Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с.
  2. Business Process Management Workshops: BPM 2011 International Workshops, Clermont-Ferrand, France, August 29, 2011, Revised Selected Papers, Part II (Lecture Notes in Business Information Processing). – М.: , 2012. – 541 с.
  3. Business Process Management Workshops: BPM 2011 International Workshops, Clermont-Ferrand, France, August 29, 2011, Revised Selected Papers, Part I (Lecture Notes in Business Information Processing). – М.: , 2012. – 543 с.
  4. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с.
  5. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с.
  6. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с.
  7. Alexander Otgaar, Erik Braun, Leo van den Berg. Urban Management and Economics. – М.: , 2012. – 256 с.
  8. Managing Technology in the Operations Function (Securities Institute Global Capital Markets Series). – М.: , 0. – 0 с.
  9. Marilyn R. Seymann. Managing the New Bank Technology: An Executive Blueprint for the Future (Glenlake Business Monographs). – М.: , 0. – 0 с.
  10. Jack J. Champlain. Auditing Information Systems. – М.: , 0. – 0 с.
  11. Mario Piattini. Auditing Information Systems. – М.: , 0. – 0 с.
  12. Timothy F. Carse, Jeffrey Slater. The Payroll Toolkit Nuts and Bolts Techniques to Help You Better Understand and Manage Your Payroll (Revised Second Edition). – М.: , 0. – 0 с.
  13. Jie Lu, Lakhmi C Jain, Guangquan Zhang. Handbook on Decision Making: Vol 2: Risk Management in Decision Making (Intelligent Systems Reference Library). – М.: , 2012. – 472 с.
  14. Robert Muksian. Mathematics of Interest Rates, Insurance, Social Security, and Pensions. – М.: , 0. – 0 с.
  15. Gerald Kovacich. The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition. – М.: , 0. – 0 с.
  16. Neil FitzGerald, Ryan Marples, Naisan Geula, Bob Coates, James Edkins, Michael Voloshko. Special Edition Using Crystal Reports 10 (Special Edition Using). – М.: Que Certification, 2004. – 888 с.
  17. Ulric J., Jr. Gelinas, Steve G. Sutton, Jane Fedorowicz. Business Processes and Information Technology. – М.: , 0. – 0 с.
  18. Asset Protection and Security Management Handbook. – М.: , 0. – 0 с.
  19. Alexis Gutzman. Unforeseen Circumstances : Strategies and Technologies for Protecting Your Business and Your People in a Less Secure World. – М.: , 0. – 0 с.
  20. Protecting Business Information : A Manager's Guide. – М.: , 0. – 0 с.
  21. Ron Schneiderman. The Mobile Technology Question and Answer Book: A Survival Guide for Business Managers. – М.: , 0. – 0 с.
  22. Handbook of Management Information Systems. – М.: , 0. – 0 с.
  23. Erhan Kozan, Azuma Ohuchi. Operations Research/Management Science at Work (Advances in Information Security). – М.: , 0. – 0 с.
  24. Information Warfare : corporate attack and defence in a digital world (Computer Weekly Professional (Paperback)). – М.: , 0. – 0 с.
  25. Philip P. Purpura. The Security Handbook. – М.: , 0. – 0 с.
  26. M. J. Wilson, B. Maliszewska-Kordybach. Soil Quality, Sustainable Agriculture and Environmental Security in Central and Eastern Europe (NATO Science Series. 2, Environmental Security). – М.: , 0. – 0 с.
  27. Jessica Keyes. Securities Technology Handbook. – М.: , 0. – 0 с.
  28. Ben Baldwin. New Life Insurance Investment Advisor: Achieving Financial Security for You and your Family Through Today's Insurance Products. – М.: , 0. – 0 с.
  29. Max Boisot. Knowledge Assets: Securing Competitive Advantage in the Information Economy. – М.: , 0. – 0 с.
  30. Handbook of Loss Prevention and Crime Prevention, Fourth Edition. – М.: , 0. – 0 с.
  31. Charles J. Austin, Stuart B. Boxerman. Information Systems for Healthcare Management, Sixth Edition. – М.: , 0. – 0 с.
  32. Max H. Boisot. Knowledge Assets: Securing Competitive Advantage in the Information Economy. – М.: , 0. – 0 с.
  33. Rebecca Herold. The Privacy Papers: Managing Technology, Consumer, Employee and Legislative Actions. – М.: , 0. – 0 с.
  34. Timothy Braithwaite. Securing E-Business Systems: A Guide for Managers and Executives. – М.: , 0. – 0 с.
  35. Gerald L. Kovacich, Edward P. Halibozek. The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, First Edition. – М.: , 0. – 0 с.
  36. Socially Responsible IT Management. – М.: , 0. – 0 с.
  37. Thomas J. Parenty. Digital Defense: What You Should Know About Protecting Your Company's Assets. – М.: , 0. – 0 с.
  38. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с.
  39. Andrew Hawker. Security in Information Systems : A Guide for Business and Accounting. – М.: , 0. – 0 с.
  40. Ifip Tc11 Wg11.5 Working Conference on Integrity and Internal Control, Michael Gertz. Integrity and Internal Control in Information Systems V: Ifip Tc11/Wg11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (Iicis), November 11-12, 2002, Bonn, Germany (International Federation for Information Processing. – М.: , 0. – 0 с.
  41. Marko Nordquist. Towards Improved Security Management Practice: Designing an Organizational Model Procedure for the Implementation of Information Security Management in Heterogeneous Information Management. – М.: , 0. – 0 с.
  42. Modern Information Systems for Managers. – М.: , 0. – 0 с.
  43. John Graves. Management Roadmap to Information Security (Kentis Management Roadmaps). – М.: , 0. – 0 с.
  44. Mary Pat McCarthy, Stuart Campbell. Security Transformation: Digital Defense Strategies to Protect your Company's Reputation and Market Share. – М.: , 0. – 0 с.
  45. Steve Purser. A Practical Guide to Managing Information Security (Artech House Technology Management Library). – М.: , 0. – 0 с.
  46. Computer Security. – М.: , 0. – 0 с.
  47. Encyclopedia of Security Management : Techniques and technology. – М.: , 0. – 0 с.
  48. Office & Office Building Security. – М.: , 0. – 0 с.
  49. Ultimate Financial Security Survey. – М.: , 0. – 0 с.
  50. Christopher J. Alberts, Audrey J. Dorofee. Managing Information Security Risks: The OCTAVE Approach. – М.: , 0. – 0 с.
  51. Risk Analysis and the Security Survey. – М.: , 0. – 0 с.
  52. Effective Security Management, Fourth Edition (Effective Security Management). – М.: , 0. – 0 с.
  53. Michael Brosnan, John Messina. Telecommunication Expense Management. – М.: CMP Books, 2000. – 240 с.
  54. Daniel Jennings, Joseph Boyce. Information Assurance. – М.: , 0. – 0 с.
  55. Peter J. Sander, Peter Sander. The Everything Personal Finance Book: Manage, Budget, Save, and Invest Your Money Wisely (Everything Series). – М.: , 0. – 0 с.
  56. Ifip Tc6, Tc11 Joint Working Conference on Communications and Multimedi, Tomaz Klobucar. Advanced Communications and Multimedia Security: Ifip Tc6/Tc11 Sixth Joint Working Conference on Communications and Multimedia Security, September 26-27, 2002, Portoroz, Slovenia (International Federation for Information Processing, 100). – М.: , 0. – 0 с.
  57. Charles Carrington, Timothy Speed, Juanita Ellis, Steffano Korper. Enterprise Directory and Security Implementation Guide: Designing and Implementing Directories in Your Organization (The Korper and Ellis E-Commerce Books Series). – М.: , 0. – 0 с.
  58. Bhavani Thuraisingham. Web Data Management and Electronic Commerce. – М.: , 0. – 0 с.
  59. C. Warren Axelrod, Axelrod. Outsourcing Information Security. – М.: , 0. – 0 с.
  60. James E. Goldman, Phillip T. Rawles, Julie R. Mariga. Client/Server Information Systems: A Business-Oriented Approach. – М.: , 0. – 0 с.
  61. Harold F. Tipton, Micki Krause, Micki, Cissp Krause. Information Security Management Handbook, Fifth Edition. – М.: , 0. – 0 с.
  62. Ross Malaga. Information Systems Technology. – М.: , 0. – 0 с.
  63. Thomas Peltier, Thomas Pelitier, Justin Peltier, John A. Blackley, Peltier, Associates. Information Security Fundamentals. – М.: , 0. – 0 с.
  64. Steven R. Gordon, Dr. Steven Gordon. Computing Information Technology: The Human Side. – М.: , 0. – 0 с.
  65. Charles Cresson Wood. Best Practices In Internet Commerce Security. – М.: , 0. – 0 с.
  66. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с.
  67. Andrew Kimber. Credit Risk: From Transaction to Portfolio Management (Securities Institute Global Capital Markets). – М.: , 2003. – 0 с.
  68. New Frontiers of Knowledge Management. – М.: , 2005. – 0 с.
  69. Thomas C. Glaessner. Electronic Safety and Soundness: Securing Finance in a New Age (World Bank Working Papers). – М.: , 2004. – 0 с.
  70. Leonard Jessup. Information Systems Today : Why IS Matters (2nd Edition). – М.: , 2005. – 0 с.
  71. Barbara C. McNurlin. Information Systems Management in Practice (7th Edition). – М.: , 2005. – 0 с.
  72. The Secure Online Business: E-Commerce, It Functionality & Business Continuity. – М.: , 2003. – 0 с.
  73. Peter R., MBA Ramsaroop. Securing Business Intelligence: Knowledge and CyberSecurity in the Post 9/11 World. – М.: , 2004. – 0 с.
  74. Current Security Management & Ethical Issues of Information Technology. – М.: , 2003. – 0 с.
  75. Gary Strumeyer. Investing in Fixed Income Securities : Understanding the Bond Market (Wiley Finance). – М.: , 2005. – 0 с.
  76. Economics of Information Security (Advances in Information Security). – М.: , 2004. – 0 с.
  77. Edward Borodzicz. Risk, Crisis and Security Management. – М.: , 2005. – 0 с.
  78. Lech Janczewski. Managerial Guide for Handling Cyber-Terrorism and Information Warfare. – М.: , 2005. – 0 с.
  79. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с.
  80. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с.
  81. Kathleen Sindell. Managing Your Money Online For Dummies. – М.: , 2004. – 0 с.
  82. Building the E-Service Society : E-Commerce, E-Business, and E-Government (IFIP International Federation for Information Processing). – М.: , 2004. – 0 с.
  83. Tom Negrino. Managing Your Personal Finances with Quicken : Visual QuickProject Guide (Visual Quickproject Series). – М.: , 2004. – 160 с.
  84. Jim Stewart. SAP Security: SAP Security Essentials. – М.: Equity Press, 2005. – 136 с.
  85. Scott Firestone, Thiya Ramalingam, Steve Fry. Voice and Video Conferencing Fundamentals. – М.: Cisco Press, 2007. – 408 с.
  86. Ulric J. Gelinas, Richard B. Dull. Accounting Information Systems. – М.: , 2007. – 658 с.
  87. The Personal Security Handbook. – М.: , 2005. – 328 с.
  88. Ernst & Young LLP, Jan Babiak, John Butters, Mark W. Doll. Defending the Digital Frontier: Practical Security for Management, 2nd Edition. – М.: , 2004. – 253 с.
  89. Larstan's The Black Book on Corporate Security (Black Book Series). – М.: , 2005. – 439 с.
  90. George Haddow, Jane Bullock. Introduction to Emergency Management, Second Edition (Butterworth-Heinemann Homeland Security). – М.: , 2005. – 424 с.
  91. Mahesh S. Raisinghani. Handbook of Research on Global Information Technology Management in the Digital Economy. – М.: Information Science Reference, 2008. – 588 с.
  92. James Michael Stewart, Ed Tittel, Mike Chapple. CISSP: Certified Information Systems Security Professional Study Guide. – М.: , 2008. – 841 с.
  93. Alan Calder, Steve Watkins. IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002. – М.: , 2008. – 384 с.
  94. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с.
  95. Gerard Blokdijk, Ivanka Menken. Information Security Management Best Practice Workbook: Implementation and Management Roadmap for Threats, Challenges and Solutions - Ready to use supporting documents bringing Theory into Practice. – М.: , 2008. – 124 с.
  96. Hamid R. Nemati. Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues (Advances in Information Security and Privacy). – М.: , 2009. – 414 с.
  97. brian Honan. Implementing ISO27001 in a Windows® Environment. – М.: , 2009. – 316 с.
  98. W. Krag Brotby. Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement. – М.: Auerbach Publications, 2009. – 200 с.
  99. Alan Calder. Information Security based on ISO 27001/ISO 27002: A Management Guide. – М.: , 2009. – 83 с.
  100. Jake Kouns, Daniel Minoli. Information Technology Risk Management in Enterprise Environments: A Review of Industry Practices and a Practical Guide to Risk Management Teams. – М.: , 2010. – 421 с.
  101. Bel G. Raggad. Information Security Management: Concepts and Practice. – М.: , 2010. – 871 с.
  102. Michael E. Whitman, Herbert J. Mattord. Management of Information Security. – М.: , 2010. – 592 с.
  103. Sid Sirisukha. Protecting Management Information Systems: VPN Competitive Advantage. – М.: , 2010. – 316 с.
  104. Thomas Felberbauer. Wirtschaftsspionage und SIEM-Systeme: Wirtschaftsspionage unter der Lupe von Security Information Event Management Systemen (German Edition). – М.: , 2010. – 140 с.
  105. Alan Calder, Steve G Watkins. Information Security Risk Management for ISO27001 / ISO27002. – М.: , 2010. – 198 с.
  106. National Safety Council. Accident Prevention Manual: Security Management 2nd Edition. – М.: , 2010. – 407 с.
  107. William Manning. CISM Certified Information Security Manager Certification Exam Preparation Course in a Book for Passing the CISM Exam - The How To Pass on Your First Try Certification Study Guide. – М.: , 2010. – 188 с.
  108. Evan Wheeler. Security Risk Management: Building an Information Security Risk Management Program from the Ground Up. – М.: , 2011. – 360 с.
  109. John R. Vacca. Managing Information Security. – М.: , 2010. – 320 с.
  110. Harold F. Tipton, Micki Krause. Information Security Management Handbook on CD-ROM, 2003 Edition. – М.: , . –  с.
  111. Yedji Mbangsoua and Dr. Freddie Acosta. Information Security and its Investment Justification. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  112. Julien Shabani. Information Security for RFID Systems. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.
  113. Debasish Jena. On Protocols for Information Security Services. – М.: LAP Lambert Academic Publishing, 2011. – 136 с.
  114. Aliyu Onipede. Biometrics as a tool for Information Security in Aviation industry. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  115. Predrag Tasevski. Interactive Cyber Security Awareness Program. – М.: LAP Lambert Academic Publishing, 2012. – 184 с.
  116. Saeed Soltanmohammadi. Improving Information System Security by Evaluating Human Factors. – М.: LAP Lambert Academic Publishing, 2014. – 116 с.
  117. Ahmed AlNunu. How Much Information Security?. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  118. Ubaid Hayee. A Six Sigma Approach to Assure IT Security. – М.: LAP Lambert Academic Publishing, 2011. – 64 с.
  119. Zakaria Karim. Online Banking. – М.: LAP Lambert Academic Publishing, 2011. – 72 с.
  120. Alaa Al-Deen Mohammed Hassan. Information Security Management. – М.: LAP Lambert Academic Publishing, 2013. – 188 с.
  121. Jun Zheng,Jiantao Gu and Hong Wang. Financial Management and Information Security of Independent Colleges. – М.: LAP Lambert Academic Publishing, 2014. – 256 с.
  122. Ying Qian. Mitigating Information Security Risks during Operation Transition. – М.: LAP Lambert Academic Publishing, 2012. – 372 с.
  123. Mattia Bozza. Information System Management. – М.: LAP Lambert Academic Publishing, 2013. – 132 с.

Дополнительные результаты

  1. USA Information Resources Management Association. Regional Development: Concepts, Methodologies, Tools and Applications. – М.: , 2012. – 2012 с.
  2. Frontiers in Algorithmics and Algorithmic Aspects in Information and Management: Joint International Conference, FAW-AAIM 2012, Beijing, China, May ... Computer Science and General Issues). – М.: , 2012. – 400 с.
  3. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с.
  4. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  5. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с.
  6. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с.
  7. Jack J. Champlain. Auditing Information Systems. – М.: , 0. – 0 с.
  8. Robert E. Neilson. Collaborative Technologies and Organizational Learning (Series in Information Technology Management). – М.: , 0. – 0 с.
  9. Gerald Kovacich. The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition. – М.: , 0. – 0 с.
  10. Barbara C. McNurlin, Ralph H. Sprague. Information Systems Management in Practice, Sixth Edition. – М.: , 0. – 0 с.
  11. Barbara C. McNurlin, Ralph H. Sprague. Information Systems Management in Practice (5th Edition). – М.: , 0. – 0 с.
  12. Donald A. Marchand, Don Marchand. Competing with Information: A Manager's Guide to Creating Business Value with Information Content. – М.: , 0. – 0 с.
  13. Asset Protection and Security Management Handbook. – М.: , 0. – 0 с.
  14. Security Operations Management. – М.: , 0. – 0 с.
  15. Protecting Business Information : A Manager's Guide. – М.: , 0. – 0 с.
  16. Security Management : Business Strategies for Success. – М.: , 0. – 0 с.
  17. A. Gunasekaran, Omar Khalil, Syed Mahbubur Rahman, Angappa Gunasekaran. Knowledge and Information Technology Management: Human and Social Perspectives. – М.: , 0. – 0 с.
  18. Mehdi Khosrowpour, Karen Loch. Global Information Technology Education: Issues and Trends (Series in Global Information Technology Management). – М.: , 0. – 0 с.
  19. Mehdi Khosrow-Pour. Managing Information Technology in a Global Economy ( 2001 IRMA Conference Proceedings). – М.: , 0. – 0 с.
  20. Charles J. Austin, Stuart B. Boxerman. Information Systems for Healthcare Management, Sixth Edition. – М.: , 0. – 0 с.
  21. Mark B. Desman. Building an Information Security Awareness Program. – М.: , 0. – 0 с.
  22. Gerald L. Kovacich, Edward P. Halibozek. The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, First Edition. – М.: , 0. – 0 с.
  23. Felix B., Ph.D. Tan. Global Perspective of Information Technology Management. – М.: , 0. – 0 с.
  24. Mehdi Khosrowpour. Organizational Achievement and Failure in Information Technology Management (Cases on Information Technology Series, Vol 2, Part 1). – М.: , 0. – 0 с.
  25. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с.
  26. Jay Liebowitz. Information Technology Management: A Knowledge Repository. – М.: , 0. – 0 с.
  27. Ifip Tc11 Wg11.5 Working Conference on Integrity and Internal Control, Michael Gertz. Integrity and Internal Control in Information Systems V: Ifip Tc11/Wg11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (Iicis), November 11-12, 2002, Bonn, Germany (International Federation for Information Processing. – М.: , 0. – 0 с.
  28. Marko Nordquist. Towards Improved Security Management Practice: Designing an Organizational Model Procedure for the Implementation of Information Security Management in Heterogeneous Information Management. – М.: , 0. – 0 с.
  29. Mehdi Khosrow-Pour. Advanced Topics in Information Resources Management, Volume 2. – М.: , 0. – 0 с.
  30. Information Resources Management Association. International Conference, Mehdi Khosrowpour. Managing Information Technology Resources in Organizations in the Next Millennium: 1999 Information Resources Management Association International Conference, Hershey, Pa, Usa, May 16-19, 1999. – М.: , 0. – 0 с.
  31. Mehdi Khosrow-Pour. Advanced Topics in Information Resources Management (Advanced Topics in Information Resources Management, Vol 3). – М.: , 0. – 0 с.
  32. Robert K. Wysocki, James Young. Information Systems: Management Practices in Action. – М.: , 0. – 0 с.
  33. Edward Szewczak, Mehdi Khosrowpour. The Human Side of Information Technology Management (Series in Managing the Human Side of Information Technology). – М.: , 0. – 0 с.
  34. Robert K. Wysocki, James Young. Information Systems: Management Principles in Action. – М.: , 0. – 0 с.
  35. Steve Purser. A Practical Guide to Managing Information Security (Artech House Technology Management Library). – М.: , 0. – 0 с.
  36. Encyclopedia of Security Management : Techniques and technology. – М.: , 0. – 0 с.
  37. Ultimate Financial Security Survey. – М.: , 0. – 0 с.
  38. Effective Security Management, Fourth Edition (Effective Security Management). – М.: , 0. – 0 с.
  39. Felix B. Tan. Advanced Topics in Global Information Management Series, Vol. 1. – М.: , 0. – 0 с.
  40. Ray Hackney, Dennis Dunn. Business Information Technology Management: Alternative and Adaptive Futures. – М.: , 0. – 0 с.
  41. Daniel Jennings, Joseph Boyce. Information Assurance. – М.: , 0. – 0 с.
  42. Marian Quigley, Marian Quiqley. Information Security and Ethics: Social and Organizational Issues. – М.: , 0. – 0 с.
  43. Mehdi Khosrowpour. Effective Utilization and Management of Emerging Information Technologies: The 1998 Conference Proceedings in Boston Massachusettes. – М.: , 0. – 0 с.
  44. C. Warren Axelrod, Axelrod. Outsourcing Information Security. – М.: , 0. – 0 с.
  45. Eugene Kaluzniacky. Managing Psychological Factors in Information Systems Work: An Orientation to Emotional Intelligence. – М.: , 0. – 0 с.
  46. Harold F. Tipton, Micki Krause, Micki, Cissp Krause. Information Security Management Handbook, Fifth Edition. – М.: , 0. – 0 с.
  47. James A. O'Brien. Management Information Systems w/E-Tutor and PowerWeb. – М.: , 0. – 0 с.
  48. Thomas Peltier, Thomas Pelitier, Justin Peltier, John A. Blackley, Peltier, Associates. Information Security Fundamentals. – М.: , 0. – 0 с.
  49. Charles Cresson Wood. Best Practices In Internet Commerce Security. – М.: , 0. – 0 с.
  50. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с.
  51. Dictonary of Information & Library Management. – М.: A&C Black, 2012. – 250 с.
  52. Aspatore Books. Corporate Security in the Information Age: Industry Leaders from Bose Corporation, Dow Jones, and more on Security Options, Protecting Assets, & Implementing a Strategy (Inside the Minds). – М.: , 2005. – 0 с.
  53. Barbara C. McNurlin. Information Systems Management in Practice (7th Edition). – М.: , 2005. – 0 с.
  54. The Secure Online Business: E-Commerce, It Functionality & Business Continuity. – М.: , 2003. – 0 с.
  55. Advanced Topics in Information Resources Management (Advanced Topics in Information Resources Management). – М.: , 2004. – 0 с.
  56. Peter R., MBA Ramsaroop. Securing Business Intelligence: Knowledge and CyberSecurity in the Post 9/11 World. – М.: , 2004. – 0 с.
  57. Current Security Management & Ethical Issues of Information Technology. – М.: , 2003. – 0 с.
  58. Economics of Information Security (Advances in Information Security). – М.: , 2004. – 0 с.
  59. Edward Borodzicz. Risk, Crisis and Security Management. – М.: , 2005. – 0 с.
  60. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с.
  61. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с.
  62. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с.
  63. Scott Watson. The Art of War for Security Managers: 10 Steps to Enhancing Organizational Effectiveness. – М.: , 2007. – 200 с.
  64. Ira Winkler. Zen and the Art of Information Security. – М.: , 2007. – 192 с.
  65. Timothy P. Layton. Information Security. – М.: , 2006. – 222 с.
  66. Michael E. Whitman, Herbert J. Mattord. Principles of Information Security, Second Edition. – М.: , 2004. – 600 с.
  67. Mahesh S. Raisinghani. Handbook of Research on Global Information Technology Management in the Digital Economy. – М.: Information Science Reference, 2008. – 588 с.
  68. John J. Fay. Encyclopedia of Security Management. – М.: Butterworth-Heinemann, 2007. – 688 с.
  69. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с.
  70. Michael Blyth. Risk and Security Management: Protecting People and Sites Worldwide. – М.: , 2008. – 402 с.
  71. James Michael Stewart, Ed Tittel, Mike Chapple. CISSP: Certified Information Systems Security Professional Study Guide. – М.: , 2008. – 841 с.
  72. Alan Calder, Steve Watkins. IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002. – М.: , 2008. – 384 с.
  73. Social and Human Elements of Information Security: Emerging Trends and Countermeasures (Premier Reference Source). – М.: , 2008. – 412 с.
  74. Selected Readings on Information Technology and Business Systems Management. – М.: , 2008. – 566 с.
  75. Selected Readings on Information Technology Management: Contemporary Issues (Premier Reference Source). – М.: , 2008. – 530 с.
  76. Julio Alberto Garibay Ruiz. Information Technology Convergence, Innovation Management and Firm Performance. – М.: , 2008. – 216 с.
  77. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с.
  78. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с.
  79. Karen Nelson. Information and Knowledge Management in Business Contexts: A Multi-Method Study. – М.: , 2008. – 480 с.
  80. Gerard Blokdijk, Ivanka Menken. Information Security Management Best Practice Workbook: Implementation and Management Roadmap for Threats, Challenges and Solutions - Ready to use supporting documents bringing Theory into Practice. – М.: , 2008. – 124 с.
  81. Algorithmic Aspects in Information and Management: 4th International Conference, AAIM 2008, Shanghai, China, June 23-25, 2008, Proceedings (Lecture Notes in Computer Science). – М.: , 2008. – 350 с.
  82. Hamid R. Nemati. Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues (Advances in Information Security and Privacy). – М.: , 2009. – 414 с.
  83. Jay Ramanathan, Rajiv Ramnath. Co-engineering Applications and Adaptive Business Technologies in Practice: Enterprise Service Ontologies, Models, and Frameworks (Advances in Information Resources Management). – М.: , 2009. – 426 с.
  84. brian Honan. Implementing ISO27001 in a Windows® Environment. – М.: , 2009. – 316 с.
  85. W. Krag Brotby. Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement. – М.: Auerbach Publications, 2009. – 200 с.
  86. Effy Oz. Management Information Systems. – М.: Cengage Learning, 2009. – 592 с.
  87. Alan Calder. Information Security based on ISO 27001/ISO 27002: A Management Guide. – М.: , 2009. – 83 с.
  88. Jake Kouns, Daniel Minoli. Information Technology Risk Management in Enterprise Environments: A Review of Industry Practices and a Practical Guide to Risk Management Teams. – М.: , 2010. – 421 с.
  89. Bel G. Raggad. Information Security Management: Concepts and Practice. – М.: , 2010. – 871 с.
  90. Michael E. Whitman, Herbert J. Mattord. Management of Information Security. – М.: , 2010. – 592 с.
  91. Thomas Felberbauer. Wirtschaftsspionage und SIEM-Systeme: Wirtschaftsspionage unter der Lupe von Security Information Event Management Systemen (German Edition). – М.: , 2010. – 140 с.
  92. Alan Calder, Steve G Watkins. Information Security Risk Management for ISO27001 / ISO27002. – М.: , 2010. – 198 с.
  93. National Safety Council. Accident Prevention Manual: Security Management 2nd Edition. – М.: , 2010. – 407 с.
  94. William Manning. CISM Certified Information Security Manager Certification Exam Preparation Course in a Book for Passing the CISM Exam - The How To Pass on Your First Try Certification Study Guide. – М.: , 2010. – 188 с.
  95. Charles A. Sennewald. Effective Security Management. – М.: , 2010. – 395 с.
  96. Karim Vellani. Strategic Security Management. – М.: , 2010. – 416 с.
  97. Diana Bedward. Managing Information: Core Management. – М.: , 2010. – 352 с.
  98. John Fay. Contemporary Security Management. – М.: , 2010. – 496 с.
  99. William P Crowell. Physical and Logical Security Convergence: Powered By Enterprise Security Management. – М.: , 2010. – 592 с.
  100. Robert Robinson. Issues in Security Management. – М.: , 2010. – 208 с.
  101. Evan Wheeler. Security Risk Management: Building an Information Security Risk Management Program from the Ground Up. – М.: , 2011. – 360 с.
  102. Editors Karl Maria Michael de Leeuw, Jan Bergstra. The History of Information Security: A Comprehensive Handbook. – М.: Elsevier Science, 2007. – 900 с.
  103. Global Perspectives In Information Security. – М.: , 2008. – 896 с.
  104. CORNELIUS. MEANING AND METHOD IN INFORMATION STUDIESInformation Management Policies & (AXIM). – М.: , 2010. – 0 с.
  105. John R. Vacca. Managing Information Security. – М.: , 2010. – 320 с.
  106. G. Manoilov. Elsevier's Dictionary of Information Security. – М.: , 2010. – 772 с.
  107. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с.
  108. Dennis Dalton. Security Management. – М.: , 2010. – 328 с.
  109. George L Stefanek. Information Security Best Practices. – М.: , 2010. – 160 с.
  110. Sari Greene. Sustainable Information Security. – М.: , 2010. – 400 с.
  111. John R. Vacca. Computer and Information Security Handbook. – М.: , 2010. – 928 с.
  112. William R. Synnott. Information Resource Management. – М.: , 1981. – 356 с.
  113. Jeremy Moskowitz. Creating the Secure Managed Desktop. – М.: , 2008. – 720 с.
  114. Krag Brotby. Information Security Governance. – М.: , 2009. – 190 с.
  115. Genserik L.L. Reniers. Multi–Plant Safety and Security Management in the Chemical and Process Industries. – М.: , 2010. – 290 с.
  116. B CONOLLY. Conolly: ?information? Mechanics–transformation Of Information In Management Command Etc. – М.: , 1988. – 176 с.
  117. Harold F. Tipton, Micki Krause. Information Security Management Handbook on CD-ROM, 2003 Edition. – М.: , . –  с.
  118. Susan Snedaker, Robert McCrie, Karim Vellani. The Best Damn IT Security Management Book Period. – М.: Syngress, 2007. – 900 с.
  119. Rohana Mohamad Rashid. Determining Influencing Factors of Information Security Culture. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  120. Yedji Mbangsoua and Dr. Freddie Acosta. Information Security and its Investment Justification. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  121. Yasser Alshehri. Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 156 с.
  122. Julien Shabani. Information Security for RFID Systems. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.
  123. Debasish Jena. On Protocols for Information Security Services. – М.: LAP Lambert Academic Publishing, 2011. – 136 с.
  124. Aliyu Onipede. Biometrics as a tool for Information Security in Aviation industry. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  125. Furhan Mehmood and Rajia Rafique. Information Security in Financial Organizations. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  126. Omar Zakaria. Information Security Culture. – М.: LAP Lambert Academic Publishing, 2013. – 248 с.
  127. Saeed Soltanmohammadi. Improving Information System Security by Evaluating Human Factors. – М.: LAP Lambert Academic Publishing, 2014. – 116 с.
  128. frankie tvrz and marijke coetzee. Information Security of a Bluetooth-enabled handheld device. – М.: LAP Lambert Academic Publishing, 2010. – 180 с.
  129. Ahmed AlNunu. How Much Information Security?. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  130. Jeffy Mwakalinga. A Framework for Adaptive Information Security Systems. – М.: LAP Lambert Academic Publishing, 2011. – 364 с.
  131. Ubaid Hayee. A Six Sigma Approach to Assure IT Security. – М.: LAP Lambert Academic Publishing, 2011. – 64 с.
  132. Meysam Namayandeh. Development of Computer Ethical Framework for Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 132 с.
  133. Muhammad Imran Tariq. SLA based Information Security Metrics in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2014. – 192 с.
  134. Sarika Sharma and Savita Pathak. Information Technology Management. – М.: LAP Lambert Academic Publishing, 2011. – 120 с.
  135. Zakaria Karim. Online Banking. – М.: LAP Lambert Academic Publishing, 2011. – 72 с.
  136. Alaa Al-Deen Mohammed Hassan. Information Security Management. – М.: LAP Lambert Academic Publishing, 2013. – 188 с.
  137. Jun Zheng,Jiantao Gu and Hong Wang. Financial Management and Information Security of Independent Colleges. – М.: LAP Lambert Academic Publishing, 2014. – 256 с.
  138. JOHN CHIBAYA MBUYA PhD. BANK SECURITIES MANAGEMENT. – М.: LAP Lambert Academic Publishing, 2010. – 108 с.
  139. Ying Qian. Mitigating Information Security Risks during Operation Transition. – М.: LAP Lambert Academic Publishing, 2012. – 372 с.
  140. Mattia Bozza. Information System Management. – М.: LAP Lambert Academic Publishing, 2013. – 132 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. BUSINESS PROCESS MANAGEMENT: система для руководителя. А. Крючкова, "Финансовая газета. Региональный выпуск", № 24, июнь 2005.
  2. Построение системы мотивации по технологии BUSINESS UNIT MANAGEMENT. В. Лунин, "Финансовая газета. Региональный выпуск", № 16, апрель 2005.
  3. Business performance management: источники эффективности. О. Духонина, П. Горянский, "Финансовая газета. Региональный выпуск", № 20, май 2004.
  4. Health management: совершенствуем здоровый образ работы. С. Царенко, "Кадровик.ру", N 5, май 2012 г.
  5. Регулирование операций торгового финансирования: новые инициативы. интервью с Д. Шмандом, вице-председателем Банковской комиссии ICC по supply chain finance, главой подразделения Trade Finance and Cash Management Corporates EMEA в Global Transaction Banking. GTB division Deutsche Bank. Н. Макарова, "Международные банковские операции", N 2, апрель-июнь 2012 г.
  6. Lifestyle management и консьерж-сервис. А.И. Гусев, "Банковский ритейл", N 1, I квартал 2012 г.
  7. Ошибки при формировании и развитии бизнеса private banking & wealth management. А.В. Александров, "Банковский ритейл", N 1, I квартал 2012 г.
  8. О качестве сервиса, связанного с запросами на медицинскую информацию. Medical Information Service?. А. Беденков, "Ремедиум", № 1, январь 2012.
  9. Business Intelligence и Business Performance Management: основные термины и концепции. Ю.В. Амириди, "Управление в кредитной организации", N 5, сентябрь-октябрь 2011 г.
  10. Взаимодействие блока private banking & wealth management с розничным бизнесом. А.В. Александров, "Банковский ритейл", N 3, III квартал 2011 г.
  11. Сегментация клиентов в бизнесе private banking & wealth management. Н.В.  Чумак, "Банковский ритейл", N 1, I квартал 2011 г.
  12. Мотивируйте людей на работу, а не на преданность. интервью с Д.  Кленовым, партнером UFG Wealth Management. "Управление персоналом", N 14, июль 2010 г.
  13. Business performance management: современный взгляд. Д. Исаев, "Финансовая газета", № 10, 11, март 2009.
  14. Директора заблудились между governance и management. А. Верников, "Банковское обозрение", № 8, август 2008.
  15. Отечественный private banking продолжает эволюционировать в сторону private wealth management. А.И. Гусев, "Инвестиционный банкинг", № 3, III квартал 2008.

Образцы работ

Тема и предметТип и объем работы
Основы избирательных компаний
PR
Диплом
72 стр.
Public relations в политике как особый «срез» общественных отношений
PR
Курсовая работа
35 стр.
Последствия операции НАТО
Политология
Диплом
80 стр.
Слияния и поглощения Мировая и Российская практика
Мировая экономика
Диплом
99 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Александр
Спасибо Вам огромное за помощь, не знаю, что бы я делала.