Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Amran Din. Usable Security using GOMS. – М.: , 2015. – 168 с.

Дополнительные результаты

  1. Francis Groves. Corporate Actions - A Concise Guide: An introduction to securities events. – М.: , 2012. – 230 с.
  2. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с.
  3. Luis Lobo-Guerrero. Insuring Security: Biopolitics, security and risk. – М.: , 2012. – 178 с.
  4. Inga Elisabeth Naumann. Joy-of-Use: Asthetik, Emotion und User Experience fur interaktive Produkte (German Edition). – М.: , 2012. – 184 с.
  5. Terrorism and the Olympics: Major Event Security and Lessons for the Future. – М.: , 2012. – 272 с.
  6. Securities Compliance Index. Securities Compliance Index, Second Edition: A Topical Guide To U.S. Securities Regulation. – М.: , 2012. – 512 с.
  7. Lionel Martellini, Philippe Priaulet, StA©phane Priaulet. Fixed-Income Securities : Valuation, Risk Management and Portfolio Strategies (The Wiley Finance Series). – М.: , 0. – 0 с.
  8. Martin Stone, Spencer Strauss. Secure Your Financial Future Investing in Real Estate. – М.: , 0. – 0 с.
  9. James O. Gill. Understanding Financial Statements: A Primer of Useful Information. – М.: Crisp Learning, 1999. – 110 с.
  10. Giorgio S. Questa. Fixed Income Analysis for the Global Financial Market: Money Market, Foreign Exchange, Securities, and Derivatives. – М.: Wiley, 1999. – 368 с.
  11. Peter A. Diamond. Taxation, Incomplete Markets, and Social Security (Munich Lectures). – М.: , 0. – 0 с.
  12. William T. Moore. Real Options and Option-Embedded Securities. – М.: , 0. – 0 с.
  13. Marilyn Greenstein, Todd M. Feinman. Electronic Commerce: Security Risk Management and Control. – М.: , 0. – 0 с.
  14. Kenneth S. Hackel, Joshua Livnat. Cash Flow and Security Analysis. – М.: , 0. – 0 с.
  15. Evelina M. Tainer. Using Economic Indicators to Improve Investment Analysis, 2nd Edition. – М.: , 0. – 0 с.
  16. Douglas Hearth, Janis K. Zaima, Janis Zaima. Contemporary Investments: Security and Portfolio Analysis. – М.: , 0. – 0 с.
  17. Risk Management, Speculation, and Derivative Securities. – М.: , 0. – 0 с.
  18. Gene Perret, Gene Using Humor for Effective Business Speaking Perret. Business Humor: Jokes & How To Deliver Them. – М.: , 0. – 0 с.
  19. Neil FitzGerald, Ryan Marples, Naisan Geula, Bob Coates, James Edkins, Michael Voloshko. Special Edition Using Crystal Reports 10 (Special Edition Using). – М.: Que Certification, 2004. – 888 с.
  20. Monte Lee Matthews. Knowledge-Driven Profit Improvement: Implementing Assessment Feedback Using PDKAction Theory. – М.: , 0. – 0 с.
  21. Anne McKinney. Real Resumes for Police, Law Enforcement and Security Jobs: Including Real Resumes Used to Change Careers and Transfer Skills to Other Industries). – М.: , 0. – 0 с.
  22. Vadim Volkov. Violent Entrepreneurs: The Use of Force in the Making of Russian Capitalism. – М.: , 0. – 0 с.
  23. Douglas R. Bohi, Michael A. Toman, Margaret A. Walls. The Economics of Energy Security. – М.: , 0. – 0 с.
  24. NATO Advanced Study Institute On: "Water Resources and Land-Use Planni, P. and Haimes, Y.Y. Laconte, Pierre Laconte, Yacov Y. Haimes, North Atlantic Treaty Organization, NATO Advanced Study Institute. Water Resources and Land-Use Planning: A Systems Approach (NATO Advanced Study Institutes Series). – М.: , 0. – 0 с.
  25. William Rini. Mathematics of the Securities Industry. – М.: , 0. – 0 с.
  26. Krishna G., Ph.D. Palepu, Paul M., Ph.D. Healy, Victor L., Ph.D. Bernard, Paul M. Healy. Business Analysis & Valuation: Using Financial Statements : Text & Cases. – М.: , 0. – 0 с.
  27. Harrison Roth. LEAPS: Long-Term Equity Anticipation Securites: What They Are and How to Use Them for Profit and Protection. – М.: , 0. – 0 с.
  28. John C. Braddock. Derivatives Demystified : Using Structured Financial Products (Wiley Series in Financial Engineering). – М.: , 1997. – 306 с.
  29. Julia Lowell, C. R. Neu, Daochi Tong, National Defense Research Institute, National Security Research Institute. Financial Crises and Contagion in Emerging Market Countries. – М.: , 0. – 0 с.
  30. Donald Bruce Keim, William T. Ziemba. Security Market Imperfections in World Wide Equity Markets (Publications of the Newton Institute , No 9). – М.: , 0. – 0 с.
  31. John P. Calamos. Convertible Securities: The Latest Instruments, Portfolio Strategies, and Valuation Analysis, Revised Edition. – М.: , 0. – 0 с.
  32. Hal McIntyre. Securities Operations Glossary Second Edition. – М.: , 0. – 0 с.
  33. Frank J. Fabozzi. Securities Lending and Repurchase Agreements. – М.: , 0. – 0 с.
  34. Frank J. Fabozzi, David P. Jacob. The Handbook of Commercial Mortgage-Backed Securities, 2nd Edition. – М.: , 0. – 0 с.
  35. Barrie A. Wigmore. The Crash and Its Aftermath : A History of Securities Markets in the United States, 1929-1933 (Contributions in Economics and Economic History). – М.: , 0. – 0 с.
  36. Peter Madlem, Larry D. Edwards. Power Investing With Basket Securities: The Investor's Guide to Exchange-Traded Funds. – М.: , 0. – 0 с.
  37. Glenn Yago. Junk Bonds: How High Yield Securities Restructured Corporate America. – М.: , 0. – 0 с.
  38. Seymour Bosworth, Michel E. Kabay. Computer Security Handbook. – М.: , 0. – 0 с.
  39. Mark B. Desman. Building an Information Security Awareness Program. – М.: , 0. – 0 с.
  40. Gerald L. Kovacich, Edward P. Halibozek. The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, First Edition. – М.: , 0. – 0 с.
  41. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с.
  42. Mary Pat McCarthy, Stuart Campbell. Security Transformation: Digital Defense Strategies to Protect your Company's Reputation and Market Share. – М.: , 0. – 0 с.
  43. Steve Purser. A Practical Guide to Managing Information Security (Artech House Technology Management Library). – М.: , 0. – 0 с.
  44. Retail Security and Loss Prevention. – М.: , 0. – 0 с.
  45. Ultimate Financial Security Survey. – М.: , 0. – 0 с.
  46. Retail Security and Shrinkage Protection. – М.: , 0. – 0 с.
  47. Effective Security Management, Fourth Edition (Effective Security Management). – М.: , 0. – 0 с.
  48. Joseph S. Nye, William A. Owens, James R. Schlesinger, R. James Woolsey, James A. Lewis, Joseph S., Jr. Nye, James Andrew Lewis, Erin Schlather, Csis Commission on Technology Security in the Twenty-First Century. Computer Exports and National Security: New Tools for a New Century : A Report of the Csis Commission on Technology Security in the 21St-Century (Csis Panel Reports.). – М.: , 0. – 0 с.
  49. HAROLD L. LUSTIG. 4 Steps to Financial Security for Lesbian and Gay Couples. – М.: , 0. – 0 с.
  50. John Roland, Mark J. Newcomb. CCSP Cisco Secure VPN Exam Certification Guide (CCSP Self-Study). – М.: , 0. – 0 с.
  51. Diana Huggins, Will Schmied. MCDST 70-272 Exam Cram 2 : Supporting Users & Troubleshooting Desktop Applications on a Windows XP Operating System ( + CD-ROM). – М.: Que Certification, 0. – 360 с.
  52. Jothy Rosenberg and David Remy. Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption. – М.: Sams, 2004. – 380 с.
  53. Mark Pearrow. Web Site Usability Handbook. – М.: , 0. – 0 с.
  54. Andrew Sun. Using and Managing Ppp. – М.: , 0. – 0 с.
  55. Ifip Tc6, Tc11 Joint Working Conference on Communications and Multimedi, Tomaz Klobucar. Advanced Communications and Multimedia Security: Ifip Tc6/Tc11 Sixth Joint Working Conference on Communications and Multimedia Security, September 26-27, 2002, Portoroz, Slovenia (International Federation for Information Processing, 100). – М.: , 0. – 0 с.
  56. Jesus Mena. Homeland Security Techniques and Technologies (Networking Series). – М.: , 0. – 0 с.
  57. David Travis. E-Commerce Usability. – М.: CRC Press, 2002. – 128 с.
  58. Paul S. Adler, Terry A. Winograd. Usability: Turning Technologies into Tools. – М.: , 0. – 0 с.
  59. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с.
  60. William H. Meyer. Security, Economics, and Morality in American Foreign Policy: Contemporary Issues in Historical Context. – М.: , 2003. – 0 с.
  61. Kenneth Atchity. How to Escape Lifetime Security and Pursue Your Impossible Dream: A Guide to Transforming Your Career. – М.: , 2004. – 0 с.
  62. Stefan Kokot. The Econometrics of Sequential Trade Models : Theory and Applications Using High Frequency Data (Lecture Notes in Economics and Mathematical Systems). – М.: , 2004. – 0 с.
  63. Peter A. Diamond. Taxation, Incomplete Markets, and Social Security (Munich Lectures). – М.: , 2005. – 0 с.
  64. Thomas C. Glaessner. Electronic Safety and Soundness: Securing Finance in a New Age (World Bank Working Papers). – М.: , 2004. – 0 с.
  65. Edited by Hal S. Scott. Capital Adequacy Beyond Basel: Banking, Securities, and Insurance. – М.: Oxford University Press, 2005. – 354 с.
  66. Stephen Penman. Financial Statement Analysis and Security Valuation. – М.: , 2003. – 0 с.
  67. Gordon E. Smith. E-Commerce: A Control and Security Guide. – М.: , 2003. – 0 с.
  68. The Secure Online Business: E-Commerce, It Functionality & Business Continuity. – М.: , 2003. – 0 с.
  69. E-Commerce Security: Advice from Experts (IT Solutions series). – М.: , 2004. – 0 с.
  70. Advances in Security and Payment Methods for Mobile Commerce. – М.: , 2004. – 0 с.
  71. Economics of Information Security (Advances in Information Security). – М.: , 2004. – 0 с.
  72. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с.
  73. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с.
  74. Sudhanshu Kairab. A Practical Guide to Security Assessments. – М.: , 2004. – 498 с.
  75. Rickland Hollar. Enterprise Web Services Security (Internet Series). – М.: , 2005. – 432 с.
  76. Ron Ben Natan. Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase. – М.: , 2005. – 432 с.
  77. Helen Nesadurai. Globalisation and Economic Security in East Asia: Governance and Institutions. – М.: , 2005. – 256 с.
  78. Scott Watson. The Art of War for Security Managers: 10 Steps to Enhancing Organizational Effectiveness. – М.: , 2007. – 200 с.
  79. Jeremy Bolland. Writing Securities Research: A Best Practice Guide. – М.: , 2007. – 120 с.
  80. Ira Winkler. Zen and the Art of Information Security. – М.: , 2007. – 192 с.
  81. Gillette Edmunds, James Keene. Retire On the House: Using Real Estate To Secure Your Retirement. – М.: , 2005. – 288 с.
  82. Committee on Federal Regulation of Securities Committee. The Fund Director's Guidebook: Third Edition (Fund Director's Guidebook). – М.: , 2006. – 128 с.
  83. Timothy P. Layton. Information Security. – М.: , 2006. – 222 с.
  84. Michael Khairallah. Physical Security Systems Handbook: The Design and Implementation of Electronic Security Systems. – М.: , 2005. – 312 с.
  85. Michael Gentile, Ron Collette, Tom August. The Ciso Handbook: A Practical Guide to Securing Your Company. – М.: , 2005. – 352 с.
  86. Sustainable Metals Management : Securing Our Future - Steps Towards a Closed Loop Economy (Eco-Efficiency in Industry and Science) (Eco-Efficiency in Industry and Science). – М.: , 2006. – 607 с.
  87. Helen James. Security and Stustaibable Developement in Myanmar/Burma (Routledge Contemporary Southeast Asia Series). – М.: , 2006. – 231 с.
  88. Allen G. Taylor. SQL For Dummies. – М.: For Dummies, 2006. – 432 с.
  89. E. G. Frankel. Oil and Security: Sands over Arabia: A World beyond Petroleum. – М.: Springer, 2008. – 201 с.
  90. Roy H. Campbell, Prasad G. Naldurg. Security and Survivability: Analyzing, Modeling, and Verifying Dynamic Recovery in Insecure Systems. – М.: , 2008. – 240 с.
  91. Vincenzo Galasso. The Political Future of Social Security in Aging Societies. – М.: , 2008. – 280 с.
  92. Max Isaacman. Investing with Intelligent ETFs: Strategies for Profiting from the New Breed of Securities (McGraw-Hill Finance & Investing). – М.: , 2008. – 256 с.
  93. Jay Hakes. A Declaration of Energy Independence: How Freedom from Foreign Oil Can Improve National Security, Our Economy, and the Environment. – М.: Wiley, 2008. – 256 с.
  94. Environmental Change and Human Security: Recognizing and Acting on Hazard Impacts (NATO Science for Peace and Security Series C: Environmental Security). – М.: , 2008. – 480 с.
  95. Meridian Securities Market. World Stock Exchange Fact Book. – М.: , 2008. – 0 с.
  96. Gerard Blokdijk, Ivanka Menken. Information Security Management Best Practice Workbook: Implementation and Management Roadmap for Threats, Challenges and Solutions - Ready to use supporting documents bringing Theory into Practice. – М.: , 2008. – 124 с.
  97. Committee on Scientific Use of the Radio Spectrum, Committee on Radio Frequencies, National Research. Spectrum Management for Science in the 21st Century. – М.: , 2010. – 160 с.
  98. John Paul Mueller. NET Development Security SolutionsTM. – М.: , 2003. – 472 с.
  99. Russ Rogers. Network Security Evaluation Using the NSA IEM. – М.: , 2010. – 450 с.
  100. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с.
  101. Thomas K Landauer. The Trouble with Computers – Usefulness, Usability & Productivity (Paper). – М.: , 1996. – 440 с.
  102. Thomas K Landauer. Landauer: The Trouble With Computers – Usefulness, Usability, & Productivity (cloth). – М.: , 1995. – 440 с.
  103. Lorrie Cranor. Security and Usability. – М.: , 2005. – 738 с.
  104. Principles Of Computer Security, Comptia Security+ And Beyond, Second Edition. – М.: , 2011. – 0 с.
  105. Microsoft Sql Server 2008 A Beginner'S Guide 4/E. – М.: , 2011. – 709 с.
  106. Oracle Database Administration For Microsoft Sql Server Dbas. – М.: , 2011. – 352 с.
  107. Eduardo Fernandez-Buglioni. Security Patterns in Practice: Designing Secure Architectures Using Software Patterns. – М.: Wiley, 2013. – 582 с.
  108. Afaz Uddin Ahmed,Taufiq Mahmud Masum and Mohammad Mahbubur Rahman. Design of an Automated Secure Garage System by Using LPR Method. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  109. Vivek Bhushan. Securing Published Data In Cloud Using Data Incognito. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  110. Shaek Rana Mohammad Baki Billah and Mohammad Hafizur Rahman. Design & Development of Network Security System using IP Tables. – М.: LAP Lambert Academic Publishing, 2013. – 164 с.
  111. Nitin Kanzariya and Ashish Nimavat. Security of Digital Image Using Hybrid Steganography. – М.: LAP Lambert Academic Publishing, 2013. – 84 с.
  112. Tasnuva Ahmed,Rabiul Hossain and Dipesh Barua. Security System Using Ultrasound. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  113. Punit N. Dhirawani. A Holistic Security System Using Motion Sensors. – М.: LAP Lambert Academic Publishing, 2011. – 72 с.
  114. Ruben Johnnson Robert Jeremiah,Sakthivel Murugan Shamjith and Allen Vimal. Security System of Oilfield using Wireless in PLC & TESTBED for SCADA. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  115. Md. Nazmul Hasan. PLC "Bible" & Automatic Rail Gate Control & Security Using ‘PLC’. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  116. Atif Farrukh. Secure Communication using Rossler Attractor. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  117. Lorenzo Cozzella. Data and Information Security using Hylemetric Approach. – М.: LAP Lambert Academic Publishing, 2014. – 204 с.
  118. Meline Khachatryan. Land Use and Food Security in the Republic of Armenia. – М.: LAP Lambert Academic Publishing, 2011. – 104 с.
  119. Sylvestre Habimana and Marie Claudine Kangabe. Efficacy of herbicides for weed management in soybean (Glycine max L.). – М.: LAP Lambert Academic Publishing, 2014. – 156 с.
  120. Kelly Barbara Schnare. Integrated Water Resource Management in a Developing Tropical Basin. – М.: LAP Lambert Academic Publishing, 2014. – 92 с.
  121. Nathaniel Umukoro and Joseph Okon. Development and Security. – М.: LAP Lambert Academic Publishing, 2012. – 208 с.
  122. Harkirat Padda. QUIM: A Model for Usability/Quality in use Measurement. – М.: LAP Lambert Academic Publishing, 2009. – 124 с.
  123. Rayala Upendar Rao and K. Palanivel. Secure Routing In Cluster Based Wireless Sensor Network By Using ECC. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  124. Saurabh Mittal,Ankita Mittal and Sapna Boora. Security Enhancement using Dynamic Cache on DSR Based MANETS. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  125. Amish Kumar. AES Security Enhancement Using Double S-Box. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  126. Shilpa Jaiswal. Elimination of Security Threats Using Trusted Proactive Routing. – М.: LAP Lambert Academic Publishing, 2014. – 56 с.
  127. Satarupa Chakraborty,Subarna Laha and Ankana Dhar. GSM Security Using Elliptic Curve Cryptography. – М.: LAP Lambert Academic Publishing, 2013. – 164 с.
  128. Britto R. Kumar and Albert S. Rabara. An Architecture for Secure Mobile Payment System using PKI. – М.: LAP Lambert Academic Publishing, 2013. – 184 с.
  129. Pekka Ketola. Usability, Concurrent Engineering and Mobile Phone Development. – М.: LAP Lambert Academic Publishing, 2009. – 184 с.
  130. E. Madhusudhana Reddy. Development of Secure Protocols for MHIS Using RMPJK–RSA Cryptosystem. – М.: LAP Lambert Academic Publishing, 2011. – 204 с.
  131. Mahimn Bhupendrabhai Pandya,Ashish Jani and Nalin Jani. Bespoke Technique For Copyright Digital Images & Secure Communication. – М.: LAP Lambert Academic Publishing, 2014. – 84 с.
  132. Manoj Kumar. Hybrid Video watermarking. – М.: LAP Lambert Academic Publishing, 2013. – 144 с.
  133. Arash Habibi Lashkari and Farnaz Towhidi. Graphical User Authentication (GUA). – М.: LAP Lambert Academic Publishing, 2010. – 88 с.
  134. Kerem Beygo and Cihan Eraslan. Enhancing Security and Usability Features of NFC. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  135. Ahmed Elhadad,Saad Rida and Amal Khalifa. DNA-Based Cryptography. – М.: LAP Lambert Academic Publishing, 2013. – 104 с.
  136. Ravi Khadka. Model-Driven Development of Service Compositions. – М.: LAP Lambert Academic Publishing, 2011. – 184 с.
  137. Haneen Qarabash. An Intranet Based System For Securities Trading. – М.: LAP Lambert Academic Publishing, 2013. – 84 с.
  138. JOHN CHIBAYA MBUYA PhD. BANK SECURITIES MANAGEMENT. – М.: LAP Lambert Academic Publishing, 2010. – 108 с.
  139. Tracy Jane Filmer-Clark. The Forgotten Password. – М.: , 2010. – 80 с.
  140. Amran Din. Usable Security using GOMS. – М.: , 2015. – 168 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

Ничего не найдено

Образцы работ

Тема и предметТип и объем работы
Последствия операции НАТО
Политология
Диплом
80 стр.
Платежные системы в Интернете
Информатика
Диплом
102 стр.
Роль ОБСЕ в урегулировании конфликтов в Европе
Политология
Курсовая работа
33 стр.
Проблемы реформирования ОБСЕ
Политология
Курсовая работа
29 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Лена
Здравствуйте Марина!!! За все задания, сделанные на основе ваших консультаций мне поставили пятерки, только за 22 и 23 - четверки. Я так рада, что есть такие хорошие люди, как Вы. Марина, поздравляю Вас с наступающим Новым годом! Желаю Вам и всем вашим близким крепкого здоровья, удачи и благополучия!!!