Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Harold F. Tipton, Micki Krause, Micki, Cissp Krause. Information Security Management Handbook, Fifth Edition. – М.: , 0. – 0 с.

Дополнительные результаты

  1. USA Information Resources Management Association. Regional Development: Concepts, Methodologies, Tools and Applications. – М.: , 2012. – 2012 с.
  2. Frontiers in Algorithmics and Algorithmic Aspects in Information and Management: Joint International Conference, FAW-AAIM 2012, Beijing, China, May ... Computer Science and General Issues). – М.: , 2012. – 400 с.
  3. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с.
  4. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  5. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с.
  6. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с.
  7. Frederick D. S. Choi. International Finance and Accounting Handbook, 3rd Edition. – М.: , 0. – 0 с.
  8. Dwight H. Perkins, Malcolm Gillis, Steven Radelet, Donald R. Snodgrass, Michael Roemer, Donald Snodgrass. Economics of Development, Fifth Edition. – М.: , 0. – 0 с.
  9. Anura Guruge, Lisa M. Lindgren. Communications Systems Management Handbook, Sixth Edition. – М.: , 0. – 0 с.
  10. Barbara C. McNurlin, Ralph H. Sprague. Information Systems Management in Practice, Sixth Edition. – М.: , 0. – 0 с.
  11. Barbara C. McNurlin, Ralph H. Sprague. Information Systems Management in Practice (5th Edition). – М.: , 0. – 0 с.
  12. Cliff Conneighton. Venture Management Handbook: An Entrepreneur's Practical Guide to Stock, Finance and Contracts. – М.: , 0. – 0 с.
  13. Asset Protection and Security Management Handbook. – М.: , 0. – 0 с.
  14. Carol V. Brown, Heikki Topi. IS Management Handbook, Eighth Edition. – М.: , 0. – 0 с.
  15. Protecting Business Information : A Manager's Guide. – М.: , 0. – 0 с.
  16. Security Management : Business Strategies for Success. – М.: , 0. – 0 с.
  17. A. Gunasekaran, Omar Khalil, Syed Mahbubur Rahman, Angappa Gunasekaran. Knowledge and Information Technology Management: Human and Social Perspectives. – М.: , 0. – 0 с.
  18. Tracy Daniel Connors. The Volunteer Management Handbook. – М.: , 0. – 0 с.
  19. Richard C. Dorf. The Technology Management Handbook. – М.: , 0. – 0 с.
  20. Steven F. Blanding. Enterprise Operations Management Handbook, Second Edition. – М.: , 0. – 0 с.
  21. Mark B. Desman. Building an Information Security Awareness Program. – М.: , 0. – 0 с.
  22. Sanjiv Purba. Data Management Handbook, Third Edition. – М.: , 0. – 0 с.
  23. Mehdi Khosrowpour. Organizational Achievement and Failure in Information Technology Management (Cases on Information Technology Series, Vol 2, Part 1). – М.: , 0. – 0 с.
  24. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с.
  25. Jay Liebowitz. Information Technology Management: A Knowledge Repository. – М.: , 0. – 0 с.
  26. Marko Nordquist. Towards Improved Security Management Practice: Designing an Organizational Model Procedure for the Implementation of Information Security Management in Heterogeneous Information Management. – М.: , 0. – 0 с.
  27. Mehdi Khosrow-Pour. Advanced Topics in Information Resources Management, Volume 2. – М.: , 0. – 0 с.
  28. Information Resources Management Association. International Conference, Mehdi Khosrowpour. Managing Information Technology Resources in Organizations in the Next Millennium: 1999 Information Resources Management Association International Conference, Hershey, Pa, Usa, May 16-19, 1999. – М.: , 0. – 0 с.
  29. Mehdi Khosrow-Pour. Advanced Topics in Information Resources Management (Advanced Topics in Information Resources Management, Vol 3). – М.: , 0. – 0 с.
  30. Robert K. Wysocki, James Young. Information Systems: Management Practices in Action. – М.: , 0. – 0 с.
  31. Edward Szewczak, Mehdi Khosrowpour. The Human Side of Information Technology Management (Series in Managing the Human Side of Information Technology). – М.: , 0. – 0 с.
  32. Steve Purser. A Practical Guide to Managing Information Security (Artech House Technology Management Library). – М.: , 0. – 0 с.
  33. Editor Mark Fischetti. The Family Business Management Handbook. – М.: Family Business Publishing Company, 1996. – 122 с.
  34. Encyclopedia of Security Management : Techniques and technology. – М.: , 0. – 0 с.
  35. Effective Security Management, Fourth Edition (Effective Security Management). – М.: , 0. – 0 с.
  36. Carol V. Brown, Heikki Topi. IS Management Handbook, Seventh Edition. – М.: , 0. – 0 с.
  37. Ray Hackney, Dennis Dunn. Business Information Technology Management: Alternative and Adaptive Futures. – М.: , 0. – 0 с.
  38. Richard Stutely. Numbers Guide: The Essentials of Business Numeracy, Fifth Edition (The Economist Series). – М.: , 0. – 0 с.
  39. John Hradesky. Total Quality Management Handbook. – М.: , 0. – 0 с.
  40. Brad Cleveland, Debbie Harne. Call Center Operations Management Handbook and Study Guide. – М.: , 0. – 0 с.
  41. Marketing Book, Fifth Edition. – М.: , 0. – 0 с.
  42. Marian Quigley, Marian Quiqley. Information Security and Ethics: Social and Organizational Issues. – М.: , 0. – 0 с.
  43. Mostafa Hashem Sherif. Protocols for Secure Electronic Commerce, Second Edition. – М.: , 0. – 0 с.
  44. C. Warren Axelrod, Axelrod. Outsourcing Information Security. – М.: , 0. – 0 с.
  45. Harold F. Tipton, Micki Krause, Micki, Cissp Krause. Information Security Management Handbook, Fifth Edition. – М.: , 0. – 0 с.
  46. Charles Cresson Wood. Best Practices In Internet Commerce Security. – М.: , 0. – 0 с.
  47. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с.
  48. A. Michael Coleman. Collection Management Handbook. – М.: Wiley, 2004. – 288 с.
  49. Barbara C. McNurlin. Information Systems Management in Practice (7th Edition). – М.: , 2005. – 0 с.
  50. John Innes. The Handbook of Management Accounting, Third Edition. – М.: , 2005. – 0 с.
  51. Advanced Topics in Information Resources Management (Advanced Topics in Information Resources Management). – М.: , 2004. – 0 с.
  52. Current Security Management & Ethical Issues of Information Technology. – М.: , 2003. – 0 с.
  53. Economics of Information Security (Advances in Information Security). – М.: , 2004. – 0 с.
  54. Edward Borodzicz. Risk, Crisis and Security Management. – М.: , 2005. – 0 с.
  55. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с.
  56. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с.
  57. Adrian Mackay. Practice of Advertising, Fifth Edition. – М.: , 2004. – 0 с.
  58. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с.
  59. Scott Watson. The Art of War for Security Managers: 10 Steps to Enhancing Organizational Effectiveness. – М.: , 2007. – 200 с.
  60. Ira Winkler. Zen and the Art of Information Security. – М.: , 2007. – 192 с.
  61. Timothy P. Layton. Information Security. – М.: , 2006. – 222 с.
  62. Michael E. Whitman, Herbert J. Mattord. Principles of Information Security, Second Edition. – М.: , 2004. – 600 с.
  63. Tom G. Field, Robert E. Taylor. Beef Production Management and Decisions (5th Edition). – М.: , 2006. – 682 с.
  64. Chris Argyris, David A. Schon. Media Promotion & Marketing for Broadcasting, Cable & the Internet, Fifth Edition. – М.: Prentice Hall, 2006. – 305 с.
  65. Michael Mirabito, Barbara Morgenstern. The New Communications Technologies, Fifth Edition: Applications, Policy, and Impact. – М.: , 2004. – 331 с.
  66. William A. Yost. Fundamentals of Hearing, Fifth Edition: An Introduction. – М.: , 2006. – 352 с.
  67. Mahesh S. Raisinghani. Handbook of Research on Global Information Technology Management in the Digital Economy. – М.: Information Science Reference, 2008. – 588 с.
  68. John J. Fay. Encyclopedia of Security Management. – М.: Butterworth-Heinemann, 2007. – 688 с.
  69. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с.
  70. Michael Blyth. Risk and Security Management: Protecting People and Sites Worldwide. – М.: , 2008. – 402 с.
  71. Alan Calder, Steve Watkins. IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002. – М.: , 2008. – 384 с.
  72. Ibp Usa. Global National Intelligence and Security Agencies Handbook. – М.: , 2008. – 300 с.
  73. Social and Human Elements of Information Security: Emerging Trends and Countermeasures (Premier Reference Source). – М.: , 2008. – 412 с.
  74. Selected Readings on Information Technology Management: Contemporary Issues (Premier Reference Source). – М.: , 2008. – 530 с.
  75. Donna Avila-Weil, Mary Glaccum. The Independent Medical Transcriptionist, Fifth Edition: The Comprehensive Guidebook for Career Success in a Medical Transcription Business. – М.: , 2008. – 528 с.
  76. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с.
  77. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с.
  78. Gerard Blokdijk, Ivanka Menken. Information Security Management Best Practice Workbook: Implementation and Management Roadmap for Threats, Challenges and Solutions - Ready to use supporting documents bringing Theory into Practice. – М.: , 2008. – 124 с.
  79. Algorithmic Aspects in Information and Management: 4th International Conference, AAIM 2008, Shanghai, China, June 23-25, 2008, Proceedings (Lecture Notes in Computer Science). – М.: , 2008. – 350 с.
  80. Timothy M. Virtue. Payment Card Industry Data Security Standard Handbook. – М.: Wiley, 2009. – 224 с.
  81. Hamid R. Nemati. Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues (Advances in Information Security and Privacy). – М.: , 2009. – 414 с.
  82. W. Krag Brotby. Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement. – М.: Auerbach Publications, 2009. – 200 с.
  83. John E. Ettlie. Managing Innovation, Second Edition: New Technology, New Products, and New Services in a Global Economy. – М.: Elsevier Butterworth-Heinemann, 2006. – 528 с.
  84. Alan Calder. Information Security based on ISO 27001/ISO 27002: A Management Guide. – М.: , 2009. – 83 с.
  85. Bel G. Raggad. Information Security Management: Concepts and Practice. – М.: , 2010. – 871 с.
  86. Michael E. Whitman, Herbert J. Mattord. Management of Information Security. – М.: , 2010. – 592 с.
  87. Thomas Felberbauer. Wirtschaftsspionage und SIEM-Systeme: Wirtschaftsspionage unter der Lupe von Security Information Event Management Systemen (German Edition). – М.: , 2010. – 140 с.
  88. Alan Calder, Steve G Watkins. Information Security Risk Management for ISO27001 / ISO27002. – М.: , 2010. – 198 с.
  89. National Safety Council. Accident Prevention Manual: Security Management 2nd Edition. – М.: , 2010. – 407 с.
  90. William Manning. CISM Certified Information Security Manager Certification Exam Preparation Course in a Book for Passing the CISM Exam - The How To Pass on Your First Try Certification Study Guide. – М.: , 2010. – 188 с.
  91. Masaaki (Mike) Kotabe. Global Marketing Management, Fifth Edition International Student Version. – М.: , 0. – 744 с.
  92. Charles A. Sennewald. Effective Security Management. – М.: , 2010. – 395 с.
  93. Karim Vellani. Strategic Security Management. – М.: , 2010. – 416 с.
  94. Diana Bedward. Managing Information: Core Management. – М.: , 2010. – 352 с.
  95. John Fay. Contemporary Security Management. – М.: , 2010. – 496 с.
  96. William P Crowell. Physical and Logical Security Convergence: Powered By Enterprise Security Management. – М.: , 2010. – 592 с.
  97. Robert Robinson. Issues in Security Management. – М.: , 2010. – 208 с.
  98. Frank Booty. Facilities Management Handbook. – М.: , 2010. – 464 с.
  99. Linda S Spedding. Business Risk Management Handbook. – М.: , 2010. – 768 с.
  100. John M Likakis. Global Marketing Management, Fifth Edition International Student Version. – М.: , 2004. – 0 с.
  101. Editors Karl Maria Michael de Leeuw, Jan Bergstra. The History of Information Security: A Comprehensive Handbook. – М.: Elsevier Science, 2007. – 900 с.
  102. Transforms and Applications Handbook, Third Edition (Electrical Engineering Handbook). – М.: , 2010. – 911 с.
  103. C.R. Kitchin. Astrophysical Techniques, Fifth Edition. – М.: , 2008. – 592 с.
  104. C R Adams, M P Early, K M Bamford. Principles of Horticulture, Fifth Edition. – М.: , 2008. – 416 с.
  105. Global Perspectives In Information Security. – М.: , 2008. – 896 с.
  106. CME Group. The CME Group Risk Management Handbook. – М.: , 2010. – 624 с.
  107. CORNELIUS. MEANING AND METHOD IN INFORMATION STUDIESInformation Management Policies & (AXIM). – М.: , 2010. – 0 с.
  108. John R. Vacca. Managing Information Security. – М.: , 2010. – 320 с.
  109. G. Manoilov. Elsevier's Dictionary of Information Security. – М.: , 2010. – 772 с.
  110. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с.
  111. Logan T. White. Hazardous Gas Monitoring, Fifth Edition. – М.: , 2010. – 218 с.
  112. James J. Licari. Hybrid Microcircuit Technology Handbook, 2nd Edition. – М.: , 2010. – 600 с.
  113. John R. Vacca. Computer and Information Security Handbook. – М.: , 2010. – 928 с.
  114. Tracy D. Connors. The Nonprofit Handbook, 3rd Edition, set (includes Management and Fund Raising). – М.: , 2001. – 2136 с.
  115. AD SHAH. Shah: The Management Handbook For Information Center & End User Computing. – М.: , 1993. – 0 с.
  116. Hutt. Computer Security Handbook, 3rd Edition, 2000 Cumu lative Supplement. – М.: , 2000. – 112 с.
  117. Security Analysis: Fifth Edition. – М.: , 1987. – 658 с.
  118. Carpentry & Construction, Fifth Edition. – М.: , 2011. – 784 с.
  119. Principles Of Computer Security, Comptia Security+ And Beyond, Second Edition. – М.: , 2011. – 0 с.
  120. The Six Sigma Handbook, Third Edition. – М.: , 2011. – 560 с.
  121. Understanding Wall Street, Fifth Edition. – М.: , 2011. – 320 с.
  122. How To Plan, Contract, And Build Your Own Home, Fifth Edition. – М.: , 2011. – 912 с.
  123. Linux Administration: A Beginner'S Guide, Fifth Edition. – М.: , 2011. – 662 с.
  124. Electrical Safety Handbook, 4Th Edition. – М.: , 2011. – 640 с.
  125. Gray Hat Hacking The Ethical Hackers Handbook, 3Rd Edition. – М.: , 2011. – 720 с.
  126. Lineman'S And Cableman'S Handbook 12Th Edition. – М.: , 2011. – 1024 с.
  127. Networking, A Beginner'S Guide, Fifth Edition. – М.: , 2011. – 448 с.
  128. Edited by Lance A. Berger, Dorothy R. Berger. The Talent Management Handbook: Creating a Sustainable Competitive Advantage by Selecting, Developing, and Promoting the Best People. – М.: McGraw-Hill Book Company, Inc., 2011. – 576 с.
  129. Voice & Data Communications Handbook, Fifth Edition. – М.: , 2011. – 650 с.
  130. Chemical Technicians' Ready Reference Handbook, 5Th Edition. – М.: , 2011. – 752 с.
  131. Project Planning, Scheduling, And Control: The Ultimate Hands-On Guide To Bringing Projects In On Time And On Budget , Fifth Edition. – М.: , 2011. – 528 с.
  132. The Facility Management Handbook. – М.: , 2011. – 436 с.
  133. Harold F. Tipton, Micki Krause. Information Security Management Handbook on CD-ROM, 2003 Edition. – М.: , . –  с.
  134. Yedji Mbangsoua and Dr. Freddie Acosta. Information Security and its Investment Justification. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  135. Julien Shabani. Information Security for RFID Systems. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.
  136. Debasish Jena. On Protocols for Information Security Services. – М.: LAP Lambert Academic Publishing, 2011. – 136 с.
  137. Ahmed AlNunu. How Much Information Security?. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  138. Alaa Al-Deen Mohammed Hassan. Information Security Management. – М.: LAP Lambert Academic Publishing, 2013. – 188 с.
  139. Jun Zheng,Jiantao Gu and Hong Wang. Financial Management and Information Security of Independent Colleges. – М.: LAP Lambert Academic Publishing, 2014. – 256 с.
  140. Ying Qian. Mitigating Information Security Risks during Operation Transition. – М.: LAP Lambert Academic Publishing, 2012. – 372 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. BUSINESS PROCESS MANAGEMENT: система для руководителя. А. Крючкова, "Финансовая газета. Региональный выпуск", № 24, июнь 2005.
  2. Построение системы мотивации по технологии BUSINESS UNIT MANAGEMENT. В. Лунин, "Финансовая газета. Региональный выпуск", № 16, апрель 2005.
  3. Business performance management: источники эффективности. О. Духонина, П. Горянский, "Финансовая газета. Региональный выпуск", № 20, май 2004.
  4. Health management: совершенствуем здоровый образ работы. С. Царенко, "Кадровик.ру", N 5, май 2012 г.
  5. Регулирование операций торгового финансирования: новые инициативы. интервью с Д. Шмандом, вице-председателем Банковской комиссии ICC по supply chain finance, главой подразделения Trade Finance and Cash Management Corporates EMEA в Global Transaction Banking. GTB division Deutsche Bank. Н. Макарова, "Международные банковские операции", N 2, апрель-июнь 2012 г.
  6. Lifestyle management и консьерж-сервис. А.И. Гусев, "Банковский ритейл", N 1, I квартал 2012 г.
  7. Ошибки при формировании и развитии бизнеса private banking & wealth management. А.В. Александров, "Банковский ритейл", N 1, I квартал 2012 г.
  8. О качестве сервиса, связанного с запросами на медицинскую информацию. Medical Information Service?. А. Беденков, "Ремедиум", № 1, январь 2012.
  9. Business Intelligence и Business Performance Management: основные термины и концепции. Ю.В. Амириди, "Управление в кредитной организации", N 5, сентябрь-октябрь 2011 г.
  10. Взаимодействие блока private banking & wealth management с розничным бизнесом. А.В. Александров, "Банковский ритейл", N 3, III квартал 2011 г.
  11. Сегментация клиентов в бизнесе private banking & wealth management. Н.В.  Чумак, "Банковский ритейл", N 1, I квартал 2011 г.
  12. Мотивируйте людей на работу, а не на преданность. интервью с Д.  Кленовым, партнером UFG Wealth Management. "Управление персоналом", N 14, июль 2010 г.
  13. Business performance management: современный взгляд. Д. Исаев, "Финансовая газета", № 10, 11, март 2009.
  14. Директора заблудились между governance и management. А. Верников, "Банковское обозрение", № 8, август 2008.
  15. Отечественный private banking продолжает эволюционировать в сторону private wealth management. А.И. Гусев, "Инвестиционный банкинг", № 3, III квартал 2008.

Образцы работ

Тема и предметТип и объем работы
Основы избирательных компаний
PR
Диплом
72 стр.
Public relations в политике как особый «срез» общественных отношений
PR
Курсовая работа
35 стр.
Последствия операции НАТО
Политология
Диплом
80 стр.
Совершенствование системы управления рисками проекта в строительстве
Электрические системы и агрегаты
Диплом
114 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Екатерина, 04.02
Спасибо вам огромное, сегодня защитилась на отлично)