Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Data Privacy Management and Autonomous Spontaneus Security: 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, ... Computer Science / Security and Cryptology). – М.: , 2012. – 334 с.
  2. Simson Garfinkel. RFID : Applications, Security, and Privacy. – М.: , 2005. – 0 с.
  3. Rfid In The Supply Chain. – М.: , 2011. – 176 с.
  4. Shaikh Salim and Shankar Nawale. Secure Access of RFID System. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  5. Namje Park. Mobile RFID Security. – М.: LAP Lambert Academic Publishing, 2012. – 216 с.
  6. Wiem Tounsi. Security and Privacy Controls in RFID Systems. – М.: LAP Lambert Academic Publishing, 2014. – 172 с.
  7. Wei Ren. Lightweight and Robust Security for Applications in Internet of Things. – М.: LAP Lambert Academic Publishing, 2013. – 188 с.
  8. Amol Bandal and Shankar Nawale. RFID Security. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  9. Julien Shabani. Information Security for RFID Systems. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.

Дополнительные результаты

  1. Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с.
  2. Data Privacy Management and Autonomous Spontaneus Security: 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, ... Computer Science / Security and Cryptology). – М.: , 2012. – 334 с.
  3. Wireless Communications and Applications: First International Conference, ICWCA 2011, Sanya, China, August 1-3, 2011, Revised Selected Papers (Lecture ... and Telecommunications Engineering). – М.: , 2012. – 468 с.
  4. Security and Privacy in Mobile Information and Communication Systems: Third International ICST Conference, MOBISEC 2011, Aalborg, Denmark, May 17-19, ... and Telecommunications Engineering). – М.: , 2012. – 195 с.
  5. Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  6. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с.
  7. Security and Development in Global Politics: A Critical Comparison. – М.: , 2012. – 360 с.
  8. Luis Lobo-Guerrero. Insuring Security: Biopolitics, security and risk. – М.: , 2012. – 178 с.
  9. Terrorism and the Olympics: Major Event Security and Lessons for the Future. – М.: , 2012. – 272 с.
  10. Giorgio S. Questa. Fixed Income Analysis for the Global Financial Market: Money Market, Foreign Exchange, Securities, and Derivatives. – М.: Wiley, 1999. – 368 с.
  11. Rattan Lal, David Hansen, Norman Uphoff, Steven Slack, Rattan Lal. Food Security and Environmental Quality in the Developing World. – М.: , 0. – 0 с.
  12. Littler Mendelson Attorneys, Shanti Atkins, Garen Dodge, Ronald Manthey, Marlene Muraco. Beyond Big Brother: The New World of Workplace Privacy. – М.: , 0. – 0 с.
  13. Ron Schneiderman. The Mobile Technology Question and Answer Book: A Survival Guide for Business Managers. – М.: , 0. – 0 с.
  14. Susan Echaore-McDavid. Career Opportunities in Law Enforcement, Security, and Protective Services (The Career Opportunities Series). – М.: , 0. – 0 с.
  15. Maurice, Ph.D. Youakim. Social Security and Medicare for the New Millenium. – М.: , 0. – 0 с.
  16. Richard Hunter. World Without Secrets: Business, Crime and Privacy in the Age of Ubiquitous Computing. – М.: , 0. – 0 с.
  17. Retail Security and Loss Prevention. – М.: , 0. – 0 с.
  18. Physical Security and the Inspection Process. – М.: , 0. – 0 с.
  19. Louis Barajas. The Latino Journey to Financial Greatness : The 10 Steps to Creating Wealth, Security, and a Prosperous Future for You and Your Family. – М.: , 0. – 0 с.
  20. Don Silver. The Generation X Money Book: Achieving Security and Independence. – М.: , 0. – 0 с.
  21. Jonathan Gruber, David A. Wise. Social Security and Retirement Around the World (NATIONAL BUREAU OF ECONOMIC RESEARCH CONFERENCE REPORT). – М.: , 0. – 0 с.
  22. Geoff Craighead. High-Rise Security and Fire Life Safety, Second Edition. – М.: , 0. – 0 с.
  23. Marian Quigley, Marian Quiqley. Information Security and Ethics: Social and Organizational Issues. – М.: , 0. – 0 с.
  24. Anup K. Ghosh. E-Commerce Security and Privacy. – М.: , 0. – 0 с.
  25. Kenneth Atchity. How to Escape Lifetime Security and Pursue Your Impossible Dream: A Guide to Transforming Your Career. – М.: , 2004. – 0 с.
  26. Simson Garfinkel. RFID : Applications, Security, and Privacy. – М.: , 2005. – 0 с.
  27. Joseph White. False Alarm : Why the Greatest Threat to Social Security and Medicare Is the Campaign to "Save" Them (Century Foundation Book). – М.: , 2003. – 0 с.
  28. Advances in Security and Payment Methods for Mobile Commerce. – М.: , 2004. – 0 с.
  29. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с.
  30. Ron Ben Natan. Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase. – М.: , 2005. – 432 с.
  31. Joe Conason. The Raw Deal: How the Bush Republicans Plan to Destroy Social Security and the Legacy of the New Deal. – М.: , 2005. – 141 с.
  32. Helen James. Security and Stustaibable Developement in Myanmar/Burma (Routledge Contemporary Southeast Asia Series). – М.: , 2006. – 231 с.
  33. Susan Echaore-McDavid. Career Opportunities In Law Enforcement, Security And Protective Services (Career Opportunities). – М.: , 2005. – 272 с.
  34. Roy H. Campbell, Prasad G. Naldurg. Security and Survivability: Analyzing, Modeling, and Verifying Dynamic Recovery in Insecure Systems. – М.: , 2008. – 240 с.
  35. Ibp Usa. Thailand Army, National Security And Defense Policy Handbook. – М.: , 2008. – 300 с.
  36. Ibp Usa. Turkey Army, National Security And Defense Policy Handbook (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с.
  37. Ibp Usa. Ukraine Army, National Security And Defense Policy Handbook (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с.
  38. Social Security and Development. – М.: , 2008. – 256 с.
  39. Ibp Usa. CZECH REPUBLIC ARMY, NATIONAL SECURITY AND DEFENSE POLICY HANDBOOK (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с.
  40. Ibp Usa. ESTONIA ARMY, NATIONAL SECURITY AND DEFENSE POLICY HANDBOOK (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с.
  41. Ibp Usa. Finland Army, National Security And Defense Policy Handbook (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с.
  42. Ibp Usa. Germany Army, National Security And Defense Policy Handbook (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с.
  43. Ibp Usa. China Army, National Security and Defense Policy Handbook. – М.: , 2008. – 300 с.
  44. Ibp Usa. Cuba Army, National Security And Defense Policy Handbook (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с.
  45. Ibp Usa. US Securities and Exchange Commission Handbook. – М.: , 2008. – 300 с.
  46. Ibp Usa. Myanmar Army, National Security And Defense Policy Handbook. – М.: , 2008. – 300 с.
  47. Ibp Usa. Philippines Army National Security and Defense Policy Handbook. – М.: , 2008. – 300 с.
  48. Ibp Usa. Russia KGB (National Security and Intelligence Handbook: Past And Present (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с.
  49. Ibp Usa. Global National Security and Intelligence Agencies Handbook. – М.: , 2008. – 300 с.
  50. Ibp Usa. Germany Army, National Security and Defense Policy Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  51. Ibp Usa. Australia Army, National Security and Defense Policy Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  52. Ibp Usa. Bangladesh Army, National Security and Defense Policy Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  53. Ibp Usa. Czech Republic Army, National Security and Defense Policy Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  54. Ibp Usa. European System for Security and Cooperation Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  55. Ibp Usa. Finland Army, National Security and Defense Policy Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  56. Ibp Usa. France Army, National Security and Defense Policy Handbook (World Business Information Catalog). – М.: , 2008. – 300 с.
  57. Ibp Usa. Estonia Army, National Security and Defense Policy Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  58. Amanda Spink. Handbook of Web Log Analysis (Handbook of Research On...). – М.: , 2008. – 628 с.
  59. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с.
  60. V.R. Leonard. The Social Security and Medicare Handbook: What You Need to Know Explained Simply. – М.: , 2008. – 288 с.
  61. Hamid R. Nemati. Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues (Advances in Information Security and Privacy). – М.: , 2009. – 414 с.
  62. Professional Cocoa Application Security. – М.: , 2010. – 336 с.
  63. Helen Toner, Elspeth Guild, Anneliese Baldaccini. Whose Freedom, Security and Justice?. – М.: Hart Publishing, 2007. – 550 с.
  64. Dominique Paret. RFID at Ultra and Super High Frequencies: Theory and application. – М.: , 2010. – 548 с.
  65. Moorad Choudhry. Fixed Income Securities and Derivatives Handbook. – М.: , 2010. – 496 с.
  66. Eiji Arai. Mechatronics for Safety, Security and Dependability in a New Era. – М.: , 2010. – 464 с.
  67. Charles Nemeth. Private Security and the Law. – М.: , 2010. – 488 с.
  68. Carl Roper. Physical Security and the Inspection Process. – М.: , 2010. – 290 с.
  69. Charles A. Sennewald. Retail Crime, Security, and Loss Prevention. – М.: , 2010. – 704 с.
  70. Shigeru Yamamoto. Systems and Human Science - For Safety, Security and Dependability. – М.: , 2010. – 350 с.
  71. Jesus Mena. Investigative Data Mining for Security and Criminal Detection. – М.: , 2010. – 272 с.
  72. Joseph Donnermeyer. Security and Crime Prevention. – М.: , 2010. – 439 с.
  73. Ron Ben Natan. Implementing Database Security and Auditing. – М.: , 2010. – 432 с.
  74. James Doyle. Nuclear Safeguards, Security and Nonproliferation. – М.: , 2010. – 624 с.
  75. Michael Cross. Developer's Guide to Web Application Security. – М.: , 2010. – 500 с.
  76. Philip Purpura. Retail Security and Shrinkage Protection. – М.: , 2010. – 336 с.
  77. Brien Posey. GFI Network Security and PCI Compliance Power Tools. – М.: , 2010. – 488 с.
  78. Paul Sanghera. RFID+ Study Guide and Practice Exams. – М.: , 2010. – 352 с.
  79. Umer Khan. The Ultimate Windows 2003 Security and Administration CD. – М.: , 2010. – 0 с.
  80. Umer Khan. The Ultimate Cisco and Security and IP Configuration CD. – М.: , 2010. – 0 с.
  81. Charles Nemeth. Private Security and the Investigative Process. – М.: , 2010. – 376 с.
  82. Geoff Craighead. High-Rise Security and Fire Life Safety. – М.: , 2010. – 696 с.
  83. Michael Gough. Video Conferencing over IP: Configure, Secure, and Troubleshoot. – М.: , 2010. – 0 с.
  84. Pamela A. Collins. Principles of Security and Crime Prevention. – М.: , 2010. – 490 с.
  85. J. Barry Hylton. Safe Schools: A Security and Loss Prevention Plan. – М.: , 2010. – 232 с.
  86. Jason Furman. Pensions, Social Security, and the Privatization of Risk. – М.: , 2010. – 128 с.
  87. Ferenc Mate. Wisdom of Tuscany – Simplicity, Security, and the Good Life. – М.: , 2011. – 0 с.
  88. Orin Thomas. MCSA/MCSE Self–Paced Training Kit (Exam 70–350) – Implementing Microsoft Internet Security and Acceleration Server 2004. – М.: , 2005. – 1104 с.
  89. Douglas W Blum. Russia and Globalization – Identity, Security and Society in an Era of Change. – М.: , 2008. – 402 с.
  90. Lorrie Cranor. Security and Usability. – М.: , 2005. – 738 с.
  91. Alan G. Konheim. Computer Security and Cryptography. – М.: , 1972. – 0 с.
  92. Mark Duffield. Development, Security and Unending War. – М.: , 2007. – 280 с.
  93. Frank J. Fabozzi CFA. Treasury Securities and Derivatives. – М.: , 1997. – 312 с.
  94. Frank J. Fabozzi CFA. Valuation of Fixed Income Securities and Derivatives. – М.: , 1998. – 288 с.
  95. John Lewis Gaddis. Surprise, Security, and the American Experience. – М.: , 2005. – 160 с.
  96. Patricia Owens. Security and War. – М.: , 2013. – 224 с.
  97. Patricia Owens. Security and War. – М.: , 2013. – 224 с.
  98. Tim Mather. Cloud Security and Privacy. – М.: , 2009. – 334 с.
  99. Microsoft. Improving .NET Application Performance and Scalability. – М.: , 2004. – 1152 с.
  100. Microsoft. Improving Web Application Security – Threats and Countermeasures. – М.: , 2003. – 960 с.
  101. Michael Miller. Absolute PC Security and Privacy. – М.: , 2002. – 560 с.
  102. Stefan Elbe. Security and Global Health. – М.: , 2010. – 200 с.
  103. Stefan Elbe. Security and Global Health. – М.: , 2010. – 200 с.
  104. Frederick Lynch. One Nation under AARP – The Fight over Medicare, Social Security, and America?s Future. – М.: , 2011. – 236 с.
  105. John Lewis Gaddis. Surprise, Security, and the American Experience. – М.: , 2004. – 160 с.
  106. Edited by Benjamin J Goold and Liora Lazarus. Security and Human Rights. – М.: , 2011. – 426 с.
  107. Helen Toner, Elspeth Guild and Anneliese Baldaccini. Whose Freedom, Security and Justice?. – М.: , 2011. – 582 с.
  108. Bohi. Oil Prices, Energy Security, and Import Policy. – М.: , 1982. – 0 с.
  109. D J Solove. The Future Of Reputation – Gossip, Rumour, and Privacy on the Internet. – М.: , 2008. – 256 с.
  110. Doug Stokes. Global Energy Security and American Hegemony. – М.: , 2010. – 320 с.
  111. Doug Stokes. Global Energy Security and American Hegemony. – М.: , 2010. – 320 с.
  112. Mohammed J. Kabir. Red Hat® Linux® Security and Optimization. – М.: , 2001. – 720 с.
  113. Rfid In The Supply Chain. – М.: , 2011. – 176 с.
  114. Principles Of Computer Security, Comptia Security+ And Beyond, Second Edition. – М.: , 2011. – 0 с.
  115. Mobile Application Security. – М.: , 2011. – 432 с.
  116. Principles Of Computer Security Comptia Security+ And Beyond Lab Manual, Second Edition. – М.: , 2011. – 352 с.
  117. Social Security And Welfare:. – М.: , 2011. – 368 с.
  118. Vivek Bhushan. Securing Published Data In Cloud Using Data Incognito. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  119. Wenhua Wang and Yu Lei. Web Application Testing And Security Testing Techniques Design. – М.: LAP Lambert Academic Publishing, 2011. – 96 с.
  120. Shaikh Salim and Shankar Nawale. Secure Access of RFID System. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  121. Manoj Kollam. A Low-cost Embedded Smart Car Security And Theft Control System. – М.: LAP Lambert Academic Publishing, 2011. – 84 с.
  122. David Bauchi. Food security and poverty reduction in Nigeria. – М.: LAP Lambert Academic Publishing, 2013. – 112 с.
  123. Jeff Nelson. Social Security and Pensions. – М.: Dictus Publishing, 2011. – 184 с.
  124. Sylvia Kiamba. Societal Security and Migration. – М.: LAP Lambert Academic Publishing, 2012. – 132 с.
  125. Benard Sorre. CASH CROP PRODUCTION, FOOD SECURITY AND NUTRITION IN RURAL HOUSEHOLDS. – М.: LAP Lambert Academic Publishing, 2011. – 88 с.
  126. Dinah Koteikor Kotey. Library security and user attitudes. – М.: LAP Lambert Academic Publishing, 2012. – 140 с.
  127. Vinay Abburi. SECURE AND RELIABLE DEEP SPACE NETWORKS. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  128. Muhammad Azfar Anwar and Saif ur Rehman. Defense Spending, National Security and Economic Growth of Pakistan. – М.: LAP Lambert Academic Publishing, 2012. – 128 с.
  129. Subir Biswas. Security and Privacy in Vehicular Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2013. – 204 с.
  130. Wiem Tounsi. Security and Privacy Controls in RFID Systems. – М.: LAP Lambert Academic Publishing, 2014. – 172 с.
  131. Denver Abrey and Neco Ventura. Voice over IP Security. – М.: LAP Lambert Academic Publishing, 2010. – 72 с.
  132. Albert Wasef. Managing and Complementing PKI for Securing Vehicular Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2011. – 204 с.
  133. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  134. Amol Bandal and Shankar Nawale. RFID Security. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  135. Drake Patrick Mirembe. Security Framework for Telemedicine, eHealth, and Wellness Services. – М.: LAP Lambert Academic Publishing, 2010. – 72 с.
  136. Hammad Kazmi. Security and Privacy issues in Near Field Communication (NFC) Systems. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  137. Hassen Alsafi and Mohammed Azhruddin. The Security Issues for Smart Grids Applications on Cloud Computing. – М.: LAP Lambert Academic Publishing, 2013. – 60 с.
  138. Shahla Asadi and Elaheh Yadegaridehkordi. Customers perspectives on cloud computing adoption by Banking sector. – М.: LAP Lambert Academic Publishing, 2015. – 128 с.
  139. Alptekin Kupcu. Efficient Cryptography for the Next Generation Secure Cloud. – М.: LAP Lambert Academic Publishing, 2010. – 220 с.
  140. Ekoningtyas Margu Wardani and Muyanja Ssenyonga. Soaring Food Prices, Food Security, and Poverty in Indonesia. – М.: LAP Lambert Academic Publishing, 2013. – 128 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Наука человековедения. интервью с Д. Уолтоном, профессором London Metropolitan University, экспертом CIPD. Chartered Institute of Personnel and Development, автором программы Master of Arts in Human Resource Strategies. И. Смирнова, "Кадровый менеджмент", № 5, июль-август 2007.
  2. Специализированный модуль FS-CD. Collections and Disbursements - "Сборы и Выплаты" и его возможности. О.А. Глущенко, "Финансовый менеджмент в страховой компании", № 2, II квартал 2007.
  3. Бюджетирование страховой компании на базе Oracle Enterprise Planning and Budgeting. Д.В. Лесоводский, "Финансовый менеджмент в страховой компании", № 3, III квартал 2006.
  4. Регулирование операций торгового финансирования: новые инициативы. интервью с Д. Шмандом, вице-председателем Банковской комиссии ICC по supply chain finance, главой подразделения Trade Finance and Cash Management Corporates EMEA в Global Transaction Banking. GTB division Deutsche Bank. Н. Макарова, "Международные банковские операции", N 2, апрель-июнь 2012 г.
  5. Ужин в темноте в стиле Малевича и Новый год в Хаммере". Что может выть лучше?". интервью с Н. Саниной, индивидуальным предпринимателем и креативным директором компании "San and stars". М. Сипатова, "Арсенал предпринимателя", N 12, декабрь 2011 г.
  6. На пути к новому стандарту в торговом финансировании. интервью с А.  Кастерманом, руководителем Trade and Supply Chain, SWIFT, сопредседателем рабочей группы ICC-BPO. Э. Шакирова, "Международные банковские операции", N 4, октябрь-декабрь 2011 г.
  7. Уильям Савадж: Мотивировать людей в Нижнем Новгороде и Новосибирске нужно по-разному". интервью с У. Саваджем, вице-президентом корпорации Intel, подразделение Software and Services Group. М. Холкина, "Управление персоналом", N 14, июль 2010 г.
  8. Цены под контролем: the present and the future. С. Стройкова, И. Леметюйнен, "Консультант", № 19, сентябрь 2009.

Образцы работ

Тема и предметТип и объем работы
Последствия операции НАТО
Политология
Диплом
80 стр.
Процессуальные особенности рассмотрения дел судами о компенсации морального вреда
Гражданский процесс
Диплом
70 стр.
Привлекательности труда в организации
Психология
Курсовая работа
35 стр.
Психология личности Фрейда
Психология
Реферат
27 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Василий, 04.03
Спасибо большое за работу. Защитил на пять