Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Natural Resources - Technology, Economics & Policy. – М.: , 2012. – 500 с.
  2. M. J. Wilson, B. Maliszewska-Kordybach. Soil Quality, Sustainable Agriculture and Environmental Security in Central and Eastern Europe (NATO Science Series. 2, Environmental Security). – М.: , 0. – 0 с.
  3. Andy Robinson. Selling Social Change (Without Selling Out): Earned Income Strategies for Nonprofits. – М.: , 0. – 0 с.
  4. Cze Tubilewicz. Criticial Issues in Contemporary China. – М.: , 2006. – 269 с.
  5. Sustainable Use and Development of Watersheds (NATO Science for Peace and Security Series C: Environmental Security). – М.: , 2008. – 532 с.
  6. Dr. Florian Wieneke. Acceptance Analysis of New Technology for Sustainable WATSAN Management: A Case Study of Operating Farm Households in the Mekong Delta, Viet Nam. – М.: , 2008. – 252 с.
  7. Towards Sustainable Society on Ubiquitous Networks: The 8th IFIP Conference on e-Business, e-Services, and e-Society (I3E 2008), September 24 - 26, 2008, ... Federation for Information Processing). – М.: , 2008. – 366 с.
  8. RICHARD BATTE. Agricultural Information Systems Development: A Stakeholder Analysis Approach. – М.: , 2010. – 24 с.
  9. Alexandre Rojey. Energy and Climate. – М.: , 2009. – 168 с.
  10. Sari Greene. Sustainable Information Security. – М.: , 2010. – 400 с.
  11. The Facility Management Handbook. – М.: , 2011. – 436 с.
  12. Aakriti Poudel. Slum Upgrading and its Contribution to Environment Sustainability. – М.: LAP Lambert Academic Publishing, 2011. – 152 с.
  13. Deepak Kumar. Solar Energy Modelling and Assessing Photovoltaic Energy. – М.: Scholars' Press, 2014. – 76 с.
  14. Sophia Harmes. Food Insecurity and Chemical Agricultural Input Dependency. – М.: LAP Lambert Academic Publishing, 2013. – 392 с.
  15. Shivaji Dadabhau Argade,T. Gopikrishna and B. Vijayabhinandan. Sustainable Rural Livelihood Security Through Employment Generation. – М.: LAP Lambert Academic Publishing, 2013. – 200 с.
  16. Moira Gundu. An Information Appraoch To Household Food Security. – М.: LAP Lambert Academic Publishing, 2011. – 156 с.
  17. Mary Muiruri,Isaac Mwanzo and Augustine Afullo. HIV/AIDS and Food Security. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  18. Wole Kinati,K.P.M Chinnan and Adam Bekele. Impact of FRG Project Interventions on the Livelihoods of Farmers. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  19. Humnath Bhandari. The economics of groundwater irrigation in rice-based systems in Nepal. – М.: LAP Lambert Academic Publishing, 2014. – 300 с.
  20. Dorah Mwenye. Participatory Evaluation Of Sustainable Interventions. – М.: LAP Lambert Academic Publishing, 2012. – 208 с.
  21. P.V. Geetha Sireesha Kumar and Naidu M.V.S. Soils of Banaganapalle in Andhra Pradesh. – М.: LAP Lambert Academic Publishing, 2014. – 176 с.
  22. RICHARD BATTE. Agricultural Information Systems Development. – М.: LAP Lambert Academic Publishing, 2009. – 116 с.
  23. Wasihun Regu. Allelopathic Effects Of Eucalyptus species On Agricultural Crops. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  24. Nada Musa,Jason Githeko and Kamal El-Siddig. Challenges of Using ICTs to Disseminate Agricultural Information. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  25. Girmaw Mitikie Geremew. The Management of Small Scale Irrigation Schemes. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  26. Faustina Essandoh-Yeddu. Women Farmers' Perceptions and Adaptations. – М.: LAP Lambert Academic Publishing, 2014. – 60 с.
  27. IFEYINWA OKEKE. Modules of Access to Potable Water in a Changing World. – М.: LAP Lambert Academic Publishing, 2011. – 192 с.
  28. Kennedy Onunga. Household Organic Waste and Sustainable Urban Agriculture. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  29. Kelly Barbara Schnare. Integrated Water Resource Management in a Developing Tropical Basin. – М.: LAP Lambert Academic Publishing, 2014. – 92 с.
  30. Kazi Humayun Kabir. An Investigation into Geospatial Tools for a Multipurpose Cadastre. – М.: LAP Lambert Academic Publishing, 2011. – 100 с.
  31. Esperanza Silva. Planning for Sustainable Development of Inland Aquaculture in Angola. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  32. YEBEGAESHET LEGESSE. Distribution of Mimosa invisa in Ethiopia. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.
  33. Saleem Mustafa. Seafood Security in a Changing Climate. – М.: LAP Lambert Academic Publishing, 2010. – 180 с.
  34. Md. Altaf Hossain. Profile:Soil Conservation and Watershed Management Centre Bangladesh. – М.: LAP Lambert Academic Publishing, 2014. – 112 с.
  35. Rutendo Nhongonhema. Gender Sensitive Analysis of Conservation Agriculture: Insiza, Zimbabwe. – М.: LAP Lambert Academic Publishing, 2011. – 128 с.
  36. Ivana Zelenika. Barriers to Appropriate Technologies for Sustainable Development. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  37. Misganaw Asnakew. Rural Livelihoods Diversification. – М.: LAP Lambert Academic Publishing, 2012. – 124 с.
  38. Samuel Kiiru,Njuguna Ng’ethe and Basil Omutsotsi. United Nations and Kenya. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  39. Gebrekiros Weldegebriel. Tools of Sustainable Cultural Heritage Management in Aksum, Ethiopia. – М.: LAP Lambert Academic Publishing, 2014. – 92 с.
  40. Bjornar Valbo. Introducing a health information system in a developing country. – М.: LAP Lambert Academic Publishing, 2012. – 164 с.
  41. Helen Cripps. Collaborative Business Relationships and the Use of ICT. – М.: LAP Lambert Academic Publishing, 2010. – 328 с.
  42. Furhan Mehmood and Rajia Rafique. Information Security in Financial Organizations. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  43. Shada Al-Salamah. Towards Information Sharing in Virtual Organisations. – М.: LAP Lambert Academic Publishing, 2010. – 312 с.
  44. Chepchumba Chumo and Timothy Sulo. Food Security Implications of Coco Yam Farming in Kenya. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  45. Pankaj Jain. Telecom Services: Key Trends & Customer Perception. – М.: Scholars' Press, 2013. – 192 с.
  46. Nicholas Olekaikai. Resources And Well-being Of Communities In Marigat Division, Kenya. – М.: LAP Lambert Academic Publishing, 2014. – 220 с.
  47. Kelley Stone. Creating an Information Sharing and Analysis Center. – М.: , 2015. – 144 с.

Дополнительные результаты

  1. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с.
  2. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 515 с.
  3. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  4. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с.
  5. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с.
  6. Jack J. Champlain. Auditing Information Systems. – М.: , 0. – 0 с.
  7. Gerald Kovacich. The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition. – М.: , 0. – 0 с.
  8. Protecting Business Information : A Manager's Guide. – М.: , 0. – 0 с.
  9. Erhan Kozan, Azuma Ohuchi. Operations Research/Management Science at Work (Advances in Information Security). – М.: , 0. – 0 с.
  10. Leigh Wade. Careers in Private Security: How to Get Started, How to Get Ahead. – М.: , 0. – 0 с.
  11. Pedro Conceicao, David V. Gibson, Manuel V. Heitor, Syed Shariq. Science, Technology, and Innovation Policy: Opportunities and Challenges for the Knowledge Economy (International Series on Technology Policy and Innovation). – М.: , 0. – 0 с.
  12. Handbook of Loss Prevention and Crime Prevention, Fourth Edition. – М.: , 0. – 0 с.
  13. Charles J. Austin, Stuart B. Boxerman. Information Systems for Healthcare Management, Sixth Edition. – М.: , 0. – 0 с.
  14. Mark B. Desman. Building an Information Security Awareness Program. – М.: , 0. – 0 с.
  15. John M. D. Hunter. An Information Security Handbook (Computer Communications and Networks). – М.: , 0. – 0 с.
  16. Gerald L. Kovacich, Edward P. Halibozek. The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, First Edition. – М.: , 0. – 0 с.
  17. Thomas J. Parenty. Digital Defense: What You Should Know About Protecting Your Company's Assets. – М.: , 0. – 0 с.
  18. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с.
  19. Ifip Tc11 Wg11.5 Working Conference on Integrity and Internal Control, Michael Gertz. Integrity and Internal Control in Information Systems V: Ifip Tc11/Wg11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (Iicis), November 11-12, 2002, Bonn, Germany (International Federation for Information Processing. – М.: , 0. – 0 с.
  20. Marko Nordquist. Towards Improved Security Management Practice: Designing an Organizational Model Procedure for the Implementation of Information Security Management in Heterogeneous Information Management. – М.: , 0. – 0 с.
  21. John Graves. Management Roadmap to Information Security (Kentis Management Roadmaps). – М.: , 0. – 0 с.
  22. Simon Bell, Trevor Wood-Harper, A. T. Wood-Harper. How to Set Up Information Systems: A Non-Specialist's Guide to the Multiview Approach. – М.: , 0. – 0 с.
  23. Steve Purser. A Practical Guide to Managing Information Security (Artech House Technology Management Library). – М.: , 0. – 0 с.
  24. Christopher J. Alberts, Audrey J. Dorofee. Managing Information Security Risks: The OCTAVE Approach. – М.: , 0. – 0 с.
  25. Daniel Jennings, Joseph Boyce. Information Assurance. – М.: , 0. – 0 с.
  26. Marian Quigley, Marian Quiqley. Information Security and Ethics: Social and Organizational Issues. – М.: , 0. – 0 с.
  27. C. Warren Axelrod, Axelrod. Outsourcing Information Security. – М.: , 0. – 0 с.
  28. Harold F. Tipton, Micki Krause, Micki, Cissp Krause. Information Security Management Handbook, Fifth Edition. – М.: , 0. – 0 с.
  29. Aspatore Books Staff. Inside the Minds: Security Matters - Industry Leaders from eBay, Inc., Motorola, Internet Security Systems & More on Protecting Your Most Valuable Assets. – М.: , 0. – 0 с.
  30. Thomas Peltier, Thomas Pelitier, Justin Peltier, John A. Blackley, Peltier, Associates. Information Security Fundamentals. – М.: , 0. – 0 с.
  31. Charles Cresson Wood. Best Practices In Internet Commerce Security. – М.: , 0. – 0 с.
  32. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с.
  33. Aspatore Books. Corporate Security in the Information Age: Industry Leaders from Bose Corporation, Dow Jones, and more on Security Options, Protecting Assets, & Implementing a Strategy (Inside the Minds). – М.: , 2005. – 0 с.
  34. Barbara C. McNurlin. Information Systems Management in Practice (7th Edition). – М.: , 2005. – 0 с.
  35. The Secure Online Business: E-Commerce, It Functionality & Business Continuity. – М.: , 2003. – 0 с.
  36. Peter R., MBA Ramsaroop. Securing Business Intelligence: Knowledge and CyberSecurity in the Post 9/11 World. – М.: , 2004. – 0 с.
  37. Simon Bell. How to Set Up Information Systems: A Non-Specialist's Guide to the Multiview Approach. – М.: , 2003. – 0 с.
  38. Timothy P. Layton Sr. Information Security Awareness. – М.: , 2005. – 0 с.
  39. Economics of Information Security (Advances in Information Security). – М.: , 2004. – 0 с.
  40. Sari Greene. Security Policies and Procedures : Principles and Practices (Security). – М.: , 2005. – 0 с.
  41. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с.
  42. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с.
  43. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с.
  44. Sudhanshu Kairab. A Practical Guide to Security Assessments. – М.: , 2004. – 498 с.
  45. Ira Winkler. Zen and the Art of Information Security. – М.: , 2007. – 192 с.
  46. Timothy P. Layton. Information Security. – М.: , 2006. – 222 с.
  47. Michael Gentile, Ron Collette, Tom August. The Ciso Handbook: A Practical Guide to Securing Your Company. – М.: , 2005. – 352 с.
  48. Michael E. Whitman, Herbert J. Mattord. Principles of Information Security, Second Edition. – М.: , 2004. – 600 с.
  49. Mehdi Khosrow-Pour. Web Technologies for Commerce and Services Online. – М.: Idea Group Reference, 2007. – 392 с.
  50. Michael E. Whitman, Herbert J. Mattord. Management Of Information Security, 2/E. – М.: , 2007. – 600 с.
  51. Edward Weiner. Urban Transportation Planning in the United States: History, Policy, and Practice. – М.: , 2008. – 306 с.
  52. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с.
  53. Patrick Traynor, Patrick McDaniel, Thomas La Porta. Security for Telecommunications Networks (Advances in Information Security). – М.: , 2008. – 182 с.
  54. Stephen Gough. Sustainability and Security within Liberal Societies: Learning to Live with the Future (Routledge Studies in Social and Political Thought). – М.: , 2008. – 148 с.
  55. James Michael Stewart, Ed Tittel, Mike Chapple. CISSP: Certified Information Systems Security Professional Study Guide. – М.: , 2008. – 841 с.
  56. Alan Calder, Steve Watkins. IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002. – М.: , 2008. – 384 с.
  57. Social and Human Elements of Information Security: Emerging Trends and Countermeasures (Premier Reference Source). – М.: , 2008. – 412 с.
  58. Bartu Soral. Banking Crises and Bankruptcy for Profit in Turkey. – М.: , 2008. – 96 с.
  59. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с.
  60. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с.
  61. Gerard Blokdijk, Ivanka Menken. Information Security Management Best Practice Workbook: Implementation and Management Roadmap for Threats, Challenges and Solutions - Ready to use supporting documents bringing Theory into Practice. – М.: , 2008. – 124 с.
  62. Ivanka Menken. Virtualization Architecture, Adoption and Monetization of Virtualization Projects using Best Practice Service Strategy, Service Design, Service Transition, ... and Continual Service Improvement Processes. – М.: , 2008. – 164 с.
  63. Hamid R. Nemati. Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues (Advances in Information Security and Privacy). – М.: , 2009. – 414 с.
  64. brian Honan. Implementing ISO27001 in a Windows® Environment. – М.: , 2009. – 316 с.
  65. W. Krag Brotby. Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement. – М.: Auerbach Publications, 2009. – 200 с.
  66. Alan Calder. Information Security based on ISO 27001/ISO 27002: A Management Guide. – М.: , 2009. – 83 с.
  67. Jake Kouns, Daniel Minoli. Information Technology Risk Management in Enterprise Environments: A Review of Industry Practices and a Practical Guide to Risk Management Teams. – М.: , 2010. – 421 с.
  68. Bel G. Raggad. Information Security Management: Concepts and Practice. – М.: , 2010. – 871 с.
  69. Michael E. Whitman, Herbert J. Mattord. Management of Information Security. – М.: , 2010. – 592 с.
  70. Sid Sirisukha. Protecting Management Information Systems: VPN Competitive Advantage. – М.: , 2010. – 316 с.
  71. Alan Calder, Steve G Watkins. Information Security Risk Management for ISO27001 / ISO27002. – М.: , 2010. – 198 с.
  72. William Manning. CISM Certified Information Security Manager Certification Exam Preparation Course in a Book for Passing the CISM Exam - The How To Pass on Your First Try Certification Study Guide. – М.: , 2010. – 188 с.
  73. Evan Wheeler. Security Risk Management: Building an Information Security Risk Management Program from the Ground Up. – М.: , 2011. – 360 с.
  74. Editors Karl Maria Michael de Leeuw, Jan Bergstra. The History of Information Security: A Comprehensive Handbook. – М.: Elsevier Science, 2007. – 900 с.
  75. Global Perspectives In Information Security. – М.: , 2008. – 896 с.
  76. Kevin D. Mitnick. The Art of Intrusion. – М.: , 2005. – 270 с.
  77. Ian Appleton. Buildings for the Performing Arts. – М.: Elsevier, 2008. – 296 с.
  78. John R. Vacca. Managing Information Security. – М.: , 2010. – 320 с.
  79. G. Manoilov. Elsevier's Dictionary of Information Security. – М.: , 2010. – 772 с.
  80. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с.
  81. George L Stefanek. Information Security Best Practices. – М.: , 2010. – 160 с.
  82. Sari Greene. Sustainable Information Security. – М.: , 2010. – 400 с.
  83. John R. Vacca. Computer and Information Security Handbook. – М.: , 2010. – 928 с.
  84. Krag Brotby. Information Security Governance. – М.: , 2009. – 190 с.
  85. Principles Of Computer Security, Comptia Security+ And Beyond, Second Edition. – М.: , 2011. – 0 с.
  86. Shon Harris. CISSP All-in-One Exam Guide (+ CD-ROM). – М.: McGraw-Hill Companies, 2010. – 1216 с.
  87. Cissp Practice Exams. – М.: , 2011. – 414 с.
  88. Hacking Exposed Web Applications, 3Rd Edition. – М.: , 2011. – 482 с.
  89. Harold F. Tipton, Micki Krause. Information Security Management Handbook on CD-ROM, 2003 Edition. – М.: , . –  с.
  90. Charles L. Brooks. CHFI: Computer Hacking Forensic Investigator Certification: Exam Guide (+ CD). – М.: McGraw-Hill Education, 2015. – 656 с.
  91. Jaydeb Bhaumik and Satyajit Das. Substitution Permutation Network Type Block Cipher. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  92. Arjun Mane and Karbhari Kale. Face Recognition Using Principal Component Analysis. – М.: LAP Lambert Academic Publishing, 2015. – 144 с.
  93. Rohana Mohamad Rashid. Determining Influencing Factors of Information Security Culture. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  94. Nitin Kanzariya and Ashish Nimavat. Security of Digital Image Using Hybrid Steganography. – М.: LAP Lambert Academic Publishing, 2013. – 84 с.
  95. Wilson Okaka. Communicating Renewable Energy Scene in Uganda. – М.: LAP Lambert Academic Publishing, 2014. – 136 с.
  96. Lorenzo Cozzella. Data and Information Security using Hylemetric Approach. – М.: LAP Lambert Academic Publishing, 2014. – 204 с.
  97. Natthakich Assanee. The transition to a hydrogen economy in Thailand. – М.: LAP Lambert Academic Publishing, 2010. – 88 с.
  98. Sophia Harmes. Food Insecurity and Chemical Agricultural Input Dependency. – М.: LAP Lambert Academic Publishing, 2013. – 392 с.
  99. Abdullahi Abbas Yakubu. Sustainable Cost Recovery in Kano River Irrigation Project, Nigeria. – М.: Scholars' Press, 2014. – 260 с.
  100. Kiros Abebe,Getachew Animut and Mengistu Urge. Commericial Bank of Ethiopia. – М.: LAP Lambert Academic Publishing, 2014. – 60 с.
  101. Shalini Raghav and S.K. Srivastava. Farming Systems on Tribal Farms:Economics and Optimization. – М.: LAP Lambert Academic Publishing, 2012. – 136 с.
  102. Tadesse Getachew ASfaw. Perception and Decision of Dairy farmers on Cooperative Membership. – М.: LAP Lambert Academic Publishing, 2014. – 120 с.
  103. John Igene. Capacity Building for Food Security in Nigeria: The Missing Links. – М.: LAP Lambert Academic Publishing, 2010. – 96 с.
  104. Md. Abdul Malak and M. Nazrul Islam. Impact of Population Growth on Sustainable Food Security: A Study on. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  105. Abdurrahim Siradag. EU-AU Strategic Partnership on Security. – М.: LAP Lambert Academic Publishing, 2012. – 424 с.
  106. Techan Tefera Bedasa. Ethnic Conflicts and their Impacts on Livelihood System. – М.: LAP Lambert Academic Publishing, 2011. – 76 с.
  107. Guruju Ganapathirao and Bhaskara Rao Ponnana. Emerging Trends of Insider Trading in Corporate Sector. – М.: LAP Lambert Academic Publishing, 2013. – 116 с.
  108. Rupesh S. Mishra and D. K. Chitre. Data Leakage Detection in Relational Database. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  109. Pradeep Sadanand. Implementation of GSTRBAC using .NET framework. – М.: LAP Lambert Academic Publishing, 2012. – 56 с.
  110. Brijender Kahanwal. A Research Study On Java File Security System Using Rijndael Algorithm. – М.: LAP Lambert Academic Publishing, 2012. – 244 с.
  111. Shubha Puthran and Ketan Shah. Intrusion Detection System using datamining techniques. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  112. Ravinder Singh Mann. A Comparative Evaluation of Cryptographic Algorithms. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  113. Rupa Ch. and Avadhani P. S. Modern Security Methods in Applied Computer Science. – М.: Scholars' Press, 2014. – 124 с.
  114. Arjun Nichal. Steganography for JPEG2000 Baseline System. – М.: LAP Lambert Academic Publishing, 2013. – 60 с.
  115. Shamiel Ebrahim. Digital Signature with RSA. – М.: LAP Lambert Academic Publishing, 2011. – 76 с.
  116. Antarpreet Singh Manchanda. Design Methodology for Differential Power Analysis Resistant Circuits. – М.: LAP Lambert Academic Publishing, 2014. – 120 с.
  117. Yedji Mbangsoua and Dr. Freddie Acosta. Information Security and its Investment Justification. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  118. Udai Pratap Rao,Dhiren R. Patel and Vidhya Goutham Guntaka. SVD Based Database Watermarking for Security in Database. – М.: LAP Lambert Academic Publishing, 2011. – 56 с.
  119. Yasser Alshehri. Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 156 с.
  120. Stephen Schiavone,Lalit Garg and Kelly Summers. Information Security in Enterprises - an Ontological Perspective. – М.: LAP Lambert Academic Publishing, 2014. – 232 с.
  121. Julien Shabani. Information Security for RFID Systems. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.
  122. Debasish Jena. On Protocols for Information Security Services. – М.: LAP Lambert Academic Publishing, 2011. – 136 с.
  123. Aliyu Onipede. Biometrics as a tool for Information Security in Aviation industry. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  124. Furhan Mehmood and Rajia Rafique. Information Security in Financial Organizations. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  125. Cyrus Abanti Makori,Jane Onsongo and Lusiba Badru. ICT Security Applications. – М.: LAP Lambert Academic Publishing, 2012. – 112 с.
  126. Predrag Tasevski. Interactive Cyber Security Awareness Program. – М.: LAP Lambert Academic Publishing, 2012. – 184 с.
  127. Omar Zakaria. Information Security Culture. – М.: LAP Lambert Academic Publishing, 2013. – 248 с.
  128. Jahidul Arafat. Higher Education Information Security. – М.: LAP Lambert Academic Publishing, 2013. – 176 с.
  129. Saeed Soltanmohammadi. Improving Information System Security by Evaluating Human Factors. – М.: LAP Lambert Academic Publishing, 2014. – 116 с.
  130. frankie tvrz and marijke coetzee. Information Security of a Bluetooth-enabled handheld device. – М.: LAP Lambert Academic Publishing, 2010. – 180 с.
  131. Ahmed AlNunu. How Much Information Security?. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  132. Jeffy Mwakalinga. A Framework for Adaptive Information Security Systems. – М.: LAP Lambert Academic Publishing, 2011. – 364 с.
  133. Ubaid Hayee. A Six Sigma Approach to Assure IT Security. – М.: LAP Lambert Academic Publishing, 2011. – 64 с.
  134. Meysam Namayandeh. Development of Computer Ethical Framework for Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 132 с.
  135. Muhammad Imran Tariq. SLA based Information Security Metrics in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2014. – 192 с.
  136. Khanyisa Malufu. E-Banking Security. – М.: LAP Lambert Academic Publishing, 2013. – 112 с.
  137. Shada Al-Salamah. Towards Information Sharing in Virtual Organisations. – М.: LAP Lambert Academic Publishing, 2010. – 312 с.
  138. Alaa Al-Deen Mohammed Hassan. Information Security Management. – М.: LAP Lambert Academic Publishing, 2013. – 188 с.
  139. Jun Zheng,Jiantao Gu and Hong Wang. Financial Management and Information Security of Independent Colleges. – М.: LAP Lambert Academic Publishing, 2014. – 256 с.
  140. Ying Qian. Mitigating Information Security Risks during Operation Transition. – М.: LAP Lambert Academic Publishing, 2012. – 372 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. О качестве сервиса, связанного с запросами на медицинскую информацию. Medical Information Service?. А. Беденков, "Ремедиум", № 1, январь 2012.

Образцы работ

Тема и предметТип и объем работы
Основы избирательных компаний
PR
Диплом
72 стр.
Public relations в политике как особый «срез» общественных отношений
PR
Курсовая работа
35 стр.
Специализация учреждений ООН: правовая характеристика, привелегии и иммунитет
Международная экономика
Реферат
19 стр.
Формирование системы экономической безопасности на Белоярской АЭС
Психофизиология
Диплом
96 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Марина
Здравствуйте, Юлия. Спешу сообщить Вам что защита Курсовой состоялась успешно, немного я там, правда, намудрила, но в итоге результат 4(хорошо). Огромное Вам спасибо. Надеюсь на дальнейшее сотрудничество.