Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Ying Qian. Mitigating Information Security Risks during Operation Transition. – М.: LAP Lambert Academic Publishing, 2012. – 372 с. Дополнительные результаты Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 515 с. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с. Konstantinos Tatsiramos. Informal Employment in Emerging and Transition Economies (Research in Labor Economics). – М.: , 2012. – 300 с. Adrian R. Bowden, Malcolm R. Lane, Julia H. Martin. Triple Bottom Line Risk Management: Enhancing Profit, Environmental Performance, and Community Benefits. – М.: , 0. – 0 с. Yusufali F. Musaji. Integrated Auditing of ERP Systems. – М.: , 0. – 0 с. Marilyn Greenstein, Todd M. Feinman. Electronic Commerce: Security Risk Management and Control. – М.: , 0. – 0 с. Jack J. Champlain. Auditing Information Systems. – М.: , 0. – 0 с. John Wang. Innovations in Information Systems for Business Functionality and Operations Management. – М.: , 2012. – 378 с. Edward G. Rogoff. Bankable Business Plans: Second Edition. – М.: , 2012. – 324 с. JA?rg Klarer, Bedřich Moldan. The Environmental Challenge for Central European Economies in Transition. – М.: , 0. – 0 с. Vladimir Mikhalev. Inequality and Social Structure During the Transition (Studies in Development Economics and Policy). – М.: , 0. – 0 с. Risk Management, Speculation, and Derivative Securities. – М.: , 0. – 0 с. Gerald Kovacich. The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition. – М.: , 0. – 0 с. Safety and the Security Professional : A Guide to Occupational Safety and Health Strategies. – М.: , 0. – 0 с. Douglas G. Hoffman. Managing Operational Risk: 20 Firmwide Best Practice Strategies. – М.: Wiley, 2002. – 540 с. Asset Protection and Security Management Handbook. – М.: , 0. – 0 с. Protecting Business Information : A Manager's Guide. – М.: , 0. – 0 с. Erhan Kozan, Azuma Ohuchi. Operations Research/Management Science at Work (Advances in Information Security). – М.: , 0. – 0 с. Leigh Wade. Careers in Private Security: How to Get Started, How to Get Ahead. – М.: , 0. – 0 с. Ana Julia Jatar-Hausmann. The Cuban Way: Capitalism, Communism and Confrontation. – М.: , 0. – 0 с. Aiguo Lu, Manuel F. Montes, World Institute for Development Economics Research. Poverty, Income Distribution and Well-Being in Asia During the Transition. – М.: , 0. – 0 с. Gavin Cawthra. Securing South Africa's Democracy: Defense, Development and Security in Transition (International Political Economy Series). – М.: , 0. – 0 с. Nikolai Dokuchaev. Dynamic Portfolio Strategies: Quantitative Methods and Empirical Rules for Incomplete Information (International Series in Operations Research and Management Science, Volume 47). – М.: , 0. – 0 с. Christos Papazoglou, Eric J. Pentecost. Exchange Rate Policies, Prices and Supply-Side Response: A Study of Transitional Economies. – М.: , 0. – 0 с. Satyajit Das. Swaps and Financial Derivatives : Products, Pricing, Applications and Risk Management (Wiley Finance). – М.: , 0. – 0 с. Richard T. Garrigan, John F.C. Parsons. Real Estate Investment Trusts: Structure, Analysis and Strategy. – М.: , 0. – 0 с. Ronald Groenke, Wade Keller. The Money Tree: Risk Free Options Trading. – М.: , 0. – 0 с. Ortwin Renn, Bernd Rohrmann. Cross-Cultural Risk Perception - A Survey of Empirical Studies (TECHNOLOGY, RISK AND SOCIETY An International Series in Risk Analysis Volume 13). – М.: , 0. – 0 с. Charles J. Austin, Stuart B. Boxerman. Information Systems for Healthcare Management, Sixth Edition. – М.: , 0. – 0 с. Mark B. Desman. Building an Information Security Awareness Program. – М.: , 0. – 0 с. Gerald L. Kovacich, Edward P. Halibozek. The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, First Edition. – М.: , 0. – 0 с. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с. Ifip Tc11 Wg11.5 Working Conference on Integrity and Internal Control, Michael Gertz. Integrity and Internal Control in Information Systems V: Ifip Tc11/Wg11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (Iicis), November 11-12, 2002, Bonn, Germany (International Federation for Information Processing. – М.: , 0. – 0 с. Marko Nordquist. Towards Improved Security Management Practice: Designing an Organizational Model Procedure for the Implementation of Information Security Management in Heterogeneous Information Management. – М.: , 0. – 0 с. Mary Pat McCarthy, Stuart Campbell. Security Transformation: Digital Defense Strategies to Protect your Company's Reputation and Market Share. – М.: , 0. – 0 с. Steve Purser. A Practical Guide to Managing Information Security (Artech House Technology Management Library). – М.: , 0. – 0 с. Donn B. Parker. Fighting Computer Crime : A New Framework for Protecting Information. – М.: , 0. – 0 с. Christopher J. Alberts, Audrey J. Dorofee. Managing Information Security Risks: The OCTAVE Approach. – М.: , 0. – 0 с. Daniel Jennings, Joseph Boyce. Information Assurance. – М.: , 0. – 0 с. Marian Quigley, Marian Quiqley. Information Security and Ethics: Social and Organizational Issues. – М.: , 0. – 0 с. C. Warren Axelrod, Axelrod. Outsourcing Information Security. – М.: , 0. – 0 с. Anup K. Ghosh. E-Commerce Security and Privacy. – М.: , 0. – 0 с. Harold F. Tipton, Micki Krause, Micki, Cissp Krause. Information Security Management Handbook, Fifth Edition. – М.: , 0. – 0 с. Aspatore Books Staff. Inside the Minds: Security Matters - Industry Leaders from eBay, Inc., Motorola, Internet Security Systems & More on Protecting Your Most Valuable Assets. – М.: , 0. – 0 с. Debra Cameron. The World Wide Web: Strategies and Opportunities for Business. – М.: , 0. – 0 с. Thomas Peltier, Thomas Pelitier, Justin Peltier, John A. Blackley, Peltier, Associates. Information Security Fundamentals. – М.: , 0. – 0 с. Charles Cresson Wood. Best Practices In Internet Commerce Security. – М.: , 0. – 0 с. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с. Laurence J. Brahm. Zhu Rongji and The Transformation of Modern China. – М.: , 2003. – 0 с. Christoph Borgmann. Social Security, Demographics, and Risk (Population Economics). – М.: , 2004. – 0 с. Robert W. McGee. Accounting and Financial System Reform in a Transition Economy: A Case Study of Russia. – М.: , 2004. – 0 с. Martin Johanson. Managing Networks in Transition Economies (International Business and Management). – М.: , 2004. – 0 с. Aspatore Books. Corporate Security in the Information Age: Industry Leaders from Bose Corporation, Dow Jones, and more on Security Options, Protecting Assets, & Implementing a Strategy (Inside the Minds). – М.: , 2005. – 0 с. Barbara C. McNurlin. Information Systems Management in Practice (7th Edition). – М.: , 2005. – 0 с. Sayan Chatterjee. Failsafe Strategies : Profit and Grow from Risks that Others Avoid. – М.: , 2004. – 0 с. The Secure Online Business: E-Commerce, It Functionality & Business Continuity. – М.: , 2003. – 0 с. Economics of Information Security (Advances in Information Security). – М.: , 2004. – 0 с. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с. Betty E. Biringer, Rudolph V. Matalucci, Sharon L. O'Connor. Security Risk Assessment and Management: A Professional Practice Guide for Protecting Buildings and Infrastructures. – М.: , 2007. – 384 с. Ira Winkler. Zen and the Art of Information Security. – М.: , 2007. – 192 с. Timothy P. Layton. Information Security. – М.: , 2006. – 222 с. Ernst & Young LLP, Jan Babiak, John Butters, Mark W. Doll. Defending the Digital Frontier: Practical Security for Management, 2nd Edition. – М.: , 2004. – 253 с. Michael E. Whitman, Herbert J. Mattord. Principles of Information Security, Second Edition. – М.: , 2004. – 600 с. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с. James Michael Stewart, Ed Tittel, Mike Chapple. CISSP: Certified Information Systems Security Professional Study Guide. – М.: , 2008. – 841 с. Pierre-laurent Chatain, Raul Hernandez-Coss, Kamil Borowik, Andrew Zerzan. Integrity in Mobile Phone Financial Services: Measures for Mitigating the Risks of Money Laundering and Terrorist Financing (World Bank Working Papers) (World Bank Working Papers). – М.: , 2008. – 76 с. Social and Human Elements of Information Security: Emerging Trends and Countermeasures (Premier Reference Source). – М.: , 2008. – 412 с. Bartu Soral. Banking Crises and Bankruptcy for Profit in Turkey. – М.: , 2008. – 96 с. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с. Gerard Blokdijk, Ivanka Menken. Information Security Management Best Practice Workbook: Implementation and Management Roadmap for Threats, Challenges and Solutions - Ready to use supporting documents bringing Theory into Practice. – М.: , 2008. – 124 с. Hamid R. Nemati. Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues (Advances in Information Security and Privacy). – М.: , 2009. – 414 с. W. Krag Brotby. Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement. – М.: Auerbach Publications, 2009. – 200 с. Julian Talbot, Miles Jakeman. Security Risk Management Body of Knowledge (Wiley Series in Systems Engineering and Management). – М.: , 2009. – 445 с. Alan Calder. Information Security based on ISO 27001/ISO 27002: A Management Guide. – М.: , 2009. – 83 с. Jake Kouns, Daniel Minoli. Information Technology Risk Management in Enterprise Environments: A Review of Industry Practices and a Practical Guide to Risk Management Teams. – М.: , 2010. – 421 с. Bel G. Raggad. Information Security Management: Concepts and Practice. – М.: , 2010. – 871 с. Michael E. Whitman, Herbert J. Mattord. Management of Information Security. – М.: , 2010. – 592 с. Alan Calder, Steve G Watkins. Information Security Risk Management for ISO27001 / ISO27002. – М.: , 2010. – 198 с. William Manning. CISM Certified Information Security Manager Certification Exam Preparation Course in a Book for Passing the CISM Exam - The How To Pass on Your First Try Certification Study Guide. – М.: , 2010. – 188 с. Carl Young. Metrics and Methods for Security Risk Management. – М.: , 2010. – 296 с. Evan Wheeler. Security Risk Management: Building an Information Security Risk Management Program from the Ground Up. – М.: , 2011. – 360 с. Editors Karl Maria Michael de Leeuw, Jan Bergstra. The History of Information Security: A Comprehensive Handbook. – М.: Elsevier Science, 2007. – 900 с. Global Perspectives In Information Security. – М.: , 2008. – 896 с. Doug Howard, Kevin Prince. Security 2020: Reduce Security Risks This Decade. – М.: Wiley, 2010. – 336 с. John R. Vacca. Managing Information Security. – М.: , 2010. – 320 с. G. Manoilov. Elsevier's Dictionary of Information Security. – М.: , 2010. – 772 с. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с. George L Stefanek. Information Security Best Practices. – М.: , 2010. – 160 с. Sari Greene. Sustainable Information Security. – М.: , 2010. – 400 с. John R. Vacca. Computer and Information Security Handbook. – М.: , 2010. – 928 с. Paul Robinson. Dictionary of International Security. – М.: , 2007. – 208 с. Krag Brotby. Information Security Governance. – М.: , 2009. – 190 с. Principles Of Computer Security, Comptia Security+ And Beyond, Second Edition. – М.: , 2011. – 0 с. Sustainable On-Site Chp Systems: Design, Construction, And Operations. – М.: , 2011. – 464 с. Johnny Cache, Joshua Wright, Vincent Liu. Hacking Exposed: Wireless. – М.: McGraw-Hill, 2010. – 512 с. It Security Metrics: A Practical Framework For Measuring Security & Protecting Data. – М.: , 2011. – 396 с. Harold F. Tipton, Micki Krause. Information Security Management Handbook on CD-ROM, 2003 Edition. – М.: , . – с. Rohana Mohamad Rashid. Determining Influencing Factors of Information Security Culture. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Birnur Ozbas and Ilhan Or. Risk Analysis Study of Maritime Traffic. – М.: LAP Lambert Academic Publishing, 2013. – 348 с. Frank Metelues. Knee Response During Squats with Heels Up and Down. – М.: LAP Lambert Academic Publishing, 2014. – 240 с. Olufemi Fawole,Joseph Fayeye and Kingsley Nwachukwu. Security Agency and The Control And Manangement Of Arms In Nigeria. – М.: LAP Lambert Academic Publishing, 2011. – 80 с. Ruth Alas. Organisational changes during the transition in Estonia. – М.: LAP Lambert Academic Publishing, 2010. – 232 с. Carol Woody. Applying Security Risk Management to Internet Connectivity. – М.: LAP Lambert Academic Publishing, 2009. – 180 с. Elliot Attipoe. Securing the Public Wireless Network. – М.: LAP Lambert Academic Publishing, 2013. – 92 с. Firkhan Ali Hamid Ali. Vulnerability Analysis on the Computer Network Security. – М.: LAP Lambert Academic Publishing, 2010. – 72 с. Amel Chowdhury. Deployment of a Secure VoIP System. – М.: LAP Lambert Academic Publishing, 2014. – 68 с. Mitko Bogdanoski,Aleksandar Risteski and Marjan Bogdanoski. Cyber operations - a permanent part of the global conflict. – М.: LAP Lambert Academic Publishing, 2014. – 60 с. Yedji Mbangsoua and Dr. Freddie Acosta. Information Security and its Investment Justification. – М.: LAP Lambert Academic Publishing, 2011. – 132 с. Yasser Alshehri. Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 156 с. Julien Shabani. Information Security for RFID Systems. – М.: LAP Lambert Academic Publishing, 2011. – 92 с. Debasish Jena. On Protocols for Information Security Services. – М.: LAP Lambert Academic Publishing, 2011. – 136 с. Aliyu Onipede. Biometrics as a tool for Information Security in Aviation industry. – М.: LAP Lambert Academic Publishing, 2012. – 88 с. Furhan Mehmood and Rajia Rafique. Information Security in Financial Organizations. – М.: LAP Lambert Academic Publishing, 2010. – 68 с. Igor Botian. Software Security Vulnerabilities in Mobile Peer-to-peer Environment. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Omar Zakaria. Information Security Culture. – М.: LAP Lambert Academic Publishing, 2013. – 248 с. Jahidul Arafat. Higher Education Information Security. – М.: LAP Lambert Academic Publishing, 2013. – 176 с. Saeed Soltanmohammadi. Improving Information System Security by Evaluating Human Factors. – М.: LAP Lambert Academic Publishing, 2014. – 116 с. frankie tvrz and marijke coetzee. Information Security of a Bluetooth-enabled handheld device. – М.: LAP Lambert Academic Publishing, 2010. – 180 с. Ahmed AlNunu. How Much Information Security?. – М.: LAP Lambert Academic Publishing, 2010. – 68 с. Jeffy Mwakalinga. A Framework for Adaptive Information Security Systems. – М.: LAP Lambert Academic Publishing, 2011. – 364 с. Meysam Namayandeh. Development of Computer Ethical Framework for Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 132 с. Muhammad Imran Tariq. SLA based Information Security Metrics in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2014. – 192 с. Bugra Karabey. Teorem. – М.: LAP Lambert Academic Publishing, 2012. – 116 с. Khanyisa Malufu. E-Banking Security. – М.: LAP Lambert Academic Publishing, 2013. – 112 с. Kerem Beygo and Cihan Eraslan. Enhancing Security and Usability Features of NFC. – М.: LAP Lambert Academic Publishing, 2010. – 68 с. Alaa Al-Deen Mohammed Hassan. Information Security Management. – М.: LAP Lambert Academic Publishing, 2013. – 188 с. Uma Shankar Singh. Risk Analysis And Mitigation Plan For Steel Tube Manufacturing Company. – М.: LAP Lambert Academic Publishing, 2013. – 140 с. Jun Zheng,Jiantao Gu and Hong Wang. Financial Management and Information Security of Independent Colleges. – М.: LAP Lambert Academic Publishing, 2014. – 256 с. Ying Qian. Mitigating Information Security Risks during Operation Transition. – М.: LAP Lambert Academic Publishing, 2012. – 372 с. Prakash Metaparti. Risk Management initiatives for post 9/11 Maritime Security. – М.: LAP Lambert Academic Publishing, 2011. – 336 с. Chris Cubbage. Security Risk Management in Corporate Governance. – М.: LAP Lambert Academic Publishing, 2010. – 140 с. Abdulwahid Sial,Hafiz Ghulam Muhammad Musa and Munawar Iqbal. Credit Risk and Bank’s Performance. – М.: LAP Lambert Academic Publishing, 2014. – 72 с. Prashant Pittalia. Ecommerce Security Real Life Cases And Practical Solutions. – М.: , 2015. – 72 с. Лучшие результаты Ничего не найдено Дополнительные результаты О качестве сервиса, связанного с запросами на медицинскую информацию. Medical Information Service?. А. Беденков, "Ремедиум", № 1, январь 2012. Risk-based pricing: посткризисные тенденции. А.В. Гидулян, "Банковское кредитование", N 1, январь-февраль 2012 г. Кто вы, CHIEF RISK OFFICER. М. Уилкинсон, "Риск-менеджмент", № 9-10, сентябрь-октябрь 2008. Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Татьяна Спасибо Вам большое за консультацию по Исследованию систем управления. Я получила ее уже давно, но, к сожалению, возможность написать Вам письмо у меня появилась только сегодня. Работа после вашего сопровождения действительно очень хорошая, даже отличная. Хотя, я думаю, Вам мои комплименты особенно ни к чему, Вы и так прекрасно знаете, что пишете замечательно. :) Работа после вашего сопровождения действительно оказалась "немножко" больше, скажем откровенно в 3 раза больше. :) Мне, во-первых, становится как-то неловко из-за цены, ведь оплата вроде за страницы, хотя я и понимаю, что для Вас это не имеет особого значения, но все же. Во-вторых, мне очень жалко будет резать ее, буду делать это скрипя сердцем. Хотя на самом деле, я смогу еще не раз использовать куски данной работы и для других предметов, так как данная тема изучается у нас достаточно подробно. Так что спасибо Вам огромное, еще раз, за эту работу, за то, что Вы взялись ее сопровождать. Я думаю, если в скором времени у меня опять начнутся проблемы со временем, я с удовольствием опять обращусь к Вам, точнее в Вашу организацию с новым заказом, но уже не буду претендовать на Ваше время. :)