Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Chamseddine Talhi. Memory-Constrained Security Enforcement. – М.: LAP Lambert Academic Publishing, 2009. – 220 с.

Дополнительные результаты

  1. Francis Groves. Corporate Actions - A Concise Guide: An introduction to securities events. – М.: , 2012. – 230 с.
  2. Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с.
  3. Data Privacy Management and Autonomous Spontaneus Security: 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, ... Computer Science / Security and Cryptology). – М.: , 2012. – 334 с.
  4. Security and Privacy in Mobile Information and Communication Systems: Third International ICST Conference, MOBISEC 2011, Aalborg, Denmark, May 17-19, ... and Telecommunications Engineering). – М.: , 2012. – 195 с.
  5. Constructive Side-Channel Analysis and Secure Design: Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings ... Computer Science / Security and Cryptology). – М.: , 2012. – 280 с.
  6. Public Key Infrastructures, Services and Applications: 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected ... Computer Science / Security and Cryptology). – М.: , 2012. – 219 с.
  7. Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  8. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с.
  9. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с.
  10. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 515 с.
  11. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  12. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с.
  13. Smart Card Research and Advanced Applications: 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, ... Computer Science / Security and Cryptology). – М.: , 2012. – 357 с.
  14. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с.
  15. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с.
  16. Security and Development in Global Politics: A Critical Comparison. – М.: , 2012. – 360 с.
  17. Joseph F. Stenken JD CLU ChFc. Social Security & Medicare Facts 2012. – М.: , 2012. – 451 с.
  18. Luis Lobo-Guerrero. Insuring Security: Biopolitics, security and risk. – М.: , 2012. – 178 с.
  19. Region-based Memory Management. – М.: , 2012. – 72 с.
  20. CCH Editorial Staff. Social Security Explained 2012. – М.: , 2012. – 298 с.
  21. Terrorism and the Olympics: Major Event Security and Lessons for the Future. – М.: , 2012. – 272 с.
  22. Sheila R Ronis. Economic Security: Neglected Dimension of National Security?. – М.: , 2012. – 128 с.
  23. Denise Garcia. Disarmament Diplomacy and Human Security: Regimes, Norms and Moral Progress in International Relations. – М.: , 2012. – 0 с.
  24. Securities Compliance Index. Securities Compliance Index, Second Edition: A Topical Guide To U.S. Securities Regulation. – М.: , 2012. – 512 с.
  25. American Bar Association, Thomas Lee Hazen. Securities Regulation: Corporate Counsel Guides. – М.: , 2012. – 540 с.
  26. Lionel Martellini, Philippe Priaulet, StA©phane Priaulet. Fixed-Income Securities : Valuation, Risk Management and Portfolio Strategies (The Wiley Finance Series). – М.: , 0. – 0 с.
  27. Jeffrey C. Hooke. Security Analysis on Wall Street. – М.: , 0. – 0 с.
  28. Martin Stone, Spencer Strauss. Secure Your Financial Future Investing in Real Estate. – М.: , 0. – 0 с.
  29. William Rini. Fundamentals of the Securities Industry. – М.: , 0. – 0 с.
  30. Frank J. Fabozzi, John N. Dunlevy, Frank J. Fabozzi, John N. Dunlevy. Real Estate Backed Securities. – М.: , 0. – 0 с.
  31. David F. Teitelbaum. The Procrastinator's Guide to Financial Security: How Anyone Over 40 Can Still Build a Strong Portfolio--and Retire Comfortably. – М.: , 0. – 0 с.
  32. Giorgio S. Questa. Fixed Income Analysis for the Global Financial Market: Money Market, Foreign Exchange, Securities, and Derivatives. – М.: Wiley, 1999. – 368 с.
  33. Bambi Holzer. Retire Rich : The Baby Boomer's Guide to a Secure Future. – М.: , 0. – 0 с.
  34. Peter A. Diamond. Taxation, Incomplete Markets, and Social Security (Munich Lectures). – М.: , 0. – 0 с.
  35. William T. Moore. Real Options and Option-Embedded Securities. – М.: , 0. – 0 с.
  36. Marilyn Greenstein, Todd M. Feinman. Electronic Commerce: Security Risk Management and Control. – М.: , 0. – 0 с.
  37. Kenneth S. Hackel, Joshua Livnat. Cash Flow and Security Analysis. – М.: , 0. – 0 с.
  38. Changmin Chun. Cross-border Transactions of Intermediated Securities: A Comparative Analysis in Substantive Law and Private International Law. – М.: , 2012. – 524 с.
  39. Paul Osterman. Securing Prosperity: The American Labor Market: How It Has Changed and What to Do About It. – М.: , 0. – 0 с.
  40. David Bruce Smith. Conversations with Papa Charlie: A Memory of Charles E. Smith. – М.: , 0. – 0 с.
  41. Elizabeth Roberts. A Woman's Place: An Oral History of Working-Class Women 1890-1940 (Family, Sexuality and Social Relations in Past Times). – М.: , 0. – 0 с.
  42. Paul F. Clark, John Delaney, Ann Frost. Collective Bargaining in the Private Sector (Industrial Relations Research Association Series). – М.: , 0. – 0 с.
  43. Jianmin Zhao, Bruce J. Dickson, Chien-Min Zhao. Remaking the Chinese State: Strategies, Society, and Security (Asia's Transformations). – М.: , 0. – 0 с.
  44. Lenore G. Martin. New Frontiers in Middle East Security. – М.: , 0. – 0 с.
  45. Martin S. Feldstein, Horst Siebert. Social Security Pension Reform in Europe. – М.: , 0. – 0 с.
  46. Rattan Lal, David Hansen, Norman Uphoff, Steven Slack, Rattan Lal. Food Security and Environmental Quality in the Developing World. – М.: , 0. – 0 с.
  47. Frank J. Fabozzi, Frank J. Fabozzi. Investing In Commercial Mortgage-Backed Securities. – М.: , 0. – 0 с.
  48. Henry J. Bailey, Richard B. Hagedorn. Secured Transactions in a Nutshell Nutshell Series) (4th ed). – М.: , 0. – 0 с.
  49. Douglas Hearth, Janis K. Zaima, Janis Zaima. Contemporary Investments: Security and Portfolio Analysis. – М.: , 0. – 0 с.
  50. Dean Baker, Mark Weisbrot. Social Security: The Phony Crisis. – М.: , 0. – 0 с.
  51. Andrew W. Lo. The Industrial Organization and Regulation of the Securities Industry (National Bureau of Economic Research Conference Report). – М.: , 0. – 0 с.
  52. Sylvester J. Schieber, John B. Shoven. The Real Deal: The History and Future of Social Security. – М.: , 0. – 0 с.
  53. Red Ink : The Budget, Deficit, and Debt of the U.S. Government. – М.: , 0. – 0 с.
  54. W. Kip Viscusi. Rational Risk Policy: The 1996 Arne Ryde Memorial Lectures (Arne Ryde Memorial Lectures). – М.: , 0. – 0 с.
  55. Henry J. Aaron, John B. Shoven, Benjamin M. Friedman, Alvin Hansen Symposium on Public Policy 1998 Harvard University). Should the United States Privatize Social Security? (Alvin Hansen Symposium Series on Public Policy). – М.: , 0. – 0 с.
  56. Peter M. Robinson. Time Series With Long Memory (Advanced Texts in Econometrics). – М.: , 0. – 0 с.
  57. Larry Elliott, Dan Atkinson. The Age of Insecurity. – М.: , 0. – 0 с.
  58. John B. Shoven. Administrative Aspects of Investment-Based Social Security Reform (Conference Report (National Bureau of Economic Research).). – М.: , 0. – 0 с.
  59. Risk Management, Speculation, and Derivative Securities. – М.: , 0. – 0 с.
  60. Allen W., Ph.D. Smith. The Alleged Budget Surplus, Social Security, and Voodoo Economics. – М.: , 0. – 0 с.
  61. Hans Lofgren. Food, Agriculture, and Economic Policy in the Middle East and North Africa. – М.: , 0. – 0 с.
  62. Pam Lassiter. The New Job Security. – М.: , 0. – 0 с.
  63. David S. Katz, Ilan Caspi, David S. Katz, Ilan Caspi. Executive's Guide to Personal Security. – М.: , 0. – 0 с.
  64. Michael V. Maddaloni. Transitions: A Guide on Moving from Law Enforcement or the Military into a Second Career. – М.: , 0. – 0 с.
  65. Debbie J. Goodman. Enforcing Ethics: A Scenario-Based Workbook for Police and Corrections Recruits, Officers and Supervisors, Second Edition. – М.: , 0. – 0 с.
  66. Paul Voillis, Paul Viollis. Jane's Workplace Security Handbook. – М.: , 0. – 0 с.
  67. Littler Mendelson Attorneys, Shanti Atkins, Garen Dodge, Ronald Manthey, Marlene Muraco. Beyond Big Brother: The New World of Workplace Privacy. – М.: , 0. – 0 с.
  68. Gerald Kovacich. The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition. – М.: , 0. – 0 с.
  69. Donald B. Hutton, Anna Mydlarz. Guide to Law Enforcement Careers (Barron's Guide to Law Enforcement Careers). – М.: , 0. – 0 с.
  70. Tim Perry. Basic Patrol Procedures: A Foundation for the Law Enforcement Student : A Review for the Veteran Officer. – М.: , 0. – 0 с.
  71. The Justice Research Association. Your Criminal Justice Career: A Guidebook (2nd Edition). – М.: , 0. – 0 с.
  72. Safety and the Security Professional : A Guide to Occupational Safety and Health Strategies. – М.: , 0. – 0 с.
  73. Jim Wylie, Cynthia Wylie, J. P. Wylie. L. E. A. D. - California: Law Enforcement Agency Directory. – М.: , 0. – 0 с.
  74. Randy Narramore. How to Prepare for an Interview and Obtain a Job As a Law Enforcement Officer. – М.: , 0. – 0 с.
  75. Applying Knowledge Management: Techniques for Building Corporate Memories. – М.: , 0. – 0 с.
  76. Asset Protection and Security Management Handbook. – М.: , 0. – 0 с.
  77. Alexis Gutzman. Unforeseen Circumstances : Strategies and Technologies for Protecting Your Business and Your People in a Less Secure World. – М.: , 0. – 0 с.
  78. Safe Schools: A Security and Loss Prevention Plan. – М.: , 0. – 0 с.
  79. Dennis Dalton. Rethinking Corporate Security in the Post 9-11 Era. – М.: , 2003. – 0 с.
  80. Security Operations Management. – М.: , 0. – 0 с.
  81. Security Management : Business Strategies for Success. – М.: , 0. – 0 с.
  82. Rose Dieng-Kuntz, Nada Matta. Knowledge Management and Organizational Memories. – М.: , 0. – 0 с.
  83. Sandra M. Rocks. The ABCs of the Ucc Article 8 Investment Securities. – М.: , 0. – 0 с.
  84. Susan Echaore-McDavid. Career Opportunities in Law Enforcement, Security, and Protective Services (The Career Opportunities Series). – М.: , 0. – 0 с.
  85. Philip P. Purpura. The Security Handbook. – М.: , 0. – 0 с.
  86. Leigh Wade. Careers in Private Security: How to Get Started, How to Get Ahead. – М.: , 0. – 0 с.
  87. Anne McKinney. Real Resumes for Police, Law Enforcement and Security Jobs: Including Real Resumes Used to Change Careers and Transfer Skills to Other Industries). – М.: , 0. – 0 с.
  88. Christopher M. Dent. Asia-Pacific Economic and Security Co-Operation: New Regional Agendas. – М.: , 0. – 0 с.
  89. Dean Baker, Mark Weisbrot, Dean Baker. Social Security: The Phony Crisis. – М.: , 0. – 0 с.
  90. Julia Lowell, C. R. Neu, Daochi Tong, National Defense Research Institute, National Security Research Institute. Financial Crises and Contagion in Emerging Market Countries. – М.: , 0. – 0 с.
  91. Joseph S. Nye, William A. Owens, James R. Schlesinger, R. James Woolsey, James A. Lewis, Joseph S., Jr. Nye, James Andrew Lewis, Erin Schlather, Csis Commission on Technology Security in the Twenty-First Century. Computer Exports and National Security: New Tools for a New Century : A Report of the Csis Commission on Technology Security in the 21St-Century (Csis Panel Reports.). – М.: , 0. – 0 с.
  92. Learning Express. Treasury Enforcement Agent Exam. – М.: , 0. – 0 с.
  93. T. A. Brown. Business Security: Over 50 Ways To Protect Your Business!. – М.: , 2004. – 0 с.
  94. Committee on Federal Regulation of Securities Committee. The Fund Director's Guidebook: Third Edition (Fund Director's Guidebook). – М.: , 2006. – 128 с.
  95. Steinberg. Master the Federal Law Enforcement Exams 5th edition (Law Enforcement Exams). – М.: , 2005. – 224 с.
  96. Susan Echaore-McDavid. Career Opportunities In Law Enforcement, Security And Protective Services (Career Opportunities). – М.: , 2005. – 272 с.
  97. Meridian Securities Market. World Stock Exchange Fact Book. – М.: , 2008. – 0 с.
  98. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с.
  99. Daniel Clark. Network Access Control 100 Success Secrets - 100 Most Asked NAC Questions on Implementation and Deployment of unify endpoint security technology, user ... and network security enforcement. – М.: , 2008. – 180 с.
  100. CompTIA Security+: Certification Kit (комплект из 3 книг + 2 CD-ROM). – М.: Sybex, 2009. – 1440 с.
  101. New York, N., Pullman Memorial Universalist Church. Albion. Dedication of the Pullman Memorial Universalist Church: January Thirty-first, 1895, Albion, N.Y. – М.: , 2009. – 32 с.
  102. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с.
  103. Edited by Andrea Bianchi. Enforcing International Law Norms Against Terrorism. – М.: , 2011. – 576 с.
  104. Ademola Abass. Regional Organisations and the Development of Collective Security. – М.: , 2011. – 272 с.
  105. Edited by Andrea Bianchi. Enforcing International Law Norms Against Terrorism. – М.: , 2011. – 576 с.
  106. Erika de Wet. The Chapter VII Powers of the United Nations Security Council. – М.: , 2011. – 432 с.
  107. Karen Yeung. Securing Compliance. – М.: , 2011. – 307 с.
  108. Mobile Application Security. – М.: , 2011. – 432 с.
  109. Timothy Stapko. Practical Embedded Security: Building Secure Resource-Constrained Systems. – М.: Newnes, 2007. – 480 с.
  110. Govind Sharma and Manish Gupta. Secure routing in wireless mobile Ad-Hoc network. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  111. Abdul Naeem. Shared Memory Consistency Models. – М.: LAP Lambert Academic Publishing, 2013. – 260 с.
  112. Glenn Varona. Police Ethics and Governance. – М.: LAP Lambert Academic Publishing, 2012. – 432 с.
  113. Hakan Aydogan. Satellite Technologies and Global Security. – М.: LAP Lambert Academic Publishing, 2014. – 292 с.
  114. Memory Zonde-Kachambwa. Empowered Women in Management: The Case of DWAF, Cape Town, SA. – М.: LAP Lambert Academic Publishing, 2012. – 112 с.
  115. Charles Lusweti. Households and Food Security in Developing Countries. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  116. Dodeye Williams. African Security Regimes and the Peace Process in Darfur. – М.: LAP Lambert Academic Publishing, 2012. – 232 с.
  117. Katharina Leinius. An Imbalance between Security and Liberty?. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  118. Lionel Ngumuya. Breaking the Dependency Syndrome and Poverty in the Developing World. – М.: LAP Lambert Academic Publishing, 2013. – 132 с.
  119. Memory Mandiudza. Compactness on metric and topological spaces. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  120. Ruhizal Roosli,Atasya Osmadi and Phil O'Keefe. Enforcement, Regulatory & Compliance. – М.: LAP Lambert Academic Publishing, 2014. – 364 с.
  121. Munyabarenzi Faustin. The incidence of security interest in movable property. – М.: LAP Lambert Academic Publishing, 2013. – 84 с.
  122. Raymundo Arenas Pereda. Registering and Enforcing Security Interests. – М.: LAP Lambert Academic Publishing, 2011. – 76 с.
  123. Subhankar Chattopadhyay and Ashok Kumar Turuk. Key Pre-distribution and Key Revocation in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2011. – 72 с.
  124. Divya Rajasekar. Cluster Based Secure Key Establishment Protocol for WSN. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  125. Piotr Szczechowiak. Security in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2011. – 248 с.
  126. Shilpa Jaiswal and Sumeet Agrawal. Detection of Network Worm to Eliminate Security Threats in MANET. – М.: LAP Lambert Academic Publishing, 2012. – 52 с.
  127. Sohail Abbas. A Layered Security Approach for Cooperation Enforcement in MANETs. – М.: LAP Lambert Academic Publishing, 2012. – 280 с.
  128. Manuj Mishra,Govind Sharma and Ram Pathak. Secure Routing In Wireless Mobile Ad Hoc Network. – М.: LAP Lambert Academic Publishing, 2014. – 84 с.
  129. Volkan ERTURK,Dr. Ali ARIFOGLU and Dr. Attila OZGIT. A Framework Based On Continuous Security Monitoring. – М.: LAP Lambert Academic Publishing, 2010. – 148 с.
  130. Julien Shabani. Information Security for RFID Systems. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.
  131. A. S. N. Chakravarthy. Password Authentication Using Associative Memories. – М.: LAP Lambert Academic Publishing, 2012. – 188 с.
  132. Dirk Lessner. Network Security for Embedded Systems. – М.: LAP Lambert Academic Publishing, 2009. – 232 с.
  133. Chamseddine Talhi. Memory-Constrained Security Enforcement. – М.: LAP Lambert Academic Publishing, 2009. – 220 с.
  134. Ubaid Hayee. A Six Sigma Approach to Assure IT Security. – М.: LAP Lambert Academic Publishing, 2011. – 64 с.
  135. Rinaldi Yulius. DESIGN OF A CYBER SECURITY LABORATORY. – М.: LAP Lambert Academic Publishing, 2010. – 140 с.
  136. Al-Sakib Khan Pathan. Securing WSN with Lightweight Resource-Efficient Schemes. – М.: LAP Lambert Academic Publishing, 2011. – 116 с.
  137. Jeremiah Akita and Koudjo Koumadi. Evaluating Cloud Storage Security In Ghana. – М.: LAP Lambert Academic Publishing, 2014. – 104 с.
  138. sayensu ayele. Contribution of Small-Scale Fisheries to Household Food Security:. – М.: LAP Lambert Academic Publishing, 2013. – 112 с.
  139. Robell Damtie and Fentay Misganaw. The Role of Women Household Heads on Food Security. – М.: LAP Lambert Academic Publishing, 2012. – 124 с.
  140. Michael Hale Ligh, Andrew Case, Jamie Levy, AAron Walters. The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory. – М.: Wiley, . – 912 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

Ничего не найдено

Образцы работ

Тема и предметТип и объем работы
Социальная память
Социология
Курсовая работа
30 стр.
Последствия операции НАТО
Политология
Диплом
80 стр.
Платежные системы в Интернете
Информатика
Диплом
102 стр.
Италия и арабо-исламский мир
Политология
Реферат
19 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Денис
Сегодня была защита. Я защитился на оценку хорошо. Спасибо большое Вам за помощь!!!