Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Amma Naningrum. Standardization Metadata Schema for Securing Interoperability. – М.: LAP Lambert Academic Publishing, 2012. – 112 с.

Дополнительные результаты

  1. Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с.
  2. Agent-Based Technologies and Applications for Enterprise Interoperability: International Workshops ATOP 2009, Budapest, Hungary, May 12, 2009, and ... Notes in Business Information Processing). – М.: , 2012. – 249 с.
  3. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с.
  4. John Kampfner. Freedom For Sale: Why the World is Trading Democracy for Security. – М.: , 2012. – 452 с.
  5. Shahid Yusuf, World Bank. Entering the 21st Century: World Development Report 1999/2000 (World Development Report (Paper), 1999 2000). – М.: , 0. – 0 с.
  6. Chris Harris. Building Innovative Teams: Strategies and Tools for Developing and Integrating High Performance Innovative Groups. – М.: , 0. – 0 с.
  7. Safety and the Security Professional : A Guide to Occupational Safety and Health Strategies. – М.: , 0. – 0 с.
  8. Dominic Cooper, Ivan T. Robertson, Gordon Tinline. Recruitment and Selection: A Framework for Success. – М.: , 0. – 0 с.
  9. Philip P. Purpura. The Security Handbook. – М.: , 0. – 0 с.
  10. Jeffrey L. Funk. Global Competition Between and Within Standards: The Case of Mobile Phones. – М.: , 0. – 0 с.
  11. Gavin Cawthra. Securing South Africa's Democracy: Defense, Development and Security in Transition (International Political Economy Series). – М.: , 0. – 0 с.
  12. Otto Loistl, Robert Petraq, Robert Petrag. Asset Management Standards: Corporate Governance for Asset Management. – М.: , 0. – 0 с.
  13. Max Boisot. Knowledge Assets: Securing Competitive Advantage in the Information Economy. – М.: , 0. – 0 с.
  14. Max H. Boisot. Knowledge Assets: Securing Competitive Advantage in the Information Economy. – М.: , 0. – 0 с.
  15. Physical Security and the Inspection Process. – М.: , 0. – 0 с.
  16. Encyclopedia of Security Management : Techniques and technology. – М.: , 0. – 0 с.
  17. Ultimate Financial Security Survey. – М.: , 0. – 0 с.
  18. Douglas B. Reeves. The Leader's Guide to Standards: A Blueprint for Educational Equity and Excellence. – М.: , 0. – 0 с.
  19. Roberta Bragg. MCSE Training Guide (70-220): Windows 2000 Network Security Design, Second Edition. – М.: , 0. – 0 с.
  20. Mostafa Hashem Sherif. Protocols for Secure Electronic Commerce, Second Edition. – М.: , 0. – 0 с.
  21. Payment Technologies for E-Commerce. – М.: , 2003. – 0 с.
  22. The Security Economy (Safety Standards Series:). – М.: , 2004. – 0 с.
  23. Standards and Audits for Ethics Management Systems : The European Perspective (Studies in Economic Ethics and Philosophy). – М.: , 2003. – 0 с.
  24. Thomas C. Glaessner. Electronic Safety and Soundness: Securing Finance in a New Age (World Bank Working Papers). – М.: , 2004. – 0 с.
  25. Barry J. Epstein. Wiley IAS 2003 CD-ROM : Interpretation and Application of International Accounting Standards. – М.: , 2003. – 0 с.
  26. Sudhanshu Kairab. A Practical Guide to Security Assessments. – М.: , 2004. – 498 с.
  27. Scott Watson. The Art of War for Security Managers: 10 Steps to Enhancing Organizational Effectiveness. – М.: , 2007. – 200 с.
  28. Betty E. Biringer, Rudolph V. Matalucci, Sharon L. O'Connor. Security Risk Assessment and Management: A Professional Practice Guide for Protecting Buildings and Infrastructures. – М.: , 2007. – 384 с.
  29. Wes Cantrell, James R. Lucas. High-Performance Ethics: 10 Timeless Principles for Next-Generation Leadership. – М.: , 2007. – 254 с.
  30. Timothy P. Layton. Information Security. – М.: , 2006. – 222 с.
  31. Susan N. Wood. Florida Standards: A Handbook for Teaching in the Sunshine State. – М.: , 2006. – 144 с.
  32. National Security Law Documents. – М.: , 2005. – 1206 с.
  33. Thomas A. Cook. Global Sourcing Logistics: How to Manage Risk And Gain Competitive Advantage in a Worldwide Marketplace. – М.: , 2006. – 378 с.
  34. Thomas E Vollmann, William Lee Berry, David Clay Whybark, F. Robert Jacobs, Thomas Vollmann, William. MANUFACTURING PLANNING AND CONTROL SYSTEMS FOR SUPPLY CHAIN MANAGEMENT : The Definitive Guide for Professionals. – М.: , 2004. – 598 с.
  35. Revisiting Keynes: Economic Possibilities for Our Grandchildren. – М.: , 2008. – 232 с.
  36. Sanjay Reddy, Christian Barry. International Trade and Labor Standards: A Proposal for Linkage. – М.: , 2008. – 232 с.
  37. Anita L. Feller. Mastering Accounting Research for the CPA Exam. – М.: , 2008. – 190 с.
  38. Ibp Usa. European System for Security and Cooperation Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  39. Craig S. Wright. The IT Regulatory and Standards Compliance Handbook: How to Survive Information Systems Audit and Assessments. – М.: , 2008. – 750 с.
  40. Timothy M. Virtue. Payment Card Industry Data Security Standard Handbook. – М.: Wiley, 2009. – 224 с.
  41. Carl Roper. Risk Management for Security Professionals. – М.: , 2010. – 304 с.
  42. Carl Young. Metrics and Methods for Security Risk Management. – М.: , 2010. – 296 с.
  43. David L. Cannon. CISA Certified Information Systems Auditor Study Guide. – М.: John Wiley and Sons, Ltd, 2010. – 704 с.
  44. Jim McBee. Mastering Microsoft Exchange Server 2010. – М.: , 2010. – 984 с.
  45. Katie Hamilton. Rules of Thumb for Home Building, Improvement, and Repair. – М.: , 2007. – 214 с.
  46. Robert L. Navin. The Mathematics of Derivatives. – М.: , 2007. – 208 с.
  47. Jesus Mena. Investigative Data Mining for Security and Criminal Detection. – М.: , 2010. – 272 с.
  48. James C Foster. Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploitsand Tool Coding for Security Professionals. – М.: , 2010. – 700 с.
  49. Tony Flick, Justin Morehouse. Securing the Smart Grid: Next Generation Power Grid Security. – М.: Рид Элсивер, 2011. – 320 с.
  50. John Hoopes. Virtualization for Security. – М.: , 2010. – 384 с.
  51. Jeffrey Lewis. The Minimum Means of Reprisal – China?s Search for Security in the Nuclear Age. – М.: , 2007. – 200 с.
  52. Jeffrey Lewis. The Minimum Means of Reprisal – China?s Search for Security in the Nuclear Age. – М.: , 2007. – 200 с.
  53. C Haber. Old Age & the Search for Security – An American Social History. – М.: , 1994. – 212 с.
  54. Mark S. Merkow. Building SET Applications for Secure Transactions. – М.: , 1998. – 416 с.
  55. Andrew J Nathan. The Great Wall & the Empty Fortress – China?s Search for Security (Paper). – М.: , 1998. – 288 с.
  56. M WHITE. White: Standards & Review Manual For Certification In Knowledge Engineering: Handbook Of Theory & Practice (pr Only). – М.: , 1991. – 664 с.
  57. INDIV. Individual Standards – ?air Pressure? For Pneumati C Controllers And Transmission Systems. – М.: , 1977. – 0 с.
  58. MT YOTHERS. Yothers ?standards And Practices? For Instrumentat Ion 5ed. – М.: , 1977. – 0 с.
  59. Wolfgang Safran. Saudi Arabia – The Ceaseless Quest for Security. – М.: , 1985. – 592 с.
  60. LM FERSON. Ferson ?standards And Practices? For Instrumentati On 6ed. – М.: , 1981. – 1038 с.
  61. The Complete Book Of Home, Site And Office Security. – М.: , 2011. – 309 с.
  62. Securing Global Transportation Networks. – М.: , 2011. – 312 с.
  63. Perfect Phrases For Classroom Teachers. – М.: , 2011. – 208 с.
  64. Wireless Network Security A Beginners Guide. – М.: , 2011. – 400 с.
  65. It Security Metrics: A Practical Framework For Measuring Security & Protecting Data. – М.: , 2011. – 396 с.
  66. Introduction To Matlab For Engineers. – М.: , 2011. – 704 с.
  67. Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky. Cisco Security Professional's Guide to Secure Intrusion Detection Systems. – М.: , . –  с.
  68. Mark F. Hornick, Erik Marcade, Sunil Venkayala. Java Data Mining: Strategy, Standard, and Practice: A Practical Guide for architecture, design, and implementation. – М.: Morgan Kaufmann, 2006. – 544 с.
  69. Frank Thornton. How to Cheat at Deploying & Securing RFID. – М.: Syngress, 2007. – 448 с.
  70. Ram Balakrishnan. Advanced QoS for Multi–Service IP/MPLS Networks. – М.: Wiley Publishing, Inc, 2008. – 464 с.
  71. George S. Oreku. ENHANCING E-COMMERCE SECURITY. – М.: LAP Lambert Academic Publishing, 2011. – 212 с.
  72. Govind Sharma and Manish Gupta. Secure routing in wireless mobile Ad-Hoc network. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  73. Raffie Arshak. Investigation of Organic Polymer Based Films for Flexible Solar Cells. – М.: LAP Lambert Academic Publishing, 2014. – 148 с.
  74. Abadi Tsegay and Kumudha Raimond. Video processing for Ethiopian sign language translation. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  75. Anand Kannan. Evaluation of the Security Mechanisms in Cloud Networks. – М.: LAP Lambert Academic Publishing, 2013. – 192 с.
  76. Jagadish Pal. Power System Static Security Analysis and Control. – М.: LAP Lambert Academic Publishing, 2010. – 160 с.
  77. Ronan O'Driscoll. Internet Controlled Security Robot. – М.: LAP Lambert Academic Publishing, 2014. – 52 с.
  78. Kosuru Trinadhachari. A Real World system for Motion Detection and Tracking. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  79. Waqas Aslam Cheema and Asad Mehmood. Estimation Techniques for LTE Downlink. – М.: LAP Lambert Academic Publishing, 2010. – 96 с.
  80. Amma Naningrum. Standardization Metadata Schema for Securing Interoperability. – М.: LAP Lambert Academic Publishing, 2012. – 112 с.
  81. Yuxuan Nie. Re-examining the Causes of Corporate Securities Fraud. – М.: LAP Lambert Academic Publishing, 2010. – 196 с.
  82. Saima Afzal. Non-Traditional Security Threats to Pakistan Post 9/11. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  83. Renjini Devaki. Women and Local Social Security. – М.: LAP Lambert Academic Publishing, 2010. – 160 с.
  84. Adriana Marais. Security and Entanglement in Quantum Key Distribution. – М.: LAP Lambert Academic Publishing, 2010. – 108 с.
  85. Nafie Almuslet,Rasha Yosif and Mubarak Elmahal. Investigation of goodness for some drugs using laser scattering. – М.: LAP Lambert Academic Publishing, 2012. – 132 с.
  86. Felipe Olivares E. and Mario Hamuy. Core-Collapse Supernovae as Standard Candles. – М.: LAP Lambert Academic Publishing, 2011. – 96 с.
  87. Waheed Ashagidigbi,Sulaiman Yusuf and Bolarinwa Omonona. Households’ Food Demand and Food Security Status in Nigeria. – М.: LAP Lambert Academic Publishing, 2013. – 80 с.
  88. Shalini Yadav. Standardization Of Recipe For Chutney And Slab From Persimmon. – М.: LAP Lambert Academic Publishing, 2014. – 104 с.
  89. Piyush Kachhadiya and Hitesh Senjaliya. Recipe for preparation of ready-to-serve beverage from aonla. – М.: LAP Lambert Academic Publishing, 2014. – 80 с.
  90. K. Kayalvizhi Kamaraj and R. Arulmozhiyan. Standardization of Media and Growth Retardants for Cut Foliage. – М.: LAP Lambert Academic Publishing, 2014. – 184 с.
  91. Mohammed Alsayel. Towards Standardizing Intenational Boundary Determination. – М.: LAP Lambert Academic Publishing, 2014. – 140 с.
  92. Alemu Addisu. Rural household Food Security Status and its Determinants. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  93. Gintaras Kavarskas. Security in the United Kingdom and the United States of America. – М.: LAP Lambert Academic Publishing, 2014. – 104 с.
  94. Rakesh Kumar. Human Security and Civil Society. – М.: LAP Lambert Academic Publishing, 2014. – 220 с.
  95. Rahul Sahu,N. P. S. Sengar and N. S. Lodhi. HPLC Method for Detection of Ingredients of Cough & Cold Preparations. – М.: LAP Lambert Academic Publishing, 2012. – 112 с.
  96. ASHOK SAHU. NBT method for estimation of Glycated Hb, its correlation with HbA1c. – М.: LAP Lambert Academic Publishing, 2010. – 64 с.
  97. Kolloju Phaneendra and Y.N. Reddy. Computational Methods for a Class of Singular Perturbation Problems. – М.: LAP Lambert Academic Publishing, 2012. – 196 с.
  98. Yang Aijun. Bayesian Variable Selection for High Dimensional Data Analysis. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.
  99. Hay Derkx. For your ears only. – М.: LAP Lambert Academic Publishing, 2010. – 136 с.
  100. Lidia Georgieva and Gencho Genchev. Risk factors for coronary heart disease. – М.: LAP Lambert Academic Publishing, 2012. – 356 с.
  101. Miriam Brielmann. Meta-Schema for Program Design in Introductory Programming. – М.: LAP Lambert Academic Publishing, 2011. – 152 с.
  102. Shiblee Sadik. Outlier Detection for Data Streams. – М.: LAP Lambert Academic Publishing, 2011. – 200 с.
  103. Sandeep Kr. Agarwal and Dr. K. V. Arya. Security in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  104. Prathap Jonnadula and Naga Mani Darajula. Secure Group Communication. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  105. Mohammed azharuddin Adhoni. Secure communication in p2p networks. – М.: LAP Lambert Academic Publishing, 2012. – 124 с.
  106. Niroj Kumar Pani and Dr. Ashok Kumar Turuk. A Hybrid Zone-Based Routing Protocol for Secure Communication in MANET. – М.: LAP Lambert Academic Publishing, 2010. – 92 с.
  107. Munnujahan Ara. Reliable and Secure Wireless Communications Systems. – М.: Scholars' Press, 2014. – 140 с.
  108. Jose Miguel Montanana Aliaga. Providing Fault Tolerance in Interconnection Networks for PC Clusters. – М.: LAP Lambert Academic Publishing, 2010. – 208 с.
  109. Albert Wasef. Managing and Complementing PKI for Securing Vehicular Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2011. – 204 с.
  110. Rakesh Jha. Security Issues In AD-HOC And Infrastructure (WLAN) Networks. – М.: LAP Lambert Academic Publishing, 2011. – 124 с.
  111. R. Baskaran,M. S. Saleem Basha and A. Balasubramanian. Two Tier Security Framework for Service Oriented Systems. – М.: LAP Lambert Academic Publishing, 2012. – 176 с.
  112. Tarek S. Sobh. Effective and Extensive VPN for Securing Web Applications. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  113. Mehmet Hilal Ozcanhan. Security & Reliability in Embedded Systems. – М.: LAP Lambert Academic Publishing, 2014. – 152 с.
  114. Seyed Mohamed Buhari. Optimizing access control lists Search for IP packet filtering. – М.: LAP Lambert Academic Publishing, 2012. – 300 с.
  115. Dimitrios Baltazis. Dynamic Authorizations for Secure Internet Applications. – М.: LAP Lambert Academic Publishing, 2012. – 152 с.
  116. Britto R. Kumar and Albert S. Rabara. An Architecture for Secure Mobile Payment System using PKI. – М.: LAP Lambert Academic Publishing, 2013. – 184 с.
  117. Usman Habib. Secure Mobile Authentication for Linux Workstation log on. – М.: LAP Lambert Academic Publishing, 2011. – 120 с.
  118. D. Maheswari Maheshlenin and V. Radha. Compound Image Segmentation and Compression for Secure Transmission. – М.: LAP Lambert Academic Publishing, 2012. – 240 с.
  119. Shilpa Chauhan,Rajeev Sobti and Sami Anand. BLAKE Algorithm Evaluation on ARM Processor. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  120. Udai Pratap Rao,Dhiren R. Patel and Vidhya Goutham Guntaka. SVD Based Database Watermarking for Security in Database. – М.: LAP Lambert Academic Publishing, 2011. – 56 с.
  121. Thuy Pham Thi Thu and Young-Koo Lee. Hybrid Similarity Measure for XML Data Integration and Transformation. – М.: LAP Lambert Academic Publishing, 2014. – 96 с.
  122. Roopesh Kumar. Steganography :A Technique for Information Hiding in Mobile. – М.: LAP Lambert Academic Publishing, 2014. – 76 с.
  123. Hammad Kazmi. Security and Privacy issues in Near Field Communication (NFC) Systems. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  124. Sudipta Dey. Development Of A Secured Object Oriented Model Of E-learning System. – М.: LAP Lambert Academic Publishing, 2012. – 264 с.
  125. Lionel Bernard. A Risk Assessment Framework for Evaluating Software-as-a-Service. – М.: LAP Lambert Academic Publishing, 2012. – 136 с.
  126. Sadia Marium. Analysis of the Security threats to Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  127. Antonio Pareja-Lora. Providing Linked Linguistic and Semantic Web Annotations. – М.: LAP Lambert Academic Publishing, 2012. – 504 с.
  128. Khalil Zebbiche. Digital Watermarking For Securing Fingerprint Data. – М.: LAP Lambert Academic Publishing, 2012. – 156 с.
  129. Moawiah Assali,Jihad Bisoomi and Iyad Tumar. New Scheme in Security Policies. – М.: LAP Lambert Academic Publishing, 2014. – 72 с.
  130. Zhishun Wang and Qifei Lu. A Method for Analyzing Security of SOA-based Systems. – М.: LAP Lambert Academic Publishing, 2011. – 68 с.
  131. Milan Senesi. Web systems security testing. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  132. Adebayo Omotosho and Justice Emuoyibofarhe. Development of a Secure Intelligent Electronic Prescription System. – М.: LAP Lambert Academic Publishing, 2012. – 156 с.
  133. Wided Guedria. A contribution to enterprise interoperability maturity assessment. – М.: LAP Lambert Academic Publishing, 2012. – 252 с.
  134. Burcu Kulahc?oglu. Timed Automata as a Verification Tool for Security Protocols. – М.: LAP Lambert Academic Publishing, 2011. – 104 с.
  135. Haneen Qarabash. An Intranet Based System For Securities Trading. – М.: LAP Lambert Academic Publishing, 2013. – 84 с.
  136. Abdul Rahman and Muhammad Zia-ur-Rehman. Why Brand Loyalty is so important for successful business companies?. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  137. Sushil Kumar Choudhary and Niraj Gupta. ERP Implementation Process For Manufacturing Industry. – М.: LAP Lambert Academic Publishing, 2015. – 208 с.
  138. Oleg V. Boev,Norbert Gruenwald and Guenter Heitmann. Engineering Curriculum Design Aligned with Accreditation Standards. – М.: Scholars' Press, 2014. – 176 с.
  139. Dhanya S. Shenoi and Dhanya N. Evaluation of the Curriculum of Standard I in schools of Ernakulam. – М.: LAP Lambert Academic Publishing, 2013. – 116 с.
  140. Manojkumar Shastri. Right to Education & Basic Needs for Human Reference to Vedas. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. У российского рынка структурного финансирования неплохие перспективы. интервью с И. Пенкиной, ведущим аналитиком Standard & Poor's. Е.Е. Смирнов, "Управление в кредитной организации", № 3, май-июнь 2007.
  2. Standard & Poor's о банках России в 2005 году. И.Е. Смирнов, "Банковское кредитование", № 3, III квартал 2005.
  3. Мы можем управлять собственными мыслями. интервью с С. Харитоновым, врачом-психотерапевтом, психиатором, кандидатом медицинских наук, старшим научным сотрудником Московского НИИ психиатрии Росздрава РФ, членом-корреспондентом Международной академии наук. МАНЭБ, членом Британского общества когнитивных и поведенческих психотерапевтов. Membership British Association for Behavioural & Cognitive Psychoterapies / BABCP. Ф. Кульпин, "Управление персоналом", N 8, апрель 2011 г.
  4. Зачетная реструктуризация долга: институт DEBT-FOR-EQUITY SWAP в России". интервью с М. Григорьевым, старшим юристом корпоративной практики юридической фирмы "Вегас-Лекс". О. Бодрягина, "эж-ЮРИСТ", № 3, январь 2010.
  5. Управление проектами при подборе персонала. PM for HR. Е. Кривов, "Кадровик. Рекрутинг для кадровика", № 9, сентябрь 2008.
  6. Южноафриканский Standard Bank покоряет Россию. интервью с Ю. Войцеховским, президентом ЗАО "Стандарт Банк". А. Скогорева, "Банковское обозрение", № 6, июнь 2008.

Образцы работ

Тема и предметТип и объем работы
Характеристика систем сертификации
Стандартизация и сертификация
Реферат
17 стр.
Порядок разработки, проектирования системы стратегического менеджмента
Менеджмент
Диплом
100 стр.
Проблемы стратегического менеджмента в организации
Менеджмент
Диплом
80 стр.
Последствия операции НАТО
Политология
Диплом
80 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Аня, 10.06
Спасибо за диплом, отзыв и резенция на 100% на отлично,осталось только защитить