Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. David Leblanc. Writing Secure Code 2e. – М.: , 2002. – 800 с.

Дополнительные результаты

  1. Francis Groves. Corporate Actions - A Concise Guide: An introduction to securities events. – М.: , 2012. – 230 с.
  2. Hilary Tusiime. Technology of Research and Grant Proposal Writing:: A Precise Step- by -Step Guide to Proposal Formulation. – М.: , 2012. – 240 с.
  3. Mark Levy. Accidental Genius: Using Writing to Generate Your Best Ideas, Insight, and Content. – М.: , 2012. – 244 с.
  4. Jan Lowe, Tracy Lungrin. CareerCode: Know Your Code, Find Your Fit. – М.: , 2012. – 288 с.
  5. Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с.
  6. P A Flanagan. How To Write Your Business Proposal: Full Proposal Sample (Volume 1). – М.: , 2012. – 40 с.
  7. Sheila R Ronis. Economic Security: Neglected Dimension of National Security?. – М.: , 2012. – 128 с.
  8. Securities Compliance Index. Securities Compliance Index, Second Edition: A Topical Guide To U.S. Securities Regulation. – М.: , 2012. – 512 с.
  9. Sanjivi Guhan, S. Subramanian, S. Guhan. India's Development Experience: Selected Writings of S. Guhan. – М.: , 0. – 0 с.
  10. Henry J. Bailey, Richard B. Hagedorn. Secured Transactions in a Nutshell Nutshell Series) (4th ed). – М.: , 0. – 0 с.
  11. Elizabeth Chesla. IMPROVE YOUR WRITING WORK 2E. – М.: , 0. – 0 с.
  12. Philip P. Purpura. The Security Handbook. – М.: , 0. – 0 с.
  13. Robert Brooks. Building Financial Derivatives Applications with C++:. – М.: , 0. – 0 с.
  14. Julia Lowell, C. R. Neu, Daochi Tong, National Defense Research Institute, National Security Research Institute. Financial Crises and Contagion in Emerging Market Countries. – М.: , 0. – 0 с.
  15. Paul D. Kadavy. Writing Uncovered Put and Call Combinations: Earn Two Option Premiums from One Margin Requirement on Individual Stocks and Exchange Traded Funds (ETFs) Without Owning Them. – М.: Arrow Publications, 2009. – 186 с.
  16. Jerry O'Connell, Neale Steiniger. Handbook of Global Securities Operatiions. – М.: , 0. – 0 с.
  17. Joseph S. Nye, William A. Owens, James R. Schlesinger, R. James Woolsey, James A. Lewis, Joseph S., Jr. Nye, James Andrew Lewis, Erin Schlather, Csis Commission on Technology Security in the Twenty-First Century. Computer Exports and National Security: New Tools for a New Century : A Report of the Csis Commission on Technology Security in the 21St-Century (Csis Panel Reports.). – М.: , 0. – 0 с.
  18. R. F. Churchhouse. Codes and Ciphers: Julius Caesar, the Enigma, and the Internet. – М.: , 0. – 0 с.
  19. Geoffrey Lamb. Fun With Secret Writing (Test Your Code Breaking Skills). – М.: , 0. – 0 с.
  20. Peter Ladka. ASP.NET for Web Designers. – М.: , 0. – 0 с.
  21. Jonathan S. Held, John R. Bowers. Securing E-Business Applications and Communications. – М.: , 0. – 0 с.
  22. Vesna Hassler. Security Fundamentals for E-Commerce (Artech House Computer Security Series). – М.: , 0. – 0 с.
  23. Simson Garfinkel, Gene Spafford. Web Security & Commerce (O'Reilly Nutshell). – М.: , 0. – 0 с.
  24. International Code Council. International Fire Code 2003 (International Fire Code). – М.: , 2003. – 0 с.
  25. Brian Gouin. Security Design Consulting: The Business of Security System Design. – М.: , 2007. – 200 с.
  26. Jeremy Bolland. Writing Securities Research: A Best Practice Guide. – М.: , 2007. – 120 с.
  27. Linda Pieczynski. The Building Official's and Inspector's Guide to Codes, Forms, and Complaints. – М.: , 2007. – 0 с.
  28. Crawford Kilian. Writing for the Web (Self-Counsel Writing). – М.: , 2007. – 200 с.
  29. Committee on Federal Regulation of Securities Committee. The Fund Director's Guidebook: Third Edition (Fund Director's Guidebook). – М.: , 2006. – 128 с.
  30. Tourism, Security and Safety: From Theory to Practice (The Management of Hospitality and Tourism Enterprises). – М.: , 2005. – 376 с.
  31. Sue Jefferson, Darlene Smith-Worthington. Technical Writing for Success. – М.: , 2004. – 418 с.
  32. Alan Calder, Steve Watkins. IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002. – М.: , 2008. – 384 с.
  33. Lloyd's MIU Handbook of Maritime Security. – М.: , 2008. – 400 с.
  34. Meridian Securities Market. World Stock Exchange Fact Book. – М.: , 2008. – 0 с.
  35. Setareh Korkchi. Corporate Social Responsibility: The Limits and Dangers with Corporate Codes of Conduct. – М.: , 2008. – 80 с.
  36. CompTIA Security+: Certification Kit (комплект из 3 книг + 2 CD-ROM). – М.: Sybex, 2009. – 1440 с.
  37. Dan Furman. Do the Web Write: Writing for and Marketing Your Website. – М.: , 2009. – 180 с.
  38. Bob LeVitus, Jeff Evans. WebMaster Windows: How to Build Your Own World Wide Web Server Without Really Trying (+ CD-ROM). – М.: AP Professional, 1997. – 512 с.
  39. Robert C. Seacord. The CERT C Secure Coding Standard. – М.: Addison-Wesley Professional, 2008. – 720 с.
  40. Alan Calder, Steve G Watkins. Information Security Risk Management for ISO27001 / ISO27002. – М.: , 2010. – 198 с.
  41. David Chelimsky, Dave Astels, Zach Dennis, Aslak Hellesoy, Bryan Helmkamp and Dan North. The RSpec Book: Behaviour-Driven Development with Rspec, Cucumber, and Friends. – М.: Pragmatic Bookshelf, 2010. – 448 с.
  42. Editors Karl Maria Michael de Leeuw, Jan Bergstra. The History of Information Security: A Comprehensive Handbook. – М.: Elsevier Science, 2007. – 900 с.
  43. John Paul Mueller. NET Development Security SolutionsTM. – М.: , 2003. – 472 с.
  44. Janine Warner. Teach Yourself VISUALLYTM Dreamweaver® CS5. – М.: , 2010. – 336 с.
  45. Timothy Boronczyk. PHP and MySQL®. – М.: , 2008. – 342 с.
  46. Jeremy Bolland. Writing Securities Research. – М.: , 2010. – 192 с.
  47. James C Foster. Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploitsand Tool Coding for Security Professionals. – М.: , 2010. – 700 с.
  48. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с.
  49. Syngress. Managing Cisco Network Security 2E. – М.: , 2010. – 752 с.
  50. Michael Cross. 2008 Ultimate Secure Coding CD. – М.: , 2010. – 0 с.
  51. Gerald Graff. They Say/I Say – The Moves that Matter in Academic Writing 2e. – М.: , 2010. – 0 с.
  52. Ferenc Mate. A Reasonable Life – Toward a Simpler, Secure, More Humane Existence 2e. – М.: , 1999. – 272 с.
  53. Jennifer J Baker. Securing the Commonwealth – Debt, Speculation, and Writing in the Making of Early America. – М.: , 2008. – 232 с.
  54. Stephen A Kliment. Writing for Design Professionals – A Guide to Writing Successful Proposals, Letters, Brochures, Portfolios, Reports, Presentations and Job Appl 2e. – М.: , 2006. – 248 с.
  55. Terence Brunk. Literacies – Reading, Writing, Interpretation 2e. – М.: , 2000. – 0 с.
  56. National Writing Project. Writing for a Change. – М.: , 2006. – 192 с.
  57. Jennifer J Baker. Securing the Commonwealth – Debt, Speculation, and Writing in the Making of Early America. – М.: , 2006. – 240 с.
  58. Dawn Rodriques. Writing Essentials 2e. – М.: , 1999. – 212 с.
  59. T Brunk. Literacies – Reading, Writing, Interpretation 2e. – М.: , 1996. – 0 с.
  60. National Writing Project. Because Digital Writing Matters. – М.: , 2010. – 208 с.
  61. Bryan O'Sullivan, John Goerzen and Don Stewart. Real World Haskell. – М.: O'Reilly Media, 2008. – 714 с.
  62. David Leblanc. Writing Secure Code 2e. – М.: , 2002. – 800 с.
  63. Jerome Beaty. New Worlds of Literature 2e – Writings from America?s Many Cultures. – М.: , 1994. – 1004 с.
  64. J Beaty. New Worlds of Literature 2e TM – Writings from America?s Many Cultures. – М.: , 1994. – 272 с.
  65. St Paul. The Writings of St Paul 2e (NCE). – М.: , 2007. – 480 с.
  66. Mc Hairston. Successful Writing 2e TM. – М.: , 1988. – 0 с.
  67. Simson Garfinkel. Web Security, Privacy & Commerce 2e. – М.: , 2001. – 790 с.
  68. Steve Mcconnell. Code Complete 2e. – М.: , 2004. – 960 с.
  69. Scott Oaks. Java Security 2e. – М.: , 2001. – 624 с.
  70. Francis–noel Thomas. Clear and Simple As The Truth – Writing Classic Prose 2e. – М.: , 2011. – 240 с.
  71. National Writing Project. Because Writing Matters. – М.: , 2006. – 144 с.
  72. R Finch. The Norton Book of Nature Writing 2e. – М.: , 2004. – 1024 с.
  73. Howard S Becker. Writing for Social Scientists – How to Start and Finish Your Thesis, Book or Article 2e. – М.: , 2008. – 208 с.
  74. CODEE (Consortium for ODE Experiments). ODE Architect Companion. – М.: , 1998. – 288 с.
  75. Andrew Lockhart. Network Security Hacks 2e. – М.: , 2006. – 352 с.
  76. Peterson. Error Correcting Codes 2e. – М.: , 1972. – 0 с.
  77. Chris Mcnab. Network Security Assessment 2e. – М.: , 2007. – 464 с.
  78. Cryptography & Network Security. – М.: , 2007. – 0 с.
  79. Careers In Writing. – М.: , 2011. – 192 с.
  80. Mysql Database Usage & Administration. – М.: , 2011. – 368 с.
  81. Benjamin Graham, Building A Profession: The Early Writings Of The Father Of Security Analysis. – М.: , 2011. – 352 с.
  82. 24 Deadly Sins Of Software Security: Programming Flaws And How To Fix Them. – М.: , 2011. – 432 с.
  83. Gray Hat Hacking The Ethical Hackers Handbook, 3Rd Edition. – М.: , 2011. – 720 с.
  84. Mobile Application Security. – М.: , 2011. – 432 с.
  85. Ulrich Drobnig. Principles of European Law: Volume 3: Personal Security Contracts (European Civil Code Series) (v. 3). – М.: Oxford University Press, 2007. – 400 с.
  86. Chris Cant. Writing Windows Wdm Device Drivers: Covers Nt 4, Win 98, and Win 2000. – М.: , . –  с.
  87. Suely Oliveira, David E. Stewart. Writing Scientific Software: A Guide to Good Style. – М.: , 2006. – 316 с.
  88. Judy Copage. First Certificate Writing: Teacher's Book. – М.: Pearson Education Limited, Longman, 1999. – 28 с.
  89. Eduardo Fernandez-Buglioni. Security Patterns in Practice: Designing Secure Architectures Using Software Patterns. – М.: Wiley, 2013. – 582 с.
  90. Poster Writing Group. Chinese Character Poster Pack(10 packs). – М.: , 2010. –  с.
  91. Rosemary Aravanis. Code Blue B1: Teacher's Book (+ CD-ROM). – М.: Macmillan Hellas, 2010. – 208 с.
  92. Rosemary Aravanis, George Vassilakis. Code Blue B1: Student's Book. – М.: Macmillan Education, 2010. – 176 с.
  93. Rosemary Aravanis, Stuart Cochrane. Code Blue B1: Workbook (+ CD). – М.: Macmillan Education, 2010. – 120 с.
  94. Michele Crawford, Rob Nicholas, Stuart Cochrane. Code Red: Level B2: Student's Book. – М.: Macmillan Education, 2010. – 168 с.
  95. Rob Nicholas. Code Red: Level B2: Teacher's Book (+ CD). – М.: Macmillan Education, 2010. – 200 с.
  96. Angela Bandis, Rob nicholas. Code Red: B2: Student Workbook (+ CD). – М.: Macmillan Education, 2010. – 126 с.
  97. Chelimsky. The RSpec Book: Behaviour-Driven Development with Rspec, Cucumber, and Friends. – М.: The Pragmatic Programmers, 2011. – 448 с.
  98. Itzik Ben-Gan. Microsoft SQL Server 2012 T-SQL Fundamentals. – М.: Microsoft Corporation, Microsoft Press, 2012. – 444 с.
  99. Richard O'Neill. Unlock: Level 2: Reading and Writing Skills: Student's Book with Online Workbook. – М.: Cambridge University Press, 2014. – 208 с.
  100. Chris Sowton. Unlock: Level 4: Reading and Writing Skills: Student's Book with Online Workbook. – М.: Cambridge University Press, 2014. – 208 с.
  101. Carolyn Westbrook. Unlock: Level 3: Reading and Writing Skills: Student's Book with Online Workbook. – М.: Cambridge University Press, 2014. – 208 с.
  102. Pawel Althamer, Anatoly Osmolovsky. Pawel Althamer, Anatoly Osmolovsky: Parallel Convergences. Anatoly Osmolovsky: Selected writings (комплект из 2 книг). – М.: Marsilio, 2014. – 192 с.
  103. Shaikh Salim and Shankar Nawale. Secure Access of RFID System. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  104. Enangha Abeng. A Hybrid Hash Message Authentication Code (HMAC). – М.: LAP Lambert Academic Publishing, 2011. – 204 с.
  105. Abdinasir Hassan Ali. Wireless security Handbook 2011. – М.: LAP Lambert Academic Publishing, 2011. – 124 с.
  106. Moira Gundu. An Information Appraoch To Household Food Security. – М.: LAP Lambert Academic Publishing, 2011. – 156 с.
  107. Salim Alkathiri. IMPROVED TWO-WAY PHASE CODING. – М.: LAP Lambert Academic Publishing, 2011. – 128 с.
  108. Godfrey Tawodzera. Urban Food Security in Zimbabwe. – М.: LAP Lambert Academic Publishing, 2012. – 372 с.
  109. Abrar Muslim. Model-based and Model Predictive Control for Chlorine Dosing. – М.: LAP Lambert Academic Publishing, 2010. – 168 с.
  110. Charles Mubita. Africa's Demand for a Permanent Seat on the UN Security Council. – М.: LAP Lambert Academic Publishing, 2012. – 132 с.
  111. Ioana Ban. Black Sea Region: A Nascent Security Community?. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  112. Fredrick Mayanja,Sure Mataramvura and Wilson Mahera. Portfolio Optimization Model: The Case of Uganda Securities Exchange. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  113. Kenia Nottage. ISPS Code, SUA 2005 Protocol, & Passenger Vessels. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  114. Tulia Ackson. Coordination of Social Security Systems in the SADC Region. – М.: LAP Lambert Academic Publishing, 2009. – 96 с.
  115. Lianhong Gao. Academic English Writing: the Knowledge Base. – М.: LAP Lambert Academic Publishing, 2014. – 380 с.
  116. Indira Chandrasekhara Pillai. Teaching Writing Skills to Engineering Students. – М.: LAP Lambert Academic Publishing, 2013. – 184 с.
  117. Mary Hebert and Laurie Jacques. Re-Visioning Writing. – М.: LAP Lambert Academic Publishing, 2009. – 332 с.
  118. Carol Woody. Applying Security Risk Management to Internet Connectivity. – М.: LAP Lambert Academic Publishing, 2009. – 180 с.
  119. Someshwar Gande and Srilatha Rondla. Security Testing for Web Applications in SDLC. – М.: LAP Lambert Academic Publishing, 2013. – 96 с.
  120. Wiem Tounsi. Security and Privacy Controls in RFID Systems. – М.: LAP Lambert Academic Publishing, 2014. – 172 с.
  121. Rupa Ch. and Avadhani P. S. Modern Security Methods in Applied Computer Science. – М.: Scholars' Press, 2014. – 124 с.
  122. Natarajan Meghanathan. A Tutorial on Java Socket Programming and Source Code Analysis. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  123. Ashwaq T. Hashim and Loay E. George. Secret Image Sharing Based on Transform Coding. – М.: LAP Lambert Academic Publishing, 2014. – 152 с.
  124. Nirbhay Chaubey. Securing AODV Routing Protocol in design of Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2015. – 132 с.
  125. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  126. Satarupa Chakraborty,Subarna Laha and Ankana Dhar. GSM Security Using Elliptic Curve Cryptography. – М.: LAP Lambert Academic Publishing, 2013. – 164 с.
  127. Natarajan Meghanathan,DeShante C. Johnson and Alexander R. Geoghegan. An Analysis of Software Security Attacks and Mitigation Controls. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  128. D. Maheswari Maheshlenin and V. Radha. Compound Image Segmentation and Compression for Secure Transmission. – М.: LAP Lambert Academic Publishing, 2012. – 240 с.
  129. Suvamoy Changder. Text Steganography through Different Indian Languages. – М.: LAP Lambert Academic Publishing, 2011. – 164 с.
  130. Hans Raj,P. C. Gupta and Gianetan Singh Sekhon. Security Issues,Aspects & Domain Based Security for Mobile Agents. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  131. Furhan Mehmood and Rajia Rafique. Information Security in Financial Organizations. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  132. Adebayo Omotosho and Justice Emuoyibofarhe. Development of a Secure Intelligent Electronic Prescription System. – М.: LAP Lambert Academic Publishing, 2012. – 156 с.
  133. Daniel Heffernan. Yakumo: A Physics-based Game with Physical Input. – М.: LAP Lambert Academic Publishing, 2009. – 132 с.
  134. ILGAZ SUNGUR. Object Oriented Mathematical Programming. – М.: LAP Lambert Academic Publishing, 2010. – 156 с.
  135. Archibald Mensah. Writing a Winning Business Plan. – М.: LAP Lambert Academic Publishing, 2012. – 164 с.
  136. Chris Cubbage. Security Risk Management in Corporate Governance. – М.: LAP Lambert Academic Publishing, 2010. – 140 с.
  137. Golam-Reza Abbasian and Mahsa Mohammadi. Dictoglossing Writing Creativity and Self-efficacy. – М.: LAP Lambert Academic Publishing, 2013. – 136 с.
  138. Prashant Pittalia. Ecommerce Security Real Life Cases And Practical Solutions. – М.: , 2015. – 72 с.
  139. Maggie Hamand,George Green,Lizzy E. Kremer. Creative Writing For Dummies Collection??“ Creative Writing For Dummies/Writing a Novel & Getting Published For Dummies 2e/Creative Writing Exercises FD. – М.: , 2015. –  с.
  140. Nikhil Abraham. Coding For Dummies. – М.: , 2015. –  с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. С Новым Code'ом!. И. Никифоров, "Новая адвокатская газета", N 23, декабрь 2010 г.

Образцы работ

Тема и предметТип и объем работы
Последствия операции НАТО
Политология
Диплом
80 стр.
Платежные системы в Интернете
Информатика
Диплом
102 стр.
Роль ОБСЕ в урегулировании конфликтов в Европе
Политология
Курсовая работа
33 стр.
Роль оффшорных зон в развитии российской экономики
Экономика
Диплом
99 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Вера, 26.05
Марина, добрый вечер, диплом я защитила, спасибо за помощь!!!