Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. George E. Curtis. Proactive Security Administration. – М.: , 2004. – 0 с.
  2. Edward A. Thibault, Lawrence M. Lynch, R. Bruce McBride. Proactive Police Management (7th Edition). – М.: , 2006. – 512 с.
  3. Wireless Network Security A Beginners Guide. – М.: , 2011. – 400 с.
  4. Biswaraj Sen and Sanku Sinha. Ad hoc Routing Protocols. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.

Дополнительные результаты

  1. Herbert A. Simon. Administrative Behavior: A Study of Decision-Making Processes in Administrative Organizations. – М.: Free Press, 2000. – 368 с.
  2. Owen E. Hughes. Public Management and Administration. – М.: , 2012. – 336 с.
  3. Francis Groves. Corporate Actions - A Concise Guide: An introduction to securities events. – М.: , 2012. – 230 с.
  4. Carmen Alvarez. Solutions For Tha Obama Administrations TOP TEN Failures: How Democrats, DOE & DOJ Got Pimped. – М.: , 2012. – 138 с.
  5. Carmen Alvarez. SOLUTIONS for the OBAMA Administration's TOP TEN Failures: Save $10.00 - Purchase this book at www.ObamaFails2012.com. – М.: , 2012. – 138 с.
  6. Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с.
  7. Data Privacy Management and Autonomous Spontaneus Security: 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, ... Computer Science / Security and Cryptology). – М.: , 2012. – 334 с.
  8. Security and Privacy in Mobile Information and Communication Systems: Third International ICST Conference, MOBISEC 2011, Aalborg, Denmark, May 17-19, ... and Telecommunications Engineering). – М.: , 2012. – 195 с.
  9. Constructive Side-Channel Analysis and Secure Design: Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings ... Computer Science / Security and Cryptology). – М.: , 2012. – 280 с.
  10. Public Key Infrastructures, Services and Applications: 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected ... Computer Science / Security and Cryptology). – М.: , 2012. – 219 с.
  11. Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  12. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с.
  13. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с.
  14. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 515 с.
  15. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  16. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с.
  17. Smart Card Research and Advanced Applications: 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, ... Computer Science / Security and Cryptology). – М.: , 2012. – 357 с.
  18. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с.
  19. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с.
  20. Security and Development in Global Politics: A Critical Comparison. – М.: , 2012. – 360 с.
  21. Joseph F. Stenken JD CLU ChFc. Social Security & Medicare Facts 2012. – М.: , 2012. – 451 с.
  22. Ted Witt. No One Ever Told Me That: 227 Tips for School Business Administrators. – М.: , 2012. – 152 с.
  23. Odomovo Afeno. Corruption and service delivery: Administrative corruption and public service delivery in Nigeria. – М.: , 2012. – 120 с.
  24. Luis Lobo-Guerrero. Insuring Security: Biopolitics, security and risk. – М.: , 2012. – 178 с.
  25. CCH Editorial Staff. Social Security Explained 2012. – М.: , 2012. – 298 с.
  26. Terrorism and the Olympics: Major Event Security and Lessons for the Future. – М.: , 2012. – 272 с.
  27. Securities Compliance Index. Securities Compliance Index, Second Edition: A Topical Guide To U.S. Securities Regulation. – М.: , 2012. – 512 с.
  28. Jeffrey C. Hooke. Security Analysis on Wall Street. – М.: , 0. – 0 с.
  29. John B. Shoven. Administrative Aspects of Investment-Based Social Security Reform (Conference Report (National Bureau of Economic Research).). – М.: , 0. – 0 с.
  30. Safe Schools: A Security and Loss Prevention Plan. – М.: , 0. – 0 с.
  31. Security Operations Management. – М.: , 0. – 0 с.
  32. Bob Donath, Joe Mazel, Cindy Dubin, Perry Patterson, Institute of Management & Administration. The IOMA Handbook of Logistics and Inventory Management. – М.: , 0. – 0 с.
  33. William Beaver. Overseas Americans: The Essential Guide to Living and Working Abroad. – М.: , 0. – 0 с.
  34. Allen W., Ph.D. Smith. The Looting of Social Security: How the Government Is Draining Americas Retirement Account. – М.: , 0. – 0 с.
  35. Joel Seligman. The Transformation of Wall Street: A History of the Securities and Exchange Commission and Modern Corporate Finance. – М.: , 0. – 0 с.
  36. Pauline Rosenau, Pauline Marie Rosenau. Public-Private Policy Partnerships. – М.: , 0. – 0 с.
  37. Julia Lowell, C. R. Neu, Daochi Tong, National Defense Research Institute, National Security Research Institute. Financial Crises and Contagion in Emerging Market Countries. – М.: , 0. – 0 с.
  38. Steve Purser. A Practical Guide to Managing Information Security (Artech House Technology Management Library). – М.: , 0. – 0 с.
  39. Office & Office Building Security. – М.: , 0. – 0 с.
  40. Effective Security Management, Fourth Edition (Effective Security Management). – М.: , 0. – 0 с.
  41. Joseph S. Nye, William A. Owens, James R. Schlesinger, R. James Woolsey, James A. Lewis, Joseph S., Jr. Nye, James Andrew Lewis, Erin Schlather, Csis Commission on Technology Security in the Twenty-First Century. Computer Exports and National Security: New Tools for a New Century : A Report of the Csis Commission on Technology Security in the 21St-Century (Csis Panel Reports.). – М.: , 0. – 0 с.
  42. Susan Jaderstrom, Leonard Kruk, Joanne Miller, Susan W. Fenner, Leonard B. Kruk, International Association of Administrative Professionals. Complete Office Handbook: The Definitive Reference for Today's Electronic Office. – М.: , 0. – 0 с.
  43. Louis Columbus. Administrator's Guide to e-Commerce. – М.: , 0. – 0 с.
  44. Simson Garfinkel, Gene Spafford. Web Security & Commerce (O'Reilly Nutshell). – М.: , 0. – 0 с.
  45. Christopher A. Crayton. Security + Exam Guide (Testtaker's Guide Series). – М.: , 2003. – 0 с.
  46. George E. Curtis. Proactive Security Administration. – М.: , 2004. – 0 с.
  47. Federal Aviation Administration. Instrument Rating Test Prep 2003: Study and Prepare for the Instrument Rating, Instrument Flight Instructor (CFII), Instrument Ground Instructions, and Foreign Pilot: Airplane and Helicopter FAA Knowledge Tests. – М.: , 2003. – 0 с.
  48. Ron Ben Natan. Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase. – М.: , 2005. – 432 с.
  49. Goran Husman. Beginning SharePoint Administration: Windows SharePoint Services and SharePoint Portal Server. – М.: Wrox, 2006. – 552 с.
  50. Committee on Federal Regulation of Securities Committee. The Fund Director's Guidebook: Third Edition (Fund Director's Guidebook). – М.: , 2006. – 128 с.
  51. Tay Kratzer, Erno de Korte. Novell GroupWise 7 Administrator Solutions Guide. – М.: , 2005. – 936 с.
  52. Edward A. Thibault, Lawrence M. Lynch, R. Bruce McBride. Proactive Police Management (7th Edition). – М.: , 2006. – 512 с.
  53. House of Commons - Public Administration Select Committee. Public Services and the Third Sector: Rhetoric and Reality (Hc 112-I, Eleventh Report of Session 2007-08 - Volume I: Report, Together With Formal Minutes). – М.: , 2008. – 97 с.
  54. Romano I. Peluso, Robert I. Landau. Corporate Trust Administration and Management: Sixth Edition. – М.: , 2008. – 609 с.
  55. Meridian Securities Market. World Stock Exchange Fact Book. – М.: , 2008. – 0 с.
  56. V.R. Leonard. The Social Security and Medicare Handbook: What You Need to Know Explained Simply. – М.: , 2008. – 288 с.
  57. United Nations.Department of Economic and Social Affairs. Division for Public Administration and Dev. Public Enterprises: Unresolved Challenges and New Opportunities. – М.: , 2008. – 152 с.
  58. CompTIA Security+: Certification Kit (комплект из 3 книг + 2 CD-ROM). – М.: Sybex, 2009. – 1440 с.
  59. Editors Karl Maria Michael de Leeuw, Jan Bergstra. The History of Information Security: A Comprehensive Handbook. – М.: Elsevier Science, 2007. – 900 с.
  60. John Vachon. John Vachon's America: Photographs and Letters from the Depression to World War II. – М.: , 2003. – 368 с.
  61. Petra-Maria Strau?, Wolfgang Minker. Proactive Spoken Dialogue Interaction in Multi-Party Environments. – М.: , 2010. – 180 с.
  62. Xuekun Kou. GlassFish Administration. – М.: Packt Publishing, 2009. – 284 с.
  63. Todd Klindt, Shane Young, Steve Caravajal. Professional SharePoint 2010 Administration. – М.: Wiley Publishing, Inc, 2010. – 840 с.
  64. Ralph Bonnell. Check Point NGX R65 Security Administration. – М.: , 2010. – 800 с.
  65. Derrick Rountree. Security for Microsoft Windows System Administrators. – М.: , 2010. – 400 с.
  66. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с.
  67. Umer Khan. The Ultimate Windows 2003 Security and Administration CD. – М.: , 2010. – 0 с.
  68. Syngress. Check Point Next Generation with Application Intelligence Security Administration. – М.: , 2010. – 600 с.
  69. Syngress. Checkpoint Next Generation Security Administration. – М.: , 2010. – 800 с.
  70. P.J. Ortmeier. Public Safety and Security Administration. – М.: , 2010. – 208 с.
  71. Julia L. Foulkes. To The City: Urban Photographs of the New Deal (Urban Life, Landscape and Policy). – М.: , 2010. – 144 с.
  72. John B Shoven. Administrative Aspects of Investment–Based Social Security Reform. – М.: , 2000. – 240 с.
  73. David R. Miller. Security Administrator Street Smarts. – М.: , 2011. – 552 с.
  74. Bill English. MCSA/MCSE: Windows® 2000 Network Security Administration Study Guide. – М.: , 2003. – 574 с.
  75. Russ Kaufman. MCSA/MCSE: Windows® Server 2003 Network Security Administration Study Guide. – М.: , 2004. – 560 с.
  76. R L Reid. Back Home Again – Indiana in the Farm Security Administration Photographs 1935–1943. – М.: , 1987. – 158 с.
  77. David R. Miller. Security Administrator Street Smarts. – М.: , 2007. – 456 с.
  78. The Society of Design Administration. Handbook of Design Office Administration. – М.: , 1998. – 320 с.
  79. David R. Miller. Security Administrator Street Smarts. – М.: , 2008. – 552 с.
  80. Institute of Management and Administration (IOMA). Controller?s Report 2001 Yearbook. – М.: , 2001. – 320 с.
  81. Justin Menga. CCSATM NG: Check PointTM Certified Security Administrator Study Guide. – М.: , 2003. – 690 с.
  82. Institute of Management and Administration (IOMA). Controller?s Report Yearbook. – М.: , 2002. – 320 с.
  83. Simon Halliday. Judicial Review and Compliance with Administrative Law. – М.: , 2011. – 188 с.
  84. Institute of Management and Administration (IOMA). Cost Reduction and Control Best Practices. – М.: , 2005. – 544 с.
  85. R L Reid. Back Home Again – Indiana in the Farm Security Administration Photographs 1935–1943 (Paper). – М.: , 1987. – 158 с.
  86. Microsoft Windows Server 2008 Administration. – М.: , 2011. – 488 с.
  87. Oca Oracle Database 11G Administration I Exam Guide (Exam 1Z0-052). – М.: , 2011. – 0 с.
  88. Mysql Database Usage & Administration. – М.: , 2011. – 368 с.
  89. Construction Administration For Architects. – М.: , 2011. – 320 с.
  90. Mcitp Sql Server 2005 Database Administration All-In-One Exam Guide (Exams 70-431, 70-443, & 70-444). – М.: , 2011. – 0 с.
  91. Linux Administration: A Beginner'S Guide, Fifth Edition. – М.: , 2011. – 662 с.
  92. Wireless Network Administration A Beginner'S Guide. – М.: , 2011. – 336 с.
  93. Citrix® Access Suite Security For It Administrators. – М.: , 2011. – 268 с.
  94. Oracle Database Administration For Microsoft Sql Server Dbas. – М.: , 2011. – 352 с.
  95. Wireless Network Security A Beginners Guide. – М.: , 2011. – 400 с.
  96. Microsoft Sql Server 2008 Administration For Oracle Dbas. – М.: , 2011. – 592 с.
  97. Ipad & Iphone Administrator'S Guide. – М.: , 2011. – 336 с.
  98. Mac Os X System Administration. – М.: , 2011. – 528 с.
  99. Powershell For Microsoft Sharepoint 2010 Administrators. – М.: , 2011. – 368 с.
  100. CWNA: Certified Wireless Network Administrator & CWSP Certified Wireless Security Professional All-in-One Exam Guide. – М.: , 2011. – 0 с.
  101. Randal K. Michael. Aix 5L Administration. – М.: McGraw-Hill Osborne Media, 2002. – 706 с.
  102. Sam Alapati. OCP Oracle Database 11g: New Features for Administrators Exam Guide (Exam 1Z0-050) (+ CD-ROM). – М.: McGraw-Hill, 2011. – 552 с.
  103. Greg Holden. Guide to Firewalls and Network Security: Intrusion Detection and VPNs. – М.: Course Technology, 2003. – 512 с.
  104. Tim Speed, Juanita Ellis. Internet Security: A Jumpstart for Systems Administrators and IT Managers. – М.: , . –  с.
  105. Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky. Cisco Security Professional's Guide to Secure Intrusion Detection Systems. – М.: , . –  с.
  106. Thomas Porter, Jan Kanclirz Jr. Practical VoIP Security. – М.: Syngress, 2006. – 564 с.
  107. Thomas Porter, Michael Gough. How to Cheat at Voip Security (How to Cheat) (How to Cheat) (How to Cheat). – М.: , 2007. – 432 с.
  108. Ido Dubrawsky. How to Cheat at Securing Your Network. – М.: Syngress, 2007. – 432 с.
  109. Jesse Varsalone. Microsoft Forefront Security Administration Guide. – М.: , 2010. – 800 с.
  110. Halimah Awang and Loo-See Beh. Public Administration: Issues and Paradigms of Development. – М.: LAP Lambert Academic Publishing, 2012. – 188 с.
  111. Buchere Philip,Pontian Okoth and FRANK MATANGA. Training of Provincial Administrators in Conflict Management in Kenya. – М.: LAP Lambert Academic Publishing, 2012. – 304 с.
  112. Yurii Bugai. The Role of Interest Groups in Shaping Ukraine's Energy Security. – М.: LAP Lambert Academic Publishing, 2013. – 152 с.
  113. Leyla Arpac. European Union's Common Foreign and Security Policy and Turkey. – М.: LAP Lambert Academic Publishing, 2011. – 84 с.
  114. Dessalegn Workineh. The post 1991 Resettlement in food security Lens in Ethiopia. – М.: LAP Lambert Academic Publishing, 2011. – 100 с.
  115. Abid Hussain. Achieving Food Security in Pakistan. – М.: LAP Lambert Academic Publishing, 2010. – 124 с.
  116. Emmanuel Olajubu. Proactive Model for Communication Network Maintenance. – М.: LAP Lambert Academic Publishing, 2011. – 204 с.
  117. Anil Kumar V. and Prasad E. Dynamic Broadcast Routing With Security Enhancement. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  118. Arnab Banerjee,ANIRUDDHA BHATTACHARYYA and DIPAYAN BOSE. IMPLEMENTATION OF A TRUST BASED SECURE ROUTING PROTOCOL IN MANET. – М.: LAP Lambert Academic Publishing, 2012. – 292 с.
  119. Niroj Kumar Pani and Dr. Ashok Kumar Turuk. A Hybrid Zone-Based Routing Protocol for Secure Communication in MANET. – М.: LAP Lambert Academic Publishing, 2010. – 92 с.
  120. Rupa Ch. and Avadhani P. S. Modern Security Methods in Applied Computer Science. – М.: Scholars' Press, 2014. – 124 с.
  121. Nirbhay Chaubey. Securing AODV Routing Protocol in design of Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2015. – 132 с.
  122. Denver Abrey and Neco Ventura. Voice over IP Security. – М.: LAP Lambert Academic Publishing, 2010. – 72 с.
  123. Omid Mahdi Ebadati E.,Harleen Kaur M. Afshar Alam and Kaebeh Yaeghoobi. Micro-Firewalls for Dynamic Network Security Framework. – М.: LAP Lambert Academic Publishing, 2012. – 292 с.
  124. Shilpa Jaiswal. Elimination of Security Threats Using Trusted Proactive Routing. – М.: LAP Lambert Academic Publishing, 2014. – 56 с.
  125. Shilpa Jaiswal and Sumeet Agrawal. Detection of Network Worm to Eliminate Security Threats in MANET. – М.: LAP Lambert Academic Publishing, 2012. – 52 с.
  126. Wisam Elmasry. Securing WBAODV Routing Protocol in MANETs. – М.: LAP Lambert Academic Publishing, 2013. – 100 с.
  127. Rashmi Singh. Proactive Security Scheme Based on Threshold with Refreshment of Key. – М.: LAP Lambert Academic Publishing, 2012. – 72 с.
  128. Siva S. Sivatha Sindhu,S. Geetha and S. Selvakumar. Network Intrusion Detection System using Machine Learning Techniques. – М.: LAP Lambert Academic Publishing, 2013. – 80 с.
  129. Dimitrios Baltazis. Dynamic Authorizations for Secure Internet Applications. – М.: LAP Lambert Academic Publishing, 2012. – 152 с.
  130. Mohammad Faisal. Networks Security and Communication. – М.: LAP Lambert Academic Publishing, 2012. – 56 с.
  131. Predrag Tasevski. Interactive Cyber Security Awareness Program. – М.: LAP Lambert Academic Publishing, 2012. – 184 с.
  132. Saeed Soltanmohammadi. Improving Information System Security by Evaluating Human Factors. – М.: LAP Lambert Academic Publishing, 2014. – 116 с.
  133. Biswaraj Sen and Sanku Sinha. Ad hoc Routing Protocols. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  134. Muhammad Qaiser Saleem,Jafreezal Jaafar and Mohd Fadzil Hassan. Modeling Security Objectives along BPM of SOA Applications. – М.: LAP Lambert Academic Publishing, 2013. – 236 с.
  135. Bhaarath Venkateswaran. Adaptive Internet Threat Forecasting. – М.: LAP Lambert Academic Publishing, 2011. – 116 с.
  136. Chepchumba Chumo and Timothy Sulo. Food Security Implications of Coco Yam Farming in Kenya. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  137. JOHN CHIBAYA MBUYA PhD. BANK SECURITIES MANAGEMENT. – М.: LAP Lambert Academic Publishing, 2010. – 108 с.
  138. Anthony Garuba. Credit Administration. – М.: LAP Lambert Academic Publishing, 2011. – 60 с.
  139. Subhiya Abu Hatab. Principles of Educational Administration. – М.: LAP Lambert Academic Publishing, 2014. – 116 с.
  140. Tested by Zion: The Bush Administration and the Israeli-Palestinian Conflict. – М.: , . –  с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

Ничего не найдено

Образцы работ

Тема и предметТип и объем работы
Организационный конфликт как фактор развития организации
Теория организации
Курсовая работа
40 стр.
Последствия операции НАТО
Политология
Диплом
80 стр.
Платежные системы в Интернете
Информатика
Диплом
102 стр.
Роль ОБСЕ в урегулировании конфликтов в Европе
Политология
Курсовая работа
33 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Андрей
да спасибо все замечательно ещё мы ждем от неё доклад оплату сделал так же