Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с.
  2. Business Process Management Workshops: BPM 2011 International Workshops, Clermont-Ferrand, France, August 29, 2011, Revised Selected Papers, Part II (Lecture Notes in Business Information Processing). – М.: , 2012. – 541 с.
  3. Business Process Management Workshops: BPM 2011 International Workshops, Clermont-Ferrand, France, August 29, 2011, Revised Selected Papers, Part I (Lecture Notes in Business Information Processing). – М.: , 2012. – 543 с.
  4. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с.
  5. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с.
  6. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с.
  7. Alexander Otgaar, Erik Braun, Leo van den Berg. Urban Management and Economics. – М.: , 2012. – 256 с.
  8. Natural Resources - Technology, Economics & Policy. – М.: , 2012. – 500 с.
  9. Managing Technology in the Operations Function (Securities Institute Global Capital Markets Series). – М.: , 0. – 0 с.
  10. Marilyn R. Seymann. Managing the New Bank Technology: An Executive Blueprint for the Future (Glenlake Business Monographs). – М.: , 0. – 0 с.
  11. Jack J. Champlain. Auditing Information Systems. – М.: , 0. – 0 с.
  12. Mario Piattini. Auditing Information Systems. – М.: , 0. – 0 с.
  13. Timothy F. Carse, Jeffrey Slater. The Payroll Toolkit Nuts and Bolts Techniques to Help You Better Understand and Manage Your Payroll (Revised Second Edition). – М.: , 0. – 0 с.
  14. Jie Lu, Lakhmi C Jain, Guangquan Zhang. Handbook on Decision Making: Vol 2: Risk Management in Decision Making (Intelligent Systems Reference Library). – М.: , 2012. – 472 с.
  15. Robert Muksian. Mathematics of Interest Rates, Insurance, Social Security, and Pensions. – М.: , 0. – 0 с.
  16. Irvin H. Perline, Jona Goldschmidt. The Psychology and Law of Workplace Violence: A Handbook for Mental Health Professionals and Employers. – М.: C.C. Thomas, 2003. – 500 с.
  17. Ulric J., Jr. Gelinas, Steve G. Sutton, Jane Fedorowicz. Business Processes and Information Technology. – М.: , 0. – 0 с.
  18. Asset Protection and Security Management Handbook. – М.: , 0. – 0 с.
  19. Alexis Gutzman. Unforeseen Circumstances : Strategies and Technologies for Protecting Your Business and Your People in a Less Secure World. – М.: , 0. – 0 с.
  20. Protecting Business Information : A Manager's Guide. – М.: , 0. – 0 с.
  21. Ron Schneiderman. The Mobile Technology Question and Answer Book: A Survival Guide for Business Managers. – М.: , 0. – 0 с.
  22. Handbook of Management Information Systems. – М.: , 0. – 0 с.
  23. Information Warfare : corporate attack and defence in a digital world (Computer Weekly Professional (Paperback)). – М.: , 0. – 0 с.
  24. Philip P. Purpura. The Security Handbook. – М.: , 0. – 0 с.
  25. Vadim Volkov. Violent Entrepreneurs: The Use of Force in the Making of Russian Capitalism. – М.: , 0. – 0 с.
  26. M. J. Wilson, B. Maliszewska-Kordybach. Soil Quality, Sustainable Agriculture and Environmental Security in Central and Eastern Europe (NATO Science Series. 2, Environmental Security). – М.: , 0. – 0 с.
  27. Gregory V. Kitter. Investment Mathematics for Finance & Treasury Professionals: A Practical Approach. – М.: , 0. – 0 с.
  28. Gordon J. Alexander, William F. Sharpe, Jeffery V. Bailey. Fundamentals of Investments. – М.: Prentice Hall, 2000. – 782 с.
  29. Jordan E. Goodman. Reading between the Lies : How to detect fraud and avoid becoming a victom of Wall Street's next scandal. – М.: , 0. – 0 с.
  30. Max Boisot. Knowledge Assets: Securing Competitive Advantage in the Information Economy. – М.: , 0. – 0 с.
  31. Handbook of Loss Prevention and Crime Prevention, Fourth Edition. – М.: , 0. – 0 с.
  32. Charles J. Austin, Stuart B. Boxerman. Information Systems for Healthcare Management, Sixth Edition. – М.: , 0. – 0 с.
  33. Max H. Boisot. Knowledge Assets: Securing Competitive Advantage in the Information Economy. – М.: , 0. – 0 с.
  34. Gerald L. Kovacich, Edward P. Halibozek. The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, First Edition. – М.: , 0. – 0 с.
  35. Socially Responsible IT Management. – М.: , 0. – 0 с.
  36. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с.
  37. Theo J. W. Renkema. The IT Value Quest: How to Capture the Business Value of IT-Based Infrastructure. – М.: , 0. – 0 с.
  38. Ifip Tc11 Wg11.5 Working Conference on Integrity and Internal Control, Michael Gertz. Integrity and Internal Control in Information Systems V: Ifip Tc11/Wg11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (Iicis), November 11-12, 2002, Bonn, Germany (International Federation for Information Processing. – М.: , 0. – 0 с.
  39. Marko Nordquist. Towards Improved Security Management Practice: Designing an Organizational Model Procedure for the Implementation of Information Security Management in Heterogeneous Information Management. – М.: , 0. – 0 с.
  40. Modern Information Systems for Managers. – М.: , 0. – 0 с.
  41. Mary Pat McCarthy, Stuart Campbell. Security Transformation: Digital Defense Strategies to Protect your Company's Reputation and Market Share. – М.: , 0. – 0 с.
  42. Steve Purser. A Practical Guide to Managing Information Security (Artech House Technology Management Library). – М.: , 0. – 0 с.
  43. Ultimate Financial Security Survey. – М.: , 0. – 0 с.
  44. Effective Security Management, Fourth Edition (Effective Security Management). – М.: , 0. – 0 с.
  45. Daniel Jennings, Joseph Boyce. Information Assurance. – М.: , 0. – 0 с.
  46. C. Warren Axelrod, Axelrod. Outsourcing Information Security. – М.: , 0. – 0 с.
  47. Harold F. Tipton, Micki Krause, Micki, Cissp Krause. Information Security Management Handbook, Fifth Edition. – М.: , 0. – 0 с.
  48. Ross Malaga. Information Systems Technology. – М.: , 0. – 0 с.
  49. Thomas Peltier, Thomas Pelitier, Justin Peltier, John A. Blackley, Peltier, Associates. Information Security Fundamentals. – М.: , 0. – 0 с.
  50. Charles Cresson Wood. Best Practices In Internet Commerce Security. – М.: , 0. – 0 с.
  51. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с.
  52. Barbara C. McNurlin. Information Systems Management in Practice (7th Edition). – М.: , 2005. – 0 с.
  53. The Secure Online Business: E-Commerce, It Functionality & Business Continuity. – М.: , 2003. – 0 с.
  54. Peter R., MBA Ramsaroop. Securing Business Intelligence: Knowledge and CyberSecurity in the Post 9/11 World. – М.: , 2004. – 0 с.
  55. Current Security Management & Ethical Issues of Information Technology. – М.: , 2003. – 0 с.
  56. Economics of Information Security (Advances in Information Security). – М.: , 2004. – 0 с.
  57. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с.
  58. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с.
  59. Tom Negrino. Managing Your Personal Finances with Quicken : Visual QuickProject Guide (Visual Quickproject Series). – М.: , 2004. – 160 с.
  60. Larstan's The Black Book on Corporate Security (Black Book Series). – М.: , 2005. – 439 с.
  61. George Haddow, Jane Bullock. Introduction to Emergency Management, Second Edition (Butterworth-Heinemann Homeland Security). – М.: , 2005. – 424 с.
  62. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с.
  63. Jeffrey M. Stanton, Kathryn R. Stam. The Visible Employee: Using Workplace Monitoring and Surveillance to Protect Information Assets-Without Compromising Employee Privacy or Trust. – М.: , 2006. – 272 с.
  64. Mahesh S. Raisinghani. Handbook of Research on Global Information Technology Management in the Digital Economy. – М.: Information Science Reference, 2008. – 588 с.
  65. Michael E. Whitman, Herbert J. Mattord. Management Of Information Security, 2/E. – М.: , 2007. – 600 с.
  66. James Michael Stewart, Ed Tittel, Mike Chapple. CISSP: Certified Information Systems Security Professional Study Guide. – М.: , 2008. – 841 с.
  67. Keith D. Willett. Information Assurance Architecture. – М.: , 2008. – 624 с.
  68. Sustainable Use and Development of Watersheds (NATO Science for Peace and Security Series C: Environmental Security). – М.: , 2008. – 532 с.
  69. Alan Calder, Steve Watkins. IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002. – М.: , 2008. – 384 с.
  70. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с.
  71. Gerard Blokdijk, Ivanka Menken. Information Security Management Best Practice Workbook: Implementation and Management Roadmap for Threats, Challenges and Solutions - Ready to use supporting documents bringing Theory into Practice. – М.: , 2008. – 124 с.
  72. Ivanka Menken. Virtualization Architecture, Adoption and Monetization of Virtualization Projects using Best Practice Service Strategy, Service Design, Service Transition, ... and Continual Service Improvement Processes. – М.: , 2008. – 164 с.
  73. Brett Wilder. The Quiet Millionaire: Eliminate Financial Stress and Accumulate Wealth for a Lifetime of Security and Independence. – М.: , 2009. – 438 с.
  74. Hamid R. Nemati. Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues (Advances in Information Security and Privacy). – М.: , 2009. – 414 с.
  75. Alan Calder. Information Security based on ISO 27001/ISO 27002: A Management Guide. – М.: , 2009. – 83 с.
  76. Jake Kouns, Daniel Minoli. Information Technology Risk Management in Enterprise Environments: A Review of Industry Practices and a Practical Guide to Risk Management Teams. – М.: , 2010. – 421 с.
  77. Bel G. Raggad. Information Security Management: Concepts and Practice. – М.: , 2010. – 871 с.
  78. Michael E. Whitman, Herbert J. Mattord. Management of Information Security. – М.: , 2010. – 592 с.
  79. Sid Sirisukha. Protecting Management Information Systems: VPN Competitive Advantage. – М.: , 2010. – 316 с.
  80. RICHARD BATTE. Agricultural Information Systems Development: A Stakeholder Analysis Approach. – М.: , 2010. – 24 с.
  81. Alan Calder, Steve G Watkins. Information Security Risk Management for ISO27001 / ISO27002. – М.: , 2010. – 198 с.
  82. William Manning. CISM Certified Information Security Manager Certification Exam Preparation Course in a Book for Passing the CISM Exam - The How To Pass on Your First Try Certification Study Guide. – М.: , 2010. – 188 с.
  83. Evan Wheeler. Security Risk Management: Building an Information Security Risk Management Program from the Ground Up. – М.: , 2011. – 360 с.
  84. Geographic Information and Cartography for Risk and Crisis Management: Towards Better Solutions (Lecture Notes in Geoinformation and Cartography). – М.: , 2010. – 400 с.
  85. Brain-Inspired Information Technology (Studies in Computational Intelligence). – М.: , 2010. – 182 с.
  86. Tim Speed, Juanita Ellis. Internet Security: A Jumpstart for Systems Administrators and IT Managers. – М.: , . –  с.
  87. Harold F. Tipton, Micki Krause. Information Security Management Handbook on CD-ROM, 2003 Edition. – М.: , . –  с.
  88. Md. Abdul Quader Khan,Ahmad Tajul Islam and Montu Kumar Shikder. Soil management to improve HHs food security. – М.: LAP Lambert Academic Publishing, 2013. – 64 с.
  89. Humnath Bhandari. The economics of groundwater irrigation in rice-based systems in Nepal. – М.: LAP Lambert Academic Publishing, 2014. – 300 с.
  90. C. R. Prajapati,K. P. Singh and A. K. Gupta. Plant Disease Management for Food Security. – М.: LAP Lambert Academic Publishing, 2013. – 676 с.
  91. RICHARD BATTE. Agricultural Information Systems Development. – М.: LAP Lambert Academic Publishing, 2009. – 116 с.
  92. Girmaw Mitikie Geremew. The Management of Small Scale Irrigation Schemes. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  93. Md. Altaf Hossain. Profile:Soil Conservation and Watershed Management Centre Bangladesh. – М.: LAP Lambert Academic Publishing, 2014. – 112 с.
  94. Olufemi Fawole,Joseph Fayeye and Kingsley Nwachukwu. Security Agency and The Control And Manangement Of Arms In Nigeria. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  95. Pradeep Sadanand. Implementation of GSTRBAC using .NET framework. – М.: LAP Lambert Academic Publishing, 2012. – 56 с.
  96. Prathap Jonnadula and Naga Mani Darajula. Secure Group Communication. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  97. Shanmugam Bharathy Dhivya. A Study of Foiling Vehicles from Sybil Attack Using Pseudonyms. – М.: LAP Lambert Academic Publishing, 2012. – 100 с.
  98. Yedji Mbangsoua and Dr. Freddie Acosta. Information Security and its Investment Justification. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  99. Julien Shabani. Information Security for RFID Systems. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.
  100. Debasish Jena. On Protocols for Information Security Services. – М.: LAP Lambert Academic Publishing, 2011. – 136 с.
  101. Aliyu Onipede. Biometrics as a tool for Information Security in Aviation industry. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  102. Herbert Kayitale. The Online Management Information System for UNEB. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  103. James Francisco. Fingerprints in Place of Passwords. – М.: LAP Lambert Academic Publishing, 2012. – 156 с.
  104. Charles Ndekarisho Tarimo. ICT Security Readiness Checklist for Developing Countries. – М.: LAP Lambert Academic Publishing, 2010. – 280 с.
  105. Predrag Tasevski. Interactive Cyber Security Awareness Program. – М.: LAP Lambert Academic Publishing, 2012. – 184 с.
  106. G.M. Faysal Ahmad. Design and Implementation of a Common System for Office Digitization. – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  107. Josphat Kyalo. Management Structures. – М.: LAP Lambert Academic Publishing, 2013. – 88 с.
  108. Saeed Soltanmohammadi. Improving Information System Security by Evaluating Human Factors. – М.: LAP Lambert Academic Publishing, 2014. – 116 с.
  109. Ahmed AlNunu. How Much Information Security?. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  110. Ubaid Hayee. A Six Sigma Approach to Assure IT Security. – М.: LAP Lambert Academic Publishing, 2011. – 64 с.
  111. Eric Amankwa. Assessment of Security Controls. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  112. Amare Abawa. SYSTEMS ANALYSIS AND DESIGN:. – М.: LAP Lambert Academic Publishing, 2010. – 152 с.
  113. Sapana Lohani. Assessing Socio-Economic Services and Uses of Watershed. – М.: LAP Lambert Academic Publishing, 2012. – 128 с.
  114. Stepan Minarik. Financial Crisis as a Result of Risk Management Failure. – М.: LAP Lambert Academic Publishing, 2011. – 84 с.
  115. Vadim Tarasov. Economic Security: Case of Russia. – М.: LAP Lambert Academic Publishing, 2013. – 112 с.
  116. Zil A. Shah. Analysis of Data Recovery Awareness and Corporate Behavior. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  117. Alaa Al-Deen Mohammed Hassan. Information Security Management. – М.: LAP Lambert Academic Publishing, 2013. – 188 с.
  118. Jun Zheng,Jiantao Gu and Hong Wang. Financial Management and Information Security of Independent Colleges. – М.: LAP Lambert Academic Publishing, 2014. – 256 с.
  119. Jan Fuka. Management of Crisis Situations in Company Using Game Theory. – М.: Scholars' Press, 2014. – 52 с.
  120. Nicholas Olekaikai. Resources And Well-being Of Communities In Marigat Division, Kenya. – М.: LAP Lambert Academic Publishing, 2014. – 220 с.
  121. Ying Qian. Mitigating Information Security Risks during Operation Transition. – М.: LAP Lambert Academic Publishing, 2012. – 372 с.
  122. Claudia-Georgeta Carstea. New approach about project management of complex information systems. – М.: LAP Lambert Academic Publishing, 2011. – 152 с.
  123. Ruthaychonnee Sittichai. Determining Factors for Academic Achievement and Attitude of Students. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.

Дополнительные результаты

  1. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с.
  2. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  3. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с.
  4. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с.
  5. James E. Hunton, Stephanie M. Bryant, Nancy A. Bagranoff. Core Concepts of Information Technology Auditing. – М.: , 0. – 0 с.
  6. Martin Bennett, Jan Jaap Bouma, Teun Wolters. Environmental Management Accounting: Informational and Institutional Developments (Eco-Efficiency in Industry and Science, 9). – М.: , 0. – 0 с.
  7. Paul J. Jackson, Jos Van Der Wielen. Teleworking: International Perspectives : From Telecommuting to the Virtual Organization (The Management of Technology and Innovation). – М.: , 0. – 0 с.
  8. Edward Sherwood Meade. Trust Finance: A Study of the Genesis, Organization, and Management of Industrial Combinations. – М.: , 0. – 0 с.
  9. Ove Granstrand. The Economics and Management of Intellectual Property. – М.: , 0. – 0 с.
  10. David B. Lawrence. The Economic Value of Information. – М.: , 0. – 0 с.
  11. Bernd Stahl. Responsible Management of Information Systems. – М.: , 0. – 0 с.
  12. Gerald Kovacich. The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition. – М.: , 0. – 0 с.
  13. Lynda M Applegate, Robert D. Austin, F. Warren McFarlan, Lynda Applegate, Robert Austin, F. Warren McFarlan. Corporate Information Strategy and Management: Text and Cases. – М.: , 0. – 0 с.
  14. Barbara C. McNurlin, Ralph H. Sprague. Information Systems Management in Practice, Sixth Edition. – М.: , 0. – 0 с.
  15. Barbara C. McNurlin, Ralph H. Sprague. Information Systems Management in Practice (5th Edition). – М.: , 0. – 0 с.
  16. Eliezer Geisler, Ori Heller. Management of Medical Technology: Theory, Practice, and Cases (Management of Medical Technology). – М.: , 0. – 0 с.
  17. Steve Clarke, Elayne Coakes, M. Gordon Hunter, Andrew Wenn. Socio-Technical and Human Cognition Elements of Information Systems. – М.: , 0. – 0 с.
  18. Martin Bennett, Jan Jaap Bouma, Teun Wolters. Environmental Management Accounting: Informational and Institutional Developments (Eco-Efficiency in Industry and Science, V. 9). – М.: , 0. – 0 с.
  19. Committee on Prospects and Opportunities for Sustainable Management Of, National Research Council. Forested Landscapes in Perspective: Prospects and Opportunities for Sustainable Management of America's Nonfederal Forests (Agriculture). – М.: , 0. – 0 с.
  20. Michael J. Earl, Oxford Institute of Information Management, Pa Consulting Group. Information Management: The Organizational Dimension. – М.: , 0. – 0 с.
  21. Frederick Betz. Executive Strategy : Strategic Management and Information Technology. – М.: , 0. – 0 с.
  22. Mark B. Desman. Building an Information Security Awareness Program. – М.: , 0. – 0 с.
  23. Felix B., Ph.D. Tan. Global Perspective of Information Technology Management. – М.: , 0. – 0 с.
  24. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с.
  25. Edward J. Szewczak, Coral R. Snodgrass. Managing the Human Side of Information Technology: Challenges and Solutions. – М.: , 0. – 0 с.
  26. Jay Liebowitz. Information Technology Management: A Knowledge Repository. – М.: , 0. – 0 с.
  27. Marko Nordquist. Towards Improved Security Management Practice: Designing an Organizational Model Procedure for the Implementation of Information Security Management in Heterogeneous Information Management. – М.: , 0. – 0 с.
  28. Mehdi Khosrowpour. Success and Pitfalls of Information Technology (Cases on Information Technology Series). – М.: Idea Group Publishing, 1999. – 238 с.
  29. Edward Szewczak, Mehdi Khosrowpour. The Human Side of Information Technology Management (Series in Managing the Human Side of Information Technology). – М.: , 0. – 0 с.
  30. Steve Purser. A Practical Guide to Managing Information Security (Artech House Technology Management Library). – М.: , 0. – 0 с.
  31. Marian Quigley, Marian Quiqley. Information Security and Ethics: Social and Organizational Issues. – М.: , 0. – 0 с.
  32. Mehdi Khosrowpour. Effective Utilization and Management of Emerging Information Technologies: The 1998 Conference Proceedings in Boston Massachusettes. – М.: , 0. – 0 с.
  33. C. Warren Axelrod, Axelrod. Outsourcing Information Security. – М.: , 0. – 0 с.
  34. Harold F. Tipton, Micki Krause, Micki, Cissp Krause. Information Security Management Handbook, Fifth Edition. – М.: , 0. – 0 с.
  35. Jerry N. Luftman. Managing the Information Technology Resource: Leadership in the Information Age. – М.: , 0. – 0 с.
  36. Bernd Carsten Stahl. Responsible Management of Information Systems. – М.: , 0. – 0 с.
  37. Thomas Peltier, Thomas Pelitier, Justin Peltier, John A. Blackley, Peltier, Associates. Information Security Fundamentals. – М.: , 0. – 0 с.
  38. J.W. Stuth, B.G. Lyons. Decision Support Systems for the Management of Grazing Lands: Emerging Issues. – М.: , 0. – 0 с.
  39. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с.
  40. Dimitris N. Chorafas. The Management of Bond Investments and Trading of Debt. – М.: , 2005. – 0 с.
  41. E.D. Solojentsev. Scenario Logic and Probabilistic Management of Risk in Business and Engineering (Applied Optimization). – М.: , 2004. – 0 с.
  42. Frank Bannister. Purchasing and Financial Management of Information Technology : A practical guide (Computer Weekly Professional). – М.: , 2003. – 0 с.
  43. Barbara C. McNurlin. Information Systems Management in Practice (7th Edition). – М.: , 2005. – 0 с.
  44. Managing Corporate Information Systems Evolution and Maintenance. – М.: , 2004. – 0 с.
  45. Anthony D. Manley. The Retail Loss Prevention Officer: The Law and the Fundamental Elements of Retail Security. – М.: , 2003. – 0 с.
  46. Economics of Information Security (Advances in Information Security). – М.: , 2004. – 0 с.
  47. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с.
  48. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с.
  49. Lakshmi Bhaskaran. Size Matters: Successful Graphic Design for Large Amounts of Information. – М.: , 2004. – 0 с.
  50. Margi Levy. Strategies for Growth in SMEs, First Edition : The Role of Information and Information Sytems. – М.: , 2004. – 0 с.
  51. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с.
  52. Mervat Abdelhak, Sara Grostick, Mary Alice Hanken, Ellen B. Jacobs. Health Information: Management of a Strategic Resource. – М.: , 2007. – 784 с.
  53. Dan Remenyi, Arthur Money, Frank Bannister. The Effective Measurement and Management of ICT Costs and Benefits. – М.: CIMA Publishing, 2007. – 408 с.
  54. Ralph Stair, George Reynolds. Fundamentals of Information Systems. – М.: Course Technology, 2007. – 488 с.
  55. Ira Winkler. Zen and the Art of Information Security. – М.: , 2007. – 192 с.
  56. Timothy P. Layton. Information Security. – М.: , 2006. – 222 с.
  57. Michael Khairallah. Physical Security Systems Handbook: The Design and Implementation of Electronic Security Systems. – М.: , 2005. – 312 с.
  58. Michael E. Whitman, Herbert J. Mattord. Principles of Information Security, Second Edition. – М.: , 2004. – 600 с.
  59. Michael E. Whitman, Herbert J. Mattord. Management Of Information Security, 2/E. – М.: , 2007. – 600 с.
  60. Estelle James, Alejandra Cox Edwards, Rebeca Wong. The Gender Impact of Social Security Reform. – М.: , 2008. – 216 с.
  61. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с.
  62. Global Information Systems: The Implications of Culture for IS Managment. – М.: , 2008. – 496 с.
  63. Lloyd's MIU Handbook of Maritime Security. – М.: , 2008. – 400 с.
  64. Major Currents in Information Systems (SAGE Library in Business and Management). – М.: , 2008. – 2424 с.
  65. Encyclopedia of Information Communication Technology. – М.: , 2008. – 926 с.
  66. Social and Human Elements of Information Security: Emerging Trends and Countermeasures (Premier Reference Source). – М.: , 2008. – 412 с.
  67. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с.
  68. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с.
  69. Gerard Blokdijk, Ivanka Menken. Information Security Management Best Practice Workbook: Implementation and Management Roadmap for Threats, Challenges and Solutions - Ready to use supporting documents bringing Theory into Practice. – М.: , 2008. – 124 с.
  70. T.R. Ramanathan. The Role of Organisational Change Management in Offshore Outsourcing of Information Technology Services: Qualitative Case Studies from a Multinational Pharmaceutical Company. – М.: , 2009. – 188 с.
  71. W. Krag Brotby. Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement. – М.: Auerbach Publications, 2009. – 200 с.
  72. Alan Calder. Information Security based on ISO 27001/ISO 27002: A Management Guide. – М.: , 2009. – 83 с.
  73. Bel G. Raggad. Information Security Management: Concepts and Practice. – М.: , 2010. – 871 с.
  74. Michael E. Whitman, Herbert J. Mattord. Management of Information Security. – М.: , 2010. – 592 с.
  75. Alan Calder, Steve G Watkins. Information Security Risk Management for ISO27001 / ISO27002. – М.: , 2010. – 198 с.
  76. Justin Chamblee CPA MAcc, Max Reiboldt CPA. Financial Management of the Veterinary Practice. – М.: , 2010. – 136 с.
  77. William Manning. CISM Certified Information Security Manager Certification Exam Preparation Course in a Book for Passing the CISM Exam - The How To Pass on Your First Try Certification Study Guide. – М.: , 2010. – 188 с.
  78. Segomotso Masegonyana Keakopa. Management of electronic records: Opportunities and challenges for Botswana, Namibia and South Africa. – М.: , 2010. – 352 с.
  79. Frank Bannister. Purchasing and Financial Management of Information Technology. – М.: , 2010. – 384 с.
  80. Evan Wheeler. Security Risk Management: Building an Information Security Risk Management Program from the Ground Up. – М.: , 2011. – 360 с.
  81. Editors Karl Maria Michael de Leeuw, Jan Bergstra. The History of Information Security: A Comprehensive Handbook. – М.: Elsevier Science, 2007. – 900 с.
  82. Girmay Aragaw. Pathogen Spectrum and Management of Banana Crown Rot in Ethiopia: Importance of Crown Rot of Banana (Musa spp.) in Ethiopia. – М.: , 2012. – 100 с.
  83. Edward B. Diethrich, Venkatesh Ramaiah, Jacques Kpodonu, Julio A. Rodriguez-Lopez. Endovascular Hybrid Management of the Thoracic Aorta: A Case-based Approach. – М.: , 2008. – 320 с.
  84. Management of Heart Failure - Volume 2: Surgical. – М.: , 2008. – 346 с.
  85. Management of Heart Failure. – М.: , 2008. – 358 с.
  86. Handbook of Information and Communication Security. – М.: , 2010. – 800 с.
  87. Salah M. Abdel–aleem. The Design and Management of Medical Device Clinical Trials. – М.: , 2010. – 250 с.
  88. John R. Vacca. Managing Information Security. – М.: , 2010. – 320 с.
  89. G. Manoilov. Elsevier's Dictionary of Information Security. – М.: , 2010. – 772 с.
  90. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с.
  91. Paul Robinson. Dictionary of International Security. – М.: , 2007. – 208 с.
  92. Advances in the Valuation and Management of Mortgage–Backed Securities. – М.: , 1999. – 318 с.
  93. Edited by Thach N. Nguyen, Dayi Hu, Moo-Hyun Kim, Cindy L. Grines. Management of Complex Cardiovascular Problems: The Evidence-Based Medicine Approach. – М.: Blackwell Publishers, Futura Publishing Company, Inc, New York, 2007. – 464 с.
  94. T DALER. Daler: Security Of ?information? & Data. – М.: , 1988. – 134 с.
  95. B CONOLLY. Conolly: ?information? Mechanics–transformation Of Information In Management Command Etc. – М.: , 1988. – 176 с.
  96. Principles Of Computer Security, Comptia Security+ And Beyond, Second Edition. – М.: , 2011. – 0 с.
  97. 24 Deadly Sins Of Software Security: Programming Flaws And How To Fix Them. – М.: , 2011. – 432 с.
  98. Fundamentals Of Network Security. – М.: , 2011. – 672 с.
  99. Managing Financial Information. – М.: , 2011. – 224 с.
  100. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . –  с.
  101. Harold F. Tipton, Micki Krause. Information Security Management Handbook on CD-ROM, 2003 Edition. – М.: , . –  с.
  102. Rohana Mohamad Rashid. Determining Influencing Factors of Information Security Culture. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  103. Nitin Kanzariya and Ashish Nimavat. Security of Digital Image Using Hybrid Steganography. – М.: LAP Lambert Academic Publishing, 2013. – 84 с.
  104. Zabibu Idrisa. Coverage of Social Security Schemes. – М.: LAP Lambert Academic Publishing, 2012. – 132 с.
  105. Rhea Lyn Dealca. Towards an Improved Management of Government Lands in the Philippines. – М.: LAP Lambert Academic Publishing, 2010. – 176 с.
  106. Hanumant Waghmare. Utilization of Social Security Programmes in India. – М.: LAP Lambert Academic Publishing, 2013. – 104 с.
  107. Santosh Kadam and Gajanan Khiste. Financial Management of College Libraries. – М.: LAP Lambert Academic Publishing, 2014. – 84 с.
  108. Md. Abul Kalam Siddike and S. M. Mannan. Use of Information and Communication Technology (ICT). – М.: LAP Lambert Academic Publishing, 2011. – 180 с.
  109. Girmay Aragaw. Pathogen Spectrum and Management of Banana Crown Rot in Ethiopia. – М.: LAP Lambert Academic Publishing, 2012. – 100 с.
  110. Bhagirath Singh Chauhan. Ecology and management of weeds in no-till in southern Australia. – М.: LAP Lambert Academic Publishing, 2011. – 248 с.
  111. Pandian Valarmathi and G. Chandrasekar. Management of Grapes Downy Mildew - A Devastating Disease. – М.: LAP Lambert Academic Publishing, 2013. – 60 с.
  112. Prashant S. Umbarkar and G. J. Parsana. Bio-Ecology And Management Of Pod Borer Complex Of Greengram. – М.: LAP Lambert Academic Publishing, 2013. – 108 с.
  113. Amin Mohammed. Integrated Management of Common Bean Anthracnose. – М.: LAP Lambert Academic Publishing, 2014. – 112 с.
  114. Eric Kiplangat Ng'eno. Analysis Of Information Systems Case study in Bomet County, Kenya. – М.: LAP Lambert Academic Publishing, 2014. – 104 с.
  115. Jack M. Wasike. Management Of Fusarium Wilt Of Purple Passion Fruits. – М.: LAP Lambert Academic Publishing, 2013. – 88 с.
  116. C. R. Prajapati,K. P. Singh and A. K. Gupta. Plant Disease Management for Food Security. – М.: LAP Lambert Academic Publishing, 2013. – 676 с.
  117. Dauda Kola Abdulkadir. Materials for Improving the Management of Irrigated Agriculture. – М.: LAP Lambert Academic Publishing, 2015. – 140 с.
  118. Ashraf Khan and A.P. Sinha. Biological Management of Rice Sheath Blight. – М.: LAP Lambert Academic Publishing, 2013. – 132 с.
  119. Pavani Thatikonda and Uma Maheswari Telugu. Management of pink borer, Sesamia inferens Walker on maize. – М.: LAP Lambert Academic Publishing, 2013. – 84 с.
  120. Navin Chandra Nainwal and Kanchan Nainwal. Post Harvest Management of Litchi for Marketing and Export. – М.: LAP Lambert Academic Publishing, 2014. – 120 с.
  121. Girmaw Mitikie Geremew. The Management of Small Scale Irrigation Schemes. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  122. Bruce Rukundo. Conservation and Management of River Catchments. – М.: LAP Lambert Academic Publishing, 2010. – 144 с.
  123. Suroj Pokhrel. Feeding management of honeybee colonies in Chitwan Nepal. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  124. Godfrey Onyango and Francis Wegulo. Research Findings and Sustainable Management of Lake Naivasha Kenya. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  125. Kalpana Calatharan. Social-ecological resilience and management of coastal ecosystem. – М.: LAP Lambert Academic Publishing, 2010. – 92 с.
  126. Girish K. S. and Kemparaju K. Hyaluronidase, a potential target for the management of snakebite. – М.: LAP Lambert Academic Publishing, 2013. – 168 с.
  127. V. Ramanarayana Reddy,G. Nagarjuna Reddy and T. V. Narayana. Impact of pharmacist in the management of coronary artery disease. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  128. Anastacia Kariuki. Nutritional Management of Obesity, Diabetes and Hypertension. – М.: LAP Lambert Academic Publishing, 2011. – 64 с.
  129. Yedji Mbangsoua and Dr. Freddie Acosta. Information Security and its Investment Justification. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  130. Julien Shabani. Information Security for RFID Systems. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.
  131. Debasish Jena. On Protocols for Information Security Services. – М.: LAP Lambert Academic Publishing, 2011. – 136 с.
  132. frankie tvrz and marijke coetzee. Information Security of a Bluetooth-enabled handheld device. – М.: LAP Lambert Academic Publishing, 2010. – 180 с.
  133. Ahmed AlNunu. How Much Information Security?. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  134. Meysam Namayandeh. Development of Computer Ethical Framework for Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 132 с.
  135. Dhara Dave and Brahmdutta Raval. Implementation of Information Technology in Pharmaceutical Management. – М.: LAP Lambert Academic Publishing, 2014. – 92 с.
  136. Alaa Al-Deen Mohammed Hassan. Information Security Management. – М.: LAP Lambert Academic Publishing, 2013. – 188 с.
  137. Jun Zheng,Jiantao Gu and Hong Wang. Financial Management and Information Security of Independent Colleges. – М.: LAP Lambert Academic Publishing, 2014. – 256 с.
  138. Ying Qian. Mitigating Information Security Risks during Operation Transition. – М.: LAP Lambert Academic Publishing, 2012. – 372 с.
  139. Claudia-Georgeta Carstea. New approach about project management of complex information systems. – М.: LAP Lambert Academic Publishing, 2011. – 152 с.
  140. Leo Nvida Davidson Woode and Emmanuel Adjei. Freedom of information : implications for records management in Ghana. – М.: LAP Lambert Academic Publishing, 2011. – 144 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Наука человековедения. интервью с Д. Уолтоном, профессором London Metropolitan University, экспертом CIPD. Chartered Institute of Personnel and Development, автором программы Master of Arts in Human Resource Strategies. И. Смирнова, "Кадровый менеджмент", № 5, июль-август 2007.
  2. Партнерство вместо подчинения. интервью с Дезо Хорватом, деканом Schulich School of Business. Р. Крецул, "Кадровый менеджмент", № 1, февраль 2006.
  3. BUSINESS PROCESS MANAGEMENT: система для руководителя. А. Крючкова, "Финансовая газета. Региональный выпуск", № 24, июнь 2005.
  4. Построение системы мотивации по технологии BUSINESS UNIT MANAGEMENT. В. Лунин, "Финансовая газета. Региональный выпуск", № 16, апрель 2005.
  5. Business performance management: источники эффективности. О. Духонина, П. Горянский, "Финансовая газета. Региональный выпуск", № 20, май 2004.
  6. Медицинская информатика в Web of Science: доля России в мировом публикационном потоке. Н.Г. Куракова, Л.А. Цветкова, "Врач и информационные технологии", № 4, июль-август 2012.
  7. Health management: совершенствуем здоровый образ работы. С. Царенко, "Кадровик.ру", N 5, май 2012 г.
  8. Регулирование операций торгового финансирования: новые инициативы. интервью с Д. Шмандом, вице-председателем Банковской комиссии ICC по supply chain finance, главой подразделения Trade Finance and Cash Management Corporates EMEA в Global Transaction Banking. GTB division Deutsche Bank. Н. Макарова, "Международные банковские операции", N 2, апрель-июнь 2012 г.
  9. Lifestyle management и консьерж-сервис. А.И. Гусев, "Банковский ритейл", N 1, I квартал 2012 г.
  10. Ошибки при формировании и развитии бизнеса private banking & wealth management. А.В. Александров, "Банковский ритейл", N 1, I квартал 2012 г.
  11. О качестве сервиса, связанного с запросами на медицинскую информацию. Medical Information Service?. А. Беденков, "Ремедиум", № 1, январь 2012.
  12. Business Intelligence и Business Performance Management: основные термины и концепции. Ю.В. Амириди, "Управление в кредитной организации", N 5, сентябрь-октябрь 2011 г.
  13. Взаимодействие блока private banking & wealth management с розничным бизнесом. А.В. Александров, "Банковский ритейл", N 3, III квартал 2011 г.
  14. Сегментация клиентов в бизнесе private banking & wealth management. Н.В.  Чумак, "Банковский ритейл", N 1, I квартал 2011 г.
  15. Back side of the moon, или темная сторона поведения персонала. интервью с Н. Русаковой, директором по персоналу ОАО "Хлебпром", А. Сукачёвым, директором "Торговой компании АС", Н. Харитоновой, руководителем службы персонала тверской компании ЗАО "ДКС". А. Колесникова, Т. Тюрина, С.  Машарипов, "Управление персоналом", N 16, август 2010 г.
  16. Мотивируйте людей на работу, а не на преданность. интервью с Д.  Кленовым, партнером UFG Wealth Management. "Управление персоналом", N 14, июль 2010 г.
  17. Использование Bill of Exchange в аккредитивной форме расчетов. Н.В. Букина, "Международные банковские операции", № 6, ноябрь-декабрь 2009.
  18. Business performance management: современный взгляд. Д. Исаев, "Финансовая газета", № 10, 11, март 2009.
  19. Директора заблудились между governance и management. А. Верников, "Банковское обозрение", № 8, август 2008.
  20. Отечественный private banking продолжает эволюционировать в сторону private wealth management. А.И. Гусев, "Инвестиционный банкинг", № 3, III квартал 2008.

Образцы работ

Тема и предметТип и объем работы
Порядок разработки, проектирования системы стратегического менеджмента
Менеджмент
Диплом
100 стр.
Проблемы стратегического менеджмента в организации
Менеджмент
Диплом
80 стр.
Разработка рекомендаций по эффективному использованию зарубежного опыта реализации прогрессивных систем и методов менеджмента на предприятии
Стратегический менеджмент
Диплом
150 стр.
Продвижение брендов в шоу-бизнесе
Электроснабжение городов и промышленных предприятий
Диплом
79 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Марина
Огромное спасибо Юлия! Наконец-то я защитилась. У вас потрясающая работоспособность. С уважением