Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Ehsan Khorasani Esmaeili. Secure Keyboard logging system. – М.: LAP Lambert Academic Publishing, 2013. – 124 с. Дополнительные результаты Security and Privacy in Mobile Information and Communication Systems: Third International ICST Conference, MOBISEC 2011, Aalborg, Denmark, May 17-19, ... and Telecommunications Engineering). – М.: , 2012. – 195 с. Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – М.: , 2012. – 283 с. Securities Compliance Index. Securities Compliance Index, Second Edition: A Topical Guide To U.S. Securities Regulation. – М.: , 2012. – 512 с. Systems Thinker Newsletter. Making It Happen: Stories from Inside the New Workplace. – М.: , 0. – 0 с. Gerald Kovacich. The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition. – М.: , 0. – 0 с. I NATO Conference on Manpower Planning and Organization Design Stresa, Richard J. Niehaus, Donald T. Bryant, NATO Special Program Panel on Human Factors, NATO Special Program Panel on Systems Science. Manpower Planning and Organization Design. (NATO Conference Series : Ii, Systems Science, 7). – М.: , 0. – 0 с. Safe Schools: A Security and Loss Prevention Plan. – М.: , 0. – 0 с. Crisp Learn Systems. Organizing Your Workspace (Self Study II). – М.: , 0. – 0 с. Board of Governors of the Federal Reserve System. The Federal Reserve System: Purposes & Functions. – М.: , 0. – 0 с. Julia Lowell, C. R. Neu, Daochi Tong, National Defense Research Institute, National Security Research Institute. Financial Crises and Contagion in Emerging Market Countries. – М.: , 0. – 0 с. Ada Decision Systems. Dpl 4.0: Professional Decision Analysis Software : Academic Version. – М.: , 0. – 0 с. Timothy Braithwaite. Securing E-Business Systems: A Guide for Managers and Executives. – М.: , 0. – 0 с. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с. Andrew Hawker. Security in Information Systems : A Guide for Business and Accounting. – М.: , 0. – 0 с. Ifip Tc11 Wg11.5 Working Conference on Integrity and Internal Control, Michael Gertz, Erik Guldentops, Leon Strous. Integrity, Internal Control and Security in Information Systems: Connecting Governance and Technology (International Federation for Information Processing). – М.: , 0. – 0 с. Ifip Tc11 Wg11.5 Working Conference on Integrity and Internal Control, Michael Gertz. Integrity and Internal Control in Information Systems V: Ifip Tc11/Wg11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (Iicis), November 11-12, 2002, Bonn, Germany (International Federation for Information Processing. – М.: , 0. – 0 с. Ifip Tc8 & Tc9, Wg8.2 & Wg9.4 Working Conference on Information Systems, Ramiro Montealegre, Angeliki Poulymenakou. Organizational Information Systems in the Context of Globalization: Ifip Tc8 & Tc9/Wg8.2 & Wg9.4 Working Conference on Information Systems Perspective ... ion for Information Processing (Series), 126). – М.: , 0. – 0 с. U s Games System. Patton on Leadership: Seventy Motivational Cards for Success. – М.: , 0. – 0 с. Joseph S. Nye, William A. Owens, James R. Schlesinger, R. James Woolsey, James A. Lewis, Joseph S., Jr. Nye, James Andrew Lewis, Erin Schlather, Csis Commission on Technology Security in the Twenty-First Century. Computer Exports and National Security: New Tools for a New Century : A Report of the Csis Commission on Technology Security in the 21St-Century (Csis Panel Reports.). – М.: , 0. – 0 с. Inc Wizdom Systems, Inc. Wizdom Systems. Process Optimization in Home Healthcare: A Step by Step Guide to Understanding and Improving Healthcare Delivery to Home Bound Patients. – М.: , 0. – 0 с. Eai. Learn to Type with MicroType. – М.: , 0. – 0 с. In Search of Sustainable Livelihood Systems: Managing Resources and Change. – М.: , 2004. – 0 с. Political Economy of the World-System Conference 2001 Virginia Polyte. Emerging Issues in the 21st Century World-System (Contributions in Economics and Economic History, No. 230). – М.: , 2003. – 0 с. Efraim Turban. Electronic Commerce 2004: A Managerial Perspective, Third Edition. – М.: , 2003. – 0 с. Committee on Federal Regulation of Securities Committee. The Fund Director's Guidebook: Third Edition (Fund Director's Guidebook). – М.: , 2006. – 128 с. Switzerland Business & Investment Handbook: Economy, Law, Taxation, Real Estate, Residence, Facts & Figures, Key Addresses. – М.: , 2006. – 766 с. Michael Khairallah. Physical Security Systems Handbook: The Design and Implementation of Electronic Security Systems. – М.: , 2005. – 312 с. Tay Kratzer, Erno de Korte. Novell GroupWise 7 Administrator Solutions Guide. – М.: , 2005. – 936 с. The Economy of Puerto Rico: Restoring Growth. – М.: , 2006. – 607 с. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с. Roy H. Campbell, Prasad G. Naldurg. Security and Survivability: Analyzing, Modeling, and Verifying Dynamic Recovery in Insecure Systems. – М.: , 2008. – 240 с. James Michael Stewart, Ed Tittel, Mike Chapple. CISSP: Certified Information Systems Security Professional Study Guide. – М.: , 2008. – 841 с. Ibp Usa. European System for Security and Cooperation Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Meridian Securities Market. World Stock Exchange Fact Book. – М.: , 2008. – 0 с. V.R. Leonard. The Social Security and Medicare Handbook: What You Need to Know Explained Simply. – М.: , 2008. – 288 с. DayMark Safety Systems. True Kitchen Confessions: Infusing DayMark s Passion for Making the World a Safer Place to Eat, Work, & Live. – М.: , 2008. – 116 с. Handbook on Information Technology in Finance (International Handbooks on Information Systems). – М.: , 2008. – 800 с. Engineering Secure Software and Systems: Second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2010. – 252 с. XYPRO Technology Corp. Securing HP NonStop Servers in an Open Systems World. – М.: , 2010. – 1000 с. Shigeru Yamamoto. Systems and Human Science - For Safety, Security and Dependability. – М.: , 2010. – 350 с. A L Brown. Domestic Security Systems. – М.: , 2010. – 192 с. Joel Konicek. Security, ID Systems and Locks. – М.: , 2010. – 260 с. John R. Vacca. Network and System Security. – М.: , 2010. – 408 с. Thomas L. Norman, CPP, PS. Integrated Security Systems Design. – М.: , 2010. – 472 с. Robert Pearson. Electronic Security Systems. – М.: , 2010. – 384 с. Gerald L. Kovacich. The Information Systems Security Officer's Guide. – М.: , 2010. – 361 с. Philip Walker. Electronic Security Systems. – М.: , 2010. – 256 с. Derrick Rountree. Security for Microsoft Windows System Administrators. – М.: , 2010. – 400 с. Gerard Honey. Electronic Protection and Security Systems. – М.: , 2010. – 208 с. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с. Gerard Honey. Electronic Security Systems Pocket Book. – М.: , 2010. – 226 с. Vivian Capel. Security Systems & Intruder Alarms. – М.: , 2010. – 301 с. Neil Cumming. Security: A Guide to Security System Design and Equipment Selection and Installation. – М.: , 2010. – 338 с. Timothy Braithwaite. Securing E–Business Systems. – М.: , 2002. – 288 с. Future Systems. For Inspiration ONLY. – М.: , 1996. – 128 с. Sead Muftic. Security Architecture for Open Distributed Systems. – М.: , 1993. – 298 с. E–SYSTEMS. How To 2000. – М.: , 1997. – 656 с. Software Systems Corp. Thermodynamic Properties. – М.: , 1988. – 112 с. O SYSTEM. Hofer Handbook Of Primatology: Systematik–phylogenie–ontogenie. – М.: , 1971. – 0 с. JD GIFFORD. Gifford Automotive ?security? System Design Handbo Ok (paper Only). – М.: , 1985. – 238 с. Low Voltage Wiring: Security/Fire Alarm Systems. – М.: , 2011. – 0 с. Windows 7 Quicksteps. – М.: , 2011. – 272 с. The Complete Book Of Home, Site And Office Security. – М.: , 2011. – 309 с. Linux Administration: A Beginner'S Guide, Fifth Edition. – М.: , 2011. – 662 с. Security Information And Event Management (Siem) Implementation. – М.: , 2011. – 464 с. Atec and Xnet Information Systems. The Internet Watchdog Personal Edition Windows. – М.: , . – с. Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky. Cisco Security Professional's Guide to Secure Intrusion Detection Systems. – М.: , . – с. Yi Qian, James Joshi, David Tipper, Prashant Krishnamurthy. Information Assurance: Dependability and Security in Networked Systems. – М.: Morgan Kaufmann, 2007. – 576 с. Timothy Stapko. Practical Embedded Security: Building Secure Resource-Constrained Systems. – М.: Newnes, 2007. – 480 с. Bruce Dang, Alexandre Gazet, Elias Bachaalany. Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation. – М.: Wiley, 2014. – 384 с. Bruce Dang, Alexandre Gazet, Elias Bachaalany, Sebastien Josse. Practical Reverse Engineering. – М.: John Wiley and Sons, Ltd, 2014. – 384 с. Afaz Uddin Ahmed,Taufiq Mahmud Masum and Mohammad Mahbubur Rahman. Design of an Automated Secure Garage System by Using LPR Method. – М.: LAP Lambert Academic Publishing, 2013. – 68 с. Papri Ghosh and Ritam Dutta. Adaptive Approach towards Biometric Authentication System. – М.: LAP Lambert Academic Publishing, 2012. – 88 с. Shaikh Salim and Shankar Nawale. Secure Access of RFID System. – М.: LAP Lambert Academic Publishing, 2012. – 96 с. Shaek Rana Mohammad Baki Billah and Mohammad Hafizur Rahman. Design & Development of Network Security System using IP Tables. – М.: LAP Lambert Academic Publishing, 2013. – 164 с. Tasnuva Ahmed,Rabiul Hossain and Dipesh Barua. Security System Using Ultrasound. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Yamille del Valle. Optimization of Power System Performance using FACTS devices. – М.: LAP Lambert Academic Publishing, 2010. – 236 с. Nasir Abrar,Ausnain Naveed and Raniya Noor. Security systems for agricultural farms. – М.: LAP Lambert Academic Publishing, 2012. – 72 с. Md. Fasiul Alam and Md. Delwar Hossain. Microcontroller Based Security System. – М.: LAP Lambert Academic Publishing, 2013. – 92 с. Tirumala Ramashri. Hybrid Image Watermarking Algorithms. – М.: LAP Lambert Academic Publishing, 2013. – 112 с. Jagadish Pal. Power System Static Security Analysis and Control. – М.: LAP Lambert Academic Publishing, 2010. – 160 с. A.S.M. Mukter Zaman,Aryuanto Soetedjo and Md. Shabiul Islam. Embedded Smart Security System. – М.: LAP Lambert Academic Publishing, 2012. – 128 с. Punit N. Dhirawani. A Holistic Security System Using Motion Sensors. – М.: LAP Lambert Academic Publishing, 2011. – 72 с. Mehmet Oztemel. A Secure RFID ID-Card System Via Robust Image Hashing. – М.: LAP Lambert Academic Publishing, 2011. – 64 с. Ruben Johnnson Robert Jeremiah,Sakthivel Murugan Shamjith and Allen Vimal. Security System of Oilfield using Wireless in PLC & TESTBED for SCADA. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. T.C. Manjunath and Arun Kumar G. Examination Security System. – М.: LAP Lambert Academic Publishing, 2013. – 60 с. Rohit Das and Abhik Sarkar. Advanced Home Security System. – М.: LAP Lambert Academic Publishing, 2013. – 52 с. Manoj Kollam. A Low-cost Embedded Smart Car Security And Theft Control System. – М.: LAP Lambert Academic Publishing, 2011. – 84 с. Wenshu Lin. Development of A 3D Log Processing Optimization System. – М.: Scholars' Press, 2013. – 160 с. Alaa K. Farhan. Security Protocol for Mobile Data. – М.: LAP Lambert Academic Publishing, 2013. – 116 с. Patricia Chogugudza. Shona Women under Patriarchy: From Feminism to African Womanism. – М.: Scholars' Press, 2014. – 188 с. Kannan Vasudevan. Semi-organic Nonlinear Optical Crystals for Laser Frequency Conversion. – М.: LAP Lambert Academic Publishing, 2010. – 168 с. Mahesh Pathak,Parvez Qamar Rizvi and Pradyumn Kumar. Natural Enemy Fauna in Rice-Wheat System of India. – М.: LAP Lambert Academic Publishing, 2012. – 356 с. Tawheed Reza Noor. Seed Systems and Seed Security of Rice Plantation. – М.: LAP Lambert Academic Publishing, 2015. – 116 с. Hussein M. Khattab,Almoataz Y. Abdelaziz and Said F. Mekhamer. Innovative Approaches for Power System Security Assessment. – М.: LAP Lambert Academic Publishing, 2013. – 224 с. Rajneesh Kumar Agnihotri. Physiological Screening of Landraces of Rice in Kumaun Himalaya. – М.: LAP Lambert Academic Publishing, 2011. – 212 с. Fouad Zaro and Mohammad Abido. Multi-Objective Optimal Power Flow. – М.: LAP Lambert Academic Publishing, 2010. – 104 с. Serdar Gamber. Reforming Social Security Systems through Privatization. – М.: LAP Lambert Academic Publishing, 2011. – 124 с. Jerrin Yomas. SSL based implementation of RFC2289 with dual factor token using GSM. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Kiril Stoichev. Increasing Nuclear Security with Advanced Management Systems. – М.: LAP Lambert Academic Publishing, 2015. – 188 с. Tulia Ackson. Coordination of Social Security Systems in the SADC Region. – М.: LAP Lambert Academic Publishing, 2009. – 96 с. Sushma Jaiswal. Automatic 3D Face Recognition And Modeling From 2D Images. – М.: LAP Lambert Academic Publishing, 2011. – 208 с. Dhirender Kumar. System Log Process for Application Software in Linux. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Brijender Kahanwal. A Research Study On Java File Security System Using Rijndael Algorithm. – М.: LAP Lambert Academic Publishing, 2012. – 244 с. Mehedi Al Mamun. Operating systems security: LINUX. – М.: LAP Lambert Academic Publishing, 2011. – 52 с. Faraz Fatemi Moghaddam. Secure Cloud Computing with Client-Based Control System. – М.: LAP Lambert Academic Publishing, 2013. – 100 с. Ehsan Khorasani Esmaeili. Secure Keyboard logging system. – М.: LAP Lambert Academic Publishing, 2013. – 124 с. Wiem Tounsi. Security and Privacy Controls in RFID Systems. – М.: LAP Lambert Academic Publishing, 2014. – 172 с. Munnujahan Ara. Reliable and Secure Wireless Communications Systems. – М.: Scholars' Press, 2014. – 140 с. Rupa Ch. and Avadhani P. S. Modern Security Methods in Applied Computer Science. – М.: Scholars' Press, 2014. – 124 с. Mohammad AlAhmad. Security threats of finger print biometric in network system. – М.: LAP Lambert Academic Publishing, 2014. – 88 с. Omid Mahdi Ebadati E.,Harleen Kaur M. Afshar Alam and Kaebeh Yaeghoobi. Micro-Firewalls for Dynamic Network Security Framework. – М.: LAP Lambert Academic Publishing, 2012. – 292 с. Ayesha Azam Bhatti. Automated Industrial Processes Control Via WIMAX. – М.: LAP Lambert Academic Publishing, 2013. – 116 с. Sohail Abbas. A Layered Security Approach for Cooperation Enforcement in MANETs. – М.: LAP Lambert Academic Publishing, 2012. – 280 с. Mehmet Hilal Ozcanhan. Security & Reliability in Embedded Systems. – М.: LAP Lambert Academic Publishing, 2014. – 152 с. Supakorn Kungpisdan. Securing Mobile Payments: Modelling, Design, and Analysis. – М.: LAP Lambert Academic Publishing, 2010. – 336 с. Govind Sreekar Shenoy. Architecture Support for Intrusion Detection systems. – М.: LAP Lambert Academic Publishing, 2014. – 160 с. Britto R. Kumar and Albert S. Rabara. An Architecture for Secure Mobile Payment System using PKI. – М.: LAP Lambert Academic Publishing, 2013. – 184 с. Raghavendra K. R. Model-checking infinite state systems for information flow security. – М.: LAP Lambert Academic Publishing, 2014. – 160 с. Kefa Rabah. Mastering Securing ICT Infrastructure for Corporate Network. – М.: LAP Lambert Academic Publishing, 2014. – 360 с. Md. Rabiul Islam and M. Abdul Goffar Khan. Retina Recognition: Secure Biometric Authentication System. – М.: LAP Lambert Academic Publishing, 2012. – 72 с. Raed Alsaqour and Yap Earn. Searchable Symmetric Encryption. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Raghavendra Kagalavadi Ramesh,Deepak D'Souza and Barbara Sprick. Model checking trace-based information flow properties. – М.: LAP Lambert Academic Publishing, 2012. – 64 с. Julien Shabani. Information Security for RFID Systems. – М.: LAP Lambert Academic Publishing, 2011. – 92 с. Christine Mulunda,Peter Wagacha and Alfayo Oyugi. Genetic Algorithm Based Model in Text Steganography. – М.: Scholars' Press, 2014. – 60 с. Shubham Raina. System security through log analysis. – М.: LAP Lambert Academic Publishing, 2013. – 80 с. Khalil Zebbiche. Digital Watermarking For Securing Fingerprint Data. – М.: LAP Lambert Academic Publishing, 2012. – 156 с. Fadel O. Shaban. Spyware Detection. – М.: LAP Lambert Academic Publishing, 2013. – 92 с. Dirk Lessner. Network Security for Embedded Systems. – М.: LAP Lambert Academic Publishing, 2009. – 232 с. Nirmalya Kar and Sharmistha Roy. Secure Electronic Voting. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Stephen Murove,S. B. Mangena and B. Jones. Firewall Evaluation:Models for Major Decisions in Computer Security. – М.: LAP Lambert Academic Publishing, 2014. – 236 с. Muhammad Qaiser Saleem,Jafreezal Jaafar and Mohd Fadzil Hassan. Modeling Security Objectives along BPM of SOA Applications. – М.: LAP Lambert Academic Publishing, 2013. – 236 с. Keijo Haataja. Security Threats and Countermeasures in Bluetooth-Enabled Systems. – М.: LAP Lambert Academic Publishing, 2009. – 188 с. Md. Rajibul Islam. A Secure Personal Identification System. – М.: LAP Lambert Academic Publishing, 2010. – 196 с. Mousumi Saha. Simulation of FPGA based Buffered Security Enabled Encoders. – М.: LAP Lambert Academic Publishing, 2012. – 100 с. Richard Rimiru. Exploring Immune System's Concepts for the Design of Novel AIS Models. – М.: LAP Lambert Academic Publishing, 2012. – 164 с. Amare Abawa. SYSTEMS ANALYSIS AND DESIGN:. – М.: LAP Lambert Academic Publishing, 2010. – 152 с. Nivin Abdelmeguid. Strategic Human Resource Management and Organizational Performance. – М.: LAP Lambert Academic Publishing, 2014. – 132 с. Claudia-Georgeta Carstea. New approach about project management of complex information systems. – М.: LAP Lambert Academic Publishing, 2011. – 152 с. Ban Mustafa and Najla Aldabagh. Building an Ontology Based Access Control Model for Multi-Agent System. – М.: , 2015. – 120 с. Лучшие результаты Ничего не найдено Дополнительные результаты Банковское отделение будущего. интервью с Камероном МакКворри. Cameron MacQuarrie, менеджером по развитию бизнеса компании Cisco Systems в области корпоративных финансов в регионе EMEA. Европа, Ближний Восток, Африка. Н.Ф. Колюшенко, "Расчеты и операционная работа в коммерческом банке", № 2, февраль 2006. Ловушка для пирата. интервью с И. Слабых, руководителем отдела противодействия интеллектуальному пиратству в России и СНГ Adobe Systems. И. Голова, "Расчет", N 9, сентябрь 2012 г. Я воспринимаю персонального помощника как напарника червяк должен нравиться рыбке, а не рыбаку. интервью с П.А. Черкашиным, руководителем российского представительства компании Adobe Systems. "Управление персоналом", № 20, октябрь 2008. Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Олег Огромное спасибо! То, что нужно!