Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты R. Michael Alvarez, Thad E. Hall. Electronic Elections: The Perils and Promises of Digital Democracy. – М.: , 2010. – 256 с. Marco Ramilli. Designing A New Electronic Voting System. – М.: LAP Lambert Academic Publishing, 2010. – 60 с. Nirmalya Kar and Sharmistha Roy. Secure Electronic Voting. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Nelly S. Medina. A Model for Direct Recording Electronic Voting Systems. – М.: LAP Lambert Academic Publishing, 2014. – 108 с. Carlos Grima-Izquierdo. A generic architecture for e-Government and e-Democracy. – М.: LAP Lambert Academic Publishing, 2012. – 316 с. Paul Opara John. The Social Dimension of Security in Electronic Voting Systems. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Дополнительные результаты Francis Groves. Corporate Actions - A Concise Guide: An introduction to securities events. – М.: , 2012. – 230 с. Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с. Data Privacy Management and Autonomous Spontaneus Security: 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, ... Computer Science / Security and Cryptology). – М.: , 2012. – 334 с. Security and Privacy in Mobile Information and Communication Systems: Third International ICST Conference, MOBISEC 2011, Aalborg, Denmark, May 17-19, ... and Telecommunications Engineering). – М.: , 2012. – 195 с. Constructive Side-Channel Analysis and Secure Design: Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings ... Computer Science / Security and Cryptology). – М.: , 2012. – 280 с. Public Key Infrastructures, Services and Applications: 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected ... Computer Science / Security and Cryptology). – М.: , 2012. – 219 с. Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – М.: , 2012. – 283 с. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 515 с. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с. Smart Card Research and Advanced Applications: 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, ... Computer Science / Security and Cryptology). – М.: , 2012. – 357 с. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с. Security and Development in Global Politics: A Critical Comparison. – М.: , 2012. – 360 с. Joseph F. Stenken JD CLU ChFc. Social Security & Medicare Facts 2012. – М.: , 2012. – 451 с. Advances in Electronic Commerce, Web Application and Communication: Volume 2 (Advances in Intelligent and Soft Computing). – М.: , 2012. – 640 с. Luis Lobo-Guerrero. Insuring Security: Biopolitics, security and risk. – М.: , 2012. – 178 с. CCH Editorial Staff. Social Security Explained 2012. – М.: , 2012. – 298 с. Terrorism and the Olympics: Major Event Security and Lessons for the Future. – М.: , 2012. – 272 с. Sheila R Ronis. Economic Security: Neglected Dimension of National Security?. – М.: , 2012. – 128 с. Denise Garcia. Disarmament Diplomacy and Human Security: Regimes, Norms and Moral Progress in International Relations. – М.: , 2012. – 0 с. Securities Compliance Index. Securities Compliance Index, Second Edition: A Topical Guide To U.S. Securities Regulation. – М.: , 2012. – 512 с. American Bar Association, Thomas Lee Hazen. Securities Regulation: Corporate Counsel Guides. – М.: , 2012. – 540 с. Lionel Martellini, Philippe Priaulet, StA©phane Priaulet. Fixed-Income Securities : Valuation, Risk Management and Portfolio Strategies (The Wiley Finance Series). – М.: , 0. – 0 с. Jeffrey C. Hooke. Security Analysis on Wall Street. – М.: , 0. – 0 с. Martin Stone, Spencer Strauss. Secure Your Financial Future Investing in Real Estate. – М.: , 0. – 0 с. William Rini. Fundamentals of the Securities Industry. – М.: , 0. – 0 с. Frank J. Fabozzi, John N. Dunlevy, Frank J. Fabozzi, John N. Dunlevy. Real Estate Backed Securities. – М.: , 0. – 0 с. Managing Technology in the Operations Function (Securities Institute Global Capital Markets Series). – М.: , 0. – 0 с. David F. Teitelbaum. The Procrastinator's Guide to Financial Security: How Anyone Over 40 Can Still Build a Strong Portfolio--and Retire Comfortably. – М.: , 0. – 0 с. Giorgio S. Questa. Fixed Income Analysis for the Global Financial Market: Money Market, Foreign Exchange, Securities, and Derivatives. – М.: Wiley, 1999. – 368 с. Bambi Holzer. Retire Rich : The Baby Boomer's Guide to a Secure Future. – М.: , 0. – 0 с. Peter A. Diamond. Taxation, Incomplete Markets, and Social Security (Munich Lectures). – М.: , 0. – 0 с. William T. Moore. Real Options and Option-Embedded Securities. – М.: , 0. – 0 с. Marilyn Greenstein, Todd M. Feinman. Electronic Commerce: Security Risk Management and Control. – М.: , 0. – 0 с. Ming Fan, Sayee Srinivasan, Jan Stallaert, Andrew B. Whinston. Electronic Commerce and the Revolution in Financial Markets. – М.: , 0. – 0 с. Kenneth S. Hackel, Joshua Livnat. Cash Flow and Security Analysis. – М.: , 0. – 0 с. Richard A. Westin. International Taxation of Electronic Commerce. – М.: , 0. – 0 с. Richard L. Doernberg, Luc Hinnekens, International Fiscal Association. Electronic Commerce and International Taxation. – М.: , 0. – 0 с. Changmin Chun. Cross-border Transactions of Intermediated Securities: A Comparative Analysis in Substantive Law and Private International Law. – М.: , 2012. – 524 с. Paul Osterman. Securing Prosperity: The American Labor Market: How It Has Changed and What to Do About It. – М.: , 0. – 0 с. Jianmin Zhao, Bruce J. Dickson, Chien-Min Zhao. Remaking the Chinese State: Strategies, Society, and Security (Asia's Transformations). – М.: , 0. – 0 с. Lenore G. Martin. New Frontiers in Middle East Security. – М.: , 0. – 0 с. Martin S. Feldstein, Horst Siebert. Social Security Pension Reform in Europe. – М.: , 0. – 0 с. Rattan Lal, David Hansen, Norman Uphoff, Steven Slack, Rattan Lal. Food Security and Environmental Quality in the Developing World. – М.: , 0. – 0 с. Frank J. Fabozzi, Frank J. Fabozzi. Investing In Commercial Mortgage-Backed Securities. – М.: , 0. – 0 с. Henry J. Bailey, Richard B. Hagedorn. Secured Transactions in a Nutshell Nutshell Series) (4th ed). – М.: , 0. – 0 с. Douglas Hearth, Janis K. Zaima, Janis Zaima. Contemporary Investments: Security and Portfolio Analysis. – М.: , 0. – 0 с. Dean Baker, Mark Weisbrot. Social Security: The Phony Crisis. – М.: , 0. – 0 с. Andrew W. Lo. The Industrial Organization and Regulation of the Securities Industry (National Bureau of Economic Research Conference Report). – М.: , 0. – 0 с. Sylvester J. Schieber, John B. Shoven. The Real Deal: The History and Future of Social Security. – М.: , 0. – 0 с. Henry J. Aaron, John B. Shoven, Benjamin M. Friedman, Alvin Hansen Symposium on Public Policy 1998 Harvard University). Should the United States Privatize Social Security? (Alvin Hansen Symposium Series on Public Policy). – М.: , 0. – 0 с. Henry C., Jr. Lucas. Strategies for Electronic Commerce and the Internet. – М.: , 0. – 0 с. Robert Guttmann. Cybercash: The Coming Era of Electronic Money. – М.: , 0. – 0 с. G. Randy Slone. The Audiophile's Project Sourcebook: 80 High-Performance Audio Electronics Projects. – М.: McGraw-Hill/TAB Electronics, 2001. – 370 с. Practical Electronics Handbook. – М.: , 0. – 0 с. Carl Bergquist. Guide to Electronic Surveillance Devices. – М.: Prompt (DPI - 8/01), 2002. – 280 с. Donal O'Mahony, Michael Peirce, Hitesh Tewari, O'Mahony Donal. Electronic Payment Systems for E-Commerce. – М.: , 0. – 0 с. Julia Lowell, C. R. Neu, Daochi Tong, National Defense Research Institute, National Security Research Institute. Financial Crises and Contagion in Emerging Market Countries. – М.: , 0. – 0 с. Gerry Gingrich. Managing IT in Government, Business & Communities. – М.: , 0. – 0 с. Peter G. W. Keen, Craigg Ballance. On-Line Profits: A Manager's Guide to Electronic Commerce. – М.: , 0. – 0 с. Joseph S. Nye, William A. Owens, James R. Schlesinger, R. James Woolsey, James A. Lewis, Joseph S., Jr. Nye, James Andrew Lewis, Erin Schlather, Csis Commission on Technology Security in the Twenty-First Century. Computer Exports and National Security: New Tools for a New Century : A Report of the Csis Commission on Technology Security in the 21St-Century (Csis Panel Reports.). – М.: , 0. – 0 с. Ronald De Bruin, Ronald De Bruin. Consumer Trust in Electronic Commerce: Time for Best Practice (Law and Electronic Commerce, 17). – М.: , 0. – 0 с. John Vacca, Pete Loshin, Paul Murphy. Electronic Commerce (Networking Series). – М.: , 0. – 0 с. Robert B. Gelman, Gelman, Stanton McCandlish, Electronic Frontier Foundation. Protecting Yourself Online: The Definitive Resource on Safety, Freedom, and Privacy in Cyberspace. – М.: , 0. – 0 с. Joel Siegel. The International Handbook of Electronic Commerce. – М.: , 0. – 0 с. Warwick Ford, Michael S. Baum. Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption (2nd Edition). – М.: , 0. – 0 с. Elias M. Awad. Electronic Commerce. – М.: , 0. – 0 с. Mostafa Hashem Sherif. Protocols for Secure Electronic Commerce, Second Edition. – М.: , 0. – 0 с. Bhavani Thuraisingham. Web Data Management and Electronic Commerce. – М.: , 0. – 0 с. Peter Loshin, John Vacca, Paul A. Murphy. Electronic Commerce, Third Edition. – М.: , 0. – 0 с. Anup K. Ghosh. E-Commerce Security and Privacy. – М.: , 0. – 0 с. Kurt Bauknecht, Sanjay Kumar Madria, Gunther Pernul, G. Pernul, International Conference on Electronic Commerce and Web Technologies 2. Electronic Commerce and Web Technologies: First International Conference, Ec-Web 2000, London, Uk, September 4-6, 2000 Proceedings (Lecture Notes in Computer Science, 1875). – М.: , 0. – 0 с. Jae Kyu Lee. A More Convenient and Secure Electronic Commerce (Special Issue of the Journal of Organizational Computing and Electronic comMerce, Vol. 10). – М.: , 0. – 0 с. Jae K. Shim, Anique A. Qureshi, Joel G. Siegel, Roberta M. Siegel. The International Handbook of Electronic Commerce. – М.: , 0. – 0 с. Vesna Hassler. Security Fundamentals for E-Commerce (Artech House Computer Security Series). – М.: , 0. – 0 с. John R. Vacca. Public Key Infrastructure: Building Trusted Applications and Web Services. – М.: , 0. – 0 с. Simson Garfinkel, Gene Spafford. Web Security & Commerce (O'Reilly Nutshell). – М.: , 0. – 0 с. Najib C. Fatayerji. Electronic Marketing: Advantages and Disadvantages. – М.: , 0. – 0 с. Debt Management and Government Securities Markets in the 21st Century. – М.: , 2004. – 0 с. Thomas C. Glaessner. Electronic Safety and Soundness: Securing Finance in a New Age (World Bank Working Papers). – М.: , 2004. – 0 с. Efraim Turban. Electronic Commerce 2004: A Managerial Perspective, Third Edition. – М.: , 2003. – 0 с. Advances in Security and Payment Methods for Mobile Commerce. – М.: , 2004. – 0 с. Committee on Federal Regulation of Securities Committee. The Fund Director's Guidebook: Third Edition (Fund Director's Guidebook). – М.: , 2006. – 128 с. Michael Khairallah. Physical Security Systems Handbook: The Design and Implementation of Electronic Security Systems. – М.: , 2005. – 312 с. Frank Fabozzi. The Handbook of Fixed Income Securities. – М.: McGraw-Hill, 2005. – 1500 с. Bruce Schneier. Schneier on Security. – М.: , 2008. – 336 с. James Michael Stewart, Ed Tittel, Mike Chapple. CISSP: Certified Information Systems Security Professional Study Guide. – М.: , 2008. – 841 с. Meridian Securities Market. World Stock Exchange Fact Book. – М.: , 2008. – 0 с. CompTIA Security+: Certification Kit (комплект из 3 книг + 2 CD-ROM). – М.: Sybex, 2009. – 1440 с. Klaus W. Grewlich. Governance in "Cyberspace: Access and Public Interest in Global Communications (Law and Electronic Commerce, V. 9). – М.: , 0. – 0 с. R. Michael Alvarez, Thad E. Hall. Electronic Elections: The Perils and Promises of Digital Democracy. – М.: , 2010. – 256 с. Robert Pearson. Electronic Security Systems. – М.: , 2010. – 384 с. R M MARSTON. Security Electronics Circuits Manual. – М.: , 2010. – 224 с. Philip Walker. Electronic Security Systems. – М.: , 2010. – 256 с. Gerard Honey. Electronic Protection and Security Systems. – М.: , 2010. – 208 с. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с. Gerard Honey. Electronic Security Systems Pocket Book. – М.: , 2010. – 226 с. V MARTIN. Martin Electronic & ?microprocessor? Controlled Security Projects (paper Only). – М.: , 1985. – 236 с. Paul Scherz. Practical Electronics for Inventors. – М.: McGraw-Hill/TAB Electronics, 2006. – 952 с. Dave Tyson. Security Convergence: Managing Enterprise Security Risk. – М.: , 2007. – 232 с. Yi Qian, James Joshi, David Tipper, Prashant Krishnamurthy. Information Assurance: Dependability and Security in Networked Systems. – М.: Morgan Kaufmann, 2007. – 576 с. Paul Allen, Joseph Bambara. OCM Java EE 6 Enterprise Architect Exam Guide (Exams 1Z0-807, 1Z0-865 & 1Z0-866). – М.: McGraw-Hill Osborne Media, 2014. – 672 с. Sandra Karolina Ardiyanto,James Purnama and Andrari Grahitandaru. Analysis and Design of Indonesia's e-ID and e-Voting Integration. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Suk-Won Hwang and John A. Rogers. Materials and Integration Approaches for Transient Electronic Systems. – М.: Scholars Press, 2014. – 152 с. Shaikh Salim and Shankar Nawale. Secure Access of RFID System. – М.: LAP Lambert Academic Publishing, 2012. – 96 с. Ryan Quint. Implementation of a Security-Dependability Adaptive Voting Scheme. – М.: LAP Lambert Academic Publishing, 2012. – 140 с. Md. Fasiul Alam and Md. Delwar Hossain. Microcontroller Based Security System. – М.: LAP Lambert Academic Publishing, 2013. – 92 с. Ronan O'Driscoll. Internet Controlled Security Robot. – М.: LAP Lambert Academic Publishing, 2014. – 52 с. T.C. Manjunath and Arun Kumar G. Examination Security System. – М.: LAP Lambert Academic Publishing, 2013. – 60 с. SANDIP CHATTERJEE. Electronics Waste Management: An India Perspective. – М.: LAP Lambert Academic Publishing, 2010. – 124 с. Nedal Tahat. Digital Signature Schemes Based on Multiple Hard Problems. – М.: LAP Lambert Academic Publishing, 2011. – 136 с. Ruta Budreckiene. ELECTRONICALLY ACTIVE COMPOUNDS CONTAINING REACTIVE FUNCTIONAL GROUPS. – М.: LAP Lambert Academic Publishing, 2010. – 144 с. Nateq Be-Nazir Ibn Minar. Bluetooth Networking and its Security Architecture. – М.: LAP Lambert Academic Publishing, 2012. – 84 с. Wiem Tounsi. Security and Privacy Controls in RFID Systems. – М.: LAP Lambert Academic Publishing, 2014. – 172 с. Vincent Omollo. Enhanced Network Security. – М.: LAP Lambert Academic Publishing, 2013. – 76 с. Supakorn Kungpisdan. Securing Mobile Payments: Modelling, Design, and Analysis. – М.: LAP Lambert Academic Publishing, 2010. – 336 с. Seifedine Kadry and Firas Hazzaa. Web-based Voting System Using Fingerprint. – М.: LAP Lambert Academic Publishing, 2013. – 80 с. Nana Afua Boamah Gyimah and Bertrand Asongwe Tita. Electronic Voting; A possible Solution for sub-Saharan Africa?. – М.: LAP Lambert Academic Publishing, 2010. – 64 с. Marco Ramilli. Designing A New Electronic Voting System. – М.: LAP Lambert Academic Publishing, 2010. – 60 с. Olayinka David-West. Retail Electronic Banking Performance. – М.: LAP Lambert Academic Publishing, 2013. – 520 с. Saghar Estehghari. Impact of Client-side Vulnerabilities on Web-based E-voting Systems. – М.: LAP Lambert Academic Publishing, 2011. – 80 с. Agastya Alfath. Planning and Implementation of Open Source AFIS for Indonesia E-Voting. – М.: LAP Lambert Academic Publishing, 2012. – 128 с. Amos Omamo. The effectiveness of IDPS's in enhancing database security. – М.: LAP Lambert Academic Publishing, 2012. – 88 с. Adebayo Omotosho and Justice Emuoyibofarhe. Development of a Secure Intelligent Electronic Prescription System. – М.: LAP Lambert Academic Publishing, 2012. – 156 с. Ahmad Siddiqui,Mohd Rahil and Sultan Aljahdali. E-Business and Security. – М.: LAP Lambert Academic Publishing, 2013. – 120 с. Nirmalya Kar and Sharmistha Roy. Secure Electronic Voting. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Khalid Saeed. Security Concern an Obstacle for the Growth of E-Commerce in Pakistan. – М.: LAP Lambert Academic Publishing, 2014. – 52 с. Nelly S. Medina. A Model for Direct Recording Electronic Voting Systems. – М.: LAP Lambert Academic Publishing, 2014. – 108 с. Komunte Mary and Prof Venansius Baryamureeba. Web Security. – М.: LAP Lambert Academic Publishing, 2010. – 140 с. Jeremiah Akita and Koudjo Koumadi. Evaluating Cloud Storage Security In Ghana. – М.: LAP Lambert Academic Publishing, 2014. – 104 с. Carlos Grima-Izquierdo. A generic architecture for e-Government and e-Democracy. – М.: LAP Lambert Academic Publishing, 2012. – 316 с. Sachin Tripathi and Gosta Pada Biswas. Enhancements on Internet Applications. – М.: LAP Lambert Academic Publishing, 2011. – 148 с. S. Balamurugan and S. Charanyaa. Principles of Database Security. – М.: Scholars' Press, 2014. – 148 с. Haneen Qarabash. An Intranet Based System For Securities Trading. – М.: LAP Lambert Academic Publishing, 2013. – 84 с. Arpita Mondal. Simple and Secured Access to Networked Home Appliances via Internet. – М.: LAP Lambert Academic Publishing, 2010. – 180 с. Paul Opara John. The Social Dimension of Security in Electronic Voting Systems. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. S. V. S. Kishore Kumar. Information Systems Audit And Security In Banking. – М.: LAP Lambert Academic Publishing, 2013. – 476 с. Лучшие результаты Ничего не найдено Дополнительные результаты He посмертная" отчетность, а предвидение...". интервью с Е. Агеевой, финансовым директором Golder Electronics/TM Vitek. С. Крылосов, "Консультант", N 13, июль 2010 г. Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Иван, 09.06 В целом, работа нормальная.