Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с.
  2. Business Process Management Workshops: BPM 2011 International Workshops, Clermont-Ferrand, France, August 29, 2011, Revised Selected Papers, Part II (Lecture Notes in Business Information Processing). – М.: , 2012. – 541 с.
  3. Business Process Management Workshops: BPM 2011 International Workshops, Clermont-Ferrand, France, August 29, 2011, Revised Selected Papers, Part I (Lecture Notes in Business Information Processing). – М.: , 2012. – 543 с.
  4. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с.
  5. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с.
  6. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с.
  7. Alexander Otgaar, Erik Braun, Leo van den Berg. Urban Management and Economics. – М.: , 2012. – 256 с.
  8. Managing Technology in the Operations Function (Securities Institute Global Capital Markets Series). – М.: , 0. – 0 с.
  9. Marilyn R. Seymann. Managing the New Bank Technology: An Executive Blueprint for the Future (Glenlake Business Monographs). – М.: , 0. – 0 с.
  10. Jack J. Champlain. Auditing Information Systems. – М.: , 0. – 0 с.
  11. Mario Piattini. Auditing Information Systems. – М.: , 0. – 0 с.
  12. Timothy F. Carse, Jeffrey Slater. The Payroll Toolkit Nuts and Bolts Techniques to Help You Better Understand and Manage Your Payroll (Revised Second Edition). – М.: , 0. – 0 с.
  13. Jie Lu, Lakhmi C Jain, Guangquan Zhang. Handbook on Decision Making: Vol 2: Risk Management in Decision Making (Intelligent Systems Reference Library). – М.: , 2012. – 472 с.
  14. Robert Muksian. Mathematics of Interest Rates, Insurance, Social Security, and Pensions. – М.: , 0. – 0 с.
  15. Gerald Kovacich. The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition. – М.: , 0. – 0 с.
  16. Ulric J., Jr. Gelinas, Steve G. Sutton, Jane Fedorowicz. Business Processes and Information Technology. – М.: , 0. – 0 с.
  17. Asset Protection and Security Management Handbook. – М.: , 0. – 0 с.
  18. Alexis Gutzman. Unforeseen Circumstances : Strategies and Technologies for Protecting Your Business and Your People in a Less Secure World. – М.: , 0. – 0 с.
  19. Protecting Business Information : A Manager's Guide. – М.: , 0. – 0 с.
  20. Ron Schneiderman. The Mobile Technology Question and Answer Book: A Survival Guide for Business Managers. – М.: , 0. – 0 с.
  21. Handbook of Management Information Systems. – М.: , 0. – 0 с.
  22. Erhan Kozan, Azuma Ohuchi. Operations Research/Management Science at Work (Advances in Information Security). – М.: , 0. – 0 с.
  23. Information Warfare : corporate attack and defence in a digital world (Computer Weekly Professional (Paperback)). – М.: , 0. – 0 с.
  24. Philip P. Purpura. The Security Handbook. – М.: , 0. – 0 с.
  25. M. J. Wilson, B. Maliszewska-Kordybach. Soil Quality, Sustainable Agriculture and Environmental Security in Central and Eastern Europe (NATO Science Series. 2, Environmental Security). – М.: , 0. – 0 с.
  26. Jessica Keyes. Securities Technology Handbook. – М.: , 0. – 0 с.
  27. Ben Baldwin. New Life Insurance Investment Advisor: Achieving Financial Security for You and your Family Through Today's Insurance Products. – М.: , 0. – 0 с.
  28. Max Boisot. Knowledge Assets: Securing Competitive Advantage in the Information Economy. – М.: , 0. – 0 с.
  29. Handbook of Loss Prevention and Crime Prevention, Fourth Edition. – М.: , 0. – 0 с.
  30. Charles J. Austin, Stuart B. Boxerman. Information Systems for Healthcare Management, Sixth Edition. – М.: , 0. – 0 с.
  31. Max H. Boisot. Knowledge Assets: Securing Competitive Advantage in the Information Economy. – М.: , 0. – 0 с.
  32. Rebecca Herold. The Privacy Papers: Managing Technology, Consumer, Employee and Legislative Actions. – М.: , 0. – 0 с.
  33. Timothy Braithwaite. Securing E-Business Systems: A Guide for Managers and Executives. – М.: , 0. – 0 с.
  34. Gerald L. Kovacich, Edward P. Halibozek. The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, First Edition. – М.: , 0. – 0 с.
  35. Socially Responsible IT Management. – М.: , 0. – 0 с.
  36. Thomas J. Parenty. Digital Defense: What You Should Know About Protecting Your Company's Assets. – М.: , 0. – 0 с.
  37. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с.
  38. Andrew Hawker. Security in Information Systems : A Guide for Business and Accounting. – М.: , 0. – 0 с.
  39. Ifip Tc11 Wg11.5 Working Conference on Integrity and Internal Control, Michael Gertz. Integrity and Internal Control in Information Systems V: Ifip Tc11/Wg11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (Iicis), November 11-12, 2002, Bonn, Germany (International Federation for Information Processing. – М.: , 0. – 0 с.
  40. Marko Nordquist. Towards Improved Security Management Practice: Designing an Organizational Model Procedure for the Implementation of Information Security Management in Heterogeneous Information Management. – М.: , 0. – 0 с.
  41. Modern Information Systems for Managers. – М.: , 0. – 0 с.
  42. John Graves. Management Roadmap to Information Security (Kentis Management Roadmaps). – М.: , 0. – 0 с.
  43. Mary Pat McCarthy, Stuart Campbell. Security Transformation: Digital Defense Strategies to Protect your Company's Reputation and Market Share. – М.: , 0. – 0 с.
  44. Steve Purser. A Practical Guide to Managing Information Security (Artech House Technology Management Library). – М.: , 0. – 0 с.
  45. Computer Security. – М.: , 0. – 0 с.
  46. Encyclopedia of Security Management : Techniques and technology. – М.: , 0. – 0 с.
  47. Office & Office Building Security. – М.: , 0. – 0 с.
  48. Ultimate Financial Security Survey. – М.: , 0. – 0 с.
  49. Christopher J. Alberts, Audrey J. Dorofee. Managing Information Security Risks: The OCTAVE Approach. – М.: , 0. – 0 с.
  50. Risk Analysis and the Security Survey. – М.: , 0. – 0 с.
  51. Effective Security Management, Fourth Edition (Effective Security Management). – М.: , 0. – 0 с.
  52. Michael Brosnan, John Messina. Telecommunication Expense Management. – М.: CMP Books, 2000. – 240 с.
  53. Daniel Jennings, Joseph Boyce. Information Assurance. – М.: , 0. – 0 с.
  54. Debra Cameron. Reengineering Business for Success in the Internet Age : Business-to-Business E-commerce Strategies. – М.: , 0. – 0 с.
  55. Peter J. Sander, Peter Sander. The Everything Personal Finance Book: Manage, Budget, Save, and Invest Your Money Wisely (Everything Series). – М.: , 0. – 0 с.
  56. Steve Johnson, Inc. Perspection, Inc. Perspections. Show Me Microsoft Office Outlook 2003. – М.: , 0. – 0 с.
  57. Ifip Tc6, Tc11 Joint Working Conference on Communications and Multimedi, Tomaz Klobucar. Advanced Communications and Multimedia Security: Ifip Tc6/Tc11 Sixth Joint Working Conference on Communications and Multimedia Security, September 26-27, 2002, Portoroz, Slovenia (International Federation for Information Processing, 100). – М.: , 0. – 0 с.
  58. Charles Carrington, Timothy Speed, Juanita Ellis, Steffano Korper. Enterprise Directory and Security Implementation Guide: Designing and Implementing Directories in Your Organization (The Korper and Ellis E-Commerce Books Series). – М.: , 0. – 0 с.
  59. Bhavani Thuraisingham. Web Data Management and Electronic Commerce. – М.: , 0. – 0 с.
  60. C. Warren Axelrod, Axelrod. Outsourcing Information Security. – М.: , 0. – 0 с.
  61. James E. Goldman, Phillip T. Rawles, Julie R. Mariga. Client/Server Information Systems: A Business-Oriented Approach. – М.: , 0. – 0 с.
  62. Harold F. Tipton, Micki Krause, Micki, Cissp Krause. Information Security Management Handbook, Fifth Edition. – М.: , 0. – 0 с.
  63. Ross Malaga. Information Systems Technology. – М.: , 0. – 0 с.
  64. Thomas Peltier, Thomas Pelitier, Justin Peltier, John A. Blackley, Peltier, Associates. Information Security Fundamentals. – М.: , 0. – 0 с.
  65. Steven R. Gordon, Dr. Steven Gordon. Computing Information Technology: The Human Side. – М.: , 0. – 0 с.
  66. Charles Cresson Wood. Best Practices In Internet Commerce Security. – М.: , 0. – 0 с.
  67. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с.
  68. Andrew Kimber. Credit Risk: From Transaction to Portfolio Management (Securities Institute Global Capital Markets). – М.: , 2003. – 0 с.
  69. New Frontiers of Knowledge Management. – М.: , 2005. – 0 с.
  70. Thomas C. Glaessner. Electronic Safety and Soundness: Securing Finance in a New Age (World Bank Working Papers). – М.: , 2004. – 0 с.
  71. Leonard Jessup. Information Systems Today : Why IS Matters (2nd Edition). – М.: , 2005. – 0 с.
  72. Barbara C. McNurlin. Information Systems Management in Practice (7th Edition). – М.: , 2005. – 0 с.
  73. The Secure Online Business: E-Commerce, It Functionality & Business Continuity. – М.: , 2003. – 0 с.
  74. Peter R., MBA Ramsaroop. Securing Business Intelligence: Knowledge and CyberSecurity in the Post 9/11 World. – М.: , 2004. – 0 с.
  75. Current Security Management & Ethical Issues of Information Technology. – М.: , 2003. – 0 с.
  76. Gary Strumeyer. Investing in Fixed Income Securities : Understanding the Bond Market (Wiley Finance). – М.: , 2005. – 0 с.
  77. Economics of Information Security (Advances in Information Security). – М.: , 2004. – 0 с.
  78. Edward Borodzicz. Risk, Crisis and Security Management. – М.: , 2005. – 0 с.
  79. Lech Janczewski. Managerial Guide for Handling Cyber-Terrorism and Information Warfare. – М.: , 2005. – 0 с.
  80. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с.
  81. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с.
  82. Kathleen Sindell. Managing Your Money Online For Dummies. – М.: , 2004. – 0 с.
  83. Building the E-Service Society : E-Commerce, E-Business, and E-Government (IFIP International Federation for Information Processing). – М.: , 2004. – 0 с.
  84. Tom Negrino. Managing Your Personal Finances with Quicken : Visual QuickProject Guide (Visual Quickproject Series). – М.: , 2004. – 160 с.
  85. Jim Stewart. SAP Security: SAP Security Essentials. – М.: Equity Press, 2005. – 136 с.
  86. Ulric J. Gelinas, Richard B. Dull. Accounting Information Systems. – М.: , 2007. – 658 с.
  87. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с.
  88. Mahesh S. Raisinghani. Handbook of Research on Global Information Technology Management in the Digital Economy. – М.: Information Science Reference, 2008. – 588 с.
  89. James Michael Stewart, Ed Tittel, Mike Chapple. CISSP: Certified Information Systems Security Professional Study Guide. – М.: , 2008. – 841 с.
  90. Alan Calder, Steve Watkins. IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002. – М.: , 2008. – 384 с.
  91. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с.
  92. Gerard Blokdijk, Ivanka Menken. Information Security Management Best Practice Workbook: Implementation and Management Roadmap for Threats, Challenges and Solutions - Ready to use supporting documents bringing Theory into Practice. – М.: , 2008. – 124 с.
  93. Handbook on Information Technology in Finance (International Handbooks on Information Systems). – М.: , 2008. – 800 с.
  94. Hamid R. Nemati. Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues (Advances in Information Security and Privacy). – М.: , 2009. – 414 с.
  95. W. Krag Brotby. Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement. – М.: Auerbach Publications, 2009. – 200 с.
  96. Alan Calder. Information Security based on ISO 27001/ISO 27002: A Management Guide. – М.: , 2009. – 83 с.
  97. John Rittinghouse, James Ransome. Cloud Computing: Implementation, Management, and Security. – М.: CRC Press, 2009. – 340 с.
  98. Jake Kouns, Daniel Minoli. Information Technology Risk Management in Enterprise Environments: A Review of Industry Practices and a Practical Guide to Risk Management Teams. – М.: , 2010. – 421 с.
  99. Bel G. Raggad. Information Security Management: Concepts and Practice. – М.: , 2010. – 871 с.
  100. Michael E. Whitman, Herbert J. Mattord. Management of Information Security. – М.: , 2010. – 592 с.
  101. Sid Sirisukha. Protecting Management Information Systems: VPN Competitive Advantage. – М.: , 2010. – 316 с.
  102. Alan Calder, Steve G Watkins. Information Security Risk Management for ISO27001 / ISO27002. – М.: , 2010. – 198 с.
  103. William Manning. CISM Certified Information Security Manager Certification Exam Preparation Course in a Book for Passing the CISM Exam - The How To Pass on Your First Try Certification Study Guide. – М.: , 2010. – 188 с.
  104. Evan Wheeler. Security Risk Management: Building an Information Security Risk Management Program from the Ground Up. – М.: , 2011. – 360 с.
  105. Geographic Information and Cartography for Risk and Crisis Management: Towards Better Solutions (Lecture Notes in Geoinformation and Cartography). – М.: , 2010. – 400 с.
  106. John R. Vacca. Managing Information Security. – М.: , 2010. – 320 с.
  107. Transforming Infoglut! A Pragmatic Strategy For Oracle Enterprise Content Management. – М.: , 2011. – 253 с.
  108. Security Information And Event Management (Siem) Implementation. – М.: , 2011. – 464 с.
  109. Information Technology In Water And Wastewater Utilities, Wef Mop 33. – М.: , 2011. – 376 с.
  110. Harold F. Tipton, Micki Krause. Information Security Management Handbook on CD-ROM, 2003 Edition. – М.: , . –  с.
  111. Yedji Mbangsoua and Dr. Freddie Acosta. Information Security and its Investment Justification. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  112. Dr. Gershon Adzadi and Hon. Ishamael Aryeetey. Principles of Applied Database Management System for Health Sector. – М.: LAP Lambert Academic Publishing, 2010. – 132 с.
  113. Julien Shabani. Information Security for RFID Systems. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.
  114. Debasish Jena. On Protocols for Information Security Services. – М.: LAP Lambert Academic Publishing, 2011. – 136 с.
  115. Aliyu Onipede. Biometrics as a tool for Information Security in Aviation industry. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  116. Herbert Kayitale. The Online Management Information System for UNEB. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  117. Predrag Tasevski. Interactive Cyber Security Awareness Program. – М.: LAP Lambert Academic Publishing, 2012. – 184 с.
  118. Saeed Soltanmohammadi. Improving Information System Security by Evaluating Human Factors. – М.: LAP Lambert Academic Publishing, 2014. – 116 с.
  119. Ahmed AlNunu. How Much Information Security?. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  120. Ubaid Hayee. A Six Sigma Approach to Assure IT Security. – М.: LAP Lambert Academic Publishing, 2011. – 64 с.
  121. Alaa Al-Deen Mohammed Hassan. Information Security Management. – М.: LAP Lambert Academic Publishing, 2013. – 188 с.
  122. Jun Zheng,Jiantao Gu and Hong Wang. Financial Management and Information Security of Independent Colleges. – М.: LAP Lambert Academic Publishing, 2014. – 256 с.
  123. Ying Qian. Mitigating Information Security Risks during Operation Transition. – М.: LAP Lambert Academic Publishing, 2012. – 372 с.

Дополнительные результаты

  1. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с.
  2. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  3. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с.
  4. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с.
  5. Jack J. Champlain. Auditing Information Systems. – М.: , 0. – 0 с.
  6. Jie Lu, Lakhmi C Jain, Guangquan Zhang. Handbook on Decision Making: Vol 2: Risk Management in Decision Making (Intelligent Systems Reference Library). – М.: , 2012. – 472 с.
  7. Eileen M. Milner. Managing Information and Knowledge in the Public Sector. – М.: , 0. – 0 с.
  8. Glencoe. Professional Communication Series: Managing Information in the Workplace, Student Edition. – М.: , 0. – 0 с.
  9. Gerald Kovacich. The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition. – М.: , 0. – 0 с.
  10. Protecting Business Information : A Manager's Guide. – М.: , 0. – 0 с.
  11. Handbook of Management Information Systems. – М.: , 0. – 0 с.
  12. Mehdi Khosrow-Pour. Managing Information Technology in a Global Economy ( 2001 IRMA Conference Proceedings). – М.: , 0. – 0 с.
  13. Charles J. Austin, Stuart B. Boxerman. Information Systems for Healthcare Management, Sixth Edition. – М.: , 0. – 0 с.
  14. James Taylor. Managing Information Technology Projects: Applying Project Management Strategies to Software, Hardware, and Integration Initiatives. – М.: , 0. – 0 с.
  15. Mark B. Desman. Building an Information Security Awareness Program. – М.: , 0. – 0 с.
  16. Haim Mendelson, Johannes Ziegler. Survival of the Smartest: Managing Information for Rapid Action and World-Class Performance. – М.: , 0. – 0 с.
  17. Gerald L. Kovacich, Edward P. Halibozek. The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, First Edition. – М.: , 0. – 0 с.
  18. Felix B., Ph.D. Tan. Global Perspective of Information Technology Management. – М.: , 0. – 0 с.
  19. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с.
  20. Eileen M. Milner. Managing Information and Knowledge in the Public Sector. – М.: , 0. – 0 с.
  21. Ifip Tc11 Wg11.5 Working Conference on Integrity and Internal Control, Michael Gertz. Integrity and Internal Control in Information Systems V: Ifip Tc11/Wg11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (Iicis), November 11-12, 2002, Bonn, Germany (International Federation for Information Processing. – М.: , 0. – 0 с.
  22. Marko Nordquist. Towards Improved Security Management Practice: Designing an Organizational Model Procedure for the Implementation of Information Security Management in Heterogeneous Information Management. – М.: , 0. – 0 с.
  23. Information Resources Management Association. International Conference, Mehdi Khosrowpour. Managing Information Technology Resources in Organizations in the Next Millennium: 1999 Information Resources Management Association International Conference, Hershey, Pa, Usa, May 16-19, 1999. – М.: , 0. – 0 с.
  24. Kenneth C. Laudon, Jane P. Laudon. Management Information Systems ActiveBook. – М.: , 0. – 0 с.
  25. Steve Purser. A Practical Guide to Managing Information Security (Artech House Technology Management Library). – М.: , 0. – 0 с.
  26. Office & Office Building Security. – М.: , 0. – 0 с.
  27. Christopher J. Alberts, Audrey J. Dorofee. Managing Information Security Risks: The OCTAVE Approach. – М.: , 0. – 0 с.
  28. The MCI Directory of Management Information. – М.: , 0. – 0 с.
  29. Daniel Jennings, Joseph Boyce. Information Assurance. – М.: , 0. – 0 с.
  30. Marian Quigley, Marian Quiqley. Information Security and Ethics: Social and Organizational Issues. – М.: , 0. – 0 с.
  31. Mehdi Khosrowpour. Effective Utilization and Management of Emerging Information Technologies: The 1998 Conference Proceedings in Boston Massachusettes. – М.: , 0. – 0 с.
  32. C. Warren Axelrod, Axelrod. Outsourcing Information Security. – М.: , 0. – 0 с.
  33. Harold F. Tipton, Micki Krause, Micki, Cissp Krause. Information Security Management Handbook, Fifth Edition. – М.: , 0. – 0 с.
  34. G. David Garson, G. David Information Technology and Computer Applications in Garson. Public Information Technology: Policy and Management Issues. – М.: , 0. – 0 с.
  35. Ross Malaga. Information Systems Technology. – М.: , 0. – 0 с.
  36. Wendy Currie, Robert Galliers. Rethinking Management Information Systems: An Interdisciplinary Perspective. – М.: , 0. – 0 с.
  37. James A. O'Brien. Management Information Systems w/E-Tutor and PowerWeb. – М.: , 0. – 0 с.
  38. Thomas Peltier, Thomas Pelitier, Justin Peltier, John A. Blackley, Peltier, Associates. Information Security Fundamentals. – М.: , 0. – 0 с.
  39. Charles Cresson Wood. Best Practices In Internet Commerce Security. – М.: , 0. – 0 с.
  40. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с.
  41. Gary C., Ph.D. English. Managing Information and Human Performance. – М.: , 2004. – 0 с.
  42. Aspatore Books. Corporate Security in the Information Age: Industry Leaders from Bose Corporation, Dow Jones, and more on Security Options, Protecting Assets, & Implementing a Strategy (Inside the Minds). – М.: , 2005. – 0 с.
  43. Barbara C. McNurlin. Information Systems Management in Practice (7th Edition). – М.: , 2005. – 0 с.
  44. The Secure Online Business: E-Commerce, It Functionality & Business Continuity. – М.: , 2003. – 0 с.
  45. Peter R., MBA Ramsaroop. Securing Business Intelligence: Knowledge and CyberSecurity in the Post 9/11 World. – М.: , 2004. – 0 с.
  46. John McManus. Information Systems Project Management: Methods, Tools and Techniques. – М.: , 2003. – 0 с.
  47. Matthew Hinton. Introducing Information Management: The business approach. – М.: , 2005. – 0 с.
  48. Keri E. Pearlson. Managing and Using Information Systems. – М.: , 2005. – 0 с.
  49. Economics of Information Security (Advances in Information Security). – М.: , 2004. – 0 с.
  50. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с.
  51. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с.
  52. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с.
  53. Ira Winkler. Zen and the Art of Information Security. – М.: , 2007. – 192 с.
  54. Timothy P. Layton. Information Security. – М.: , 2006. – 222 с.
  55. Michael E. Whitman, Herbert J. Mattord. Principles of Information Security, Second Edition. – М.: , 2004. – 600 с.
  56. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с.
  57. Mahesh S. Raisinghani. Handbook of Research on Global Information Technology Management in the Digital Economy. – М.: Information Science Reference, 2008. – 588 с.
  58. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с.
  59. James Michael Stewart, Ed Tittel, Mike Chapple. CISSP: Certified Information Systems Security Professional Study Guide. – М.: , 2008. – 841 с.
  60. Alan Calder, Steve Watkins. IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002. – М.: , 2008. – 384 с.
  61. Pat Mansel. MIS 100 Success Secrets - Management Information Systems 100 Most Asked Questions: The Missing Management Information Systems Reference Guide. – М.: , 2008. – 192 с.
  62. Social and Human Elements of Information Security: Emerging Trends and Countermeasures (Premier Reference Source). – М.: , 2008. – 412 с.
  63. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с.
  64. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с.
  65. Heinz Willand. Account Management Key-, Strategic- and Gobal Account Management: Information Requirements for the Information Gathering Process to Achieve Competitive Advantage. – М.: , 2008. – 176 с.
  66. Gerard Blokdijk, Ivanka Menken. Information Security Management Best Practice Workbook: Implementation and Management Roadmap for Threats, Challenges and Solutions - Ready to use supporting documents bringing Theory into Practice. – М.: , 2008. – 124 с.
  67. Handbook on Information Technology in Finance (International Handbooks on Information Systems). – М.: , 2008. – 800 с.
  68. Hamid R. Nemati. Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues (Advances in Information Security and Privacy). – М.: , 2009. – 414 с.
  69. W. Krag Brotby. Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement. – М.: Auerbach Publications, 2009. – 200 с.
  70. Effy Oz. Management Information Systems. – М.: Cengage Learning, 2009. – 592 с.
  71. Alan Calder. Information Security based on ISO 27001/ISO 27002: A Management Guide. – М.: , 2009. – 83 с.
  72. John Rittinghouse, James Ransome. Cloud Computing: Implementation, Management, and Security. – М.: CRC Press, 2009. – 340 с.
  73. Jake Kouns, Daniel Minoli. Information Technology Risk Management in Enterprise Environments: A Review of Industry Practices and a Practical Guide to Risk Management Teams. – М.: , 2010. – 421 с.
  74. Bel G. Raggad. Information Security Management: Concepts and Practice. – М.: , 2010. – 871 с.
  75. Michael E. Whitman, Herbert J. Mattord. Management of Information Security. – М.: , 2010. – 592 с.
  76. Sid Sirisukha. Protecting Management Information Systems: VPN Competitive Advantage. – М.: , 2010. – 316 с.
  77. Alan Calder, Steve G Watkins. Information Security Risk Management for ISO27001 / ISO27002. – М.: , 2010. – 198 с.
  78. William Manning. CISM Certified Information Security Manager Certification Exam Preparation Course in a Book for Passing the CISM Exam - The How To Pass on Your First Try Certification Study Guide. – М.: , 2010. – 188 с.
  79. Diana Bedward. Managing Information: Core Management. – М.: , 2010. – 352 с.
  80. Graham Axelby. CIM Coursebook 01/02 Management Information for Marketing Decisions. – М.: , 2010. – 224 с.
  81. David A Wilson. Managing Information. – М.: , 2010. – 288 с.
  82. Carl Roper. Risk Management for Security Professionals. – М.: , 2010. – 304 с.
  83. Evan Wheeler. Security Risk Management: Building an Information Security Risk Management Program from the Ground Up. – М.: , 2011. – 360 с.
  84. Editors Karl Maria Michael de Leeuw, Jan Bergstra. The History of Information Security: A Comprehensive Handbook. – М.: Elsevier Science, 2007. – 900 с.
  85. Geographic Information and Cartography for Risk and Crisis Management: Towards Better Solutions (Lecture Notes in Geoinformation and Cartography). – М.: , 2010. – 400 с.
  86. Global Perspectives In Information Security. – М.: , 2008. – 896 с.
  87. John R. Vacca. Managing Information Security. – М.: , 2010. – 320 с.
  88. G. Manoilov. Elsevier's Dictionary of Information Security. – М.: , 2010. – 772 с.
  89. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с.
  90. George L Stefanek. Information Security Best Practices. – М.: , 2010. – 160 с.
  91. Sari Greene. Sustainable Information Security. – М.: , 2010. – 400 с.
  92. John R. Vacca. Computer and Information Security Handbook. – М.: , 2010. – 928 с.
  93. Russ Rogers. Managing IT Security Ultimate CD. – М.: , 2010. – 0 с.
  94. Louis Fried. Managing Information Technology in Turbulent Times. – М.: , 1995. – 368 с.
  95. R. I. Tricker. Management Information and Control Systems. – М.: , 1982. – 358 с.
  96. Krag Brotby. Information Security Governance. – М.: , 2009. – 190 с.
  97. M BERGERUD. Bergerud: ?study Guide? To Accompany ?computers? F Or ?managing? Information (pr Only). – М.: , 1987. – 170 с.
  98. M SS BERGERUD. Bergerud: ?computers? For ?managing? Information. – М.: , 1987. – 480 с.
  99. Eric F. Wolstenholme. The Evaluation of Management Information Systems. – М.: , 1993. – 256 с.
  100. RI TRICKER. Tricker ?management? Information And Control Syste Ms. – М.: , 1976. – 435 с.
  101. M SS BERGERUD. Bergerud: ?tm? Instructor?s Manual T/a ?computers? For?managing? Information (pr Only). – М.: , 1987. – 106 с.
  102. Turfgrass Management Information Directory. – М.: , 2002. – 256 с.
  103. Gordon McCray. Management Information Systems. – М.: , 2004. – 480 с.
  104. Managing Information Systems for Profit. – М.: , 1990. – 380 с.
  105. Management Information Systems. Global Edition. – М.: , 2011. – 0 с.
  106. Security Information And Event Management (Siem) Implementation. – М.: , 2011. – 464 с.
  107. Managing Information And Statistics. – М.: , 2011. – 320 с.
  108. Harold F. Tipton, Micki Krause. Information Security Management Handbook on CD-ROM, 2003 Edition. – М.: , . –  с.
  109. Dave Tyson. Security Convergence: Managing Enterprise Security Risk. – М.: , 2007. – 232 с.
  110. S.N. NANDY. Management Information Systems on Himalayan Database. – М.: LAP Lambert Academic Publishing, 2009. – 64 с.
  111. Rohana Mohamad Rashid. Determining Influencing Factors of Information Security Culture. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  112. Mohammadreza Khoei,Misam Kashefi and Pezhman Ghadimi. Supply Chain Management Information System (SCMIS). – М.: LAP Lambert Academic Publishing, 2011. – 148 с.
  113. Simon-Peter Kafui Aheto. Educational Management Information Systems (EMIS). – М.: LAP Lambert Academic Publishing, 2012. – 152 с.
  114. Kaushik Bhagowati,P.K. Malhotra and R.N. Sahoo. GIS Assisted Farm Management Information Sysem. – М.: LAP Lambert Academic Publishing, 2012. – 148 с.
  115. Chrispen Chiome,Primrose Kurasha and Raphinos A. Chabaya. Management Information Systems (MIS). – М.: LAP Lambert Academic Publishing, 2011. – 356 с.
  116. Yedji Mbangsoua and Dr. Freddie Acosta. Information Security and its Investment Justification. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  117. Yasser Alshehri. Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 156 с.
  118. Julien Shabani. Information Security for RFID Systems. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.
  119. Debasish Jena. On Protocols for Information Security Services. – М.: LAP Lambert Academic Publishing, 2011. – 136 с.
  120. Aliyu Onipede. Biometrics as a tool for Information Security in Aviation industry. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  121. Furhan Mehmood and Rajia Rafique. Information Security in Financial Organizations. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  122. Amir Hakimi Ghotrom. Management Information System: What Organizations Need to be Succeed. – М.: LAP Lambert Academic Publishing, 2010. – 128 с.
  123. Omar Zakaria. Information Security Culture. – М.: LAP Lambert Academic Publishing, 2013. – 248 с.
  124. Saeed Soltanmohammadi. Improving Information System Security by Evaluating Human Factors. – М.: LAP Lambert Academic Publishing, 2014. – 116 с.
  125. frankie tvrz and marijke coetzee. Information Security of a Bluetooth-enabled handheld device. – М.: LAP Lambert Academic Publishing, 2010. – 180 с.
  126. Ahmed AlNunu. How Much Information Security?. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  127. Jeffy Mwakalinga. A Framework for Adaptive Information Security Systems. – М.: LAP Lambert Academic Publishing, 2011. – 364 с.
  128. Meysam Namayandeh. Development of Computer Ethical Framework for Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 132 с.
  129. Shana Ponelis. Using data warehousing to deliver integrated management information. – М.: LAP Lambert Academic Publishing, 2010. – 144 с.
  130. Muhammad Imran Tariq. SLA based Information Security Metrics in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2014. – 192 с.
  131. Arsalan Safari. Integrating BPM & Management Information System Utilizing a Case Study. – М.: LAP Lambert Academic Publishing, 2015. – 88 с.
  132. Alaa Al-Deen Mohammed Hassan. Information Security Management. – М.: LAP Lambert Academic Publishing, 2013. – 188 с.
  133. Jun Zheng,Jiantao Gu and Hong Wang. Financial Management and Information Security of Independent Colleges. – М.: LAP Lambert Academic Publishing, 2014. – 256 с.
  134. Oluwasanmi Olorunninwo. Business: Effect of Management Information Systems in Nigeria. – М.: LAP Lambert Academic Publishing, 2013. – 108 с.
  135. Maxwell Musingafi,Emmanuel Dumbu and Hlupeko Dube. Project Management Information Systems. – М.: LAP Lambert Academic Publishing, 2011. – 264 с.
  136. Ying Qian. Mitigating Information Security Risks during Operation Transition. – М.: LAP Lambert Academic Publishing, 2012. – 372 с.
  137. M. CHITHIK RAJA,A. Leo John Baptist and Er. M. Mohamed Asik. INTRODUCTION TO MANAGEMENT INFORMATION SYSTEM. – М.: LAP Lambert Academic Publishing, 2011. – 76 с.
  138. Reza Mohammady Garfamy. Management Information Systems in Pharmaceuticals. – М.: LAP Lambert Academic Publishing, 2010. – 172 с.
  139. Kofi Ayebi-Arthur. Awareness and Utilisation of Education Management Information System. – М.: LAP Lambert Academic Publishing, 2013. – 84 с.
  140. Abosede Abdulai and Adeyemi Alatishe. Design and Implementation of a School Management Information System. – М.: , 2014. – 88 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. BUSINESS PROCESS MANAGEMENT: система для руководителя. А. Крючкова, "Финансовая газета. Региональный выпуск", № 24, июнь 2005.
  2. Построение системы мотивации по технологии BUSINESS UNIT MANAGEMENT. В. Лунин, "Финансовая газета. Региональный выпуск", № 16, апрель 2005.
  3. Business performance management: источники эффективности. О. Духонина, П. Горянский, "Финансовая газета. Региональный выпуск", № 20, май 2004.
  4. Health management: совершенствуем здоровый образ работы. С. Царенко, "Кадровик.ру", N 5, май 2012 г.
  5. Регулирование операций торгового финансирования: новые инициативы. интервью с Д. Шмандом, вице-председателем Банковской комиссии ICC по supply chain finance, главой подразделения Trade Finance and Cash Management Corporates EMEA в Global Transaction Banking. GTB division Deutsche Bank. Н. Макарова, "Международные банковские операции", N 2, апрель-июнь 2012 г.
  6. Lifestyle management и консьерж-сервис. А.И. Гусев, "Банковский ритейл", N 1, I квартал 2012 г.
  7. Ошибки при формировании и развитии бизнеса private banking & wealth management. А.В. Александров, "Банковский ритейл", N 1, I квартал 2012 г.
  8. О качестве сервиса, связанного с запросами на медицинскую информацию. Medical Information Service?. А. Беденков, "Ремедиум", № 1, январь 2012.
  9. Business Intelligence и Business Performance Management: основные термины и концепции. Ю.В. Амириди, "Управление в кредитной организации", N 5, сентябрь-октябрь 2011 г.
  10. Взаимодействие блока private banking & wealth management с розничным бизнесом. А.В. Александров, "Банковский ритейл", N 3, III квартал 2011 г.
  11. Сегментация клиентов в бизнесе private banking & wealth management. Н.В.  Чумак, "Банковский ритейл", N 1, I квартал 2011 г.
  12. Мотивируйте людей на работу, а не на преданность. интервью с Д.  Кленовым, партнером UFG Wealth Management. "Управление персоналом", N 14, июль 2010 г.
  13. Business performance management: современный взгляд. Д. Исаев, "Финансовая газета", № 10, 11, март 2009.
  14. Директора заблудились между governance и management. А. Верников, "Банковское обозрение", № 8, август 2008.
  15. Отечественный private banking продолжает эволюционировать в сторону private wealth management. А.И. Гусев, "Инвестиционный банкинг", № 3, III квартал 2008.

Образцы работ

Тема и предметТип и объем работы
Основы избирательных компаний
PR
Диплом
72 стр.
Public relations в политике как особый «срез» общественных отношений
PR
Курсовая работа
35 стр.
Последствия операции НАТО
Политология
Диплом
80 стр.
Слияния и поглощения Мировая и Российская практика
Мировая экономика
Диплом
99 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Валерия
Алина! Спасибо большое за консультацию. Я сегодня сдала на пятерку!!! Очень рада. Еще раз спасибо.