Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 515 с. Robert Muksian. Mathematics of Interest Rates, Insurance, Social Security, and Pensions. – М.: , 0. – 0 с. Tom W. Goad. Information Literacy and Workplace Performance. – М.: , 0. – 0 с. Marko Nordquist. Towards Improved Security Management Practice: Designing an Organizational Model Procedure for the Implementation of Information Security Management in Heterogeneous Information Management. – М.: , 0. – 0 с. Computer Security. – М.: , 0. – 0 с. R. F. Churchhouse. Codes and Ciphers: Julius Caesar, the Enigma, and the Internet. – М.: , 0. – 0 с. Gary C. Guthrie. Mathematics of Interest Rates and Finance. – М.: , 2003. – 0 с. Melanie Cullen, Shae Irving. Get It Together: Organize Your Records So Your Family Won't Have To (Book with CD-Rom). – М.: , 2007. – 143 с. Peter Dreier, John Mollenkopf, Todd Swanstrom. Place Matters: Metropolitics For The Twenty-First Century (Studies in Government and Public Policy). – М.: , 2005. – 428 с. From Data and Information Analysis to Knowledge Engineering : Proceedings of the 29th Annual Conference of the Gesellschaft fA?r Klassifikation e.V., University ... Data Analysis. – М.: , 2006. – 761 с. National Research Council (U. S.). The Offshoring of Engineering: Facts, Unknowns, and Potential Implications. – М.: , 2008. – 240 с. Bruce Schneier. Schneier on Security. – М.: , 2008. – 336 с. Andy Walker. Windows Lockdown!: Your XP and Vista Guide Against Hacks, Attacks, and Other Internet Mayhem (Absolute Beginner's Guide). – М.: , 2008. – 480 с. iSafe. i–SAFE Internet Life Skills Activities. – М.: , 2010. – 160 с. ED. Personal Computer Security. – М.: , 1996. – 360 с. Emily M. Harwood. Digital CCTV: A Security Professional's Guide. – М.: Butterworth-Heinemann, 2007. – 272 с. A. K. M. Harun-Ur-Rashid. E-Banking Services. – М.: LAP Lambert Academic Publishing, 2011. – 92 с. Viplav Gautam and Saurabh Sharma. Study of Speaker Recognition. – М.: LAP Lambert Academic Publishing, 2013. – 72 с. Naseer Ahmad. Security Issues in Wireless Networks. – М.: LAP Lambert Academic Publishing, 2010. – 60 с. Sudarshan Ranpise. Cyber Crime Prevention. – М.: LAP Lambert Academic Publishing, 2013. – 268 с. Nateq Be-Nazir Ibn Minar. Bluetooth Networking and its Security Architecture. – М.: LAP Lambert Academic Publishing, 2012. – 84 с. Shahab Saquib Sohail and Musheer Ahmad. Chaos-based Encryption. – М.: LAP Lambert Academic Publishing, 2012. – 144 с. Firkhan Ali Hamid Ali. Vulnerability Analysis on the Computer Network Security. – М.: LAP Lambert Academic Publishing, 2010. – 72 с. Abanti Cyrus. Makori,Miph Musoke and Gilbert Maiga. Health Informatics and Personality Traits. – М.: LAP Lambert Academic Publishing, 2013. – 108 с. Vinayak Bharadi and Hemchandra Kekre. Signature Recognition Using Clustering Techniques. – М.: LAP Lambert Academic Publishing, 2012. – 180 с. Ganesh Chandra Deka. Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 140 с. Todd Deshane. A Desktop System for Attack-Resistance and Rapid Recovery. – М.: LAP Lambert Academic Publishing, 2010. – 124 с. Igor Botian. Software Security Vulnerabilities in Mobile Peer-to-peer Environment. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Hassen Alsafi and Mohammed Azhruddin. The Security Issues for Smart Grids Applications on Cloud Computing. – М.: LAP Lambert Academic Publishing, 2013. – 60 с. Amnesh Goel and Nidhi Chandra. Secure Image Archival Based on Image Encryption Technique. – М.: LAP Lambert Academic Publishing, 2012. – 64 с. Paul Denys. Security of Personal Information in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 144 с. Paolo Gasti. Privacy and Security of Internet Communications. – М.: LAP Lambert Academic Publishing, 2011. – 148 с. Juri Luca De Coi. Security control brought back to the user. – М.: LAP Lambert Academic Publishing, 2010. – 160 с. Navneet kaur Bajwa. Sanitization of Data in Computer Network. – М.: LAP Lambert Academic Publishing, 2012. – 92 с. Divya Sushma. facial recognition system. – М.: LAP Lambert Academic Publishing, 2011. – 76 с. Dilloo Lubna. Face Recognition. – М.: , 2011. – 88 с. Дополнительные результаты Bill Franks. Taming The Big Data Tidal Wave: Finding Opportunities in Huge Data Streams with Advanced Analytics (Wiley and SAS Business Series). – М.: , 2012. – 304 с. Public Key Infrastructures, Services and Applications: 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected ... Computer Science / Security and Cryptology). – М.: , 2012. – 219 с. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с. Muhammad Haroon Siddiqui, Muhammad Rehan Khalid. Localization and Tracking of a Mobile Node Using WiFi: Modelling, Simulations and Real-Time Analysis. – М.: , 2012. – 152 с. Charles H. Fine. Clockspeed: Winning Industry Control in the Age of Temporary Advantage. – М.: , 2012. – 392 с. David Chanoff, Ejovi Nuwere. Hacker Cracker : A Journey from the Mean Streets of Brooklyn to the Frontiers of Cyberspace. – М.: , 0. – 0 с. Ian Hutchby, Jo Moran-Ellis. Children, Technology and Culture: The Impacts of Technologies in Children's Everyday Lives (The Future of Childhood). – М.: , 0. – 0 с. Economic Risk in Hydrocarbon Exploration. – М.: , 0. – 0 с. Terrell Ward Bynum, Simon Rogerson, Blackwell Pub. Computer Ethics and Professional Responsibility: Introductory Text and Readings. – М.: , 0. – 0 с. Pam Young, Peggy Jones. Sidetracked Home Executives(TM): From Pigpen to Paradise. – М.: Grand Central Publishing, 2001. – 192 с. Allen G. Taylor. Crystal Reports 9 for Dummies. – М.: , 0. – 0 с. James L. Creighton, James W. R. Adams. Cybermeeting: How to Link People and Technology in Your Organization. – М.: , 0. – 0 с. Ron Ernst. RealTime Coaching with Profile. – М.: , 0. – 0 с. Robert Pool. Beyond Engineering: How Society Shapes Technology (Sloan Technology Series). – М.: , 0. – 0 с. Norman R. Howes. Modern Project Management : Successfully Integrating Project Management Knowledge Areas and Processes. – М.: , 0. – 0 с. Mark Bunting, Mark Seal. Virtual Power: Using Your PC to Realize the Life of Your Dreams. – М.: , 0. – 0 с. Robert L. Goodman, Robert Goodman. How Electronic Things Work... And What to do When They Don't. – М.: , 0. – 0 с. Richard A. Cox. Technician's Guide to Programmable Controllers. – М.: , 0. – 0 с. Kenneth C. Mansfield, James L. Antonakos. Introduction to Computers for Engineering and Technology. – М.: , 0. – 0 с. Dan L. Beeson. Assembling and Repairing Personal Computers (2nd Edition). – М.: , 0. – 0 с. John Reeder. Using MultiSIM: Digital Electronics. – М.: , 0. – 0 с. Berkeley, The BRIE-IGCC Economy Project. Tracking a Transformation: E-commerce and the Terms of Competition in Industries. – М.: , 0. – 0 с. John Francis McDermott. Economics in Real Time : A Theoretical Reconstruction (Advances in Heterodox Economics). – М.: , 0. – 0 с. Peter Grindley. Standards Strategy and Policy: Cases and Stories. – М.: , 0. – 0 с. Charles H. Fine. Clockspeed : Winning Industry Control in the Age of Temporary Advantage. – М.: Basic Books, 1999. – 288 с. Seymour Bosworth, Michel E. Kabay. Computer Security Handbook. – М.: , 0. – 0 с. Richard Hunter. World Without Secrets: Business, Crime and Privacy in the Age of Ubiquitous Computing. – М.: , 0. – 0 с. Thomas J. Parenty. Digital Defense: What You Should Know About Protecting Your Company's Assets. – М.: , 0. – 0 с. Marko Nordquist. Towards Improved Security Management Practice: Designing an Organizational Model Procedure for the Implementation of Information Security Management in Heterogeneous Information Management. – М.: , 0. – 0 с. Computer Security. – М.: , 0. – 0 с. Donn B. Parker. Fighting Computer Crime : A New Framework for Protecting Information. – М.: , 0. – 0 с. David Bunnell. Making the Cisco Connection : The Story Behind the Real Internet Superpower. – М.: , 0. – 0 с. Dan Steinbock. Wireless Horizon. – М.: , 0. – 0 с. Bart Castricone. Excuse Me, That's My Foot in the Door!: Selling the Natural Way. – М.: , 0. – 0 с. Paul D. Kadavy. Personal Cash Flow and Net Worth Planning Demystified. – М.: , 0. – 0 с. R. F. Churchhouse. Codes and Ciphers: Julius Caesar, the Enigma, and the Internet. – М.: , 0. – 0 с. Anne Hart. Make Money With Your Camcorder and Pc, 25+ Businesses: What to Expect from the Talking Cure. – М.: , 0. – 0 с. Anne Hart. How to Make Money Organizing Information. – М.: , 0. – 0 с. Entrepreneur Magazine. Entrepreneur Magazine : Making Money with Your Personal Computer (Entrepreneur Magazine). – М.: , 0. – 0 с. Martin Kenney. Understanding Silicon Valley: The Anatomy of an Entrepreneurial Region. – М.: Stanford Business Books, 2000. – 304 с. Jim Banister. Word of Mouse : The New Age of Networked Media. – М.: , 0. – 0 с. George Mohay, Alison Anderson, Byron Collie, Olivier de Vel, Rod McKemmish. Computer and Intrusion Forensics (Artech House Computer Security Series). – М.: , 0. – 0 с. Bill James. Desktop Hosting: A Developer's Guide to Unattended Communications with CDROM. – М.: , 0. – 0 с. Vesna Hassler. Security Fundamentals for E-Commerce (Artech House Computer Security Series). – М.: , 0. – 0 с. James M. Nyce, Paul Kahn. From Memex To Hypertext. – М.: , 0. – 0 с. Thomas Peltier, Thomas Pelitier, Justin Peltier, John A. Blackley, Peltier, Associates. Information Security Fundamentals. – М.: , 0. – 0 с. Lyle M. Spencer. Reengineering Human Resources. – М.: , 0. – 0 с. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с. Craig C. Sherbrooke. Optimal Inventory Modeling of Systems : Multi-Echelon Techniques (International Series in Operations Research & Management Science). – М.: , 2004. – 0 с. John W Farber. Essential Electronics For PC Technicians (Electrical and Computer Engineering Series). – М.: , 2004. – 0 с. Christopher A. Crayton. Security + Exam Guide (Testtaker's Guide Series). – М.: , 2003. – 0 с. World Bank. Little Data Book 2004 (Little Data Book). – М.: , 2004. – 0 с. Jeffrey R. Yost. The Computer Industry (Emerging Industries in the United States). – М.: , 2005. – 0 с. John D. Kenworthy. Bungee Jumping & Cocoons: The Dual Nature of the Industrial Marketplace. – М.: , 2003. – 0 с. Steve Wozniak, Gina Smith. iWoz: From Computer Geek to Cult Icon: How I Invented the Personal Computer, Co-Founded Apple, and Had Fun Doing It. – М.: W. W. Norton & Company, Inc., 2006. – 288 с. Curtis R. Carlson, William W. Wilmot. Innovation: The Five Disciplines for Creating What Customers Want. – М.: , 2006. – 368 с. National Research Council (U. S.). The Offshoring of Engineering: Facts, Unknowns, and Potential Implications. – М.: , 2008. – 240 с. Steve Hamm. The Race for Perfect: Inside the Quest to Design the Ultimate Portable Computer. – М.: , 2008. – 312 с. Bruce Schneier. Schneier on Security. – М.: , 2008. – 336 с. Richard H. McLaren. The Annotated Ontario Personal Property Security Act 2009. – М.: , 2008. – 870 с. Jack P. Friedman, Jack C. Harris and Skip Stearns. Keys To Buying Foreclosed and Bargain Homes. – М.: Barron's Educational Series, 2008. – 208 с. Andy Jones. Risk Management for Computer Security. – М.: , 2010. – 296 с. Within the Stone. – М.: , 2004. – 180 с. Neale Monks. Astronomy with a Home Computer (Patrick Moore's Practical Astronomy Series). – М.: , 2005. – 202 с. Derek A. Roff. Modeling Evolution: An Introduction to Numerical Methods. – М.: , 2010. – 352 с. Bryan Pfaffenberger. Webster?s New WorldTM Computer Dictionary. – М.: , 2003. – 432 с. Kevin D. Mitnick. The Art of Intrusion. – М.: , 2005. – 270 с. iSafe. i–SAFE Internet Life Skills Activities. – М.: , 2010. – 160 с. Warren E. Stewart. Computer–Aided Modeling of Reactive Systems. – М.: , 2008. – 268 с. Andrea L. Press. The New Media Environment. – М.: , 2010. – 240 с. T. Bradley. Essential Computer Security: Everyone's Guide to Email, Internet, andWireless Security. – М.: , 2010. – 0 с. Tony Flick, Justin Morehouse. Securing the Smart Grid: Next Generation Power Grid Security. – М.: Рид Элсивер, 2011. – 320 с. Tim Speed. The Personal Internet Security Guidebook. – М.: , 2010. – 202 с. John M. Carroll. Computer Security. – М.: , 2010. – 648 с. David Sachs. Discovering Microsoft Works for the IBM® Personal Computer. – М.: , 1989. – 300 с. Peter Stephenson. Introduction to Personal Computers. – М.: , 1991. – 288 с. John Castek. Structured BASIC Programming on IBM Personal Computers. – М.: , 1988. – 688 с. A MARGOLIS. Margolis: Troubleshooting And Repairing The New ?personal? Computers (pr Only). – М.: , 1987. – 416 с. Jim Hoskins. IBM® Personal Computers. – М.: , 1995. – 398 с. Alan G. Konheim. Computer Security and Cryptography. – М.: , 1972. – 0 с. Babette Kronstadt. Discovering Microsoft Works 2.0 for the IBM® Personal Computer. – М.: , 1993. – 432 с. Babette Kronstadt. Discovering Microsoft Works 2.0 for the IBM® Personal Computer. – М.: , 1993. – 384 с. Computer Security Handbook. – М.: , 2002. – 1224 с. David Sachs. Discovering Microsoft Works for the IBM® Personal Computer. – М.: , 1989. – 278 с. PERRY. Perry: How To Buy Personal Computer Software. – М.: , 1993. – 0 с. Skvarcius. Using Dec Personal Computers A Self Teaching Guide. – М.: , 1988. – 0 с. Bob O?Donnell. Personal Computer Secrets®. – М.: , 1999. – 926 с. GC SS DAWSON. Dawson: ?microtutor? For Elements Of Grammar Revie W For The Ibm Personal Computer & Compat. – М.: , 1988. – 34 с. Granino A. Korn. Neural Networks & Fuzzy–Logic Control on Personal Computers & Workstations + D3. – М.: , 1995. – 304 с. R TRAISTER. Traister Ibm ?personal? Computer (paper Only). – М.: , 1982. – 0 с. Dieter Gollmann. Computer Security. – М.: , 1998. – 336 с. PERRY. Perry: Guide Install Personal Computers. – М.: , 1993. – 0 с. CA TM. Simple Computer Security. – М.: , 2007. – 332 с. ED. Personal Computer Security. – М.: , 1996. – 360 с. L SCHMELTZ. Schmeltz ?playing? The Stock & Bond Markets With Y Our Personal Computer (paper Only). – М.: , 1982. – 0 с. Donald A Norman. The Invisible Computer – Why Good Products Can Fail, The Personal Computer is So Complex, & Information Appliances are the Solution (Cloth). – М.: , 1998. – 316 с. RH BAKER. Baker ?computer Security? Handbook. – М.: , 1985. – 288 с. Hutt. Computer Security Handbook, 3rd Edition, 2000 Cumu lative Supplement. – М.: , 2000. – 112 с. Deborah Russell. Computer Security Basics. – М.: , 1991. – 464 с. DR MCGLYNN. Mcglynn Personal ?computing? – Home Professional And Small Bus Appl (paper Only). – М.: , 1979. – 264 с. Computer Security Handbook. – М.: , 1995. – 1088 с. David Sachs. Discovering Microsoft Works for the IBM® Personal Computer. – М.: , 1989. – 278 с. Donald Norman. The Invisible Computer – Why Good Products Can Fail, the Personal Computer Is So Complex & Information Appliacnes are the Solution (Paper). – М.: , 1999. – 316 с. Granino A. Korn. Korn: Neural Network Experiments On Personal Computers & Workstations (pr Only). – М.: , 1991. – 264 с. J ZONDERMAN. Zonderman Personal Computer ?investment? Handbook (paper Only). – М.: , 1985. – 160 с. S. Rao Vallabhaneni. Auditing Computer Security. – М.: , 1989. – 368 с. D Sachs. Discovering Microsoft Works for the IBM Personal Computer (Disk) – Student Data Disk. – М.: , 1990. – 0 с. The Race For Perfect: Inside The Quest To Design The Ultimate Portable Computer. – М.: , 2011. – 312 с. Principles Of Computer Security, Comptia Security+ And Beyond, Second Edition. – М.: , 2011. – 0 с. Handbook Of Analytical Instruments. – М.: , 2011. – 770 с. Hacking Exposed, Sixth Edition. – М.: , 2011. – 720 с. Mike Meyers' Comptia A+ Guide: Practical Application, Third Edition (Exam 220-702). – М.: , 2011. – 0 с. Computer Security: 20 Things Every Employee Should Know. – М.: , 2011. – 0 с. Mike Meyers' Comptia A+ Guide: Practical Application Lab Manual, Third Edition (Exam 220-702). – М.: , 2011. – 320 с. Principles Of Computer Security Comptia Security+ And Beyond Lab Manual, Second Edition. – М.: , 2011. – 352 с. Eoghan Casey. Digital Evidence and Computer Crime. – М.: , . – с. Terry T. Wohlers. Applying AutoCAD: A Step-By-Step Approach for AutoCAD Release 14, Student Text (Softbound). – М.: , . – с. The Hacker Ethic and the Spirit of the New Economy. – М.: , . – с. Dave Tyson. Security Convergence: Managing Enterprise Security Risk. – М.: , 2007. – 232 с. John Markoff. What the Dormouse Said: How the Sixties Counterculture Shaped the Personal Computer Industry. – М.: Penguin, 2006. – 336 с. Emily M. Harwood. Digital CCTV: A Security Professional's Guide. – М.: Butterworth-Heinemann, 2007. – 272 с. Lily Crowther. Award Winning British Design: 1957-1988. – М.: V&A Publications, 2012. – 108 с. Guy Hart-Davis. Apple TV Portable Genius. – М.: Visual, 2013. – 288 с. John Allison and Jeremy Townend with Paul Emmerson. The Business 2.0 B2: Upper Intermediate: Student's Book + The Business 2.0 B2: Upper Intermediate: eWorkbook (комплект из 2 книг + DVD-ROM). – М.: Macmillan Education, 2013. – 176 с. John Allison, Paul Emmerson, Jeremy Townend. The Business 2.0 B2: Upper Intermediate: Student's Book. – М.: Macmillan Education, 2013. – 160 с. John Allison, Paul Emmerson. The Business 2.0 Intermediate B1+: Student's Book. The Business 2.0 Intermediate B1+: eWorkbook (комплект из 2 книг + DVD-ROM). – М.: Macmillan Education, 2013. – 176 с. Francis Watkins, Paul Emmerson, Mike Sayer. The Business 2.0: Upper Intermediate B2 Teacher's Book (+ CD-ROM). – М.: Macmillan Education, 2013. – 104 с. Tejbanta Singh Chingtham. A Computational Intelligence Paradigm. – М.: LAP Lambert Academic Publishing, 2010. – 60 с. Okechukwu Ezema. Heavy metals in computer wastes. – М.: LAP Lambert Academic Publishing, 2011. – 124 с. Nyet Moi Siew. The Effects of an Inquiry-Based Computer-Simulated Lesson in Physics. – М.: LAP Lambert Academic Publishing, 2011. – 288 с. Priyanka Sharma and Harsad Bhadka. Computer Maintenance & Peripherals. – М.: LAP Lambert Academic Publishing, 2012. – 184 с. Ooi Ghee Beng. The Business Dynamics of Intel Desktop Computers. – М.: LAP Lambert Academic Publishing, 2011. – 144 с. Pallavali Radha Krishna Reddy and Gullapalli Sireesha. The Security Issues of Cloud Computing Over Normal & ITSector. – М.: LAP Lambert Academic Publishing, 2012. – 96 с. Oluwafemi Osho and Victor Waziri. Conceptual Models and Simulation of Computer Worm Propagation. – М.: LAP Lambert Academic Publishing, 2013. – 116 с. Shivan Fazil Sabr. Cloud Computing Security. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Stephen Murove,S. B. Mangena and B. Jones. Firewall Evaluation:Models for Major Decisions in Computer Security. – М.: LAP Lambert Academic Publishing, 2014. – 236 с. Irfan Syamsuddin. Guidelines for Computer Forensics Investigations in Developing Country. – М.: LAP Lambert Academic Publishing, 2011. – 104 с. Khanyisa Malufu. E-Banking Security. – М.: LAP Lambert Academic Publishing, 2013. – 112 с. Stanislav Popov. Personal computer and software basics in English. – М.: LAP Lambert Academic Publishing, 2011. – 180 с. David Antonio Gomez Jauregui and Patrick Horain. 3D Motion Capture by Computer Vision and Virtual Rendering. – М.: LAP Lambert Academic Publishing, 2012. – 156 с. Лучшие результаты Ничего не найдено Дополнительные результаты Особенности национального - ИТ рекрутмента. интервью с Е. Позняковой, генеральным директором специализированного кадрового агентства CONNECT PERSONAL. "Управление персоналом", № 19, октябрь 2005. Персонал от слова "person". Попробуем оценить?. Т. Лобанова, "Консультант", № 7, апрель 2008. Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Ирина Добрый день Лилия! Спасибо за диплом после вашего сопровождения, защитилась хорошо. Еще раз спасибо. Ирина.