Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Satyendra Singh Thakur and Dr. Manish Manoria. Secure Cryptosystem for Biometric Information using RSA. – М.: LAP Lambert Academic Publishing, 2011. – 92 с. Дополнительные результаты Security and Privacy in Mobile Information and Communication Systems: Third International ICST Conference, MOBISEC 2011, Aalborg, Denmark, May 17-19, ... and Telecommunications Engineering). – М.: , 2012. – 195 с. Van Haren Publishing. BiSL: A Framework for Business Information Management 2nd Edition. – М.: , 2012. – 0 с. Gerald Kovacich. The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition. – М.: , 0. – 0 с. John A. Carey, Jim Business Letters for Busy People Dugger, National Press Publications. Business Letters for Busy People. – М.: , 0. – 0 с. Carol Andrus. Fat-Free Writing: Business Writing for the Information Age (Crisp Fifty-Minute Book). – М.: , 0. – 0 с. Bruce Ross-Larson. Writing for the Information Age. – М.: , 0. – 0 с. Donald A. Marchand, Don Marchand. Competing with Information: A Manager's Guide to Creating Business Value with Information Content. – М.: , 0. – 0 с. Information Warfare : corporate attack and defence in a digital world (Computer Weekly Professional (Paperback)). – М.: , 0. – 0 с. John C. Braddock. Derivatives Demystified : Using Structured Financial Products (Wiley Series in Financial Engineering). – М.: , 1997. – 306 с. Nikolai Dokuchaev. Dynamic Portfolio Strategies: Quantitative Methods and Empirical Rules for Incomplete Information (International Series in Operations Research and Management Science, Volume 47). – М.: , 0. – 0 с. Gerald L. Kovacich, Edward P. Halibozek. The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, First Edition. – М.: , 0. – 0 с. Marko Nordquist. Towards Improved Security Management Practice: Designing an Organizational Model Procedure for the Implementation of Information Security Management in Heterogeneous Information Management. – М.: , 0. – 0 с. Mary Pat McCarthy, Stuart Campbell. Security Transformation: Digital Defense Strategies to Protect your Company's Reputation and Market Share. – М.: , 0. – 0 с. Robert Stegwee, Ton Spil. Strategies for Healthcare Information Systems. – М.: , 0. – 0 с. Donn B. Parker. Fighting Computer Crime : A New Framework for Protecting Information. – М.: , 0. – 0 с. Bernard H. Boar. Practical Steps for Aligning Information Technology with Business Strategies: How to Achieve a Competitive Advantage. – М.: , 0. – 0 с. Peter Varhol. Implementing a World Wide Web Site for Your Organization. – М.: , 0. – 0 с. Roger Evernden. Information First : Integrating Knowledge and Information Architecture for Business Advantage. – М.: , 2003. – 0 с. Thomas C. Glaessner. Electronic Safety and Soundness: Securing Finance in a New Age (World Bank Working Papers). – М.: , 2004. – 0 с. Arlita W. Hallam. Managing Budgets and Finances: A How-to-Do-It Manual for Librarians and Information Professionals (How to Do It Manuals for Librarians, No. 138) (How to Do It Manuals for Librarians). – М.: , 2005. – 0 с. Jeffrey M. Cohen. Put Options : How to Use This Powerful Financial Tool for Profit & Protection. – М.: , 2003. – 0 с. Charles Fleetham. The Search For Unrational Leadership: Using Rational And Irrational Methods To Change Your Life. – М.: , 2005. – 0 с. Carol E. Osborn. Statistical Applications for Health Information Management. – М.: , 2005. – 0 с. Robert A. Schultz. Contemporary Issues in Ethics and Information Technology. – М.: , 2005. – 0 с. Rickland Hollar. Enterprise Web Services Security (Internet Series). – М.: , 2005. – 432 с. Kevin Ruse. XML for Web Designers Using Macromedia Studio MX 2004 (Internet Series). – М.: , 2004. – 448 с. Jim Davis, Gloria J. Miller, Allan Russell. Information Revolution : Using the Information Evolution Model to Grow Your Business. – М.: , 2006. – 224 с. Jeffrey M. Stanton, Kathryn R. Stam. The Visible Employee: Using Workplace Monitoring and Surveillance to Protect Information Assets-Without Compromising Employee Privacy or Trust. – М.: , 2006. – 272 с. Stephen J. Andriole. Technology Due Diligence: Best Practices for Chief Information Officers, Venture Capitalists, and Technology Vendors. – М.: , 2008. – 422 с. Dr. Florian Wieneke. Acceptance Analysis of New Technology for Sustainable WATSAN Management: A Case Study of Operating Farm Households in the Mekong Delta, Viet Nam. – М.: , 2008. – 252 с. CompTIA Security+: Certification Kit (комплект из 3 книг + 2 CD-ROM). – М.: Sybex, 2009. – 1440 с. Hamid R. Nemati. Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues (Advances in Information Security and Privacy). – М.: , 2009. – 414 с. Alan Calder. Information Security based on ISO 27001/ISO 27002: A Management Guide. – М.: , 2009. – 83 с. Bel G. Raggad. Information Security Management: Concepts and Practice. – М.: , 2010. – 871 с. Alan Calder, Steve G Watkins. Information Security Risk Management for ISO27001 / ISO27002. – М.: , 2010. – 198 с. Kathryn Critchley. Coaching Skills Training Course: Business and Life Coaching Techniques for Improving Performance Using NLP and Goal Setting: Your Toolkit to Coaching... Free Downloadable Templates, Ready to Use. – М.: Universe of Learning Ltd., 2010. – 204 с. S.Y. Kung, M.W. Mak, S.H. Lin. Biometric Authentication: A Machine Learning Approach (Prentice Hall Information and System Sciences Series). – М.: , 2010. – 496 с. Donald A. Marchand. Competing with Information. – М.: , 2000. – 352 с. Mamdouh Refaat. Data Preparation for Data Mining Using SAS. – М.: , 2010. – 424 с. Dennis P. Nolan. Safety and Security Review for the Process Industries. – М.: , 2010. – 250 с. Gerald W Brock. Telecommunication Policy for the Information Age – From Monopoly to Competition. – М.: , 1994. – 336 с. Donald Schon. High Technology & Low–Income Communities – Prospects for the Positive Use of Advanced Information Technology. – М.: , 1998. – 424 с. Kaufman. U.S. National Security Strategy for the 1990s. – М.: , 1991. – 0 с. Kaufman. U.S. National Security Strategy for the 1990s. – М.: , 1991. – 0 с. Science for Society: Informing Policy and Practice Through Research in Developmental Psychology. – М.: , 2003. – 100 с. Sead Muftic. Security Architecture for Open Distributed Systems. – М.: , 1993. – 298 с. M SS BERGERUD. Bergerud: ?computers? For ?managing? Information. – М.: , 1987. – 480 с. Microsoft. Security Operations for Microsoft Exchange 2000 Server. – М.: , 2002. – 136 с. The AGI Source Book for Geographic Information Systems 1995. – М.: , 1994. – 392 с. M SS BERGERUD. Bergerud: ?tm? Instructor?s Manual T/a ?computers? For?managing? Information (pr Only). – М.: , 1987. – 106 с. S MUFTIC. Muftic: ?security? Mechanisms For Computer Network S. – М.: , 1989. – 196 с. Amitai Etzioni. Security First – For A Muscular, Moral Foreign Policy. – М.: , 2008. – 336 с. Kostas Terzidis. Algorithms for Visual Design Using the Processing Language. – М.: , 2009. – 384 с. Harold Kerzner. Strategic Planning for Project Management Using a Project Management Maturity Model. – М.: , 2001. – 272 с. Visualizing Information With Microsoft® Office Visio® 2007. – М.: , 2011. – 448 с. Citrix® Access Suite Security For It Administrators. – М.: , 2011. – 268 с. Security Valuation And Risk Analysis: Assessing Value In Investment Decision-Making. – М.: , 2011. – 614 с. Project Management For Healthcare Information Technology. – М.: , 2011. – 288 с. Fundamentals Of Network Security. – М.: , 2011. – 672 с. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . – с. For Your Information NEd 3 SB. – М.: Pearson Education, 2014. – с. Vivek Bhushan. Securing Published Data In Cloud Using Data Incognito. – М.: LAP Lambert Academic Publishing, 2013. – 76 с. Jaydeb Bhaumik and Satyajit Das. Substitution Permutation Network Type Block Cipher. – М.: LAP Lambert Academic Publishing, 2013. – 68 с. Satyendra Singh Thakur and Dr. Manish Manoria. Secure Cryptosystem for Biometric Information using RSA. – М.: LAP Lambert Academic Publishing, 2011. – 92 с. Nitin Kanzariya and Ashish Nimavat. Security of Digital Image Using Hybrid Steganography. – М.: LAP Lambert Academic Publishing, 2013. – 84 с. Jameel Ahmed. Transform-Domain and DSP Based Secure Speech Communication. – М.: LAP Lambert Academic Publishing, 2011. – 252 с. Azam Khan. Algorithm Study & Matlab Model for TIFF CCITT Group4. – М.: LAP Lambert Academic Publishing, 2011. – 80 с. Mohammad A. Dabbah. Secure Biometric Face Recognition. – М.: LAP Lambert Academic Publishing, 2010. – 144 с. Ali Keyvani. Modular Fixture Design for BIW Lines Using Process Simulate. – М.: LAP Lambert Academic Publishing, 2012. – 72 с. Liang Cui. Developing a Virtual Test Environment for Granular Materials Using DEM. – М.: LAP Lambert Academic Publishing, 2010. – 392 с. Raul Carlson. Structure Information Systems for Industrial Environmental Management. – М.: LAP Lambert Academic Publishing, 2010. – 124 с. MOHD HASMADI ISMAIL. ALLOCATING ACCESS ROAD FOR FOREST HARVESTING USING GIS. – М.: LAP Lambert Academic Publishing, 2010. – 84 с. Alaa K. Farhan. Security Protocol for Mobile Data. – М.: LAP Lambert Academic Publishing, 2013. – 116 с. Oliver Mtapuri. Developing a Poverty Index for African Economies using the Consensual Approach:. – М.: LAP Lambert Academic Publishing, 2010. – 224 с. Moira Gundu. An Information Appraoch To Household Food Security. – М.: LAP Lambert Academic Publishing, 2011. – 156 с. Rasak Olajide. Utilisation of EE for Agric Information Dissemination in Nigeria. – М.: LAP Lambert Academic Publishing, 2011. – 164 с. Ashfaq Ahmed Sheikh and Muhammad Ashraf. Use of Low Quality Groundwater for Sustainable Crop Production. – М.: LAP Lambert Academic Publishing, 2010. – 72 с. David Okoedo-Okojie and Vera Kenechi Okeke. Cassava and Yam Farmers' Preference for Agricultural Information Vol. 1. – М.: LAP Lambert Academic Publishing, 2013. – 224 с. Teresa Santos. Producing Geographical Information for Land Planning using VHR Data. – М.: LAP Lambert Academic Publishing, 2011. – 332 с. Ayyaswamy Kathirvel,Srinivasan Rengaramanujam and Mohanambal Kathirvel. Prevention of attacks usign umpiring security model for manets. – М.: LAP Lambert Academic Publishing, 2012. – 192 с. Shirley Magazi. AN ASSESSMENT OF FOOD SECURITY INTERVENTIONS. – М.: LAP Lambert Academic Publishing, 2011. – 104 с. Padmashali. A Secure communication for wireless sensor networks. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Mohamed Nagy Saad Mohamed Elziftawy. Comparative Study & Hybrid Technique for Biomidical Image Compression. – М.: LAP Lambert Academic Publishing, 2012. – 184 с. Deepak Puthal and Bibhudatta Sahoo. Secure Data Collection & Critical Data Transmission in Mobile Sink WSN. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Dmitry Khovratovich. New Methods in Symmetric Cryptanalysis. – М.: LAP Lambert Academic Publishing, 2011. – 220 с. Hamid Reza Barzegar,Mahdiyeh Barzegar and Neshat Alidad. Energy Efficient And Secured Communication For Manets In Military. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Hamdy Morsy. Developing a New Technique for Hiding Information in Images. – М.: LAP Lambert Academic Publishing, 2013. – 116 с. Rupa Ch. and Avadhani P. S. Modern Security Methods in Applied Computer Science. – М.: Scholars' Press, 2014. – 124 с. Mohammad AlAhmad. Security threats of finger print biometric in network system. – М.: LAP Lambert Academic Publishing, 2014. – 88 с. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с. Iman Almomani. Security Solutions for Wireless Mobile Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2011. – 360 с. M. Amutha Prabakar. Authentication Scheme for Dynamic Group Using Threshold Cryptography. – М.: LAP Lambert Academic Publishing, 2014. – 80 с. R. Baskaran,M. S. Saleem Basha and A. Balasubramanian. Two Tier Security Framework for Service Oriented Systems. – М.: LAP Lambert Academic Publishing, 2012. – 176 с. Tejpal Singh. Security Protocols for Data Routing in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 68 с. Omid Mahdi Ebadati E.,Harleen Kaur M. Afshar Alam and Kaebeh Yaeghoobi. Micro-Firewalls for Dynamic Network Security Framework. – М.: LAP Lambert Academic Publishing, 2012. – 292 с. Zheng Liu,Xue Li and Zhaoyang Dong. Improvements on Data Security Algorithms for Streaming Multimedia. – М.: LAP Lambert Academic Publishing, 2012. – 240 с. Pallavi Kaliyar and Gagan Singla. A secure routing protocol for MANETs against byzantine attacks. – М.: LAP Lambert Academic Publishing, 2013. – 84 с. Pushphas Chaturvedi and Kunal Gupta. Enhanced Packet Dissembling Schemes For Jamming Attacks Prevention. – М.: LAP Lambert Academic Publishing, 2013. – 76 с. Britto R. Kumar and Albert S. Rabara. An Architecture for Secure Mobile Payment System using PKI. – М.: LAP Lambert Academic Publishing, 2013. – 184 с. Raghavendra K. R. Model-checking infinite state systems for information flow security. – М.: LAP Lambert Academic Publishing, 2014. – 160 с. Martin Drahansky. Biometric Cryptography Based on Fingerprints. – М.: LAP Lambert Academic Publishing, 2010. – 160 с. Emre Sezgin and Sevgi Ozkan. ASSESSMENT OF INFORMATION TECHNOLOGY USE IN ORGANIZATIONS. – М.: LAP Lambert Academic Publishing, 2011. – 144 с. Usman Habib. Secure Mobile Authentication for Linux Workstation log on. – М.: LAP Lambert Academic Publishing, 2011. – 120 с. Mais Mohammed Hobi and Sarab Majeed Hameed. Biometrics for User Authentication Using Artificial Neural Networks. – М.: LAP Lambert Academic Publishing, 2013. – 108 с. Ankit Vidyarthi and Ankita Sharma. Semantic Ontology Merging for Effective Information Retrieval System. – М.: LAP Lambert Academic Publishing, 2014. – 112 с. Yedji Mbangsoua and Dr. Freddie Acosta. Information Security and its Investment Justification. – М.: LAP Lambert Academic Publishing, 2011. – 132 с. Zhuozhi Chen and Rob Pooley. Requirement Elicitation for Enterprise Information Systems. – М.: LAP Lambert Academic Publishing, 2011. – 256 с. Wole Olatokun. Information Technology Tools and Applications. – М.: LAP Lambert Academic Publishing, 2011. – 296 с. E. Madhusudhana Reddy. Development of Secure Protocols for MHIS Using RMPJK–RSA Cryptosystem. – М.: LAP Lambert Academic Publishing, 2011. – 204 с. Sandeep Kumar. Simulator for Database Aggregation using Metadata. – М.: LAP Lambert Academic Publishing, 2013. – 88 с. Mahimn Bhupendrabhai Pandya,Ashish Jani and Nalin Jani. Bespoke Technique For Copyright Digital Images & Secure Communication. – М.: LAP Lambert Academic Publishing, 2014. – 84 с. Uros Damnjanovic. Clustering of Visual Information Using Spectral Methods. – М.: LAP Lambert Academic Publishing, 2010. – 172 с. Drake Patrick Mirembe. Security Framework for Telemedicine, eHealth, and Wellness Services. – М.: LAP Lambert Academic Publishing, 2010. – 72 с. Ramon Mangion. Are biometric passports the way forward?. – М.: LAP Lambert Academic Publishing, 2011. – 92 с. Julien Shabani. Information Security for RFID Systems. – М.: LAP Lambert Academic Publishing, 2011. – 92 с. Debasish Jena. On Protocols for Information Security Services. – М.: LAP Lambert Academic Publishing, 2011. – 136 с. Mohammed Firdos Alam Sheikh. Improving Web Security by Blocking SQL Injection Attack(SQLIA). – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Mehtab Afzal,Ijaz Ahmed and Qazi Mudassar Ilyas. Information Extraction from Web for Disaster Management Systems. – М.: LAP Lambert Academic Publishing, 2012. – 120 с. Samuel Macharia Were and Jasper Mogaka Masese. Information Processing for Effective Storage and Retrieval. – М.: LAP Lambert Academic Publishing, 2014. – 92 с. Bertold van Voorst. Cluster-based collection selection for information retrieval. – М.: LAP Lambert Academic Publishing, 2011. – 84 с. Cyrus Abanti Makori,Jane Onsongo and Lusiba Badru. ICT Security Applications. – М.: LAP Lambert Academic Publishing, 2012. – 112 с. Magdy Shayboub A. Mahmoud. Intelligent Mobile Agents For Information Retrieval. – М.: Scholars' Press, 2014. – 456 с. Kshamamayee Dash. A Novel BPNN Approach For Speaker Identification Using MFCC. – М.: LAP Lambert Academic Publishing, 2012. – 84 с. Hassen Alsafi and Mohammed Azhruddin. The Security Issues for Smart Grids Applications on Cloud Computing. – М.: LAP Lambert Academic Publishing, 2013. – 60 с. Ganesan G. Algebra of Information Systems using Rough Sets and Fuzzy Sets. – М.: LAP Lambert Academic Publishing, 2014. – 128 с. Dirk Lessner. Network Security for Embedded Systems. – М.: LAP Lambert Academic Publishing, 2009. – 232 с. Ahmed AlNunu. How Much Information Security?. – М.: LAP Lambert Academic Publishing, 2010. – 68 с. Jeffy Mwakalinga. A Framework for Adaptive Information Security Systems. – М.: LAP Lambert Academic Publishing, 2011. – 364 с. Khalid Saeed. Security Concern an Obstacle for the Growth of E-Commerce in Pakistan. – М.: LAP Lambert Academic Publishing, 2014. – 52 с. Ahmed S. Yesuf. Context-based attack tree modelling for software development. – М.: LAP Lambert Academic Publishing, 2014. – 100 с. Muhammad Imran Tariq. SLA based Information Security Metrics in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2014. – 192 с. Vinayak Bharadi and Hemchandra Kekre. Biometric Authentication Systems. – М.: LAP Lambert Academic Publishing, 2012. – 364 с. Khalid Hussain and Waqas Ahmed. Sub Table Access Based Model For OLAP tools. – М.: LAP Lambert Academic Publishing, 2012. – 96 с. Daniel Oranova Siahaan. Query Languages as Tools for Retrieving Information on the Internet. – М.: LAP Lambert Academic Publishing, 2011. – 140 с. Shada Al-Salamah. Towards Information Sharing in Virtual Organisations. – М.: LAP Lambert Academic Publishing, 2010. – 312 с. Tamur Aziz. Intelligent Watermarking Using Loss Less Compression and RSA Encryption. – М.: LAP Lambert Academic Publishing, 2011. – 60 с. Kerem Beygo and Cihan Eraslan. Enhancing Security and Usability Features of NFC. – М.: LAP Lambert Academic Publishing, 2010. – 68 с. Tadeusz Struk. Elliptic Curve Cryptography as suitable solution for mobile devices. – М.: LAP Lambert Academic Publishing, 2010. – 88 с. Marcos Ortega Hortas. Biometric authentication using the retinal vessel tree. – М.: LAP Lambert Academic Publishing, 2011. – 184 с. Vijayan Prasath. Secure Architecture for Web Service Discovery and Retrieval. – М.: LAP Lambert Academic Publishing, 2012. – 116 с. Лучшие результаты Ничего не найдено Дополнительные результаты О качестве сервиса, связанного с запросами на медицинскую информацию. Medical Information Service?. А. Беденков, "Ремедиум", № 1, январь 2012. Мы можем управлять собственными мыслями. интервью с С. Харитоновым, врачом-психотерапевтом, психиатором, кандидатом медицинских наук, старшим научным сотрудником Московского НИИ психиатрии Росздрава РФ, членом-корреспондентом Международной академии наук. МАНЭБ, членом Британского общества когнитивных и поведенческих психотерапевтов. Membership British Association for Behavioural & Cognitive Psychoterapies / BABCP. Ф. Кульпин, "Управление персоналом", N 8, апрель 2011 г. Зачетная реструктуризация долга: институт DEBT-FOR-EQUITY SWAP в России". интервью с М. Григорьевым, старшим юристом корпоративной практики юридической фирмы "Вегас-Лекс". О. Бодрягина, "эж-ЮРИСТ", № 3, январь 2010. Управление проектами при подборе персонала. PM for HR. Е. Кривов, "Кадровик. Рекрутинг для кадровика", № 9, сентябрь 2008. Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Юлия (Ростов-на-Дону) Ирина добрый день! Ездила сегодня к преподу забирала диплом после вашего сопровождения. Все супер ей все понравилось, ничего исправлять или сокращать не надо, написала мне уже отличный отзыв. Спасибо вам большое!