Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Ying Qian. Mitigating Information Security Risks during Operation Transition. – М.: LAP Lambert Academic Publishing, 2012. – 372 с.

Дополнительные результаты

  1. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с.
  2. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 515 с.
  3. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  4. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с.
  5. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с.
  6. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с.
  7. Konstantinos Tatsiramos. Informal Employment in Emerging and Transition Economies (Research in Labor Economics). – М.: , 2012. – 300 с.
  8. Adrian R. Bowden, Malcolm R. Lane, Julia H. Martin. Triple Bottom Line Risk Management: Enhancing Profit, Environmental Performance, and Community Benefits. – М.: , 0. – 0 с.
  9. Yusufali F. Musaji. Integrated Auditing of ERP Systems. – М.: , 0. – 0 с.
  10. Marilyn Greenstein, Todd M. Feinman. Electronic Commerce: Security Risk Management and Control. – М.: , 0. – 0 с.
  11. Jack J. Champlain. Auditing Information Systems. – М.: , 0. – 0 с.
  12. John Wang. Innovations in Information Systems for Business Functionality and Operations Management. – М.: , 2012. – 378 с.
  13. Edward G. Rogoff. Bankable Business Plans: Second Edition. – М.: , 2012. – 324 с.
  14. JA?rg Klarer, Bedřich Moldan. The Environmental Challenge for Central European Economies in Transition. – М.: , 0. – 0 с.
  15. Vladimir Mikhalev. Inequality and Social Structure During the Transition (Studies in Development Economics and Policy). – М.: , 0. – 0 с.
  16. Risk Management, Speculation, and Derivative Securities. – М.: , 0. – 0 с.
  17. Gerald Kovacich. The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition. – М.: , 0. – 0 с.
  18. Safety and the Security Professional : A Guide to Occupational Safety and Health Strategies. – М.: , 0. – 0 с.
  19. Douglas G. Hoffman. Managing Operational Risk: 20 Firmwide Best Practice Strategies. – М.: Wiley, 2002. – 540 с.
  20. Asset Protection and Security Management Handbook. – М.: , 0. – 0 с.
  21. Protecting Business Information : A Manager's Guide. – М.: , 0. – 0 с.
  22. Erhan Kozan, Azuma Ohuchi. Operations Research/Management Science at Work (Advances in Information Security). – М.: , 0. – 0 с.
  23. Leigh Wade. Careers in Private Security: How to Get Started, How to Get Ahead. – М.: , 0. – 0 с.
  24. Ana Julia Jatar-Hausmann. The Cuban Way: Capitalism, Communism and Confrontation. – М.: , 0. – 0 с.
  25. Aiguo Lu, Manuel F. Montes, World Institute for Development Economics Research. Poverty, Income Distribution and Well-Being in Asia During the Transition. – М.: , 0. – 0 с.
  26. Gavin Cawthra. Securing South Africa's Democracy: Defense, Development and Security in Transition (International Political Economy Series). – М.: , 0. – 0 с.
  27. Nikolai Dokuchaev. Dynamic Portfolio Strategies: Quantitative Methods and Empirical Rules for Incomplete Information (International Series in Operations Research and Management Science, Volume 47). – М.: , 0. – 0 с.
  28. Christos Papazoglou, Eric J. Pentecost. Exchange Rate Policies, Prices and Supply-Side Response: A Study of Transitional Economies. – М.: , 0. – 0 с.
  29. Satyajit Das. Swaps and Financial Derivatives : Products, Pricing, Applications and Risk Management (Wiley Finance). – М.: , 0. – 0 с.
  30. Richard T. Garrigan, John F.C. Parsons. Real Estate Investment Trusts: Structure, Analysis and Strategy. – М.: , 0. – 0 с.
  31. Ronald Groenke, Wade Keller. The Money Tree: Risk Free Options Trading. – М.: , 0. – 0 с.
  32. Ortwin Renn, Bernd Rohrmann. Cross-Cultural Risk Perception - A Survey of Empirical Studies (TECHNOLOGY, RISK AND SOCIETY An International Series in Risk Analysis Volume 13). – М.: , 0. – 0 с.
  33. Charles J. Austin, Stuart B. Boxerman. Information Systems for Healthcare Management, Sixth Edition. – М.: , 0. – 0 с.
  34. Mark B. Desman. Building an Information Security Awareness Program. – М.: , 0. – 0 с.
  35. Gerald L. Kovacich, Edward P. Halibozek. The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, First Edition. – М.: , 0. – 0 с.
  36. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с.
  37. Ifip Tc11 Wg11.5 Working Conference on Integrity and Internal Control, Michael Gertz. Integrity and Internal Control in Information Systems V: Ifip Tc11/Wg11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (Iicis), November 11-12, 2002, Bonn, Germany (International Federation for Information Processing. – М.: , 0. – 0 с.
  38. Marko Nordquist. Towards Improved Security Management Practice: Designing an Organizational Model Procedure for the Implementation of Information Security Management in Heterogeneous Information Management. – М.: , 0. – 0 с.
  39. Mary Pat McCarthy, Stuart Campbell. Security Transformation: Digital Defense Strategies to Protect your Company's Reputation and Market Share. – М.: , 0. – 0 с.
  40. Steve Purser. A Practical Guide to Managing Information Security (Artech House Technology Management Library). – М.: , 0. – 0 с.
  41. Donn B. Parker. Fighting Computer Crime : A New Framework for Protecting Information. – М.: , 0. – 0 с.
  42. Christopher J. Alberts, Audrey J. Dorofee. Managing Information Security Risks: The OCTAVE Approach. – М.: , 0. – 0 с.
  43. Daniel Jennings, Joseph Boyce. Information Assurance. – М.: , 0. – 0 с.
  44. Marian Quigley, Marian Quiqley. Information Security and Ethics: Social and Organizational Issues. – М.: , 0. – 0 с.
  45. C. Warren Axelrod, Axelrod. Outsourcing Information Security. – М.: , 0. – 0 с.
  46. Anup K. Ghosh. E-Commerce Security and Privacy. – М.: , 0. – 0 с.
  47. Harold F. Tipton, Micki Krause, Micki, Cissp Krause. Information Security Management Handbook, Fifth Edition. – М.: , 0. – 0 с.
  48. Aspatore Books Staff. Inside the Minds: Security Matters - Industry Leaders from eBay, Inc., Motorola, Internet Security Systems & More on Protecting Your Most Valuable Assets. – М.: , 0. – 0 с.
  49. Debra Cameron. The World Wide Web: Strategies and Opportunities for Business. – М.: , 0. – 0 с.
  50. Thomas Peltier, Thomas Pelitier, Justin Peltier, John A. Blackley, Peltier, Associates. Information Security Fundamentals. – М.: , 0. – 0 с.
  51. Charles Cresson Wood. Best Practices In Internet Commerce Security. – М.: , 0. – 0 с.
  52. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с.
  53. Laurence J. Brahm. Zhu Rongji and The Transformation of Modern China. – М.: , 2003. – 0 с.
  54. Christoph Borgmann. Social Security, Demographics, and Risk (Population Economics). – М.: , 2004. – 0 с.
  55. Robert W. McGee. Accounting and Financial System Reform in a Transition Economy: A Case Study of Russia. – М.: , 2004. – 0 с.
  56. Martin Johanson. Managing Networks in Transition Economies (International Business and Management). – М.: , 2004. – 0 с.
  57. Aspatore Books. Corporate Security in the Information Age: Industry Leaders from Bose Corporation, Dow Jones, and more on Security Options, Protecting Assets, & Implementing a Strategy (Inside the Minds). – М.: , 2005. – 0 с.
  58. Barbara C. McNurlin. Information Systems Management in Practice (7th Edition). – М.: , 2005. – 0 с.
  59. Sayan Chatterjee. Failsafe Strategies : Profit and Grow from Risks that Others Avoid. – М.: , 2004. – 0 с.
  60. The Secure Online Business: E-Commerce, It Functionality & Business Continuity. – М.: , 2003. – 0 с.
  61. Economics of Information Security (Advances in Information Security). – М.: , 2004. – 0 с.
  62. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с.
  63. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с.
  64. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с.
  65. Betty E. Biringer, Rudolph V. Matalucci, Sharon L. O'Connor. Security Risk Assessment and Management: A Professional Practice Guide for Protecting Buildings and Infrastructures. – М.: , 2007. – 384 с.
  66. Ira Winkler. Zen and the Art of Information Security. – М.: , 2007. – 192 с.
  67. Timothy P. Layton. Information Security. – М.: , 2006. – 222 с.
  68. Ernst & Young LLP, Jan Babiak, John Butters, Mark W. Doll. Defending the Digital Frontier: Practical Security for Management, 2nd Edition. – М.: , 2004. – 253 с.
  69. Michael E. Whitman, Herbert J. Mattord. Principles of Information Security, Second Edition. – М.: , 2004. – 600 с.
  70. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с.
  71. James Michael Stewart, Ed Tittel, Mike Chapple. CISSP: Certified Information Systems Security Professional Study Guide. – М.: , 2008. – 841 с.
  72. Pierre-laurent Chatain, Raul Hernandez-Coss, Kamil Borowik, Andrew Zerzan. Integrity in Mobile Phone Financial Services: Measures for Mitigating the Risks of Money Laundering and Terrorist Financing (World Bank Working Papers) (World Bank Working Papers). – М.: , 2008. – 76 с.
  73. Social and Human Elements of Information Security: Emerging Trends and Countermeasures (Premier Reference Source). – М.: , 2008. – 412 с.
  74. Bartu Soral. Banking Crises and Bankruptcy for Profit in Turkey. – М.: , 2008. – 96 с.
  75. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с.
  76. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с.
  77. Gerard Blokdijk, Ivanka Menken. Information Security Management Best Practice Workbook: Implementation and Management Roadmap for Threats, Challenges and Solutions - Ready to use supporting documents bringing Theory into Practice. – М.: , 2008. – 124 с.
  78. Hamid R. Nemati. Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues (Advances in Information Security and Privacy). – М.: , 2009. – 414 с.
  79. W. Krag Brotby. Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement. – М.: Auerbach Publications, 2009. – 200 с.
  80. Julian Talbot, Miles Jakeman. Security Risk Management Body of Knowledge (Wiley Series in Systems Engineering and Management). – М.: , 2009. – 445 с.
  81. Alan Calder. Information Security based on ISO 27001/ISO 27002: A Management Guide. – М.: , 2009. – 83 с.
  82. Jake Kouns, Daniel Minoli. Information Technology Risk Management in Enterprise Environments: A Review of Industry Practices and a Practical Guide to Risk Management Teams. – М.: , 2010. – 421 с.
  83. Bel G. Raggad. Information Security Management: Concepts and Practice. – М.: , 2010. – 871 с.
  84. Michael E. Whitman, Herbert J. Mattord. Management of Information Security. – М.: , 2010. – 592 с.
  85. Alan Calder, Steve G Watkins. Information Security Risk Management for ISO27001 / ISO27002. – М.: , 2010. – 198 с.
  86. William Manning. CISM Certified Information Security Manager Certification Exam Preparation Course in a Book for Passing the CISM Exam - The How To Pass on Your First Try Certification Study Guide. – М.: , 2010. – 188 с.
  87. Carl Young. Metrics and Methods for Security Risk Management. – М.: , 2010. – 296 с.
  88. Evan Wheeler. Security Risk Management: Building an Information Security Risk Management Program from the Ground Up. – М.: , 2011. – 360 с.
  89. Editors Karl Maria Michael de Leeuw, Jan Bergstra. The History of Information Security: A Comprehensive Handbook. – М.: Elsevier Science, 2007. – 900 с.
  90. Global Perspectives In Information Security. – М.: , 2008. – 896 с.
  91. Doug Howard, Kevin Prince. Security 2020: Reduce Security Risks This Decade. – М.: Wiley, 2010. – 336 с.
  92. John R. Vacca. Managing Information Security. – М.: , 2010. – 320 с.
  93. G. Manoilov. Elsevier's Dictionary of Information Security. – М.: , 2010. – 772 с.
  94. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с.
  95. George L Stefanek. Information Security Best Practices. – М.: , 2010. – 160 с.
  96. Sari Greene. Sustainable Information Security. – М.: , 2010. – 400 с.
  97. John R. Vacca. Computer and Information Security Handbook. – М.: , 2010. – 928 с.
  98. Paul Robinson. Dictionary of International Security. – М.: , 2007. – 208 с.
  99. Krag Brotby. Information Security Governance. – М.: , 2009. – 190 с.
  100. Principles Of Computer Security, Comptia Security+ And Beyond, Second Edition. – М.: , 2011. – 0 с.
  101. Sustainable On-Site Chp Systems: Design, Construction, And Operations. – М.: , 2011. – 464 с.
  102. Johnny Cache, Joshua Wright, Vincent Liu. Hacking Exposed: Wireless. – М.: McGraw-Hill, 2010. – 512 с.
  103. It Security Metrics: A Practical Framework For Measuring Security & Protecting Data. – М.: , 2011. – 396 с.
  104. Harold F. Tipton, Micki Krause. Information Security Management Handbook on CD-ROM, 2003 Edition. – М.: , . –  с.
  105. Rohana Mohamad Rashid. Determining Influencing Factors of Information Security Culture. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  106. Birnur Ozbas and Ilhan Or. Risk Analysis Study of Maritime Traffic. – М.: LAP Lambert Academic Publishing, 2013. – 348 с.
  107. Frank Metelues. Knee Response During Squats with Heels Up and Down. – М.: LAP Lambert Academic Publishing, 2014. – 240 с.
  108. Olufemi Fawole,Joseph Fayeye and Kingsley Nwachukwu. Security Agency and The Control And Manangement Of Arms In Nigeria. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  109. Ruth Alas. Organisational changes during the transition in Estonia. – М.: LAP Lambert Academic Publishing, 2010. – 232 с.
  110. Carol Woody. Applying Security Risk Management to Internet Connectivity. – М.: LAP Lambert Academic Publishing, 2009. – 180 с.
  111. Elliot Attipoe. Securing the Public Wireless Network. – М.: LAP Lambert Academic Publishing, 2013. – 92 с.
  112. Firkhan Ali Hamid Ali. Vulnerability Analysis on the Computer Network Security. – М.: LAP Lambert Academic Publishing, 2010. – 72 с.
  113. Amel Chowdhury. Deployment of a Secure VoIP System. – М.: LAP Lambert Academic Publishing, 2014. – 68 с.
  114. Mitko Bogdanoski,Aleksandar Risteski and Marjan Bogdanoski. Cyber operations - a permanent part of the global conflict. – М.: LAP Lambert Academic Publishing, 2014. – 60 с.
  115. Yedji Mbangsoua and Dr. Freddie Acosta. Information Security and its Investment Justification. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  116. Yasser Alshehri. Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 156 с.
  117. Julien Shabani. Information Security for RFID Systems. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.
  118. Debasish Jena. On Protocols for Information Security Services. – М.: LAP Lambert Academic Publishing, 2011. – 136 с.
  119. Aliyu Onipede. Biometrics as a tool for Information Security in Aviation industry. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  120. Furhan Mehmood and Rajia Rafique. Information Security in Financial Organizations. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  121. Igor Botian. Software Security Vulnerabilities in Mobile Peer-to-peer Environment. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  122. Omar Zakaria. Information Security Culture. – М.: LAP Lambert Academic Publishing, 2013. – 248 с.
  123. Jahidul Arafat. Higher Education Information Security. – М.: LAP Lambert Academic Publishing, 2013. – 176 с.
  124. Saeed Soltanmohammadi. Improving Information System Security by Evaluating Human Factors. – М.: LAP Lambert Academic Publishing, 2014. – 116 с.
  125. frankie tvrz and marijke coetzee. Information Security of a Bluetooth-enabled handheld device. – М.: LAP Lambert Academic Publishing, 2010. – 180 с.
  126. Ahmed AlNunu. How Much Information Security?. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  127. Jeffy Mwakalinga. A Framework for Adaptive Information Security Systems. – М.: LAP Lambert Academic Publishing, 2011. – 364 с.
  128. Meysam Namayandeh. Development of Computer Ethical Framework for Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 132 с.
  129. Muhammad Imran Tariq. SLA based Information Security Metrics in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2014. – 192 с.
  130. Bugra Karabey. Teorem. – М.: LAP Lambert Academic Publishing, 2012. – 116 с.
  131. Khanyisa Malufu. E-Banking Security. – М.: LAP Lambert Academic Publishing, 2013. – 112 с.
  132. Kerem Beygo and Cihan Eraslan. Enhancing Security and Usability Features of NFC. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  133. Alaa Al-Deen Mohammed Hassan. Information Security Management. – М.: LAP Lambert Academic Publishing, 2013. – 188 с.
  134. Uma Shankar Singh. Risk Analysis And Mitigation Plan For Steel Tube Manufacturing Company. – М.: LAP Lambert Academic Publishing, 2013. – 140 с.
  135. Jun Zheng,Jiantao Gu and Hong Wang. Financial Management and Information Security of Independent Colleges. – М.: LAP Lambert Academic Publishing, 2014. – 256 с.
  136. Ying Qian. Mitigating Information Security Risks during Operation Transition. – М.: LAP Lambert Academic Publishing, 2012. – 372 с.
  137. Prakash Metaparti. Risk Management initiatives for post 9/11 Maritime Security. – М.: LAP Lambert Academic Publishing, 2011. – 336 с.
  138. Chris Cubbage. Security Risk Management in Corporate Governance. – М.: LAP Lambert Academic Publishing, 2010. – 140 с.
  139. Abdulwahid Sial,Hafiz Ghulam Muhammad Musa and Munawar Iqbal. Credit Risk and Bank’s Performance. – М.: LAP Lambert Academic Publishing, 2014. – 72 с.
  140. Prashant Pittalia. Ecommerce Security Real Life Cases And Practical Solutions. – М.: , 2015. – 72 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. О качестве сервиса, связанного с запросами на медицинскую информацию. Medical Information Service?. А. Беденков, "Ремедиум", № 1, январь 2012.
  2. Risk-based pricing: посткризисные тенденции. А.В. Гидулян, "Банковское кредитование", N 1, январь-февраль 2012 г.
  3. Кто вы, CHIEF RISK OFFICER. М. Уилкинсон, "Риск-менеджмент", № 9-10, сентябрь-октябрь 2008.

Образцы работ

Тема и предметТип и объем работы
Основы избирательных компаний
PR
Диплом
72 стр.
Public relations в политике как особый «срез» общественных отношений
PR
Курсовая работа
35 стр.
Последствия операции НАТО
Политология
Диплом
80 стр.
Формирование системы экономической безопасности на Белоярской АЭС
Психофизиология
Диплом
96 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Татьяна
Спасибо Вам большое за консультацию по Исследованию систем управления. Я получила ее уже давно, но, к сожалению, возможность написать Вам письмо у меня появилась только сегодня. Работа после вашего сопровождения действительно очень хорошая, даже отличная. Хотя, я думаю, Вам мои комплименты особенно ни к чему, Вы и так прекрасно знаете, что пишете замечательно. :) Работа после вашего сопровождения действительно оказалась "немножко" больше, скажем откровенно в 3 раза больше. :) Мне, во-первых, становится как-то неловко из-за цены, ведь оплата вроде за страницы, хотя я и понимаю, что для Вас это не имеет особого значения, но все же. Во-вторых, мне очень жалко будет резать ее, буду делать это скрипя сердцем. Хотя на самом деле, я смогу еще не раз использовать куски данной работы и для других предметов, так как данная тема изучается у нас достаточно подробно. Так что спасибо Вам огромное, еще раз, за эту работу, за то, что Вы взялись ее сопровождать. Я думаю, если в скором времени у меня опять начнутся проблемы со временем, я с удовольствием опять обращусь к Вам, точнее в Вашу организацию с новым заказом, но уже не буду претендовать на Ваше время. :)