. – 0 с.
  54. Harold F. Tipton, Micki Krause, Micki, Cissp Krause. Information Security Management Handbook, Fifth Edition. – М.: , 0. – 0 с.
  55. Aspatore Books Staff. Inside the Minds: Security Matters - Industry Leaders from eBay, Inc., Motorola, Internet Security Systems & More on Protecting Your Most Valuable Assets. – М.: , 0. – 0 с.
  56. Thomas Peltier, Thomas Pelitier, Justin Peltier, John A. Blackley, Peltier, Associates. Information Security Fundamentals. – М.: , 0. – 0 с.
  57. Charles Cresson Wood. Best Practices In Internet Commerce Security. – М.: , 0. – 0 с.
  58. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с.
  59. Aspatore Books. Corporate Security in the Information Age: Industry Leaders from Bose Corporation, Dow Jones, and more on Security Options, Protecting Assets, & Implementing a Strategy (Inside the Minds). – М.: , 2005. – 0 с.
  60. Barbara C. McNurlin. Information Systems Management in Practice (7th Edition). – М.: , 2005. – 0 с.
  61. The Secure Online Business: E-Commerce, It Functionality & Business Continuity. – М.: , 2003. – 0 с.
  62. Peter R., MBA Ramsaroop. Securing Business Intelligence: Knowledge and CyberSecurity in the Post 9/11 World. – М.: , 2004. – 0 с.
  63. Economics of Information Security (Advances in Information Security). – М.: , 2004. – 0 с.
  64. Sari Greene. Security Policies and Procedures : Principles and Practices (Security). – М.: , 2005. – 0 с.
  65. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с.
  66. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с.
  67. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с.
  68. Sudhanshu Kairab. A Practical Guide to Security Assessments. – М.: , 2004. – 498 с.
  69. Ira Winkler. Zen and the Art of Information Security. – М.: , 2007. – 192 с.
  70. Timothy P. Layton. Information Security. – М.: , 2006. – 222 с.
  71. Michael Gentile, Ron Collette, Tom August. The Ciso Handbook: A Practical Guide to Securing Your Company. – М.: , 2005. – 352 с.
  72. Michael E. Whitman, Herbert J. Mattord. Principles of Information Security, Second Edition. – М.: , 2004. – 600 с.
  73. Mobility, Labour Migration and Border Controls in Asia. – М.: , 2006. – 288 с.
  74. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с.
  75. Patrick Traynor, Patrick McDaniel, Thomas La Porta. Security for Telecommunications Networks (Advances in Information Security). – М.: , 2008. – 182 с.
  76. James Michael Stewart, Ed Tittel, Mike Chapple. CISSP: Certified Information Systems Security Professional Study Guide. – М.: , 2008. – 841 с.
  77. Alan Calder, Steve Watkins. IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002. – М.: , 2008. – 384 с.
  78. Information Technology Governance and Service Management: Frameworks and Adaptations (Premier Reference Source). – М.: , 2008. – 519 с.
  79. Social and Human Elements of Information Security: Emerging Trends and Countermeasures (Premier Reference Source). – М.: , 2008. – 412 с.
  80. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с.
  81. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с.
  82. Gerard Blokdijk, Ivanka Menken. Information Security Management Best Practice Workbook: Implementation and Management Roadmap for Threats, Challenges and Solutions - Ready to use supporting documents bringing Theory into Practice. – М.: , 2008. – 124 с.
  83. Hamid R. Nemati. Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues (Advances in Information Security and Privacy). – М.: , 2009. – 414 с.
  84. W. Krag Brotby. Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement. – М.: Auerbach Publications, 2009. – 200 с.
  85. Alan Calder. Information Security based on ISO 27001/ISO 27002: A Management Guide. – М.: , 2009. – 83 с.
  86. Jake Kouns, Daniel Minoli. Information Technology Risk Management in Enterprise Environments: A Review of Industry Practices and a Practical Guide to Risk Management Teams. – М.: , 2010. – 421 с.
  87. Bel G. Raggad. Information Security Management: Concepts and Practice. – М.: , 2010. – 871 с.
  88. Michael E. Whitman, Herbert J. Mattord. Management of Information Security. – М.: , 2010. – 592 с.
  89. Sid Sirisukha. Protecting Management Information Systems: VPN Competitive Advantage. – М.: , 2010. – 316 с.
  90. Alan Calder, Steve G Watkins. Information Security Risk Management for ISO27001 / ISO27002. – М.: , 2010. – 198 с.
  91. William Manning. CISM Certified Information Security Manager Certification Exam Preparation Course in a Book for Passing the CISM Exam - The How To Pass on Your First Try Certification Study Guide. – М.: , 2010. – 188 с.
  92. Evan Wheeler. Security Risk Management: Building an Information Security Risk Management Program from the Ground Up. – М.: , 2011. – 360 с.
  93. Editors Karl Maria Michael de Leeuw, Jan Bergstra. The History of Information Security: A Comprehensive Handbook. – М.: Elsevier Science, 2007. – 900 с.
  94. Global Perspectives In Information Security. – М.: , 2008. – 896 с.
  95. Ronald L. Krutz. Cloud Security. – М.: , 2010. – 384 с.
  96. John R. Vacca. Managing Information Security. – М.: , 2010. – 320 с.
  97. G. Manoilov. Elsevier's Dictionary of Information Security. – М.: , 2010. – 772 с.
  98. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с.
  99. George L Stefanek. Information Security Best Practices. – М.: , 2010. – 160 с.
  100. Sari Greene. Sustainable Information Security. – М.: , 2010. – 400 с.
  101. John R. Vacca. Computer and Information Security Handbook. – М.: , 2010. – 928 с.
  102. Krag Brotby. Information Security Governance. – М.: , 2009. – 190 с.
  103. Principles Of Computer Security, Comptia Security+ And Beyond, Second Edition. – М.: , 2011. – 0 с.
  104. Harold F. Tipton, Micki Krause. Information Security Management Handbook on CD-ROM, 2003 Edition. – М.: , . –  с.
  105. Rohana Mohamad Rashid. Determining Influencing Factors of Information Security Culture. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  106. Nitin Kanzariya and Ashish Nimavat. Security of Digital Image Using Hybrid Steganography. – М.: LAP Lambert Academic Publishing, 2013. – 84 с.
  107. Lorenzo Cozzella. Data and Information Security using Hylemetric Approach. – М.: LAP Lambert Academic Publishing, 2014. – 204 с.
  108. Lora Pissareva. European Security Governance. – М.: LAP Lambert Academic Publishing, 2012. – 56 с.
  109. Kunal Sharma. E-governance in India : A Case Study of Lokmitra in Himachal Pradesh. – М.: LAP Lambert Academic Publishing, 2011. – 264 с.
  110. Brijender Kahanwal. A Research Study On Java File Security System Using Rijndael Algorithm. – М.: LAP Lambert Academic Publishing, 2012. – 244 с.
  111. Shubha Puthran and Ketan Shah. Intrusion Detection System using datamining techniques. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  112. Rupa Ch. and Avadhani P. S. Modern Security Methods in Applied Computer Science. – М.: Scholars' Press, 2014. – 124 с.
  113. Kirat Pal Singh. MIPS Pipeline Cryptoprocessor. – М.: LAP Lambert Academic Publishing, 2012. – 480 с.
  114. Yedji Mbangsoua and Dr. Freddie Acosta. Information Security and its Investment Justification. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  115. Udai Pratap Rao,Dhiren R. Patel and Vidhya Goutham Guntaka. SVD Based Database Watermarking for Security in Database. – М.: LAP Lambert Academic Publishing, 2011. – 56 с.
  116. Yasser Alshehri. Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 156 с.
  117. Stephen Schiavone,Lalit Garg and Kelly Summers. Information Security in Enterprises - an Ontological Perspective. – М.: LAP Lambert Academic Publishing, 2014. – 232 с.
  118. Julien Shabani. Information Security for RFID Systems. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.
  119. Osden Jokonya. Information Technology Governance to Achieve Business Objectives. – М.: LAP Lambert Academic Publishing, 2011. – 140 с.
  120. Debasish Jena. On Protocols for Information Security Services. – М.: LAP Lambert Academic Publishing, 2011. – 136 с.
  121. Aliyu Onipede. Biometrics as a tool for Information Security in Aviation industry. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  122. Furhan Mehmood and Rajia Rafique. Information Security in Financial Organizations. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  123. Cyrus Abanti Makori,Jane Onsongo and Lusiba Badru. ICT Security Applications. – М.: LAP Lambert Academic Publishing, 2012. – 112 с.
  124. Predrag Tasevski. Interactive Cyber Security Awareness Program. – М.: LAP Lambert Academic Publishing, 2012. – 184 с.
  125. Omar Zakaria. Information Security Culture. – М.: LAP Lambert Academic Publishing, 2013. – 248 с.
  126. Jahidul Arafat. Higher Education Information Security. – М.: LAP Lambert Academic Publishing, 2013. – 176 с.
  127. Saeed Soltanmohammadi. Improving Information System Security by Evaluating Human Factors. – М.: LAP Lambert Academic Publishing, 2014. – 116 с.
  128. frankie tvrz and marijke coetzee. Information Security of a Bluetooth-enabled handheld device. – М.: LAP Lambert Academic Publishing, 2010. – 180 с.
  129. Ahmed AlNunu. How Much Information Security?. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  130. Jeffy Mwakalinga. A Framework for Adaptive Information Security Systems. – М.: LAP Lambert Academic Publishing, 2011. – 364 с.
  131. Ubaid Hayee. A Six Sigma Approach to Assure IT Security. – М.: LAP Lambert Academic Publishing, 2011. – 64 с.
  132. Meysam Namayandeh. Development of Computer Ethical Framework for Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 132 с.
  133. Muhammad Imran Tariq. SLA based Information Security Metrics in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2014. – 192 с.
  134. Khanyisa Malufu. E-Banking Security. – М.: LAP Lambert Academic Publishing, 2013. – 112 с.
  135. Shada Al-Salamah. Towards Information Sharing in Virtual Organisations. – М.: LAP Lambert Academic Publishing, 2010. – 312 с.
  136. Alaa Al-Deen Mohammed Hassan. Information Security Management. – М.: LAP Lambert Academic Publishing, 2013. – 188 с.
  137. Jun Zheng,Jiantao Gu and Hong Wang. Financial Management and Information Security of Independent Colleges. – М.: LAP Lambert Academic Publishing, 2014. – 256 с.
  138. Andrew Armstrong. The Impact of Information Systems on Organisational Maturity. – М.: LAP Lambert Academic Publishing, 2012. – 292 с.
  139. Ying Qian. Mitigating Information Security Risks during Operation Transition. – М.: LAP Lambert Academic Publishing, 2012. – 372 с.
  140. Johnny Long. Google Hacking for Penetration Testers, Volume 2. – М.: Syngress, 2007. – 448 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. О качестве сервиса, связанного с запросами на медицинскую информацию. Medical Information Service?. А. Беденков, "Ремедиум", № 1, январь 2012.
  2. Директора заблудились между governance и management. А. Верников, "Банковское обозрение", № 8, август 2008.

Образцы работ

Тема и предметТип и объем работы
Основы избирательных компаний
PR
Диплом
72 стр.
Public relations в политике как особый «срез» общественных отношений
PR
Курсовая работа
35 стр.
Слияния и поглощения Мировая и Российская практика
Мировая экономика
Диплом
99 стр.
Формирование системы экономической безопасности на Белоярской АЭС
Психофизиология
Диплом
96 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Антон, 04.06
Спасибо большое за понимание, мои сокурсники на ваши работы не жалуются ) надеюсь управимся)