Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Professional Cocoa Application Security. – М.: , 2010. – 336 с. Дополнительные результаты Elizabeth M. Morgan. You've Earned Your Doctorate in Psychology . Now What?: Securing a Job As an Academic or Professional Psychologist. – М.: , 2012. – 244 с. Brandon Ryan. How to Land a Top-Paying Certified meeting professional Job: Your Complete Guide to Opportunities, Resumes and Cover Letters, Interviews, Salaries, Promotions, What to Expect From Recruiters and More. – М.: , 2012. – 92 с. Data Privacy Management and Autonomous Spontaneus Security: 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, ... Computer Science / Security and Cryptology). – М.: , 2012. – 334 с. Wireless Communications and Applications: First International Conference, ICWCA 2011, Sanya, China, August 1-3, 2011, Revised Selected Papers (Lecture ... and Telecommunications Engineering). – М.: , 2012. – 468 с. Public Key Infrastructures, Services and Applications: 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected ... Computer Science / Security and Cryptology). – М.: , 2012. – 219 с. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 515 с. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с. Smart Card Research and Advanced Applications: 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, ... Computer Science / Security and Cryptology). – М.: , 2012. – 357 с. Venky Shankararaman. Business Enterprise, Process, and Technology Management: Models and Applications. – М.: , 2012. – 395 с. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с. Russell Hoye, Matthew Nicholson, Aaron Smith, Bob Stewart, Hans Westerbeek. Sport Management: Principles and Applications. – М.: , 2012. – 304 с. Securities Compliance Index. Securities Compliance Index, Second Edition: A Topical Guide To U.S. Securities Regulation. – М.: , 2012. – 512 с. Jeffrey C. Hooke. Security Analysis on Wall Street. – М.: , 0. – 0 с. William T. Moore. Real Options and Option-Embedded Securities. – М.: , 0. – 0 с. Not Applicable (Na ). World Development Report 2004: Making Services Work for Poor People (WORLD DEVELOPMENT REPORT). – М.: , 0. – 0 с. Deni Elliott, Judy E. Stern, Institute for the Study of Applied and Professional Ethics. Research Ethics: A Reader. – М.: , 0. – 0 с. Canadian Association of Professional, Francis Theriault. Professionally Speaking. – М.: , 0. – 0 с. Not Applicable. Top Careers for Art Graduates (Top Careers). – М.: , 0. – 0 с. Not Applicable (Na ). Top Careers For History Graduates (Top Careers). – М.: , 0. – 0 с. Not Applicable (Na ). Entrepreneurs (Ferguson's Careers in Focus). – М.: , 0. – 0 с. Safety and the Security Professional : A Guide to Occupational Safety and Health Strategies. – М.: , 0. – 0 с. Melissa Cook, Hewlett-Packard Professional Books. Building Enterprise Information Architecture: Reengineering Information Systems. – М.: , 0. – 0 с. The Editors of Professional Publications. How to Become a Professional Engineer. – М.: , 0. – 0 с. Career Publishing, Professional Truck Driver Institute (PTDI). STRAIGHT TRUCK DRIVER HANDBOOK/WORKBOOK. – М.: , 0. – 0 с. Roger G. Clarke. Options and Futures: A Tutorial (The Research Foundation of Aimr and Blackwell Series in Finance). – М.: Research Foundation of the Institute of Chartered Financial Analysts, 1992. – 124 с. Gregory V. Kitter. Investment Mathematics for Finance & Treasury Professionals: A Practical Approach. – М.: , 0. – 0 с. Jessica Keyes. Securities Technology Handbook. – М.: , 0. – 0 с. Julia Lowell, C. R. Neu, Daochi Tong, National Defense Research Institute, National Security Research Institute. Financial Crises and Contagion in Emerging Market Countries. – М.: , 0. – 0 с. Joseph S. Nye, William A. Owens, James R. Schlesinger, R. James Woolsey, James A. Lewis, Joseph S., Jr. Nye, James Andrew Lewis, Erin Schlather, Csis Commission on Technology Security in the Twenty-First Century. Computer Exports and National Security: New Tools for a New Century : A Report of the Csis Commission on Technology Security in the 21St-Century (Csis Panel Reports.). – М.: , 0. – 0 с. Society for Marketing Professional Services. Marketing Handbook for the Design & Construction Professional: Society for Marketing Professional Services. – М.: , 0. – 0 с. Not Applicable (Na ). Buying a Home in Greece & Cyprus. – М.: , 0. – 0 с. Susan Jaderstrom, Leonard Kruk, Joanne Miller, Susan W. Fenner, Leonard B. Kruk, International Association of Administrative Professionals. Complete Office Handbook: The Definitive Reference for Today's Electronic Office. – М.: , 0. – 0 с. Marilyn Manning, Carolyn Professional Excellence for Secretaries Barnes. Professionalism in the Office: Proven Techniques for Administrators, Secretaries, and Coordinators (Crisp 50-Minute Book). – М.: , 0. – 0 с. Diana Huggins, Will Schmied. MCDST 70-272 Exam Cram 2 : Supporting Users & Troubleshooting Desktop Applications on a Windows XP Operating System ( + CD-ROM). – М.: Que Certification, 0. – 360 с. Jothy Rosenberg and David Remy. Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption. – М.: Sams, 2004. – 380 с. Timothy L. Warner. MCDST Exams (Exams 70-271 and 70-272). – М.: Charles River Media, 2004. – 432 с. Darrel Ince, Darrell Ince. Developing Distributed and E-Commerce Applications. – М.: , 0. – 0 с. Jonathan S. Held, John R. Bowers. Securing E-Business Applications and Communications. – М.: , 0. – 0 с. G. David Garson, G. David Information Technology and Computer Applications in Garson. Public Information Technology: Policy and Management Issues. – М.: , 0. – 0 с. M. Tim Jones. Bsd Sockets Programming from a Multi-Language Perspective (Programming Series). – М.: , 0. – 0 с. Simson Garfinkel. RFID : Applications, Security, and Privacy. – М.: , 2005. – 0 с. International Cocoa Organization (ICCO). World Cocoa Directory 2004-2005 (World Cocoa Directory). – М.: , 2004. – 0 с. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с. Rickland Hollar. Enterprise Web Services Security (Internet Series). – М.: , 2005. – 432 с. Committee on Federal Regulation of Securities Committee. The Fund Director's Guidebook: Third Edition (Fund Director's Guidebook). – М.: , 2006. – 128 с. Frank Fabozzi. The Handbook of Fixed Income Securities. – М.: McGraw-Hill, 2005. – 1500 с. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с. American Society for Healthcare Central Services Professionals. Training Manual for Health Care Central Service Technicians (Jossey-Bass/Aha Press). – М.: , 2005. – 304 с. Professional Convention Management Association. Professional Meeting Management: Comprehensive Strategies for Meetings, Conventions and Events: Pf Bound Version. – М.: , 2006. – 0 с. Professional Risk Manager's International Association (PRMIA). The Professional Risk Managers' Guide to Financial Theory and Application (Primia Risk Management). – М.: , 2007. – 400 с. Professional Risk Manager's International Association (PRMIA). The Professional Risk Managers' Guide to Financial Markets (Prmia Risk Management Series). – М.: , 2007. – 400 с. Professional Risk Manager's International Association (PRMIA). The Professional Risk Manager's Guide to Financial Instruments (Prmia Risk Management Series). – М.: , 2007. – 400 с. Professional Risk Manager's International Association (PRMIA). The Professional Risk Managers' Guide to the Energy Market (Prmia Risk Management Series). – М.: , 2007. – 400 с. Matt Walker, Angela Walker. CCENT Cisco Certified Entry Networking Technician Study Guide (Exam 640-822) (Study Guide Book & CD). – М.: , 2008. – 512 с. James Michael Stewart, Ed Tittel, Mike Chapple. CISSP: Certified Information Systems Security Professional Study Guide. – М.: , 2008. – 841 с. Meridian Securities Market. World Stock Exchange Fact Book. – М.: , 2008. – 0 с. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с. CompTIA Security+: Certification Kit (комплект из 3 книг + 2 CD-ROM). – М.: Sybex, 2009. – 1440 с. Hamid R. Nemati. Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues (Advances in Information Security and Privacy). – М.: , 2009. – 414 с. Bob LeVitus, Jeff Evans. WebMaster Windows: How to Build Your Own World Wide Web Server Without Really Trying (+ CD-ROM). – М.: AP Professional, 1997. – 512 с. Julian Talbot, Miles Jakeman. Security Risk Management Body of Knowledge (Wiley Series in Systems Engineering and Management). – М.: , 2009. – 445 с. Air Pollution Modeling and its Application XX (NATO Science for Peace and Security Series C: Environmental Security). – М.: , 2010. – 552 с. Carl Roper. Risk Management for Security Professionals. – М.: , 2010. – 304 с. Santiago Remacha Esteras, Elena Marco Fabre. Professional English in Use: ICT. – М.: Cambridge University Press, 2007. – 120 с. Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards and Applications (Wireless Networks and Mobile Communications). – М.: , 2008. – 424 с. Handbook of Information and Communication Security. – М.: , 2010. – 800 с. Professional Cocoa Application Security. – М.: , 2010. – 336 с. Todd Klindt, Shane Young, Steve Caravajal. Professional SharePoint 2010 Administration. – М.: Wiley Publishing, Inc, 2010. – 840 с. Mickey Gousset, Brian Keller, Ajoy Krishnamoorthy, Martin Woodward. Professional Application Lifecycle Management with Visual Studio 2010. – М.: Wiley Publishing, Inc, 2010. – 696 с. Thearon Willis. Beginning Microsoft® Visual Basic® 2008. – М.: , 2008. – 912 с. Gene Backlin. Professional iPhone and iPad SDK Application Development. – М.: Wiley Publishing, Inc, 2010. – 552 с. Doug Howard, Kevin Prince. Security 2020: Reduce Security Risks This Decade. – М.: Wiley, 2010. – 336 с. Philip Holder. Defensive Tactics for the Security Professional. – М.: , 2010. – 164 с. James C Foster. Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploitsand Tool Coding for Security Professionals. – М.: , 2010. – 700 с. Michael Cross. Developer's Guide to Web Application Security. – М.: , 2010. – 500 с. Anthony Piltzecker. Microsoft Vista for IT Security Professionals. – М.: , 2010. – 672 с. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с. Marcus Sachs. Securing IM and P2P Applications for the Enterprise. – М.: , 2010. – 650 с. Syngress. Check Point Next Generation with Application Intelligence Security Administration. – М.: , 2010. – 600 с. Edward Halibozek. The Corporate Security Professional's Handbook on Terrorism. – М.: , 2010. – 288 с. Jay Beale. 2008 Open Source Penetration Testing and Security Professional CD. – М.: , 2010. – 0 с. Simson Garfinkel. Building Cocoa Applications – A Step–by–Step Guide. – М.: , 2002. – 648 с. Bilal Haidar. Professional ASP.NET 3.5 Security, Membership, and Role Management with C# and VB. – М.: , 2008. – 936 с. PEP (Professional Engineering Publishers). Vehicle Noise and Vibration 2000. – М.: , 1978. – 0 с. Gene Backlin. Professional iPhone and iPad Application Development. – М.: , 1986. – 84 с. Mark S. Merkow. Building SET Applications for Secure Transactions. – М.: , 1998. – 416 с. Kari Salo. Professional MeeGo Application Development. – М.: , 2011. – 288 с. Reto Meier. Professional AndroidTM Application Development. – М.: , 2008. – 432 с. David Rook. 10 Principles of Secure Web Application Development. – М.: , 2010. – 408 с. Professor Mario Cerrato. The Mathematics of Derivatives Securities with Applications in MATLAB. – М.: , 2011. – 512 с. James Stanger. CIWTM: Security Professional Study Guide. – М.: , 2002. – 728 с. Dana Moore. Professional Rich Internet Applications. – М.: , 2007. – 566 с. Microsoft. Improving Web Application Security – Threats and Countermeasures. – М.: , 2003. – 960 с. Microsoft. Building Secure Microsoft ASP .NET Applications. – М.: , 2003. – 624 с. Andres Andreu. Professional Pen Testing for Web Applications. – М.: , 2006. – 522 с. Tim Francis. Professional IBM WebSphere 5.0 Application Server. – М.: , 2002. – 792 с. David D. Coleman. CWSP Certified Wireless Security Professional Official Study Guide. – М.: , 2010. – 696 с. Steve Fox. Professional Office Business Application Development. – М.: , 2008. – 336 с. Wireless Application Protocol Forum, Ltd. Official Wireless Application Protocol 2.0. – М.: , 1999. – 768 с. Christopher Wells. Securing Ajax Applications. – М.: , 2007. – 250 с. NW SS MCKAY. Mckay: ?word Processing Applications? For Office Professionals (pr Only). – М.: , 1989. – 206 с. Jim Miller. Developing Secure Applications. – М.: , 2002. – 416 с. Center for Professional Computer Education. Multimate ProfessionalTM. – М.: , 1986. – 240 с. Center for Professional Computer Education. DisplayWrite III. – М.: , 1987. – 224 с. Center for Professional Computer Education. WordStar®. – М.: , 1987. – 192 с. Center for Professional Computer Education. LOTUS 1–2–3 Quick Reference Handbook. – М.: , 1986. – 240 с. Kelly McGrew. Optimizing and Securing Cisco® AVVID Applications. – М.: , 2002. – 312 с. Ulrich Lang. CORBA Security for Distributed Application Development. – М.: , 2000. – 400 с. Hacking Exposed Web 2.0: Web 2.0 Security Secrets And Solutions. – М.: , 2011. – 258 с. Locksmith And Security Professionals' Exam Study Guide. – М.: , 2011. – 368 с. Applied Sap Bi 7.0 Web Reports: Using Bex Web Analyzer And Web Application Designer. – М.: , 2011. – 512 с. Mobile Application Security. – М.: , 2011. – 432 с. Peoplesoft Peopletools Tips & Techniques. – М.: , 2011. – 640 с. CWNA: Certified Wireless Network Administrator & CWSP Certified Wireless Security Professional All-in-One Exam Guide. – М.: , 2011. – 0 с. Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky. Cisco Security Professional's Guide to Secure Intrusion Detection Systems. – М.: , . – с. Inc. KT Solutions, KT Solutions has focused on what it takes to create efficient, professional multimedia training t KT Solutions specializes in the development of interactive multimedia training products for computer applications. Over the past decade. Beginning Windows NT Workstation 4.0 (Microsoft Windows NT). – М.: , . – с. Inc. KT Solutions, KT Solutions has focused on what it takes to create efficient, professional multimedia training t KT Solutions specializes in the development of interactive multimedia training products for computer applications. Over the past decade. Advanced Word for Office 97 (Microsoft Word 97). – М.: , . – с. Thomas Porter, Jan Kanclirz Jr. Practical VoIP Security. – М.: Syngress, 2006. – 564 с. Craig Schiller, Seth Fogie, Colby DeRodeff, Michael Gregg. InfoSecurity 2008 Threat Analysis. – М.: Syngress, 2007. – 480 с. Emily M. Harwood. Digital CCTV: A Security Professional's Guide. – М.: Butterworth-Heinemann, 2007. – 272 с. John Walkenbach. Excel 2013 Power Programming with VBA. – М.: Wiley, 2013. – 1104 с. Reto Meier. Professional Android 4 Application Development. – М.: Wrox, 2012. – 864 с. Zdziarski. Hacking and Securing iOS Applications. – М.: , 2012. – с. Wenhua Wang and Yu Lei. Web Application Testing And Security Testing Techniques Design. – М.: LAP Lambert Academic Publishing, 2011. – 96 с. Clare Mackay. SELLING LONDON’S OLYMPIC BID. – М.: LAP Lambert Academic Publishing, 2012. – 96 с. Someshwar Gande and Srilatha Rondla. Security Testing for Web Applications in SDLC. – М.: LAP Lambert Academic Publishing, 2013. – 96 с. Vishal Vora. Implementation and Analysis of Various Attacks on Digital Images. – М.: LAP Lambert Academic Publishing, 2012. – 112 с. Srikanth Hariharan,Ness B. Shroff and Saurabh Bagchi. Secure Neighbor Discovery in Wireless Networks. – М.: LAP Lambert Academic Publishing, 2011. – 52 с. Balamurugan Balusamy. A Classic Mobile Messenger System Using XML based Jabber Server. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Wei Ren. Lightweight and Robust Security for Applications in Internet of Things. – М.: LAP Lambert Academic Publishing, 2013. – 188 с. Pawan Kumar Jha and J. K. Mandal. Symmetric Encryption-Algorithm, Analysis and Applications. – М.: LAP Lambert Academic Publishing, 2011. – 452 с. Md. Hamidul Islam. Security Issues of Web Applications in Asp.Net Platform. – М.: LAP Lambert Academic Publishing, 2012. – 92 с. Mohammed Firdos Alam Sheikh. Improving Web Security by Blocking SQL Injection Attack(SQLIA). – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Todd Deshane. A Desktop System for Attack-Resistance and Rapid Recovery. – М.: LAP Lambert Academic Publishing, 2010. – 124 с. Cyrus Abanti Makori,Jane Onsongo and Lusiba Badru. ICT Security Applications. – М.: LAP Lambert Academic Publishing, 2012. – 112 с. Hassen Alsafi and Mohammed Azhruddin. The Security Issues for Smart Grids Applications on Cloud Computing. – М.: LAP Lambert Academic Publishing, 2013. – 60 с. Muhammad Qaiser Saleem,Jafreezal Jaafar and Mohd Fadzil Hassan. Modeling Security Objectives along BPM of SOA Applications. – М.: LAP Lambert Academic Publishing, 2013. – 236 с. Anvar Akhmedjanov. Security in SAP NetWeaver 7.0 Application Server ABAP. – М.: LAP Lambert Academic Publishing, 2011. – 128 с. Jose Fonseca. Evaluating the [In]security of Web Applications. – М.: LAP Lambert Academic Publishing, 2011. – 408 с. Лучшие результаты Ничего не найдено Дополнительные результаты Еxecutive search - это знания, которых нет у рекрутеров. интервью с М. Мягковой, владельцем компании Perfect Search Company, Executive Search & Professional Recruitment. "Управление персоналом", № 23, декабрь 2005. Ошибка минера и рекрутера - прочувствуйте разницу.... интервью с А. Новиковой, руководителем проекта "HR-ассоциация Санкт-Петербурга", А. Викуловой, экспертом в области управления персоналом, независимым членом HR-ассоциации Санкт-Петербурга, К. Родиной, директором департамента подбора персонала компании EMG Professionals, А. Шавериной, ведущим специалистом по подбору персонала компании BusinessLink Personnel. В. Горлов, "Управление персоналом", N 10, май 2012 г. Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Александр, 06.01 С наступившими и грядущими праздниками Вас! Написанная Вами работа принята преподавателем как есть, мне даже пришлось буквально на месте ваять титульный лист. О недочётах она лишь сказала, что...они есть - и не более того. Благодаря Вам мне даже не пришлось сдавать экзамен по этому предмету. Спасибо большое!