Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 515 с.
  2. Robert Muksian. Mathematics of Interest Rates, Insurance, Social Security, and Pensions. – М.: , 0. – 0 с.
  3. Tom W. Goad. Information Literacy and Workplace Performance. – М.: , 0. – 0 с.
  4. Marko Nordquist. Towards Improved Security Management Practice: Designing an Organizational Model Procedure for the Implementation of Information Security Management in Heterogeneous Information Management. – М.: , 0. – 0 с.
  5. Computer Security. – М.: , 0. – 0 с.
  6. R. F. Churchhouse. Codes and Ciphers: Julius Caesar, the Enigma, and the Internet. – М.: , 0. – 0 с.
  7. Gary C. Guthrie. Mathematics of Interest Rates and Finance. – М.: , 2003. – 0 с.
  8. Melanie Cullen, Shae Irving. Get It Together: Organize Your Records So Your Family Won't Have To (Book with CD-Rom). – М.: , 2007. – 143 с.
  9. Peter Dreier, John Mollenkopf, Todd Swanstrom. Place Matters: Metropolitics For The Twenty-First Century (Studies in Government and Public Policy). – М.: , 2005. – 428 с.
  10. From Data and Information Analysis to Knowledge Engineering : Proceedings of the 29th Annual Conference of the Gesellschaft fA?r Klassifikation e.V., University ... Data Analysis. – М.: , 2006. – 761 с.
  11. National Research Council (U. S.). The Offshoring of Engineering: Facts, Unknowns, and Potential Implications. – М.: , 2008. – 240 с.
  12. Bruce Schneier. Schneier on Security. – М.: , 2008. – 336 с.
  13. Andy Walker. Windows Lockdown!: Your XP and Vista Guide Against Hacks, Attacks, and Other Internet Mayhem (Absolute Beginner's Guide). – М.: , 2008. – 480 с.
  14. iSafe. i–SAFE Internet Life Skills Activities. – М.: , 2010. – 160 с.
  15. ED. Personal Computer Security. – М.: , 1996. – 360 с.
  16. Emily M. Harwood. Digital CCTV: A Security Professional's Guide. – М.: Butterworth-Heinemann, 2007. – 272 с.
  17. A. K. M. Harun-Ur-Rashid. E-Banking Services. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.
  18. Viplav Gautam and Saurabh Sharma. Study of Speaker Recognition. – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  19. Naseer Ahmad. Security Issues in Wireless Networks. – М.: LAP Lambert Academic Publishing, 2010. – 60 с.
  20. Sudarshan Ranpise. Cyber Crime Prevention. – М.: LAP Lambert Academic Publishing, 2013. – 268 с.
  21. Nateq Be-Nazir Ibn Minar. Bluetooth Networking and its Security Architecture. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  22. Shahab Saquib Sohail and Musheer Ahmad. Chaos-based Encryption. – М.: LAP Lambert Academic Publishing, 2012. – 144 с.
  23. Firkhan Ali Hamid Ali. Vulnerability Analysis on the Computer Network Security. – М.: LAP Lambert Academic Publishing, 2010. – 72 с.
  24. Abanti Cyrus. Makori,Miph Musoke and Gilbert Maiga. Health Informatics and Personality Traits. – М.: LAP Lambert Academic Publishing, 2013. – 108 с.
  25. Vinayak Bharadi and Hemchandra Kekre. Signature Recognition Using Clustering Techniques. – М.: LAP Lambert Academic Publishing, 2012. – 180 с.
  26. Ganesh Chandra Deka. Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 140 с.
  27. Todd Deshane. A Desktop System for Attack-Resistance and Rapid Recovery. – М.: LAP Lambert Academic Publishing, 2010. – 124 с.
  28. Igor Botian. Software Security Vulnerabilities in Mobile Peer-to-peer Environment. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  29. Hassen Alsafi and Mohammed Azhruddin. The Security Issues for Smart Grids Applications on Cloud Computing. – М.: LAP Lambert Academic Publishing, 2013. – 60 с.
  30. Amnesh Goel and Nidhi Chandra. Secure Image Archival Based on Image Encryption Technique. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  31. Paul Denys. Security of Personal Information in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 144 с.
  32. Paolo Gasti. Privacy and Security of Internet Communications. – М.: LAP Lambert Academic Publishing, 2011. – 148 с.
  33. Juri Luca De Coi. Security control brought back to the user. – М.: LAP Lambert Academic Publishing, 2010. – 160 с.
  34. Navneet kaur Bajwa. Sanitization of Data in Computer Network. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  35. Divya Sushma. facial recognition system. – М.: LAP Lambert Academic Publishing, 2011. – 76 с.
  36. Dilloo Lubna. Face Recognition. – М.: , 2011. – 88 с.

Дополнительные результаты

  1. Bill Franks. Taming The Big Data Tidal Wave: Finding Opportunities in Huge Data Streams with Advanced Analytics (Wiley and SAS Business Series). – М.: , 2012. – 304 с.
  2. Public Key Infrastructures, Services and Applications: 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected ... Computer Science / Security and Cryptology). – М.: , 2012. – 219 с.
  3. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с.
  4. Muhammad Haroon Siddiqui, Muhammad Rehan Khalid. Localization and Tracking of a Mobile Node Using WiFi: Modelling, Simulations and Real-Time Analysis. – М.: , 2012. – 152 с.
  5. Charles H. Fine. Clockspeed: Winning Industry Control in the Age of Temporary Advantage. – М.: , 2012. – 392 с.
  6. David Chanoff, Ejovi Nuwere. Hacker Cracker : A Journey from the Mean Streets of Brooklyn to the Frontiers of Cyberspace. – М.: , 0. – 0 с.
  7. Ian Hutchby, Jo Moran-Ellis. Children, Technology and Culture: The Impacts of Technologies in Children's Everyday Lives (The Future of Childhood). – М.: , 0. – 0 с.
  8. Economic Risk in Hydrocarbon Exploration. – М.: , 0. – 0 с.
  9. Terrell Ward Bynum, Simon Rogerson, Blackwell Pub. Computer Ethics and Professional Responsibility: Introductory Text and Readings. – М.: , 0. – 0 с.
  10. Pam Young, Peggy Jones. Sidetracked Home Executives(TM): From Pigpen to Paradise. – М.: Grand Central Publishing, 2001. – 192 с.
  11. Allen G. Taylor. Crystal Reports 9 for Dummies. – М.: , 0. – 0 с.
  12. James L. Creighton, James W. R. Adams. Cybermeeting: How to Link People and Technology in Your Organization. – М.: , 0. – 0 с.
  13. Ron Ernst. RealTime Coaching with Profile. – М.: , 0. – 0 с.
  14. Robert Pool. Beyond Engineering: How Society Shapes Technology (Sloan Technology Series). – М.: , 0. – 0 с.
  15. Norman R. Howes. Modern Project Management : Successfully Integrating Project Management Knowledge Areas and Processes. – М.: , 0. – 0 с.
  16. Mark Bunting, Mark Seal. Virtual Power: Using Your PC to Realize the Life of Your Dreams. – М.: , 0. – 0 с.
  17. Robert L. Goodman, Robert Goodman. How Electronic Things Work... And What to do When They Don't. – М.: , 0. – 0 с.
  18. Richard A. Cox. Technician's Guide to Programmable Controllers. – М.: , 0. – 0 с.
  19. Kenneth C. Mansfield, James L. Antonakos. Introduction to Computers for Engineering and Technology. – М.: , 0. – 0 с.
  20. Dan L. Beeson. Assembling and Repairing Personal Computers (2nd Edition). – М.: , 0. – 0 с.
  21. John Reeder. Using MultiSIM: Digital Electronics. – М.: , 0. – 0 с.
  22. Berkeley, The BRIE-IGCC Economy Project. Tracking a Transformation: E-commerce and the Terms of Competition in Industries. – М.: , 0. – 0 с.
  23. John Francis McDermott. Economics in Real Time : A Theoretical Reconstruction (Advances in Heterodox Economics). – М.: , 0. – 0 с.
  24. Peter Grindley. Standards Strategy and Policy: Cases and Stories. – М.: , 0. – 0 с.
  25. Charles H. Fine. Clockspeed : Winning Industry Control in the Age of Temporary Advantage. – М.: Basic Books, 1999. – 288 с.
  26. Seymour Bosworth, Michel E. Kabay. Computer Security Handbook. – М.: , 0. – 0 с.
  27. Richard Hunter. World Without Secrets: Business, Crime and Privacy in the Age of Ubiquitous Computing. – М.: , 0. – 0 с.
  28. Thomas J. Parenty. Digital Defense: What You Should Know About Protecting Your Company's Assets. – М.: , 0. – 0 с.
  29. Marko Nordquist. Towards Improved Security Management Practice: Designing an Organizational Model Procedure for the Implementation of Information Security Management in Heterogeneous Information Management. – М.: , 0. – 0 с.
  30. Computer Security. – М.: , 0. – 0 с.
  31. Donn B. Parker. Fighting Computer Crime : A New Framework for Protecting Information. – М.: , 0. – 0 с.
  32. David Bunnell. Making the Cisco Connection : The Story Behind the Real Internet Superpower. – М.: , 0. – 0 с.
  33. Dan Steinbock. Wireless Horizon. – М.: , 0. – 0 с.
  34. Bart Castricone. Excuse Me, That's My Foot in the Door!: Selling the Natural Way. – М.: , 0. – 0 с.
  35. Paul D. Kadavy. Personal Cash Flow and Net Worth Planning Demystified. – М.: , 0. – 0 с.
  36. R. F. Churchhouse. Codes and Ciphers: Julius Caesar, the Enigma, and the Internet. – М.: , 0. – 0 с.
  37. Anne Hart. Make Money With Your Camcorder and Pc, 25+ Businesses: What to Expect from the Talking Cure. – М.: , 0. – 0 с.
  38. Anne Hart. How to Make Money Organizing Information. – М.: , 0. – 0 с.
  39. Entrepreneur Magazine. Entrepreneur Magazine : Making Money with Your Personal Computer (Entrepreneur Magazine). – М.: , 0. – 0 с.
  40. Martin Kenney. Understanding Silicon Valley: The Anatomy of an Entrepreneurial Region. – М.: Stanford Business Books, 2000. – 304 с.
  41. Jim Banister. Word of Mouse : The New Age of Networked Media. – М.: , 0. – 0 с.
  42. George Mohay, Alison Anderson, Byron Collie, Olivier de Vel, Rod McKemmish. Computer and Intrusion Forensics (Artech House Computer Security Series). – М.: , 0. – 0 с.
  43. Bill James. Desktop Hosting: A Developer's Guide to Unattended Communications with CDROM. – М.: , 0. – 0 с.
  44. Vesna Hassler. Security Fundamentals for E-Commerce (Artech House Computer Security Series). – М.: , 0. – 0 с.
  45. James M. Nyce, Paul Kahn. From Memex To Hypertext. – М.: , 0. – 0 с.
  46. Thomas Peltier, Thomas Pelitier, Justin Peltier, John A. Blackley, Peltier, Associates. Information Security Fundamentals. – М.: , 0. – 0 с.
  47. Lyle M. Spencer. Reengineering Human Resources. – М.: , 0. – 0 с.
  48. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с.
  49. Craig C. Sherbrooke. Optimal Inventory Modeling of Systems : Multi-Echelon Techniques (International Series in Operations Research & Management Science). – М.: , 2004. – 0 с.
  50. John W Farber. Essential Electronics For PC Technicians (Electrical and Computer Engineering Series). – М.: , 2004. – 0 с.
  51. Christopher A. Crayton. Security + Exam Guide (Testtaker's Guide Series). – М.: , 2003. – 0 с.
  52. World Bank. Little Data Book 2004 (Little Data Book). – М.: , 2004. – 0 с.
  53. Jeffrey R. Yost. The Computer Industry (Emerging Industries in the United States). – М.: , 2005. – 0 с.
  54. John D. Kenworthy. Bungee Jumping & Cocoons: The Dual Nature of the Industrial Marketplace. – М.: , 2003. – 0 с.
  55. Steve Wozniak, Gina Smith. iWoz: From Computer Geek to Cult Icon: How I Invented the Personal Computer, Co-Founded Apple, and Had Fun Doing It. – М.: W. W. Norton & Company, Inc., 2006. – 288 с.
  56. Curtis R. Carlson, William W. Wilmot. Innovation: The Five Disciplines for Creating What Customers Want. – М.: , 2006. – 368 с.
  57. National Research Council (U. S.). The Offshoring of Engineering: Facts, Unknowns, and Potential Implications. – М.: , 2008. – 240 с.
  58. Steve Hamm. The Race for Perfect: Inside the Quest to Design the Ultimate Portable Computer. – М.: , 2008. – 312 с.
  59. Bruce Schneier. Schneier on Security. – М.: , 2008. – 336 с.
  60. Richard H. McLaren. The Annotated Ontario Personal Property Security Act 2009. – М.: , 2008. – 870 с.
  61. Jack P. Friedman, Jack C. Harris and Skip Stearns. Keys To Buying Foreclosed and Bargain Homes. – М.: Barron's Educational Series, 2008. – 208 с.
  62. Andy Jones. Risk Management for Computer Security. – М.: , 2010. – 296 с.
  63. Within the Stone. – М.: , 2004. – 180 с.
  64. Neale Monks. Astronomy with a Home Computer (Patrick Moore's Practical Astronomy Series). – М.: , 2005. – 202 с.
  65. Derek A. Roff. Modeling Evolution: An Introduction to Numerical Methods. – М.: , 2010. – 352 с.
  66. Bryan Pfaffenberger. Webster?s New WorldTM Computer Dictionary. – М.: , 2003. – 432 с.
  67. Kevin D. Mitnick. The Art of Intrusion. – М.: , 2005. – 270 с.
  68. iSafe. i–SAFE Internet Life Skills Activities. – М.: , 2010. – 160 с.
  69. Warren E. Stewart. Computer–Aided Modeling of Reactive Systems. – М.: , 2008. – 268 с.
  70. Andrea L. Press. The New Media Environment. – М.: , 2010. – 240 с.
  71. T. Bradley. Essential Computer Security: Everyone's Guide to Email, Internet, andWireless Security. – М.: , 2010. – 0 с.
  72. Tony Flick, Justin Morehouse. Securing the Smart Grid: Next Generation Power Grid Security. – М.: Рид Элсивер, 2011. – 320 с.
  73. Tim Speed. The Personal Internet Security Guidebook. – М.: , 2010. – 202 с.
  74. John M. Carroll. Computer Security. – М.: , 2010. – 648 с.
  75. David Sachs. Discovering Microsoft Works for the IBM® Personal Computer. – М.: , 1989. – 300 с.
  76. Peter Stephenson. Introduction to Personal Computers. – М.: , 1991. – 288 с.
  77. John Castek. Structured BASIC Programming on IBM Personal Computers. – М.: , 1988. – 688 с.
  78. A MARGOLIS. Margolis: Troubleshooting And Repairing The New ?personal? Computers (pr Only). – М.: , 1987. – 416 с.
  79. Jim Hoskins. IBM® Personal Computers. – М.: , 1995. – 398 с.
  80. Alan G. Konheim. Computer Security and Cryptography. – М.: , 1972. – 0 с.
  81. Babette Kronstadt. Discovering Microsoft Works 2.0 for the IBM® Personal Computer. – М.: , 1993. – 432 с.
  82. Babette Kronstadt. Discovering Microsoft Works 2.0 for the IBM® Personal Computer. – М.: , 1993. – 384 с.
  83. Computer Security Handbook. – М.: , 2002. – 1224 с.
  84. David Sachs. Discovering Microsoft Works for the IBM® Personal Computer. – М.: , 1989. – 278 с.
  85. PERRY. Perry: How To Buy Personal Computer Software. – М.: , 1993. – 0 с.
  86. Skvarcius. Using Dec Personal Computers A Self Teaching Guide. – М.: , 1988. – 0 с.
  87. Bob O?Donnell. Personal Computer Secrets®. – М.: , 1999. – 926 с.
  88. GC SS DAWSON. Dawson: ?microtutor? For Elements Of Grammar Revie W For The Ibm Personal Computer & Compat. – М.: , 1988. – 34 с.
  89. Granino A. Korn. Neural Networks & Fuzzy–Logic Control on Personal Computers & Workstations + D3. – М.: , 1995. – 304 с.
  90. R TRAISTER. Traister Ibm ?personal? Computer (paper Only). – М.: , 1982. – 0 с.
  91. Dieter Gollmann. Computer Security. – М.: , 1998. – 336 с.
  92. PERRY. Perry: Guide Install Personal Computers. – М.: , 1993. – 0 с.
  93. CA TM. Simple Computer Security. – М.: , 2007. – 332 с.
  94. ED. Personal Computer Security. – М.: , 1996. – 360 с.
  95. L SCHMELTZ. Schmeltz ?playing? The Stock & Bond Markets With Y Our Personal Computer (paper Only). – М.: , 1982. – 0 с.
  96. Donald A Norman. The Invisible Computer – Why Good Products Can Fail, The Personal Computer is So Complex, & Information Appliances are the Solution (Cloth). – М.: , 1998. – 316 с.
  97. RH BAKER. Baker ?computer Security? Handbook. – М.: , 1985. – 288 с.
  98. Hutt. Computer Security Handbook, 3rd Edition, 2000 Cumu lative Supplement. – М.: , 2000. – 112 с.
  99. Deborah Russell. Computer Security Basics. – М.: , 1991. – 464 с.
  100. DR MCGLYNN. Mcglynn Personal ?computing? – Home Professional And Small Bus Appl (paper Only). – М.: , 1979. – 264 с.
  101. Computer Security Handbook. – М.: , 1995. – 1088 с.
  102. David Sachs. Discovering Microsoft Works for the IBM® Personal Computer. – М.: , 1989. – 278 с.
  103. Donald Norman. The Invisible Computer – Why Good Products Can Fail, the Personal Computer Is So Complex & Information Appliacnes are the Solution (Paper). – М.: , 1999. – 316 с.
  104. Granino A. Korn. Korn: Neural Network Experiments On Personal Computers & Workstations (pr Only). – М.: , 1991. – 264 с.
  105. J ZONDERMAN. Zonderman Personal Computer ?investment? Handbook (paper Only). – М.: , 1985. – 160 с.
  106. S. Rao Vallabhaneni. Auditing Computer Security. – М.: , 1989. – 368 с.
  107. D Sachs. Discovering Microsoft Works for the IBM Personal Computer (Disk) – Student Data Disk. – М.: , 1990. – 0 с.
  108. The Race For Perfect: Inside The Quest To Design The Ultimate Portable Computer. – М.: , 2011. – 312 с.
  109. Principles Of Computer Security, Comptia Security+ And Beyond, Second Edition. – М.: , 2011. – 0 с.
  110. Handbook Of Analytical Instruments. – М.: , 2011. – 770 с.
  111. Hacking Exposed, Sixth Edition. – М.: , 2011. – 720 с.
  112. Mike Meyers' Comptia A+ Guide: Practical Application, Third Edition (Exam 220-702). – М.: , 2011. – 0 с.
  113. Computer Security: 20 Things Every Employee Should Know. – М.: , 2011. – 0 с.
  114. Mike Meyers' Comptia A+ Guide: Practical Application Lab Manual, Third Edition (Exam 220-702). – М.: , 2011. – 320 с.
  115. Principles Of Computer Security Comptia Security+ And Beyond Lab Manual, Second Edition. – М.: , 2011. – 352 с.
  116. Eoghan Casey. Digital Evidence and Computer Crime. – М.: , . –  с.
  117. Terry T. Wohlers. Applying AutoCAD: A Step-By-Step Approach for AutoCAD Release 14, Student Text (Softbound). – М.: , . –  с.
  118. The Hacker Ethic and the Spirit of the New Economy. – М.: , . –  с.
  119. Dave Tyson. Security Convergence: Managing Enterprise Security Risk. – М.: , 2007. – 232 с.
  120. John Markoff. What the Dormouse Said: How the Sixties Counterculture Shaped the Personal Computer Industry. – М.: Penguin, 2006. – 336 с.
  121. Emily M. Harwood. Digital CCTV: A Security Professional's Guide. – М.: Butterworth-Heinemann, 2007. – 272 с.
  122. Lily Crowther. Award Winning British Design: 1957-1988. – М.: V&A Publications, 2012. – 108 с.
  123. Guy Hart-Davis. Apple TV Portable Genius. – М.: Visual, 2013. – 288 с.
  124. John Allison and Jeremy Townend with Paul Emmerson. The Business 2.0 B2: Upper Intermediate: Student's Book + The Business 2.0 B2: Upper Intermediate: eWorkbook (комплект из 2 книг + DVD-ROM). – М.: Macmillan Education, 2013. – 176 с.
  125. John Allison, Paul Emmerson, Jeremy Townend. The Business 2.0 B2: Upper Intermediate: Student's Book. – М.: Macmillan Education, 2013. – 160 с.
  126. John Allison, Paul Emmerson. The Business 2.0 Intermediate B1+: Student's Book. The Business 2.0 Intermediate B1+: eWorkbook (комплект из 2 книг + DVD-ROM). – М.: Macmillan Education, 2013. – 176 с.
  127. Francis Watkins, Paul Emmerson, Mike Sayer. The Business 2.0: Upper Intermediate B2 Teacher's Book (+ CD-ROM). – М.: Macmillan Education, 2013. – 104 с.
  128. Tejbanta Singh Chingtham. A Computational Intelligence Paradigm. – М.: LAP Lambert Academic Publishing, 2010. – 60 с.
  129. Okechukwu Ezema. Heavy metals in computer wastes. – М.: LAP Lambert Academic Publishing, 2011. – 124 с.
  130. Nyet Moi Siew. The Effects of an Inquiry-Based Computer-Simulated Lesson in Physics. – М.: LAP Lambert Academic Publishing, 2011. – 288 с.
  131. Priyanka Sharma and Harsad Bhadka. Computer Maintenance & Peripherals. – М.: LAP Lambert Academic Publishing, 2012. – 184 с.
  132. Ooi Ghee Beng. The Business Dynamics of Intel Desktop Computers. – М.: LAP Lambert Academic Publishing, 2011. – 144 с.
  133. Pallavali Radha Krishna Reddy and Gullapalli Sireesha. The Security Issues of Cloud Computing Over Normal & ITSector. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  134. Oluwafemi Osho and Victor Waziri. Conceptual Models and Simulation of Computer Worm Propagation. – М.: LAP Lambert Academic Publishing, 2013. – 116 с.
  135. Shivan Fazil Sabr. Cloud Computing Security. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  136. Stephen Murove,S. B. Mangena and B. Jones. Firewall Evaluation:Models for Major Decisions in Computer Security. – М.: LAP Lambert Academic Publishing, 2014. – 236 с.
  137. Irfan Syamsuddin. Guidelines for Computer Forensics Investigations in Developing Country. – М.: LAP Lambert Academic Publishing, 2011. – 104 с.
  138. Khanyisa Malufu. E-Banking Security. – М.: LAP Lambert Academic Publishing, 2013. – 112 с.
  139. Stanislav Popov. Personal computer and software basics in English. – М.: LAP Lambert Academic Publishing, 2011. – 180 с.
  140. David Antonio Gomez Jauregui and Patrick Horain. 3D Motion Capture by Computer Vision and Virtual Rendering. – М.: LAP Lambert Academic Publishing, 2012. – 156 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Особенности национального - ИТ рекрутмента. интервью с Е. Позняковой, генеральным директором специализированного кадрового агентства CONNECT PERSONAL. "Управление персоналом", № 19, октябрь 2005.
  2. Персонал от слова "person". Попробуем оценить?. Т. Лобанова, "Консультант", № 7, апрель 2008.

Образцы работ

Тема и предметТип и объем работы
Особенности мотивационной составляющей корпоративной культуры ОАО «Нижновэнерго»
Менеджмент
Диплом
100 стр.
Последствия операции НАТО
Политология
Диплом
80 стр.
Платежные системы в Интернете
Информатика
Диплом
102 стр.
Феномен лидерства в политической жизни современной России
Политология
Диплом
93 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Ирина
Добрый день Лилия! Спасибо за диплом после вашего сопровождения, защитилась хорошо. Еще раз спасибо. Ирина.