Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Igor Botian. Software Security Vulnerabilities in Mobile Peer-to-peer Environment. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Дополнительные результаты Security and Privacy in Mobile Information and Communication Systems: Third International ICST Conference, MOBISEC 2011, Aalborg, Denmark, May 17-19, ... and Telecommunications Engineering). – М.: , 2012. – 195 с. Eseosa Obadiaru. The Global Financial Meltdown And The Nigerian Capital Market: Appraisal Of The Effect Of The Global Financial Meltdown On Security Values In The Nigerian Capital Market. – М.: , 2012. – 104 с. Larry Lankton, Larry D. Cradle to Grave Lankton. Beyond the Boundaries: Life and Landscape at the Lake Superior Copper Mines 1840-1875. – М.: , 0. – 0 с. Charles R. Hulten, Edwin Dean, Michael J. Harper, Conference on Research in Income and Wealth. New Developments in Productivity Analysis (Studies in Income and Wealth, Vol 63). – М.: , 0. – 0 с. James E. Post, Lee E. Preston, Sybille Sauter-Sachs. Redefining the Corporation: Stakeholder Management and Organizational Wealth. – М.: , 0. – 0 с. Peter Madlem, Larry D. Edwards. Power Investing With Basket Securities: The Investor's Guide to Exchange-Traded Funds. – М.: , 0. – 0 с. Ee-Peng Lim, Keng Siau. Advances in Mobile Commerce Technologies. – М.: , 0. – 0 с. Ray Ramon. Technology Solutions for Growing Businesses. – М.: , 0. – 0 с. Marko Nordquist. Towards Improved Security Management Practice: Designing an Organizational Model Procedure for the Implementation of Information Security Management in Heterogeneous Information Management. – М.: , 0. – 0 с. Mark Warda. How to Form a Corporation in Florida (How to Form a Corporation in Florida). – М.: , 0. – 0 с. Anup K. Ghosh. E-Commerce Security and Privacy. – М.: , 0. – 0 с. Gunjan Samtani, Marcus Healey, Shyam Samtani. B2B Integration: A Practical Guide to Collaborative E-Commerce. – М.: , 0. – 0 с. Climate Change And Global Food Security (Books in Soils, Plants, and the Environment). – М.: , 2005. – 0 с. Paul Petillo. Building Wealth in a Paycheck-to-Paycheck World. – М.: , 2004. – 0 с. Fundraising in Diverse Cultural and Giving Environments: New Directions for Philanthropic Fundraising, No. 37. – М.: , 2003. – 0 с. Aden Hogan. Infrastructure Security Planning in an Unstable World: : A Public Officials' Guide to Security. – М.: , 2005. – 0 с. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с. Tourism, Security and Safety: From Theory to Practice (The Management of Hospitality and Tourism Enterprises). – М.: , 2005. – 376 с. Jeanne Machado. Employment Opportunities in Education: How To Secure Your Career. – М.: , 2005. – 192 с. Stephen Gough. Sustainability and Security within Liberal Societies: Learning to Live with the Future (Routledge Studies in Social and Political Thought). – М.: , 2008. – 148 с. Transitions: Pathways Towards Sustainable Urban Development in Australia. – М.: , 2008. – 756 с. Sustainable Development in Small Island Developing States: Issues and Challenges (Economic Paper Series). – М.: , 2008. – 120 с. Pierre-laurent Chatain, Raul Hernandez-Coss, Kamil Borowik, Andrew Zerzan. Integrity in Mobile Phone Financial Services: Measures for Mitigating the Risks of Money Laundering and Terrorist Financing (World Bank Working Papers) (World Bank Working Papers). – М.: , 2008. – 76 с. Findlay Shearer. Power Management in Mobile Devices. – М.: , 2010. – 336 с. Ivan Vince. Major Accidents to the Environment. – М.: , 2010. – 320 с. Mineo Kimura. Electron Collisions with Molecules in Gases: Applications to Plasma Diagnostics and Modeling,44. – М.: , 2010. – 315 с. Ron J. Doyle. Microbial Growth in Biofilms, Part B: Special Environments and Physicochemical Aspects,337. – М.: , 2010. – 469 с. Paul Goransson. Secure Roaming in 802.11 Networks. – М.: , 2010. – 368 с. K Thalia Grant. Darwin in Galapagos – Footsteps to a New World. – М.: , 2009. – 416 с. Amitav Acharya. Reassessing Security Cooperation in the Asia– Pacific – Competition, Congruence, and Transformation. – М.: , 2007. – 288 с. Bruno Latour. Science in Action – How to Follow Scientists & Engineers Through Society (Paper). – М.: , 1988. – 282 с. B LATOUR. Latour: ?science? In Action – How To Follow Scient Ists & Engineers Through Society (cloth). – М.: , 1987. – 288 с. Stanley Fischer. Securing Peace in the Middle East – Project on Economic Transition. – М.: , 1994. – 208 с. Richard L. Ptak. Manager?s Guide to Distributed Environments. – М.: , 1998. – 368 с. P DEJOURS. Dejours: Comparative ?physiology? Of Envir Adaptat Ions– Adaptations To ?extreme? Environments. – М.: , 1987. – 232 с. Hardie Truesdale. Hudson River Journey – Images from Lake Tear in the Clouds to New York Harbor. – М.: , 2004. – 96 с. Charles Lipson. Doing Honest Work In College – How to Prepare Citations, Avoid Plagiarism, and Achieve Real Academic Success 2e. – М.: , 2008. – 260 с. MJ COMPUTER. Ball Data Processing In Medicine: How To Select A Computerized Hospital Information Systm. – М.: , 1973. – 0 с. Leaks in the Pipeline to Math, Science, and Technology Careers. – М.: , 2006. – 112 с. Kathleen R. Hopkins. Teaching How to Learn in a What–to–Learn Culture. – М.: , 2010. – 176 с. Daniel H Deudney. Bounding Power – Republican Security Theory from the Polis to the Global Village. – М.: , 2008. – 384 с. B FORST. Forst: Power In ?numbers? – How To Manage For Prof It. – М.: , 1987. – 258 с. Richard A Brealey. Security Prices in a Competitive Market – More About Risk & Return form Common Stocks. – М.: , 2003. – 246 с. Roderick. Finding Jobs in the Securities Industry: In Manage ment Consulting, Investment Banking, and Securitie s Trading. – М.: , 2000. – 256 с. Kaufman. A Key–Word–in–Context Concordance to Targum Neofiti. – М.: , 1993. – 1504 с. James Winter. Secure from Rash Assault – Sustaining the Victorian Environment. – М.: , 2002. – 354 с. L P Harvey. Muslims in Spain 1500 to 1614. – М.: , 2006. – 462 с. Beamish. Getting the Word Out in the Fight to Save the Earth. – М.: , 1995. – 200 с. Beamish. Getting the Word Out in the Fight to Save the Eart h. – М.: , 1995. – 0 с. BREALEY. Brealey: ?security? Prices In A Competitive Market – More About Risk & Return Fr Com Stocks. – М.: , 1971. – 0 с. Johnny Molloy. 50 Hikes in Alabama – Where to Find Perfect Shots and How to Take Them. – М.: , 2011. – 0 с. Pawan K Bhardwaj. A+. Network+, Security+ Exams in a Nutshell. – М.: , 2007. – 812 с. EP ECKHOLM. Eckholm Down To ?earth? – Environment And Human Needs. – М.: , 1983. – 254 с. Edwards. Medical Practice in the Current Health Care Environment. – М.: , 1994. – 280 с. Genserik L.L. Reniers. Multi–Plant Safety and Security Management in the Chemical and Process Industries. – М.: , 2010. – 290 с. Anat Pick. Creaturely Poetics – Animality and Vulnerability in Literature and Film. – М.: , 2011. – 256 с. Anat Pick. Creaturely Poetics – Animality and Vulnerability in Literature and Film. – М.: , 2011. – 256 с. V. Mitra Gopaul. Developing C/C++ Software in the OS/2/N® Environment. – М.: , 1994. – 450 с. C WALKER. Walker: Women & Gender In Southern Africa To 1945 (cloth). – М.: , 1991. – 400 с. Peter H. Raven. Study Guide to Accompany Environment. – М.: , 2000. – 360 с. 24 Deadly Sins Of Software Security: Programming Flaws And How To Fix Them. – М.: , 2011. – 432 с. Mobile Application Security. – М.: , 2011. – 432 с. The Tab Battery Book: An In-Depth Guide To Construction, Design, And Use. – М.: , 2011. – 272 с. Eduardo Fernandez-Buglioni. Security Patterns in Practice: Designing Secure Architectures Using Software Patterns. – М.: Wiley, 2013. – 582 с. Govind Sharma and Manish Gupta. Secure routing in wireless mobile Ad-Hoc network. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Sai Suren Kumar Kasireddy. Measurements of Power Consumption in Smartphones. – М.: LAP Lambert Academic Publishing, 2013. – 88 с. Md. Saifur Rahman. Broadcasting Protocols in Mobile Ad-hoc Network. – М.: LAP Lambert Academic Publishing, 2012. – 64 с. Idd Pazi Alli. Channel Estimation In Mobile Wireless Systems. – М.: LAP Lambert Academic Publishing, 2012. – 68 с. Ranjan Mishra,Vishu Mittal and Rajkumar Chaurasia. Interference and Path Loss of Cellular Technology. – М.: LAP Lambert Academic Publishing, 2013. – 92 с. Naseer Ahmad. Security Issues in Wireless Networks. – М.: LAP Lambert Academic Publishing, 2010. – 60 с. Hazoor Singh and Buta Singh Sidhu. HVOF Coatings in Improving Resistance to Surface Degradation. – М.: LAP Lambert Academic Publishing, 2013. – 272 с. Tukun Li. Software Measurement Standards in Surface Metrology. – М.: LAP Lambert Academic Publishing, 2012. – 184 с. Basil Akinnuli,Kamoru Oladosu and Mondiu Durowoju. Development of Software for the Design and Drafting of Helical Gears. – М.: LAP Lambert Academic Publishing, 2012. – 192 с. Josef Kunik. Inventory Management in Multi-Product Lean Manufacturing Environments. – М.: LAP Lambert Academic Publishing, 2014. – 104 с. Jude Kagoro. The Urban (In)Security Paradox in Uganda. – М.: LAP Lambert Academic Publishing, 2012. – 124 с. Yasir Waseem Iqbal. Sociology Of Networking. – М.: LAP Lambert Academic Publishing, 2013. – 88 с. Maurice Kwakkernaat. Directional Dispersion of Radio Waves in Mobile Channels. – М.: LAP Lambert Academic Publishing, 2010. – 168 с. Marystella Wabwoba. Factors affecting sustainability of food security projects in Kenya. – М.: LAP Lambert Academic Publishing, 2013. – 80 с. Narahari Prasad Ghimire. Integrated Pest Management in Policy and Practice: A Case of Nepal. – М.: LAP Lambert Academic Publishing, 2013. – 128 с. Edward Onyango. Inositol Hexaphosphate Phytate In Diets: Role In The Digestive Process. – М.: Scholars' Press, 2014. – 148 с. Shreepriya Sreenivasan. Investigating photo-acclimation in plants exposed to high light stress. – М.: LAP Lambert Academic Publishing, 2013. – 92 с. Ahmad Galadima,Zahraddeen Nasiru G. Getso and Mustapha Danlami Garba. Carbon Capture and Storage in the Fight for Sustainable Environment. – М.: LAP Lambert Academic Publishing, 2012. – 160 с. Moushumi Lodh,Ashok Parida and Alpana Saxena. Assessing plaque vulnerability in Acute Coronary Syndrome. – М.: LAP Lambert Academic Publishing, 2011. – 56 с. Marija Lebedina Manzoni,Martina Lotar and Neven Ricijas. Peer Pressure in Adolescence. – М.: LAP Lambert Academic Publishing, 2011. – 100 с. Devanand Medapati. To Be in Christ is To Be in His Church. – М.: Blessed Hope Publishing, 2013. – 52 с. Timothy Ellah. Nigeria's Security Interest in the Gulf of Guinea:. – М.: LAP Lambert Academic Publishing, 2011. – 108 с. Bassie Yizengaw Limenih. Household Income Diversification and Food Security. – М.: LAP Lambert Academic Publishing, 2014. – 132 с. Shunji Cui. Sino-Japanese Relations and a ‘Security Regime’ in East Asia. – М.: LAP Lambert Academic Publishing, 2010. – 276 с. Dessalegn Workineh. The post 1991 Resettlement in food security Lens in Ethiopia. – М.: LAP Lambert Academic Publishing, 2011. – 100 с. AKANU OBASI. TUBERCULOSIS IN NEW ENTRANTS TO LONDON: THE PATIENTS'' PERSPECTIVE. – М.: LAP Lambert Academic Publishing, 2010. – 96 с. Asrul Sani. The Spread of HIV/AIDS in Mobile Populations. – М.: LAP Lambert Academic Publishing, 2010. – 156 с. Sergey Nikolenko. Provably secure constructions in cryptography. – М.: LAP Lambert Academic Publishing, 2011. – 112 с. Tulia Ackson. Coordination of Social Security Systems in the SADC Region. – М.: LAP Lambert Academic Publishing, 2009. – 96 с. Hai Truong. The Development of a Human Rights Culture in Vietnam, 1986 to present. – М.: LAP Lambert Academic Publishing, 2011. – 344 с. Munyabarenzi Faustin. The incidence of security interest in movable property. – М.: LAP Lambert Academic Publishing, 2013. – 84 с. Adel Abdelhadi. Algorithms for the integration of Arabic Language in Mobile Phones. – М.: LAP Lambert Academic Publishing, 2013. – 100 с. Vladimir Kulyukin and Tharun Tej Tammineni. Digital Labeling And Narrative Mapping In Mobile Remote Audio Signage. – М.: LAP Lambert Academic Publishing, 2014. – 76 с. Deepak Puthal and Bibhudatta Sahoo. Secure Data Collection & Critical Data Transmission in Mobile Sink WSN. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Sandeep Kr. Agarwal and Dr. K. V. Arya. Security in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 88 с. Mohammed azharuddin Adhoni. Secure communication in p2p networks. – М.: LAP Lambert Academic Publishing, 2012. – 124 с. Suman Bala. Secure Routing in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 72 с. Abbas Mehdizadeh Zare Anari and Ayyoub Akbari Moghanjoughi. Route optimization security in mobile IPv6 networks. – М.: LAP Lambert Academic Publishing, 2012. – 116 с. Angela Amphawan and Kashif Nisar. Dynamic Cell Sizing in Mobile Cellular Networks. – М.: LAP Lambert Academic Publishing, 2012. – 116 с. Rupa Ch. and Avadhani P. S. Modern Security Methods in Applied Computer Science. – М.: Scholars' Press, 2014. – 124 с. Natarajan Meghanathan. A Tutorial on Java Socket Programming and Source Code Analysis. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Heba Elshandidy. Enhancing Security Solutions in Mobile Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2013. – 128 с. Sherif Kamel. Route Optimization in Mobile IP. – М.: LAP Lambert Academic Publishing, 2014. – 248 с. Heena Mittal and Gurpreet Singh. Security of Mobile Agents in Distributed Computing. – М.: LAP Lambert Academic Publishing, 2014. – 80 с. Nitin K. Mishra and Sumit Dhariwal. Security in Mobile Ad-Hoc Networks. – М.: LAP Lambert Academic Publishing, 2014. – 72 с. Rakesh Jha. Security Issues In AD-HOC And Infrastructure (WLAN) Networks. – М.: LAP Lambert Academic Publishing, 2011. – 124 с. Srikanthreddy Arimanda and Manojkumar Kolli. Performance Study Of Security Mechanismsm For Mobile Agent Domain. – М.: LAP Lambert Academic Publishing, 2011. – 84 с. Narayan Ranjan Chakraborty. Analysis of Web security attacks: Bangladesh perspective. – М.: LAP Lambert Academic Publishing, 2012. – 124 с. Yi Ren. Security Mechanisms in Unattended Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2013. – 164 с. Shilpa Jaiswal and Sumeet Agrawal. Detection of Network Worm to Eliminate Security Threats in MANET. – М.: LAP Lambert Academic Publishing, 2012. – 52 с. Devendra Prasad. Relible Data Dissemination in Mobile Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 144 с. Soke Onyemelukwe. On-Demand Routing and Security in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2013. – 128 с. Raj Shree and Ravi Prakash Pandey. Security Advancement in ZRP based Wireless Networks. – М.: LAP Lambert Academic Publishing, 2014. – 92 с. Manuj Mishra,Govind Sharma and Ram Pathak. Secure Routing In Wireless Mobile Ad Hoc Network. – М.: LAP Lambert Academic Publishing, 2014. – 84 с. Natarajan Meghanathan,DeShante C. Johnson and Alexander R. Geoghegan. An Analysis of Software Security Attacks and Mitigation Controls. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Britto R. Kumar and Albert S. Rabara. An Architecture for Secure Mobile Payment System using PKI. – М.: LAP Lambert Academic Publishing, 2013. – 184 с. Adewole Adewumi and Nicholas Omoregbe. Usability Evaluation of Mobile Access to Institutional Repository. – М.: LAP Lambert Academic Publishing, 2013. – 144 с. Kalimullah Khan. UX in mobile phones to ensure customer satisfaction and loyalty. – М.: LAP Lambert Academic Publishing, 2011. – 96 с. Gunasekar Kumar and Anirudh Chelikani. Analysis of Security Issues in Cloud Based E-Learning. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Shafi'i Muhammad Abdulhamid. Privacy And National Security Challenges in Online Social Networks. – М.: LAP Lambert Academic Publishing, 2013. – 64 с. Roopesh Kumar. Steganography :A Technique for Information Hiding in Mobile. – М.: LAP Lambert Academic Publishing, 2014. – 76 с. Manoj Wakchaure and Shrinivas Sonkar. A Framework to Remove Vulnerability through Analysis Phase of SDLC. – М.: LAP Lambert Academic Publishing, 2012. – 104 с. Sivapathalingham Sivavakeesar. Quality of Service Support in Mobile Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 288 с. Igor Botian. Software Security Vulnerabilities in Mobile Peer-to-peer Environment. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Amit Choudhary. Routing Security Issues in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2014. – 80 с. Gabriella Carrozza. Software Faults Diagnosis in Complex Mission Critical Systems. – М.: LAP Lambert Academic Publishing, 2015. – 168 с. Keijo Haataja. Security Threats and Countermeasures in Bluetooth-Enabled Systems. – М.: LAP Lambert Academic Publishing, 2009. – 188 с. Ahsan Nawaz and Kashif Masood Malik. Software Testing Process in Agile development. – М.: LAP Lambert Academic Publishing, 2010. – 76 с. Alka Agrawal and Raees A Khan. Software Vulnerability: Identification and Minimization. – М.: Scholars' Press, 2014. – 192 с. HongLiang Wang,Thomas Marx and Fritz Wurm. Design and Implementation of GCP in a Make to Order Environment. – М.: LAP Lambert Academic Publishing, 2012. – 124 с. Faeiz Alserhani,Irfan Awan and Monis Akhlaq. Correlation and Aggregation of Security Alerts in Networks. – М.: LAP Lambert Academic Publishing, 2012. – 256 с. Viktor Kalman. Modeling and control of omnidirectional wheels. – М.: LAP Lambert Academic Publishing, 2014. – 148 с. Usha Ramanathan. Role of information exchange in collaborative supply chains. – М.: LAP Lambert Academic Publishing, 2011. – 276 с. Elio Keko. Personalized Advertising. – М.: LAP Lambert Academic Publishing, 2010. – 64 с. Fiona Lee. learning to be mothers to be mothers learning mothers learning to be. – М.: LAP Lambert Academic Publishing, 2011. – 152 с. Jerome K. Jerome. Three Men in a Boat (To Say Nothing of the Dog)/Трое в лодке не считая собаки. – М.: T8RUGRAM, 2018. – 240 с. Лучшие результаты Ничего не найдено Дополнительные результаты Займы для корпораций: back to the Russia. Т. Мартынова, "Банковское обозрение", № 11, ноябрь 2007. Наука человековедения. интервью с Д. Уолтоном, профессором London Metropolitan University, экспертом CIPD. Chartered Institute of Personnel and Development, автором программы Master of Arts in Human Resource Strategies. И. Смирнова, "Кадровый менеджмент", № 5, июль-август 2007. Нюансы управления офисным perpetuum mobile. В. Богданов, "Консультант", № 11, июнь 2007. Mobile Клиент - простота и эффективность сегодняшнего дня. С. Мастеренко, "Банковское дело в Москве", № 4, апрель 2006. Два монитора извольте, кофе-машину, широкое кресло, свободный график.... интервью с Ю. Малягановой, директором департамента управления персоналом SUP Media, А. Найко, специалистом по подбору персонала компании CUSTIS, А. Шевченко, руководителем отдела по подбору персонала компании Veeam Software в Европе и регионе Emerging Markets. В. Гусева, "Управление персоналом", N 9, май 2012 г. Счет 97 - to be or not to be. Реквием. А.В. Анищенко, "Актуальные вопросы бухгалтерского учета и налогообложения", N 23, декабрь 2011 г. Зомбирование банков, или Too-big-to-fail problem. Г.Б. Петров, "Управление в кредитной организации", N 2, март-апрель 2011 г. Иностранные работники - perpetuum mobile российского законодательства. А. А. Курушин, "В курсе правового дела", N 4, февраль 2011 г. Trade-in как способ обмена автомобиля. С.Н. Гордеева, "Торговля: бухгалтерский учет и налогообложение", N 2, февраль 2011 г. Уильям Савадж: Мотивировать людей в Нижнем Новгороде и Новосибирске нужно по-разному". интервью с У. Саваджем, вице-президентом корпорации Intel, подразделение Software and Services Group. М. Холкина, "Управление персоналом", N 14, июль 2010 г. Проблемы применения универсальной юрисдикции in absentia. Г.А. Королев, "Журнал российского права", № 10, октябрь 2009. Тонкости trade-in. С.А.Королев, "НДС. Проблемы и решения", № 8, август 2009. In-store banking - новая модель банковского бизнеса. А. Пятков, "Банковское обозрение", № 11, ноябрь 2008. Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Ольга Девочки, огромное Вам спасибо!!!