Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Joel Lerner. Financial Planning for the Utterly Confused. – М.: , 0. – 0 с. Jill Andresky Fraser. White Collar Sweatshop: The Deterioration of Work and Its Reward in Corporate America. – М.: , 0. – 0 с. Dean Baker, Mark Weisbrot. Social Security: The Phony Crisis. – М.: , 0. – 0 с. Andrew W. Lo. The Industrial Organization and Regulation of the Securities Industry (National Bureau of Economic Research Conference Report). – М.: , 0. – 0 с. Ann Poe. The McGraw-Hill Handbook of More Business Letters. – М.: , 0. – 0 с. Alexis Gutzman. Unforeseen Circumstances : Strategies and Technologies for Protecting Your Business and Your People in a Less Secure World. – М.: , 0. – 0 с. Handbook of Management Information Systems. – М.: , 0. – 0 с. Dean Baker, Mark Weisbrot, Dean Baker. Social Security: The Phony Crisis. – М.: , 0. – 0 с. Frank J. Fabozzi. Bond Portfolio Management, 2nd Edition. – М.: , 0. – 0 с. Seymour Bosworth, Michel E. Kabay. Computer Security Handbook. – М.: , 0. – 0 с. Ray Ramon. Technology Solutions for Growing Businesses. – М.: , 0. – 0 с. Christopher G. Pike. Virtual Monopoly: Building an Intellectual Property Strategy for Creative Advantage--From Patents to Trademarks, From Copyrights to Design Rights. – М.: , 0. – 0 с. E-Business, E-Government Ifip Conference on E-Commerce, Beat Schmid, Katarina Stanoevska-Slabeva, Volker Tschammer. Towards the E-Society. – М.: , 0. – 0 с. Jesus Mena. Homeland Security Techniques and Technologies (Networking Series). – М.: , 0. – 0 с. Stanley Bing. 100 Bullshit Jobs...And How to Get Them. – М.: , 2007. – 297 с. Stephen Schiffman. The 250 Sales Questions To Close The Deal. – М.: , 2005. – 202 с. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с. Sustainable Metals Management : Securing Our Future - Steps Towards a Closed Loop Economy (Eco-Efficiency in Industry and Science) (Eco-Efficiency in Industry and Science). – М.: , 2006. – 607 с. Bill Phillips. The Complete Book of Locks and Locksmithing (Complete Book of Locks & Locksmithing). – М.: , 2005. – 576 с. Patrick Regan. MCTS 70-643 Exam Cram: Windows Server 2008 Applications Infrastructure, Configuring (Exam Cram). – М.: , 2008. – 480 с. Allen H. Kupetz. The Future of Less. – М.: , 2008. – 205 с. Ivanka Menken. Virtualization Architecture, Adoption and Monetization of Virtualization Projects using Best Practice Service Strategy, Service Design, Service Transition, ... and Continual Service Improvement Processes. – М.: , 2008. – 164 с. David G. Hill. Data Protection: Governance, Risk Management, and Compliance. – М.: , 2009. – 330 с. Frederic Magoules, Thi-Mai-Huong Nguyen, Lei Yu. Grid Resource Management (Chapman & Hall/Crc Numerical Analy & Scient Comp.). – М.: , 2008. – 336 с. Jim McBee. Mastering Microsoft Exchange Server 2010. – М.: , 2010. – 984 с. John Hoopes. Virtualization for Security. – М.: , 2010. – 384 с. Christa Anderson and Kristin L. Griffin. Windows Server 2008 R2: Remote Desktop Services: Resource Kit (+ CD-ROM). – М.: Microsoft Press, 2010. – 718 с. Andrew Scobell. Kim Jong Il and North Korea: The Leader and the System. – М.: , 2011. – 202 с. Citrix Xenapp™ Platinum Edition Advanced Concepts: The Official Guide. – М.: , 2011. – 454 с. Principles Of Computer Security, Comptia Security+ And Beyond, Second Edition. – М.: , 2011. – 0 с. Linux Administration: A Beginner'S Guide, Fifth Edition. – М.: , 2011. – 662 с. Citrix Xenapp Platinum Edition For Windows: The Official Guide. – М.: , 2011. – 576 с. Microsoft Virtualization With Hyper-V. – М.: , 2011. – 448 с. Oracle Fusion Middleware 11G Architecture And Management. – М.: , 2011. – 576 с. How To Do Everything With Adobe Acrobat 8. – М.: , 2011. – 508 с. Will Schmied, Thomas W. Shinder, Robert J. Shimonski, Tony Piltzecker. MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network. Study Guide and DVD Training System (Exam 70-214). – М.: Syngress, . – 822 с. David E. Williams. Virtualization with Xen: Including Xenenterprise, Xenserver, and Xenexpress. – М.: Syngress, 2007. – 384 с. Bruce Dang, Alexandre Gazet, Elias Bachaalany. Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation. – М.: Wiley, 2014. – 384 с. Bruce Dang, Alexandre Gazet, Elias Bachaalany, Sebastien Josse. Practical Reverse Engineering. – М.: John Wiley and Sons, Ltd, 2014. – 384 с. Casnocha, Ben, Hoffman, Reid. The Start-up of You. – М.: , 2014. – с. Kenneth Nwosu. TWIVES - Tool for Remote Patient Care, Access and Educational Support. – М.: LAP Lambert Academic Publishing, 2012. – 200 с. Anand Kannan. Evaluation of the Security Mechanisms in Cloud Networks. – М.: LAP Lambert Academic Publishing, 2013. – 192 с. T. Ambikadevi Amma. Inhibitors of Cloud Computing. – М.: LAP Lambert Academic Publishing, 2013. – 72 с. Indu Sreedevi,Santanu Chaudhury and Asok Bhattacharyya. Smart Camera Networks. – М.: LAP Lambert Academic Publishing, 2012. – 156 с. Amer Magableh and Mustafa Matalgah. Emerging Diversity Techniques and Their Performance in Fading Channels. – М.: LAP Lambert Academic Publishing, 2012. – 216 с. V. S. Santhosh Mithra. Virtual Growth of Sweet Potato Crop. – М.: LAP Lambert Academic Publishing, 2012. – 136 с. Athulasiri Kumara Samarakoon. Cyberspace:Anarchy or Control?. – М.: LAP Lambert Academic Publishing, 2011. – 152 с. Ajanta De Sarkar and Nandini Mukherjee. Maintaining Performance Guarantee of Applications in Grid Environment. – М.: LAP Lambert Academic Publishing, 2012. – 272 с. Tomas Bereta. The European Union As A Diplomatic Actor. – М.: LAP Lambert Academic Publishing, 2012. – 212 с. Dan Sarkar. Examining Privacy Practices of Websites Using Large Scale Data. – М.: LAP Lambert Academic Publishing, 2013. – 76 с. Faraz Fatemi Moghaddam. Secure Cloud Computing with Client-Based Control System. – М.: LAP Lambert Academic Publishing, 2013. – 100 с. RAMARAJ RAVI. AN INNOVATIVE AND TESTED PROVISIONING ALGORITHM FOR VPN. – М.: LAP Lambert Academic Publishing, 2011. – 68 с. Arun Saha. Secure Protocols for Location, Adjacency, and Identity Verification. – М.: LAP Lambert Academic Publishing, 2011. – 248 с. Lukman Sharif and Munir Ahmed. IPSec: A Practical Approach. – М.: LAP Lambert Academic Publishing, 2010. – 128 с. Rakesh Jha. Security Issues In AD-HOC And Infrastructure (WLAN) Networks. – М.: LAP Lambert Academic Publishing, 2011. – 124 с. Soham Ambiye. How Virtual Private Network benefit SMEs. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Gurpreet juneja. Security:MPLS VPN Network. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Tarek S. Sobh. Effective and Extensive VPN for Securing Web Applications. – М.: LAP Lambert Academic Publishing, 2012. – 88 с. Sohail Abbas. A Layered Security Approach for Cooperation Enforcement in MANETs. – М.: LAP Lambert Academic Publishing, 2012. – 280 с. Ajeet Singh Poonia. Investigation and Prevention of Cyber Crime. – М.: LAP Lambert Academic Publishing, 2014. – 116 с. RAMARAJ RAVI. AN OPTIMUM RESTORATION ALGORITHM FOR VIRTUAL PRIVATE NETWORKS. – М.: LAP Lambert Academic Publishing, 2011. – 60 с. Kefa Rabah. Mastering Virtualization Technology for your IT Challenges. – М.: LAP Lambert Academic Publishing, 2011. – 352 с. Danish Jamil. Designing and Evaluating the honeypots using virtual machine. – М.: LAP Lambert Academic Publishing, 2012. – 164 с. Sadia Marium. Analysis of the Security threats to Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 64 с. Kester Quist-Aphetsi. A Novel Cryptographic Key-exchange Algorithm. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Kamrul Hasan. An Investigation into Botnet Detection System. – М.: LAP Lambert Academic Publishing, 2013. – 120 с. Georgiana Lucan. Computer-Based Attacks on Governments. – М.: LAP Lambert Academic Publishing, 2010. – 76 с. Mahyar Modaresi. RFID Road. – М.: LAP Lambert Academic Publishing, 2011. – 64 с. Andre Meyer. A Framework for Distributed Mobile Multi-Media. – М.: LAP Lambert Academic Publishing, 2009. – 180 с. Sheriza Hassan-Ali. Extranets: Designing, Planning and Implementation. – М.: LAP Lambert Academic Publishing, 2010. – 92 с. Shada Al-Salamah. Towards Information Sharing in Virtual Organisations. – М.: LAP Lambert Academic Publishing, 2010. – 312 с. Alessia Saggese. Behavior Analysis. – М.: LAP Lambert Academic Publishing, 2014. – 216 с. Khandakar Entenam Unayes Ahmed. IDENTITY AND ACCESS MANAGEMENT IN CLOUD COMPUTING. – М.: LAP Lambert Academic Publishing, 2011. – 172 с. Majharul Talukder. Virtual Organization. – М.: LAP Lambert Academic Publishing, 2011. – 88 с. Vincent Osa Aghayere and Walter Idada. Accountability and Transparency in the Nigerian Public Service. – М.: LAP Lambert Academic Publishing, 2013. – 368 с. Anil Madhavapeddy. Creating High-Performance, Statically Type-Safe Network Applications. – М.: , 2010. – 180 с. Georgia Weidman. Penetration Testing: A Hands-On Introduction to Hacking. – М.: No Starch Press, 2014. – 528 с. David Rule. How to Cheat at Configuring VmWare ESX Server. – М.: Syngress, 2007. – 408 с. Дополнительные результаты Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с. Todd Barnum, Ron Dilley. The 11th Domain: People Skills for Security Management. – М.: , 2012. – 320 с. John Kampfner. Freedom For Sale: Why the World is Trading Democracy for Security. – М.: , 2012. – 452 с. Stephen R. Elias. Getting Paid: How to Collect from Bankrupt Debtors (Getting Paid: How to Collect from Bankrupt Debtors). – М.: , 0. – 0 с. James T. Turner, Michael G. Gelles. Threat Assessment: A Risk Management Approach. – М.: Routledge, 2003. – 212 с. Chris Harris. Building Innovative Teams: Strategies and Tools for Developing and Integrating High Performance Innovative Groups. – М.: , 0. – 0 с. Joseph E. Rathjen. Locksmithing. – М.: , 0. – 0 с. Safety and the Security Professional : A Guide to Occupational Safety and Health Strategies. – М.: , 0. – 0 с. Philip P. Purpura. The Security Handbook. – М.: , 0. – 0 с. Fern Lebo. Your Outplacement Handbook: Redesigning Your Career. – М.: , 0. – 0 с. Lawrence K. Grossman, Newton N. Minow, TCF. Digital Gift to the Nation: Fulfilling the Promise of the Digital and Internet Age. – М.: , 0. – 0 с. Gavin Cawthra. Securing South Africa's Democracy: Defense, Development and Security in Transition (International Political Economy Series). – М.: , 0. – 0 с. David Cortright, George A. Lopez, Linda Gerber, International Peace Academy. Sanctions and the Search for Security: Challenges to the UN Action. – М.: , 0. – 0 с. Roberta Romano. The Advantage of Competitive Federalism for Securities Regulation. – М.: , 0. – 0 с. Max Boisot. Knowledge Assets: Securing Competitive Advantage in the Information Economy. – М.: , 0. – 0 с. Max H. Boisot. Knowledge Assets: Securing Competitive Advantage in the Information Economy. – М.: , 0. – 0 с. Physical Security and the Inspection Process. – М.: , 0. – 0 с. Encyclopedia of Security Management : Techniques and technology. – М.: , 0. – 0 с. Ultimate Financial Security Survey. – М.: , 0. – 0 с. D. J. Williams. The Secrets to Good Credit and Debt Reduction : A Consumer Self Help Guide. – М.: , 0. – 0 с. Roberta Bragg. MCSE Training Guide (70-220): Windows 2000 Network Security Design, Second Edition. – М.: , 0. – 0 с. Mostafa Hashem Sherif. Protocols for Secure Electronic Commerce, Second Edition. – М.: , 0. – 0 с. John R. Vacca. Public Key Infrastructure: Building Trusted Applications and Web Services. – М.: , 0. – 0 с. Payment Technologies for E-Commerce. – М.: , 2003. – 0 с. The Security Economy (Safety Standards Series:). – М.: , 2004. – 0 с. Thomas C. Glaessner. Electronic Safety and Soundness: Securing Finance in a New Age (World Bank Working Papers). – М.: , 2004. – 0 с. Joseph Johnson. Do's and Don'ts of Fundraising. – М.: , 2004. – 0 с. Sudhanshu Kairab. A Practical Guide to Security Assessments. – М.: , 2004. – 498 с. Michel Noel, Zeynep Kantur, Yevgeny Krasnov. Development of Capital Markets and Institutional Investors in Russia: Recent Achievements and Policy Challenges Ahead. – М.: World Bank Publications, 2006. – 152 с. Scott Watson. The Art of War for Security Managers: 10 Steps to Enhancing Organizational Effectiveness. – М.: , 2007. – 200 с. Betty E. Biringer, Rudolph V. Matalucci, Sharon L. O'Connor. Security Risk Assessment and Management: A Professional Practice Guide for Protecting Buildings and Infrastructures. – М.: , 2007. – 384 с. Peterson's Vocational and Technical Schools East. – М.: , 2006. – 579 с. James B. Rule. Privacy in Peril: How We are Sacrificing a Fundamental Right in Exchange for Security and Convenience. – М.: , 2007. – 256 с. Environmental Security in Harbors and Coastal Areas: Management Using Comparative Risk Assessment and Multi-Criteria Decision Analysis (NATO Science for ... Security Series C: Envi. – М.: , 2007. – 492 с. Rachel Bronson. Thicker Than Oil: America's Uneasy Partnership with Saudi Arabia. – М.: , 2008. – 384 с. Andy Walker. Windows Lockdown!: Your XP and Vista Guide Against Hacks, Attacks, and Other Internet Mayhem (Absolute Beginner's Guide). – М.: , 2008. – 480 с. Fredrik Nilsson, Communications Axis. Intelligent Network Video: Understanding Modern Video Surveillance Systems. – М.: , 2008. – 440 с. Ibp Usa. European System for Security and Cooperation Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Craig S. Wright. The IT Regulatory and Standards Compliance Handbook: How to Survive Information Systems Audit and Assessments. – М.: , 2008. – 750 с. Handbook on Information Technology in Finance (International Handbooks on Information Systems). – М.: , 2008. – 800 с. Gabor Pusztai. Managing Higher Education: Theory and Applications in Higher Education Reform. – М.: , 2008. – 84 с. Philipp Caspar Koch. Optimizing Distribution: Systems in Asset Management. – М.: , 2008. – 326 с. Timothy M. Virtue. Payment Card Industry Data Security Standard Handbook. – М.: Wiley, 2009. – 224 с. Carl Roper. Risk Management for Security Professionals. – М.: , 2010. – 304 с. Carl Young. Metrics and Methods for Security Risk Management. – М.: , 2010. – 296 с. Applied Quantum Cryptography (Lecture Notes in Physics). – М.: , 2010. – 230 с. David L. Cannon. CISA Certified Information Systems Auditor Study Guide. – М.: John Wiley and Sons, Ltd, 2010. – 704 с. Jesus Mena. Investigative Data Mining for Security and Criminal Detection. – М.: , 2010. – 272 с. James C Foster. Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploitsand Tool Coding for Security Professionals. – М.: , 2010. – 700 с. Tony Flick, Justin Morehouse. Securing the Smart Grid: Next Generation Power Grid Security. – М.: Рид Элсивер, 2011. – 320 с. John Hoopes. Virtualization for Security. – М.: , 2010. – 384 с. Editor Dave Kleiman. The Official CHFI: Exam 312-49: Study Guide. – М.: Syngress, 2010. – 964 с. Jeffrey Lewis. The Minimum Means of Reprisal – China?s Search for Security in the Nuclear Age. – М.: , 2007. – 200 с. Jeffrey Lewis. The Minimum Means of Reprisal – China?s Search for Security in the Nuclear Age. – М.: , 2007. – 200 с. Christa Anderson and Kristin L. Griffin. Windows Server 2008 R2: Remote Desktop Services: Resource Kit (+ CD-ROM). – М.: Microsoft Press, 2010. – 718 с. C Haber. Old Age & the Search for Security – An American Social History. – М.: , 1994. – 212 с. Mark S. Merkow. Building SET Applications for Secure Transactions. – М.: , 1998. – 416 с. Bernard Golden. Virtualization For Dummies®. – М.: , 2007. – 384 с. Andrew J Nathan. The Great Wall & the Empty Fortress – China?s Search for Security (Paper). – М.: , 1998. – 288 с. Silvia Hagen. iPv6 Essentials. – М.: O'Reilly Media, 2006. – 448 с. Wolfgang Safran. Saudi Arabia – The Ceaseless Quest for Security. – М.: , 1985. – 592 с. Citrix Xenapp™ Platinum Edition Advanced Concepts: The Official Guide. – М.: , 2011. – 454 с. The Complete Book Of Home, Site And Office Security. – М.: , 2011. – 309 с. Securing Global Transportation Networks. – М.: , 2011. – 312 с. Hacking Exposed, Sixth Edition. – М.: , 2011. – 720 с. Wireless Network Security A Beginners Guide. – М.: , 2011. – 400 с. Oracle Fusion Middleware 11G Architecture And Management. – М.: , 2011. – 576 с. It Security Metrics: A Practical Framework For Measuring Security & Protecting Data. – М.: , 2011. – 396 с. Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky. Cisco Security Professional's Guide to Secure Intrusion Detection Systems. – М.: , . – с. Frank Thornton. How to Cheat at Deploying & Securing RFID. – М.: Syngress, 2007. – 448 с. Robert Vitalis. America's Kingdom: Mythmaking on the Saudi Oil Frontier (Stanford Studies in Middle Eastern and Islamic Studies and Cultures). – М.: , 2009. – 416 с. Tom Bingham. The Rule of Law. – М.: Penguin Books Ltd., 2011. – 224 с. Stephen Fineman. Work: A Very Short Introduction (Very Short Introductions). – М.: , 2012. – 144 с. Tom Bingham. The Rule of Law. – М.: Penguin Global, 2011. – 214 с. Mitchel Hashimoto. Vagrant: Up and Running. – М.: O'Reilly Media, 2013. – 160 с. Bruce Dang, Alexandre Gazet, Elias Bachaalany. Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation. – М.: Wiley, 2014. – 384 с. Bruce Dang, Alexandre Gazet, Elias Bachaalany, Sebastien Josse. Practical Reverse Engineering. – М.: John Wiley and Sons, Ltd, 2014. – 384 с. George S. Oreku. ENHANCING E-COMMERCE SECURITY. – М.: LAP Lambert Academic Publishing, 2011. – 212 с. Md. Mahmudul Hasan Rafee and Sharmin Akter Lima. Proximity Based Access Control (PBAC). – М.: LAP Lambert Academic Publishing, 2012. – 160 с. Govind Sharma and Manish Gupta. Secure routing in wireless mobile Ad-Hoc network. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Raffie Arshak. Investigation of Organic Polymer Based Films for Flexible Solar Cells. – М.: LAP Lambert Academic Publishing, 2014. – 148 с. Abadi Tsegay and Kumudha Raimond. Video processing for Ethiopian sign language translation. – М.: LAP Lambert Academic Publishing, 2012. – 120 с. Zahra Kalantari. Adaptation of road drainage structures to climate change. – М.: LAP Lambert Academic Publishing, 2012. – 52 с. Anand Kannan. Evaluation of the Security Mechanisms in Cloud Networks. – М.: LAP Lambert Academic Publishing, 2013. – 192 с. James Wafula. Solar Street Lighting in Bossaso- Somalia. – М.: LAP Lambert Academic Publishing, 2013. – 72 с. Jagadish Pal. Power System Static Security Analysis and Control. – М.: LAP Lambert Academic Publishing, 2010. – 160 с. Jai Parkash,Mr. Ashutosh Gupta and Dr. Pradeep Kumar Rana. SMS based Wireless Temperature monitoring. – М.: LAP Lambert Academic Publishing, 2010. – 100 с. Ronan O'Driscoll. Internet Controlled Security Robot. – М.: LAP Lambert Academic Publishing, 2014. – 52 с. Kosuru Trinadhachari. A Real World system for Motion Detection and Tracking. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Ubaid Ur Rahman and Farhana Shahid. RFID Based Library Management System. – М.: LAP Lambert Academic Publishing, 2013. – 108 с. Asad Ali,M. Afzal and Ali Amjad. Home Automation Using Touch Screen. – М.: LAP Lambert Academic Publishing, 2012. – 120 с. Zeeshan Ahmad. Remote Monitoring System. – М.: LAP Lambert Academic Publishing, 2011. – 64 с. Mahdiyeh Eslami,Hussain Shareef and Azah Mohamed. Design and Placement of Power System Stabilizer. – М.: LAP Lambert Academic Publishing, 2012. – 152 с. Andrew Gilbert Were. Rising to Urban Opportunities. – М.: LAP Lambert Academic Publishing, 2012. – 152 с. Tonia Rifaey. Child Labour in Old Cairo and the Roles Children Negotiate. – М.: LAP Lambert Academic Publishing, 2009. – 304 с. Amma Naningrum. Standardization Metadata Schema for Securing Interoperability. – М.: LAP Lambert Academic Publishing, 2012. – 112 с. Yuxuan Nie. Re-examining the Causes of Corporate Securities Fraud. – М.: LAP Lambert Academic Publishing, 2010. – 196 с. Saima Afzal. Non-Traditional Security Threats to Pakistan Post 9/11. – М.: LAP Lambert Academic Publishing, 2012. – 104 с. Clare Mackay. SELLING LONDON’S OLYMPIC BID. – М.: LAP Lambert Academic Publishing, 2012. – 96 с. ALI RAZA MOOSVI. TERRORISM. – М.: LAP Lambert Academic Publishing, 2010. – 88 с. Adriana Marais. Security and Entanglement in Quantum Key Distribution. – М.: LAP Lambert Academic Publishing, 2010. – 108 с. Veronica Fernandez-Marmol. Quantum Cryptography at High Speed. – М.: LAP Lambert Academic Publishing, 2010. – 240 с. Sushama Bhamare,Shashi Sonawane and Hemant Patel. PGR's Effect on Mango. – М.: LAP Lambert Academic Publishing, 2014. – 96 с. P.A. Pagar,R.K. Mathukia and M.K. Khistaria. Summer Sesame Response to Irrigation and Fertilizer. – М.: LAP Lambert Academic Publishing, 2014. – 116 с. Md. Shafiqul Islam. Present Status of Homestead Nursery of CARE-LIFT Project. – М.: LAP Lambert Academic Publishing, 2012. – 72 с. Gintaras Kavarskas. Security in the United Kingdom and the United States of America. – М.: LAP Lambert Academic Publishing, 2014. – 104 с. Rakesh Kumar. Human Security and Civil Society. – М.: LAP Lambert Academic Publishing, 2014. – 220 с. Sandeep Kr. Agarwal and Dr. K. V. Arya. Security in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 88 с. Prathap Jonnadula and Naga Mani Darajula. Secure Group Communication. – М.: LAP Lambert Academic Publishing, 2012. – 64 с. Mohammed azharuddin Adhoni. Secure communication in p2p networks. – М.: LAP Lambert Academic Publishing, 2012. – 124 с. Niroj Kumar Pani and Dr. Ashok Kumar Turuk. A Hybrid Zone-Based Routing Protocol for Secure Communication in MANET. – М.: LAP Lambert Academic Publishing, 2010. – 92 с. Munnujahan Ara. Reliable and Secure Wireless Communications Systems. – М.: Scholars' Press, 2014. – 140 с. Albert Wasef. Managing and Complementing PKI for Securing Vehicular Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2011. – 204 с. Rakesh Jha. Security Issues In AD-HOC And Infrastructure (WLAN) Networks. – М.: LAP Lambert Academic Publishing, 2011. – 124 с. R. Baskaran,M. S. Saleem Basha and A. Balasubramanian. Two Tier Security Framework for Service Oriented Systems. – М.: LAP Lambert Academic Publishing, 2012. – 176 с. Tarek S. Sobh. Effective and Extensive VPN for Securing Web Applications. – М.: LAP Lambert Academic Publishing, 2012. – 88 с. Seyed Mohamed Buhari. Optimizing access control lists Search for IP packet filtering. – М.: LAP Lambert Academic Publishing, 2012. – 300 с. Dimitrios Baltazis. Dynamic Authorizations for Secure Internet Applications. – М.: LAP Lambert Academic Publishing, 2012. – 152 с. Britto R. Kumar and Albert S. Rabara. An Architecture for Secure Mobile Payment System using PKI. – М.: LAP Lambert Academic Publishing, 2013. – 184 с. Usman Habib. Secure Mobile Authentication for Linux Workstation log on. – М.: LAP Lambert Academic Publishing, 2011. – 120 с. D. Maheswari Maheshlenin and V. Radha. Compound Image Segmentation and Compression for Secure Transmission. – М.: LAP Lambert Academic Publishing, 2012. – 240 с. Udai Pratap Rao,Dhiren R. Patel and Vidhya Goutham Guntaka. SVD Based Database Watermarking for Security in Database. – М.: LAP Lambert Academic Publishing, 2011. – 56 с. Roopesh Kumar. Steganography :A Technique for Information Hiding in Mobile. – М.: LAP Lambert Academic Publishing, 2014. – 76 с. Hammad Kazmi. Security and Privacy issues in Near Field Communication (NFC) Systems. – М.: LAP Lambert Academic Publishing, 2012. – 68 с. Sudipta Dey. Development Of A Secured Object Oriented Model Of E-learning System. – М.: LAP Lambert Academic Publishing, 2012. – 264 с. Sadia Marium. Analysis of the Security threats to Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 64 с. Kester Quist-Aphetsi. A Novel Cryptographic Key-exchange Algorithm. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Khalil Zebbiche. Digital Watermarking For Securing Fingerprint Data. – М.: LAP Lambert Academic Publishing, 2012. – 156 с. Moawiah Assali,Jihad Bisoomi and Iyad Tumar. New Scheme in Security Policies. – М.: LAP Lambert Academic Publishing, 2014. – 72 с. Zhishun Wang and Qifei Lu. A Method for Analyzing Security of SOA-based Systems. – М.: LAP Lambert Academic Publishing, 2011. – 68 с. Milan Senesi. Web systems security testing. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Adebayo Omotosho and Justice Emuoyibofarhe. Development of a Secure Intelligent Electronic Prescription System. – М.: LAP Lambert Academic Publishing, 2012. – 156 с. Burcu Kulahc?oglu. Timed Automata as a Verification Tool for Security Protocols. – М.: LAP Lambert Academic Publishing, 2011. – 104 с. Alessia Saggese. Behavior Analysis. – М.: LAP Lambert Academic Publishing, 2014. – 216 с. Haneen Qarabash. An Intranet Based System For Securities Trading. – М.: LAP Lambert Academic Publishing, 2013. – 84 с. Abdul Rahman and Muhammad Zia-ur-Rehman. Why Brand Loyalty is so important for successful business companies?. – М.: LAP Lambert Academic Publishing, 2012. – 64 с. Manojkumar Shastri. Right to Education & Basic Needs for Human Reference to Vedas. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. S. V. S. Kishore Kumar. Information Systems Audit And Security In Banking. – М.: LAP Lambert Academic Publishing, 2013. – 476 с. David Rule. How to Cheat at Configuring VmWare ESX Server. – М.: Syngress, 2007. – 408 с. Лучшие результаты Ничего не найдено Дополнительные результаты Мы можем управлять собственными мыслями. интервью с С. Харитоновым, врачом-психотерапевтом, психиатором, кандидатом медицинских наук, старшим научным сотрудником Московского НИИ психиатрии Росздрава РФ, членом-корреспондентом Международной академии наук. МАНЭБ, членом Британского общества когнитивных и поведенческих психотерапевтов. Membership British Association for Behavioural & Cognitive Psychoterapies / BABCP. Ф. Кульпин, "Управление персоналом", N 8, апрель 2011 г. Зачетная реструктуризация долга: институт DEBT-FOR-EQUITY SWAP в России". интервью с М. Григорьевым, старшим юристом корпоративной практики юридической фирмы "Вегас-Лекс". О. Бодрягина, "эж-ЮРИСТ", № 3, январь 2010. Управление проектами при подборе персонала. PM for HR. Е. Кривов, "Кадровик. Рекрутинг для кадровика", № 9, сентябрь 2008. Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Елена, 25.02 Огромнейшее преогромнейшее Вам спасибо! Защитилась на 5! :)