Íàïèñàòü ðåôåðàòû, êóðñîâûå è äèïëîìû ñàìîñòîÿòåëüíî.  Àíòèïëàãèàò.
Ñòóäåíòî÷êà.ru: íà ãëàâíóþ ñòðàíèöó. Íàïèñàòü ñàìîñòîÿòåëüíî ðåôåðàòû, êóðñîâûå, äèïëîìû  â êðàò÷àéøèå ñðîêè
Ðåôåðàòû, êóðñîâûå, äèïëîìíûå ðàáîòû ñòóäåíòîâ: íàó÷èòüñÿ ïèñàòü  ñàìîñòîÿòåëüíî.
Êîíòàêòû Îáðàçöû ðàáîò Áåñïëàòíûå ìàòåðèàëû
Êîíñóëüòàöèè Ñïåöèàëüíîñòè Áàíê ðåôåðàòîâ
Êàðòà ñàéòà Ñòàòüè Ïîäáîð ëèòåðàòóðû
Íàó÷èì ïèñàòü ðåôåðàòû, êóðñîâûå è äèïëîìû.


ïîäáîð ëèòåðàòóðû ïåðèîäè÷åñêèå èñòî÷íèêè ëèòåðàòóðà ïî ïðåäìåòó

Âîñïîëüçóéòåñü ôîðìîé ïîèñêà ïî ñàéòó, ÷òîáû ïîäîáðàòü ïîëíûé ñïèñîê èñïîëüçîâàííîé ëèòåðàòóðû.
Åñëè âû õîòèòå âûáðàòü äëÿ ñïèñêà ëèòåðàòóðû êíèãè îïðåäåëåííîãî ãîäà èçäàíèÿ, äîñòàòî÷íî äîïèñàòü åãî ê ïîèñêîâîìó çàïðîñó.

Ðåçóëüòàòû ïîèñêà

Ïîèñê ìàòåðèàëîâ

Ëó÷øèå ðåçóëüòàòû

  1. Guosong Shao. Internet Law in China (Chandos Asian Studies). – Ì.: , 2012. – 316 ñ.
  2. Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – Ì.: , 2012. – 445 ñ.
  3. Janet Portman Attorney, Marcia Stewart. Every Tenant's Legal Guide. – Ì.: , 2012. – 464 ñ.
  4. Data Privacy Management and Autonomous Spontaneus Security: 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, ... Computer Science / Security and Cryptology). – Ì.: , 2012. – 334 ñ.
  5. Wireless Communications and Applications: First International Conference, ICWCA 2011, Sanya, China, August 1-3, 2011, Revised Selected Papers (Lecture ... and Telecommunications Engineering). – Ì.: , 2012. – 468 ñ.
  6. Trust Management VI: 6th IFIP WG 11.11 International Conference, IFIPTM 2012, Surat, India, May 21-25, 2012, Proceedings (IFIP Advances in Information and Communication Technology). – Ì.: , 2012. – 298 ñ.
  7. Security and Privacy in Mobile Information and Communication Systems: Third International ICST Conference, MOBISEC 2011, Aalborg, Denmark, May 17-19, ... and Telecommunications Engineering). – Ì.: , 2012. – 195 ñ.
  8. Public Key Infrastructures, Services and Applications: 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected ... Computer Science / Security and Cryptology). – Ì.: , 2012. – 219 ñ.
  9. Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – Ì.: , 2012. – 283 ñ.
  10. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – Ì.: , 2012. – 289 ñ.
  11. Orlan Lee. Waiving Our Rights: The Personal Data Collection Complex and Its Threat to Privacy and Civil Liberties. – Ì.: , 2012. – 306 ñ.
  12. Jack J. Champlain. Auditing Information Systems. – Ì.: , 0. – 0 ñ.
  13. Paul Shaw. E-Business Privacy and Trust: Planning and Management Strategies. – Ì.: , 0. – 0 ñ.
  14. Constance S. Hawke, Constance S. Hawke. Computer and Internet Use on Campus: A Legal Guide to Issues of Intellectual Property, Free Speech, and Privacy. – Ì.: , 0. – 0 ñ.
  15. Andrew Frackman, Claudia Ray, Rebecca Martin. Internet and Online Privacy: A Legal and Business Guide. – Ì.: , 0. – 0 ñ.
  16. Richard A. Posner, Francesco Parisi. The Economics of Private Law: The Collected Economic Essays of Richard A. Posner (Economists of the Twentieth Century Series). – Ì.: , 0. – 0 ñ.
  17. Frederick S. Lane. Naked Employee, The: How Technology Is Compromising Workplace Privacy. – Ì.: AMACOM/American Management Association, 2003. – 304 ñ.
  18. Erin J. Kelly. From The Trenches: Strategies from Industry Leaders on the New Economy. – Ì.: , 0. – 0 ñ.
  19. Sara Baase. A Gift of Fire. – Ì.: , 0. – 0 ñ.
  20. Joan Callahan. Ethical Issues in Professional Life. – Ì.: , 0. – 0 ñ.
  21. Terrell Ward Bynum, Simon Rogerson, Blackwell Pub. Computer Ethics and Professional Responsibility: Introductory Text and Readings. – Ì.: , 0. – 0 ñ.
  22. Bernd Stahl. Responsible Management of Information Systems. – Ì.: , 0. – 0 ñ.
  23. Elizabeth A. Buchanan. Readings in Virtual Research Ethics: Issues and Controversies. – Ì.: , 0. – 0 ñ.
  24. Larry Gross, John Stuart Katz, Jay Ruby. Image Ethics: The Moral Rights of Subjects in Photographs, Film, and Television (Communication and Society). – Ì.: , 0. – 0 ñ.
  25. Lisa H. Cassilly, Clare Draper. Privacy in the Workplace: A Guide for Attorneys and HR Professionals. – Ì.: , 0. – 0 ñ.
  26. Littler Mendelson Attorneys, Shanti Atkins, Garen Dodge, Ronald Manthey, Marlene Muraco. Beyond Big Brother: The New World of Workplace Privacy. – Ì.: , 0. – 0 ñ.
  27. Fred H. Cate, Robert E. Litan, Michael Staten, Peter J. Wallison. Financial Privacy, Consumer Prosperity, and the Public Good. – Ì.: , 0. – 0 ñ.
  28. Peter P. Swire, Robert E. Litan. None of Your Business: World Data Flows, Electronic Commerce, & the European Privacy Directive. – Ì.: , 0. – 0 ñ.
  29. Xun Lu, Guangping Xu, Bonnie S. McDougall. Love-Letters and Privacy in Modern China: The Intimate Lives of Lu Xun and Xu Guangping (Studies on Contemporary China). – Ì.: , 0. – 0 ñ.
  30. Benjamin, Iii, Dr. Robinson. Financial Privacy & Electronic Commerce: Who's in My Business. – Ì.: , 0. – 0 ñ.
  31. Adam Starchild. Using Offshore Havens for Privacy & Profit: Revised and Updated Edition. – Ì.: , 0. – 0 ñ.
  32. Rebecca Herold. The Privacy Papers: Managing Technology, Consumer, Employee and Legislative Actions. – Ì.: , 0. – 0 ñ.
  33. Charles Jennings, Elizabeth Dyson, Lori Fena. The Hundredth Window: Protecting Your Privacy and Security in the Age of the Internet. – Ì.: , 0. – 0 ñ.
  34. Stephen Cobb. Privacy for Business: Web Sites and Email. – Ì.: , 0. – 0 ñ.
  35. Robert B. Gelman, Gelman, Stanton McCandlish, Electronic Frontier Foundation. Protecting Yourself Online: The Definitive Resource on Safety, Freedom, and Privacy in Cyberspace. – Ì.: , 0. – 0 ñ.
  36. Anup K. Ghosh. E-Commerce Security and Privacy. – Ì.: , 0. – 0 ñ.
  37. Information Ethics: Privacy and Intellectual Property. – Ì.: , 2004. – 0 ñ.
  38. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – Ì.: , 2005. – 0 ñ.
  39. Jody R. Westby. International Guide to Privacy. – Ì.: , 2005. – 247 ñ.
  40. Sjaak Nouwt, Berend R. de Vries, Corien Prins. Reasonable Expectations of Privacy?: Eleven country reports on camera surveillance and workplace privacy (Information Technology and Law). – Ì.: Asser Press, 2005. – 382 ñ.
  41. Mari J. Frank. Safeguard Your Identity: Protect Yourself With A Personal Privacy Audit. – Ì.: , 2005. – 232 ñ.
  42. Jeffrey M. Stanton, Kathryn R. Stam. The Visible Employee: Using Workplace Monitoring and Surveillance to Protect Information Assets-Without Compromising Employee Privacy or Trust. – Ì.: , 2006. – 272 ñ.
  43. Privacy-Preserving Data Mining: Models and Algorithms (Advances in Database Systems). – Ì.: , 2008. – 514 ñ.
  44. Joseph Campana. Privacy MakeOver: The Essential Guide to Best Practices: How to Protect Assets and Foster Consumer Loyalty. – Ì.: , 2008. – 320 ñ.
  45. Trust, Privacy and Security in Digital Business: 5th International Conference, TrustBus 2008 Turin, Italy, September 1-5, 2008, Proceedings (Lecture Notes in Computer Science). – Ì.: , 2008. – 205 ñ.
  46. Hamid R. Nemati. Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues (Advances in Information Security and Privacy). – Ì.: , 2009. – 414 ñ.
  47. J.C. Cannon. Privacy: What Developers and IT Professionals Should Know. – Ì.: , 2009. – 384 ñ.
  48. Whitfield Diffie. Privacy on the Line – The Politics of Wiretapping & Encryption. – Ì.: , 1998. – 352 ñ.
  49. Whitfield Diffie. Privacy on the Line – The Politics of Wiretapping & Encryption (Paper). – Ì.: , 1999. – 352 ñ.
  50. Philip Agre. Technology & Privacy – The New Landscape. – Ì.: , 1997. – 332 ñ.
  51. Whitfield Diffie. Privacy on the Line – The Politics of Wiretapping and Encryption, Updated and Expanded Edition. – Ì.: , 2010. – 496 ñ.
  52. Philip Agre. Technology & Privacy – The New Landscape (Paper). – Ì.: , 1998. – 332 ñ.
  53. Lorrie Faith Cranor. Web Privacy with P3P. – Ì.: , 2002. – 344 ñ.
  54. Mark Monmonier. Spying with Maps – Surveillance Technologies & the Future of Privacy. – Ì.: , 2002. – 264 ñ.
  55. Mark Monmonier. Spying with Maps – Surveillance Technologies and the Future of Privacy. – Ì.: , 2004. – 240 ñ.
  56. Charles Fried. Because it is Wrong – Torture, Privacy and Presidential Power in the Age of Terror. – Ì.: , 2010. – 192 ñ.
  57. Saul Levmore. The Offensive Internet – Speech, Privacy, and Reputation. – Ì.: , 2010. – 296 ñ.
  58. Jill Callahan Dennis. Privacy and Confidentiality of Health Information. – Ì.: , 2000. – 128 ñ.
  59. KH Decker. Employee Privacy Forms & Procedures 1992 Cumulative Supp. – Ì.: , 1991. – 112 ñ.
  60. L Gostin. Surrogate Motherhood – Politics & Privacy. – Ì.: , 1990. – 384 ñ.
  61. John Sileo. Privacy Means Profit. – Ì.: , 2010. – 246 ñ.
  62. K Decker. Employee Privacy Law & Practice 1997 Supplement. – Ì.: , 1997. – 114 ñ.
  63. Paul Shaw. E–Business Privacy and Trust. – Ì.: , 2001. – 240 ñ.
  64. KH DECKER. Decker: Employee Privacy Forms & Procedures. – Ì.: , 1988. – 498 ñ.
  65. Tim Mather. Cloud Security and Privacy. – Ì.: , 2009. – 334 ñ.
  66. David H. Holtzman. Privacy Lost. – Ì.: , 2006. – 352 ñ.
  67. Wolfgang Sofsky. Privacy – A Manifesto. – Ì.: , 2008. – 160 ñ.
  68. Bryan Pfaffenberger. Protect Your Privacy on the Internet. – Ì.: , 1997. – 336 ñ.
  69. Colin Bennett. The Governance of Privacy – Policy Instruments in Global Perspective. – Ì.: , 2006. – 368 ñ.
  70. Michael Miller. Absolute PC Security and Privacy. – Ì.: , 2002. – 560 ñ.
  71. Beate Rossler. The Value of Privacy. – Ì.: , 2004. – 288 ñ.
  72. Beate Rossler. The Value of Privacy. – Ì.: , 2004. – 288 ñ.
  73. Daniel J Solove. Understanding Privacy. – Ì.: , 2009. – 272 ñ.
  74. Simson Garfinkel. Web Security, Privacy & Commerce 2e. – Ì.: , 2001. – 790 ñ.
  75. Christena E Nippert–eng. Islands of Privacy. – Ì.: , 2010. – 360 ñ.
  76. Christena E Nippert–eng. Islands of Privacy. – Ì.: , 2010. – 360 ñ.
  77. Patricia Meyer Spacks. Privacy – Concealing the Eighteenth–Century Self. – Ì.: , 2003. – 248 ñ.
  78. Simson Garfinkel. Database Nation – The Death of Privacy in the 21st Century. – Ì.: , 2001. – 320 ñ.
  79. Bruce Schneier. The Electronic Privacy Papers. – Ì.: , 1997. – 748 ñ.
  80. Kurt H. Decker. A Manager?s Guide to Employee Privacy. – Ì.: , 1989. – 288 ñ.
  81. Edited by Madeleine Colvin. Developing Key Privacy Rights. – Ì.: , 2011. – 208 ñ.
  82. John D. R. Craig. Privacy and Employment Law. – Ì.: , 2011. – 320 ñ.
  83. David Sherborne, Mark Thomson and Hugh Tomlinson QC. The Law of Personal Privacy. – Ì.: , 2011. – 176 ñ.
  84. D J Solove. The Future Of Reputation – Gossip, Rumour, and Privacy on the Internet. – Ì.: , 2008. – 256 ñ.
  85. K DECKER. Decker: Employee Privacy Law & Practice 1994 Cumulative Supplement (pr Only). – Ì.: , 1994. – 358 ñ.
  86. Amy L Fairchild. Searching Eyes – Privacy, the State and Disease Surveillance in America. – Ì.: , 2007. – 372 ñ.
  87. Stefan Brands. Rethinking Public Key Infrastructures & Digital Certificates – Building in Privacy. – Ì.: , 2000. – 340 ñ.
  88. Carl D Schneider. Shame, Exposure & Privacy. – Ì.: , 1992. – 202 ñ.
  89. Beatriz Colomina. Privacy & Publicity – Modern Architecture as Mass Media (Paper). – Ì.: , 1996. – 402 ñ.
  90. Beatriz Colomina. Privacy & Publicity – Modern Architecture as Mass Media. – Ì.: , 1994. – 402 ñ.
  91. Hitesh Chhinkaniwala and Sanjay Garg. Privacy Preserving Data Mining - Issues & Techniques. – Ì.: Scholars Press, 2014. – 120 ñ.
  92. Abdul-Razak Suleman. Loyalty Scheme Enrolment And Privacy Issues. – Ì.: LAP Lambert Academic Publishing, 2012. – 236 ñ.
  93. Suhel Sayyad and Prakash Kulkarni. Privacy Preserving Back Propagation Algorithm. – Ì.: LAP Lambert Academic Publishing, 2012. – 56 ñ.
  94. Alex Boniface Makulilo. Privacy and Data Protection in Africa. – Ì.: Scholars' Press, 2014. – 572 ñ.
  95. Akram M. Almatarneh. The Right to Privacy and Data Protection in the Information Age:. – Ì.: LAP Lambert Academic Publishing, 2015. – 524 ñ.
  96. Cesare Bartolini. Privacy in the information society and the principle of necessity. – Ì.: LAP Lambert Academic Publishing, 2013. – 108 ñ.
  97. Dan Sarkar. Examining Privacy Practices of Websites Using Large Scale Data. – Ì.: LAP Lambert Academic Publishing, 2013. – 76 ñ.
  98. Nadejda Mironov. Public Video Surveillance: ratio of privacy and security in the UK. – Ì.: LAP Lambert Academic Publishing, 2013. – 100 ñ.
  99. Faustin Muyembe. Is Privacy Protection Enough?. – Ì.: LAP Lambert Academic Publishing, 2012. – 136 ñ.
  100. Alebachew B. Enyew. The Legal Regime on Privacy and Personal Information Protection. – Ì.: LAP Lambert Academic Publishing, 2010. – 68 ñ.
  101. Dr Hurriyah El Islamy. Privacy as Freedom of Private Life. – Ì.: LAP Lambert Academic Publishing, 2010. – 360 ñ.
  102. Evert Mouw. Health Privacy and Political Attitudes. – Ì.: LAP Lambert Academic Publishing, 2010. – 72 ñ.
  103. Àëñó Õóñàåíîâà. Êëàñòåðíûé êîíöåïò PRIVACY. – Ì.: LAP Lambert Academic Publishing, 2011. – 204 ñ.
  104. Subir Biswas. Security and Privacy in Vehicular Ad hoc Networks. – Ì.: LAP Lambert Academic Publishing, 2013. – 204 ñ.
  105. Wiem Tounsi. Security and Privacy Controls in RFID Systems. – Ì.: LAP Lambert Academic Publishing, 2014. – 172 ñ.
  106. Shampa Bhattacharyya and Amit Bhattacharyya. Privacy Preserving Data Mining. – Ì.: LAP Lambert Academic Publishing, 2015. – 100 ñ.
  107. Sanaz Kavianpour and Zuraini Ismail. Preserving Privacy in Social Network Sites using Anonymity Algorithm. – Ì.: LAP Lambert Academic Publishing, 2013. – 100 ñ.
  108. Arik Friedman,Ran Wolff and Assaf Schuster. Embedding Privacy in Data Mining. – Ì.: LAP Lambert Academic Publishing, 2011. – 148 ñ.
  109. Adeel Anjum. Towards Privacy Preserving Publication of Continuous and Dynamic Data. – Ì.: Scholars' Press, 2013. – 152 ñ.
  110. Ozlem Ozkan,Osman Saka and Ali Arifoglu. Attitudes Of People Who Use Medical Services About Privacy Of EHR. – Ì.: LAP Lambert Academic Publishing, 2011. – 100 ñ.
  111. Ali Dehghantanha. Formal Methods for Analyzing Privacy Policies. – Ì.: LAP Lambert Academic Publishing, 2011. – 300 ñ.
  112. Hammad Kazmi. Security and Privacy issues in Near Field Communication (NFC) Systems. – Ì.: LAP Lambert Academic Publishing, 2012. – 68 ñ.
  113. Anour F.A. Dafa-Alla. Incorporating Background Knowledge in Privacy Preserving Geolocation. – Ì.: LAP Lambert Academic Publishing, 2012. – 140 ñ.
  114. Murtaza Hussain Shaikh. Probing the Privacy Policy: Retorts & Encounters. – Ì.: LAP Lambert Academic Publishing, 2012. – 136 ñ.
  115. Ibrahim Yakut and Huseyin Polat. DIMENSIONALITY REDUCTION-BASED RECOMMENDATIONS WITH PRIVACY. – Ì.: LAP Lambert Academic Publishing, 2010. – 80 ñ.
  116. Sridhar Mandapati. Privacy Preserving Data Mining using Optimization Methods. – Ì.: LAP Lambert Academic Publishing, 2014. – 128 ñ.
  117. Shinsuke Tamura. Elements of Schemes for Preserving Privacies in e-Society Systems. – Ì.: LAP Lambert Academic Publishing, 2015. – 156 ñ.
  118. Ali Dehghantanha. Privacy in Pervasive Computing Systems. – Ì.: LAP Lambert Academic Publishing, 2010. – 136 ñ.
  119. Flavio Bertini. Data privacy in Desktop as a Service. – Ì.: LAP Lambert Academic Publishing, 2014. – 76 ñ.
  120. Paolo Gasti. Privacy and Security of Internet Communications. – Ì.: LAP Lambert Academic Publishing, 2011. – 148 ñ.
  121. Jose M. Such,Ana Garcia-Fornes and Agustin Espinosa. Enhancing Privacy in Multi-agent Systems. – Ì.: LAP Lambert Academic Publishing, 2012. – 208 ñ.
  122. Francesco Pagano. A Distributed Approach to Privacy on the Cloud. – Ì.: LAP Lambert Academic Publishing, 2013. – 216 ñ.
  123. Yunia Miyayo and Abraham Idowu. Privacy. – Ì.: LAP Lambert Academic Publishing, 2015. – 108 ñ.

Äîïîëíèòåëüíûå ðåçóëüòàòû

  1. Guosong Shao. Internet Law in China (Chandos Asian Studies). – Ì.: , 2012. – 316 ñ.
  2. Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – Ì.: , 2012. – 445 ñ.
  3. Janet Portman Attorney, Marcia Stewart. Every Tenant's Legal Guide. – Ì.: , 2012. – 464 ñ.
  4. Data Privacy Management and Autonomous Spontaneus Security: 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, ... Computer Science / Security and Cryptology). – Ì.: , 2012. – 334 ñ.
  5. Wireless Communications and Applications: First International Conference, ICWCA 2011, Sanya, China, August 1-3, 2011, Revised Selected Papers (Lecture ... and Telecommunications Engineering). – Ì.: , 2012. – 468 ñ.
  6. Trust Management VI: 6th IFIP WG 11.11 International Conference, IFIPTM 2012, Surat, India, May 21-25, 2012, Proceedings (IFIP Advances in Information and Communication Technology). – Ì.: , 2012. – 298 ñ.
  7. Security and Privacy in Mobile Information and Communication Systems: Third International ICST Conference, MOBISEC 2011, Aalborg, Denmark, May 17-19, ... and Telecommunications Engineering). – Ì.: , 2012. – 195 ñ.
  8. Public Key Infrastructures, Services and Applications: 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected ... Computer Science / Security and Cryptology). – Ì.: , 2012. – 219 ñ.
  9. Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – Ì.: , 2012. – 283 ñ.
  10. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – Ì.: , 2012. – 289 ñ.
  11. Orlan Lee. Waiving Our Rights: The Personal Data Collection Complex and Its Threat to Privacy and Civil Liberties. – Ì.: , 2012. – 306 ñ.
  12. Jack J. Champlain. Auditing Information Systems. – Ì.: , 0. – 0 ñ.
  13. Paul Shaw. E-Business Privacy and Trust: Planning and Management Strategies. – Ì.: , 0. – 0 ñ.
  14. Constance S. Hawke, Constance S. Hawke. Computer and Internet Use on Campus: A Legal Guide to Issues of Intellectual Property, Free Speech, and Privacy. – Ì.: , 0. – 0 ñ.
  15. Andrew Frackman, Claudia Ray, Rebecca Martin. Internet and Online Privacy: A Legal and Business Guide. – Ì.: , 0. – 0 ñ.
  16. Richard A. Posner, Francesco Parisi. The Economics of Private Law: The Collected Economic Essays of Richard A. Posner (Economists of the Twentieth Century Series). – Ì.: , 0. – 0 ñ.
  17. Frederick S. Lane. Naked Employee, The: How Technology Is Compromising Workplace Privacy. – Ì.: AMACOM/American Management Association, 2003. – 304 ñ.
  18. Erin J. Kelly. From The Trenches: Strategies from Industry Leaders on the New Economy. – Ì.: , 0. – 0 ñ.
  19. Sara Baase. A Gift of Fire. – Ì.: , 0. – 0 ñ.
  20. Joan Callahan. Ethical Issues in Professional Life. – Ì.: , 0. – 0 ñ.
  21. Terrell Ward Bynum, Simon Rogerson, Blackwell Pub. Computer Ethics and Professional Responsibility: Introductory Text and Readings. – Ì.: , 0. – 0 ñ.
  22. Bernd Stahl. Responsible Management of Information Systems. – Ì.: , 0. – 0 ñ.
  23. Elizabeth A. Buchanan. Readings in Virtual Research Ethics: Issues and Controversies. – Ì.: , 0. – 0 ñ.
  24. Larry Gross, John Stuart Katz, Jay Ruby. Image Ethics: The Moral Rights of Subjects in Photographs, Film, and Television (Communication and Society). – Ì.: , 0. – 0 ñ.
  25. Joseph Migga Kizza, Joseph Kizza. Ethical and Social Issues in the Information Age. – Ì.: , 0. – 0 ñ.
  26. Tom Forester, Perry Morrison. Computer Ethics, Second Edition: Cautionary Tales and Ethical Dilemmas in Computing. – Ì.: , 0. – 0 ñ.
  27. Virginia Haufler. A Public Role for the Private Sector : Industry Self-Regulation in a Global Economy. – Ì.: , 0. – 0 ñ.
  28. Thomas D. Schneid. Occupational Health Guide to Violence in the Workplace. – Ì.: , 0. – 0 ñ.
  29. Lisa H. Cassilly, Clare Draper. Privacy in the Workplace: A Guide for Attorneys and HR Professionals. – Ì.: , 0. – 0 ñ.
  30. Littler Mendelson Attorneys, Shanti Atkins, Garen Dodge, Ronald Manthey, Marlene Muraco. Beyond Big Brother: The New World of Workplace Privacy. – Ì.: , 0. – 0 ñ.
  31. Stella Ting-Toomey. Communicating Across Cultures. – Ì.: , 0. – 0 ñ.
  32. Donald Dickson. Confidentiality and Privacy in Social Work: A Guide to the Law for Practitioners and Students. – Ì.: , 0. – 0 ñ.
  33. Albert J. Marcella, Carol Stucki. Privacy Handbook : Guidelines, Exposures, Policy Implementation, and International Issues. – Ì.: , 0. – 0 ñ.
  34. Phil Lowe. McGraw-Hill One-Day Workshop: Empowering Individuals. – Ì.: , 0. – 0 ñ.
  35. Ron Schneiderman. The Mobile Technology Question and Answer Book: A Survival Guide for Business Managers. – Ì.: , 0. – 0 ñ.
  36. Fred H. Cate, Robert E. Litan, Michael Staten, Peter J. Wallison. Financial Privacy, Consumer Prosperity, and the Public Good. – Ì.: , 0. – 0 ñ.
  37. Peter P. Swire, Robert E. Litan. None of Your Business: World Data Flows, Electronic Commerce, & the European Privacy Directive. – Ì.: , 0. – 0 ñ.
  38. Xun Lu, Guangping Xu, Bonnie S. McDougall. Love-Letters and Privacy in Modern China: The Intimate Lives of Lu Xun and Xu Guangping (Studies on Contemporary China). – Ì.: , 0. – 0 ñ.
  39. Thom Hartmann. Unequal Protection: The Rise of Corporate Dominance and the Theft of Human Rights. – Ì.: , 0. – 0 ñ.
  40. Paul S. Turner, Diane B. Wunnicke. Managing the Risks of Payments Systems. – Ì.: , 0. – 0 ñ.
  41. Benjamin, Iii, Dr. Robinson. Financial Privacy & Electronic Commerce: Who's in My Business. – Ì.: , 0. – 0 ñ.
  42. Adam Starchild. Using Offshore Havens for Privacy & Profit: Revised and Updated Edition. – Ì.: , 0. – 0 ñ.
  43. Adam Starchild. The Offshore Privacy Manual. – Ì.: , 0. – 0 ñ.
  44. L. Jean Camp. Trust and Risk in Internet Commerce. – Ì.: , 0. – 0 ñ.
  45. J. De Gross. Information Technology and Changes in Organizational Work. – Ì.: , 0. – 0 ñ.
  46. Richard Hunter. World Without Secrets: Business, Crime and Privacy in the Age of Ubiquitous Computing. – Ì.: , 0. – 0 ñ.
  47. Rebecca Herold. The Privacy Papers: Managing Technology, Consumer, Employee and Legislative Actions. – Ì.: , 0. – 0 ñ.
  48. Manuel Castells. The Internet Galaxy: Reflections on the Internet, Business, and Society. – Ì.: Oxford University Press, 2003. – 304 ñ.
  49. Charles Jennings, Elizabeth Dyson, Lori Fena. The Hundredth Window: Protecting Your Privacy and Security in the Age of the Internet. – Ì.: , 0. – 0 ñ.
  50. Socially Responsible IT Management. – Ì.: , 0. – 0 ñ.
  51. Stephen Cobb. Privacy for Business: Web Sites and Email. – Ì.: , 0. – 0 ñ.
  52. Robert B. Gelman, Gelman, Stanton McCandlish, Electronic Frontier Foundation. Protecting Yourself Online: The Definitive Resource on Safety, Freedom, and Privacy in Cyberspace. – Ì.: , 0. – 0 ñ.
  53. Anup K. Ghosh. E-Commerce Security and Privacy. – Ì.: , 0. – 0 ñ.
  54. Information Ethics: Privacy and Intellectual Property. – Ì.: , 2004. – 0 ñ.
  55. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – Ì.: , 2005. – 0 ñ.
  56. Jody R. Westby. International Guide to Privacy. – Ì.: , 2005. – 247 ñ.
  57. Sjaak Nouwt, Berend R. de Vries, Corien Prins. Reasonable Expectations of Privacy?: Eleven country reports on camera surveillance and workplace privacy (Information Technology and Law). – Ì.: Asser Press, 2005. – 382 ñ.
  58. Mari J. Frank. Safeguard Your Identity: Protect Yourself With A Personal Privacy Audit. – Ì.: , 2005. – 232 ñ.
  59. Jeffrey M. Stanton, Kathryn R. Stam. The Visible Employee: Using Workplace Monitoring and Surveillance to Protect Information Assets-Without Compromising Employee Privacy or Trust. – Ì.: , 2006. – 272 ñ.
  60. Privacy-Preserving Data Mining: Models and Algorithms (Advances in Database Systems). – Ì.: , 2008. – 514 ñ.
  61. Joseph Campana. Privacy MakeOver: The Essential Guide to Best Practices: How to Protect Assets and Foster Consumer Loyalty. – Ì.: , 2008. – 320 ñ.
  62. Trust, Privacy and Security in Digital Business: 5th International Conference, TrustBus 2008 Turin, Italy, September 1-5, 2008, Proceedings (Lecture Notes in Computer Science). – Ì.: , 2008. – 205 ñ.
  63. Hamid R. Nemati. Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues (Advances in Information Security and Privacy). – Ì.: , 2009. – 414 ñ.
  64. J.C. Cannon. Privacy: What Developers and IT Professionals Should Know. – Ì.: , 2009. – 384 ñ.
  65. Whitfield Diffie. Privacy on the Line – The Politics of Wiretapping & Encryption. – Ì.: , 1998. – 352 ñ.
  66. Whitfield Diffie. Privacy on the Line – The Politics of Wiretapping & Encryption (Paper). – Ì.: , 1999. – 352 ñ.
  67. Philip Agre. Technology & Privacy – The New Landscape. – Ì.: , 1997. – 332 ñ.
  68. Whitfield Diffie. Privacy on the Line – The Politics of Wiretapping and Encryption, Updated and Expanded Edition. – Ì.: , 2010. – 496 ñ.
  69. Philip Agre. Technology & Privacy – The New Landscape (Paper). – Ì.: , 1998. – 332 ñ.
  70. Lorrie Faith Cranor. Web Privacy with P3P. – Ì.: , 2002. – 344 ñ.
  71. Mark Monmonier. Spying with Maps – Surveillance Technologies & the Future of Privacy. – Ì.: , 2002. – 264 ñ.
  72. Mark Monmonier. Spying with Maps – Surveillance Technologies and the Future of Privacy. – Ì.: , 2004. – 240 ñ.
  73. Charles Fried. Because it is Wrong – Torture, Privacy and Presidential Power in the Age of Terror. – Ì.: , 2010. – 192 ñ.
  74. Saul Levmore. The Offensive Internet – Speech, Privacy, and Reputation. – Ì.: , 2010. – 296 ñ.
  75. Jill Callahan Dennis. Privacy and Confidentiality of Health Information. – Ì.: , 2000. – 128 ñ.
  76. KH Decker. Employee Privacy Forms & Procedures 1992 Cumulative Supp. – Ì.: , 1991. – 112 ñ.
  77. L Gostin. Surrogate Motherhood – Politics & Privacy. – Ì.: , 1990. – 384 ñ.
  78. John Sileo. Privacy Means Profit. – Ì.: , 2010. – 246 ñ.
  79. K Decker. Employee Privacy Law & Practice 1997 Supplement. – Ì.: , 1997. – 114 ñ.
  80. Paul Shaw. E–Business Privacy and Trust. – Ì.: , 2001. – 240 ñ.
  81. KH DECKER. Decker: Employee Privacy Forms & Procedures. – Ì.: , 1988. – 498 ñ.
  82. Tim Mather. Cloud Security and Privacy. – Ì.: , 2009. – 334 ñ.
  83. David H. Holtzman. Privacy Lost. – Ì.: , 2006. – 352 ñ.
  84. Wolfgang Sofsky. Privacy – A Manifesto. – Ì.: , 2008. – 160 ñ.
  85. Bryan Pfaffenberger. Protect Your Privacy on the Internet. – Ì.: , 1997. – 336 ñ.
  86. Colin Bennett. The Governance of Privacy – Policy Instruments in Global Perspective. – Ì.: , 2006. – 368 ñ.
  87. Michael Miller. Absolute PC Security and Privacy. – Ì.: , 2002. – 560 ñ.
  88. Beate Rossler. The Value of Privacy. – Ì.: , 2004. – 288 ñ.
  89. Beate Rossler. The Value of Privacy. – Ì.: , 2004. – 288 ñ.
  90. Daniel J Solove. Understanding Privacy. – Ì.: , 2009. – 272 ñ.
  91. Simson Garfinkel. Web Security, Privacy & Commerce 2e. – Ì.: , 2001. – 790 ñ.
  92. Christena E Nippert–eng. Islands of Privacy. – Ì.: , 2010. – 360 ñ.
  93. Christena E Nippert–eng. Islands of Privacy. – Ì.: , 2010. – 360 ñ.
  94. Patricia Meyer Spacks. Privacy – Concealing the Eighteenth–Century Self. – Ì.: , 2003. – 248 ñ.
  95. Simson Garfinkel. Database Nation – The Death of Privacy in the 21st Century. – Ì.: , 2001. – 320 ñ.
  96. Bruce Schneier. The Electronic Privacy Papers. – Ì.: , 1997. – 748 ñ.
  97. Kurt H. Decker. A Manager?s Guide to Employee Privacy. – Ì.: , 1989. – 288 ñ.
  98. Edited by Madeleine Colvin. Developing Key Privacy Rights. – Ì.: , 2011. – 208 ñ.
  99. John D. R. Craig. Privacy and Employment Law. – Ì.: , 2011. – 320 ñ.
  100. David Sherborne, Mark Thomson and Hugh Tomlinson QC. The Law of Personal Privacy. – Ì.: , 2011. – 176 ñ.
  101. D J Solove. The Future Of Reputation – Gossip, Rumour, and Privacy on the Internet. – Ì.: , 2008. – 256 ñ.
  102. K DECKER. Decker: Employee Privacy Law & Practice 1994 Cumulative Supplement (pr Only). – Ì.: , 1994. – 358 ñ.
  103. Amy L Fairchild. Searching Eyes – Privacy, the State and Disease Surveillance in America. – Ì.: , 2007. – 372 ñ.
  104. Stefan Brands. Rethinking Public Key Infrastructures & Digital Certificates – Building in Privacy. – Ì.: , 2000. – 340 ñ.
  105. Carl D Schneider. Shame, Exposure & Privacy. – Ì.: , 1992. – 202 ñ.
  106. Beatriz Colomina. Privacy & Publicity – Modern Architecture as Mass Media (Paper). – Ì.: , 1996. – 402 ñ.
  107. Beatriz Colomina. Privacy & Publicity – Modern Architecture as Mass Media. – Ì.: , 1994. – 402 ñ.
  108. Hitesh Chhinkaniwala and Sanjay Garg. Privacy Preserving Data Mining - Issues & Techniques. – Ì.: Scholars Press, 2014. – 120 ñ.
  109. Abdul-Razak Suleman. Loyalty Scheme Enrolment And Privacy Issues. – Ì.: LAP Lambert Academic Publishing, 2012. – 236 ñ.
  110. Suhel Sayyad and Prakash Kulkarni. Privacy Preserving Back Propagation Algorithm. – Ì.: LAP Lambert Academic Publishing, 2012. – 56 ñ.
  111. Alex Boniface Makulilo. Privacy and Data Protection in Africa. – Ì.: Scholars' Press, 2014. – 572 ñ.
  112. Akram M. Almatarneh. The Right to Privacy and Data Protection in the Information Age:. – Ì.: LAP Lambert Academic Publishing, 2015. – 524 ñ.
  113. Cesare Bartolini. Privacy in the information society and the principle of necessity. – Ì.: LAP Lambert Academic Publishing, 2013. – 108 ñ.
  114. Dan Sarkar. Examining Privacy Practices of Websites Using Large Scale Data. – Ì.: LAP Lambert Academic Publishing, 2013. – 76 ñ.
  115. Nadejda Mironov. Public Video Surveillance: ratio of privacy and security in the UK. – Ì.: LAP Lambert Academic Publishing, 2013. – 100 ñ.
  116. Faustin Muyembe. Is Privacy Protection Enough?. – Ì.: LAP Lambert Academic Publishing, 2012. – 136 ñ.
  117. Alebachew B. Enyew. The Legal Regime on Privacy and Personal Information Protection. – Ì.: LAP Lambert Academic Publishing, 2010. – 68 ñ.
  118. Dr Hurriyah El Islamy. Privacy as Freedom of Private Life. – Ì.: LAP Lambert Academic Publishing, 2010. – 360 ñ.
  119. Evert Mouw. Health Privacy and Political Attitudes. – Ì.: LAP Lambert Academic Publishing, 2010. – 72 ñ.
  120. Àëñó Õóñàåíîâà. Êëàñòåðíûé êîíöåïò PRIVACY. – Ì.: LAP Lambert Academic Publishing, 2011. – 204 ñ.
  121. Subir Biswas. Security and Privacy in Vehicular Ad hoc Networks. – Ì.: LAP Lambert Academic Publishing, 2013. – 204 ñ.
  122. Wiem Tounsi. Security and Privacy Controls in RFID Systems. – Ì.: LAP Lambert Academic Publishing, 2014. – 172 ñ.
  123. Shampa Bhattacharyya and Amit Bhattacharyya. Privacy Preserving Data Mining. – Ì.: LAP Lambert Academic Publishing, 2015. – 100 ñ.
  124. Sanaz Kavianpour and Zuraini Ismail. Preserving Privacy in Social Network Sites using Anonymity Algorithm. – Ì.: LAP Lambert Academic Publishing, 2013. – 100 ñ.
  125. Arik Friedman,Ran Wolff and Assaf Schuster. Embedding Privacy in Data Mining. – Ì.: LAP Lambert Academic Publishing, 2011. – 148 ñ.
  126. Adeel Anjum. Towards Privacy Preserving Publication of Continuous and Dynamic Data. – Ì.: Scholars' Press, 2013. – 152 ñ.
  127. Ozlem Ozkan,Osman Saka and Ali Arifoglu. Attitudes Of People Who Use Medical Services About Privacy Of EHR. – Ì.: LAP Lambert Academic Publishing, 2011. – 100 ñ.
  128. Ali Dehghantanha. Formal Methods for Analyzing Privacy Policies. – Ì.: LAP Lambert Academic Publishing, 2011. – 300 ñ.
  129. Hammad Kazmi. Security and Privacy issues in Near Field Communication (NFC) Systems. – Ì.: LAP Lambert Academic Publishing, 2012. – 68 ñ.
  130. Anour F.A. Dafa-Alla. Incorporating Background Knowledge in Privacy Preserving Geolocation. – Ì.: LAP Lambert Academic Publishing, 2012. – 140 ñ.
  131. Murtaza Hussain Shaikh. Probing the Privacy Policy: Retorts & Encounters. – Ì.: LAP Lambert Academic Publishing, 2012. – 136 ñ.
  132. Ibrahim Yakut and Huseyin Polat. DIMENSIONALITY REDUCTION-BASED RECOMMENDATIONS WITH PRIVACY. – Ì.: LAP Lambert Academic Publishing, 2010. – 80 ñ.
  133. Sridhar Mandapati. Privacy Preserving Data Mining using Optimization Methods. – Ì.: LAP Lambert Academic Publishing, 2014. – 128 ñ.
  134. Shinsuke Tamura. Elements of Schemes for Preserving Privacies in e-Society Systems. – Ì.: LAP Lambert Academic Publishing, 2015. – 156 ñ.
  135. Ali Dehghantanha. Privacy in Pervasive Computing Systems. – Ì.: LAP Lambert Academic Publishing, 2010. – 136 ñ.
  136. Flavio Bertini. Data privacy in Desktop as a Service. – Ì.: LAP Lambert Academic Publishing, 2014. – 76 ñ.
  137. Paolo Gasti. Privacy and Security of Internet Communications. – Ì.: LAP Lambert Academic Publishing, 2011. – 148 ñ.
  138. Jose M. Such,Ana Garcia-Fornes and Agustin Espinosa. Enhancing Privacy in Multi-agent Systems. – Ì.: LAP Lambert Academic Publishing, 2012. – 208 ñ.
  139. Francesco Pagano. A Distributed Approach to Privacy on the Cloud. – Ì.: LAP Lambert Academic Publishing, 2013. – 216 ñ.
  140. Yunia Miyayo and Abraham Idowu. Privacy. – Ì.: LAP Lambert Academic Publishing, 2015. – 108 ñ.

Ëó÷øèå ðåçóëüòàòû

Íè÷åãî íå íàéäåíî

Äîïîëíèòåëüíûå ðåçóëüòàòû

Íè÷åãî íå íàéäåíî

Îáðàçöû ðàáîò

Òåìà è ïðåäìåòÒèï è îáúåì ðàáîòû
Ïðîöåññóàëüíûå îñîáåííîñòè ðàññìîòðåíèÿ äåë ñóäàìè î êîìïåíñàöèè ìîðàëüíîãî âðåäà
Ãðàæäàíñêèé ïðîöåññ
Äèïëîì
70 ñòð.

Çàäàéòå ñâîé âîïðîñ ïî âàøåé òåìå

Ãëàäûøåâà Ìàðèíà Ìèõàéëîâíà

marina@studentochka.ru
+7 911 822-56-12
ñ 9 äî 21 ÷. ïî Ìîñêâå.






Äîáàâèòü ôàéë

- îñòàëîñü íàïèñàòü email èëè òåëåôîí

Êîíòàêòû
marina@studentochka.ru
+7 911 822-56-12
ñ 9 äî 21 ÷. ïî Ìîñêâå.
Ïîäåëèòüñÿ
Ìû â ñîöèàëüíûõ ñåòÿõ
Ðåêëàìà



Îòçûâû
J.S., 23.05
ß íàêîíåö ïîëó÷èë îêîí÷àòåëüíóþ îöåíêó çà ðåôåðàò ïî êèíîêîìåäèè: îòëè÷íî, êàê è îæèäàëîñü.  îñíîâå ðåôåðàòà - ïîëó÷åííûé îò âàñ ìàòåðèàë. ß åãî çíà÷èòåëüíî ñîêðàòèë è íåñêîëüêî ïåðåðàáîòàë, íåìíîãî ïåðåñòðîèë, äîáàâèë ýïèãðàôû è ïðî÷èå öèòàòû à òàêæå êîå-êàêèå ñîáñòâåííûå íåîáÿçàòåëüíûå ðàññóæäåíèÿ. Áîëüøîå ñïàñèáî çà ïîìîùü (Ôàêòè÷åñêè Âàø âêëàä ñîñòàâèë îêîëî 80% ðàáîòû).