Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты John Graves. Management Roadmap to Information Security (Kentis Management Roadmaps). – М.: , 0. – 0 с. Дополнительные результаты Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с. R. Kelly, Jr. Rainer. Introduction to Information Systems. – М.: , 2012. – 480 с. Sam Henderson. SMSF DIY Guide: Everything you need to successfully set up and run your own Self Managed Superannuation Fund. – М.: , 2012. – 272 с. David F. Teitelbaum. The Procrastinator's Guide to Financial Security: How Anyone Over 40 Can Still Build a Strong Portfolio--and Retire Comfortably. – М.: , 0. – 0 с. Aschalew Tigabu. Factors contributing to improved drinking water source management: A case study from Ethiopia. – М.: , 2012. – 64 с. Risk Management, Speculation, and Derivative Securities. – М.: , 0. – 0 с. David S. Katz, Ilan Caspi, David S. Katz, Ilan Caspi. Executive's Guide to Personal Security. – М.: , 0. – 0 с. Bernd Stahl. Responsible Management of Information Systems. – М.: , 0. – 0 с. Gerald Kovacich. The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition. – М.: , 0. – 0 с. Lynda M Applegate, Robert D. Austin, F. Warren McFarlan, Lynda Applegate, Robert Austin, F. Warren McFarlan. Corporate Information Strategy and Management: Text and Cases. – М.: , 0. – 0 с. Barbara C. McNurlin, Ralph H. Sprague. Information Systems Management in Practice (5th Edition). – М.: , 0. – 0 с. Lisa Davis. Shortcuts for Smart Managers: Checklists, Worksheets, and Action Plans for Managers With No Time to Waste. – М.: , 0. – 0 с. Asset Protection and Security Management Handbook. – М.: , 0. – 0 с. Security Operations Management. – М.: , 0. – 0 с. Protecting Business Information : A Manager's Guide. – М.: , 0. – 0 с. Jon C. Piot, John Baschab. The Executive's Guide to Information Technology. – М.: , 0. – 0 с. Michael J. Earl, Oxford Institute of Information Management, Pa Consulting Group. Information Management: The Organizational Dimension. – М.: , 0. – 0 с. Charles J. Austin, Stuart B. Boxerman. Information Systems for Healthcare Management, Sixth Edition. – М.: , 0. – 0 с. Mark B. Desman. Building an Information Security Awareness Program. – М.: , 0. – 0 с. James A. O'Brien. Introduction to Information Systems with MISource v.2 and PowerWeb. – М.: , 0. – 0 с. Gerald L. Kovacich, Edward P. Halibozek. The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, First Edition. – М.: , 0. – 0 с. Thomas J. Parenty. Digital Defense: What You Should Know About Protecting Your Company's Assets. – М.: , 0. – 0 с. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с. Marko Nordquist. Towards Improved Security Management Practice: Designing an Organizational Model Procedure for the Implementation of Information Security Management in Heterogeneous Information Management. – М.: , 0. – 0 с. John Graves. Management Roadmap to Information Security (Kentis Management Roadmaps). – М.: , 0. – 0 с. Mary Pat McCarthy, Stuart Campbell. Security Transformation: Digital Defense Strategies to Protect your Company's Reputation and Market Share. – М.: , 0. – 0 с. Steve Purser. A Practical Guide to Managing Information Security (Artech House Technology Management Library). – М.: , 0. – 0 с. Encyclopedia of Security Management : Techniques and technology. – М.: , 0. – 0 с. Anita Cassidy. A Practical Guide to Information Systems Strategic Planning. – М.: Saint Lucie Press, 0. – 304 с. HAROLD L. LUSTIG. 4 Steps to Financial Security for Lesbian and Gay Couples. – М.: , 0. – 0 с. Marian Quigley, Marian Quiqley. Information Security and Ethics: Social and Organizational Issues. – М.: , 0. – 0 с. C. Warren Axelrod, Axelrod. Outsourcing Information Security. – М.: , 0. – 0 с. Harold F. Tipton, Micki Krause, Micki, Cissp Krause. Information Security Management Handbook, Fifth Edition. – М.: , 0. – 0 с. Bernd Carsten Stahl. Responsible Management of Information Systems. – М.: , 0. – 0 с. Thomas Peltier, Thomas Pelitier, Justin Peltier, John A. Blackley, Peltier, Associates. Information Security Fundamentals. – М.: , 0. – 0 с. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с. Econometrics Informing Natural Resources Management: Selected Empirical Analyses (New Horizons in Environmental Economics). – М.: , 2005. – 0 с. Barbara C. McNurlin. Information Systems Management in Practice (7th Edition). – М.: , 2005. – 0 с. Keri E. Pearlson. Managing and Using Information Systems. – М.: , 2005. – 0 с. Economics of Information Security (Advances in Information Security). – М.: , 2004. – 0 с. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с. Jae K. Shim. The Vest Pocket Guide to Information Technology. – М.: , 2005. – 0 с. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с. Ira Winkler. Zen and the Art of Information Security. – М.: , 2007. – 192 с. Timothy P. Layton. Information Security. – М.: , 2006. – 222 с. Michael E. Whitman, Herbert J. Mattord. Principles of Information Security, Second Edition. – М.: , 2004. – 600 с. Jeffrey M. Stanton, Kathryn R. Stam. The Visible Employee: Using Workplace Monitoring and Surveillance to Protect Information Assets-Without Compromising Employee Privacy or Trust. – М.: , 2006. – 272 с. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с. Patrick Traynor, Patrick McDaniel, Thomas La Porta. Security for Telecommunications Networks (Advances in Information Security). – М.: , 2008. – 182 с. Alan Calder, Steve Watkins. IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002. – М.: , 2008. – 384 с. Social and Human Elements of Information Security: Emerging Trends and Countermeasures (Premier Reference Source). – М.: , 2008. – 412 с. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с. Jane Bullock, George Haddow, Damon P. Coppola, Sarp Yeletaysi. Introduction to Homeland Security, Third Edition: Principles of All-Hazards Response (Butterworth-Heinemann Homeland Security). – М.: , 2008. – 616 с. Gerard Blokdijk, Ivanka Menken. Information Security Management Best Practice Workbook: Implementation and Management Roadmap for Threats, Challenges and Solutions - Ready to use supporting documents bringing Theory into Practice. – М.: , 2008. – 124 с. Algorithmic Aspects in Information and Management: 4th International Conference, AAIM 2008, Shanghai, China, June 23-25, 2008, Proceedings (Lecture Notes in Computer Science). – М.: , 2008. – 350 с. W. Krag Brotby. Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement. – М.: Auerbach Publications, 2009. – 200 с. Julian Talbot, Miles Jakeman. Security Risk Management Body of Knowledge (Wiley Series in Systems Engineering and Management). – М.: , 2009. – 445 с. Alan Calder. Information Security based on ISO 27001/ISO 27002: A Management Guide. – М.: , 2009. – 83 с. Jake Kouns, Daniel Minoli. Information Technology Risk Management in Enterprise Environments: A Review of Industry Practices and a Practical Guide to Risk Management Teams. – М.: , 2010. – 421 с. Bel G. Raggad. Information Security Management: Concepts and Practice. – М.: , 2010. – 871 с. Michael E. Whitman, Herbert J. Mattord. Management of Information Security. – М.: , 2010. – 592 с. Digital Business Security Development: Management Technologies. – М.: , 2010. – 318 с. Alan Calder, Steve G Watkins. Information Security Risk Management for ISO27001 / ISO27002. – М.: , 2010. – 198 с. Bernard Marr. The Intelligent Company: Five Steps to Success with Evidence-Based Management. – М.: , 2010. – 252 с. William Manning. CISM Certified Information Security Manager Certification Exam Preparation Course in a Book for Passing the CISM Exam - The How To Pass on Your First Try Certification Study Guide. – М.: , 2010. – 188 с. Evan Wheeler. Security Risk Management: Building an Information Security Risk Management Program from the Ground Up. – М.: , 2011. – 360 с. Editors Karl Maria Michael de Leeuw, Jan Bergstra. The History of Information Security: A Comprehensive Handbook. – М.: Elsevier Science, 2007. – 900 с. Global Perspectives In Information Security. – М.: , 2008. – 896 с. Mark Miller. The Hard Times Guide to Retirement Security. – М.: , 2010. – 224 с. John R. Vacca. Managing Information Security. – М.: , 2010. – 320 с. G. Manoilov. Elsevier's Dictionary of Information Security. – М.: , 2010. – 772 с. Francis T.S. Yu. Introduction to Information Optics. – М.: , 2010. – 734 с. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с. George L Stefanek. Information Security Best Practices. – М.: , 2010. – 160 с. Sari Greene. Sustainable Information Security. – М.: , 2010. – 400 с. John R. Vacca. Computer and Information Security Handbook. – М.: , 2010. – 928 с. R. Kelly Rainer. Introduction to Information Technology. – М.: , 2002. – 592 с. Clay Spinuzzi. Tracing Genres Through Organizations – A Sociocultural Approach to Information Design. – М.: , 2003. – 264 с. Mark Ungar. Policing Democracy – Overcoming Obstacles to Citizen Security in Latin America. – М.: , 2011. – 336 с. Mark Ungar. Policing Democracy – Overcoming Obstacles to Citizen Security in Latin America. – М.: , 2011. – 336 с. Karin M. Fierke. Critical Approaches to International Security. – М.: , 2007. – 288 с. Dona Wong. The Wall Street Journal Guide to Information Graphics – The Dos and Don?ts of Presenting Data, Facts and Figures. – М.: , 2010. – 192 с. Viktor Mayer–schonberg. Governance and Information Technology – From Electronic Government to Information Government. – М.: , 2007. – 352 с. Viktor Mayer–schonberg. Governance and Information Technology – From Electronic Government to Information Government. – М.: , 2007. – 352 с. Using the Entertainment Media to Inform Student Affairs Practice. – М.: , 2004. – 128 с. Krag Brotby. Information Security Governance. – М.: , 2009. – 190 с. Arthur Young Technology Group. The Arthur Young Practical Guide to Information Engineering. – М.: , 1987. – 182 с. Jae K. Shim. The Vest Pocket Guide to Information Technology. – М.: , 2005. – 384 с. Dennis Pirages. From Resource Scarcity to Ecological Security – Exploring New Limits to Growth (OIP). – М.: , 2005. – 280 с. John Baschab. The Executive?s Guide to Information Technology. – М.: , 2007. – 672 с. Ronnie Lipton. The Practical Guide to Information Design. – М.: , 2007. – 272 с. Christine L Borgman. From Gutenberg to the Global Information Infrastructure – Access to Information in the Networked World. – М.: , 2003. – 344 с. Efraim Turban. (ALE)Introduction to Information Technology, Third Edition– Active Learning Edition. – М.: , 2004. – 502 с. Alfredo Cramerotti. Aesthetic Journalism – How to Inform Without Informing. – М.: , 2010. – 112 с. CCTA. Ccta: An Intro To Information Systems In Govt. – М.: , 1989. – 76 с. David S. Katz. Executive?s Guide to Personal Security. – М.: , 2003. – 288 с. R. Kelly Rainer. Introduction to Information Systems. – М.: , 2006. – 432 с. Dennis Pirages. From Resource Scarcity to Ecological Security – Exploring New Limits to Growth (OIP). – М.: , 2005. – 280 с. Christine Borgman. From Gutenburg to the Global Information Infrastructure – Access to Information in the Networked World. – М.: , 2000. – 350 с. Efraim Turban. Introduction to Information Technology. – М.: , 2004. – 544 с. Harold F. Tipton, Micki Krause. Information Security Management Handbook on CD-ROM, 2003 Edition. – М.: , . – с. Arjun Mane and Karbhari Kale. Face Recognition Using Principal Component Analysis. – М.: LAP Lambert Academic Publishing, 2015. – 144 с. Rohana Mohamad Rashid. Determining Influencing Factors of Information Security Culture. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Lorenzo Cozzella. Data and Information Security using Hylemetric Approach. – М.: LAP Lambert Academic Publishing, 2014. – 204 с. Gwen Mar. Freedom of Access to Information in Fiji. – М.: LAP Lambert Academic Publishing, 2010. – 112 с. Pankaj K.P. Shreyaskar. Transparency and Right to Information. – М.: LAP Lambert Academic Publishing, 2012. – 152 с. Olukemi Asemota. HIV/AIDS MANAGEMENT IN THE WORKPLACE: FOCUS ON SECURITY FORCES. – М.: LAP Lambert Academic Publishing, 2010. – 240 с. Kelly Barbara Schnare. Integrated Water Resource Management in a Developing Tropical Basin. – М.: LAP Lambert Academic Publishing, 2014. – 92 с. Cletus Kuunifaa. A case study of access to information perspectives. – М.: LAP Lambert Academic Publishing, 2011. – 80 с. Ravishankar Mor. Right to information in India. – М.: LAP Lambert Academic Publishing, 2012. – 84 с. Mobassera Kadery. Right to Information Act-2009 in Bangladesh: An Analysis. – М.: LAP Lambert Academic Publishing, 2011. – 148 с. Chetan Agrawal. Right to Information in India. – М.: LAP Lambert Academic Publishing, 2012. – 84 с. Anuradha Parasar. RIGHT TO INFORMATION IN INDIA. – М.: LAP Lambert Academic Publishing, 2011. – 60 с. Alphonse Landry Nouck. The Right of Access to Information for Disabled people in South Africa. – М.: LAP Lambert Academic Publishing, 2014. – 192 с. Albert Wasef. Managing and Complementing PKI for Securing Vehicular Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2011. – 204 с. Shilpa Jaiswal and Sumeet Agrawal. Detection of Network Worm to Eliminate Security Threats in MANET. – М.: LAP Lambert Academic Publishing, 2012. – 52 с. Aliyu Muhammed Rabiu. Application of ICT to Information Resources Sharing. – М.: LAP Lambert Academic Publishing, 2011. – 92 с. Yedji Mbangsoua and Dr. Freddie Acosta. Information Security and its Investment Justification. – М.: LAP Lambert Academic Publishing, 2011. – 132 с. Yasser Alshehri. Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 156 с. Jasper Mogaka Masese and Samuel Macharia Were. Introduction to Modern Concepts in Information Management. – М.: LAP Lambert Academic Publishing, 2014. – 116 с. Dr. Gershon Adzadi and Hon. Ishamael Aryeetey. Principles of Applied Database Management System for Health Sector. – М.: LAP Lambert Academic Publishing, 2010. – 132 с. Julien Shabani. Information Security for RFID Systems. – М.: LAP Lambert Academic Publishing, 2011. – 92 с. Debasish Jena. On Protocols for Information Security Services. – М.: LAP Lambert Academic Publishing, 2011. – 136 с. Aliyu Onipede. Biometrics as a tool for Information Security in Aviation industry. – М.: LAP Lambert Academic Publishing, 2012. – 88 с. Furhan Mehmood and Rajia Rafique. Information Security in Financial Organizations. – М.: LAP Lambert Academic Publishing, 2010. – 68 с. Omar Zakaria. Information Security Culture. – М.: LAP Lambert Academic Publishing, 2013. – 248 с. Saeed Soltanmohammadi. Improving Information System Security by Evaluating Human Factors. – М.: LAP Lambert Academic Publishing, 2014. – 116 с. frankie tvrz and marijke coetzee. Information Security of a Bluetooth-enabled handheld device. – М.: LAP Lambert Academic Publishing, 2010. – 180 с. Ahmed AlNunu. How Much Information Security?. – М.: LAP Lambert Academic Publishing, 2010. – 68 с. Jeffy Mwakalinga. A Framework for Adaptive Information Security Systems. – М.: LAP Lambert Academic Publishing, 2011. – 364 с. Meysam Namayandeh. Development of Computer Ethical Framework for Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 132 с. Muhammad Imran Tariq. SLA based Information Security Metrics in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2014. – 192 с. Alaa Al-Deen Mohammed Hassan. Information Security Management. – М.: LAP Lambert Academic Publishing, 2013. – 188 с. Jun Zheng,Jiantao Gu and Hong Wang. Financial Management and Information Security of Independent Colleges. – М.: LAP Lambert Academic Publishing, 2014. – 256 с. Ying Qian. Mitigating Information Security Risks during Operation Transition. – М.: LAP Lambert Academic Publishing, 2012. – 372 с. Лучшие результаты Ничего не найдено Дополнительные результаты Займы для корпораций: back to the Russia. Т. Мартынова, "Банковское обозрение", № 11, ноябрь 2007. BUSINESS PROCESS MANAGEMENT: система для руководителя. А. Крючкова, "Финансовая газета. Региональный выпуск", № 24, июнь 2005. Построение системы мотивации по технологии BUSINESS UNIT MANAGEMENT. В. Лунин, "Финансовая газета. Региональный выпуск", № 16, апрель 2005. Business performance management: источники эффективности. О. Духонина, П. Горянский, "Финансовая газета. Региональный выпуск", № 20, май 2004. Health management: совершенствуем здоровый образ работы. С. Царенко, "Кадровик.ру", N 5, май 2012 г. Регулирование операций торгового финансирования: новые инициативы. интервью с Д. Шмандом, вице-председателем Банковской комиссии ICC по supply chain finance, главой подразделения Trade Finance and Cash Management Corporates EMEA в Global Transaction Banking. GTB division Deutsche Bank. Н. Макарова, "Международные банковские операции", N 2, апрель-июнь 2012 г. Lifestyle management и консьерж-сервис. А.И. Гусев, "Банковский ритейл", N 1, I квартал 2012 г. Ошибки при формировании и развитии бизнеса private banking & wealth management. А.В. Александров, "Банковский ритейл", N 1, I квартал 2012 г. О качестве сервиса, связанного с запросами на медицинскую информацию. Medical Information Service?. А. Беденков, "Ремедиум", № 1, январь 2012. Счет 97 - to be or not to be. Реквием. А.В. Анищенко, "Актуальные вопросы бухгалтерского учета и налогообложения", N 23, декабрь 2011 г. Business Intelligence и Business Performance Management: основные термины и концепции. Ю.В. Амириди, "Управление в кредитной организации", N 5, сентябрь-октябрь 2011 г. Взаимодействие блока private banking & wealth management с розничным бизнесом. А.В. Александров, "Банковский ритейл", N 3, III квартал 2011 г. Зомбирование банков, или Too-big-to-fail problem. Г.Б. Петров, "Управление в кредитной организации", N 2, март-апрель 2011 г. Сегментация клиентов в бизнесе private banking & wealth management. Н.В. Чумак, "Банковский ритейл", N 1, I квартал 2011 г. Мотивируйте людей на работу, а не на преданность. интервью с Д. Кленовым, партнером UFG Wealth Management. "Управление персоналом", N 14, июль 2010 г. Business performance management: современный взгляд. Д. Исаев, "Финансовая газета", № 10, 11, март 2009. Директора заблудились между governance и management. А. Верников, "Банковское обозрение", № 8, август 2008. Отечественный private banking продолжает эволюционировать в сторону private wealth management. А.И. Гусев, "Инвестиционный банкинг", № 3, III квартал 2008. Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Диана, 24.10 Защитилась на 4. Спасибо большое!!)