Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Syngress. Managing Cisco Network Security 2E. – М.: , 2010. – 752 с.

Дополнительные результаты

  1. Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с.
  2. Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  3. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с.
  4. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с.
  5. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с.
  6. James T. Turner, Michael G. Gelles. Threat Assessment: A Risk Management Approach. – М.: Routledge, 2003. – 212 с.
  7. Relationship and Resource Management in Operations (Securities Institute Global Capital Markets Series). – М.: , 0. – 0 с.
  8. John K. Conlon, Melissa Giovagnoli. The Power of Two: How Companies of All Sizes Can Build Alliance Networks That Generate Business Opportunities. – М.: Jossey-Bass, 1998. – 208 с.
  9. Lundy Lewis. Managing Business and Service Networks (Innovations in Science Education and Technology). – М.: , 0. – 0 с.
  10. Svenja Falk, Alfred J. Beerli, Daniel Diemers. Knowledge Management and Networked Environments. – М.: , 0. – 0 с.
  11. Thomas J. Parenty. Digital Defense: What You Should Know About Protecting Your Company's Assets. – М.: , 0. – 0 с.
  12. Steve Purser. A Practical Guide to Managing Information Security (Artech House Technology Management Library). – М.: , 0. – 0 с.
  13. Effective Security Management, Fourth Edition (Effective Security Management). – М.: , 0. – 0 с.
  14. Lawrence Bernstein, C. M. Yuhas. Basic Concepts for Managing Telecommunications Networks: Copper to Sand to Glass to Air (Kluwer Academic/Plenum Publishers Network and Systems Manage). – М.: , 0. – 0 с.
  15. Roberta Bragg. MCSE Training Guide (70-220): Windows 2000 Network Security Design, Second Edition. – М.: , 0. – 0 с.
  16. H Pasricha. Designing Networks with Cisco (Networking Series). – М.: , 2004. – 0 с.
  17. Debt Management and Government Securities Markets in the 21st Century. – М.: , 2004. – 0 с.
  18. Martin Johanson. Managing Networks in Transition Economies (International Business and Management). – М.: , 2004. – 0 с.
  19. Implementing Environmental Management Accounting: Status and Challenges (Eco-Efficiency in Industry and Science) (Eco-Efficiency in Industry and Science). – М.: , 2005. – 0 с.
  20. Pradeep Kumar Ray. Integrated Management from E-Business Perspective: Concepts, Architectures and Methodologies (Network and Systems Management). – М.: , 2003. – 0 с.
  21. Peter R., MBA Ramsaroop. Securing Business Intelligence: Knowledge and CyberSecurity in the Post 9/11 World. – М.: , 2004. – 0 с.
  22. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с.
  23. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с.
  24. Environmental Management Accounting - Purpose and Progress (Eco-Efficiency in Industry and Science). – М.: , 2003. – 0 с.
  25. Rickland Hollar. Enterprise Web Services Security (Internet Series). – М.: , 2005. – 432 с.
  26. John Child. Strategies Of Cooperation: Managing Alliances, Networks, And Joint Ventures. – М.: , 2005. – 400 с.
  27. Ron Ben Natan. Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase. – М.: , 2005. – 432 с.
  28. John Child, David Faulkner, Stephen Tallman. Cooperative Strategy: Managing Alliances, Networks, and Joint Ventures. – М.: Oxford University Press, 2005. – 472 с.
  29. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с.
  30. Network Security. – М.: , 2008. – 370 с.
  31. James Michael Stewart, Ed Tittel, Mike Chapple. CISSP: Certified Information Systems Security Professional Study Guide. – М.: , 2008. – 841 с.
  32. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с.
  33. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с.
  34. Daniel Clark. Network Access Control 100 Success Secrets - 100 Most Asked NAC Questions on Implementation and Deployment of unify endpoint security technology, user ... and network security enforcement. – М.: , 2008. – 180 с.
  35. Strategy and Governance of Networks: Cooperatives, Franchising, and Strategic Alliances (Contributions to Management Science). – М.: , 2008. – 392 с.
  36. Michael E. Whitman, Herbert J. Mattord. Management of Information Security. – М.: , 2010. – 592 с.
  37. Frank Bunker Gilbreth. Primer of Scientific Management (Classic Reprint). – М.: , 2010. – 160 с.
  38. Handbook of Research on Communities of Practice for Organizational Management and Networking: Methodologies for Competitive Advantage. – М.: , 2010. – 539 с.
  39. Andy Jones. Risk Management for Computer Security. – М.: , 2010. – 296 с.
  40. Heinz-Gerd Hegering. Integrated Management of Networked Systems. – М.: , 2010. – 600 с.
  41. Jeff Crume. Inside Internet Security: What Hackers Don't Want You To Know. – М.: , 0. – 0 с.
  42. Implementing Environmental Management Accounting: Status and Challenges (Eco-Efficiency in Industry and Science). – М.: , 2005. – 374 с.
  43. Advancing Computing, Communication, Control and Management (Lecture Notes in Electrical Engineering). – М.: , 2010. – 294 с.
  44. Bill Ferguson. CompTIA Network+ Review Guide. – М.: , 2009. – 264 с.
  45. Michael Jang. MasteringTM Red Hat® Linux 9. – М.: , 2003. – 976 с.
  46. Todd Lammle. CCENT: Cisco Certified Entry Networking Technician Study Guide. – М.: , 2008. – 648 с.
  47. Priscilla Oppenheimer. Troubleshooting Campus Networks. – М.: , 2002. – 608 с.
  48. Todd Lammle. Todd Lammle?s CCNA® IOS® Commands Survival Guide. – М.: , 2007. – 312 с.
  49. Kelley J.P. Lindberg. Novell?s NetWare® 5 Basics. – М.: , 1999. – 342 с.
  50. Dale Liu. Cisco CCNA/CCENT Exam 640-802, 640-822, 640-816 Preparation Kit. – М.: Syngress, 2009. – 848 с.
  51. Rob Cameron. Juniper(r) Networks Secure Access SSL VPN Configuration Guide. – М.: , 2010. – 656 с.
  52. Owen Poole. Network Security. – М.: , 2010. – 224 с.
  53. James Joshi. Network Security: Know It All. – М.: , 2010. – 368 с.
  54. Steve Manzuik. Network Security Assessment: From Vulnerability to Patch. – М.: , 2010. – 500 с.
  55. Jan L. Harrington. Network Security. – М.: , 2010. – 384 с.
  56. Russ Rogers. Network Security Evaluation Using the NSA IEM. – М.: , 2010. – 450 с.
  57. Brien Posey. GFI Network Security and PCI Compliance Power Tools. – М.: , 2010. – 488 с.
  58. Umer Khan. The Ultimate Cisco and Security and IP Configuration CD. – М.: , 2010. – 0 с.
  59. Syngress. Configuring Cisco Network Services for Active Directory Adobe Edition. – М.: , 2010. – 608 с.
  60. Syngress. Managing Cisco Network Security 2E. – М.: , 2010. – 752 с.
  61. Sm Lynn–jones. Nuclear Diplomacy & Crisis Management – An International Security (Paper). – М.: , 1990. – 364 с.
  62. Sm Lynn–jones. Nuclear Diplomacy & Crisis Management – An International Security Reader. – М.: , 1990. – 364 с.
  63. Bill English. MCSA/MCSE: Windows® 2000 Network Security Administration Study Guide. – М.: , 2003. – 574 с.
  64. Elliotte Rusty Harold. Java Network Programming 2e. – М.: , 2000. – 760 с.
  65. Russ Kaufman. MCSA/MCSE: Windows® Server 2003 Network Security Administration Study Guide. – М.: , 2004. – 560 с.
  66. Nitesh Dhanjani. Network Security Tools. – М.: , 2005. – 340 с.
  67. AA ALEXANDER. Alexander: Managing & Leasing Commercial Properties 2e 2vst 1995 Supp (paper Only). – М.: , 1995. – 98 с.
  68. Thomas W. Madron. Network Security in the 90?s. – М.: , 1992. – 304 с.
  69. Microsoft. MCSE Training Kit (Exam 70–220) – Designing Microsoft Windows 2000 Network Security. – М.: , 2001. – 864 с.
  70. Andrew Lockhart. Network Security Hacks. – М.: , 2004. – 316 с.
  71. DAN. Network Security In A Mixed Environment. – М.: , 1998. – 456 с.
  72. Ron Gilster. Cisco® Networking For Dummies®. – М.: , 2000. – 470 с.
  73. Todd Lammle. CCNA® INTRO: Introduction to Cisco® Networking Technologies Study Guide. – М.: , 2006. – 504 с.
  74. AA Alexander. Managing & Leasing Commerical Properties 2e 2VST 1996 Cumulative Supp. – М.: , 1996. – 200 с.
  75. Matthew Strebe. Network Security JumpStartTM. – М.: , 2002. – 384 с.
  76. Microsoft. MCSA/MCSE Self–Paced Training Kit (Exam 70–218) – Managing a Microsoft Windows 2000 Network Environment 2e. – М.: , 2002. – 1152 с.
  77. Pawan K Bhardwaj. A+. Network+, Security+ Exams in a Nutshell. – М.: , 2007. – 812 с.
  78. Andrew Oram. Managing Projects with Make 2e. – М.: , 1991. – 152 с.
  79. Eric Cole. Network Security Bible. – М.: , 2005. – 694 с.
  80. Scott Oaks. Java Security 2e. – М.: , 2001. – 624 с.
  81. Ed Tetz. Cisco Networking All–in–One For Dummies®. – М.: , 2011. – 984 с.
  82. Janet L Abrahm. A Physician?s Guide to Pain and Symptom Management in Cancer Patients 2e. – М.: , 2005. – 472 с.
  83. Janet L Abrahm. A Physician?s Guide to Pain and Symptom Management in Cancer Patients 2e. – М.: , 2005. – 472 с.
  84. Eric Cole. Wiley Pathways Network Security Fundamentals Project Manual. – М.: , 2008. – 312 с.
  85. Kelly McGrew. Optimizing Cisco Network Administration and Management. – М.: , 2003. – 312 с.
  86. Kelly McGrew. Optimizing Cisco Network Infrastructure. – М.: , 2003. – 312 с.
  87. Kelly McGrew. Cisco Network Design Toolkit. – М.: , 2003. – 312 с.
  88. Kevin Dooley. Cisco IOS Cookbook 2e. – М.: , 2007. – 1236 с.
  89. Andrew Lockhart. Network Security Hacks 2e. – М.: , 2006. – 352 с.
  90. Michael Salvagno. Cisco® Network Design Handbook. – М.: , 2000. – 338 с.
  91. Chris Mcnab. Network Security Assessment 2e. – М.: , 2007. – 464 с.
  92. Cryptography & Network Security. – М.: , 2007. – 0 с.
  93. Securing Global Transportation Networks. – М.: , 2011. – 312 с.
  94. Shon Harris. CISSP All-in-One Exam Guide (+ CD-ROM). – М.: McGraw-Hill Companies, 2010. – 1216 с.
  95. Richard A. Deal. Cisco Asa Configuration. – М.: McGraw-Hill, 2009. – 752 с.
  96. Comptia Security+ All-In-One Exam Guide, Second Edition (Exam Sy0-201). – М.: , 2011. – 0 с.
  97. Pc Quicksteps, Second Edition. – М.: , 2011. – 240 с.
  98. Wireless Network Security A Beginners Guide. – М.: , 2011. – 400 с.
  99. Cissp Practice Exams. – М.: , 2011. – 414 с.
  100. Mac Os X System Administration. – М.: , 2011. – 528 с.
  101. Cisco: A Beginner'S Guide, Fourth Edition. – М.: , 2011. – 696 с.
  102. Hacking Exposed Cisco Networks. – М.: , 2011. – 400 с.
  103. Network Security: The Complete Reference. – М.: , 2011. – 896 с.
  104. Fundamentals Of Network Security. – М.: , 2011. – 672 с.
  105. Greg Holden. Guide to Firewalls and Network Security: Intrusion Detection and VPNs. – М.: Course Technology, 2003. – 512 с.
  106. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . –  с.
  107. Dave Tyson. Security Convergence: Managing Enterprise Security Risk. – М.: , 2007. – 232 с.
  108. Michael Gregg, Eric Seagren, Angela Orebaugh, Matt Jonkman, Raffael Marty. How to Cheat at Configuring Open Source Security Tools (How to Cheat) (How to Cheat). – М.: , 2007. – 528 с.
  109. Susan Snedaker. Syngress IT Security Project Management Handbook. – М.: Syngress, 2006. – 612 с.
  110. Ido Dubrawsky. How to Cheat at Securing Your Network. – М.: Syngress, 2007. – 432 с.
  111. Todd Lammle. CCNA Cisco Certified Network Associate Study Guide (+ CD-ROM). – М.: SYBEX Inc, 2011. – 864 с.
  112. Shaek Rana Mohammad Baki Billah and Mohammad Hafizur Rahman. Design & Development of Network Security System using IP Tables. – М.: LAP Lambert Academic Publishing, 2013. – 164 с.
  113. Xiangqian Chen. DEFENSE AGAINST NODE COMPROMISE IN SENSOR NETWORK SECURITY. – М.: LAP Lambert Academic Publishing, 2009. – 108 с.
  114. Olukemi Asemota. HIV/AIDS MANAGEMENT IN THE WORKPLACE: FOCUS ON SECURITY FORCES. – М.: LAP Lambert Academic Publishing, 2010. – 240 с.
  115. C. R. Prajapati,K. P. Singh and A. K. Gupta. Plant Disease Management for Food Security. – М.: LAP Lambert Academic Publishing, 2013. – 676 с.
  116. Ahmad A. Hassan. Firewalls: Modeling and Management. – М.: LAP Lambert Academic Publishing, 2012. – 100 с.
  117. Xiaodong He. Automated intrusion prevention mechanism in enhancing network security. – М.: Scholars' Press, 2014. – 128 с.
  118. Syed Zahidur Rashid. Computer Network Security Monitoring. – М.: Scholars' Press, 2015. – 284 с.
  119. Elliot Attipoe. Securing the Public Wireless Network. – М.: LAP Lambert Academic Publishing, 2013. – 92 с.
  120. Mamunur Rashid and Bellal Hossain. WiMAX Security Architecture. – М.: LAP Lambert Academic Publishing, 2014. – 76 с.
  121. Mohammad AlAhmad. Security threats of finger print biometric in network system. – М.: LAP Lambert Academic Publishing, 2014. – 88 с.
  122. Nirbhay Chaubey. Securing AODV Routing Protocol in design of Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2015. – 132 с.
  123. Aditya Kumar. Cryptography and Chaos a New Approach in Network Security. – М.: LAP Lambert Academic Publishing, 2015. – 80 с.
  124. Luciana Oliveira. Future Network Management. – М.: LAP Lambert Academic Publishing, 2011. – 88 с.
  125. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  126. Gurpreet juneja. Security:MPLS VPN Network. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  127. Omid Mahdi Ebadati E.,Harleen Kaur M. Afshar Alam and Kaebeh Yaeghoobi. Micro-Firewalls for Dynamic Network Security Framework. – М.: LAP Lambert Academic Publishing, 2012. – 292 с.
  128. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  129. Vincent Omollo. Enhanced Network Security. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  130. Firkhan Ali Hamid Ali. Vulnerability Analysis on the Computer Network Security. – М.: LAP Lambert Academic Publishing, 2010. – 72 с.
  131. Sunil Kumar Senapati and Prof. Pabitra Mohan Khilar. SECURING FSR PROTOCOL AGAINST DATA PACKET DROPPING IN MANET. – М.: LAP Lambert Academic Publishing, 2010. – 64 с.
  132. Imran Sohail and Sikandar Hayat. Network Security and DDoS. – М.: LAP Lambert Academic Publishing, 2010. – 64 с.
  133. Kefa Rabah. Mastering Securing ICT Infrastructure for Corporate Network. – М.: LAP Lambert Academic Publishing, 2014. – 360 с.
  134. Seppo Sirkemaa. On Local Area Network Management. – М.: LAP Lambert Academic Publishing, 2010. – 248 с.
  135. Mohammad Faisal. Networks Security and Communication. – М.: LAP Lambert Academic Publishing, 2012. – 56 с.
  136. Tanveer Zia. A Security Framework for Wireless Sensor Networks (WSN). – М.: LAP Lambert Academic Publishing, 2013. – 160 с.
  137. Dirk Lessner. Network Security for Embedded Systems. – М.: LAP Lambert Academic Publishing, 2009. – 232 с.
  138. Nathan Darmawan. Shielding Your Company with a Better Network Security Design. – М.: LAP Lambert Academic Publishing, 2010. – 180 с.
  139. Mayank Keshariya. Policy Based Management Framework for Mobile Networks. – М.: LAP Lambert Academic Publishing, 2011. – 268 с.
  140. Jun Zheng,Jiantao Gu and Hong Wang. Financial Management and Information Security of Independent Colleges. – М.: LAP Lambert Academic Publishing, 2014. – 256 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. CISCO - это и есть венчурный фонд. интервью с Р. Эйджи, вице-президентом компании CISCO по странам СНГ. М. Лозовский, "Риск-менеджмент", № 11-12, ноябрь-декабрь 2007.
  2. Банковское отделение будущего. интервью с Камероном МакКворри. Cameron MacQuarrie, менеджером по развитию бизнеса компании Cisco Systems в области корпоративных финансов в регионе EMEA. Европа, Ближний Восток, Африка. Н.Ф. Колюшенко, "Расчеты и операционная работа в коммерческом банке", № 2, февраль 2006.
  3. BUSINESS PROCESS MANAGEMENT: система для руководителя. А. Крючкова, "Финансовая газета. Региональный выпуск", № 24, июнь 2005.
  4. Построение системы мотивации по технологии BUSINESS UNIT MANAGEMENT. В. Лунин, "Финансовая газета. Региональный выпуск", № 16, апрель 2005.
  5. Business performance management: источники эффективности. О. Духонина, П. Горянский, "Финансовая газета. Региональный выпуск", № 20, май 2004.
  6. Health management: совершенствуем здоровый образ работы. С. Царенко, "Кадровик.ру", N 5, май 2012 г.
  7. Регулирование операций торгового финансирования: новые инициативы. интервью с Д. Шмандом, вице-председателем Банковской комиссии ICC по supply chain finance, главой подразделения Trade Finance and Cash Management Corporates EMEA в Global Transaction Banking. GTB division Deutsche Bank. Н. Макарова, "Международные банковские операции", N 2, апрель-июнь 2012 г.
  8. Lifestyle management и консьерж-сервис. А.И. Гусев, "Банковский ритейл", N 1, I квартал 2012 г.
  9. Ошибки при формировании и развитии бизнеса private banking & wealth management. А.В. Александров, "Банковский ритейл", N 1, I квартал 2012 г.
  10. Business Intelligence и Business Performance Management: основные термины и концепции. Ю.В. Амириди, "Управление в кредитной организации", N 5, сентябрь-октябрь 2011 г.
  11. Взаимодействие блока private banking & wealth management с розничным бизнесом. А.В. Александров, "Банковский ритейл", N 3, III квартал 2011 г.
  12. Сегментация клиентов в бизнесе private banking & wealth management. Н.В.  Чумак, "Банковский ритейл", N 1, I квартал 2011 г.
  13. Мотивируйте людей на работу, а не на преданность. интервью с Д.  Кленовым, партнером UFG Wealth Management. "Управление персоналом", N 14, июль 2010 г.
  14. Основной арсенал "охотника" - его network: кого он знает на рынке и качество этих отношений. С. Плетнева, "Управление персоналом", № 12, июнь 2009.
  15. Business performance management: современный взгляд. Д. Исаев, "Финансовая газета", № 10, 11, март 2009.
  16. Директора заблудились между governance и management. А. Верников, "Банковское обозрение", № 8, август 2008.
  17. Отечественный private banking продолжает эволюционировать в сторону private wealth management. А.И. Гусев, "Инвестиционный банкинг", № 3, III квартал 2008.

Образцы работ

Тема и предметТип и объем работы
Последствия операции НАТО
Политология
Диплом
80 стр.
Понятие и история брендинга. Анализ создания и стратегия продвижения бренда ***
Электроснабжение городов и промышленных предприятий
Другое
72 стр.
Комплекс маркетинговых коммуникаций в продвижении цифровых СМИ
Маркетинг
Диплом
74 стр.
Продвижение брендов в шоу-бизнесе
Электроснабжение городов и промышленных предприятий
Диплом
79 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Наталья
Сегодня защитила диплом после вашего сопровождения на отлично. Выражаю Вам свою благодарность за оказанную помощь и за Вашу оперативность в решении всех вопросов . Мне было приятно с Вами работать. Кстати, работа после вашего сопровождения прошла проверку на плагиат успешно.