Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Muhammad Imran Tariq. SLA based Information Security Metrics in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2014. – 192 с. Дополнительные результаты Cloud Computing and Services Science (Service Science: Research and Innovations in the Service Economy). – М.: , 2012. – 405 с. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с. Markov Networks in Evolutionary Computation (Adaptation, Learning, and Optimization). – М.: , 2012. – 264 с. Abdullah Abdul-Gader, Abdullah H. Al-Abdul-Gader. Managing Computer Based Information Systems in Developing Countries: A Cultural Perspective. – М.: , 0. – 0 с. Handbook of Management Information Systems. – М.: , 0. – 0 с. Mark B. Desman. Building an Information Security Awareness Program. – М.: , 0. – 0 с. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с. Marko Nordquist. Towards Improved Security Management Practice: Designing an Organizational Model Procedure for the Implementation of Information Security Management in Heterogeneous Information Management. – М.: , 0. – 0 с. Information Resources Management Association. International Conference, Mehdi Khosrowpour. Managing Information Technology Resources in Organizations in the Next Millennium: 1999 Information Resources Management Association International Conference, Hershey, Pa, Usa, May 16-19, 1999. – М.: , 0. – 0 с. Steve Purser. A Practical Guide to Managing Information Security (Artech House Technology Management Library). – М.: , 0. – 0 с. Alan Gershenfeld, Mark Loparco, Cecilia Barajas. Game Plan: The Insider's Guide to Breaking In and Succeeding in the Computer and Video Game Business. – М.: , 0. – 0 с. Marian Quigley, Marian Quiqley. Information Security and Ethics: Social and Organizational Issues. – М.: , 0. – 0 с. C. Warren Axelrod, Axelrod. Outsourcing Information Security. – М.: , 0. – 0 с. Harold F. Tipton, Micki Krause, Micki, Cissp Krause. Information Security Management Handbook, Fifth Edition. – М.: , 0. – 0 с. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с. Barbara C. McNurlin. Information Systems Management in Practice (7th Edition). – М.: , 2005. – 0 с. Economics of Information Security (Advances in Information Security). – М.: , 2004. – 0 с. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с. Ira Winkler. Zen and the Art of Information Security. – М.: , 2007. – 192 с. Timothy P. Layton. Information Security. – М.: , 2006. – 222 с. Stuart Robbins. Lessons in Grid Computing: The System Is a Mirror. – М.: , 2006. – 384 с. Mahesh S. Raisinghani. Handbook of Research on Global Information Technology Management in the Digital Economy. – М.: Information Science Reference, 2008. – 588 с. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с. Social and Human Elements of Information Security: Emerging Trends and Countermeasures (Premier Reference Source). – М.: , 2008. – 412 с. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с. Gerard Blokdijk, Ivanka Menken. Information Security Management Best Practice Workbook: Implementation and Management Roadmap for Threats, Challenges and Solutions - Ready to use supporting documents bringing Theory into Practice. – М.: , 2008. – 124 с. W. Krag Brotby. Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement. – М.: Auerbach Publications, 2009. – 200 с. Alan Calder. Information Security based on ISO 27001/ISO 27002: A Management Guide. – М.: , 2009. – 83 с. John Rittinghouse, James Ransome. Cloud Computing: Implementation, Management, and Security. – М.: CRC Press, 2009. – 340 с. Bel G. Raggad. Information Security Management: Concepts and Practice. – М.: , 2010. – 871 с. Michael E. Whitman, Herbert J. Mattord. Management of Information Security. – М.: , 2010. – 592 с. Alan Calder, Steve G Watkins. Information Security Risk Management for ISO27001 / ISO27002. – М.: , 2010. – 198 с. William Manning. CISM Certified Information Security Manager Certification Exam Preparation Course in a Book for Passing the CISM Exam - The How To Pass on Your First Try Certification Study Guide. – М.: , 2010. – 188 с. Peter Gardenfors, C. J. van Rijsbergen. Belief Revision (Cambridge Tracts in Theoretical Computer Science). – М.: , 0. – 0 с. Editors Karl Maria Michael de Leeuw, Jan Bergstra. The History of Information Security: A Comprehensive Handbook. – М.: Elsevier Science, 2007. – 900 с. Global Perspectives In Information Security. – М.: , 2008. – 896 с. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с. John R. Vacca. Computer and Information Security Handbook. – М.: , 2010. – 928 с. Cloud Computing, A Practical Approach. – М.: , 2011. – 352 с. Secure Metrics: A Beginners Guide. – М.: , 2011. – 400 с. Management Strategies For The Cloud Revolution: How Cloud Computing Is Transforming Business And Why You Can'T Afford To Be Left Behind. – М.: , 2011. – 272 с. It Security Metrics: A Practical Framework For Measuring Security & Protecting Data. – М.: , 2011. – 396 с. Harold F. Tipton, Micki Krause. Information Security Management Handbook on CD-ROM, 2003 Edition. – М.: , . – с. Eduardo Fernandez-Buglioni. Security Patterns in Practice: Designing Secure Architectures Using Software Patterns. – М.: Wiley, 2013. – 582 с. Vaishali Wadhe and Vinayak Bharadi. Cloud Computing. – М.: Scholars Press, 2014. – 252 с. Vivek Bhushan. Securing Published Data In Cloud Using Data Incognito. – М.: LAP Lambert Academic Publishing, 2013. – 76 с. A.M. Mansuri and Pradeep Laxkar. Cloud Computing: The future of technology. – М.: LAP Lambert Academic Publishing, 2014. – 60 с. Ayad Barsoum. Data Integrity in Cloud Computing Systems. – М.: LAP Lambert Academic Publishing, 2013. – 212 с. Rohana Mohamad Rashid. Determining Influencing Factors of Information Security Culture. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Anand Kannan. Evaluation of the Security Mechanisms in Cloud Networks. – М.: LAP Lambert Academic Publishing, 2013. – 192 с. T. Ambikadevi Amma. Inhibitors of Cloud Computing. – М.: LAP Lambert Academic Publishing, 2013. – 72 с. Ashok K. Saini. Information & Communication Technology in ELT. – М.: LAP Lambert Academic Publishing, 2012. – 428 с. Jude Kagoro. The Urban (In)Security Paradox in Uganda. – М.: LAP Lambert Academic Publishing, 2012. – 124 с. Mabel Nunoofio. Social Security Arrangements Among Informal Sector Operatives In Accra. – М.: LAP Lambert Academic Publishing, 2014. – 148 с. Adamu Usman. Cost-Benefit Analysis of Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Vishal Mali. Information Retrieval System in Human Genetics. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Giuseppe Sergioli. Irreversibility and Universality in Quantum Computation. – М.: LAP Lambert Academic Publishing, 2012. – 84 с. Shiv Kumar Gupta. Algorithmic Based Fault Tolerance In Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 52 с. Srivaramangai Padmanabhan. Reliable Infrastructure for Cloud Computing. – М.: LAP Lambert Academic Publishing, 2013. – 100 с. Syed Tauhid Zuhori. Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 56 с. Haitham Solh. Conceptual Teaching Strategies in a Computer-Based Math Curriculum. – М.: LAP Lambert Academic Publishing, 2010. – 192 с. Munyabarenzi Faustin. The incidence of security interest in movable property. – М.: LAP Lambert Academic Publishing, 2013. – 84 с. V. Karamchand Gandhi. Cloud Computing For E-Governance Of India. – М.: LAP Lambert Academic Publishing, 2013. – 80 с. Faraz Fatemi Moghaddam. Secure Cloud Computing with Client-Based Control System. – М.: LAP Lambert Academic Publishing, 2013. – 100 с. Rupa Ch. and Avadhani P. S. Modern Security Methods in Applied Computer Science. – М.: Scholars' Press, 2014. – 124 с. Variza Negi. The Power of Cloud Computing. – М.: LAP Lambert Academic Publishing, 2014. – 64 с. Heena Mittal and Gurpreet Singh. Security of Mobile Agents in Distributed Computing. – М.: LAP Lambert Academic Publishing, 2014. – 80 с. Aldo Wijanarko and Raymond Kosala. A Study of Cloud Computing as a Game Platform. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Yi Ren. Security Mechanisms in Unattended Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2013. – 164 с. Alireza Nafarieh. SLA based architectures in priority aware shared mesh optical networks. – М.: LAP Lambert Academic Publishing, 2013. – 192 с. Ashkan Gholamhosseinian and Ahmad Khalifeh. Cloud Computing and Sustainability: Energy Efficiency Aspects. – М.: LAP Lambert Academic Publishing, 2012. – 144 с. Puneet Kumar. Cloud Computing. – М.: LAP Lambert Academic Publishing, 2013. – 60 с. Kamal Kant Hiran and Ruchi Doshi. The Proliferation of Smart Devices on Mobile Cloud Computing. – М.: LAP Lambert Academic Publishing, 2014. – 84 с. Volkan ERTURK,Dr. Ali ARIFOGLU and Dr. Attila OZGIT. A Framework Based On Continuous Security Monitoring. – М.: LAP Lambert Academic Publishing, 2010. – 148 с. Emre Sezgin and Sevgi Ozkan. ASSESSMENT OF INFORMATION TECHNOLOGY USE IN ORGANIZATIONS. – М.: LAP Lambert Academic Publishing, 2011. – 144 с. Hossein Pour Taheri and Ab Razak Che Hussin. Cloud Base E-Commerce Trust Model. – М.: LAP Lambert Academic Publishing, 2012. – 120 с. Lamek Ronoh. Security Concern of Cloud Computing Models. – М.: LAP Lambert Academic Publishing, 2014. – 88 с. Nadire Cavus and Mustafa Asaad Alani. Cloud computing and its adaptation. – М.: LAP Lambert Academic Publishing, 2014. – 80 с. Yedji Mbangsoua and Dr. Freddie Acosta. Information Security and its Investment Justification. – М.: LAP Lambert Academic Publishing, 2011. – 132 с. Kefa Rabah. Ubuntu Server Administration and Cloud Computing. – М.: LAP Lambert Academic Publishing, 2011. – 320 с. Pavan Kumar Bollineni and Kumar Neupane. Implications for adopting cloud computing in e-Health. – М.: LAP Lambert Academic Publishing, 2011. – 88 с. Gunasekar Kumar and Anirudh Chelikani. Analysis of Security Issues in Cloud Based E-Learning. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Hamzeh Khazaei. Performance and Availability Analysis of Cloud Computing Centers. – М.: Scholars' Press, 2013. – 224 с. Raed Alsaqour and Yap Earn. Searchable Symmetric Encryption. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Yasser Alshehri. Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 156 с. Julien Shabani. Information Security for RFID Systems. – М.: LAP Lambert Academic Publishing, 2011. – 92 с. Debasish Jena. On Protocols for Information Security Services. – М.: LAP Lambert Academic Publishing, 2011. – 136 с. Saad Ahmed Khan and Saif Ahmad. Security Implications of Cloud computing. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Qusay Ishaq. A framework based on the Cloud Computing Technology. – М.: LAP Lambert Academic Publishing, 2012. – 144 с. Manish Dhote. Introduction to Cloud Computing Performance Testing. – М.: LAP Lambert Academic Publishing, 2012. – 56 с. Ganesh Chandra Deka. Prospects of Cloud Computing in Education and e-Governance. – М.: LAP Lambert Academic Publishing, 2012. – 160 с. Ameen Chilwan. Dependability Differentiation in Cloud Services. – М.: LAP Lambert Academic Publishing, 2012. – 172 с. Sadia Marium. Analysis of the Security threats to Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 64 с. Ganesh Chandra Deka. Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 140 с. Gul Tokdemir. AN ASSESSMENT MODEL FOR WEB-BASED INFORMATION SYSTEM EFFECTIVENESS. – М.: LAP Lambert Academic Publishing, 2010. – 120 с. Furhan Mehmood and Rajia Rafique. Information Security in Financial Organizations. – М.: LAP Lambert Academic Publishing, 2010. – 68 с. Igor Botian. Software Security Vulnerabilities in Mobile Peer-to-peer Environment. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Pallavali Radha Krishna Reddy and Gullapalli Sireesha. The Security Issues of Cloud Computing Over Normal & ITSector. – М.: LAP Lambert Academic Publishing, 2012. – 96 с. Madarapu Naresh Kumar,Pothula Sujatha and P. Dharanyadevi. Mitigating EDoS in Cloud Computing using In-Cloud Scrubber Service. – М.: LAP Lambert Academic Publishing, 2012. – 88 с. Omar Zakaria. Information Security Culture. – М.: LAP Lambert Academic Publishing, 2013. – 248 с. Hassen Alsafi and Mohammed Azhruddin. The Security Issues for Smart Grids Applications on Cloud Computing. – М.: LAP Lambert Academic Publishing, 2013. – 60 с. Shahla Asadi and Elaheh Yadegaridehkordi. Customers perspectives on cloud computing adoption by Banking sector. – М.: LAP Lambert Academic Publishing, 2015. – 128 с. frankie tvrz and marijke coetzee. Information Security of a Bluetooth-enabled handheld device. – М.: LAP Lambert Academic Publishing, 2010. – 180 с. Chaudhry Muhammad Nadeem Faisal. Issues in Cloud computing. – М.: LAP Lambert Academic Publishing, 2011. – 80 с. Ahmed AlNunu. How Much Information Security?. – М.: LAP Lambert Academic Publishing, 2010. – 68 с. Shivan Fazil Sabr. Cloud Computing Security. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Harish Vepuri. Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. venkata bhaskar reddy mandala and sharat chandra marepalli. Cloud Computing Organizational Benfits. – М.: LAP Lambert Academic Publishing, 2012. – 96 с. Jeffy Mwakalinga. A Framework for Adaptive Information Security Systems. – М.: LAP Lambert Academic Publishing, 2011. – 364 с. Meysam Namayandeh. Development of Computer Ethical Framework for Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 132 с. Harjot Dhawan. A Road to Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Arvind Meniya and H. B. Jethva. Next Generation Mobile Application in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 72 с. Rafal AL-Khashab. An Authentication Model for Cloud Computing Application. – М.: LAP Lambert Academic Publishing, 2014. – 104 с. M. Reza Rahimi. QoS-Aware Middleware for Service Allocation in Mobile Cloud Computing. – М.: LAP Lambert Academic Publishing, 2014. – 124 с. Yi Xu and Jun Yan. A cloud-based information integration platform for smart cars. – М.: LAP Lambert Academic Publishing, 2014. – 124 с. Ali Dehghantanha. Privacy in Pervasive Computing Systems. – М.: LAP Lambert Academic Publishing, 2010. – 136 с. Faith J Shimba. Cloud Computing. – М.: LAP Lambert Academic Publishing, 2010. – 136 с. Muhammad Imran Tariq. SLA based Information Security Metrics in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2014. – 192 с. Bugra Karabey. Teorem. – М.: LAP Lambert Academic Publishing, 2012. – 116 с. Paul Denys. Security of Personal Information in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 144 с. Taqwa Hariguna. Prototype cloud computing for e-government. – М.: LAP Lambert Academic Publishing, 2012. – 88 с. alok kumar and Bibhudatta Sahoo. Placement of SaaS Components in Cloud Computing Environment. – М.: LAP Lambert Academic Publishing, 2014. – 68 с. PRASANNA POKHREL and Siva Praneeth Babu Vemulapalli. Web Based Information System (WBIS). – М.: LAP Lambert Academic Publishing, 2010. – 80 с. Vinicius Vielmo Cogo. Diversity in automatic cloud computing resource selection. – М.: LAP Lambert Academic Publishing, 2013. – 68 с. Li Jian. Large scale data processing in Hadoop MapReduce scenario. – М.: LAP Lambert Academic Publishing, 2012. – 68 с. Khandakar Entenam Unayes Ahmed. IDENTITY AND ACCESS MANAGEMENT IN CLOUD COMPUTING. – М.: LAP Lambert Academic Publishing, 2011. – 172 с. S. Balamurugan,M. Sowmiya and S. Charanyaa. Principles of Scheduling in Cloud Computing. – М.: Scholars' Press, 2014. – 148 с. Ani Brown Mary. Profit Maximization in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2013. – 84 с. Bindu Sharma and Sangita Gupta. Information Seeking Behavior In Internet Era. – М.: LAP Lambert Academic Publishing, 2014. – 240 с. Dilip Kumar and Bibhudatta Sahoo. Energy Efficient Resource Allocation in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2014. – 92 с. Amir Haghbin Shomali,Kamarulzaman Bin Ab Aziz and Mehdi Mohammadi Poorangi. Success Factors for the Establishment of a Cloud Computing Sector. – М.: LAP Lambert Academic Publishing, 2012. – 192 с. Alaa Al-Deen Mohammed Hassan. Information Security Management. – М.: LAP Lambert Academic Publishing, 2013. – 188 с. Ahmed Mansour and Yousif Ashour. The Adoption of Cloud Computing Technology: Concerns and Challenges. – М.: LAP Lambert Academic Publishing, 2013. – 176 с. Ying Qian. Mitigating Information Security Risks during Operation Transition. – М.: LAP Lambert Academic Publishing, 2012. – 372 с. Лучшие результаты Ничего не найдено Дополнительные результаты Наука человековедения. интервью с Д. Уолтоном, профессором London Metropolitan University, экспертом CIPD. Chartered Institute of Personnel and Development, автором программы Master of Arts in Human Resource Strategies. И. Смирнова, "Кадровый менеджмент", № 5, июль-август 2007. Учет и калькулирование затрат по функциям. Метод АВС. Activity-Based Costing. М.К. Ерижев, "Новое в бухгалтерском учете и отчетности", № 19, октябрь 2003. Обеспечение безопасности PIN-Based операций с банковскими картами. С.В. Серебряков, "Расчеты и операционная работа в коммерческом банке", N 2, март-апрель 2012 г. О качестве сервиса, связанного с запросами на медицинскую информацию. Medical Information Service?. А. Беденков, "Ремедиум", № 1, январь 2012. Risk-based pricing: посткризисные тенденции. А.В. Гидулян, "Банковское кредитование", N 1, январь-февраль 2012 г. Trade-in как способ обмена автомобиля. С.Н. Гордеева, "Торговля: бухгалтерский учет и налогообложение", N 2, февраль 2011 г. Проблемы применения универсальной юрисдикции in absentia. Г.А. Королев, "Журнал российского права", № 10, октябрь 2009. Тонкости trade-in. С.А.Королев, "НДС. Проблемы и решения", № 8, август 2009. In-store banking - новая модель банковского бизнеса. А. Пятков, "Банковское обозрение", № 11, ноябрь 2008. Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Александра Спасибо, что Вы со мной сегодня так мучились, но все-таки все объяснили. Желаем удачи!!!