Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Rfid In The Supply Chain. – М.: , 2011. – 176 с. Frank Thornton, Brad Haines, Anand M Das, Hersh Bhargava, et al. RFID Security. – М.: , 2006. – 242 с. Jaydeb Bhaumik and Satyajit Das. Substitution Permutation Network Type Block Cipher. – М.: LAP Lambert Academic Publishing, 2013. – 68 с. Jayendra Singh,Satvik Vats and Ankit Dagar. Control Area Network for Vehicle Security System. – М.: LAP Lambert Academic Publishing, 2013. – 88 с. Hira Ilyas. RFID Based Security Systems With Video Monitering. – М.: LAP Lambert Academic Publishing, 2012. – 92 с. Julien Shabani. Information Security for RFID Systems. – М.: LAP Lambert Academic Publishing, 2011. – 92 с. Дополнительные результаты Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с. Katia Passerini, Ayman El Tarabishy, Karen Patten. Information Technology for Small Business: Managing the Digital Enterprise. – М.: , 2012. – 140 с. Rajagopal. Systems Thinking and Process Dynamics for Marketing Systems: Technologies and Applications for Decision Management. – М.: , 2012. – 301 с. Mario Piattini. Auditing Information Systems. – М.: , 0. – 0 с. Gerald Kovacich. The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition. – М.: , 0. – 0 с. Dimitrios Soudris, Christian Piguet, Costas Goutis. Designing Cmos Circuits for Low Power (European Low-Power Initiative for Electronic System Design (Series).). – М.: , 0. – 0 с. Naim Afgan, Maria De Graca Carvalho, Naim Hamdia Afgan, M. G. Carvalho. Sustainable Assessment Method for Energy Systems: Indicators, Criteria and Decision Making Procedure. – М.: , 0. – 0 с. Charles J. Austin, Stuart B. Boxerman. Information Systems for Healthcare Management, Sixth Edition. – М.: , 0. – 0 с. Mark B. Desman. Building an Information Security Awareness Program. – М.: , 0. – 0 с. Timothy Braithwaite. Securing E-Business Systems: A Guide for Managers and Executives. – М.: , 0. – 0 с. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с. Ifip Tc11 Wg11.5 Working Conference on Integrity and Internal Control, Michael Gertz. Integrity and Internal Control in Information Systems V: Ifip Tc11/Wg11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (Iicis), November 11-12, 2002, Bonn, Germany (International Federation for Information Processing. – М.: , 0. – 0 с. Steve Purser. A Practical Guide to Managing Information Security (Artech House Technology Management Library). – М.: , 0. – 0 с. H. M. J. Goldschmidt, M.J.T. Cox, R.J.E. Grouls, W.A.J.H. Van De Laar, F.G.G. Van Merode, H.M.J. Goldschmidt, Henk M. J. Goldschmidt. Reference Information Model for Clinical Laboratories: Laboratory Management Toolbox (Studies in Health Technology and Informatics, 55). – М.: , 0. – 0 с. Marian Quigley, Marian Quiqley. Information Security and Ethics: Social and Organizational Issues. – М.: , 0. – 0 с. C. Warren Axelrod, Axelrod. Outsourcing Information Security. – М.: , 0. – 0 с. Harold F. Tipton, Micki Krause, Micki, Cissp Krause. Information Security Management Handbook, Fifth Edition. – М.: , 0. – 0 с. Kevin Ake, John Clemons, Mark Cubine, Bruce Lilly. Information Technology for Manufacturing: Reducing Costs and Expanding Capabilities. – М.: , 0. – 0 с. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с. Water Environment Federation. Financing and Charges for Wastewater Systems (Wef Manual of Practice). – М.: , 2004. – 0 с. Economics of Information Security (Advances in Information Security). – М.: , 2004. – 0 с. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с. Ira Winkler. Zen and the Art of Information Security. – М.: , 2007. – 192 с. Timothy P. Layton. Information Security. – М.: , 2006. – 222 с. Michael E. Whitman, Herbert J. Mattord. Principles of Information Security, Second Edition. – М.: , 2004. – 600 с. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с. Patrick Traynor, Patrick McDaniel, Thomas La Porta. Security for Telecommunications Networks (Advances in Information Security). – М.: , 2008. – 182 с. James Michael Stewart, Ed Tittel, Mike Chapple. CISSP: Certified Information Systems Security Professional Study Guide. – М.: , 2008. – 841 с. Social and Human Elements of Information Security: Emerging Trends and Countermeasures (Premier Reference Source). – М.: , 2008. – 412 с. Selected Readings on Information Technology and Business Systems Management. – М.: , 2008. – 566 с. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с. Gerard Blokdijk, Ivanka Menken. Information Security Management Best Practice Workbook: Implementation and Management Roadmap for Threats, Challenges and Solutions - Ready to use supporting documents bringing Theory into Practice. – М.: , 2008. – 124 с. Handbook on Information Technology in Finance (International Handbooks on Information Systems). – М.: , 2008. – 800 с. Hamid R. Nemati. Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues (Advances in Information Security and Privacy). – М.: , 2009. – 414 с. W. Krag Brotby. Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement. – М.: Auerbach Publications, 2009. – 200 с. Alan Calder. Information Security based on ISO 27001/ISO 27002: A Management Guide. – М.: , 2009. – 83 с. Bel G. Raggad. Information Security Management: Concepts and Practice. – М.: , 2010. – 871 с. Michael E. Whitman, Herbert J. Mattord. Management of Information Security. – М.: , 2010. – 592 с. Alan Calder, Steve G Watkins. Information Security Risk Management for ISO27001 / ISO27002. – М.: , 2010. – 198 с. William Manning. CISM Certified Information Security Manager Certification Exam Preparation Course in a Book for Passing the CISM Exam - The How To Pass on Your First Try Certification Study Guide. – М.: , 2010. – 188 с. Michael Erbschloe. Physical Security for IT. – М.: , 2010. – 256 с. Michael Erbschloe. Implementing Homeland Security for Enterprise IT. – М.: , 2010. – 299 с. Chuck Eastman, Paul Teicholz, Rafael Sacks, Kathleen Liston. BIM Handbook: A Guide to Building Information Modeling for Owners, Managers, Designers, Engineers and Contractors. – М.: John Wiley and Sons, Ltd, 2008. – 504 с. Editors Karl Maria Michael de Leeuw, Jan Bergstra. The History of Information Security: A Comprehensive Handbook. – М.: Elsevier Science, 2007. – 900 с. Global Perspectives In Information Security. – М.: , 2008. – 896 с. Bruce Powel Douglass. Design Patterns for Embedded Systems in C. – М.: , 2010. – 416 с. Bruce Powel Douglass. Real Time UML Workshop for Embedded Systems. – М.: , 2010. – 432 с. D. Dowson. Tribological Research and Design for Engineering Systems. – М.: , 2010. – 940 с. John R. Vacca. Managing Information Security. – М.: , 2010. – 320 с. G. Manoilov. Elsevier's Dictionary of Information Security. – М.: , 2010. – 772 с. Ahmad Ibrahim. Fuzzy Logic for Embedded Systems Applications. – М.: , 2010. – 312 с. Derrick Rountree. Security for Microsoft Windows System Administrators. – М.: , 2010. – 400 с. Carmel Maguire. Information Services for Innovative Organizations. – М.: , 2010. – 319 с. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с. Gary E. Musgrave Ph.D. Safety Design for Space Systems. – М.: , 2010. – 992 с. Roman F. Nalewajski. Information Theory of Molecular Systems. – М.: , 2010. – 462 с. S.E. Jorgensen. Towards a Thermodynamic Theory for Ecological Systems. – М.: , 2010. – 380 с. S.E. Jorgensen. Towards a Thermodynamic Theory for Ecological Systems. – М.: , 2010. – 380 с. George L Stefanek. Information Security Best Practices. – М.: , 2010. – 160 с. Sari Greene. Sustainable Information Security. – М.: , 2010. – 400 с. John R. Vacca. Computer and Information Security Handbook. – М.: , 2010. – 928 с. Karama Kanoun. Dependability Benchmarking for Computer Systems. – М.: , 2008. – 362 с. MORSE. Morse: ?operations? Research For Public Systems (pr Only). – М.: , 1967. – 0 с. Timothy Braithwaite. Securing E–Business Systems. – М.: , 2002. – 288 с. Efraim Turban. Information Technology for Management 7th Edition ISV with Ess of Business Processes & IS WileyPLUS 7th Edition ISV and WileyPLUS Set. – М.: , 2010. – 0 с. RD PARSLOW. Parslow ?information? Technology For The Eighties (bcs 81). – М.: , 1981. – 770 с. Krag Brotby. Information Security Governance. – М.: , 2009. – 190 с. F THOMAS. Thomas ?instructor?s Manual? For ?filing? Systems For Information Management. – М.: , 1983. – 32 с. T.s. Michael. Greening through IT – Information Technology for Environmental Sustainability. – М.: , 2009. – 288 с. Efraim Turban. Information Technology for Management. – М.: , 2001. – 848 с. Microsoft Official Academic Course. 70–298 Designing Security for a Microsoft® Windows ServerTM 2003 Network Package. – М.: , 2005. – 744 с. H C LEFKOVITS. Lefkovits: Information Resource/data Dictionary Systems (pr Only). – М.: , 1993. – 0 с. Terry Bernstein. Internet Security for Business. – М.: , 1996. – 464 с. Efraim Turban. Information Technology for Management. – М.: , 1998. – 848 с. Efraim Turban. Information Technology for Management First Edition with Two New Chapters. – М.: , 1998. – 106 с. Michelle Chuaprasert. Thermal and Power Design for Laptop Systems. – М.: , 2000. – 432 с. M GREENWELL. Greenwell: ?knowledge? Engineeering For Expert Systems (prev. Knowledge Elicitation). – М.: , 1988. – 184 с. BORKIN. Borkin: ?datamodels? – A Semantic Approach For Database Systems. – М.: , 1980. – 0 с. Louis Rosenfeld. Information Architecture for the World Wide Web 2e. – М.: , 2002. – 486 с. Alan Derickson. Health Security for All – Dreams of Universal Health Care in America. – М.: , 2005. – 256 с. I Bratko. Kardio – A Study in Deep & Qualitative Knowledge for Expert Systems. – М.: , 1990. – 278 с. Roberta Bragg. MCSE Self–Paced Training Kit (Exam 70–298) – Designing Security for a Microsoft Windows Server 2003 Network. – М.: , 2004. – 864 с. Efraim Turban. Information Technology for Management. – М.: , 2003. – 784 с. Ed Robinson. Security for Microsoft Visual Basic .NET. – М.: , 2003. – 416 с. AW LEIGH. Leigh: ?real Time? Software For Small Systems (pr Only). – М.: , 1988. – 192 с. S Hardy. Design Standards for Roof Systems. – М.: , 2001. – 448 с. Ulrich Lang. CORBA Security for Distributed Application Development. – М.: , 2000. – 400 с. Peter Morville. Information Architecture for the World Wide Web 3e. – М.: , 2006. – 526 с. Efraim Turban. Information Technology for Management. – М.: , 1996. – 848 с. Don Morgan. Numerical Methods for DSP Systems in C. – М.: , 1997. – 352 с. Kornel Terplan. Applications for Distributed Systems and Network Management. – М.: , 1994. – 400 с. Rfid In The Supply Chain. – М.: , 2011. – 176 с. Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky. Cisco Security Professional's Guide to Secure Intrusion Detection Systems. – М.: , . – с. Roel Wieringa, R. J. Wieringa. Design Methods for Reactive Systems: Yourdon, Statemate, and the UML. – М.: Morgan Kaufmann, . – с. Harold F. Tipton, Micki Krause. Information Security Management Handbook on CD-ROM, 2003 Edition. – М.: , . – с. Frank Thornton, Brad Haines, Anand M Das, Hersh Bhargava, et al. RFID Security. – М.: , 2006. – 242 с. Yi Qian, James Joshi, David Tipper, Prashant Krishnamurthy. Information Assurance: Dependability and Security in Networked Systems. – М.: Morgan Kaufmann, 2007. – 576 с. Ergun Bagc?. RFID Systems Design for Potential Applications. – М.: LAP Lambert Academic Publishing, 2011. – 124 с. Shaikh Salim and Shankar Nawale. Secure Access of RFID System. – М.: LAP Lambert Academic Publishing, 2012. – 96 с. Rohana Mohamad Rashid. Determining Influencing Factors of Information Security Culture. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Muthiah Geethanjali. Artificial Intelligence for power system protection. – М.: LAP Lambert Academic Publishing, 2012. – 284 с. Jawad Ahmed Malik,Yasir Javed Qazi and Safwan Muhammad. Performance Evaluation Of Error Correcting Techniques For OFDM Systems. – М.: LAP Lambert Academic Publishing, 2014. – 80 с. Ruben Johnnson Robert Jeremiah,Sakthivel Murugan Shamjith and Allen Vimal. Security System of Oilfield using Wireless in PLC & TESTBED for SCADA. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Ali Salah Mahdi and Ergun Ercelebi. Design of Channel Estimation and Equalization for OFDM Systems. – М.: LAP Lambert Academic Publishing, 2015. – 84 с. MD. KAFIL UDDIN. An Efficient System for Sensor Tag Management. – М.: LAP Lambert Academic Publishing, 2011. – 148 с. Ehab E. Elattar,Tahir A. Mohammed and Abdel Mohsen M. Kinawy. Static State Estimation for Power Systems. – М.: LAP Lambert Academic Publishing, 2014. – 132 с. Almoataz Y. Abdelaziz,Said F. Mekhamer and Fathy M. Mohamed. Novel Optimization Techniques for Distribution Systems Reconfiguration. – М.: LAP Lambert Academic Publishing, 2013. – 172 с. Hussein M. Khattab,Almoataz Y. Abdelaziz and Said F. Mekhamer. Innovative Approaches for Power System Security Assessment. – М.: LAP Lambert Academic Publishing, 2013. – 224 с. Nikhil Bhargava. Network Information Flow for Multicast Communication Networks. – М.: LAP Lambert Academic Publishing, 2013. – 84 с. Ehsan Khorasani Esmaeili. Secure Keyboard logging system. – М.: LAP Lambert Academic Publishing, 2013. – 124 с. Venkata Krishna Parimala. Dimensions and challenges in providing QoS for wireless systems. – М.: LAP Lambert Academic Publishing, 2012. – 224 с. Hira Ilyas. RFID Based Security Systems With Video Monitering. – М.: LAP Lambert Academic Publishing, 2012. – 92 с. Ka Lok Man,Tomas Krilavicius and Danny Hughes. PAFESD: Process Algebras for Electronic System Design. – М.: LAP Lambert Academic Publishing, 2010. – 132 с. Britto R. Kumar and Albert S. Rabara. An Architecture for Secure Mobile Payment System using PKI. – М.: LAP Lambert Academic Publishing, 2013. – 184 с. Raghavendra K. R. Model-checking infinite state systems for information flow security. – М.: LAP Lambert Academic Publishing, 2014. – 160 с. Yedji Mbangsoua and Dr. Freddie Acosta. Information Security and its Investment Justification. – М.: LAP Lambert Academic Publishing, 2011. – 132 с. Yasser Alshehri. Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 156 с. Julien Shabani. Information Security for RFID Systems. – М.: LAP Lambert Academic Publishing, 2011. – 92 с. Debasish Jena. On Protocols for Information Security Services. – М.: LAP Lambert Academic Publishing, 2011. – 136 с. Furhan Mehmood and Rajia Rafique. Information Security in Financial Organizations. – М.: LAP Lambert Academic Publishing, 2010. – 68 с. Omar Zakaria. Information Security Culture. – М.: LAP Lambert Academic Publishing, 2013. – 248 с. Dirk Lessner. Network Security for Embedded Systems. – М.: LAP Lambert Academic Publishing, 2009. – 232 с. frankie tvrz and marijke coetzee. Information Security of a Bluetooth-enabled handheld device. – М.: LAP Lambert Academic Publishing, 2010. – 180 с. Ahmed AlNunu. How Much Information Security?. – М.: LAP Lambert Academic Publishing, 2010. – 68 с. Jeffy Mwakalinga. A Framework for Adaptive Information Security Systems. – М.: LAP Lambert Academic Publishing, 2011. – 364 с. Meysam Namayandeh. Development of Computer Ethical Framework for Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 132 с. Marco Vieira. Dependability Benchmarking for OLTP Systems. – М.: LAP Lambert Academic Publishing, 2009. – 188 с. Muhammad Imran Tariq. SLA based Information Security Metrics in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2014. – 192 с. Kavitha Ramachandran and Sivadasan E. T. ICEdu : An Information Cloud for Educational Institutions. – М.: LAP Lambert Academic Publishing, 2014. – 72 с. Mela Ali and Loay George. A Spatial Invarient Model for Local Attributes of Fingerprint Ridges. – М.: LAP Lambert Academic Publishing, 2013. – 152 с. Alaa Al-Deen Mohammed Hassan. Information Security Management. – М.: LAP Lambert Academic Publishing, 2013. – 188 с. Jun Zheng,Jiantao Gu and Hong Wang. Financial Management and Information Security of Independent Colleges. – М.: LAP Lambert Academic Publishing, 2014. – 256 с. Erick Brenes. Information Strategies for Project Managment. – М.: LAP Lambert Academic Publishing, 2014. – 88 с. Ying Qian. Mitigating Information Security Risks during Operation Transition. – М.: LAP Lambert Academic Publishing, 2012. – 372 с. Лучшие результаты Ничего не найдено Дополнительные результаты Банковское отделение будущего. интервью с Камероном МакКворри. Cameron MacQuarrie, менеджером по развитию бизнеса компании Cisco Systems в области корпоративных финансов в регионе EMEA. Европа, Ближний Восток, Африка. Н.Ф. Колюшенко, "Расчеты и операционная работа в коммерческом банке", № 2, февраль 2006. Ловушка для пирата. интервью с И. Слабых, руководителем отдела противодействия интеллектуальному пиратству в России и СНГ Adobe Systems. И. Голова, "Расчет", N 9, сентябрь 2012 г. О качестве сервиса, связанного с запросами на медицинскую информацию. Medical Information Service?. А. Беденков, "Ремедиум", № 1, январь 2012. Мы можем управлять собственными мыслями. интервью с С. Харитоновым, врачом-психотерапевтом, психиатором, кандидатом медицинских наук, старшим научным сотрудником Московского НИИ психиатрии Росздрава РФ, членом-корреспондентом Международной академии наук. МАНЭБ, членом Британского общества когнитивных и поведенческих психотерапевтов. Membership British Association for Behavioural & Cognitive Psychoterapies / BABCP. Ф. Кульпин, "Управление персоналом", N 8, апрель 2011 г. Зачетная реструктуризация долга: институт DEBT-FOR-EQUITY SWAP в России". интервью с М. Григорьевым, старшим юристом корпоративной практики юридической фирмы "Вегас-Лекс". О. Бодрягина, "эж-ЮРИСТ", № 3, январь 2010. Я воспринимаю персонального помощника как напарника червяк должен нравиться рыбке, а не рыбаку. интервью с П.А. Черкашиным, руководителем российского представительства компании Adobe Systems. "Управление персоналом", № 20, октябрь 2008. Управление проектами при подборе персонала. PM for HR. Е. Кривов, "Кадровик. Рекрутинг для кадровика", № 9, сентябрь 2008. Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Альбина Пишу письмо, чтобы выразить Вам благодарность в том, что Вы помогли мне с сопровождением дипломной работы. Дипломную работу после вашего сопровождения я защитила на "хорошо". Огромное Вам спасибо, что Вы есть!!!