Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Vineet Gera. Event Management and Planning: A complete guide to plan and execute the event. – М.: , 2012. – 252 с. Janet Portman Attorney, Marcia Stewart. Every Tenant's Legal Guide. – М.: , 2012. – 464 с. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с. Joseph F. Stenken JD CLU ChFc. Social Security & Medicare Facts 2012. – М.: , 2012. – 451 с. Dr. Angela D. Massey. Interview Skills: How to Get Hired NOW!: Quick Job Interview Success Tips. – М.: , 2012. – 70 с. David Gardner, Tom Gardner, Inc Motley Fool. The Motley Fool You Have More Than You Think : The Foolish Guide To Personal Finance. – М.: , 0. – 0 с. Paul Shaw. E-Business Privacy and Trust: Planning and Management Strategies. – М.: , 0. – 0 с. Timothy F. Carse, Jeffrey Slater. The Payroll Toolkit Nuts and Bolts Techniques to Help You Better Understand and Manage Your Payroll (Revised Second Edition). – М.: , 0. – 0 с. Minute Help Guides. The Small Business Reference Guide: The Complete Guide to Small Business Taxes and Business Start-Up. – М.: , 2012. – 68 с. Paul R. Krugman, Paul Krugman. The Age of Diminished Expectations, Third Edition. – М.: , 0. – 0 с. Abhijit Chaudhury, Jean-Pierre Kuilboer. E-Business & E-Commerce Infrastructure: Technologies Supporting the E-Business Initiative. – М.: , 0. – 0 с. Steve Albrecht. Fear & Violence on the Job: Prevention Solutions for the Dangerous Workplace. – М.: , 0. – 0 с. Paul Krugman. The Age of Diminished Expectations: U.S. Economic Policy in the 1990s. – М.: The MIT Press, 1997. – 244 с. Sophie Laws. Research for Development: A Practical Guide. – М.: , 0. – 0 с. Steven M. Kaplan. Wiley's English-Spanish, Spanish-English Business Dictionary. – М.: , 0. – 0 с. Red Ink : The Budget, Deficit, and Debt of the U.S. Government. – М.: , 0. – 0 с. Lisa Alexander. PharmRepSelect-Your Complete Guide to Getting a Pharmaceutical Sales Job. – М.: , 0. – 0 с. Kathryn Kraemer Troutman, Laura Sachs, Mike Ottenseyer, Mark Reichenbacher, Jessica Coffey. Ten Steps to a Federal Job: Navigating the Federal Job System, Writing Federal Resumes, Ksas and Cover Letters With a Mission. – М.: , 0. – 0 с. Robert Kehn, Adams Media Corporation. Internet Job Search Almanac (Admas Internet Job Search Almanac, 6th Ed). – М.: , 0. – 0 с. Joseph E. Rathjen. Locksmithing. – М.: , 0. – 0 с. Brian P. Carey. The Treasure Hunt: A Complete Guide to Interviewing. – М.: , 0. – 0 с. Vincent Bozzone. Speed to Market: Lean Manufacturing for Job Shops. – М.: , 0. – 0 с. Stacy Zemon, Zemon. The Mobile DJ Handbook: How to Start & Run a Profitable Mobile Disc Jockey Service, Second Edition. – М.: , 0. – 0 с. Ken Doughty. Business Continuity Planning: Protecting Your Organization's Life. – М.: , 0. – 0 с. Protecting Business Information : A Manager's Guide. – М.: , 0. – 0 с. Handbook of Management Information Systems. – М.: , 0. – 0 с. Gerald Grant, Christine E. Murray. Teaching in America: The Slow Revolution. – М.: , 0. – 0 с. Alan Kaminsky. A Complete Guide to Premises Security Litigation. – М.: , 0. – 0 с. Tariq Nadeem. Approved Professions for Canadian Immigration Vol.1 ( A to I) Under Federal Skilled Worker Class: Complete Job Description and Employment Requirements as per National Occupational Classification of Canada. – М.: , 0. – 0 с. Bert H. McLachlan. Saving Social Security: (From Congress). – М.: , 0. – 0 с. Frank J. Fabozzi, Steven V. Mann, Moorad Choudhry. The Global Money Markets. – М.: , 0. – 0 с. William Rini. Mathematics of the Securities Industry. – М.: , 0. – 0 с. Donal O'Mahony, Michael Peirce, Hitesh Tewari, O'Mahony Donal. Electronic Payment Systems for E-Commerce. – М.: , 0. – 0 с. John J. Giudice. The Global Custody Yearbook, 2001 Eighth Annual Survey, Presented by Buttonwood International. – М.: , 0. – 0 с. Mary Hunt. The Complete Cheapskate: How to Get Out of Debt, Stay Out, and Break Free from Money Worries Forever. – М.: , 0. – 0 с. Paul S. Turner, Diane B. Wunnicke. Managing the Risks of Payments Systems. – М.: , 0. – 0 с. Frank J. Fabozzi, Frank J. Fabozzi. Fixed Income Securities. – М.: , 0. – 0 с. Frank J. Fabozzi, T. Dessa Fabozzi, Sylvan G. Feldstein. Municipal Bond Portfolio Management. – М.: , 0. – 0 с. Donald Bruce Keim, William T. Ziemba. Security Market Imperfections in World Wide Equity Markets (Publications of the Newton Institute , No 9). – М.: , 0. – 0 с. Ben Baldwin. New Life Insurance Investment Advisor: Achieving Financial Security for You and your Family Through Today's Insurance Products. – М.: , 0. – 0 с. Peter J. Klein. Getting Started in Security Analysis. – М.: , 0. – 0 с. Steven A. Greenberg. Single Stock Futures: The Complete Guide. – М.: , 0. – 0 с. Gerald L. Kovacich, Edward P. Halibozek. The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, First Edition. – М.: , 0. – 0 с. Computer Security. – М.: , 0. – 0 с. Effective Security Management, Fourth Edition (Effective Security Management). – М.: , 0. – 0 с. Bruce Cohen, Brian FitzGerald. The Pension Puzzle : Your Complete Guide to Government Benefits, RRSPs and Employer Plans. – М.: , 0. – 0 с. Geoff Craighead. High-Rise Security and Fire Life Safety, Second Edition. – М.: , 0. – 0 с. Juanita Ellis, Tim Speed. The Internet Security Guidebook: From Planning to Deployment. – М.: , 0. – 0 с. Roberta Bragg. MCSE Training Guide (70-220): Windows 2000 Network Security Design, Second Edition. – М.: , 0. – 0 с. C. Warren Axelrod, Axelrod. Outsourcing Information Security. – М.: , 0. – 0 с. Harold F. Tipton, Micki Krause, Micki, Cissp Krause. Information Security Management Handbook, Fifth Edition. – М.: , 0. – 0 с. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с. Preston Gralla. Complete Idiot's Guide To Online Shopping (The Complete Idiot's Guide). – М.: , 2003. – 0 с. C.P.A. Michele Cagan. Everything Investing Book: Make Money, Plan Ahead, And Secure Your Financial Future! (Everything: Business and Personal Finance). – М.: , 2005. – 0 с. Fred S. Steingold. The Complete Guide to Selling a Business. – М.: , 2005. – 0 с. Seni Hazzan. Rebuilding from Ground Zero, An Empowering Guide to Building and Securing Wealth. – М.: , 2003. – 0 с. Roy S. Freedman. Introduction to Financial Technology (Complete Technology Guides for Financial Services). – М.: Academic Press, 2006. – 368 с. Betty E. Biringer, Rudolph V. Matalucci, Sharon L. O'Connor. Security Risk Assessment and Management: A Professional Practice Guide for Protecting Buildings and Infrastructures. – М.: , 2007. – 384 с. Ira Winkler. Zen and the Art of Information Security. – М.: , 2007. – 192 с. Aswath Damodaran. Damodaran on Valuation: Security Analysis for Investment and Corporate Finance (Wiley Finance). – М.: , 2006. – 685 с. Richard P. Majka. Series 7 Securities Licensing Exam Review Exam Cram (Exam Cram). – М.: , 2005. – 888 с. George Haddow, Jane Bullock. Introduction to Emergency Management, Second Edition (Butterworth-Heinemann Homeland Security). – М.: , 2005. – 424 с. Bill Phillips. The Complete Book of Locks and Locksmithing (Complete Book of Locks & Locksmithing). – М.: , 2005. – 576 с. John J. Fay. Encyclopedia of Security Management. – М.: Butterworth-Heinemann, 2007. – 688 с. Larry Henry. The Criminal Records Manual, 3rd Edition: Criminal Records in America: A Complete Guide to Legal, Ethical, and Public Policy Issues and Restrictions. – М.: , 2008. – 420 с. CompTIA Security+: Certification Kit (комплект из 3 книг + 2 CD-ROM). – М.: Sybex, 2009. – 1440 с. Bishara A. Bahbah. Wealth Management in Any Market: Timeless Strategies for Building Financial Security. – М.: , 2009. – 300 с. William Manning. CISM Certified Information Security Manager Certification Exam Preparation Course in a Book for Passing the CISM Exam - The How To Pass on Your First Try Certification Study Guide. – М.: , 2010. – 188 с. Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards and Applications (Wireless Networks and Mobile Communications). – М.: , 2008. – 424 с. Louis L. Straney. Securities Fraud. – М.: , 2010. – 208 с. Larry Volk, Danielle Currier. No Plastic Sleeves: The Complete Portfolio Guide for Photographers and Designers. – М.: Рид Элсивер, Focal Press, 2010. – 272 с. Dave Evans, Greg Jarboe, Hollis Thomases, Mari Smith, Chris Treadaway. Security Complete. – М.: , 2002. – 988 с. The Complete Guide to Securities Transactions. – М.: , 1989. – 400 с. Javaserver Faces 2.0, The Complete Reference. – М.: , 2011. – 752 с. Ajax: The Complete Reference. – М.: , 2011. – 654 с. Linux: The Complete Reference, Sixth Edition. – М.: , 2011. – 830 с. Principles Of Computer Security, Comptia Security+ And Beyond, Second Edition. – М.: , 2011. – 0 с. The Complete Book Of Home, Site And Office Security. – М.: , 2011. – 309 с. Rabi Jay. Sap® Netweaver Portal Technology: The Complete Reference. – М.: McGraw-Hill, 2008. – 736 с. Comptia Security+ All-In-One Exam Guide, Second Edition (Exam Sy0-201). – М.: , 2011. – 0 с. Citrix® Access Suite Security For It Administrators. – М.: , 2011. – 268 с. Kevin Loney. Oracle Database 11g: The Complete Reference. – М.: McGraw-Hill, 2009. – 1368 с. Unix: The Complete Reference, Second Edition. – М.: , 2011. – 912 с. Microsoft Office Access 2007: The Complete Reference. – М.: , 2011. – 0 с. Microsoft Windows Server 2008: The Complete Reference. – М.: , 2011. – 826 с. Businessobjects Xi (Release 2): The Complete Reference. – М.: , 2011. – 650 с. CWNA: Certified Wireless Network Administrator & CWSP Certified Wireless Security Professional All-in-One Exam Guide. – М.: , 2011. – 0 с. Network Security: The Complete Reference. – М.: , 2011. – 896 с. Fundamentals Of Network Security. – М.: , 2011. – 672 с. Oracle Database 10G The Complete Reference. – М.: , 2011. – 0 с. Will Schmied, Thomas W. Shinder, Robert J. Shimonski, Tony Piltzecker. MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network. Study Guide and DVD Training System (Exam 70-214). – М.: Syngress, . – 822 с. Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky. Cisco Security Professional's Guide to Secure Intrusion Detection Systems. – М.: , . – с. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . – с. Elias Khasner, Laura E. Hunter. MCSE Designing Security for a Windows Server 2003 Network: Exam 70-298. – М.: , . – с. Harold F. Tipton, Micki Krause. Information Security Management Handbook on CD-ROM, 2003 Edition. – М.: , . – с. Dave Tyson. Security Convergence: Managing Enterprise Security Risk. – М.: , 2007. – 232 с. Ido Dubrawsky, Jeremy Faircloth, Michael Gregg, Eli Faskha. Security+ Study Guide. – М.: , 2007. – 864 с. Michael Gregg, Eric Seagren, Angela Orebaugh, Matt Jonkman, Raffael Marty. How to Cheat at Configuring Open Source Security Tools (How to Cheat) (How to Cheat). – М.: , 2007. – 528 с. Michael Finneran. Voice Over WLANs: The Complete Guide. – М.: Newnes, 2007. – 400 с. Anand Kannan. Evaluation of the Security Mechanisms in Cloud Networks. – М.: LAP Lambert Academic Publishing, 2013. – 192 с. A.S.M. Mukter Zaman,Aryuanto Soetedjo and Md. Shabiul Islam. Embedded Smart Security System. – М.: LAP Lambert Academic Publishing, 2012. – 128 с. Mehmet Oztemel. A Secure RFID ID-Card System Via Robust Image Hashing. – М.: LAP Lambert Academic Publishing, 2011. – 64 с. T.C. Manjunath and Arun Kumar G. Examination Security System. – М.: LAP Lambert Academic Publishing, 2013. – 60 с. Nisar Ahmed Rana and Marya Gul. Image Encryption. – М.: LAP Lambert Academic Publishing, 2012. – 92 с. Rohit Das and Abhik Sarkar. Advanced Home Security System. – М.: LAP Lambert Academic Publishing, 2013. – 52 с. Sergey Nikolenko. Provably secure constructions in cryptography. – М.: LAP Lambert Academic Publishing, 2011. – 112 с. Sk. Ataur Rahaman. Taxation of Financial Securities in India. – М.: LAP Lambert Academic Publishing, 2013. – 292 с. Saba Owais. Household Food Security. – М.: LAP Lambert Academic Publishing, 2011. – 80 с. Eleni Charalampous. The feeling of security in mathematics. – М.: LAP Lambert Academic Publishing, 2013. – 108 с. Deepak Puthal and Bibhudatta Sahoo. Secure Data Collection & Critical Data Transmission in Mobile Sink WSN. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Vinothkumar Jambulingam. Secure and Anonymous Routing for Mobile Adhoc Networks. – М.: LAP Lambert Academic Publishing, 2014. – 72 с. Zheng Liu,Xue Li and Zhaoyang Dong. Improvements on Data Security Algorithms for Streaming Multimedia. – М.: LAP Lambert Academic Publishing, 2012. – 240 с. Wisam Elmasry. Securing WBAODV Routing Protocol in MANETs. – М.: LAP Lambert Academic Publishing, 2013. – 100 с. Amel Chowdhury. Deployment of a Secure VoIP System. – М.: LAP Lambert Academic Publishing, 2014. – 68 с. Natarajan Meghanathan,DeShante C. Johnson and Alexander R. Geoghegan. An Analysis of Software Security Attacks and Mitigation Controls. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Sudipta Dey. Development Of A Secured Object Oriented Model Of E-learning System. – М.: LAP Lambert Academic Publishing, 2012. – 264 с. Shubham Raina. System security through log analysis. – М.: LAP Lambert Academic Publishing, 2013. – 80 с. Nirmalya Kar and Sharmistha Roy. Secure Electronic Voting. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Mohammed Faisal. Integrative Framework of Requirement Engineering and Security System. – М.: LAP Lambert Academic Publishing, 2013. – 236 с. Mohamad Fazli Sabri,Husniyah Abdul Rahim and Mohamad Amim Othman. Retirement Confidence and Financial Security among Working Women. – М.: LAP Lambert Academic Publishing, 2015. – 132 с. Audu Jonathan Adoga and Fredah I. Agbeje. Introduction to Internet Security for PHP Web Developers. – М.: , 2014. – 52 с. Amran Din. Usable Security using GOMS. – М.: , 2015. – 168 с. Hieronymus Bosch: Complete Works. – М.: , . – с. Дополнительные результаты Francis Groves. Corporate Actions - A Concise Guide: An introduction to securities events. – М.: , 2012. – 230 с. Vineet Gera. Event Management and Planning: A complete guide to plan and execute the event. – М.: , 2012. – 252 с. Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с. Janet Portman Attorney, Marcia Stewart. Every Tenant's Legal Guide. – М.: , 2012. – 464 с. Randall Englund and Alfonso Bucero. The Complete Project Manager: Integrating People, Organizational, and Technical Skills. – М.: , 2012. – 0 с. Data Privacy Management and Autonomous Spontaneus Security: 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, ... Computer Science / Security and Cryptology). – М.: , 2012. – 334 с. Security and Privacy in Mobile Information and Communication Systems: Third International ICST Conference, MOBISEC 2011, Aalborg, Denmark, May 17-19, ... and Telecommunications Engineering). – М.: , 2012. – 195 с. Constructive Side-Channel Analysis and Secure Design: Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings ... Computer Science / Security and Cryptology). – М.: , 2012. – 280 с. Public Key Infrastructures, Services and Applications: 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected ... Computer Science / Security and Cryptology). – М.: , 2012. – 219 с. Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – М.: , 2012. – 283 с. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 515 с. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с. Smart Card Research and Advanced Applications: 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, ... Computer Science / Security and Cryptology). – М.: , 2012. – 357 с. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с. Security and Development in Global Politics: A Critical Comparison. – М.: , 2012. – 360 с. Joseph F. Stenken JD CLU ChFc. Social Security & Medicare Facts 2012. – М.: , 2012. – 451 с. Barbara Klein, Richard Alan Long, Kenneth Ray Blackman, Diane Lynne Goff, Stephen Paul Nathan, Moira. An Introduction to IMS: Your Complete Guide to IBM Information Management System (2nd Edition). – М.: , 2012. – 567 с. Luis Lobo-Guerrero. Insuring Security: Biopolitics, security and risk. – М.: , 2012. – 178 с. Malcolm McDonald. Marketing Plans: A Complete Guide in Pictures. – М.: , 2012. – 168 с. Richard A. Stanley. The Lexington Automobile: A Complete History. – М.: , 2012. – 263 с. Dr. Angela D. Massey. Interview Skills: How to Get Hired NOW!: Quick Job Interview Success Tips. – М.: , 2012. – 70 с. CCH Editorial Staff. Social Security Explained 2012. – М.: , 2012. – 298 с. Terrorism and the Olympics: Major Event Security and Lessons for the Future. – М.: , 2012. – 272 с. Sheila R Ronis. Economic Security: Neglected Dimension of National Security?. – М.: , 2012. – 128 с. Denise Garcia. Disarmament Diplomacy and Human Security: Regimes, Norms and Moral Progress in International Relations. – М.: , 2012. – 0 с. Securities Compliance Index. Securities Compliance Index, Second Edition: A Topical Guide To U.S. Securities Regulation. – М.: , 2012. – 512 с. American Bar Association, Thomas Lee Hazen. Securities Regulation: Corporate Counsel Guides. – М.: , 2012. – 540 с. Lionel Martellini, Philippe Priaulet, StA©phane Priaulet. Fixed-Income Securities : Valuation, Risk Management and Portfolio Strategies (The Wiley Finance Series). – М.: , 0. – 0 с. Jeffrey C. Hooke. Security Analysis on Wall Street. – М.: , 0. – 0 с. Stephane Reverre. The Complete Arbitrage Deskbook. – М.: , 0. – 0 с. Martin Stone, Spencer Strauss. Secure Your Financial Future Investing in Real Estate. – М.: , 0. – 0 с. Martin M. Shenkman. The Complete Book of Trusts, 3rd Edition. – М.: Wiley, 2002. – 320 с. Jennifer Basye Sander, Peter J. Sander, Jennifer Basye Sander. The Complete Idiot's Guide to Daytrading Like a Pro. – М.: , 0. – 0 с. William Rini. Fundamentals of the Securities Industry. – М.: , 0. – 0 с. David Gardner, Tom Gardner, Inc Motley Fool. The Motley Fool You Have More Than You Think : The Foolish Guide To Personal Finance. – М.: , 0. – 0 с. Frank J. Fabozzi, John N. Dunlevy, Frank J. Fabozzi, John N. Dunlevy. Real Estate Backed Securities. – М.: , 0. – 0 с. David F. Teitelbaum. The Procrastinator's Guide to Financial Security: How Anyone Over 40 Can Still Build a Strong Portfolio--and Retire Comfortably. – М.: , 0. – 0 с. Giorgio S. Questa. Fixed Income Analysis for the Global Financial Market: Money Market, Foreign Exchange, Securities, and Derivatives. – М.: Wiley, 1999. – 368 с. Bambi Holzer. Retire Rich : The Baby Boomer's Guide to a Secure Future. – М.: , 0. – 0 с. Peter A. Diamond. Taxation, Incomplete Markets, and Social Security (Munich Lectures). – М.: , 0. – 0 с. William T. Moore. Real Options and Option-Embedded Securities. – М.: , 0. – 0 с. Marilyn Greenstein, Todd M. Feinman. Electronic Commerce: Security Risk Management and Control. – М.: , 0. – 0 с. Paul Shaw. E-Business Privacy and Trust: Planning and Management Strategies. – М.: , 0. – 0 с. Timothy F. Carse, Jeffrey Slater. The Payroll Toolkit Nuts and Bolts Techniques to Help You Better Understand and Manage Your Payroll (Revised Second Edition). – М.: , 0. – 0 с. Kenneth S. Hackel, Joshua Livnat. Cash Flow and Security Analysis. – М.: , 0. – 0 с. Changmin Chun. Cross-border Transactions of Intermediated Securities: A Comparative Analysis in Substantive Law and Private International Law. – М.: , 2012. – 524 с. Minute Help Guides. The Small Business Reference Guide: The Complete Guide to Small Business Taxes and Business Start-Up. – М.: , 2012. – 68 с. Paul Osterman. Securing Prosperity: The American Labor Market: How It Has Changed and What to Do About It. – М.: , 0. – 0 с. Paul R. Krugman, Paul Krugman. The Age of Diminished Expectations, Third Edition. – М.: , 0. – 0 с. Abhijit Chaudhury, Jean-Pierre Kuilboer. E-Business & E-Commerce Infrastructure: Technologies Supporting the E-Business Initiative. – М.: , 0. – 0 с. Barbara Arena. Complete Idiot's Guide to Making Money with Your Hobby. – М.: , 0. – 0 с. Steve Albrecht. Fear & Violence on the Job: Prevention Solutions for the Dangerous Workplace. – М.: , 0. – 0 с. Kevin Doyle, Environmental Careers Organization, Tanya Stubbs, Bill New Complete Guide to Environmental Careers Sharp, Sam Heizman, Sam Heizmann. The Complete Guide to Environmental Careers in the 21st Century. – М.: , 0. – 0 с. Brian P. Carey. The Treasure Hunt: A Complete Guide to Interviewing. – М.: , 0. – 0 с. Bert H. McLachlan. Saving Social Security: (From Congress). – М.: , 0. – 0 с. William Rini. Mathematics of the Securities Industry. – М.: , 0. – 0 с. Mary Hunt. The Complete Cheapskate: How to Get Out of Debt, Stay Out, and Break Free from Money Worries Forever. – М.: , 0. – 0 с. Frank J. Fabozzi, Frank J. Fabozzi. Fixed Income Securities. – М.: , 0. – 0 с. Julia Lowell, C. R. Neu, Daochi Tong, National Defense Research Institute, National Security Research Institute. Financial Crises and Contagion in Emerging Market Countries. – М.: , 0. – 0 с. Donald Bruce Keim, William T. Ziemba. Security Market Imperfections in World Wide Equity Markets (Publications of the Newton Institute , No 9). – М.: , 0. – 0 с. Peter J. Klein. Getting Started in Security Analysis. – М.: , 0. – 0 с. Gerald L. Kovacich, Edward P. Halibozek. The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, First Edition. – М.: , 0. – 0 с. Computer Security. – М.: , 0. – 0 с. Effective Security Management, Fourth Edition (Effective Security Management). – М.: , 0. – 0 с. Joseph S. Nye, William A. Owens, James R. Schlesinger, R. James Woolsey, James A. Lewis, Joseph S., Jr. Nye, James Andrew Lewis, Erin Schlather, Csis Commission on Technology Security in the Twenty-First Century. Computer Exports and National Security: New Tools for a New Century : A Report of the Csis Commission on Technology Security in the 21St-Century (Csis Panel Reports.). – М.: , 0. – 0 с. Geoff Craighead. High-Rise Security and Fire Life Safety, Second Edition. – М.: , 0. – 0 с. Juanita Ellis, Tim Speed. The Internet Security Guidebook: From Planning to Deployment. – М.: , 0. – 0 с. Roberta Bragg. MCSE Training Guide (70-220): Windows 2000 Network Security Design, Second Edition. – М.: , 0. – 0 с. C. Warren Axelrod, Axelrod. Outsourcing Information Security. – М.: , 0. – 0 с. Harold F. Tipton, Micki Krause, Micki, Cissp Krause. Information Security Management Handbook, Fifth Edition. – М.: , 0. – 0 с. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с. Preston Gralla. Complete Idiot's Guide To Online Shopping (The Complete Idiot's Guide). – М.: , 2003. – 0 с. Fred S. Steingold. The Complete Guide to Selling a Business. – М.: , 2005. – 0 с. Betty E. Biringer, Rudolph V. Matalucci, Sharon L. O'Connor. Security Risk Assessment and Management: A Professional Practice Guide for Protecting Buildings and Infrastructures. – М.: , 2007. – 384 с. Ira Winkler. Zen and the Art of Information Security. – М.: , 2007. – 192 с. Committee on Federal Regulation of Securities Committee. The Fund Director's Guidebook: Third Edition (Fund Director's Guidebook). – М.: , 2006. – 128 с. Richard P. Majka. Series 7 Securities Licensing Exam Review Exam Cram (Exam Cram). – М.: , 2005. – 888 с. George Haddow, Jane Bullock. Introduction to Emergency Management, Second Edition (Butterworth-Heinemann Homeland Security). – М.: , 2005. – 424 с. Bill Phillips. The Complete Book of Locks and Locksmithing (Complete Book of Locks & Locksmithing). – М.: , 2005. – 576 с. John J. Fay. Encyclopedia of Security Management. – М.: Butterworth-Heinemann, 2007. – 688 с. Meridian Securities Market. World Stock Exchange Fact Book. – М.: , 2008. – 0 с. CompTIA Security+: Certification Kit (комплект из 3 книг + 2 CD-ROM). – М.: Sybex, 2009. – 1440 с. Bishara A. Bahbah. Wealth Management in Any Market: Timeless Strategies for Building Financial Security. – М.: , 2009. – 300 с. William Manning. CISM Certified Information Security Manager Certification Exam Preparation Course in a Book for Passing the CISM Exam - The How To Pass on Your First Try Certification Study Guide. – М.: , 2010. – 188 с. Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards and Applications (Wireless Networks and Mobile Communications). – М.: , 2008. – 424 с. Louis L. Straney. Securities Fraud. – М.: , 2010. – 208 с. Larry Volk, Danielle Currier. No Plastic Sleeves: The Complete Portfolio Guide for Photographers and Designers. – М.: Рид Элсивер, Focal Press, 2010. – 272 с. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с. Dave Evans, Greg Jarboe, Hollis Thomases, Mari Smith, Chris Treadaway. Security Complete. – М.: , 2002. – 988 с. The Complete Guide to Securities Transactions. – М.: , 1989. – 400 с. Javaserver Faces 2.0, The Complete Reference. – М.: , 2011. – 752 с. Ajax: The Complete Reference. – М.: , 2011. – 654 с. Linux: The Complete Reference, Sixth Edition. – М.: , 2011. – 830 с. Principles Of Computer Security, Comptia Security+ And Beyond, Second Edition. – М.: , 2011. – 0 с. The Complete Book Of Home, Site And Office Security. – М.: , 2011. – 309 с. Rabi Jay. Sap® Netweaver Portal Technology: The Complete Reference. – М.: McGraw-Hill, 2008. – 736 с. Comptia Security+ All-In-One Exam Guide, Second Edition (Exam Sy0-201). – М.: , 2011. – 0 с. Citrix® Access Suite Security For It Administrators. – М.: , 2011. – 268 с. Kevin Loney. Oracle Database 11g: The Complete Reference. – М.: McGraw-Hill, 2009. – 1368 с. Unix: The Complete Reference, Second Edition. – М.: , 2011. – 912 с. Microsoft Office Access 2007: The Complete Reference. – М.: , 2011. – 0 с. Microsoft Windows Server 2008: The Complete Reference. – М.: , 2011. – 826 с. CWNA: Certified Wireless Network Administrator & CWSP Certified Wireless Security Professional All-in-One Exam Guide. – М.: , 2011. – 0 с. Network Security: The Complete Reference. – М.: , 2011. – 896 с. Fundamentals Of Network Security. – М.: , 2011. – 672 с. Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky. Cisco Security Professional's Guide to Secure Intrusion Detection Systems. – М.: , . – с. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . – с. Harold F. Tipton, Micki Krause. Information Security Management Handbook on CD-ROM, 2003 Edition. – М.: , . – с. Dave Tyson. Security Convergence: Managing Enterprise Security Risk. – М.: , 2007. – 232 с. Ido Dubrawsky, Jeremy Faircloth, Michael Gregg, Eli Faskha. Security+ Study Guide. – М.: , 2007. – 864 с. Michael Gregg, Eric Seagren, Angela Orebaugh, Matt Jonkman, Raffael Marty. How to Cheat at Configuring Open Source Security Tools (How to Cheat) (How to Cheat). – М.: , 2007. – 528 с. Michael Finneran. Voice Over WLANs: The Complete Guide. – М.: Newnes, 2007. – 400 с. Sue Elliott, Emma Heyderman, David McKeegan. Complete Key for Schools (комплект из 2 книг + 2 CD). – М.: Cambridge University Press, 2013. – с. Guy Brook-Hart, Helen Tiliouine, Barbara Thomas, Amanda Thomas. Complete First for Schools Student's Pack (комплект из 2 книг + 2 CD-ROM). – М.: Cambridge University Press, 2014. – 264 с. Anand Kannan. Evaluation of the Security Mechanisms in Cloud Networks. – М.: LAP Lambert Academic Publishing, 2013. – 192 с. A.S.M. Mukter Zaman,Aryuanto Soetedjo and Md. Shabiul Islam. Embedded Smart Security System. – М.: LAP Lambert Academic Publishing, 2012. – 128 с. Mehmet Oztemel. A Secure RFID ID-Card System Via Robust Image Hashing. – М.: LAP Lambert Academic Publishing, 2011. – 64 с. T.C. Manjunath and Arun Kumar G. Examination Security System. – М.: LAP Lambert Academic Publishing, 2013. – 60 с. Nisar Ahmed Rana and Marya Gul. Image Encryption. – М.: LAP Lambert Academic Publishing, 2012. – 92 с. Rohit Das and Abhik Sarkar. Advanced Home Security System. – М.: LAP Lambert Academic Publishing, 2013. – 52 с. Sergey Nikolenko. Provably secure constructions in cryptography. – М.: LAP Lambert Academic Publishing, 2011. – 112 с. Sk. Ataur Rahaman. Taxation of Financial Securities in India. – М.: LAP Lambert Academic Publishing, 2013. – 292 с. Saba Owais. Household Food Security. – М.: LAP Lambert Academic Publishing, 2011. – 80 с. Eleni Charalampous. The feeling of security in mathematics. – М.: LAP Lambert Academic Publishing, 2013. – 108 с. Deepak Puthal and Bibhudatta Sahoo. Secure Data Collection & Critical Data Transmission in Mobile Sink WSN. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Zheng Liu,Xue Li and Zhaoyang Dong. Improvements on Data Security Algorithms for Streaming Multimedia. – М.: LAP Lambert Academic Publishing, 2012. – 240 с. Wisam Elmasry. Securing WBAODV Routing Protocol in MANETs. – М.: LAP Lambert Academic Publishing, 2013. – 100 с. Amel Chowdhury. Deployment of a Secure VoIP System. – М.: LAP Lambert Academic Publishing, 2014. – 68 с. Natarajan Meghanathan,DeShante C. Johnson and Alexander R. Geoghegan. An Analysis of Software Security Attacks and Mitigation Controls. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Sudipta Dey. Development Of A Secured Object Oriented Model Of E-learning System. – М.: LAP Lambert Academic Publishing, 2012. – 264 с. Shubham Raina. System security through log analysis. – М.: LAP Lambert Academic Publishing, 2013. – 80 с. Nirmalya Kar and Sharmistha Roy. Secure Electronic Voting. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Mohammed Faisal. Integrative Framework of Requirement Engineering and Security System. – М.: LAP Lambert Academic Publishing, 2013. – 236 с. Mohamad Fazli Sabri,Husniyah Abdul Rahim and Mohamad Amim Othman. Retirement Confidence and Financial Security among Working Women. – М.: LAP Lambert Academic Publishing, 2015. – 132 с. Audu Jonathan Adoga and Fredah I. Agbeje. Introduction to Internet Security for PHP Web Developers. – М.: , 2014. – 52 с. Amran Din. Usable Security using GOMS. – М.: , 2015. – 168 с.
Лучшие результаты Ничего не найдено Дополнительные результаты Ничего не найдено Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Марина Здравствуйте, Мария! Вы очень оперативно работаете, я даже не думала, что в этом месяце уже может быть готова вся теоретическая часть!