Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Jeffrey Price. Practical Aviation Security. – М.: , 2010. – 416 с. Cem Karako. Separate Financing of Aircraft Engines. – М.: LAP Lambert Academic Publishing, 2010. – 92 с. Дополнительные результаты Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с. Constructive Side-Channel Analysis and Secure Design: Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings ... Computer Science / Security and Cryptology). – М.: , 2012. – 280 с. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с. Security and Development in Global Politics: A Critical Comparison. – М.: , 2012. – 360 с. Luis Lobo-Guerrero. Insuring Security: Biopolitics, security and risk. – М.: , 2012. – 178 с. Julian Burling. Lloyd's: Law and Practice (Lloyd's Insurance Law Library). – М.: , 2012. – 0 с. Securities Compliance Index. Securities Compliance Index, Second Edition: A Topical Guide To U.S. Securities Regulation. – М.: , 2012. – 512 с. American Bar Association, Thomas Lee Hazen. Securities Regulation: Corporate Counsel Guides. – М.: , 2012. – 540 с. Robert H. Spencer, Randolph P. Johnston. Technology Best Practices (Wiley Best Practices). – М.: , 0. – 0 с. William T. Moore. Real Options and Option-Embedded Securities. – М.: , 0. – 0 с. Changmin Chun. Cross-border Transactions of Intermediated Securities: A Comparative Analysis in Substantive Law and Private International Law. – М.: , 2012. – 524 с. The Labor & Employment Law Practice Group of Dinsmore & Shohl LLP, Llp the Labor & Employment Law Practice Group of Dinsmore & Shohl, Llp Labor & Employment Law Practice Group Dinsmore & Shohl. HR Survival Guide to Labor & Employment Law. – М.: , 0. – 0 с. Jianmin Zhao, Bruce J. Dickson, Chien-Min Zhao. Remaking the Chinese State: Strategies, Society, and Security (Asia's Transformations). – М.: , 0. – 0 с. Henry J. Aaron, John B. Shoven, Benjamin M. Friedman, Alvin Hansen Symposium on Public Policy 1998 Harvard University). Should the United States Privatize Social Security? (Alvin Hansen Symposium Series on Public Policy). – М.: , 0. – 0 с. David S. Katz, Ilan Caspi, David S. Katz, Ilan Caspi. Executive's Guide to Personal Security. – М.: , 0. – 0 с. Gerald Kovacich. The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition. – М.: , 0. – 0 с. Safety and the Security Professional : A Guide to Occupational Safety and Health Strategies. – М.: , 0. – 0 с. Security Operations Management. – М.: , 0. – 0 с. Philip P. Purpura. The Security Handbook. – М.: , 0. – 0 с. Practical Electronics Handbook. – М.: , 0. – 0 с. Lori Ann Thrupp. Cultivating Diversity: Agrobiodiversity and Food Security. – М.: , 0. – 0 с. Jon Barnett. The Meaning of Environmental Security: Environmental Politics and Policy in the New Security Era. – М.: , 0. – 0 с. Penny Davenport. A Practical Guide to Collateral Management in the OTC Derivatives Market (Finance and Capital Markets). – М.: Palgrave Macmillan, 2003. – 304 с. Gregory V. Kitter. Investment Mathematics for Finance & Treasury Professionals: A Practical Approach. – М.: , 0. – 0 с. Bruce Tuckman. Fixed Income Securities: Tools for Today's Markets. – М.: Wiley Publishing, Inc, 2002. – 512 с. Martin L. Leibowitz. Franchise Value : A Modern Approach to Security Analysis (Wiley Finance). – М.: , 0. – 0 с. Julia Lowell, C. R. Neu, Daochi Tong, National Defense Research Institute, National Security Research Institute. Financial Crises and Contagion in Emerging Market Countries. – М.: , 0. – 0 с. T. W. Epps. Pricing Derivative Securities. – М.: , 0. – 0 с. Peter J. Klein. Getting Started in Security Analysis. – М.: , 0. – 0 с. Peter Madlem, Larry D. Edwards. Power Investing With Basket Securities: The Investor's Guide to Exchange-Traded Funds. – М.: , 0. – 0 с. Gerald L. Kovacich, Edward P. Halibozek. The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, First Edition. – М.: , 0. – 0 с. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с. Marko Nordquist. Towards Improved Security Management Practice: Designing an Organizational Model Procedure for the Implementation of Information Security Management in Heterogeneous Information Management. – М.: , 0. – 0 с. Steve Purser. A Practical Guide to Managing Information Security (Artech House Technology Management Library). – М.: , 0. – 0 с. Computer Security. – М.: , 0. – 0 с. Encyclopedia of Security Management : Techniques and technology. – М.: , 0. – 0 с. Retail Security and Shrinkage Protection. – М.: , 0. – 0 с. Effective Security Management, Fourth Edition (Effective Security Management). – М.: , 0. – 0 с. Joseph S. Nye, William A. Owens, James R. Schlesinger, R. James Woolsey, James A. Lewis, Joseph S., Jr. Nye, James Andrew Lewis, Erin Schlather, Csis Commission on Technology Security in the Twenty-First Century. Computer Exports and National Security: New Tools for a New Century : A Report of the Csis Commission on Technology Security in the 21St-Century (Csis Panel Reports.). – М.: , 0. – 0 с. Jothy Rosenberg and David Remy. Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption. – М.: Sams, 2004. – 380 с. Roberta Bragg. MCSE Training Guide (70-220): Windows 2000 Network Security Design, Second Edition. – М.: , 0. – 0 с. Charles Carrington, Timothy Speed, Juanita Ellis, Steffano Korper. Enterprise Directory and Security Implementation Guide: Designing and Implementing Directories in Your Organization (The Korper and Ellis E-Commerce Books Series). – М.: , 0. – 0 с. Gunjan Samtani, Marcus Healey, Shyam Samtani. B2B Integration: A Practical Guide to Collaborative E-Commerce. – М.: , 0. – 0 с. Aspatore Books Staff. Inside the Minds: Security Matters - Industry Leaders from eBay, Inc., Motorola, Internet Security Systems & More on Protecting Your Most Valuable Assets. – М.: , 0. – 0 с. Charles Cresson Wood. Best Practices In Internet Commerce Security. – М.: , 0. – 0 с. Frank A. Stasiowski. Architect's Essentials of Winning Proposals (The Architect's Essentials of Professional Practice). – М.: , 2003. – 0 с. Christopher A. Crayton. Security + Exam Guide (Testtaker's Guide Series). – М.: , 2003. – 0 с. Debt Management and Government Securities Markets in the 21st Century. – М.: , 2004. – 0 с. Labor Markets and Social Security. – М.: , 2003. – 0 с. Robert A. Strong. Practical Investment Management. – М.: , 2003. – 0 с. Barbara C. McNurlin. Information Systems Management in Practice (7th Edition). – М.: , 2005. – 0 с. Stephen Penman. Financial Statement Analysis and Security Valuation. – М.: , 2003. – 0 с. The Secure Online Business: E-Commerce, It Functionality & Business Continuity. – М.: , 2003. – 0 с. E-Commerce Security: Advice from Experts (IT Solutions series). – М.: , 2004. – 0 с. Peter R., MBA Ramsaroop. Securing Business Intelligence: Knowledge and CyberSecurity in the Post 9/11 World. – М.: , 2004. – 0 с. Advances in Security and Payment Methods for Mobile Commerce. – М.: , 2004. – 0 с. William M. Epps. Terrorism and Personal Security : Reduce Your Chances of Becoming a Target. – М.: , 2005. – 0 с. Robert Anthony Chechile. The ABCs of IPOs : Investment Strategies and Tactics for New Issue Securities. – М.: , 2004. – 0 с. Scott Slorach, Paul Rylance. Corporate Finance, Mergers & Acquisitions 2005 (Blackstone Legal Practice Course Guide). – М.: Oxford University Press, 2005. – 280 с. Christopher Eiben. It Pays to be Paranoid : Securing Business Success by Preparing for the Worst. – М.: , 2004. – 0 с. Sari Greene. Security Policies and Procedures : Principles and Practices (Security). – М.: , 2005. – 0 с. Edward Borodzicz. Risk, Crisis and Security Management. – М.: , 2005. – 0 с. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с. Federal Aviation Administration. Instrument Rating Test Prep 2003: Study and Prepare for the Instrument Rating, Instrument Flight Instructor (CFII), Instrument Ground Instructions, and Foreign Pilot: Airplane and Helicopter FAA Knowledge Tests. – М.: , 2003. – 0 с. Sudhanshu Kairab. A Practical Guide to Security Assessments. – М.: , 2004. – 498 с. Jim Stewart. SAP Security: SAP Security Essentials. – М.: Equity Press, 2005. – 136 с. Brian Gouin. Security Design Consulting: The Business of Security System Design. – М.: , 2007. – 200 с. Jeremy Bolland. Writing Securities Research: A Best Practice Guide. – М.: , 2007. – 120 с. Betty E. Biringer, Rudolph V. Matalucci, Sharon L. O'Connor. Security Risk Assessment and Management: A Professional Practice Guide for Protecting Buildings and Infrastructures. – М.: , 2007. – 384 с. Strategies to Enhance Environmental Security in Transition Countries (NATO Science for Peace and Security Series / NATO Science for Peace and Security Series C: Environmental Secur. – М.: , 2007. – 444 с. Committee on Federal Regulation of Securities Committee. The Fund Director's Guidebook: Third Edition (Fund Director's Guidebook). – М.: , 2006. – 128 с. Robert A. Strong. Practical Investment Management (with Stock Track Coupon). – М.: , 2006. – 640 с. Richard P. Majka. Series 7 Securities Licensing Exam Review Exam Cram (Exam Cram). – М.: , 2005. – 888 с. Ron Carson, Steve Sanduski. Tested in the Trenches: A 9-Step Plan for Building and Sustaining a Million-Dollar Financial Services Practice. – М.: , 2005. – 288 с. Robert M. Doroghazi, Dan W. French. The Physician's Guide To Investing: A Practical Approach To Building Wealth. – М.: , 2005. – 228 с. Tourism, Security and Safety: From Theory to Practice (The Management of Hospitality and Tourism Enterprises). – М.: , 2005. – 376 с. Timothy P. Layton. Information Security. – М.: , 2006. – 222 с. Ernst & Young LLP, Jan Babiak, John Butters, Mark W. Doll. Defending the Digital Frontier: Practical Security for Management, 2nd Edition. – М.: , 2004. – 253 с. Michael Khairallah. Physical Security Systems Handbook: The Design and Implementation of Electronic Security Systems. – М.: , 2005. – 312 с. Michael Gentile, Ron Collette, Tom August. The Ciso Handbook: A Practical Guide to Securing Your Company. – М.: , 2005. – 352 с. George Haddow, Jane Bullock. Introduction to Emergency Management, Second Edition (Butterworth-Heinemann Homeland Security). – М.: , 2005. – 424 с. James Michael Stewart, Ed Tittel, Mike Chapple. CISSP: Certified Information Systems Security Professional Study Guide. – М.: , 2008. – 841 с. Pablo Gottret, George Schieber, Hugh R. Waters. Good Practices in Health Financing. – М.: , 2008. – 473 с. Alan Calder, Steve Watkins. IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002. – М.: , 2008. – 384 с. Lloyd's MIU Handbook of Maritime Security. – М.: , 2008. – 400 с. The Practical Guide to Foreign Direct Investment in the European Union. – М.: , 2008. – 400 с. Meridian Securities Market. World Stock Exchange Fact Book. – М.: , 2008. – 0 с. Ray S. Leki. Travel Wise: How to Be Safe, Savvy and Secure Abroad. – М.: , 2008. – 218 с. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с. Gerard Blokdijk, Ivanka Menken. Information Security Management Best Practice Workbook: Implementation and Management Roadmap for Threats, Challenges and Solutions - Ready to use supporting documents bringing Theory into Practice. – М.: , 2008. – 124 с. CompTIA Security+: Certification Kit (комплект из 3 книг + 2 CD-ROM). – М.: Sybex, 2009. – 1440 с. W. Krag Brotby. Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement. – М.: Auerbach Publications, 2009. – 200 с. Julian Talbot, Miles Jakeman. Security Risk Management Body of Knowledge (Wiley Series in Systems Engineering and Management). – М.: , 2009. – 445 с. Jake Kouns, Daniel Minoli. Information Technology Risk Management in Enterprise Environments: A Review of Industry Practices and a Practical Guide to Risk Management Teams. – М.: , 2010. – 421 с. Bel G. Raggad. Information Security Management: Concepts and Practice. – М.: , 2010. – 871 с. Digital Business Security Development: Management Technologies. – М.: , 2010. – 318 с. Christopher B. Barrett, Jeffrey Cason. Overseas Research II: A Practical Guide. – М.: , 2010. – 184 с. Alan Calder, Steve G Watkins. Information Security Risk Management for ISO27001 / ISO27002. – М.: , 2010. – 198 с. RITUPARNA DAS. Handbook of Fixed Income Securities: Indian Banking Perspective. – М.: , 2010. – 112 с. William Manning. CISM Certified Information Security Manager Certification Exam Preparation Course in a Book for Passing the CISM Exam - The How To Pass on Your First Try Certification Study Guide. – М.: , 2010. – 188 с. Jeffrey C. Hooke. Security Analysis and Business Valuation on Wall Street + Companion Web Site: A Comprehensive Guide to Today's Valuation Methods. – М.: Wiley, 2010. – 408 с. Evan Wheeler. Security Risk Management: Building an Information Security Risk Management Program from the Ground Up. – М.: , 2011. – 360 с. Michael Swan, Catherine Walter. The New Cambridge English Course. Practice 2. – М.: Cambridge University Press, 2005. – 128 с. Henry Emery and Andy Roberts. Check Your Aviation English (+ 2 CD-ROM). – М.: Macmillan Education, 2010. – 128 с. Molecular Imaging: Computer Reconstruction and Practice (NATO Science for Peace and Security Series B: Physics and Biophysics). – М.: , 2008. – 288 с. Barbara von Tigerstrom. Human Security and International Law. – М.: Hart Publishing, 2007. – 254 с. Moorad Choudhry. Fixed Income Securities and Derivatives Handbook. – М.: , 2010. – 496 с. Louis L. Straney. Securities Fraud. – М.: , 2010. – 208 с. Peter J. Klein. Getting Started in Security Analysis. – М.: , 2010. – 328 с. Josh Shaul. Practical Oracle Security. – М.: , 2010. – 288 с. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с. Jeffrey Price. Practical Aviation Security. – М.: , 2010. – 416 с. George L Stefanek. Information Security Best Practices. – М.: , 2010. – 160 с. Patrick Kane. Practical Security Training. – М.: , 2010. – 272 с. Christa Anderson and Kristin L. Griffin. Windows Server 2008 R2: Remote Desktop Services: Resource Kit (+ CD-ROM). – М.: Microsoft Press, 2010. – 718 с. PRACTICAL. Practical ?cnc?–training – For Planning & Shop – Fundamentals (paper Only). – М.: , 1986. – 184 с. EV (Evaluation Practice). Multisite Evaluation Practice. – М.: , 2011. – 112 с. Barbara von Tigerstrom. Human Security and International Law. – М.: , 2011. – 256 с. Ademola Abass. Regional Organisations and the Development of Collective Security. – М.: , 2011. – 272 с. The Legal Advisory Panel of the Aviation Working Group. Advanced Contract and Opinion Practices under the Cape Town Convention. – М.: , 2011. – 76 с. Karen Yeung. Securing Compliance. – М.: , 2011. – 307 с. Hacking Exposed Windows: Microsoft Windows Security Secrets And Solutions, Third Edition. – М.: , 2011. – 451 с. Hacking Exposed Web 2.0: Web 2.0 Security Secrets And Solutions. – М.: , 2011. – 258 с. Richard Deal. CCNA Cisco Certified Network Associate Security Study Guide: Exam 640-553 (+ CD-ROM). – М.: McGraw-Hill Osborne Media, 2009. – 832 с. Securing Global Transportation Networks. – М.: , 2011. – 312 с. Comptia Security+ All-In-One Exam Guide, Second Edition (Exam Sy0-201). – М.: , 2011. – 0 с. Information Technology In Water And Wastewater Utilities, Wef Mop 33. – М.: , 2011. – 376 с. Thomas Porter, Jan Kanclirz Jr. Practical VoIP Security. – М.: Syngress, 2006. – 564 с. Timothy Stapko. Practical Embedded Security: Building Secure Resource-Constrained Systems. – М.: Newnes, 2007. – 480 с. Eduardo Fernandez-Buglioni. Security Patterns in Practice: Designing Secure Architectures Using Software Patterns. – М.: Wiley, 2013. – 582 с. James Wilson. Aviation and Border Security. – М.: Dictus Publishing, 2011. – 112 с. Jane Situma,Jeremiah Okello and Lucy Mutuli. Health And Nutrition Status Of Preschool Children. – М.: LAP Lambert Academic Publishing, 2013. – 152 с. Ladhu R. Choudhary. The Politics Of Responsibility In International Relations. – М.: LAP Lambert Academic Publishing, 2014. – 116 с. Aliyu Onipede. Biometrics as a tool for Information Security in Aviation industry. – М.: LAP Lambert Academic Publishing, 2012. – 88 с. John A. Akerele. Nigerian Aviation Security Post Abdulmutallab the Christmas Bomber. – М.: LAP Lambert Academic Publishing, 2012. – 92 с. Jennifer. C. F. Loke. Interprofessional Online Learning in Healthcare Education. – М.: LAP Lambert Academic Publishing, 2012. – 368 с. Prashant Pittalia. Ecommerce Security Real Life Cases And Practical Solutions. – М.: , 2015. – 72 с. David Rule. How to Cheat at Configuring VmWare ESX Server. – М.: Syngress, 2007. – 408 с. Лучшие результаты Ничего не найдено Дополнительные результаты Best Practice в выборе "образа" компании. "Расчет", № 8, август 2009. Best practices финансового сообщества. Е. Тихомирова, "Консультант", № 7, апрель 2008. Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Татьяна (Москва), Здравствуйте, Ирина. Задачки получила. Очень благодарна. Никто не хотел браться за расчёты. Вы меня выручили. Уже второй раз обращаюсь за помощью к Студенточке и очень довольна.