Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Amma Naningrum. Standardization Metadata Schema for Securing Interoperability. – М.: LAP Lambert Academic Publishing, 2012. – 112 с. Дополнительные результаты Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с. Agent-Based Technologies and Applications for Enterprise Interoperability: International Workshops ATOP 2009, Budapest, Hungary, May 12, 2009, and ... Notes in Business Information Processing). – М.: , 2012. – 249 с. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с. John Kampfner. Freedom For Sale: Why the World is Trading Democracy for Security. – М.: , 2012. – 452 с. Shahid Yusuf, World Bank. Entering the 21st Century: World Development Report 1999/2000 (World Development Report (Paper), 1999 2000). – М.: , 0. – 0 с. Chris Harris. Building Innovative Teams: Strategies and Tools for Developing and Integrating High Performance Innovative Groups. – М.: , 0. – 0 с. Safety and the Security Professional : A Guide to Occupational Safety and Health Strategies. – М.: , 0. – 0 с. Dominic Cooper, Ivan T. Robertson, Gordon Tinline. Recruitment and Selection: A Framework for Success. – М.: , 0. – 0 с. Philip P. Purpura. The Security Handbook. – М.: , 0. – 0 с. Jeffrey L. Funk. Global Competition Between and Within Standards: The Case of Mobile Phones. – М.: , 0. – 0 с. Gavin Cawthra. Securing South Africa's Democracy: Defense, Development and Security in Transition (International Political Economy Series). – М.: , 0. – 0 с. Otto Loistl, Robert Petraq, Robert Petrag. Asset Management Standards: Corporate Governance for Asset Management. – М.: , 0. – 0 с. Max Boisot. Knowledge Assets: Securing Competitive Advantage in the Information Economy. – М.: , 0. – 0 с. Max H. Boisot. Knowledge Assets: Securing Competitive Advantage in the Information Economy. – М.: , 0. – 0 с. Physical Security and the Inspection Process. – М.: , 0. – 0 с. Encyclopedia of Security Management : Techniques and technology. – М.: , 0. – 0 с. Ultimate Financial Security Survey. – М.: , 0. – 0 с. Douglas B. Reeves. The Leader's Guide to Standards: A Blueprint for Educational Equity and Excellence. – М.: , 0. – 0 с. Roberta Bragg. MCSE Training Guide (70-220): Windows 2000 Network Security Design, Second Edition. – М.: , 0. – 0 с. Mostafa Hashem Sherif. Protocols for Secure Electronic Commerce, Second Edition. – М.: , 0. – 0 с. Payment Technologies for E-Commerce. – М.: , 2003. – 0 с. The Security Economy (Safety Standards Series:). – М.: , 2004. – 0 с. Standards and Audits for Ethics Management Systems : The European Perspective (Studies in Economic Ethics and Philosophy). – М.: , 2003. – 0 с. Thomas C. Glaessner. Electronic Safety and Soundness: Securing Finance in a New Age (World Bank Working Papers). – М.: , 2004. – 0 с. Barry J. Epstein. Wiley IAS 2003 CD-ROM : Interpretation and Application of International Accounting Standards. – М.: , 2003. – 0 с. Sudhanshu Kairab. A Practical Guide to Security Assessments. – М.: , 2004. – 498 с. Scott Watson. The Art of War for Security Managers: 10 Steps to Enhancing Organizational Effectiveness. – М.: , 2007. – 200 с. Betty E. Biringer, Rudolph V. Matalucci, Sharon L. O'Connor. Security Risk Assessment and Management: A Professional Practice Guide for Protecting Buildings and Infrastructures. – М.: , 2007. – 384 с. Wes Cantrell, James R. Lucas. High-Performance Ethics: 10 Timeless Principles for Next-Generation Leadership. – М.: , 2007. – 254 с. Timothy P. Layton. Information Security. – М.: , 2006. – 222 с. Susan N. Wood. Florida Standards: A Handbook for Teaching in the Sunshine State. – М.: , 2006. – 144 с. National Security Law Documents. – М.: , 2005. – 1206 с. Thomas A. Cook. Global Sourcing Logistics: How to Manage Risk And Gain Competitive Advantage in a Worldwide Marketplace. – М.: , 2006. – 378 с. Thomas E Vollmann, William Lee Berry, David Clay Whybark, F. Robert Jacobs, Thomas Vollmann, William. MANUFACTURING PLANNING AND CONTROL SYSTEMS FOR SUPPLY CHAIN MANAGEMENT : The Definitive Guide for Professionals. – М.: , 2004. – 598 с. Revisiting Keynes: Economic Possibilities for Our Grandchildren. – М.: , 2008. – 232 с. Sanjay Reddy, Christian Barry. International Trade and Labor Standards: A Proposal for Linkage. – М.: , 2008. – 232 с. Anita L. Feller. Mastering Accounting Research for the CPA Exam. – М.: , 2008. – 190 с. Ibp Usa. European System for Security and Cooperation Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Craig S. Wright. The IT Regulatory and Standards Compliance Handbook: How to Survive Information Systems Audit and Assessments. – М.: , 2008. – 750 с. Timothy M. Virtue. Payment Card Industry Data Security Standard Handbook. – М.: Wiley, 2009. – 224 с. Carl Roper. Risk Management for Security Professionals. – М.: , 2010. – 304 с. Carl Young. Metrics and Methods for Security Risk Management. – М.: , 2010. – 296 с. David L. Cannon. CISA Certified Information Systems Auditor Study Guide. – М.: John Wiley and Sons, Ltd, 2010. – 704 с. Jim McBee. Mastering Microsoft Exchange Server 2010. – М.: , 2010. – 984 с. Katie Hamilton. Rules of Thumb for Home Building, Improvement, and Repair. – М.: , 2007. – 214 с. Robert L. Navin. The Mathematics of Derivatives. – М.: , 2007. – 208 с. Jesus Mena. Investigative Data Mining for Security and Criminal Detection. – М.: , 2010. – 272 с. James C Foster. Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploitsand Tool Coding for Security Professionals. – М.: , 2010. – 700 с. Tony Flick, Justin Morehouse. Securing the Smart Grid: Next Generation Power Grid Security. – М.: Рид Элсивер, 2011. – 320 с. John Hoopes. Virtualization for Security. – М.: , 2010. – 384 с. Jeffrey Lewis. The Minimum Means of Reprisal – China?s Search for Security in the Nuclear Age. – М.: , 2007. – 200 с. Jeffrey Lewis. The Minimum Means of Reprisal – China?s Search for Security in the Nuclear Age. – М.: , 2007. – 200 с. C Haber. Old Age & the Search for Security – An American Social History. – М.: , 1994. – 212 с. Mark S. Merkow. Building SET Applications for Secure Transactions. – М.: , 1998. – 416 с. Andrew J Nathan. The Great Wall & the Empty Fortress – China?s Search for Security (Paper). – М.: , 1998. – 288 с. M WHITE. White: Standards & Review Manual For Certification In Knowledge Engineering: Handbook Of Theory & Practice (pr Only). – М.: , 1991. – 664 с. INDIV. Individual Standards – ?air Pressure? For Pneumati C Controllers And Transmission Systems. – М.: , 1977. – 0 с. MT YOTHERS. Yothers ?standards And Practices? For Instrumentat Ion 5ed. – М.: , 1977. – 0 с. Wolfgang Safran. Saudi Arabia – The Ceaseless Quest for Security. – М.: , 1985. – 592 с. LM FERSON. Ferson ?standards And Practices? For Instrumentati On 6ed. – М.: , 1981. – 1038 с. The Complete Book Of Home, Site And Office Security. – М.: , 2011. – 309 с. Securing Global Transportation Networks. – М.: , 2011. – 312 с. Perfect Phrases For Classroom Teachers. – М.: , 2011. – 208 с. Wireless Network Security A Beginners Guide. – М.: , 2011. – 400 с. It Security Metrics: A Practical Framework For Measuring Security & Protecting Data. – М.: , 2011. – 396 с. Introduction To Matlab For Engineers. – М.: , 2011. – 704 с. Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky. Cisco Security Professional's Guide to Secure Intrusion Detection Systems. – М.: , . – с. Mark F. Hornick, Erik Marcade, Sunil Venkayala. Java Data Mining: Strategy, Standard, and Practice: A Practical Guide for architecture, design, and implementation. – М.: Morgan Kaufmann, 2006. – 544 с. Frank Thornton. How to Cheat at Deploying & Securing RFID. – М.: Syngress, 2007. – 448 с. Ram Balakrishnan. Advanced QoS for Multi–Service IP/MPLS Networks. – М.: Wiley Publishing, Inc, 2008. – 464 с. George S. Oreku. ENHANCING E-COMMERCE SECURITY. – М.: LAP Lambert Academic Publishing, 2011. – 212 с. Govind Sharma and Manish Gupta. Secure routing in wireless mobile Ad-Hoc network. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Raffie Arshak. Investigation of Organic Polymer Based Films for Flexible Solar Cells. – М.: LAP Lambert Academic Publishing, 2014. – 148 с. Abadi Tsegay and Kumudha Raimond. Video processing for Ethiopian sign language translation. – М.: LAP Lambert Academic Publishing, 2012. – 120 с. Anand Kannan. Evaluation of the Security Mechanisms in Cloud Networks. – М.: LAP Lambert Academic Publishing, 2013. – 192 с. Jagadish Pal. Power System Static Security Analysis and Control. – М.: LAP Lambert Academic Publishing, 2010. – 160 с. Ronan O'Driscoll. Internet Controlled Security Robot. – М.: LAP Lambert Academic Publishing, 2014. – 52 с. Kosuru Trinadhachari. A Real World system for Motion Detection and Tracking. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Waqas Aslam Cheema and Asad Mehmood. Estimation Techniques for LTE Downlink. – М.: LAP Lambert Academic Publishing, 2010. – 96 с. Amma Naningrum. Standardization Metadata Schema for Securing Interoperability. – М.: LAP Lambert Academic Publishing, 2012. – 112 с. Yuxuan Nie. Re-examining the Causes of Corporate Securities Fraud. – М.: LAP Lambert Academic Publishing, 2010. – 196 с. Saima Afzal. Non-Traditional Security Threats to Pakistan Post 9/11. – М.: LAP Lambert Academic Publishing, 2012. – 104 с. Renjini Devaki. Women and Local Social Security. – М.: LAP Lambert Academic Publishing, 2010. – 160 с. Adriana Marais. Security and Entanglement in Quantum Key Distribution. – М.: LAP Lambert Academic Publishing, 2010. – 108 с. Nafie Almuslet,Rasha Yosif and Mubarak Elmahal. Investigation of goodness for some drugs using laser scattering. – М.: LAP Lambert Academic Publishing, 2012. – 132 с. Felipe Olivares E. and Mario Hamuy. Core-Collapse Supernovae as Standard Candles. – М.: LAP Lambert Academic Publishing, 2011. – 96 с. Waheed Ashagidigbi,Sulaiman Yusuf and Bolarinwa Omonona. Households’ Food Demand and Food Security Status in Nigeria. – М.: LAP Lambert Academic Publishing, 2013. – 80 с. Shalini Yadav. Standardization Of Recipe For Chutney And Slab From Persimmon. – М.: LAP Lambert Academic Publishing, 2014. – 104 с. Piyush Kachhadiya and Hitesh Senjaliya. Recipe for preparation of ready-to-serve beverage from aonla. – М.: LAP Lambert Academic Publishing, 2014. – 80 с. K. Kayalvizhi Kamaraj and R. Arulmozhiyan. Standardization of Media and Growth Retardants for Cut Foliage. – М.: LAP Lambert Academic Publishing, 2014. – 184 с. Mohammed Alsayel. Towards Standardizing Intenational Boundary Determination. – М.: LAP Lambert Academic Publishing, 2014. – 140 с. Alemu Addisu. Rural household Food Security Status and its Determinants. – М.: LAP Lambert Academic Publishing, 2013. – 68 с. Gintaras Kavarskas. Security in the United Kingdom and the United States of America. – М.: LAP Lambert Academic Publishing, 2014. – 104 с. Rakesh Kumar. Human Security and Civil Society. – М.: LAP Lambert Academic Publishing, 2014. – 220 с. Rahul Sahu,N. P. S. Sengar and N. S. Lodhi. HPLC Method for Detection of Ingredients of Cough & Cold Preparations. – М.: LAP Lambert Academic Publishing, 2012. – 112 с. ASHOK SAHU. NBT method for estimation of Glycated Hb, its correlation with HbA1c. – М.: LAP Lambert Academic Publishing, 2010. – 64 с. Kolloju Phaneendra and Y.N. Reddy. Computational Methods for a Class of Singular Perturbation Problems. – М.: LAP Lambert Academic Publishing, 2012. – 196 с. Yang Aijun. Bayesian Variable Selection for High Dimensional Data Analysis. – М.: LAP Lambert Academic Publishing, 2011. – 92 с. Hay Derkx. For your ears only. – М.: LAP Lambert Academic Publishing, 2010. – 136 с. Lidia Georgieva and Gencho Genchev. Risk factors for coronary heart disease. – М.: LAP Lambert Academic Publishing, 2012. – 356 с. Miriam Brielmann. Meta-Schema for Program Design in Introductory Programming. – М.: LAP Lambert Academic Publishing, 2011. – 152 с. Shiblee Sadik. Outlier Detection for Data Streams. – М.: LAP Lambert Academic Publishing, 2011. – 200 с. Sandeep Kr. Agarwal and Dr. K. V. Arya. Security in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 88 с. Prathap Jonnadula and Naga Mani Darajula. Secure Group Communication. – М.: LAP Lambert Academic Publishing, 2012. – 64 с. Mohammed azharuddin Adhoni. Secure communication in p2p networks. – М.: LAP Lambert Academic Publishing, 2012. – 124 с. Niroj Kumar Pani and Dr. Ashok Kumar Turuk. A Hybrid Zone-Based Routing Protocol for Secure Communication in MANET. – М.: LAP Lambert Academic Publishing, 2010. – 92 с. Munnujahan Ara. Reliable and Secure Wireless Communications Systems. – М.: Scholars' Press, 2014. – 140 с. Jose Miguel Montanana Aliaga. Providing Fault Tolerance in Interconnection Networks for PC Clusters. – М.: LAP Lambert Academic Publishing, 2010. – 208 с. Albert Wasef. Managing and Complementing PKI for Securing Vehicular Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2011. – 204 с. Rakesh Jha. Security Issues In AD-HOC And Infrastructure (WLAN) Networks. – М.: LAP Lambert Academic Publishing, 2011. – 124 с. R. Baskaran,M. S. Saleem Basha and A. Balasubramanian. Two Tier Security Framework for Service Oriented Systems. – М.: LAP Lambert Academic Publishing, 2012. – 176 с. Tarek S. Sobh. Effective and Extensive VPN for Securing Web Applications. – М.: LAP Lambert Academic Publishing, 2012. – 88 с. Mehmet Hilal Ozcanhan. Security & Reliability in Embedded Systems. – М.: LAP Lambert Academic Publishing, 2014. – 152 с. Seyed Mohamed Buhari. Optimizing access control lists Search for IP packet filtering. – М.: LAP Lambert Academic Publishing, 2012. – 300 с. Dimitrios Baltazis. Dynamic Authorizations for Secure Internet Applications. – М.: LAP Lambert Academic Publishing, 2012. – 152 с. Britto R. Kumar and Albert S. Rabara. An Architecture for Secure Mobile Payment System using PKI. – М.: LAP Lambert Academic Publishing, 2013. – 184 с. Usman Habib. Secure Mobile Authentication for Linux Workstation log on. – М.: LAP Lambert Academic Publishing, 2011. – 120 с. D. Maheswari Maheshlenin and V. Radha. Compound Image Segmentation and Compression for Secure Transmission. – М.: LAP Lambert Academic Publishing, 2012. – 240 с. Shilpa Chauhan,Rajeev Sobti and Sami Anand. BLAKE Algorithm Evaluation on ARM Processor. – М.: LAP Lambert Academic Publishing, 2012. – 68 с. Udai Pratap Rao,Dhiren R. Patel and Vidhya Goutham Guntaka. SVD Based Database Watermarking for Security in Database. – М.: LAP Lambert Academic Publishing, 2011. – 56 с. Thuy Pham Thi Thu and Young-Koo Lee. Hybrid Similarity Measure for XML Data Integration and Transformation. – М.: LAP Lambert Academic Publishing, 2014. – 96 с. Roopesh Kumar. Steganography :A Technique for Information Hiding in Mobile. – М.: LAP Lambert Academic Publishing, 2014. – 76 с. Hammad Kazmi. Security and Privacy issues in Near Field Communication (NFC) Systems. – М.: LAP Lambert Academic Publishing, 2012. – 68 с. Sudipta Dey. Development Of A Secured Object Oriented Model Of E-learning System. – М.: LAP Lambert Academic Publishing, 2012. – 264 с. Lionel Bernard. A Risk Assessment Framework for Evaluating Software-as-a-Service. – М.: LAP Lambert Academic Publishing, 2012. – 136 с. Sadia Marium. Analysis of the Security threats to Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 64 с. Antonio Pareja-Lora. Providing Linked Linguistic and Semantic Web Annotations. – М.: LAP Lambert Academic Publishing, 2012. – 504 с. Khalil Zebbiche. Digital Watermarking For Securing Fingerprint Data. – М.: LAP Lambert Academic Publishing, 2012. – 156 с. Moawiah Assali,Jihad Bisoomi and Iyad Tumar. New Scheme in Security Policies. – М.: LAP Lambert Academic Publishing, 2014. – 72 с. Zhishun Wang and Qifei Lu. A Method for Analyzing Security of SOA-based Systems. – М.: LAP Lambert Academic Publishing, 2011. – 68 с. Milan Senesi. Web systems security testing. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Adebayo Omotosho and Justice Emuoyibofarhe. Development of a Secure Intelligent Electronic Prescription System. – М.: LAP Lambert Academic Publishing, 2012. – 156 с. Wided Guedria. A contribution to enterprise interoperability maturity assessment. – М.: LAP Lambert Academic Publishing, 2012. – 252 с. Burcu Kulahc?oglu. Timed Automata as a Verification Tool for Security Protocols. – М.: LAP Lambert Academic Publishing, 2011. – 104 с. Haneen Qarabash. An Intranet Based System For Securities Trading. – М.: LAP Lambert Academic Publishing, 2013. – 84 с. Abdul Rahman and Muhammad Zia-ur-Rehman. Why Brand Loyalty is so important for successful business companies?. – М.: LAP Lambert Academic Publishing, 2012. – 64 с. Sushil Kumar Choudhary and Niraj Gupta. ERP Implementation Process For Manufacturing Industry. – М.: LAP Lambert Academic Publishing, 2015. – 208 с. Oleg V. Boev,Norbert Gruenwald and Guenter Heitmann. Engineering Curriculum Design Aligned with Accreditation Standards. – М.: Scholars' Press, 2014. – 176 с. Dhanya S. Shenoi and Dhanya N. Evaluation of the Curriculum of Standard I in schools of Ernakulam. – М.: LAP Lambert Academic Publishing, 2013. – 116 с. Manojkumar Shastri. Right to Education & Basic Needs for Human Reference to Vedas. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Лучшие результаты Ничего не найдено Дополнительные результаты У российского рынка структурного финансирования неплохие перспективы. интервью с И. Пенкиной, ведущим аналитиком Standard & Poor's. Е.Е. Смирнов, "Управление в кредитной организации", № 3, май-июнь 2007. Standard & Poor's о банках России в 2005 году. И.Е. Смирнов, "Банковское кредитование", № 3, III квартал 2005. Мы можем управлять собственными мыслями. интервью с С. Харитоновым, врачом-психотерапевтом, психиатором, кандидатом медицинских наук, старшим научным сотрудником Московского НИИ психиатрии Росздрава РФ, членом-корреспондентом Международной академии наук. МАНЭБ, членом Британского общества когнитивных и поведенческих психотерапевтов. Membership British Association for Behavioural & Cognitive Psychoterapies / BABCP. Ф. Кульпин, "Управление персоналом", N 8, апрель 2011 г. Зачетная реструктуризация долга: институт DEBT-FOR-EQUITY SWAP в России". интервью с М. Григорьевым, старшим юристом корпоративной практики юридической фирмы "Вегас-Лекс". О. Бодрягина, "эж-ЮРИСТ", № 3, январь 2010. Управление проектами при подборе персонала. PM for HR. Е. Кривов, "Кадровик. Рекрутинг для кадровика", № 9, сентябрь 2008. Южноафриканский Standard Bank покоряет Россию. интервью с Ю. Войцеховским, президентом ЗАО "Стандарт Банк". А. Скогорева, "Банковское обозрение", № 6, июнь 2008. Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Аня, 10.06 Спасибо за диплом, отзыв и резенция на 100% на отлично,осталось только защитить