Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Jim Stewart. SAP Security: SAP Security Essentials. – М.: Equity Press, 2005. – 136 с. Applied Sap Bi 7.0 Web Reports: Using Bex Web Analyzer And Web Application Designer. – М.: , 2011. – 512 с. Дополнительные результаты Francis Groves. Corporate Actions - A Concise Guide: An introduction to securities events. – М.: , 2012. – 230 с. Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с. Data Privacy Management and Autonomous Spontaneus Security: 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, ... Computer Science / Security and Cryptology). – М.: , 2012. – 334 с. Security and Privacy in Mobile Information and Communication Systems: Third International ICST Conference, MOBISEC 2011, Aalborg, Denmark, May 17-19, ... and Telecommunications Engineering). – М.: , 2012. – 195 с. Constructive Side-Channel Analysis and Secure Design: Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings ... Computer Science / Security and Cryptology). – М.: , 2012. – 280 с. Public Key Infrastructures, Services and Applications: 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected ... Computer Science / Security and Cryptology). – М.: , 2012. – 219 с. Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – М.: , 2012. – 283 с. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 515 с. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с. Smart Card Research and Advanced Applications: 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, ... Computer Science / Security and Cryptology). – М.: , 2012. – 357 с. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с. Security and Development in Global Politics: A Critical Comparison. – М.: , 2012. – 360 с. Joseph F. Stenken JD CLU ChFc. Social Security & Medicare Facts 2012. – М.: , 2012. – 451 с. Andre Bogelsack. Performance und Skalierung von SAP ERP Systemen in virtualisierten Umgebungen (Informationsmanagement und Computer Aided Team) (German Edition). – М.: , 2012. – 221 с. Luis Lobo-Guerrero. Insuring Security: Biopolitics, security and risk. – М.: , 2012. – 178 с. CCH Editorial Staff. Social Security Explained 2012. – М.: , 2012. – 298 с. Terrorism and the Olympics: Major Event Security and Lessons for the Future. – М.: , 2012. – 272 с. Sheila R Ronis. Economic Security: Neglected Dimension of National Security?. – М.: , 2012. – 128 с. Denise Garcia. Disarmament Diplomacy and Human Security: Regimes, Norms and Moral Progress in International Relations. – М.: , 2012. – 0 с. Securities Compliance Index. Securities Compliance Index, Second Edition: A Topical Guide To U.S. Securities Regulation. – М.: , 2012. – 512 с. American Bar Association, Thomas Lee Hazen. Securities Regulation: Corporate Counsel Guides. – М.: , 2012. – 540 с. Grant Norris, Ian Wright, James R. Hurley, John R. Dunleavy, Alison Gibson, John Dunleavy, James R. Hurley, Alison Gibson, Ian Wright. SAP: An Executive's Comprehensive Guide. – М.: , 0. – 0 с. Lionel Martellini, Philippe Priaulet, StA©phane Priaulet. Fixed-Income Securities : Valuation, Risk Management and Portfolio Strategies (The Wiley Finance Series). – М.: , 0. – 0 с. Jeffrey C. Hooke. Security Analysis on Wall Street. – М.: , 0. – 0 с. Catherine M. Roze. SAP BW Certification: A Business Information Warehouse Study Guide. – М.: Wiley, 2002. – 352 с. Martin Stone, Spencer Strauss. Secure Your Financial Future Investing in Real Estate. – М.: , 0. – 0 с. William Rini. Fundamentals of the Securities Industry. – М.: , 0. – 0 с. Frank J. Fabozzi, John N. Dunlevy, Frank J. Fabozzi, John N. Dunlevy. Real Estate Backed Securities. – М.: , 0. – 0 с. David F. Teitelbaum. The Procrastinator's Guide to Financial Security: How Anyone Over 40 Can Still Build a Strong Portfolio--and Retire Comfortably. – М.: , 0. – 0 с. Giorgio S. Questa. Fixed Income Analysis for the Global Financial Market: Money Market, Foreign Exchange, Securities, and Derivatives. – М.: Wiley, 1999. – 368 с. Bambi Holzer. Retire Rich : The Baby Boomer's Guide to a Secure Future. – М.: , 0. – 0 с. Peter A. Diamond. Taxation, Incomplete Markets, and Social Security (Munich Lectures). – М.: , 0. – 0 с. William T. Moore. Real Options and Option-Embedded Securities. – М.: , 0. – 0 с. Duane R. Milano, Milano, Charles S. Robnett, Duane R. Essentials of Accounting II Milano. The Essentials of Accounting I (Essentials). – М.: , 0. – 0 с. Marilyn Greenstein, Todd M. Feinman. Electronic Commerce: Security Risk Management and Control. – М.: , 0. – 0 с. Kenneth S. Hackel, Joshua Livnat. Cash Flow and Security Analysis. – М.: , 0. – 0 с. Michael Ohrem. Neues Kommunales Finanzmanagement mit SAP for Public Sector": Grundlagen, Entwicklung, Realisation (German Edition). – М.: , 2012. – 84 с. Changmin Chun. Cross-border Transactions of Intermediated Securities: A Comparative Analysis in Substantive Law and Private International Law. – М.: , 2012. – 524 с. The SAP Architectural Community. SAP Guidelines for Best-Built Applications that Integrate with SAP Business Suite: 2012Spring. – М.: , 2012. – 226 с. Paul Osterman. Securing Prosperity: The American Labor Market: How It Has Changed and What to Do About It. – М.: , 0. – 0 с. Jianmin Zhao, Bruce J. Dickson, Chien-Min Zhao. Remaking the Chinese State: Strategies, Society, and Security (Asia's Transformations). – М.: , 0. – 0 с. Lenore G. Martin. New Frontiers in Middle East Security. – М.: , 0. – 0 с. Martin S. Feldstein, Horst Siebert. Social Security Pension Reform in Europe. – М.: , 0. – 0 с. Rattan Lal, David Hansen, Norman Uphoff, Steven Slack, Rattan Lal. Food Security and Environmental Quality in the Developing World. – М.: , 0. – 0 с. Frank J. Fabozzi, Frank J. Fabozzi. Investing In Commercial Mortgage-Backed Securities. – М.: , 0. – 0 с. Henry J. Bailey, Richard B. Hagedorn. Secured Transactions in a Nutshell Nutshell Series) (4th ed). – М.: , 0. – 0 с. Douglas Hearth, Janis K. Zaima, Janis Zaima. Contemporary Investments: Security and Portfolio Analysis. – М.: , 0. – 0 с. Dean Baker, Mark Weisbrot. Social Security: The Phony Crisis. – М.: , 0. – 0 с. Andrew W. Lo. The Industrial Organization and Regulation of the Securities Industry (National Bureau of Economic Research Conference Report). – М.: , 0. – 0 с. Sylvester J. Schieber, John B. Shoven. The Real Deal: The History and Future of Social Security. – М.: , 0. – 0 с. Henry J. Aaron, John B. Shoven, Benjamin M. Friedman, Alvin Hansen Symposium on Public Policy 1998 Harvard University). Should the United States Privatize Social Security? (Alvin Hansen Symposium Series on Public Policy). – М.: , 0. – 0 с. John B. Shoven. Administrative Aspects of Investment-Based Social Security Reform (Conference Report (National Bureau of Economic Research).). – М.: , 0. – 0 с. Risk Management, Speculation, and Derivative Securities. – М.: , 0. – 0 с. Allen W., Ph.D. Smith. The Alleged Budget Surplus, Social Security, and Voodoo Economics. – М.: , 0. – 0 с. Declan Hayes. Japan's Big Bang: The Deregulation and Revitalizatiion of the Japanese Economy. – М.: , 0. – 0 с. Pam Lassiter. The New Job Security. – М.: , 0. – 0 с. David S. Katz, Ilan Caspi, David S. Katz, Ilan Caspi. Executive's Guide to Personal Security. – М.: , 0. – 0 с. Paul Voillis, Paul Viollis. Jane's Workplace Security Handbook. – М.: , 0. – 0 с. Gerald Kovacich. The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition. – М.: , 0. – 0 с. Neil FitzGerald, Ryan Marples, Naisan Geula, Bob Coates, James Edkins, Michael Voloshko. Special Edition Using Crystal Reports 10 (Special Edition Using). – М.: Que Certification, 2004. – 888 с. Safety and the Security Professional : A Guide to Occupational Safety and Health Strategies. – М.: , 0. – 0 с. F. Robert Jacobs, David Clay Whybark, F. Robert Jacobs, D. Clay Whybark. Why ERP? A Primer on SAP Implementation. – М.: , 0. – 0 с. Asset Protection and Security Management Handbook. – М.: , 0. – 0 с. Alexis Gutzman. Unforeseen Circumstances : Strategies and Technologies for Protecting Your Business and Your People in a Less Secure World. – М.: , 0. – 0 с. Safe Schools: A Security and Loss Prevention Plan. – М.: , 0. – 0 с. Dennis Dalton. Rethinking Corporate Security in the Post 9-11 Era. – М.: , 2003. – 0 с. Security Operations Management. – М.: , 0. – 0 с. Robert M. Ball, Thomas N. Bethell. Insuring the Essentials: Bob Ball on Social Security. – М.: , 0. – 0 с. Werner Draguhn, Robert Ash. China's Economic Security. – М.: , 0. – 0 с. Julia Lowell, C. R. Neu, Daochi Tong, National Defense Research Institute, National Security Research Institute. Financial Crises and Contagion in Emerging Market Countries. – М.: , 0. – 0 с. Marko Nordquist. Towards Improved Security Management Practice: Designing an Organizational Model Procedure for the Implementation of Information Security Management in Heterogeneous Information Management. – М.: , 0. – 0 с. Computer Security. – М.: , 0. – 0 с. Gerhard Knolmayer, Peter Mertens, Alexander Zeier. Supply Chain Management Based on SAP Systems. – М.: , 0. – 0 с. Risk Analysis and the Security Survey. – М.: , 0. – 0 с. Joseph S. Nye, William A. Owens, James R. Schlesinger, R. James Woolsey, James A. Lewis, Joseph S., Jr. Nye, James Andrew Lewis, Erin Schlather, Csis Commission on Technology Security in the Twenty-First Century. Computer Exports and National Security: New Tools for a New Century : A Report of the Csis Commission on Technology Security in the 21St-Century (Csis Panel Reports.). – М.: , 0. – 0 с. Geoff Craighead. High-Rise Security and Fire Life Safety, Second Edition. – М.: , 0. – 0 с. Ellen Hoffman. Bankroll your Future: How to Get the Most from Uncle Sam for Your Retirement Years--Social Security, Medicare, and Much More. – М.: , 0. – 0 с. Mary Clifford. Identifying and Exploring Security Essentials. – М.: , 0. – 0 с. C. Warren Axelrod, Axelrod. Outsourcing Information Security. – М.: , 0. – 0 с. Jesus Mena. Homeland Security Techniques and Technologies (Networking Series). – М.: , 0. – 0 с. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с. Danielle Larocca Signorile. SAP Query Reporting. – М.: Sams, 2006. – 336 с. Jim Stewart. SAP Security: SAP Security Essentials. – М.: Equity Press, 2005. – 136 с. Jeremy Bolland. Writing Securities Research: A Best Practice Guide. – М.: , 2007. – 120 с. Sean, Ph.D., CFA Cleary. Canadian Securities Exam: Fast-Track Study Guide. – М.: , 2007. – 352 с. Committee on Federal Regulation of Securities Committee. The Fund Director's Guidebook: Third Edition (Fund Director's Guidebook). – М.: , 2006. – 128 с. Michael Gentile, Ron Collette, Tom August. The Ciso Handbook: A Practical Guide to Securing Your Company. – М.: , 2005. – 352 с. Leonard J. Santow, Mark E. Santow. Social Security and the Middle-Class Squeeze: Fact and Fiction about America's Entitlement Programs. – М.: , 2005. – 232 с. Sustainable Metals Management : Securing Our Future - Steps Towards a Closed Loop Economy (Eco-Efficiency in Industry and Science) (Eco-Efficiency in Industry and Science). – М.: , 2006. – 607 с. John J. Fay. Encyclopedia of Security Management. – М.: Butterworth-Heinemann, 2007. – 688 с. George W. Anderson, Tim Rhodes, Jeff Davis, John Dobbins, Andreas Jenzer. Sams Teach Yourself SAP in 24 Hours. – М.: Sams, 2008. – 480 с. Marco ten Vaanholt, SAP Business Process Expert community. Process First: The evolution of the Business Process Expert. – М.: , 2008. – 144 с. Meridian Securities Market. World Stock Exchange Fact Book. – М.: , 2008. – 0 с. Faycal Haggui. EU Opposition to Genitically Modified Wheat: Its Impact on Global Food Security. – М.: , 2008. – 124 с. CompTIA Security+: Certification Kit (комплект из 3 книг + 2 CD-ROM). – М.: Sybex, 2009. – 1440 с. W. Krag Brotby. Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement. – М.: Auerbach Publications, 2009. – 200 с. Robert C. Seacord. The CERT C Secure Coding Standard. – М.: Addison-Wesley Professional, 2008. – 720 с. The SAP Architectural Community. SAP® Guidelines for Best-Built Applications, Spring 2010. – М.: , 2010. – 132 с. Sandy Maisel. Practical Guide to IDoc Development for SAP. – М.: SAP Press, 2010. – 254 с. T. Bradley. Essential Computer Security: Everyone's Guide to Email, Internet, andWireless Security. – М.: , 2010. – 0 с. Joey Hirao, Mimi Choi, Perry Cox, Steven Passer, Jeanmarie Hirao. SAP Security Configuration and Deployment. – М.: Syngress, 2009. – 392 с. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с. Chris Shiflett. Essential PHP Security. – М.: , 2005. – 124 с. Chris Shiflett. Essential PHP Security. – М.: , 1987. – 196 с. Russell Dean Vines. Wireless Security Essentials. – М.: , 2002. – 368 с. Construction Site Security. – М.: , 2006. – 438 с. Principles Of Computer Security, Comptia Security+ And Beyond, Second Edition. – М.: , 2011. – 0 с. Rabi Jay. Sap® Netweaver Portal Technology: The Complete Reference. – М.: McGraw-Hill, 2008. – 736 с. Comptia Security+ All-In-One Exam Guide, Second Edition (Exam Sy0-201). – М.: , 2011. – 0 с. Applied Sap Bi 7.0 Web Reports: Using Bex Web Analyzer And Web Application Designer. – М.: , 2011. – 512 с. Sap R/3 Handbook, Third Edition. – М.: , 2011. – 606 с. CWNA: Certified Wireless Network Administrator & CWSP Certified Wireless Security Professional All-in-One Exam Guide. – М.: , 2011. – 0 с. I. Bayo Oloyede. Freedom of Expression and National Security in Nigeria. – М.: LAP Lambert Academic Publishing, 2012. – 88 с. Alaa K. Farhan. Security Protocol for Mobile Data. – М.: LAP Lambert Academic Publishing, 2013. – 116 с. Morteza Rafiei. Food Security Measurement Guide. – М.: LAP Lambert Academic Publishing, 2014. – 108 с. Shailendra Bajpai and J. P. Gupta. Site Security. – М.: LAP Lambert Academic Publishing, 2011. – 88 с. Juan M. Pons. Small States, Hegemony and the Security Dilemma. – М.: Scholars' Press, 2014. – 160 с. Scott Nicholas Romaniuk. New Polar Horizons: Conflict and Security in the Arctic. – М.: LAP Lambert Academic Publishing, 2011. – 160 с. Scott Nicholas Romaniuk. Competing Powers: Security in the Wider Black Sea Region. – М.: LAP Lambert Academic Publishing, 2011. – 408 с. Ekaterina Anyanova. The regime of maritime security in international, EU and national law. – М.: LAP Lambert Academic Publishing, 2014. – 324 с. Monica Opoku,Paul Ingenbleek and Kerstin Hell. Novel root & tuber crops and food security in West Africa. – М.: LAP Lambert Academic Publishing, 2012. – 192 с. Patty A. Fairweather. State Supreme Court Chief Justices'' Views: Liberty/Security and The GWOT. – М.: LAP Lambert Academic Publishing, 2010. – 116 с. Prosscovia Nambatya. An Analysis of the Mandate of the UN Security Council in Libya. – М.: LAP Lambert Academic Publishing, 2014. – 76 с. Nateq Be-Nazir Ibn Minar. Bluetooth Networking and its Security Architecture. – М.: LAP Lambert Academic Publishing, 2012. – 84 с. Mohammed azharuddin Adhoni. Secure communication in p2p networks. – М.: LAP Lambert Academic Publishing, 2012. – 124 с. Ankit Panch. Enterprise Secure Wireless Authentication (ESWA). – М.: LAP Lambert Academic Publishing, 2013. – 72 с. Shilpa Jaiswal. Elimination of Security Threats Using Trusted Proactive Routing. – М.: LAP Lambert Academic Publishing, 2014. – 56 с. Britto R. Kumar and Albert S. Rabara. An Architecture for Secure Mobile Payment System using PKI. – М.: LAP Lambert Academic Publishing, 2013. – 184 с. E. Madhusudhana Reddy. Development of Secure Protocols for MHIS Using RMPJK–RSA Cryptosystem. – М.: LAP Lambert Academic Publishing, 2011. – 204 с. Yasser Alshehri. Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 156 с. Muhammad Qaiser Saleem,Jafreezal Jaafar and Mohd Fadzil Hassan. Modeling Security Objectives along BPM of SOA Applications. – М.: LAP Lambert Academic Publishing, 2013. – 236 с. Eric Amankwa. Assessment of Security Controls. – М.: LAP Lambert Academic Publishing, 2012. – 104 с. Anvar Akhmedjanov. Security in SAP NetWeaver 7.0 Application Server ABAP. – М.: LAP Lambert Academic Publishing, 2011. – 128 с. Rajat Jyoti Sarkar and Kalyanbrata Bhattacharyya. Performance of Public Distribution System as a Food Security Measure. – М.: LAP Lambert Academic Publishing, 2012. – 148 с. Robell Damtie and Fentay Misganaw. The Role of Women Household Heads on Food Security. – М.: LAP Lambert Academic Publishing, 2012. – 124 с. Nedim Makarevic. Influence of IT Security on banks' competitiveness. – М.: LAP Lambert Academic Publishing, 2014. – 144 с. Лучшие результаты Ничего не найдено Дополнительные результаты Люди приходят в компанию, а уходят от руководителя. интервью с Л. Хейманом, специальным представителем правления SAP. Р. Крецул, "Кадровый менеджмент", № 8, ноябрь 2005. Директор по персоналу должен себя мотивировать. интервью с С. Шпиндлер, директором по персоналу Европейского подразделения SAP. "Управление персоналом", № 20, октябрь 2005. Возможности решений SAP для перевода предприятий России на МСФО. О. Ковалева, Ю. Соломатина, "Финансовая газета", № 14, 15, апрель 2005. Решения SAP для перехода российских предприятий на МСФО. О. Ковалева, "Финансовая газета", № 33, август 2004. Программные продукты SAP для автоматизации налогового учета. Ф. Лебедев, К. Никитин, Д. Сурченко, С. Сараев, "Финансовая газета", N 33, август 2010 г. Решения SAP: планирование, управление и контроль за капиталоемкими проектами. П. Сорокин, "Финансовая газета", № 42, октябрь 2009. Подход SAP к реализации концепции сервисно-ориентированной архитектуры. К. Жуков, Ю. Кудрявцева, "Финансовая газета", № 2, январь 2009. Не все компании хотят снизить затраты на процесс управления персоналом. интервью с А. Кузнецовым, руководителем отдела развития бизнеса и сервиса в области управления персоналом SAP СНГ. "Управление персоналом", № 18, сентябрь 2008. Единство финансового учета и управления банком в решениях SAP. О.В. Глущенко, А.В. Волков, "МСФО и МСА в кредитной организации", № 3, июль-сентябрь 2008. Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Станислав Спасибо за столь доброе отношение к нам простым смертным :-), горе-студентам или, еще можно сказать- вечным студентам, которые не помнят, когда начали это свое "высшее", но уже до зеленой тоски опостылевшее, образование.