Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Syngress. Managing Cisco Network Security 2E. – М.: , 2010. – 752 с. Дополнительные результаты Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с. Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – М.: , 2012. – 283 с. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с. James T. Turner, Michael G. Gelles. Threat Assessment: A Risk Management Approach. – М.: Routledge, 2003. – 212 с. Relationship and Resource Management in Operations (Securities Institute Global Capital Markets Series). – М.: , 0. – 0 с. John K. Conlon, Melissa Giovagnoli. The Power of Two: How Companies of All Sizes Can Build Alliance Networks That Generate Business Opportunities. – М.: Jossey-Bass, 1998. – 208 с. Lundy Lewis. Managing Business and Service Networks (Innovations in Science Education and Technology). – М.: , 0. – 0 с. Svenja Falk, Alfred J. Beerli, Daniel Diemers. Knowledge Management and Networked Environments. – М.: , 0. – 0 с. Thomas J. Parenty. Digital Defense: What You Should Know About Protecting Your Company's Assets. – М.: , 0. – 0 с. Steve Purser. A Practical Guide to Managing Information Security (Artech House Technology Management Library). – М.: , 0. – 0 с. Effective Security Management, Fourth Edition (Effective Security Management). – М.: , 0. – 0 с. Lawrence Bernstein, C. M. Yuhas. Basic Concepts for Managing Telecommunications Networks: Copper to Sand to Glass to Air (Kluwer Academic/Plenum Publishers Network and Systems Manage). – М.: , 0. – 0 с. Roberta Bragg. MCSE Training Guide (70-220): Windows 2000 Network Security Design, Second Edition. – М.: , 0. – 0 с. H Pasricha. Designing Networks with Cisco (Networking Series). – М.: , 2004. – 0 с. Debt Management and Government Securities Markets in the 21st Century. – М.: , 2004. – 0 с. Martin Johanson. Managing Networks in Transition Economies (International Business and Management). – М.: , 2004. – 0 с. Implementing Environmental Management Accounting: Status and Challenges (Eco-Efficiency in Industry and Science) (Eco-Efficiency in Industry and Science). – М.: , 2005. – 0 с. Pradeep Kumar Ray. Integrated Management from E-Business Perspective: Concepts, Architectures and Methodologies (Network and Systems Management). – М.: , 2003. – 0 с. Peter R., MBA Ramsaroop. Securing Business Intelligence: Knowledge and CyberSecurity in the Post 9/11 World. – М.: , 2004. – 0 с. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с. Environmental Management Accounting - Purpose and Progress (Eco-Efficiency in Industry and Science). – М.: , 2003. – 0 с. Rickland Hollar. Enterprise Web Services Security (Internet Series). – М.: , 2005. – 432 с. John Child. Strategies Of Cooperation: Managing Alliances, Networks, And Joint Ventures. – М.: , 2005. – 400 с. Ron Ben Natan. Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase. – М.: , 2005. – 432 с. John Child, David Faulkner, Stephen Tallman. Cooperative Strategy: Managing Alliances, Networks, and Joint Ventures. – М.: Oxford University Press, 2005. – 472 с. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с. Network Security. – М.: , 2008. – 370 с. James Michael Stewart, Ed Tittel, Mike Chapple. CISSP: Certified Information Systems Security Professional Study Guide. – М.: , 2008. – 841 с. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с. Daniel Clark. Network Access Control 100 Success Secrets - 100 Most Asked NAC Questions on Implementation and Deployment of unify endpoint security technology, user ... and network security enforcement. – М.: , 2008. – 180 с. Strategy and Governance of Networks: Cooperatives, Franchising, and Strategic Alliances (Contributions to Management Science). – М.: , 2008. – 392 с. Michael E. Whitman, Herbert J. Mattord. Management of Information Security. – М.: , 2010. – 592 с. Frank Bunker Gilbreth. Primer of Scientific Management (Classic Reprint). – М.: , 2010. – 160 с. Handbook of Research on Communities of Practice for Organizational Management and Networking: Methodologies for Competitive Advantage. – М.: , 2010. – 539 с. Andy Jones. Risk Management for Computer Security. – М.: , 2010. – 296 с. Heinz-Gerd Hegering. Integrated Management of Networked Systems. – М.: , 2010. – 600 с. Jeff Crume. Inside Internet Security: What Hackers Don't Want You To Know. – М.: , 0. – 0 с. Implementing Environmental Management Accounting: Status and Challenges (Eco-Efficiency in Industry and Science). – М.: , 2005. – 374 с. Advancing Computing, Communication, Control and Management (Lecture Notes in Electrical Engineering). – М.: , 2010. – 294 с. Bill Ferguson. CompTIA Network+ Review Guide. – М.: , 2009. – 264 с. Michael Jang. MasteringTM Red Hat® Linux 9. – М.: , 2003. – 976 с. Todd Lammle. CCENT: Cisco Certified Entry Networking Technician Study Guide. – М.: , 2008. – 648 с. Priscilla Oppenheimer. Troubleshooting Campus Networks. – М.: , 2002. – 608 с. Todd Lammle. Todd Lammle?s CCNA® IOS® Commands Survival Guide. – М.: , 2007. – 312 с. Kelley J.P. Lindberg. Novell?s NetWare® 5 Basics. – М.: , 1999. – 342 с. Dale Liu. Cisco CCNA/CCENT Exam 640-802, 640-822, 640-816 Preparation Kit. – М.: Syngress, 2009. – 848 с. Rob Cameron. Juniper(r) Networks Secure Access SSL VPN Configuration Guide. – М.: , 2010. – 656 с. Owen Poole. Network Security. – М.: , 2010. – 224 с. James Joshi. Network Security: Know It All. – М.: , 2010. – 368 с. Steve Manzuik. Network Security Assessment: From Vulnerability to Patch. – М.: , 2010. – 500 с. Jan L. Harrington. Network Security. – М.: , 2010. – 384 с. Russ Rogers. Network Security Evaluation Using the NSA IEM. – М.: , 2010. – 450 с. Brien Posey. GFI Network Security and PCI Compliance Power Tools. – М.: , 2010. – 488 с. Umer Khan. The Ultimate Cisco and Security and IP Configuration CD. – М.: , 2010. – 0 с. Syngress. Configuring Cisco Network Services for Active Directory Adobe Edition. – М.: , 2010. – 608 с. Syngress. Managing Cisco Network Security 2E. – М.: , 2010. – 752 с. Sm Lynn–jones. Nuclear Diplomacy & Crisis Management – An International Security (Paper). – М.: , 1990. – 364 с. Sm Lynn–jones. Nuclear Diplomacy & Crisis Management – An International Security Reader. – М.: , 1990. – 364 с. Bill English. MCSA/MCSE: Windows® 2000 Network Security Administration Study Guide. – М.: , 2003. – 574 с. Elliotte Rusty Harold. Java Network Programming 2e. – М.: , 2000. – 760 с. Russ Kaufman. MCSA/MCSE: Windows® Server 2003 Network Security Administration Study Guide. – М.: , 2004. – 560 с. Nitesh Dhanjani. Network Security Tools. – М.: , 2005. – 340 с. AA ALEXANDER. Alexander: Managing & Leasing Commercial Properties 2e 2vst 1995 Supp (paper Only). – М.: , 1995. – 98 с. Thomas W. Madron. Network Security in the 90?s. – М.: , 1992. – 304 с. Microsoft. MCSE Training Kit (Exam 70–220) – Designing Microsoft Windows 2000 Network Security. – М.: , 2001. – 864 с. Andrew Lockhart. Network Security Hacks. – М.: , 2004. – 316 с. DAN. Network Security In A Mixed Environment. – М.: , 1998. – 456 с. Ron Gilster. Cisco® Networking For Dummies®. – М.: , 2000. – 470 с. Todd Lammle. CCNA® INTRO: Introduction to Cisco® Networking Technologies Study Guide. – М.: , 2006. – 504 с. AA Alexander. Managing & Leasing Commerical Properties 2e 2VST 1996 Cumulative Supp. – М.: , 1996. – 200 с. Matthew Strebe. Network Security JumpStartTM. – М.: , 2002. – 384 с. Microsoft. MCSA/MCSE Self–Paced Training Kit (Exam 70–218) – Managing a Microsoft Windows 2000 Network Environment 2e. – М.: , 2002. – 1152 с. Pawan K Bhardwaj. A+. Network+, Security+ Exams in a Nutshell. – М.: , 2007. – 812 с. Andrew Oram. Managing Projects with Make 2e. – М.: , 1991. – 152 с. Eric Cole. Network Security Bible. – М.: , 2005. – 694 с. Scott Oaks. Java Security 2e. – М.: , 2001. – 624 с. Ed Tetz. Cisco Networking All–in–One For Dummies®. – М.: , 2011. – 984 с. Janet L Abrahm. A Physician?s Guide to Pain and Symptom Management in Cancer Patients 2e. – М.: , 2005. – 472 с. Janet L Abrahm. A Physician?s Guide to Pain and Symptom Management in Cancer Patients 2e. – М.: , 2005. – 472 с. Eric Cole. Wiley Pathways Network Security Fundamentals Project Manual. – М.: , 2008. – 312 с. Kelly McGrew. Optimizing Cisco Network Administration and Management. – М.: , 2003. – 312 с. Kelly McGrew. Optimizing Cisco Network Infrastructure. – М.: , 2003. – 312 с. Kelly McGrew. Cisco Network Design Toolkit. – М.: , 2003. – 312 с. Kevin Dooley. Cisco IOS Cookbook 2e. – М.: , 2007. – 1236 с. Andrew Lockhart. Network Security Hacks 2e. – М.: , 2006. – 352 с. Michael Salvagno. Cisco® Network Design Handbook. – М.: , 2000. – 338 с. Chris Mcnab. Network Security Assessment 2e. – М.: , 2007. – 464 с. Cryptography & Network Security. – М.: , 2007. – 0 с. Securing Global Transportation Networks. – М.: , 2011. – 312 с. Shon Harris. CISSP All-in-One Exam Guide (+ CD-ROM). – М.: McGraw-Hill Companies, 2010. – 1216 с. Richard A. Deal. Cisco Asa Configuration. – М.: McGraw-Hill, 2009. – 752 с. Comptia Security+ All-In-One Exam Guide, Second Edition (Exam Sy0-201). – М.: , 2011. – 0 с. Pc Quicksteps, Second Edition. – М.: , 2011. – 240 с. Wireless Network Security A Beginners Guide. – М.: , 2011. – 400 с. Cissp Practice Exams. – М.: , 2011. – 414 с. Mac Os X System Administration. – М.: , 2011. – 528 с. Cisco: A Beginner'S Guide, Fourth Edition. – М.: , 2011. – 696 с. Hacking Exposed Cisco Networks. – М.: , 2011. – 400 с. Network Security: The Complete Reference. – М.: , 2011. – 896 с. Fundamentals Of Network Security. – М.: , 2011. – 672 с. Greg Holden. Guide to Firewalls and Network Security: Intrusion Detection and VPNs. – М.: Course Technology, 2003. – 512 с. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . – с. Dave Tyson. Security Convergence: Managing Enterprise Security Risk. – М.: , 2007. – 232 с. Michael Gregg, Eric Seagren, Angela Orebaugh, Matt Jonkman, Raffael Marty. How to Cheat at Configuring Open Source Security Tools (How to Cheat) (How to Cheat). – М.: , 2007. – 528 с. Susan Snedaker. Syngress IT Security Project Management Handbook. – М.: Syngress, 2006. – 612 с. Ido Dubrawsky. How to Cheat at Securing Your Network. – М.: Syngress, 2007. – 432 с. Todd Lammle. CCNA Cisco Certified Network Associate Study Guide (+ CD-ROM). – М.: SYBEX Inc, 2011. – 864 с. Shaek Rana Mohammad Baki Billah and Mohammad Hafizur Rahman. Design & Development of Network Security System using IP Tables. – М.: LAP Lambert Academic Publishing, 2013. – 164 с. Xiangqian Chen. DEFENSE AGAINST NODE COMPROMISE IN SENSOR NETWORK SECURITY. – М.: LAP Lambert Academic Publishing, 2009. – 108 с. Olukemi Asemota. HIV/AIDS MANAGEMENT IN THE WORKPLACE: FOCUS ON SECURITY FORCES. – М.: LAP Lambert Academic Publishing, 2010. – 240 с. C. R. Prajapati,K. P. Singh and A. K. Gupta. Plant Disease Management for Food Security. – М.: LAP Lambert Academic Publishing, 2013. – 676 с. Ahmad A. Hassan. Firewalls: Modeling and Management. – М.: LAP Lambert Academic Publishing, 2012. – 100 с. Xiaodong He. Automated intrusion prevention mechanism in enhancing network security. – М.: Scholars' Press, 2014. – 128 с. Syed Zahidur Rashid. Computer Network Security Monitoring. – М.: Scholars' Press, 2015. – 284 с. Elliot Attipoe. Securing the Public Wireless Network. – М.: LAP Lambert Academic Publishing, 2013. – 92 с. Mamunur Rashid and Bellal Hossain. WiMAX Security Architecture. – М.: LAP Lambert Academic Publishing, 2014. – 76 с. Mohammad AlAhmad. Security threats of finger print biometric in network system. – М.: LAP Lambert Academic Publishing, 2014. – 88 с. Nirbhay Chaubey. Securing AODV Routing Protocol in design of Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2015. – 132 с. Aditya Kumar. Cryptography and Chaos a New Approach in Network Security. – М.: LAP Lambert Academic Publishing, 2015. – 80 с. Luciana Oliveira. Future Network Management. – М.: LAP Lambert Academic Publishing, 2011. – 88 с. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с. Gurpreet juneja. Security:MPLS VPN Network. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Omid Mahdi Ebadati E.,Harleen Kaur M. Afshar Alam and Kaebeh Yaeghoobi. Micro-Firewalls for Dynamic Network Security Framework. – М.: LAP Lambert Academic Publishing, 2012. – 292 с. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с. Vincent Omollo. Enhanced Network Security. – М.: LAP Lambert Academic Publishing, 2013. – 76 с. Firkhan Ali Hamid Ali. Vulnerability Analysis on the Computer Network Security. – М.: LAP Lambert Academic Publishing, 2010. – 72 с. Sunil Kumar Senapati and Prof. Pabitra Mohan Khilar. SECURING FSR PROTOCOL AGAINST DATA PACKET DROPPING IN MANET. – М.: LAP Lambert Academic Publishing, 2010. – 64 с. Imran Sohail and Sikandar Hayat. Network Security and DDoS. – М.: LAP Lambert Academic Publishing, 2010. – 64 с. Kefa Rabah. Mastering Securing ICT Infrastructure for Corporate Network. – М.: LAP Lambert Academic Publishing, 2014. – 360 с. Seppo Sirkemaa. On Local Area Network Management. – М.: LAP Lambert Academic Publishing, 2010. – 248 с. Mohammad Faisal. Networks Security and Communication. – М.: LAP Lambert Academic Publishing, 2012. – 56 с. Tanveer Zia. A Security Framework for Wireless Sensor Networks (WSN). – М.: LAP Lambert Academic Publishing, 2013. – 160 с. Dirk Lessner. Network Security for Embedded Systems. – М.: LAP Lambert Academic Publishing, 2009. – 232 с. Nathan Darmawan. Shielding Your Company with a Better Network Security Design. – М.: LAP Lambert Academic Publishing, 2010. – 180 с. Mayank Keshariya. Policy Based Management Framework for Mobile Networks. – М.: LAP Lambert Academic Publishing, 2011. – 268 с. Jun Zheng,Jiantao Gu and Hong Wang. Financial Management and Information Security of Independent Colleges. – М.: LAP Lambert Academic Publishing, 2014. – 256 с. Лучшие результаты Ничего не найдено Дополнительные результаты CISCO - это и есть венчурный фонд. интервью с Р. Эйджи, вице-президентом компании CISCO по странам СНГ. М. Лозовский, "Риск-менеджмент", № 11-12, ноябрь-декабрь 2007. Банковское отделение будущего. интервью с Камероном МакКворри. Cameron MacQuarrie, менеджером по развитию бизнеса компании Cisco Systems в области корпоративных финансов в регионе EMEA. Европа, Ближний Восток, Африка. Н.Ф. Колюшенко, "Расчеты и операционная работа в коммерческом банке", № 2, февраль 2006. BUSINESS PROCESS MANAGEMENT: система для руководителя. А. Крючкова, "Финансовая газета. Региональный выпуск", № 24, июнь 2005. Построение системы мотивации по технологии BUSINESS UNIT MANAGEMENT. В. Лунин, "Финансовая газета. Региональный выпуск", № 16, апрель 2005. Business performance management: источники эффективности. О. Духонина, П. Горянский, "Финансовая газета. Региональный выпуск", № 20, май 2004. Health management: совершенствуем здоровый образ работы. С. Царенко, "Кадровик.ру", N 5, май 2012 г. Регулирование операций торгового финансирования: новые инициативы. интервью с Д. Шмандом, вице-председателем Банковской комиссии ICC по supply chain finance, главой подразделения Trade Finance and Cash Management Corporates EMEA в Global Transaction Banking. GTB division Deutsche Bank. Н. Макарова, "Международные банковские операции", N 2, апрель-июнь 2012 г. Lifestyle management и консьерж-сервис. А.И. Гусев, "Банковский ритейл", N 1, I квартал 2012 г. Ошибки при формировании и развитии бизнеса private banking & wealth management. А.В. Александров, "Банковский ритейл", N 1, I квартал 2012 г. Business Intelligence и Business Performance Management: основные термины и концепции. Ю.В. Амириди, "Управление в кредитной организации", N 5, сентябрь-октябрь 2011 г. Взаимодействие блока private banking & wealth management с розничным бизнесом. А.В. Александров, "Банковский ритейл", N 3, III квартал 2011 г. Сегментация клиентов в бизнесе private banking & wealth management. Н.В. Чумак, "Банковский ритейл", N 1, I квартал 2011 г. Мотивируйте людей на работу, а не на преданность. интервью с Д. Кленовым, партнером UFG Wealth Management. "Управление персоналом", N 14, июль 2010 г. Основной арсенал "охотника" - его network: кого он знает на рынке и качество этих отношений. С. Плетнева, "Управление персоналом", № 12, июнь 2009. Business performance management: современный взгляд. Д. Исаев, "Финансовая газета", № 10, 11, март 2009. Директора заблудились между governance и management. А. Верников, "Банковское обозрение", № 8, август 2008. Отечественный private banking продолжает эволюционировать в сторону private wealth management. А.И. Гусев, "Инвестиционный банкинг", № 3, III квартал 2008. Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Наталья Сегодня защитила диплом после вашего сопровождения на отлично. Выражаю Вам свою благодарность за оказанную помощь и за Вашу оперативность в решении всех вопросов . Мне было приятно с Вами работать. Кстати, работа после вашего сопровождения прошла проверку на плагиат успешно.