Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. John Graves. Management Roadmap to Information Security (Kentis Management Roadmaps). – М.: , 0. – 0 с.

Дополнительные результаты

  1. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с.
  2. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  3. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с.
  4. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с.
  5. R. Kelly, Jr. Rainer. Introduction to Information Systems. – М.: , 2012. – 480 с.
  6. Sam Henderson. SMSF DIY Guide: Everything you need to successfully set up and run your own Self Managed Superannuation Fund. – М.: , 2012. – 272 с.
  7. David F. Teitelbaum. The Procrastinator's Guide to Financial Security: How Anyone Over 40 Can Still Build a Strong Portfolio--and Retire Comfortably. – М.: , 0. – 0 с.
  8. Aschalew Tigabu. Factors contributing to improved drinking water source management: A case study from Ethiopia. – М.: , 2012. – 64 с.
  9. Risk Management, Speculation, and Derivative Securities. – М.: , 0. – 0 с.
  10. David S. Katz, Ilan Caspi, David S. Katz, Ilan Caspi. Executive's Guide to Personal Security. – М.: , 0. – 0 с.
  11. Bernd Stahl. Responsible Management of Information Systems. – М.: , 0. – 0 с.
  12. Gerald Kovacich. The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition. – М.: , 0. – 0 с.
  13. Lynda M Applegate, Robert D. Austin, F. Warren McFarlan, Lynda Applegate, Robert Austin, F. Warren McFarlan. Corporate Information Strategy and Management: Text and Cases. – М.: , 0. – 0 с.
  14. Barbara C. McNurlin, Ralph H. Sprague. Information Systems Management in Practice (5th Edition). – М.: , 0. – 0 с.
  15. Lisa Davis. Shortcuts for Smart Managers: Checklists, Worksheets, and Action Plans for Managers With No Time to Waste. – М.: , 0. – 0 с.
  16. Asset Protection and Security Management Handbook. – М.: , 0. – 0 с.
  17. Security Operations Management. – М.: , 0. – 0 с.
  18. Protecting Business Information : A Manager's Guide. – М.: , 0. – 0 с.
  19. Jon C. Piot, John Baschab. The Executive's Guide to Information Technology. – М.: , 0. – 0 с.
  20. Michael J. Earl, Oxford Institute of Information Management, Pa Consulting Group. Information Management: The Organizational Dimension. – М.: , 0. – 0 с.
  21. Charles J. Austin, Stuart B. Boxerman. Information Systems for Healthcare Management, Sixth Edition. – М.: , 0. – 0 с.
  22. Mark B. Desman. Building an Information Security Awareness Program. – М.: , 0. – 0 с.
  23. James A. O'Brien. Introduction to Information Systems with MISource v.2 and PowerWeb. – М.: , 0. – 0 с.
  24. Gerald L. Kovacich, Edward P. Halibozek. The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, First Edition. – М.: , 0. – 0 с.
  25. Thomas J. Parenty. Digital Defense: What You Should Know About Protecting Your Company's Assets. – М.: , 0. – 0 с.
  26. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с.
  27. Marko Nordquist. Towards Improved Security Management Practice: Designing an Organizational Model Procedure for the Implementation of Information Security Management in Heterogeneous Information Management. – М.: , 0. – 0 с.
  28. John Graves. Management Roadmap to Information Security (Kentis Management Roadmaps). – М.: , 0. – 0 с.
  29. Mary Pat McCarthy, Stuart Campbell. Security Transformation: Digital Defense Strategies to Protect your Company's Reputation and Market Share. – М.: , 0. – 0 с.
  30. Steve Purser. A Practical Guide to Managing Information Security (Artech House Technology Management Library). – М.: , 0. – 0 с.
  31. Encyclopedia of Security Management : Techniques and technology. – М.: , 0. – 0 с.
  32. Anita Cassidy. A Practical Guide to Information Systems Strategic Planning. – М.: Saint Lucie Press, 0. – 304 с.
  33. HAROLD L. LUSTIG. 4 Steps to Financial Security for Lesbian and Gay Couples. – М.: , 0. – 0 с.
  34. Marian Quigley, Marian Quiqley. Information Security and Ethics: Social and Organizational Issues. – М.: , 0. – 0 с.
  35. C. Warren Axelrod, Axelrod. Outsourcing Information Security. – М.: , 0. – 0 с.
  36. Harold F. Tipton, Micki Krause, Micki, Cissp Krause. Information Security Management Handbook, Fifth Edition. – М.: , 0. – 0 с.
  37. Bernd Carsten Stahl. Responsible Management of Information Systems. – М.: , 0. – 0 с.
  38. Thomas Peltier, Thomas Pelitier, Justin Peltier, John A. Blackley, Peltier, Associates. Information Security Fundamentals. – М.: , 0. – 0 с.
  39. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с.
  40. Econometrics Informing Natural Resources Management: Selected Empirical Analyses (New Horizons in Environmental Economics). – М.: , 2005. – 0 с.
  41. Barbara C. McNurlin. Information Systems Management in Practice (7th Edition). – М.: , 2005. – 0 с.
  42. Keri E. Pearlson. Managing and Using Information Systems. – М.: , 2005. – 0 с.
  43. Economics of Information Security (Advances in Information Security). – М.: , 2004. – 0 с.
  44. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с.
  45. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с.
  46. Jae K. Shim. The Vest Pocket Guide to Information Technology. – М.: , 2005. – 0 с.
  47. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с.
  48. Ira Winkler. Zen and the Art of Information Security. – М.: , 2007. – 192 с.
  49. Timothy P. Layton. Information Security. – М.: , 2006. – 222 с.
  50. Michael E. Whitman, Herbert J. Mattord. Principles of Information Security, Second Edition. – М.: , 2004. – 600 с.
  51. Jeffrey M. Stanton, Kathryn R. Stam. The Visible Employee: Using Workplace Monitoring and Surveillance to Protect Information Assets-Without Compromising Employee Privacy or Trust. – М.: , 2006. – 272 с.
  52. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с.
  53. Patrick Traynor, Patrick McDaniel, Thomas La Porta. Security for Telecommunications Networks (Advances in Information Security). – М.: , 2008. – 182 с.
  54. Alan Calder, Steve Watkins. IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002. – М.: , 2008. – 384 с.
  55. Social and Human Elements of Information Security: Emerging Trends and Countermeasures (Premier Reference Source). – М.: , 2008. – 412 с.
  56. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с.
  57. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с.
  58. Jane Bullock, George Haddow, Damon P. Coppola, Sarp Yeletaysi. Introduction to Homeland Security, Third Edition: Principles of All-Hazards Response (Butterworth-Heinemann Homeland Security). – М.: , 2008. – 616 с.
  59. Gerard Blokdijk, Ivanka Menken. Information Security Management Best Practice Workbook: Implementation and Management Roadmap for Threats, Challenges and Solutions - Ready to use supporting documents bringing Theory into Practice. – М.: , 2008. – 124 с.
  60. Algorithmic Aspects in Information and Management: 4th International Conference, AAIM 2008, Shanghai, China, June 23-25, 2008, Proceedings (Lecture Notes in Computer Science). – М.: , 2008. – 350 с.
  61. W. Krag Brotby. Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement. – М.: Auerbach Publications, 2009. – 200 с.
  62. Julian Talbot, Miles Jakeman. Security Risk Management Body of Knowledge (Wiley Series in Systems Engineering and Management). – М.: , 2009. – 445 с.
  63. Alan Calder. Information Security based on ISO 27001/ISO 27002: A Management Guide. – М.: , 2009. – 83 с.
  64. Jake Kouns, Daniel Minoli. Information Technology Risk Management in Enterprise Environments: A Review of Industry Practices and a Practical Guide to Risk Management Teams. – М.: , 2010. – 421 с.
  65. Bel G. Raggad. Information Security Management: Concepts and Practice. – М.: , 2010. – 871 с.
  66. Michael E. Whitman, Herbert J. Mattord. Management of Information Security. – М.: , 2010. – 592 с.
  67. Digital Business Security Development: Management Technologies. – М.: , 2010. – 318 с.
  68. Alan Calder, Steve G Watkins. Information Security Risk Management for ISO27001 / ISO27002. – М.: , 2010. – 198 с.
  69. Bernard Marr. The Intelligent Company: Five Steps to Success with Evidence-Based Management. – М.: , 2010. – 252 с.
  70. William Manning. CISM Certified Information Security Manager Certification Exam Preparation Course in a Book for Passing the CISM Exam - The How To Pass on Your First Try Certification Study Guide. – М.: , 2010. – 188 с.
  71. Evan Wheeler. Security Risk Management: Building an Information Security Risk Management Program from the Ground Up. – М.: , 2011. – 360 с.
  72. Editors Karl Maria Michael de Leeuw, Jan Bergstra. The History of Information Security: A Comprehensive Handbook. – М.: Elsevier Science, 2007. – 900 с.
  73. Global Perspectives In Information Security. – М.: , 2008. – 896 с.
  74. Mark Miller. The Hard Times Guide to Retirement Security. – М.: , 2010. – 224 с.
  75. John R. Vacca. Managing Information Security. – М.: , 2010. – 320 с.
  76. G. Manoilov. Elsevier's Dictionary of Information Security. – М.: , 2010. – 772 с.
  77. Francis T.S. Yu. Introduction to Information Optics. – М.: , 2010. – 734 с.
  78. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с.
  79. George L Stefanek. Information Security Best Practices. – М.: , 2010. – 160 с.
  80. Sari Greene. Sustainable Information Security. – М.: , 2010. – 400 с.
  81. John R. Vacca. Computer and Information Security Handbook. – М.: , 2010. – 928 с.
  82. R. Kelly Rainer. Introduction to Information Technology. – М.: , 2002. – 592 с.
  83. Clay Spinuzzi. Tracing Genres Through Organizations – A Sociocultural Approach to Information Design. – М.: , 2003. – 264 с.
  84. Mark Ungar. Policing Democracy – Overcoming Obstacles to Citizen Security in Latin America. – М.: , 2011. – 336 с.
  85. Mark Ungar. Policing Democracy – Overcoming Obstacles to Citizen Security in Latin America. – М.: , 2011. – 336 с.
  86. Karin M. Fierke. Critical Approaches to International Security. – М.: , 2007. – 288 с.
  87. Dona Wong. The Wall Street Journal Guide to Information Graphics – The Dos and Don?ts of Presenting Data, Facts and Figures. – М.: , 2010. – 192 с.
  88. Viktor Mayer–schonberg. Governance and Information Technology – From Electronic Government to Information Government. – М.: , 2007. – 352 с.
  89. Viktor Mayer–schonberg. Governance and Information Technology – From Electronic Government to Information Government. – М.: , 2007. – 352 с.
  90. Using the Entertainment Media to Inform Student Affairs Practice. – М.: , 2004. – 128 с.
  91. Krag Brotby. Information Security Governance. – М.: , 2009. – 190 с.
  92. Arthur Young Technology Group. The Arthur Young Practical Guide to Information Engineering. – М.: , 1987. – 182 с.
  93. Jae K. Shim. The Vest Pocket Guide to Information Technology. – М.: , 2005. – 384 с.
  94. Dennis Pirages. From Resource Scarcity to Ecological Security – Exploring New Limits to Growth (OIP). – М.: , 2005. – 280 с.
  95. John Baschab. The Executive?s Guide to Information Technology. – М.: , 2007. – 672 с.
  96. Ronnie Lipton. The Practical Guide to Information Design. – М.: , 2007. – 272 с.
  97. Christine L Borgman. From Gutenberg to the Global Information Infrastructure – Access to Information in the Networked World. – М.: , 2003. – 344 с.
  98. Efraim Turban. (ALE)Introduction to Information Technology, Third Edition– Active Learning Edition. – М.: , 2004. – 502 с.
  99. Alfredo Cramerotti. Aesthetic Journalism – How to Inform Without Informing. – М.: , 2010. – 112 с.
  100. CCTA. Ccta: An Intro To Information Systems In Govt. – М.: , 1989. – 76 с.
  101. David S. Katz. Executive?s Guide to Personal Security. – М.: , 2003. – 288 с.
  102. R. Kelly Rainer. Introduction to Information Systems. – М.: , 2006. – 432 с.
  103. Dennis Pirages. From Resource Scarcity to Ecological Security – Exploring New Limits to Growth (OIP). – М.: , 2005. – 280 с.
  104. Christine Borgman. From Gutenburg to the Global Information Infrastructure – Access to Information in the Networked World. – М.: , 2000. – 350 с.
  105. Efraim Turban. Introduction to Information Technology. – М.: , 2004. – 544 с.
  106. Harold F. Tipton, Micki Krause. Information Security Management Handbook on CD-ROM, 2003 Edition. – М.: , . –  с.
  107. Arjun Mane and Karbhari Kale. Face Recognition Using Principal Component Analysis. – М.: LAP Lambert Academic Publishing, 2015. – 144 с.
  108. Rohana Mohamad Rashid. Determining Influencing Factors of Information Security Culture. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  109. Lorenzo Cozzella. Data and Information Security using Hylemetric Approach. – М.: LAP Lambert Academic Publishing, 2014. – 204 с.
  110. Gwen Mar. Freedom of Access to Information in Fiji. – М.: LAP Lambert Academic Publishing, 2010. – 112 с.
  111. Pankaj K.P. Shreyaskar. Transparency and Right to Information. – М.: LAP Lambert Academic Publishing, 2012. – 152 с.
  112. Olukemi Asemota. HIV/AIDS MANAGEMENT IN THE WORKPLACE: FOCUS ON SECURITY FORCES. – М.: LAP Lambert Academic Publishing, 2010. – 240 с.
  113. Kelly Barbara Schnare. Integrated Water Resource Management in a Developing Tropical Basin. – М.: LAP Lambert Academic Publishing, 2014. – 92 с.
  114. Cletus Kuunifaa. A case study of access to information perspectives. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  115. Ravishankar Mor. Right to information in India. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  116. Mobassera Kadery. Right to Information Act-2009 in Bangladesh: An Analysis. – М.: LAP Lambert Academic Publishing, 2011. – 148 с.
  117. Chetan Agrawal. Right to Information in India. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  118. Anuradha Parasar. RIGHT TO INFORMATION IN INDIA. – М.: LAP Lambert Academic Publishing, 2011. – 60 с.
  119. Alphonse Landry Nouck. The Right of Access to Information for Disabled people in South Africa. – М.: LAP Lambert Academic Publishing, 2014. – 192 с.
  120. Albert Wasef. Managing and Complementing PKI for Securing Vehicular Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2011. – 204 с.
  121. Shilpa Jaiswal and Sumeet Agrawal. Detection of Network Worm to Eliminate Security Threats in MANET. – М.: LAP Lambert Academic Publishing, 2012. – 52 с.
  122. Aliyu Muhammed Rabiu. Application of ICT to Information Resources Sharing. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.
  123. Yedji Mbangsoua and Dr. Freddie Acosta. Information Security and its Investment Justification. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  124. Yasser Alshehri. Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 156 с.
  125. Jasper Mogaka Masese and Samuel Macharia Were. Introduction to Modern Concepts in Information Management. – М.: LAP Lambert Academic Publishing, 2014. – 116 с.
  126. Dr. Gershon Adzadi and Hon. Ishamael Aryeetey. Principles of Applied Database Management System for Health Sector. – М.: LAP Lambert Academic Publishing, 2010. – 132 с.
  127. Julien Shabani. Information Security for RFID Systems. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.
  128. Debasish Jena. On Protocols for Information Security Services. – М.: LAP Lambert Academic Publishing, 2011. – 136 с.
  129. Aliyu Onipede. Biometrics as a tool for Information Security in Aviation industry. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  130. Furhan Mehmood and Rajia Rafique. Information Security in Financial Organizations. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  131. Omar Zakaria. Information Security Culture. – М.: LAP Lambert Academic Publishing, 2013. – 248 с.
  132. Saeed Soltanmohammadi. Improving Information System Security by Evaluating Human Factors. – М.: LAP Lambert Academic Publishing, 2014. – 116 с.
  133. frankie tvrz and marijke coetzee. Information Security of a Bluetooth-enabled handheld device. – М.: LAP Lambert Academic Publishing, 2010. – 180 с.
  134. Ahmed AlNunu. How Much Information Security?. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  135. Jeffy Mwakalinga. A Framework for Adaptive Information Security Systems. – М.: LAP Lambert Academic Publishing, 2011. – 364 с.
  136. Meysam Namayandeh. Development of Computer Ethical Framework for Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 132 с.
  137. Muhammad Imran Tariq. SLA based Information Security Metrics in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2014. – 192 с.
  138. Alaa Al-Deen Mohammed Hassan. Information Security Management. – М.: LAP Lambert Academic Publishing, 2013. – 188 с.
  139. Jun Zheng,Jiantao Gu and Hong Wang. Financial Management and Information Security of Independent Colleges. – М.: LAP Lambert Academic Publishing, 2014. – 256 с.
  140. Ying Qian. Mitigating Information Security Risks during Operation Transition. – М.: LAP Lambert Academic Publishing, 2012. – 372 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Займы для корпораций: back to the Russia. Т. Мартынова, "Банковское обозрение", № 11, ноябрь 2007.
  2. BUSINESS PROCESS MANAGEMENT: система для руководителя. А. Крючкова, "Финансовая газета. Региональный выпуск", № 24, июнь 2005.
  3. Построение системы мотивации по технологии BUSINESS UNIT MANAGEMENT. В. Лунин, "Финансовая газета. Региональный выпуск", № 16, апрель 2005.
  4. Business performance management: источники эффективности. О. Духонина, П. Горянский, "Финансовая газета. Региональный выпуск", № 20, май 2004.
  5. Health management: совершенствуем здоровый образ работы. С. Царенко, "Кадровик.ру", N 5, май 2012 г.
  6. Регулирование операций торгового финансирования: новые инициативы. интервью с Д. Шмандом, вице-председателем Банковской комиссии ICC по supply chain finance, главой подразделения Trade Finance and Cash Management Corporates EMEA в Global Transaction Banking. GTB division Deutsche Bank. Н. Макарова, "Международные банковские операции", N 2, апрель-июнь 2012 г.
  7. Lifestyle management и консьерж-сервис. А.И. Гусев, "Банковский ритейл", N 1, I квартал 2012 г.
  8. Ошибки при формировании и развитии бизнеса private banking & wealth management. А.В. Александров, "Банковский ритейл", N 1, I квартал 2012 г.
  9. О качестве сервиса, связанного с запросами на медицинскую информацию. Medical Information Service?. А. Беденков, "Ремедиум", № 1, январь 2012.
  10. Счет 97 - to be or not to be. Реквием. А.В. Анищенко, "Актуальные вопросы бухгалтерского учета и налогообложения", N 23, декабрь 2011 г.
  11. Business Intelligence и Business Performance Management: основные термины и концепции. Ю.В. Амириди, "Управление в кредитной организации", N 5, сентябрь-октябрь 2011 г.
  12. Взаимодействие блока private banking & wealth management с розничным бизнесом. А.В. Александров, "Банковский ритейл", N 3, III квартал 2011 г.
  13. Зомбирование банков, или Too-big-to-fail problem. Г.Б. Петров, "Управление в кредитной организации", N 2, март-апрель 2011 г.
  14. Сегментация клиентов в бизнесе private banking & wealth management. Н.В.  Чумак, "Банковский ритейл", N 1, I квартал 2011 г.
  15. Мотивируйте людей на работу, а не на преданность. интервью с Д.  Кленовым, партнером UFG Wealth Management. "Управление персоналом", N 14, июль 2010 г.
  16. Business performance management: современный взгляд. Д. Исаев, "Финансовая газета", № 10, 11, март 2009.
  17. Директора заблудились между governance и management. А. Верников, "Банковское обозрение", № 8, август 2008.
  18. Отечественный private banking продолжает эволюционировать в сторону private wealth management. А.И. Гусев, "Инвестиционный банкинг", № 3, III квартал 2008.

Образцы работ

Тема и предметТип и объем работы
Основы избирательных компаний
PR
Диплом
72 стр.
Public relations в политике как особый «срез» общественных отношений
PR
Курсовая работа
35 стр.
Последствия операции НАТО
Политология
Диплом
80 стр.
Привлекательности труда в организации
Психология
Курсовая работа
35 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Диана, 24.10
Защитилась на 4. Спасибо большое!!)