Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Christopher Wells. Securing Ajax Applications. – М.: , 2007. – 250 с.
  2. Hacking Exposed Web 2.0: Web 2.0 Security Secrets And Solutions. – М.: , 2011. – 258 с.
  3. Javaserver Faces 2.0, The Complete Reference. – М.: , 2011. – 752 с.
  4. Ajax: The Complete Reference. – М.: , 2011. – 654 с.
  5. Asp.Net 3.5: A Beginner'S Guide. – М.: , 2011. – 448 с.
  6. Microsoft Visual Studio 2008 Programming. – М.: , 2011. – 442 с.
  7. Asp.Net 4.0 Programming. – М.: , 2011. – 400 с.
  8. Peoplesoft Peopletools Tips & Techniques. – М.: , 2011. – 640 с.

Дополнительные результаты

  1. Data Privacy Management and Autonomous Spontaneus Security: 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, ... Computer Science / Security and Cryptology). – М.: , 2012. – 334 с.
  2. Wireless Communications and Applications: First International Conference, ICWCA 2011, Sanya, China, August 1-3, 2011, Revised Selected Papers (Lecture ... and Telecommunications Engineering). – М.: , 2012. – 468 с.
  3. Public Key Infrastructures, Services and Applications: 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected ... Computer Science / Security and Cryptology). – М.: , 2012. – 219 с.
  4. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 515 с.
  5. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  6. Smart Card Research and Advanced Applications: 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, ... Computer Science / Security and Cryptology). – М.: , 2012. – 357 с.
  7. Securities Compliance Index. Securities Compliance Index, Second Edition: A Topical Guide To U.S. Securities Regulation. – М.: , 2012. – 512 с.
  8. William T. Moore. Real Options and Option-Embedded Securities. – М.: , 0. – 0 с.
  9. Not Applicable (Na ). World Development Report 2004: Making Services Work for Poor People (WORLD DEVELOPMENT REPORT). – М.: , 0. – 0 с.
  10. Douglas Hearth, Janis K. Zaima, Janis Zaima. Contemporary Investments: Security and Portfolio Analysis. – М.: , 0. – 0 с.
  11. Michael R. Edgmand, Ronald L. Moomaw, Kent W. Olson. Economics and Contemporary Issues With Economics Applications Card and Infotrac College Edition. – М.: , 0. – 0 с.
  12. Risk Management, Speculation, and Derivative Securities. – М.: , 0. – 0 с.
  13. Not Applicable. Top Careers for Art Graduates (Top Careers). – М.: , 0. – 0 с.
  14. Not Applicable (Na ). Top Careers For History Graduates (Top Careers). – М.: , 0. – 0 с.
  15. Not Applicable (Na ). Entrepreneurs (Ferguson's Careers in Focus). – М.: , 0. – 0 с.
  16. Jon Barnett. The Meaning of Environmental Security: Environmental Politics and Policy in the New Security Era. – М.: , 0. – 0 с.
  17. Thomas S. Y. Ho, Sang Bin Lee. The Oxford Guide to Financial Modeling: Applications for Capital Markets, Corporate Finance, Risk Management and Financial Institutions. – М.: Oxford University Press, 2004. – 736 с.
  18. Julia Lowell, C. R. Neu, Daochi Tong, National Defense Research Institute, National Security Research Institute. Financial Crises and Contagion in Emerging Market Countries. – М.: , 0. – 0 с.
  19. Gerald L. Kovacich, Edward P. Halibozek. The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, First Edition. – М.: , 0. – 0 с.
  20. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с.
  21. Effective Security Management, Fourth Edition (Effective Security Management). – М.: , 0. – 0 с.
  22. Joseph S. Nye, William A. Owens, James R. Schlesinger, R. James Woolsey, James A. Lewis, Joseph S., Jr. Nye, James Andrew Lewis, Erin Schlather, Csis Commission on Technology Security in the Twenty-First Century. Computer Exports and National Security: New Tools for a New Century : A Report of the Csis Commission on Technology Security in the 21St-Century (Csis Panel Reports.). – М.: , 0. – 0 с.
  23. Henry Chan, Raymond Lee, Tharam Dillon, Elizabeth Chang, Henry Chan, Raymond Lee, Tharam Dillon. Electronic Commerce: Fundamentals & Applications. – М.: , 0. – 0 с.
  24. Niels Ploug, Jon Kvist. Social Security in Europe: Development or Dismantlement? (Kluwer Sovac Series on Social Security, Vol 3). – М.: , 0. – 0 с.
  25. Not Applicable (Na ). Buying a Home in Greece & Cyprus. – М.: , 0. – 0 с.
  26. Stephen Walther. ASP.NET Unleashed, Second Edition. – М.: , 0. – 0 с.
  27. Diana Huggins, Will Schmied. MCDST 70-272 Exam Cram 2 : Supporting Users & Troubleshooting Desktop Applications on a Windows XP Operating System ( + CD-ROM). – М.: Que Certification, 0. – 360 с.
  28. Jothy Rosenberg and David Remy. Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption. – М.: Sams, 2004. – 380 с.
  29. Matt Riggsby. Notes and Domino R5 Developer's Guide to Building Applications. – М.: , 0. – 0 с.
  30. Darrel Ince, Darrell Ince. Developing Distributed and E-Commerce Applications. – М.: , 0. – 0 с.
  31. Lisa M. Lindgren, Lisa Lindgren. Application Servers for E-Business. – М.: , 0. – 0 с.
  32. Jonathan S. Held, John R. Bowers. Securing E-Business Applications and Communications. – М.: , 0. – 0 с.
  33. Vesna Hassler. Security Fundamentals for E-Commerce (Artech House Computer Security Series). – М.: , 0. – 0 с.
  34. G. David Garson, G. David Information Technology and Computer Applications in Garson. Public Information Technology: Policy and Management Issues. – М.: , 0. – 0 с.
  35. Thomas Peltier, Thomas Pelitier, Justin Peltier, John A. Blackley, Peltier, Associates. Information Security Fundamentals. – М.: , 0. – 0 с.
  36. Current Security Management & Ethical Issues of Information Technology. – М.: , 2003. – 0 с.
  37. Advances in Security and Payment Methods for Mobile Commerce. – М.: , 2004. – 0 с.
  38. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с.
  39. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с.
  40. Rickland Hollar. Enterprise Web Services Security (Internet Series). – М.: , 2005. – 432 с.
  41. Ronald L. Moomaw, Kent W. Olson. Economics and Contemporary Issues (with Printed Access Card InfoTrac 1-Semester, Economic Applications Online Product). – М.: , 2006. – 496 с.
  42. Strategies to Enhance Environmental Security in Transition Countries (NATO Science for Peace and Security Series / NATO Science for Peace and Security Series C: Environmental Secur. – М.: , 2007. – 444 с.
  43. Committee on Federal Regulation of Securities Committee. The Fund Director's Guidebook: Third Edition (Fund Director's Guidebook). – М.: , 2006. – 128 с.
  44. Frank Fabozzi. The Handbook of Fixed Income Securities. – М.: McGraw-Hill, 2005. – 1500 с.
  45. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с.
  46. Sustainable Metals Management : Securing Our Future - Steps Towards a Closed Loop Economy (Eco-Efficiency in Industry and Science) (Eco-Efficiency in Industry and Science). – М.: , 2006. – 607 с.
  47. Network Security. – М.: , 2008. – 370 с.
  48. Prospectus for the Public Offering of Securities in Europe: Volume 1: European and National Legislation in the Member States of the European Economic Area (Law Practitioner Series). – М.: , 2008. – 514 с.
  49. James Michael Stewart, Ed Tittel, Mike Chapple. CISSP: Certified Information Systems Security Professional Study Guide. – М.: , 2008. – 841 с.
  50. Patrick Regan. MCTS 70-643 Exam Cram: Windows Server 2008 Applications Infrastructure, Configuring (Exam Cram). – М.: , 2008. – 480 с.
  51. Meridian Securities Market. World Stock Exchange Fact Book. – М.: , 2008. – 0 с.
  52. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с.
  53. Trust, Privacy and Security in Digital Business: 5th International Conference, TrustBus 2008 Turin, Italy, September 1-5, 2008, Proceedings (Lecture Notes in Computer Science). – М.: , 2008. – 205 с.
  54. Gabor Pusztai. Managing Higher Education: Theory and Applications in Higher Education Reform. – М.: , 2008. – 84 с.
  55. CompTIA Security+: Certification Kit (комплект из 3 книг + 2 CD-ROM). – М.: Sybex, 2009. – 1440 с.
  56. Hamid R. Nemati. Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues (Advances in Information Security and Privacy). – М.: , 2009. – 414 с.
  57. Julian Talbot, Miles Jakeman. Security Risk Management Body of Knowledge (Wiley Series in Systems Engineering and Management). – М.: , 2009. – 445 с.
  58. Air Pollution Modeling and its Application XX (NATO Science for Peace and Security Series C: Environmental Security). – М.: , 2010. – 552 с.
  59. Essays on Philosophy, Politics & Economics: Integration & Common Research Projects (Stanford Economics and Finance). – М.: , 2010. – 348 с.
  60. Matjaz B. Juric, Marcel Krizevnik. WS-BPEL 2.0 for SOA Composite Applications with Oracle SOA Suite 11g. – М.: Packt Publishing, 2010. – 616 с.
  61. Editors Karl Maria Michael de Leeuw, Jan Bergstra. The History of Information Security: A Comprehensive Handbook. – М.: Elsevier Science, 2007. – 900 с.
  62. Color Theory and Its Application in Art and Design (With 55 Figures and 6 Color Plates) (IFIP International Federation for Information Processing). – М.: , 2008. – 248 с.
  63. Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards and Applications (Wireless Networks and Mobile Communications). – М.: , 2008. – 424 с.
  64. Sasu Tarkoma. Overlay Networks: Toward Information Networking. – М.: , 2010. – 260 с.
  65. Handbook of Information and Communication Security. – М.: , 2010. – 800 с.
  66. Professional Cocoa Application Security. – М.: , 2010. – 336 с.
  67. Francesco Marchioni. JBoss AS 5 Development. – М.: , 2010. – 416 с.
  68. John Paul Mueller. NET Development Security SolutionsTM. – М.: , 2003. – 472 с.
  69. Doug Howard, Kevin Prince. Security 2020: Reduce Security Risks This Decade. – М.: Wiley, 2010. – 336 с.
  70. Timothy Boronczyk. PHP and MySQL®. – М.: , 2008. – 342 с.
  71. Michael Cross. Developer's Guide to Web Application Security. – М.: , 2010. – 500 с.
  72. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с.
  73. Marcus Sachs. Securing IM and P2P Applications for the Enterprise. – М.: , 2010. – 650 с.
  74. Syngress. Check Point Next Generation with Application Intelligence Security Administration. – М.: , 2010. – 600 с.
  75. Dino Esposito. Microsoft ASP .NET and AJAX Architecting Web Applications. – М.: , 2009. – 352 с.
  76. Daniel Larson. Developing Service–Oriented AJAX Applications on the Microsoft Platform. – М.: , 2008. – 352 с.
  77. Mark S. Merkow. Building SET Applications for Secure Transactions. – М.: , 1998. – 416 с.
  78. David Rook. 10 Principles of Secure Web Application Development. – М.: , 2010. – 408 с.
  79. Huu Tue Huynh, Van Son Lai, Issouf Soumare. Stochastic Simulation and Applications in Finance with MATLAB Programs. – М.: Wiley, 2008. – 356 с.
  80. Professor Mario Cerrato. The Mathematics of Derivatives Securities with Applications in MATLAB. – М.: , 2011. – 512 с.
  81. Microsoft. Improving Web Application Security – Threats and Countermeasures. – М.: , 2003. – 960 с.
  82. Microsoft. Building Secure Microsoft ASP .NET Applications. – М.: , 2003. – 624 с.
  83. Wireless Application Protocol Forum, Ltd. Official Wireless Application Protocol 2.0. – М.: , 1999. – 768 с.
  84. Christopher Wells. Securing Ajax Applications. – М.: , 2007. – 250 с.
  85. Karen Yeung. Securing Compliance. – М.: , 2011. – 307 с.
  86. Jim Miller. Developing Secure Applications. – М.: , 2002. – 416 с.
  87. Kelly McGrew. Optimizing and Securing Cisco® AVVID Applications. – М.: , 2002. – 312 с.
  88. Ulrich Lang. CORBA Security for Distributed Application Development. – М.: , 2000. – 400 с.
  89. Security Analysis: Fifth Edition. – М.: , 1987. – 658 с.
  90. Ajax : A Beginner'S Guide. – М.: , 2011. – 475 с.
  91. Hacking Exposed Web 2.0: Web 2.0 Security Secrets And Solutions. – М.: , 2011. – 258 с.
  92. Citrix Xenapp™ Platinum Edition Advanced Concepts: The Official Guide. – М.: , 2011. – 454 с.
  93. Javaserver Faces 2.0, The Complete Reference. – М.: , 2011. – 752 с.
  94. Ajax: The Complete Reference. – М.: , 2011. – 654 с.
  95. Oracle Database Ajax & Php Web Application Development. – М.: , 2011. – 458 с.
  96. Asp.Net 3.5: A Beginner'S Guide. – М.: , 2011. – 448 с.
  97. Principles Of Computer Security, Comptia Security+ And Beyond, Second Edition. – М.: , 2011. – 0 с.
  98. Microsoft Visual Studio 2008 Programming. – М.: , 2011. – 442 с.
  99. Asp.Net 4.0 Programming. – М.: , 2011. – 400 с.
  100. Oracle Webcenter 11G Handbook. – М.: , 2011. – 528 с.
  101. Applied Sap Bi 7.0 Web Reports: Using Bex Web Analyzer And Web Application Designer. – М.: , 2011. – 512 с.
  102. Applied Oracle Security: Developing Secure Database And Middleware Environments. – М.: , 2011. – 640 с.
  103. Oracle Self-Service Applications. – М.: , 2011. – 320 с.
  104. Mobile Application Security. – М.: , 2011. – 432 с.
  105. Peoplesoft Peopletools Tips & Techniques. – М.: , 2011. – 640 с.
  106. Hacking Exposed Web Applications, 3Rd Edition. – М.: , 2011. – 482 с.
  107. Oracle Database 11G Building Xml Applications. – М.: , 2011. – 416 с.
  108. Oracle Application Server Portal Handbook. – М.: , 2011. – 597 с.
  109. Mike Meyers' Comptia A+ Guide: Practical Application, Third Edition (Exam 220-702). – М.: , 2011. – 0 с.
  110. CWNA: Certified Wireless Network Administrator & CWSP Certified Wireless Security Professional All-in-One Exam Guide. – М.: , 2011. – 0 с.
  111. Inc. KT Solutions, KT Solutions has focused on what it takes to create efficient, professional multimedia training t KT Solutions specializes in the development of interactive multimedia training products for computer applications. Over the past decade. Beginning Windows NT Workstation 4.0 (Microsoft Windows NT). – М.: , . –  с.
  112. Inc. KT Solutions, KT Solutions has focused on what it takes to create efficient, professional multimedia training t KT Solutions specializes in the development of interactive multimedia training products for computer applications. Over the past decade. Advanced Word for Office 97 (Microsoft Word 97). – М.: , . –  с.
  113. Thomas Porter, Jan Kanclirz Jr. Practical VoIP Security. – М.: Syngress, 2006. – 564 с.
  114. Thomas Porter, Michael Gough. How to Cheat at Voip Security (How to Cheat) (How to Cheat) (How to Cheat). – М.: , 2007. – 432 с.
  115. Edgar K. Browning, Mark A. Zupan. Microeconomic Theory & Applications. – М.: , 2005. – 624 с.
  116. Ido Dubrawsky. How to Cheat at Securing Your Network. – М.: Syngress, 2007. – 432 с.
  117. Timothy Stapko. Practical Embedded Security: Building Secure Resource-Constrained Systems. – М.: Newnes, 2007. – 480 с.
  118. Jess Chadwick, Todd Snyder, Hrusikesh Panda. Programming ASP.NET MVC 4: Developing Real-World Web Applications with ASP.NET MVC. – М.: O'Reilly Media, 2012. – 492 с.
  119. Zdziarski. Hacking and Securing iOS Applications. – М.: , 2012. –  с.
  120. Wenhua Wang and Yu Lei. Web Application Testing And Security Testing Techniques Design. – М.: LAP Lambert Academic Publishing, 2011. – 96 с.
  121. Vinav Keshari. Secure Web Service:Encryption. – М.: LAP Lambert Academic Publishing, 2012. – 72 с.
  122. Rajani Sharma and Rajender Trivedi. Data Security in a Cloud Environment using Multilevel UEC. – М.: LAP Lambert Academic Publishing, 2014. – 84 с.
  123. George S. Oreku. ENHANCING E-COMMERCE SECURITY. – М.: LAP Lambert Academic Publishing, 2011. – 212 с.
  124. Ajit Danti and Hiremath P. S. Face Detection & Recognition. – М.: LAP Lambert Academic Publishing, 2012. – 140 с.
  125. Anshul Sharma and Sunil Agrawal. Filters In Halftone Visual Cryptography Via Error Diffusion. – М.: LAP Lambert Academic Publishing, 2013. – 108 с.
  126. Kesner Ajax. A pastoral response to Haitian Vodou. – М.: LAP Lambert Academic Publishing, 2013. – 88 с.
  127. Someshwar Gande and Srilatha Rondla. Security Testing for Web Applications in SDLC. – М.: LAP Lambert Academic Publishing, 2013. – 96 с.
  128. Tarek S. Sobh. Effective and Extensive VPN for Securing Web Applications. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  129. Wei Ren. Lightweight and Robust Security for Applications in Internet of Things. – М.: LAP Lambert Academic Publishing, 2013. – 188 с.
  130. Abdel-Latif Elkouny. Secured Image and Video Stream Across Wireless Networks. – М.: LAP Lambert Academic Publishing, 2011. – 120 с.
  131. Dimitrios Baltazis. Dynamic Authorizations for Secure Internet Applications. – М.: LAP Lambert Academic Publishing, 2012. – 152 с.
  132. Md. Hamidul Islam. Security Issues of Web Applications in Asp.Net Platform. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  133. Mohammed Firdos Alam Sheikh. Improving Web Security by Blocking SQL Injection Attack(SQLIA). – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  134. Cyrus Abanti Makori,Jane Onsongo and Lusiba Badru. ICT Security Applications. – М.: LAP Lambert Academic Publishing, 2012. – 112 с.
  135. Hassen Alsafi and Mohammed Azhruddin. The Security Issues for Smart Grids Applications on Cloud Computing. – М.: LAP Lambert Academic Publishing, 2013. – 60 с.
  136. Muhammad Qaiser Saleem,Jafreezal Jaafar and Mohd Fadzil Hassan. Modeling Security Objectives along BPM of SOA Applications. – М.: LAP Lambert Academic Publishing, 2013. – 236 с.
  137. Harsh Vikram Singh. Information Hiding Techniques for Image Covers. – М.: LAP Lambert Academic Publishing, 2010. – 148 с.
  138. Dakshina Ranjan Kisku,Phalguni Gupta and Massimo Tistarelli. Multibiometrics Systems: Modern Perspectives to Identity Verification. – М.: LAP Lambert Academic Publishing, 2012. – 176 с.
  139. Anvar Akhmedjanov. Security in SAP NetWeaver 7.0 Application Server ABAP. – М.: LAP Lambert Academic Publishing, 2011. – 128 с.
  140. Jose Fonseca. Evaluating the [In]security of Web Applications. – М.: LAP Lambert Academic Publishing, 2011. – 408 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

Ничего не найдено

Образцы работ

Тема и предметТип и объем работы
Последствия операции НАТО
Политология
Диплом
80 стр.
Платежные системы в Интернете
Информатика
Диплом
102 стр.
Роль ОБСЕ в урегулировании конфликтов в Европе
Политология
Курсовая работа
33 стр.
Привлекательности труда в организации
Психология
Курсовая работа
35 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Луиза, 12.04
Все остались довольны! о чудо, такое в мгу бывает крайне редко, сами знаете :) Спасибо Вам Большое за очередную помощь!!! с понедельника возобновляем работу по дипломной...