Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Doug Howard, Kevin Prince. Security 2020: Reduce Security Risks This Decade. – М.: Wiley, 2010. – 336 с. Дополнительные результаты Jerome L. Stein. Stochastic Optimal Control and the U.S. Financial Debt Crisis. – М.: , 2012. – 173 с. Victoria A. Greenfield, Henry H. Willis, Tom LaTourrette. Assessing the Benefits of U.S. Customs and Border Protection Regulatory Actions to Reduce Terrorism Risks. – М.: , 2012. – 158 с. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с. Amanda Kay McVety. Enlightened Aid: U.S. Development as Foreign Policy in Ethiopia. – М.: , 2012. – 312 с. Anupam Ghosh. Information Sharing in Supply Chain: The Role of Governance Mechanisms. – М.: , 2012. – 152 с. Richard Lehman, Lawrence G. McMillan. New Insights on Covered Call Writing: The Powerful Technique That Enhances Return and Lowers Risk in Stock Investing. – М.: , 0. – 0 с. Julian Walmsley. International Money and Foreign Exchange Markets : An Introduction. – М.: , 0. – 0 с. Marilyn Greenstein, Todd M. Feinman. Electronic Commerce: Security Risk Management and Control. – М.: , 0. – 0 с. Miichael Neugart, Klaus Schsmann. Forecasting Labour Markets in Oecd Countries: Measuring and Tackling Mismatches (Labour Markets and Employment Policy Series). – М.: , 0. – 0 с. Martin Feldstein. Economic and Financial Crises in Emerging Market Economies (Nber Conference Report). – М.: , 0. – 0 с. Peter B. Kenen. The International Financial Architecture: What's New? What's Missing. – М.: , 0. – 0 с. Tsuneo Akaha. Politics and Economics in the Russian Far East: Changing Ties With Asia-Pacific. – М.: , 0. – 0 с. Risk Management, Speculation, and Derivative Securities. – М.: , 0. – 0 с. Terrell Ward Bynum, Simon Rogerson, Blackwell Pub. Computer Ethics and Professional Responsibility: Introductory Text and Readings. – М.: , 0. – 0 с. Anthony Baron, Suzanne Hoffman, James G. Merrill. When Work Equals Life : The Next Stage of Workplace Violence. – М.: , 0. – 0 с. Christina E. Newhill. Client Violence in Social Work Practice: Prevention, Intervention, and Research. – М.: , 0. – 0 с. Karen Ginsburg Wood. Don't Sabotage Your Success! Make Office Politics Work. – М.: , 0. – 0 с. Gerald Kovacich. The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition. – М.: , 0. – 0 с. Protecting Business Information : A Manager's Guide. – М.: , 0. – 0 с. Bill Smith. Buy a Business Close to Home. – М.: , 0. – 0 с. Philip P. Purpura. The Security Handbook. – М.: , 0. – 0 с. Hana Polackova Brixi, Allen Schick. Government at Risk: Contingent Liabilities and Fiscal Risk. – М.: , 0. – 0 с. Ian Bannon, Paul Collier. Natural Resources and Violent Conflict: Options and Actions. – М.: , 0. – 0 с. W. Kip Viscusi. The Risks of Terrorism (Studies in Risk and Uncertainty, 15). – М.: , 0. – 0 с. Charles W. Smithson. Managing Financial Risk: A Guide to Derivative Products, Financial Engineering, and Value Maximization. – М.: McGraw-Hill, 1998. – 664 с. John Y. Campbell, Andrew W. Lo, A. Craig MacKinlay. The Econometrics of Financial Markets. – М.: Princeton University Press, 0. – 632 с. Brian Eales. Financial Engineering. – М.: , 0. – 0 с. Frank J. Fabozzi, Chuck Ramsey, Michael Marz. The Handbook of Nonagency Mortgage-Backed Securities, 2nd Edition. – М.: , 0. – 0 с. Peter J. Klein. Getting Started in Security Analysis. – М.: , 0. – 0 с. Jianping Mei, Hsien-Hsing Liao, Prof. Hsien-Hsing Liao. Asset Pricing. – М.: , 0. – 0 с. Rebecca Herold. The Privacy Papers: Managing Technology, Consumer, Employee and Legislative Actions. – М.: , 0. – 0 с. Mary Pat McCarthy, Stuart Campbell. Security Transformation: Digital Defense Strategies to Protect your Company's Reputation and Market Share. – М.: , 0. – 0 с. Rudolph C. Kimiecik. Loss Prevention Guide for Retail Businesses. – М.: , 0. – 0 с. Preventing Corporate Embezzlement. – М.: , 0. – 0 с. Steve Purser. A Practical Guide to Managing Information Security (Artech House Technology Management Library). – М.: , 0. – 0 с. Donn B. Parker. Fighting Computer Crime : A New Framework for Protecting Information. – М.: , 0. – 0 с. Office & Office Building Security. – М.: , 0. – 0 с. Ultimate Financial Security Survey. – М.: , 0. – 0 с. Christopher J. Alberts, Audrey J. Dorofee. Managing Information Security Risks: The OCTAVE Approach. – М.: , 0. – 0 с. Daniel Jennings, Joseph Boyce. Information Assurance. – М.: , 0. – 0 с. Silver Lake Editors, Silver Lake Editors. Protect Yourself!: Using Insurance, Personal Security and Common Sense to Keep Your Family, Things and Body Safe. – М.: , 0. – 0 с. I. Kooijman, Jaap Kooijman. And the Pursuit of National Health.The Incremental Strategy Toward National Health Insurance in the United States of America.(Amsterdam Monographs in American Studies 8). – М.: , 0. – 0 с. Wendy Bliss. Legal, Effective References: How to Give and Get Them. – М.: , 0. – 0 с. Oded Goldreich. Foundations of Cryptography: Basic Tools. – М.: , 0. – 0 с. Charles Carrington, Timothy Speed, Juanita Ellis, Steffano Korper. Enterprise Directory and Security Implementation Guide: Designing and Implementing Directories in Your Organization (The Korper and Ellis E-Commerce Books Series). – М.: , 0. – 0 с. C. Warren Axelrod, Axelrod. Outsourcing Information Security. – М.: , 0. – 0 с. Anup K. Ghosh. E-Commerce Security and Privacy. – М.: , 0. – 0 с. Debra Cameron. The World Wide Web: Strategies and Opportunities for Business. – М.: , 0. – 0 с. W. E. Perry, J. Kuong. Edp Risk Analysis and Controls Justification (Enterprise Protection, Control, Audit, Security, Risk Management and busineSs Continuity). – М.: , 0. – 0 с. Gene Tidrick. China: An Evaluation of World Bank Assistance (Operations Evaluation Study). – М.: , 2005. – 0 с. Maxx Dilley. Natural Disaster Hotspots: A Global Risk Analysis (Disaster Risk Management). – М.: , 2005. – 0 с. Christopher A. Crayton. Security + Exam Guide (Testtaker's Guide Series). – М.: , 2003. – 0 с. Post-Conflict Economies in Africa (International Economic Association). – М.: , 2005. – 0 с. Carol Matheson Connell. A Business in Risk : Jardine Matheson and the Hong Kong Trading Industry. – М.: , 2004. – 0 с. Hrishikesh (Rick) D Vinod. Preparing for the Worst : Incorporating Downside Risk in Stock Market Investments (Wiley Series in Probability and Statistics). – М.: , 2004. – 0 с. Nigel Nicholson. Traders: Risks, Decisions, and Management in Financial Markets. – М.: , 2004. – 0 с. Economics of Information Security (Advances in Information Security). – М.: , 2004. – 0 с. Sari Greene. Security Policies and Procedures : Principles and Practices (Security). – М.: , 2005. – 0 с. Ernest Jordan. Beating IT Risks. – М.: , 2005. – 0 с. Christopher G. Bauer. Better Ethics Now: How to Avoid the Ethics Disaster You Never Saw Coming. – М.: , 2005. – 0 с. Harry H. Panjer. Operational Risk : Modeling Analytics. – М.: Wiley-Interscience, 2006. – 448 с. Betty E. Biringer, Rudolph V. Matalucci, Sharon L. O'Connor. Security Risk Assessment and Management: A Professional Practice Guide for Protecting Buildings and Infrastructures. – М.: , 2007. – 384 с. The Handbook of Country Risk: A Guide to International Business and Trade. – М.: , 2007. – 462 с. Frank J. Fabozzi, Steven V. Mann. Securities Finance: Securities Lending and Repurchase Agreements (Frank J. Fabozzi Series). – М.: , 2005. – 351 с. Frank Vielba, Carol Vielba. Reducing the M&A Risks: The Role of IT in Mergers and Acquisitions. – М.: , 2006. – 216 с. Pat Choate. Dangerous Business: The Risks of Globalization for America. – М.: , 2008. – 288 с. Stephen Gough. Sustainability and Security within Liberal Societies: Learning to Live with the Future (Routledge Studies in Social and Political Thought). – М.: , 2008. – 148 с. Andy Walker. Windows Lockdown!: Your XP and Vista Guide Against Hacks, Attacks, and Other Internet Mayhem (Absolute Beginner's Guide). – М.: , 2008. – 480 с. Julian Talbot, Miles Jakeman. Security Risk Management Body of Knowledge (Wiley Series in Systems Engineering and Management). – М.: , 2009. – 445 с. The Risks of Prescription Drugs (A Columbia / SSRC Book (Privatization of Risk)). – М.: , 2010. – 128 с. Alan Calder, Steve G Watkins. Information Security Risk Management for ISO27001 / ISO27002. – М.: , 2010. – 198 с. Carl Young. Metrics and Methods for Security Risk Management. – М.: , 2010. – 296 с. Jeffrey C. Hooke. Security Analysis and Business Valuation on Wall Street + Companion Web Site: A Comprehensive Guide to Today's Valuation Methods. – М.: Wiley, 2010. – 408 с. Evan Wheeler. Security Risk Management: Building an Information Security Risk Management Program from the Ground Up. – М.: , 2011. – 360 с. The Risks of Prescription Drugs. – М.: Columbia University Press, 2010. – 184 с. Pensions, Social Security, and the Privatization of Risk (A Columbia / SSRC Book (Privatization of Risk)). – М.: , 2008. – 128 с. Dan Forsberg, Gunther Horn, Wolf-Dietrich Moeller, Valtteri Niemi. LTE Security. – М.: John Wiley and Sons, Ltd, 2010. – 304 с. Doug Howard, Kevin Prince. Security 2020: Reduce Security Risks This Decade. – М.: Wiley, 2010. – 336 с. Gregory A. Keoleian. Product Life Cycle Assessment to Reduce Health Risks and Environmental Impacts. – М.: , 2010. – 299 с. C Thomas Mitchell. User–Responsive Design – Reducing the Risk of Failure. – М.: , 2002. – 224 с. Comptia Security+ All-In-One Exam Guide, Second Edition (Exam Sy0-201). – М.: , 2011. – 0 с. Applied Oracle Security: Developing Secure Database And Middleware Environments. – М.: , 2011. – 640 с. Fundamentals Of Network Security. – М.: , 2011. – 672 с. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . – с. Dave Tyson. Security Convergence: Managing Enterprise Security Risk. – М.: , 2007. – 232 с. Eduardo Fernandez-Buglioni. Security Patterns in Practice: Designing Secure Architectures Using Software Patterns. – М.: Wiley, 2013. – 582 с. George S. Oreku. ENHANCING E-COMMERCE SECURITY. – М.: LAP Lambert Academic Publishing, 2011. – 212 с. Govind Sharma and Manish Gupta. Secure routing in wireless mobile Ad-Hoc network. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. S.H.M. Fakhruddin,Mukand S. Babel and Akiyuki Kawasaki. A decision support framework for flood risk management. – М.: LAP Lambert Academic Publishing, 2012. – 100 с. Anand Kannan. Evaluation of the Security Mechanisms in Cloud Networks. – М.: LAP Lambert Academic Publishing, 2013. – 192 с. Divya Sharma and Kamal Kant. Embedded Linux Porting on ARM & RFID Implementation Using ARM SoC. – М.: LAP Lambert Academic Publishing, 2013. – 84 с. Ubaid Ur Rahman and Farhana Shahid. RFID Based Library Management System. – М.: LAP Lambert Academic Publishing, 2013. – 108 с. Enangha Abeng. A Hybrid Hash Message Authentication Code (HMAC). – М.: LAP Lambert Academic Publishing, 2011. – 204 с. Tommaso Giusti. Fire Risk Management for Valuable Contents in Historical Buildings. – М.: Scholars' Press, 2014. – 452 с. Xinquan Yang. Sport Sponsorship in China. – М.: LAP Lambert Academic Publishing, 2012. – 172 с. Frank Mbaaga. Perceived Sexual HIV Risks and Prevention. – М.: LAP Lambert Academic Publishing, 2013. – 396 с. Umar Shehu Usman. Politics, Youth And Thuggery In Developing Societies. – М.: LAP Lambert Academic Publishing, 2012. – 144 с. Ditte Hjorth Laursen. Reaching the (in)visible men of Vientiane. – М.: LAP Lambert Academic Publishing, 2012. – 128 с. Michael D. Sears. Torturing Terrorists for National Security Imperatives. – М.: LAP Lambert Academic Publishing, 2014. – 68 с. Ajit Kumar Paswan and Rakesh Kumar. Efficacy of separate and premix formulation of herbicides on weeds. – М.: LAP Lambert Academic Publishing, 2013. – 72 с. Ishrat Fatima,Badar Naseem Siddiqui and Kanwal Naeem. Rural Youth and Food Security. – М.: LAP Lambert Academic Publishing, 2014. – 112 с. Monica Kansiime Kagorora. Management practices for reducing climate-induced production risks. – М.: LAP Lambert Academic Publishing, 2014. – 148 с. Shailendra Bajpai and J. P. Gupta. Site Security. – М.: LAP Lambert Academic Publishing, 2011. – 88 с. Sreepada Hegde and Vijayalaxmi Hegde. Risk Management. – М.: LAP Lambert Academic Publishing, 2013. – 72 с. Rose Namayanja Nsereko. Parliamentary oversight of the security sector in Uganda. – М.: LAP Lambert Academic Publishing, 2012. – 88 с. Katharina Leinius. An Imbalance between Security and Liberty?. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Carter Newman. Countering Nuclear Proliferation. – М.: LAP Lambert Academic Publishing, 2011. – 64 с. Yurii Bugai. The Role of Interest Groups in Shaping Ukraine's Energy Security. – М.: LAP Lambert Academic Publishing, 2013. – 152 с. Carol Woody. Applying Security Risk Management to Internet Connectivity. – М.: LAP Lambert Academic Publishing, 2009. – 180 с. George X. Lapousis. School Physical Education And Risk Factors For Cardiovascular Diseases. – М.: LAP Lambert Academic Publishing, 2012. – 160 с. Faraz Fatemi Moghaddam. Secure Cloud Computing with Client-Based Control System. – М.: LAP Lambert Academic Publishing, 2013. – 100 с. Wiem Tounsi. Security and Privacy Controls in RFID Systems. – М.: LAP Lambert Academic Publishing, 2014. – 172 с. Elliot Attipoe. Securing the Public Wireless Network. – М.: LAP Lambert Academic Publishing, 2013. – 92 с. Zheng Liu,Xue Li and Zhaoyang Dong. Improvements on Data Security Algorithms for Streaming Multimedia. – М.: LAP Lambert Academic Publishing, 2012. – 240 с. Firkhan Ali Hamid Ali. Vulnerability Analysis on the Computer Network Security. – М.: LAP Lambert Academic Publishing, 2010. – 72 с. Amel Chowdhury. Deployment of a Secure VoIP System. – М.: LAP Lambert Academic Publishing, 2014. – 68 с. Amr Abdel-Hamid and Sofiene Tahar. Watermarking Techniques for Intellectual Property Protection in SOC. – М.: LAP Lambert Academic Publishing, 2012. – 128 с. Usman Habib. Secure Mobile Authentication for Linux Workstation log on. – М.: LAP Lambert Academic Publishing, 2011. – 120 с. Mitko Bogdanoski,Aleksandar Risteski and Marjan Bogdanoski. Cyber operations - a permanent part of the global conflict. – М.: LAP Lambert Academic Publishing, 2014. – 60 с. G.M. Faysal Ahmad. Design and Implementation of a Common System for Office Digitization. – М.: LAP Lambert Academic Publishing, 2013. – 72 с. Tanveer Zia. A Security Framework for Wireless Sensor Networks (WSN). – М.: LAP Lambert Academic Publishing, 2013. – 160 с. frankie tvrz and marijke coetzee. Information Security of a Bluetooth-enabled handheld device. – М.: LAP Lambert Academic Publishing, 2010. – 180 с. Amnesh Goel and Nidhi Chandra. Secure Image Archival Based on Image Encryption Technique. – М.: LAP Lambert Academic Publishing, 2012. – 64 с. Nelly S. Medina. A Model for Direct Recording Electronic Voting Systems. – М.: LAP Lambert Academic Publishing, 2014. – 108 с. Muhammad Imran Tariq. SLA based Information Security Metrics in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2014. – 192 с. Bugra Karabey. Teorem. – М.: LAP Lambert Academic Publishing, 2012. – 116 с. Burcu Kulahc?oglu. Timed Automata as a Verification Tool for Security Protocols. – М.: LAP Lambert Academic Publishing, 2011. – 104 с. Kerem Beygo and Cihan Eraslan. Enhancing Security and Usability Features of NFC. – М.: LAP Lambert Academic Publishing, 2010. – 68 с. Ramon Arigoni Ortiz. The Value of Reducing Mortality Risk Associated with Air Pollution. – М.: LAP Lambert Academic Publishing, 2010. – 280 с. Abdul Sattar. Risk Management In Islamic Banking. – М.: LAP Lambert Academic Publishing, 2011. – 96 с. Supreena Narayanan. Risk Arbitrage in U.S. Financial Markets. – М.: LAP Lambert Academic Publishing, 2012. – 48 с. Ozioma Michael Ejiofor. Implementation of Traffic Monitoring System in Developing Countries. – М.: LAP Lambert Academic Publishing, 2014. – 88 с. Ying Qian. Mitigating Information Security Risks during Operation Transition. – М.: LAP Lambert Academic Publishing, 2012. – 372 с. Prakash Metaparti. Risk Management initiatives for post 9/11 Maritime Security. – М.: LAP Lambert Academic Publishing, 2011. – 336 с. Chris Cubbage. Security Risk Management in Corporate Governance. – М.: LAP Lambert Academic Publishing, 2010. – 140 с. Erastus Muthura,Kithinji Mungania and Margaret Muthura. Determinants Of Loan Repayment In Group Lending. – М.: LAP Lambert Academic Publishing, 2013. – 72 с. Viacheslav Kulish. Credit Risk Management. – М.: LAP Lambert Academic Publishing, 2014. – 108 с. Asit Ranjan Mohanty. Risk Management and Capital Measurement in Commercial Banks. – М.: Scholars' Press, 2014. – 256 с. Cengizhan Kaptan. Credit Insurance and Risk Mitigation. – М.: LAP Lambert Academic Publishing, 2014. – 104 с. K. V. R. Satyakumar,K. Arjun Goud and G. Sree Vani. Security analysis & Portfolio Management. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Лучшие результаты Ничего не найдено Дополнительные результаты Контроль реализации стратегии национальной безопасности Российской Федерации до 2020 года. Ю.А. Крохина, "Законодательство", № 3, март 2012 г. Risk-based pricing: посткризисные тенденции. А.В. Гидулян, "Банковское кредитование", N 1, январь-февраль 2012 г. О проекте долгосрочной Программы повышения эффективности исполнения судебных решений. 2011-2020 годы. В.М. Шерстюк, "Законодательство", N 11, ноябрь 2011 г. Стратегия-2020: богатые будут богаче. М. Хазин, О. Григорьев, "Консультант", N 21, ноябрь 2011 г. Развитие фармацевтической и медицинской промышленности РФ на период до 2020 года и дальнейшую перспективу. М.Р. Зарипова, "Аптека: бухгалтерский учет и налогообложение", N 1, январь 2011 г. К вопросу о реализации программы развития сестринского дела в Российской Федерации на 2010-2020 годы / И.С. Бахтина / Правовое обеспечение профессиональной деятельности среднего медицинского персонала: сб. науч. ст. Всерос. Науч.-практ. конф. /. С.-Петербург, 22-23 июня 2010. / под ред. Ю.Д. Сергеева. - Иваново, 2010. Кто вы, CHIEF RISK OFFICER. М. Уилкинсон, "Риск-менеджмент", № 9-10, сентябрь-октябрь 2008. Банки в 2020-м. С. Моисеев, "БДМ. Банки и деловой мир", № 9, сентябрь 2008. Комментарий к указаниям Центрального банка РФ от 04.06.2008 № 2017-У, от 04.06.2008 № 2018-У и от 04.06.2008 № 2020-У. "Консультант", № 16, август 2008. Концепция развития здравоохранения Российской Федерации до 2020.. Ф.Н. Кадыров, "Менеджер здравоохранения", № 8, август 2008. Комментарий к Указанию ЦБР от 4 июня 2008. № 2017-У, Указанию ЦБР от 4 июня 2008. № 2018-У и Указанию ЦБР от 4 июня 2008. № 2020-У. В.А. Лысых, "Нормативные акты для бухгалтера", № 14, июль 2008. Банки России до 2020 года: в русле оптимальной стратегии развития. Е.Е. Смирнов, "Регламентация банковских операций. Документы и комментарии", № 4, июль-август 2008. Задачи для концепции-2020. интервью с А. Вялковым, директором НИИ общественного здоровья и управления здравоохранением, академиком РАМН. М. Цуциев, "Бюджет", № 7, июль 2008. Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Андрей Спасибо большое, мы еще обратимся к вам по второй работе на следующий семестр (год).