Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Elizabeth M. Morgan. You've Earned Your Doctorate in Psychology . Now What?: Securing a Job As an Academic or Professional Psychologist. – М.: , 2012. – 244 с. Online Business All-In-One For Dummies. – М.: , 2012. – 704 с. Terrorism and the Olympics: Major Event Security and Lessons for the Future. – М.: , 2012. – 272 с. Jennifer Openshaw. What's Your Net Worth?: Click Your Way to Wealth. – М.: , 0. – 0 с. Paul Shaw. E-Business Privacy and Trust: Planning and Management Strategies. – М.: , 0. – 0 с. Ann E. Kingsolver. More Than Class: Studying Power in U.S. Workplaces (Suny Series in the Anthropology of Work). – М.: , 0. – 0 с. Jodie-Beth Galos, Sandy McIntosh. Firing Back : Power Strategies for Cutting the Best Deal When You're About to Lose Your Job. – М.: , 0. – 0 с. Robert Kehn, Adams Media Corporation. Internet Job Search Almanac (Admas Internet Job Search Almanac, 6th Ed). – М.: , 0. – 0 с. Carl Bergquist. Guide to Electronic Surveillance Devices. – М.: Prompt (DPI - 8/01), 2002. – 280 с. Gian Luca Foresti, Carlo S. Regazzoni, Pramod K. Varshney. Multisensor Surveillance Systems: The Fusion Perspective. – М.: , 0. – 0 с. William Beaver. Overseas Americans: The Essential Guide to Living and Working Abroad. – М.: , 0. – 0 с. David E. Mulcahy. Materials Handling Handbook. – М.: , 0. – 0 с. Rebecca Herold. The Privacy Papers: Managing Technology, Consumer, Employee and Legislative Actions. – М.: , 0. – 0 с. Charles Jennings, Elizabeth Dyson, Lori Fena. The Hundredth Window: Protecting Your Privacy and Security in the Age of the Internet. – М.: , 0. – 0 с. Physical Security and the Inspection Process. – М.: , 0. – 0 с. Henry Chan, Raymond Lee, Tharam Dillon, Elizabeth Chang, Henry Chan, Raymond Lee, Tharam Dillon. Electronic Commerce: Fundamentals & Applications. – М.: , 0. – 0 с. Paul Gerrard, Neil Thompson. Risk Based E-Business Testing. – М.: , 0. – 0 с. Katherine Tasheff Carlton. Webworks: E-Commerce. – М.: Rockport Publishers, 2001. – 180 с. Joel Siegel. The International Handbook of Electronic Commerce. – М.: , 0. – 0 с. Chris Minnick, Margaret Minnick. CIW E-Commerce Designer Certification Bible. – М.: , 0. – 0 с. Richard Mansfield. Visual Basic .NET All in One Desk Reference for Dummies. – М.: , 0. – 0 с. Roberta Bragg. MCSE Training Guide (70-220): Windows 2000 Network Security Design, Second Edition. – М.: , 0. – 0 с. Peter Varhol. Implementing a World Wide Web Site for Your Organization. – М.: , 0. – 0 с. Bhavani Thuraisingham. Web Data Management and Electronic Commerce. – М.: , 0. – 0 с. James T. Thomes. Dotcons: Con Games, Fraud & Deceit on the Internet. – М.: , 0. – 0 с. Peter Loshin, John Vacca, Paul A. Murphy. Electronic Commerce, Third Edition. – М.: , 0. – 0 с. Jonathan S. Held, John R. Bowers. Securing E-Business Applications and Communications. – М.: , 0. – 0 с. Jae K. Shim, Anique A. Qureshi, Joel G. Siegel, Roberta M. Siegel. The International Handbook of Electronic Commerce. – М.: , 0. – 0 с. Vesna Hassler. Security Fundamentals for E-Commerce (Artech House Computer Security Series). – М.: , 0. – 0 с. Debra Cameron. The World Wide Web: Strategies and Opportunities for Business. – М.: , 0. – 0 с. Simson Garfinkel, Gene Spafford. Web Security & Commerce (O'Reilly Nutshell). – М.: , 0. – 0 с. Dan Coughlin. Corporate Catalysts: How To Make Your Company More Successful, Whatever Your Title, Income, or Authority. – М.: , 2005. – 0 с. Julia Rutherford Silvers. Professional Event Coordination (The Wiley Event Management Series). – М.: , 2003. – 0 с. Gordon E. Smith. E-Commerce: A Control and Security Guide. – М.: , 2003. – 0 с. Preston Gralla. Complete Idiot's Guide To Online Shopping (The Complete Idiot's Guide). – М.: , 2003. – 0 с. Brad Kleindl. E-Commerce Marketing. – М.: , 2004. – 0 с. Joe Y Eng. China Investment Environment & Strategies : The Key to Winning in the Greater China Market. – М.: , 2005. – 0 с. Curt Simmons. iPhoto 2 for Dummies. – М.: , 2003. – 355 с. Rickland Hollar. Enterprise Web Services Security (Internet Series). – М.: , 2005. – 432 с. Betty E. Biringer, Rudolph V. Matalucci, Sharon L. O'Connor. Security Risk Assessment and Management: A Professional Practice Guide for Protecting Buildings and Infrastructures. – М.: , 2007. – 384 с. Remapping East Asia: The Construction Of A Region (Cornell Studies in Political Economy). – М.: , 2005. – 315 с. John Berry. Offshoring Opportunities : Strategies and Tactics for Global Competitiveness. – М.: , 2005. – 272 с. Allen G. Taylor. SQL For Dummies. – М.: For Dummies, 2006. – 432 с. Michael Blyth. Risk and Security Management: Protecting People and Sites Worldwide. – М.: , 2008. – 402 с. Akiko Nanami. Non-Governmental Organisations in Japanese Foreign Aid Strategy: Partners or Challengers?. – М.: , 2008. – 304 с. Bob LeVitus, Jeff Evans. WebMaster Windows: How to Build Your Own World Wide Web Server Without Really Trying (+ CD-ROM). – М.: AP Professional, 1997. – 512 с. Alexander Lohr. Measurability of IT/IT-Security: Business process mapping as technical systems. – М.: , 2010. – 56 с. Jeffrey C. Hooke. Security Analysis and Business Valuation on Wall Street + Companion Web Site: A Comprehensive Guide to Today's Valuation Methods. – М.: Wiley, 2010. – 408 с. Klaus W. Grewlich. Governance in "Cyberspace: Access and Public Interest in Global Communications (Law and Electronic Commerce, V. 9). – М.: , 0. – 0 с. Security Analysis and Business Valuation on Wall Street + Companion Web Site. – М.: , 2010. – 432 с. Bud E. Smith. Google Business Solutions All–in–One For Dummies®. – М.: , 2009. – 792 с. Todd Klindt, Shane Young, Steve Caravajal. Professional SharePoint 2010 Administration. – М.: Wiley Publishing, Inc, 2010. – 840 с. Alan Dershowitz. The Case for Peace. – М.: , 2006. – 256 с. iSafe. i–SAFE Internet Life Skills Activities. – М.: , 2010. – 160 с. Matthew Keefe. Flash® and PHP Bible. – М.: , 2008. – 508 с. Angelo Micheletti. iPhoto ?09 For Dummies®. – М.: , 2009. – 288 с. Greg Holden. Starting an Online Business For Dummies®. – М.: , 2010. – 432 с. Louise Levison. Filmmakers and Financing: Business Plans for Independents. – М.: Рид Элсивер, Focal Press, 2010. – 304 с. Ted Pattison, Andrew Connell, Scot Hillier, and David Mann. Inside Microsoft SharePoint 2010. – М.: Microsoft Press, 2011. – 648 с. Conor O'Reilly. Policing Global Risks. – М.: , 2011. – 272 с. Construction Site Security. – М.: , 2006. – 438 с. Hacking Exposed Web 2.0: Web 2.0 Security Secrets And Solutions. – М.: , 2011. – 258 с. The Complete Book Of Home, Site And Office Security. – М.: , 2011. – 309 с. How To Do Everything Netobjects Fusion 11. – М.: , 2011. – 432 с. Asp.Net 4.0 Programming. – М.: , 2011. – 400 с. Small Business Web Sites Made Easy. – М.: , 2011. – 272 с. Secure Metrics: A Beginners Guide. – М.: , 2011. – 400 с. Microsoft Sharepoint 2010 Quicksteps. – М.: , 2011. – 288 с. Oracle Application Server Portal Handbook. – М.: , 2011. – 597 с. Powershell For Microsoft Sharepoint 2010 Administrators. – М.: , 2011. – 368 с. How To Sell Anything On Amazon...And Make A Fortune!. – М.: , 2011. – 384 с. CWNA: Certified Wireless Network Administrator & CWSP Certified Wireless Security Professional All-in-One Exam Guide. – М.: , 2011. – 0 с. Craig Schiller, Seth Fogie, Colby DeRodeff, Michael Gregg. InfoSecurity 2008 Threat Analysis. – М.: Syngress, 2007. – 480 с. HTML, CSS, and JavaScript Mobile Development For Dummies. – М.: , 2013. – 432 с. Messay Mulugeta. Resettlement and food security nexus in ETHIOPIA. – М.: LAP Lambert Academic Publishing, 2012. – 352 с. Sukanta Sarkar. Human Trafficking and Sexual Exploitation. – М.: LAP Lambert Academic Publishing, 2012. – 568 с. Yasir Waseem Iqbal. Sociology Of Networking. – М.: LAP Lambert Academic Publishing, 2013. – 88 с. Nouran El-Hawary. The Graffiti of Mohamed Mahmoud. – М.: LAP Lambert Academic Publishing, 2014. – 128 с. Zenebe Adimassu. More Secured, More Conserved?. – М.: LAP Lambert Academic Publishing, 2012. – 68 с. Bayisa Tufa Kebede. Assessment of the distribution and importance of weeds. – М.: LAP Lambert Academic Publishing, 2012. – 84 с. Pulikesh Naidu. Socio-ecological Niche for Biofuel Production. – М.: LAP Lambert Academic Publishing, 2013. – 100 с. Md. Shafiqul Islam. Present Status of Homestead Nursery of CARE-LIFT Project. – М.: LAP Lambert Academic Publishing, 2012. – 72 с. Ajit Kumar Paswan and Rakesh Kumar. Efficacy of separate and premix formulation of herbicides on weeds. – М.: LAP Lambert Academic Publishing, 2013. – 72 с. Osilamah Solomon Imhomoh. Post-harvest Losses and Food Sustainability Challenges. – М.: LAP Lambert Academic Publishing, 2012. – 120 с. Md. Shafiqul Islam. Fallow Land and Unused Land Management Practices in Bangladesh. – М.: LAP Lambert Academic Publishing, 2015. – 52 с. Godfrey Tawodzera. Urban Food Security in Zimbabwe. – М.: LAP Lambert Academic Publishing, 2012. – 372 с. Syed Tanweer and Asadur Rahman. Power System Analysis By Distributed Generation. – М.: LAP Lambert Academic Publishing, 2014. – 56 с. Shailendra Bajpai and J. P. Gupta. Site Security. – М.: LAP Lambert Academic Publishing, 2011. – 88 с. Maximiliano Emanuel Korstanje. Interpreting Tourism In Times Of Uncertainess. – М.: LAP Lambert Academic Publishing, 2011. – 172 с. Angela Maly. Politics of Park51. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Rick De Vos. Imagination, Realisation and the Performing of Australia. – М.: LAP Lambert Academic Publishing, 2010. – 208 с. Girma Kassa. Issues of Expropriation:The Law and the practice in Oromia. – М.: LAP Lambert Academic Publishing, 2012. – 156 с. Ayyaswamy Kathirvel and Rengaramanujam Srinivasan. Monograph: Umpiring Security Model & Performance improvement on MANETS. – М.: LAP Lambert Academic Publishing, 2011. – 172 с. Carol Woody. Applying Security Risk Management to Internet Connectivity. – М.: LAP Lambert Academic Publishing, 2009. – 180 с. Andrew Hope. Internet Risk @ School. – М.: LAP Lambert Academic Publishing, 2011. – 236 с. Yi Ren. Security Mechanisms in Unattended Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2013. – 164 с. Amel Chowdhury. Deployment of a Secure VoIP System. – М.: LAP Lambert Academic Publishing, 2014. – 68 с. Natarajan Meghanathan,DeShante C. Johnson and Alexander R. Geoghegan. An Analysis of Software Security Attacks and Mitigation Controls. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Hossein Pour Taheri and Ab Razak Che Hussin. Cloud Base E-Commerce Trust Model. – М.: LAP Lambert Academic Publishing, 2012. – 120 с. Wole Olatokun. Information Technology Tools and Applications. – М.: LAP Lambert Academic Publishing, 2011. – 296 с. Yasser Alshehri. Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 156 с. Shafi'i Muhammad Abdulhamid. Privacy And National Security Challenges in Online Social Networks. – М.: LAP Lambert Academic Publishing, 2013. – 64 с. A.Sankara Narayanan. The Best 50 Websites for IT Professionals. – М.: LAP Lambert Academic Publishing, 2012. – 68 с. Fatty Mustafa Salem,Maged Hamada Ibrahim and Ibrahim Ismail Ibrahim. Efficient and Secure Message Transmission in Vehicular Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 96 с. Mohammed Abu Hamada. Client Side Action Against Cross Site Scripting Attacks. – М.: LAP Lambert Academic Publishing, 2013. – 68 с. Jagdish Halde. Basics of SQL injection Analysis, Detection and Prevention. – М.: LAP Lambert Academic Publishing, 2014. – 68 с. Dusan Davidovic and Ioannis Kanalis. Information Protection in Critical infrastructure protection. – М.: LAP Lambert Academic Publishing, 2014. – 84 с. Manar Hannoun. The Voice of Silence. – М.: LAP Lambert Academic Publishing, 2013. – 80 с. CheongJong Lee. Hybridizing Old Downtown, Suwon City. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Дополнительные результаты Francis Groves. Corporate Actions - A Concise Guide: An introduction to securities events. – М.: , 2012. – 230 с. Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с. Elizabeth M. Morgan. You've Earned Your Doctorate in Psychology . Now What?: Securing a Job As an Academic or Professional Psychologist. – М.: , 2012. – 244 с. Data Privacy Management and Autonomous Spontaneus Security: 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, ... Computer Science / Security and Cryptology). – М.: , 2012. – 334 с. Security and Privacy in Mobile Information and Communication Systems: Third International ICST Conference, MOBISEC 2011, Aalborg, Denmark, May 17-19, ... and Telecommunications Engineering). – М.: , 2012. – 195 с. Constructive Side-Channel Analysis and Secure Design: Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings ... Computer Science / Security and Cryptology). – М.: , 2012. – 280 с. Public Key Infrastructures, Services and Applications: 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected ... Computer Science / Security and Cryptology). – М.: , 2012. – 219 с. Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – М.: , 2012. – 283 с. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 515 с. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с. Smart Card Research and Advanced Applications: 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, ... Computer Science / Security and Cryptology). – М.: , 2012. – 357 с. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с. Online Business All-In-One For Dummies. – М.: , 2012. – 704 с. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с. Security and Development in Global Politics: A Critical Comparison. – М.: , 2012. – 360 с. Joseph F. Stenken JD CLU ChFc. Social Security & Medicare Facts 2012. – М.: , 2012. – 451 с. Luis Lobo-Guerrero. Insuring Security: Biopolitics, security and risk. – М.: , 2012. – 178 с. Ricardo Mariano Roura. The Footprint of Polar Tourism: Tourist Behaviour at Cultural Heritage Sites in Antarctica and Svalbard (Circumpolar Studies). – М.: , 2012. – 306 с. CCH Editorial Staff. Social Security Explained 2012. – М.: , 2012. – 298 с. Terrorism and the Olympics: Major Event Security and Lessons for the Future. – М.: , 2012. – 272 с. Sheila R Ronis. Economic Security: Neglected Dimension of National Security?. – М.: , 2012. – 128 с. Denise Garcia. Disarmament Diplomacy and Human Security: Regimes, Norms and Moral Progress in International Relations. – М.: , 2012. – 0 с. Securities Compliance Index. Securities Compliance Index, Second Edition: A Topical Guide To U.S. Securities Regulation. – М.: , 2012. – 512 с. American Bar Association, Thomas Lee Hazen. Securities Regulation: Corporate Counsel Guides. – М.: , 2012. – 540 с. Lionel Martellini, Philippe Priaulet, StA©phane Priaulet. Fixed-Income Securities : Valuation, Risk Management and Portfolio Strategies (The Wiley Finance Series). – М.: , 0. – 0 с. Jeffrey C. Hooke. Security Analysis on Wall Street. – М.: , 0. – 0 с. Martin Stone, Spencer Strauss. Secure Your Financial Future Investing in Real Estate. – М.: , 0. – 0 с. William Rini. Fundamentals of the Securities Industry. – М.: , 0. – 0 с. Frank J. Fabozzi, John N. Dunlevy, Frank J. Fabozzi, John N. Dunlevy. Real Estate Backed Securities. – М.: , 0. – 0 с. David F. Teitelbaum. The Procrastinator's Guide to Financial Security: How Anyone Over 40 Can Still Build a Strong Portfolio--and Retire Comfortably. – М.: , 0. – 0 с. Giorgio S. Questa. Fixed Income Analysis for the Global Financial Market: Money Market, Foreign Exchange, Securities, and Derivatives. – М.: Wiley, 1999. – 368 с. Bambi Holzer. Retire Rich : The Baby Boomer's Guide to a Secure Future. – М.: , 0. – 0 с. Peter A. Diamond. Taxation, Incomplete Markets, and Social Security (Munich Lectures). – М.: , 0. – 0 с. William T. Moore. Real Options and Option-Embedded Securities. – М.: , 0. – 0 с. Jennifer Openshaw. What's Your Net Worth?: Click Your Way to Wealth. – М.: , 0. – 0 с. Marilyn Greenstein, Todd M. Feinman. Electronic Commerce: Security Risk Management and Control. – М.: , 0. – 0 с. Paul Shaw. E-Business Privacy and Trust: Planning and Management Strategies. – М.: , 0. – 0 с. Kenneth S. Hackel, Joshua Livnat. Cash Flow and Security Analysis. – М.: , 0. – 0 с. Changmin Chun. Cross-border Transactions of Intermediated Securities: A Comparative Analysis in Substantive Law and Private International Law. – М.: , 2012. – 524 с. James M. Lowrance. Are Revenue Sharing Article/Content Publishing Sites Beneficial?: Legitimate Opportunities for Authors. – М.: , 2012. – 100 с. Paul Osterman. Securing Prosperity: The American Labor Market: How It Has Changed and What to Do About It. – М.: , 0. – 0 с. Jianmin Zhao, Bruce J. Dickson, Chien-Min Zhao. Remaking the Chinese State: Strategies, Society, and Security (Asia's Transformations). – М.: , 0. – 0 с. Lenore G. Martin. New Frontiers in Middle East Security. – М.: , 0. – 0 с. Martin S. Feldstein, Horst Siebert. Social Security Pension Reform in Europe. – М.: , 0. – 0 с. Rattan Lal, David Hansen, Norman Uphoff, Steven Slack, Rattan Lal. Food Security and Environmental Quality in the Developing World. – М.: , 0. – 0 с. Frank J. Fabozzi, Frank J. Fabozzi. Investing In Commercial Mortgage-Backed Securities. – М.: , 0. – 0 с. Henry J. Bailey, Richard B. Hagedorn. Secured Transactions in a Nutshell Nutshell Series) (4th ed). – М.: , 0. – 0 с. Douglas Hearth, Janis K. Zaima, Janis Zaima. Contemporary Investments: Security and Portfolio Analysis. – М.: , 0. – 0 с. Dean Baker, Mark Weisbrot. Social Security: The Phony Crisis. – М.: , 0. – 0 с. Andrew W. Lo. The Industrial Organization and Regulation of the Securities Industry (National Bureau of Economic Research Conference Report). – М.: , 0. – 0 с. Sylvester J. Schieber, John B. Shoven. The Real Deal: The History and Future of Social Security. – М.: , 0. – 0 с. Henry J. Aaron, John B. Shoven, Benjamin M. Friedman, Alvin Hansen Symposium on Public Policy 1998 Harvard University). Should the United States Privatize Social Security? (Alvin Hansen Symposium Series on Public Policy). – М.: , 0. – 0 с. John B. Shoven. Administrative Aspects of Investment-Based Social Security Reform (Conference Report (National Bureau of Economic Research).). – М.: , 0. – 0 с. Risk Management, Speculation, and Derivative Securities. – М.: , 0. – 0 с. Allen W., Ph.D. Smith. The Alleged Budget Surplus, Social Security, and Voodoo Economics. – М.: , 0. – 0 с. Pam Lassiter. The New Job Security. – М.: , 0. – 0 с. David S. Katz, Ilan Caspi, David S. Katz, Ilan Caspi. Executive's Guide to Personal Security. – М.: , 0. – 0 с. Mary Ellen Belfiore, Tracey A. Defoe, Sue Folinsbee, Judy Hunter, Nancy S. Jackson, In-Sites Research Group. Reading Work: Literacies in the New Workplace. – М.: , 0. – 0 с. Ann E. Kingsolver. More Than Class: Studying Power in U.S. Workplaces (Suny Series in the Anthropology of Work). – М.: , 0. – 0 с. Paul Voillis, Paul Viollis. Jane's Workplace Security Handbook. – М.: , 0. – 0 с. Gerald Kovacich. The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition. – М.: , 0. – 0 с. James E. Lukaszewski, James M. Alexander. Corporate Activism on the Internet : Rogue Activist Web Sites. – М.: , 0. – 0 с. Jodie-Beth Galos, Sandy McIntosh. Firing Back : Power Strategies for Cutting the Best Deal When You're About to Lose Your Job. – М.: , 0. – 0 с. Robert Kehn, Adams Media Corporation. Internet Job Search Almanac (Admas Internet Job Search Almanac, 6th Ed). – М.: , 0. – 0 с. Jack W. Plunkett, Plunkett Research Ltd. Plunkett's Employers' Internet Sites With Careers Information : The Only Complete Guide to Careers Websites Operated by Major Employers (Plunkett's em. – М.: , 0. – 0 с. Safety and the Security Professional : A Guide to Occupational Safety and Health Strategies. – М.: , 0. – 0 с. Jack W. Plunkett, Plunkett Research Ltd. Plunkett's Employers' Internet Sites With Careers Information 2002-2003: The Only Complete Guide to Careers Websites Operated by Major Employers). – М.: , 0. – 0 с. Jack W. Plunkett. Plunkett's Employers' Internet Sites With Careers Information 2004-2005: The Only Guide to America's Hottest Corporate Internet Sites for Job Seekers ... ers' Internet Sites With Careers Information). – М.: , 0. – 0 с. Asset Protection and Security Management Handbook. – М.: , 0. – 0 с. Alexis Gutzman. Unforeseen Circumstances : Strategies and Technologies for Protecting Your Business and Your People in a Less Secure World. – М.: , 0. – 0 с. Safe Schools: A Security and Loss Prevention Plan. – М.: , 0. – 0 с. Dennis Dalton. Rethinking Corporate Security in the Post 9-11 Era. – М.: , 2003. – 0 с. Security Operations Management. – М.: , 0. – 0 с. Security Management : Business Strategies for Success. – М.: , 0. – 0 с. Sandra M. Rocks. The ABCs of the Ucc Article 8 Investment Securities. – М.: , 0. – 0 с. Susan Echaore-McDavid. Career Opportunities in Law Enforcement, Security, and Protective Services (The Career Opportunities Series). – М.: , 0. – 0 с. Kristina M. Ackley. 100 Top Internet Job Sites: Get Wired, Get Hired in Today's New Job Market. – М.: , 0. – 0 с. Philip P. Purpura. The Security Handbook. – М.: , 0. – 0 с. Carl Bergquist. Guide to Electronic Surveillance Devices. – М.: Prompt (DPI - 8/01), 2002. – 280 с. Gian Luca Foresti, Carlo S. Regazzoni, Pramod K. Varshney. Multisensor Surveillance Systems: The Fusion Perspective. – М.: , 0. – 0 с. William Beaver. Overseas Americans: The Essential Guide to Living and Working Abroad. – М.: , 0. – 0 с. Leigh Wade. Careers in Private Security: How to Get Started, How to Get Ahead. – М.: , 0. – 0 с. Anne McKinney. Real Resumes for Police, Law Enforcement and Security Jobs: Including Real Resumes Used to Change Careers and Transfer Skills to Other Industries). – М.: , 0. – 0 с. Christopher M. Dent. Asia-Pacific Economic and Security Co-Operation: New Regional Agendas. – М.: , 0. – 0 с. Dean Baker, Mark Weisbrot, Dean Baker. Social Security: The Phony Crisis. – М.: , 0. – 0 с. Henry J. Aaron, Robert D. Reischauer. Countdown to Reform: The Greater Social Security Debate. – М.: , 0. – 0 с. Bert H. McLachlan. Saving Social Security: (From Congress). – М.: , 0. – 0 с. John Dixon, Mark Hyde. The Marketization of Social Security. – М.: , 0. – 0 с. Martin S. Feldstein, Jeffrey B. Liebman. The Distributional Aspects of Social Security and Social Security Reform (National Bureau of Economic Research Conference Report). – М.: , 0. – 0 с. Robert M. Ball, Thomas N. Bethell. Insuring the Essentials: Bob Ball on Social Security. – М.: , 0. – 0 с. Gavin Cawthra. Securing South Africa's Democracy: Defense, Development and Security in Transition (International Political Economy Series). – М.: , 0. – 0 с. Werner Draguhn, Robert Ash. China's Economic Security. – М.: , 0. – 0 с. John Attarian. Social Security: False Consciousness and Crisis. – М.: , 0. – 0 с. Maurice, Ph.D. Youakim. Social Security and Medicare for the New Millenium. – М.: , 0. – 0 с. Stephen?J Feinberg. Homeland Security and Economic Prosperity: Defending Our Country and the Survival of American Capitalism. – М.: , 0. – 0 с. Allen W., Ph.D. Smith. The Looting of Social Security: How the Government Is Draining Americas Retirement Account. – М.: , 0. – 0 с. Joel Seligman. The Transformation of Wall Street: A History of the Securities and Exchange Commission and Modern Corporate Finance. – М.: , 0. – 0 с. Arthur Benavie. Social Security Under the Gun: What Every Informed Citizen Needs to Know About Pension Reform. – М.: , 0. – 0 с. Lori Ann Thrupp. Cultivating Diversity: Agrobiodiversity and Food Security. – М.: , 0. – 0 с. Rehabilitati International Conference on Brownfield Sites: Assessment, D. Almorza, H. Klapperich, C. A. Brebbia, David Almorza Gomar, Wessex Institute of Technology, Universidad De Cadiz. Brownfield Sites : Assessment, Rehabilitation and Development. – М.: , 0. – 0 с. Julia Lowell, C. R. Neu, Daochi Tong, National Defense Research Institute, National Security Research Institute. Financial Crises and Contagion in Emerging Market Countries. – М.: , 0. – 0 с. Physical Security and the Inspection Process. – М.: , 0. – 0 с. Joseph S. Nye, William A. Owens, James R. Schlesinger, R. James Woolsey, James A. Lewis, Joseph S., Jr. Nye, James Andrew Lewis, Erin Schlather, Csis Commission on Technology Security in the Twenty-First Century. Computer Exports and National Security: New Tools for a New Century : A Report of the Csis Commission on Technology Security in the 21St-Century (Csis Panel Reports.). – М.: , 0. – 0 с. Roberta Bragg. MCSE Training Guide (70-220): Windows 2000 Network Security Design, Second Edition. – М.: , 0. – 0 с. Peter Varhol. Implementing a World Wide Web Site for Your Organization. – М.: , 0. – 0 с. Jonathan S. Held, John R. Bowers. Securing E-Business Applications and Communications. – М.: , 0. – 0 с. Vesna Hassler. Security Fundamentals for E-Commerce (Artech House Computer Security Series). – М.: , 0. – 0 с. Simson Garfinkel, Gene Spafford. Web Security & Commerce (O'Reilly Nutshell). – М.: , 0. – 0 с. Gordon E. Smith. E-Commerce: A Control and Security Guide. – М.: , 2003. – 0 с. Rickland Hollar. Enterprise Web Services Security (Internet Series). – М.: , 2005. – 432 с. Betty E. Biringer, Rudolph V. Matalucci, Sharon L. O'Connor. Security Risk Assessment and Management: A Professional Practice Guide for Protecting Buildings and Infrastructures. – М.: , 2007. – 384 с. Committee on Federal Regulation of Securities Committee. The Fund Director's Guidebook: Third Edition (Fund Director's Guidebook). – М.: , 2006. – 128 с. Michael Blyth. Risk and Security Management: Protecting People and Sites Worldwide. – М.: , 2008. – 402 с. Meridian Securities Market. World Stock Exchange Fact Book. – М.: , 2008. – 0 с. CompTIA Security+: Certification Kit (комплект из 3 книг + 2 CD-ROM). – М.: Sybex, 2009. – 1440 с. Jeffrey C. Hooke. Security Analysis and Business Valuation on Wall Street + Companion Web Site: A Comprehensive Guide to Today's Valuation Methods. – М.: Wiley, 2010. – 408 с. Security Analysis and Business Valuation on Wall Street + Companion Web Site. – М.: , 2010. – 432 с. Matthew Keefe. Flash® and PHP Bible. – М.: , 2008. – 508 с. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с. Construction Site Security. – М.: , 2006. – 438 с. Hacking Exposed Web 2.0: Web 2.0 Security Secrets And Solutions. – М.: , 2011. – 258 с. The Complete Book Of Home, Site And Office Security. – М.: , 2011. – 309 с. Small Business Web Sites Made Easy. – М.: , 2011. – 272 с. Secure Metrics: A Beginners Guide. – М.: , 2011. – 400 с. CWNA: Certified Wireless Network Administrator & CWSP Certified Wireless Security Professional All-in-One Exam Guide. – М.: , 2011. – 0 с. Messay Mulugeta. Resettlement and food security nexus in ETHIOPIA. – М.: LAP Lambert Academic Publishing, 2012. – 352 с. Zenebe Adimassu. More Secured, More Conserved?. – М.: LAP Lambert Academic Publishing, 2012. – 68 с. Godfrey Tawodzera. Urban Food Security in Zimbabwe. – М.: LAP Lambert Academic Publishing, 2012. – 372 с. Shailendra Bajpai and J. P. Gupta. Site Security. – М.: LAP Lambert Academic Publishing, 2011. – 88 с. Carol Woody. Applying Security Risk Management to Internet Connectivity. – М.: LAP Lambert Academic Publishing, 2009. – 180 с. Yi Ren. Security Mechanisms in Unattended Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2013. – 164 с. Amel Chowdhury. Deployment of a Secure VoIP System. – М.: LAP Lambert Academic Publishing, 2014. – 68 с. Natarajan Meghanathan,DeShante C. Johnson and Alexander R. Geoghegan. An Analysis of Software Security Attacks and Mitigation Controls. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Yasser Alshehri. Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 156 с. Shafi'i Muhammad Abdulhamid. Privacy And National Security Challenges in Online Social Networks. – М.: LAP Lambert Academic Publishing, 2013. – 64 с. Fatty Mustafa Salem,Maged Hamada Ibrahim and Ibrahim Ismail Ibrahim. Efficient and Secure Message Transmission in Vehicular Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 96 с. Mohammed Abu Hamada. Client Side Action Against Cross Site Scripting Attacks. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
Лучшие результаты Ничего не найдено Дополнительные результаты Ничего не найдено Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Нина Здравствуйте Юлия. Защита прошла на "Ура"! Отметка-отлично. Кошмарный сон позади. Спасибо за помощь и сотрудничество!