Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с. Business Process Management Workshops: BPM 2011 International Workshops, Clermont-Ferrand, France, August 29, 2011, Revised Selected Papers, Part II (Lecture Notes in Business Information Processing). – М.: , 2012. – 541 с. Business Process Management Workshops: BPM 2011 International Workshops, Clermont-Ferrand, France, August 29, 2011, Revised Selected Papers, Part I (Lecture Notes in Business Information Processing). – М.: , 2012. – 543 с. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с. Alexander Otgaar, Erik Braun, Leo van den Berg. Urban Management and Economics. – М.: , 2012. – 256 с. Natural Resources - Technology, Economics & Policy. – М.: , 2012. – 500 с. Managing Technology in the Operations Function (Securities Institute Global Capital Markets Series). – М.: , 0. – 0 с. Marilyn R. Seymann. Managing the New Bank Technology: An Executive Blueprint for the Future (Glenlake Business Monographs). – М.: , 0. – 0 с. Jack J. Champlain. Auditing Information Systems. – М.: , 0. – 0 с. Mario Piattini. Auditing Information Systems. – М.: , 0. – 0 с. Timothy F. Carse, Jeffrey Slater. The Payroll Toolkit Nuts and Bolts Techniques to Help You Better Understand and Manage Your Payroll (Revised Second Edition). – М.: , 0. – 0 с. Jie Lu, Lakhmi C Jain, Guangquan Zhang. Handbook on Decision Making: Vol 2: Risk Management in Decision Making (Intelligent Systems Reference Library). – М.: , 2012. – 472 с. Robert Muksian. Mathematics of Interest Rates, Insurance, Social Security, and Pensions. – М.: , 0. – 0 с. Irvin H. Perline, Jona Goldschmidt. The Psychology and Law of Workplace Violence: A Handbook for Mental Health Professionals and Employers. – М.: C.C. Thomas, 2003. – 500 с. Ulric J., Jr. Gelinas, Steve G. Sutton, Jane Fedorowicz. Business Processes and Information Technology. – М.: , 0. – 0 с. Asset Protection and Security Management Handbook. – М.: , 0. – 0 с. Alexis Gutzman. Unforeseen Circumstances : Strategies and Technologies for Protecting Your Business and Your People in a Less Secure World. – М.: , 0. – 0 с. Protecting Business Information : A Manager's Guide. – М.: , 0. – 0 с. Ron Schneiderman. The Mobile Technology Question and Answer Book: A Survival Guide for Business Managers. – М.: , 0. – 0 с. Handbook of Management Information Systems. – М.: , 0. – 0 с. Information Warfare : corporate attack and defence in a digital world (Computer Weekly Professional (Paperback)). – М.: , 0. – 0 с. Philip P. Purpura. The Security Handbook. – М.: , 0. – 0 с. Vadim Volkov. Violent Entrepreneurs: The Use of Force in the Making of Russian Capitalism. – М.: , 0. – 0 с. M. J. Wilson, B. Maliszewska-Kordybach. Soil Quality, Sustainable Agriculture and Environmental Security in Central and Eastern Europe (NATO Science Series. 2, Environmental Security). – М.: , 0. – 0 с. Gregory V. Kitter. Investment Mathematics for Finance & Treasury Professionals: A Practical Approach. – М.: , 0. – 0 с. Gordon J. Alexander, William F. Sharpe, Jeffery V. Bailey. Fundamentals of Investments. – М.: Prentice Hall, 2000. – 782 с. Jordan E. Goodman. Reading between the Lies : How to detect fraud and avoid becoming a victom of Wall Street's next scandal. – М.: , 0. – 0 с. Max Boisot. Knowledge Assets: Securing Competitive Advantage in the Information Economy. – М.: , 0. – 0 с. Handbook of Loss Prevention and Crime Prevention, Fourth Edition. – М.: , 0. – 0 с. Charles J. Austin, Stuart B. Boxerman. Information Systems for Healthcare Management, Sixth Edition. – М.: , 0. – 0 с. Max H. Boisot. Knowledge Assets: Securing Competitive Advantage in the Information Economy. – М.: , 0. – 0 с. Gerald L. Kovacich, Edward P. Halibozek. The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, First Edition. – М.: , 0. – 0 с. Socially Responsible IT Management. – М.: , 0. – 0 с. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с. Theo J. W. Renkema. The IT Value Quest: How to Capture the Business Value of IT-Based Infrastructure. – М.: , 0. – 0 с. Ifip Tc11 Wg11.5 Working Conference on Integrity and Internal Control, Michael Gertz. Integrity and Internal Control in Information Systems V: Ifip Tc11/Wg11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (Iicis), November 11-12, 2002, Bonn, Germany (International Federation for Information Processing. – М.: , 0. – 0 с. Marko Nordquist. Towards Improved Security Management Practice: Designing an Organizational Model Procedure for the Implementation of Information Security Management in Heterogeneous Information Management. – М.: , 0. – 0 с. Modern Information Systems for Managers. – М.: , 0. – 0 с. Mary Pat McCarthy, Stuart Campbell. Security Transformation: Digital Defense Strategies to Protect your Company's Reputation and Market Share. – М.: , 0. – 0 с. Steve Purser. A Practical Guide to Managing Information Security (Artech House Technology Management Library). – М.: , 0. – 0 с. Ultimate Financial Security Survey. – М.: , 0. – 0 с. Effective Security Management, Fourth Edition (Effective Security Management). – М.: , 0. – 0 с. Daniel Jennings, Joseph Boyce. Information Assurance. – М.: , 0. – 0 с. C. Warren Axelrod, Axelrod. Outsourcing Information Security. – М.: , 0. – 0 с. Harold F. Tipton, Micki Krause, Micki, Cissp Krause. Information Security Management Handbook, Fifth Edition. – М.: , 0. – 0 с. Ross Malaga. Information Systems Technology. – М.: , 0. – 0 с. Thomas Peltier, Thomas Pelitier, Justin Peltier, John A. Blackley, Peltier, Associates. Information Security Fundamentals. – М.: , 0. – 0 с. Charles Cresson Wood. Best Practices In Internet Commerce Security. – М.: , 0. – 0 с. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с. Barbara C. McNurlin. Information Systems Management in Practice (7th Edition). – М.: , 2005. – 0 с. The Secure Online Business: E-Commerce, It Functionality & Business Continuity. – М.: , 2003. – 0 с. Peter R., MBA Ramsaroop. Securing Business Intelligence: Knowledge and CyberSecurity in the Post 9/11 World. – М.: , 2004. – 0 с. Current Security Management & Ethical Issues of Information Technology. – М.: , 2003. – 0 с. Economics of Information Security (Advances in Information Security). – М.: , 2004. – 0 с. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с. Tom Negrino. Managing Your Personal Finances with Quicken : Visual QuickProject Guide (Visual Quickproject Series). – М.: , 2004. – 160 с. Larstan's The Black Book on Corporate Security (Black Book Series). – М.: , 2005. – 439 с. George Haddow, Jane Bullock. Introduction to Emergency Management, Second Edition (Butterworth-Heinemann Homeland Security). – М.: , 2005. – 424 с. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с. Jeffrey M. Stanton, Kathryn R. Stam. The Visible Employee: Using Workplace Monitoring and Surveillance to Protect Information Assets-Without Compromising Employee Privacy or Trust. – М.: , 2006. – 272 с. Mahesh S. Raisinghani. Handbook of Research on Global Information Technology Management in the Digital Economy. – М.: Information Science Reference, 2008. – 588 с. Michael E. Whitman, Herbert J. Mattord. Management Of Information Security, 2/E. – М.: , 2007. – 600 с. James Michael Stewart, Ed Tittel, Mike Chapple. CISSP: Certified Information Systems Security Professional Study Guide. – М.: , 2008. – 841 с. Keith D. Willett. Information Assurance Architecture. – М.: , 2008. – 624 с. Sustainable Use and Development of Watersheds (NATO Science for Peace and Security Series C: Environmental Security). – М.: , 2008. – 532 с. Alan Calder, Steve Watkins. IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002. – М.: , 2008. – 384 с. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с. Gerard Blokdijk, Ivanka Menken. Information Security Management Best Practice Workbook: Implementation and Management Roadmap for Threats, Challenges and Solutions - Ready to use supporting documents bringing Theory into Practice. – М.: , 2008. – 124 с. Ivanka Menken. Virtualization Architecture, Adoption and Monetization of Virtualization Projects using Best Practice Service Strategy, Service Design, Service Transition, ... and Continual Service Improvement Processes. – М.: , 2008. – 164 с. Brett Wilder. The Quiet Millionaire: Eliminate Financial Stress and Accumulate Wealth for a Lifetime of Security and Independence. – М.: , 2009. – 438 с. Hamid R. Nemati. Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues (Advances in Information Security and Privacy). – М.: , 2009. – 414 с. Alan Calder. Information Security based on ISO 27001/ISO 27002: A Management Guide. – М.: , 2009. – 83 с. Jake Kouns, Daniel Minoli. Information Technology Risk Management in Enterprise Environments: A Review of Industry Practices and a Practical Guide to Risk Management Teams. – М.: , 2010. – 421 с. Bel G. Raggad. Information Security Management: Concepts and Practice. – М.: , 2010. – 871 с. Michael E. Whitman, Herbert J. Mattord. Management of Information Security. – М.: , 2010. – 592 с. Sid Sirisukha. Protecting Management Information Systems: VPN Competitive Advantage. – М.: , 2010. – 316 с. RICHARD BATTE. Agricultural Information Systems Development: A Stakeholder Analysis Approach. – М.: , 2010. – 24 с. Alan Calder, Steve G Watkins. Information Security Risk Management for ISO27001 / ISO27002. – М.: , 2010. – 198 с. William Manning. CISM Certified Information Security Manager Certification Exam Preparation Course in a Book for Passing the CISM Exam - The How To Pass on Your First Try Certification Study Guide. – М.: , 2010. – 188 с. Evan Wheeler. Security Risk Management: Building an Information Security Risk Management Program from the Ground Up. – М.: , 2011. – 360 с. Geographic Information and Cartography for Risk and Crisis Management: Towards Better Solutions (Lecture Notes in Geoinformation and Cartography). – М.: , 2010. – 400 с. Brain-Inspired Information Technology (Studies in Computational Intelligence). – М.: , 2010. – 182 с. Tim Speed, Juanita Ellis. Internet Security: A Jumpstart for Systems Administrators and IT Managers. – М.: , . – с. Harold F. Tipton, Micki Krause. Information Security Management Handbook on CD-ROM, 2003 Edition. – М.: , . – с. Md. Abdul Quader Khan,Ahmad Tajul Islam and Montu Kumar Shikder. Soil management to improve HHs food security. – М.: LAP Lambert Academic Publishing, 2013. – 64 с. Humnath Bhandari. The economics of groundwater irrigation in rice-based systems in Nepal. – М.: LAP Lambert Academic Publishing, 2014. – 300 с. C. R. Prajapati,K. P. Singh and A. K. Gupta. Plant Disease Management for Food Security. – М.: LAP Lambert Academic Publishing, 2013. – 676 с. RICHARD BATTE. Agricultural Information Systems Development. – М.: LAP Lambert Academic Publishing, 2009. – 116 с. Girmaw Mitikie Geremew. The Management of Small Scale Irrigation Schemes. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Md. Altaf Hossain. Profile:Soil Conservation and Watershed Management Centre Bangladesh. – М.: LAP Lambert Academic Publishing, 2014. – 112 с. Olufemi Fawole,Joseph Fayeye and Kingsley Nwachukwu. Security Agency and The Control And Manangement Of Arms In Nigeria. – М.: LAP Lambert Academic Publishing, 2011. – 80 с. Pradeep Sadanand. Implementation of GSTRBAC using .NET framework. – М.: LAP Lambert Academic Publishing, 2012. – 56 с. Prathap Jonnadula and Naga Mani Darajula. Secure Group Communication. – М.: LAP Lambert Academic Publishing, 2012. – 64 с. Shanmugam Bharathy Dhivya. A Study of Foiling Vehicles from Sybil Attack Using Pseudonyms. – М.: LAP Lambert Academic Publishing, 2012. – 100 с. Yedji Mbangsoua and Dr. Freddie Acosta. Information Security and its Investment Justification. – М.: LAP Lambert Academic Publishing, 2011. – 132 с. Julien Shabani. Information Security for RFID Systems. – М.: LAP Lambert Academic Publishing, 2011. – 92 с. Debasish Jena. On Protocols for Information Security Services. – М.: LAP Lambert Academic Publishing, 2011. – 136 с. Aliyu Onipede. Biometrics as a tool for Information Security in Aviation industry. – М.: LAP Lambert Academic Publishing, 2012. – 88 с. Herbert Kayitale. The Online Management Information System for UNEB. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. James Francisco. Fingerprints in Place of Passwords. – М.: LAP Lambert Academic Publishing, 2012. – 156 с. Charles Ndekarisho Tarimo. ICT Security Readiness Checklist for Developing Countries. – М.: LAP Lambert Academic Publishing, 2010. – 280 с. Predrag Tasevski. Interactive Cyber Security Awareness Program. – М.: LAP Lambert Academic Publishing, 2012. – 184 с. G.M. Faysal Ahmad. Design and Implementation of a Common System for Office Digitization. – М.: LAP Lambert Academic Publishing, 2013. – 72 с. Josphat Kyalo. Management Structures. – М.: LAP Lambert Academic Publishing, 2013. – 88 с. Saeed Soltanmohammadi. Improving Information System Security by Evaluating Human Factors. – М.: LAP Lambert Academic Publishing, 2014. – 116 с. Ahmed AlNunu. How Much Information Security?. – М.: LAP Lambert Academic Publishing, 2010. – 68 с. Ubaid Hayee. A Six Sigma Approach to Assure IT Security. – М.: LAP Lambert Academic Publishing, 2011. – 64 с. Eric Amankwa. Assessment of Security Controls. – М.: LAP Lambert Academic Publishing, 2012. – 104 с. Amare Abawa. SYSTEMS ANALYSIS AND DESIGN:. – М.: LAP Lambert Academic Publishing, 2010. – 152 с. Sapana Lohani. Assessing Socio-Economic Services and Uses of Watershed. – М.: LAP Lambert Academic Publishing, 2012. – 128 с. Stepan Minarik. Financial Crisis as a Result of Risk Management Failure. – М.: LAP Lambert Academic Publishing, 2011. – 84 с. Vadim Tarasov. Economic Security: Case of Russia. – М.: LAP Lambert Academic Publishing, 2013. – 112 с. Zil A. Shah. Analysis of Data Recovery Awareness and Corporate Behavior. – М.: LAP Lambert Academic Publishing, 2012. – 96 с. Alaa Al-Deen Mohammed Hassan. Information Security Management. – М.: LAP Lambert Academic Publishing, 2013. – 188 с. Jun Zheng,Jiantao Gu and Hong Wang. Financial Management and Information Security of Independent Colleges. – М.: LAP Lambert Academic Publishing, 2014. – 256 с. Jan Fuka. Management of Crisis Situations in Company Using Game Theory. – М.: Scholars' Press, 2014. – 52 с. Nicholas Olekaikai. Resources And Well-being Of Communities In Marigat Division, Kenya. – М.: LAP Lambert Academic Publishing, 2014. – 220 с. Ying Qian. Mitigating Information Security Risks during Operation Transition. – М.: LAP Lambert Academic Publishing, 2012. – 372 с. Claudia-Georgeta Carstea. New approach about project management of complex information systems. – М.: LAP Lambert Academic Publishing, 2011. – 152 с. Ruthaychonnee Sittichai. Determining Factors for Academic Achievement and Attitude of Students. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Дополнительные результаты Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с. James E. Hunton, Stephanie M. Bryant, Nancy A. Bagranoff. Core Concepts of Information Technology Auditing. – М.: , 0. – 0 с. Martin Bennett, Jan Jaap Bouma, Teun Wolters. Environmental Management Accounting: Informational and Institutional Developments (Eco-Efficiency in Industry and Science, 9). – М.: , 0. – 0 с. Paul J. Jackson, Jos Van Der Wielen. Teleworking: International Perspectives : From Telecommuting to the Virtual Organization (The Management of Technology and Innovation). – М.: , 0. – 0 с. Edward Sherwood Meade. Trust Finance: A Study of the Genesis, Organization, and Management of Industrial Combinations. – М.: , 0. – 0 с. Ove Granstrand. The Economics and Management of Intellectual Property. – М.: , 0. – 0 с. David B. Lawrence. The Economic Value of Information. – М.: , 0. – 0 с. Bernd Stahl. Responsible Management of Information Systems. – М.: , 0. – 0 с. Gerald Kovacich. The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition. – М.: , 0. – 0 с. Lynda M Applegate, Robert D. Austin, F. Warren McFarlan, Lynda Applegate, Robert Austin, F. Warren McFarlan. Corporate Information Strategy and Management: Text and Cases. – М.: , 0. – 0 с. Barbara C. McNurlin, Ralph H. Sprague. Information Systems Management in Practice, Sixth Edition. – М.: , 0. – 0 с. Barbara C. McNurlin, Ralph H. Sprague. Information Systems Management in Practice (5th Edition). – М.: , 0. – 0 с. Eliezer Geisler, Ori Heller. Management of Medical Technology: Theory, Practice, and Cases (Management of Medical Technology). – М.: , 0. – 0 с. Steve Clarke, Elayne Coakes, M. Gordon Hunter, Andrew Wenn. Socio-Technical and Human Cognition Elements of Information Systems. – М.: , 0. – 0 с. Martin Bennett, Jan Jaap Bouma, Teun Wolters. Environmental Management Accounting: Informational and Institutional Developments (Eco-Efficiency in Industry and Science, V. 9). – М.: , 0. – 0 с. Committee on Prospects and Opportunities for Sustainable Management Of, National Research Council. Forested Landscapes in Perspective: Prospects and Opportunities for Sustainable Management of America's Nonfederal Forests (Agriculture). – М.: , 0. – 0 с. Michael J. Earl, Oxford Institute of Information Management, Pa Consulting Group. Information Management: The Organizational Dimension. – М.: , 0. – 0 с. Frederick Betz. Executive Strategy : Strategic Management and Information Technology. – М.: , 0. – 0 с. Mark B. Desman. Building an Information Security Awareness Program. – М.: , 0. – 0 с. Felix B., Ph.D. Tan. Global Perspective of Information Technology Management. – М.: , 0. – 0 с. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с. Edward J. Szewczak, Coral R. Snodgrass. Managing the Human Side of Information Technology: Challenges and Solutions. – М.: , 0. – 0 с. Jay Liebowitz. Information Technology Management: A Knowledge Repository. – М.: , 0. – 0 с. Marko Nordquist. Towards Improved Security Management Practice: Designing an Organizational Model Procedure for the Implementation of Information Security Management in Heterogeneous Information Management. – М.: , 0. – 0 с. Mehdi Khosrowpour. Success and Pitfalls of Information Technology (Cases on Information Technology Series). – М.: Idea Group Publishing, 1999. – 238 с. Edward Szewczak, Mehdi Khosrowpour. The Human Side of Information Technology Management (Series in Managing the Human Side of Information Technology). – М.: , 0. – 0 с. Steve Purser. A Practical Guide to Managing Information Security (Artech House Technology Management Library). – М.: , 0. – 0 с. Marian Quigley, Marian Quiqley. Information Security and Ethics: Social and Organizational Issues. – М.: , 0. – 0 с. Mehdi Khosrowpour. Effective Utilization and Management of Emerging Information Technologies: The 1998 Conference Proceedings in Boston Massachusettes. – М.: , 0. – 0 с. C. Warren Axelrod, Axelrod. Outsourcing Information Security. – М.: , 0. – 0 с. Harold F. Tipton, Micki Krause, Micki, Cissp Krause. Information Security Management Handbook, Fifth Edition. – М.: , 0. – 0 с. Jerry N. Luftman. Managing the Information Technology Resource: Leadership in the Information Age. – М.: , 0. – 0 с. Bernd Carsten Stahl. Responsible Management of Information Systems. – М.: , 0. – 0 с. Thomas Peltier, Thomas Pelitier, Justin Peltier, John A. Blackley, Peltier, Associates. Information Security Fundamentals. – М.: , 0. – 0 с. J.W. Stuth, B.G. Lyons. Decision Support Systems for the Management of Grazing Lands: Emerging Issues. – М.: , 0. – 0 с. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с. Dimitris N. Chorafas. The Management of Bond Investments and Trading of Debt. – М.: , 2005. – 0 с. E.D. Solojentsev. Scenario Logic and Probabilistic Management of Risk in Business and Engineering (Applied Optimization). – М.: , 2004. – 0 с. Frank Bannister. Purchasing and Financial Management of Information Technology : A practical guide (Computer Weekly Professional). – М.: , 2003. – 0 с. Barbara C. McNurlin. Information Systems Management in Practice (7th Edition). – М.: , 2005. – 0 с. Managing Corporate Information Systems Evolution and Maintenance. – М.: , 2004. – 0 с. Anthony D. Manley. The Retail Loss Prevention Officer: The Law and the Fundamental Elements of Retail Security. – М.: , 2003. – 0 с. Economics of Information Security (Advances in Information Security). – М.: , 2004. – 0 с. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с. Lakshmi Bhaskaran. Size Matters: Successful Graphic Design for Large Amounts of Information. – М.: , 2004. – 0 с. Margi Levy. Strategies for Growth in SMEs, First Edition : The Role of Information and Information Sytems. – М.: , 2004. – 0 с. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с. Mervat Abdelhak, Sara Grostick, Mary Alice Hanken, Ellen B. Jacobs. Health Information: Management of a Strategic Resource. – М.: , 2007. – 784 с. Dan Remenyi, Arthur Money, Frank Bannister. The Effective Measurement and Management of ICT Costs and Benefits. – М.: CIMA Publishing, 2007. – 408 с. Ralph Stair, George Reynolds. Fundamentals of Information Systems. – М.: Course Technology, 2007. – 488 с. Ira Winkler. Zen and the Art of Information Security. – М.: , 2007. – 192 с. Timothy P. Layton. Information Security. – М.: , 2006. – 222 с. Michael Khairallah. Physical Security Systems Handbook: The Design and Implementation of Electronic Security Systems. – М.: , 2005. – 312 с. Michael E. Whitman, Herbert J. Mattord. Principles of Information Security, Second Edition. – М.: , 2004. – 600 с. Michael E. Whitman, Herbert J. Mattord. Management Of Information Security, 2/E. – М.: , 2007. – 600 с. Estelle James, Alejandra Cox Edwards, Rebeca Wong. The Gender Impact of Social Security Reform. – М.: , 2008. – 216 с. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с. Global Information Systems: The Implications of Culture for IS Managment. – М.: , 2008. – 496 с. Lloyd's MIU Handbook of Maritime Security. – М.: , 2008. – 400 с. Major Currents in Information Systems (SAGE Library in Business and Management). – М.: , 2008. – 2424 с. Encyclopedia of Information Communication Technology. – М.: , 2008. – 926 с. Social and Human Elements of Information Security: Emerging Trends and Countermeasures (Premier Reference Source). – М.: , 2008. – 412 с. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с. Gerard Blokdijk, Ivanka Menken. Information Security Management Best Practice Workbook: Implementation and Management Roadmap for Threats, Challenges and Solutions - Ready to use supporting documents bringing Theory into Practice. – М.: , 2008. – 124 с. T.R. Ramanathan. The Role of Organisational Change Management in Offshore Outsourcing of Information Technology Services: Qualitative Case Studies from a Multinational Pharmaceutical Company. – М.: , 2009. – 188 с. W. Krag Brotby. Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement. – М.: Auerbach Publications, 2009. – 200 с. Alan Calder. Information Security based on ISO 27001/ISO 27002: A Management Guide. – М.: , 2009. – 83 с. Bel G. Raggad. Information Security Management: Concepts and Practice. – М.: , 2010. – 871 с. Michael E. Whitman, Herbert J. Mattord. Management of Information Security. – М.: , 2010. – 592 с. Alan Calder, Steve G Watkins. Information Security Risk Management for ISO27001 / ISO27002. – М.: , 2010. – 198 с. Justin Chamblee CPA MAcc, Max Reiboldt CPA. Financial Management of the Veterinary Practice. – М.: , 2010. – 136 с. William Manning. CISM Certified Information Security Manager Certification Exam Preparation Course in a Book for Passing the CISM Exam - The How To Pass on Your First Try Certification Study Guide. – М.: , 2010. – 188 с. Segomotso Masegonyana Keakopa. Management of electronic records: Opportunities and challenges for Botswana, Namibia and South Africa. – М.: , 2010. – 352 с. Frank Bannister. Purchasing and Financial Management of Information Technology. – М.: , 2010. – 384 с. Evan Wheeler. Security Risk Management: Building an Information Security Risk Management Program from the Ground Up. – М.: , 2011. – 360 с. Editors Karl Maria Michael de Leeuw, Jan Bergstra. The History of Information Security: A Comprehensive Handbook. – М.: Elsevier Science, 2007. – 900 с. Girmay Aragaw. Pathogen Spectrum and Management of Banana Crown Rot in Ethiopia: Importance of Crown Rot of Banana (Musa spp.) in Ethiopia. – М.: , 2012. – 100 с. Edward B. Diethrich, Venkatesh Ramaiah, Jacques Kpodonu, Julio A. Rodriguez-Lopez. Endovascular Hybrid Management of the Thoracic Aorta: A Case-based Approach. – М.: , 2008. – 320 с. Management of Heart Failure - Volume 2: Surgical. – М.: , 2008. – 346 с. Management of Heart Failure. – М.: , 2008. – 358 с. Handbook of Information and Communication Security. – М.: , 2010. – 800 с. Salah M. Abdel–aleem. The Design and Management of Medical Device Clinical Trials. – М.: , 2010. – 250 с. John R. Vacca. Managing Information Security. – М.: , 2010. – 320 с. G. Manoilov. Elsevier's Dictionary of Information Security. – М.: , 2010. – 772 с. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с. Paul Robinson. Dictionary of International Security. – М.: , 2007. – 208 с. Advances in the Valuation and Management of Mortgage–Backed Securities. – М.: , 1999. – 318 с. Edited by Thach N. Nguyen, Dayi Hu, Moo-Hyun Kim, Cindy L. Grines. Management of Complex Cardiovascular Problems: The Evidence-Based Medicine Approach. – М.: Blackwell Publishers, Futura Publishing Company, Inc, New York, 2007. – 464 с. T DALER. Daler: Security Of ?information? & Data. – М.: , 1988. – 134 с. B CONOLLY. Conolly: ?information? Mechanics–transformation Of Information In Management Command Etc. – М.: , 1988. – 176 с. Principles Of Computer Security, Comptia Security+ And Beyond, Second Edition. – М.: , 2011. – 0 с. 24 Deadly Sins Of Software Security: Programming Flaws And How To Fix Them. – М.: , 2011. – 432 с. Fundamentals Of Network Security. – М.: , 2011. – 672 с. Managing Financial Information. – М.: , 2011. – 224 с. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . – с. Harold F. Tipton, Micki Krause. Information Security Management Handbook on CD-ROM, 2003 Edition. – М.: , . – с. Rohana Mohamad Rashid. Determining Influencing Factors of Information Security Culture. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Nitin Kanzariya and Ashish Nimavat. Security of Digital Image Using Hybrid Steganography. – М.: LAP Lambert Academic Publishing, 2013. – 84 с. Zabibu Idrisa. Coverage of Social Security Schemes. – М.: LAP Lambert Academic Publishing, 2012. – 132 с. Rhea Lyn Dealca. Towards an Improved Management of Government Lands in the Philippines. – М.: LAP Lambert Academic Publishing, 2010. – 176 с. Hanumant Waghmare. Utilization of Social Security Programmes in India. – М.: LAP Lambert Academic Publishing, 2013. – 104 с. Santosh Kadam and Gajanan Khiste. Financial Management of College Libraries. – М.: LAP Lambert Academic Publishing, 2014. – 84 с. Md. Abul Kalam Siddike and S. M. Mannan. Use of Information and Communication Technology (ICT). – М.: LAP Lambert Academic Publishing, 2011. – 180 с. Girmay Aragaw. Pathogen Spectrum and Management of Banana Crown Rot in Ethiopia. – М.: LAP Lambert Academic Publishing, 2012. – 100 с. Bhagirath Singh Chauhan. Ecology and management of weeds in no-till in southern Australia. – М.: LAP Lambert Academic Publishing, 2011. – 248 с. Pandian Valarmathi and G. Chandrasekar. Management of Grapes Downy Mildew - A Devastating Disease. – М.: LAP Lambert Academic Publishing, 2013. – 60 с. Prashant S. Umbarkar and G. J. Parsana. Bio-Ecology And Management Of Pod Borer Complex Of Greengram. – М.: LAP Lambert Academic Publishing, 2013. – 108 с. Amin Mohammed. Integrated Management of Common Bean Anthracnose. – М.: LAP Lambert Academic Publishing, 2014. – 112 с. Eric Kiplangat Ng'eno. Analysis Of Information Systems Case study in Bomet County, Kenya. – М.: LAP Lambert Academic Publishing, 2014. – 104 с. Jack M. Wasike. Management Of Fusarium Wilt Of Purple Passion Fruits. – М.: LAP Lambert Academic Publishing, 2013. – 88 с. C. R. Prajapati,K. P. Singh and A. K. Gupta. Plant Disease Management for Food Security. – М.: LAP Lambert Academic Publishing, 2013. – 676 с. Dauda Kola Abdulkadir. Materials for Improving the Management of Irrigated Agriculture. – М.: LAP Lambert Academic Publishing, 2015. – 140 с. Ashraf Khan and A.P. Sinha. Biological Management of Rice Sheath Blight. – М.: LAP Lambert Academic Publishing, 2013. – 132 с. Pavani Thatikonda and Uma Maheswari Telugu. Management of pink borer, Sesamia inferens Walker on maize. – М.: LAP Lambert Academic Publishing, 2013. – 84 с. Navin Chandra Nainwal and Kanchan Nainwal. Post Harvest Management of Litchi for Marketing and Export. – М.: LAP Lambert Academic Publishing, 2014. – 120 с. Girmaw Mitikie Geremew. The Management of Small Scale Irrigation Schemes. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Bruce Rukundo. Conservation and Management of River Catchments. – М.: LAP Lambert Academic Publishing, 2010. – 144 с. Suroj Pokhrel. Feeding management of honeybee colonies in Chitwan Nepal. – М.: LAP Lambert Academic Publishing, 2012. – 92 с. Godfrey Onyango and Francis Wegulo. Research Findings and Sustainable Management of Lake Naivasha Kenya. – М.: LAP Lambert Academic Publishing, 2012. – 92 с. Kalpana Calatharan. Social-ecological resilience and management of coastal ecosystem. – М.: LAP Lambert Academic Publishing, 2010. – 92 с. Girish K. S. and Kemparaju K. Hyaluronidase, a potential target for the management of snakebite. – М.: LAP Lambert Academic Publishing, 2013. – 168 с. V. Ramanarayana Reddy,G. Nagarjuna Reddy and T. V. Narayana. Impact of pharmacist in the management of coronary artery disease. – М.: LAP Lambert Academic Publishing, 2012. – 92 с. Anastacia Kariuki. Nutritional Management of Obesity, Diabetes and Hypertension. – М.: LAP Lambert Academic Publishing, 2011. – 64 с. Yedji Mbangsoua and Dr. Freddie Acosta. Information Security and its Investment Justification. – М.: LAP Lambert Academic Publishing, 2011. – 132 с. Julien Shabani. Information Security for RFID Systems. – М.: LAP Lambert Academic Publishing, 2011. – 92 с. Debasish Jena. On Protocols for Information Security Services. – М.: LAP Lambert Academic Publishing, 2011. – 136 с. frankie tvrz and marijke coetzee. Information Security of a Bluetooth-enabled handheld device. – М.: LAP Lambert Academic Publishing, 2010. – 180 с. Ahmed AlNunu. How Much Information Security?. – М.: LAP Lambert Academic Publishing, 2010. – 68 с. Meysam Namayandeh. Development of Computer Ethical Framework for Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 132 с. Dhara Dave and Brahmdutta Raval. Implementation of Information Technology in Pharmaceutical Management. – М.: LAP Lambert Academic Publishing, 2014. – 92 с. Alaa Al-Deen Mohammed Hassan. Information Security Management. – М.: LAP Lambert Academic Publishing, 2013. – 188 с. Jun Zheng,Jiantao Gu and Hong Wang. Financial Management and Information Security of Independent Colleges. – М.: LAP Lambert Academic Publishing, 2014. – 256 с. Ying Qian. Mitigating Information Security Risks during Operation Transition. – М.: LAP Lambert Academic Publishing, 2012. – 372 с. Claudia-Georgeta Carstea. New approach about project management of complex information systems. – М.: LAP Lambert Academic Publishing, 2011. – 152 с. Leo Nvida Davidson Woode and Emmanuel Adjei. Freedom of information : implications for records management in Ghana. – М.: LAP Lambert Academic Publishing, 2011. – 144 с. Лучшие результаты Ничего не найдено Дополнительные результаты Наука человековедения. интервью с Д. Уолтоном, профессором London Metropolitan University, экспертом CIPD. Chartered Institute of Personnel and Development, автором программы Master of Arts in Human Resource Strategies. И. Смирнова, "Кадровый менеджмент", № 5, июль-август 2007. Партнерство вместо подчинения. интервью с Дезо Хорватом, деканом Schulich School of Business. Р. Крецул, "Кадровый менеджмент", № 1, февраль 2006. BUSINESS PROCESS MANAGEMENT: система для руководителя. А. Крючкова, "Финансовая газета. Региональный выпуск", № 24, июнь 2005. Построение системы мотивации по технологии BUSINESS UNIT MANAGEMENT. В. Лунин, "Финансовая газета. Региональный выпуск", № 16, апрель 2005. Business performance management: источники эффективности. О. Духонина, П. Горянский, "Финансовая газета. Региональный выпуск", № 20, май 2004. Медицинская информатика в Web of Science: доля России в мировом публикационном потоке. Н.Г. Куракова, Л.А. Цветкова, "Врач и информационные технологии", № 4, июль-август 2012. Health management: совершенствуем здоровый образ работы. С. Царенко, "Кадровик.ру", N 5, май 2012 г. Регулирование операций торгового финансирования: новые инициативы. интервью с Д. Шмандом, вице-председателем Банковской комиссии ICC по supply chain finance, главой подразделения Trade Finance and Cash Management Corporates EMEA в Global Transaction Banking. GTB division Deutsche Bank. Н. Макарова, "Международные банковские операции", N 2, апрель-июнь 2012 г. Lifestyle management и консьерж-сервис. А.И. Гусев, "Банковский ритейл", N 1, I квартал 2012 г. Ошибки при формировании и развитии бизнеса private banking & wealth management. А.В. Александров, "Банковский ритейл", N 1, I квартал 2012 г. О качестве сервиса, связанного с запросами на медицинскую информацию. Medical Information Service?. А. Беденков, "Ремедиум", № 1, январь 2012. Business Intelligence и Business Performance Management: основные термины и концепции. Ю.В. Амириди, "Управление в кредитной организации", N 5, сентябрь-октябрь 2011 г. Взаимодействие блока private banking & wealth management с розничным бизнесом. А.В. Александров, "Банковский ритейл", N 3, III квартал 2011 г. Сегментация клиентов в бизнесе private banking & wealth management. Н.В. Чумак, "Банковский ритейл", N 1, I квартал 2011 г. Back side of the moon, или темная сторона поведения персонала. интервью с Н. Русаковой, директором по персоналу ОАО "Хлебпром", А. Сукачёвым, директором "Торговой компании АС", Н. Харитоновой, руководителем службы персонала тверской компании ЗАО "ДКС". А. Колесникова, Т. Тюрина, С. Машарипов, "Управление персоналом", N 16, август 2010 г. Мотивируйте людей на работу, а не на преданность. интервью с Д. Кленовым, партнером UFG Wealth Management. "Управление персоналом", N 14, июль 2010 г. Использование Bill of Exchange в аккредитивной форме расчетов. Н.В. Букина, "Международные банковские операции", № 6, ноябрь-декабрь 2009. Business performance management: современный взгляд. Д. Исаев, "Финансовая газета", № 10, 11, март 2009. Директора заблудились между governance и management. А. Верников, "Банковское обозрение", № 8, август 2008. Отечественный private banking продолжает эволюционировать в сторону private wealth management. А.И. Гусев, "Инвестиционный банкинг", № 3, III квартал 2008. Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Марина Огромное спасибо Юлия! Наконец-то я защитилась. У вас потрясающая работоспособность. С уважением