Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. John M. D. Hunter. An Information Security Handbook (Computer Communications and Networks). – М.: , 0. – 0 с.
  2. Handbook of Information and Communication Security. – М.: , 2010. – 800 с.

Дополнительные результаты

  1. Wireless Communications and Applications: First International Conference, ICWCA 2011, Sanya, China, August 1-3, 2011, Revised Selected Papers (Lecture ... and Telecommunications Engineering). – М.: , 2012. – 468 с.
  2. Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  3. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с.
  4. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с.
  5. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  6. Technological Innovation for Value Creation: Third IFIP WG 5.5/SOCOLNET Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS ... in Information and Communication Technology). – М.: , 2012. – 607 с.
  7. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с.
  8. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с.
  9. The Oxford Handbook of Work and Aging (Oxford Library of Psychology). – М.: , 2012. – 744 с.
  10. Gerald Faulhaber, Gary Madden, Jeffrey Petchey. Regulation and the Performance of Communication and Information Networks. – М.: , 2012. – 384 с.
  11. Clusters in Automotive and Information & Communication Technology: Innovation, Multinationalization and Networking Dynamics. – М.: , 2012. – 308 с.
  12. Eileen Moore Trauth. The Culture of An Information Economy: Influences and Impacts in the Republic of Ireland. – М.: , 0. – 0 с.
  13. Paul Voillis, Paul Viollis. Jane's Workplace Security Handbook. – М.: , 0. – 0 с.
  14. Gerald Kovacich. The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition. – М.: , 0. – 0 с.
  15. Ron Tepper. Model Letters and Memos : A Handbook for Scientists and Engineers. – М.: , 0. – 0 с.
  16. Svenja Falk, Alfred J. Beerli, Daniel Diemers. Knowledge Management and Networked Environments. – М.: , 0. – 0 с.
  17. Philip P. Purpura. The Security Handbook. – М.: , 0. – 0 с.
  18. Giampiero E. G. Beroggi, William A. Wallace. Operational Risk Management: The Integration of Decision, Communications, and Multimedia Technologies. – М.: , 0. – 0 с.
  19. Seymour Bosworth, Michel E. Kabay. Computer Security Handbook. – М.: , 0. – 0 с.
  20. Mark B. Desman. Building an Information Security Awareness Program. – М.: , 0. – 0 с.
  21. John M. D. Hunter. An Information Security Handbook (Computer Communications and Networks). – М.: , 0. – 0 с.
  22. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с.
  23. Marko Nordquist. Towards Improved Security Management Practice: Designing an Organizational Model Procedure for the Implementation of Information Security Management in Heterogeneous Information Management. – М.: , 0. – 0 с.
  24. Steve Purser. A Practical Guide to Managing Information Security (Artech House Technology Management Library). – М.: , 0. – 0 с.
  25. Marian Quigley, Marian Quiqley. Information Security and Ethics: Social and Organizational Issues. – М.: , 0. – 0 с.
  26. Ifip Tc6, Tc11 Joint Working Conference on Communications and Multimedi, Tomaz Klobucar. Advanced Communications and Multimedia Security: Ifip Tc6/Tc11 Sixth Joint Working Conference on Communications and Multimedia Security, September 26-27, 2002, Portoroz, Slovenia (International Federation for Information Processing, 100). – М.: , 0. – 0 с.
  27. Jonathan S. Held, John R. Bowers. Securing E-Business Applications and Communications. – М.: , 0. – 0 с.
  28. Bob Emmerson, David Greetham. Computer Telephony and Wireless Technologies: Future Directions in Communications. – М.: , 0. – 0 с.
  29. Harold F. Tipton, Micki Krause, Micki, Cissp Krause. Information Security Management Handbook, Fifth Edition. – М.: , 0. – 0 с.
  30. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с.
  31. Kai P J Hakkarainen. Communities of Networked Expertise : Professional and Educational Perspectives (Advances in Learning and Instruction). – М.: , 2004. – 0 с.
  32. George H. Bodnar. Accounting Information Systems (9th Edition). – М.: , 2003. – 0 с.
  33. Richard J. Varey. Relationship Marketing : Dialogue and Networks in the E-Commerce Era. – М.: , 2003. – 0 с.
  34. Peter R., MBA Ramsaroop. Securing Business Intelligence: Knowledge and CyberSecurity in the Post 9/11 World. – М.: , 2004. – 0 с.
  35. Economics of Information Security (Advances in Information Security). – М.: , 2004. – 0 с.
  36. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с.
  37. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с.
  38. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с.
  39. Internet and Network Economics: First International Workshop, WINE 2005, Hong Kong, China, December 15-17, 2005, Proceedings (Lecture Notes in Computer Science). – М.: , 2006. – 1106 с.
  40. Ira Winkler. Zen and the Art of Information Security. – М.: , 2007. – 192 с.
  41. The Oxford Handbook of Work and Organization (Oxford Handbooks). – М.: , 2006. – 678 с.
  42. Timothy P. Layton. Information Security. – М.: , 2006. – 222 с.
  43. Michael Gentile, Ron Collette, Tom August. The Ciso Handbook: A Practical Guide to Securing Your Company. – М.: , 2005. – 352 с.
  44. Handbook of Asset and Liability Management (Handbook of Asset and Liability Management). – М.: , 2006. – 508 с.
  45. Jeanette S. Martin and Lillian H. Chaney. Global Business Etiquette: A Guide to International Communication and Customs. – М.: Praeger Publishers, 2006. – 188 с.
  46. Regina E. Lundgren, Andrea H. McMakin. Risk Communication: A Handbook For Communicating Environmental, Safety, And Health Risks. – М.: , 2004. – 453 с.
  47. The SAGE Handbook of Gender and Communication. – М.: , 2006. – 504 с.
  48. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с.
  49. Ibp Usa. Caribbean Community And Common Market Business Law Handbook. – М.: , 2008. – 300 с.
  50. Ibp Usa. Cuba Army Defense Policy and National Security Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  51. Ibp Usa. EU Anti Terrorism Activities, Cooperation an d Strategy Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  52. Ibp Usa. Caribbean Community and Common Market Business Law Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  53. Social Networking Communities and E-Dating Services: Concepts and Implications (Premier Reference Source). – М.: , 2008. – 424 с.
  54. Social and Human Elements of Information Security: Emerging Trends and Countermeasures (Premier Reference Source). – М.: , 2008. – 412 с.
  55. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с.
  56. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с.
  57. Jacqueline Blake. B2B Communication in the Australian Timber and Wood Products Industry: Business-to-business Communication and the Requirements for an Ontology for the Australian Timber and Wood Products Industry. – М.: , 2008. – 220 с.
  58. Gerard Blokdijk, Ivanka Menken. Information Security Management Best Practice Workbook: Implementation and Management Roadmap for Threats, Challenges and Solutions - Ready to use supporting documents bringing Theory into Practice. – М.: , 2008. – 124 с.
  59. Handbook of Large-Scale Random Networks (Bolyai Society Mathematical Studies). – М.: , 2009. – 600 с.
  60. K. J. Ray Liu, Ahmed K. Sadek, Weifeng Su, Andres Kwasinski. Cooperative Communications and Networking. – М.: , 2009. – 642 с.
  61. Hamid R. Nemati. Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues (Advances in Information Security and Privacy). – М.: , 2009. – 414 с.
  62. Ronald Maier, Thomas Hadrich, Rene Peinl. Enterprise Knowledge Infrastructures. – М.: , 2009. – 445 с.
  63. W. Krag Brotby. Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement. – М.: Auerbach Publications, 2009. – 200 с.
  64. Alan Calder. Information Security based on ISO 27001/ISO 27002: A Management Guide. – М.: , 2009. – 83 с.
  65. Bel G. Raggad. Information Security Management: Concepts and Practice. – М.: , 2010. – 871 с.
  66. Alan Calder, Steve G Watkins. Information Security Risk Management for ISO27001 / ISO27002. – М.: , 2010. – 198 с.
  67. William Manning. CISM Certified Information Security Manager Certification Exam Preparation Course in a Book for Passing the CISM Exam - The How To Pass on Your First Try Certification Study Guide. – М.: , 2010. – 188 с.
  68. Editors Karl Maria Michael de Leeuw, Jan Bergstra. The History of Information Security: A Comprehensive Handbook. – М.: Elsevier Science, 2007. – 900 с.
  69. Simon Haykin, K. J. Ray Liu. Handbook on Array Processing and Sensor Networks (Adaptive and Learning Systems for Signal Processing, Communications and Control Series). – М.: , 2010. – 904 с.
  70. Dr. Iti Saha Misra. Wireless Communication and Networks: 3G & Beyond, 1/e. – М.: , 2010. – 416 с.
  71. Quantum Communication and Quantum Networking: First International Conference, QuantumComm 2009, Naples, Italy, October 26-30, 2009, Revised Selected Papers ... and Telecommunications Engineering). – М.: , 2010. – 312 с.
  72. Advancing Computing, Communication, Control and Management (Lecture Notes in Electrical Engineering). – М.: , 2010. – 294 с.
  73. Amiya Nayak, Ivan Stojmenovic. Wireless Sensor and Actuator Networks: Algorithms and Protocols for Scalable Coordination and Data Communication. – М.: , 2010. – 300 с.
  74. Alexander M. Wyglinski. Cognitive Radio Communications and Networks. – М.: , 2010. – 736 с.
  75. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с.
  76. John R. Vacca. Computer and Information Security Handbook. – М.: , 2010. – 928 с.
  77. Jerry FitzGerald. Business Data Communications and Networking. – М.: , 1998. – 512 с.
  78. The Handbook of Communication and Corporate Social Responsibility. – М.: , 2011. – 560 с.
  79. Jerry FitzGerald. Business Data Communications and Networking. – М.: , 1996. – 592 с.
  80. RJ DEASINGTON. Deasington Practical Guide To ?computer? Communications And Networking 2ed. – М.: , 1984. – 126 с.
  81. RJ DEASINGTON. Deasington Practical Guide To ?computer? Communications And Networking 2ed. – М.: , 1984. – 126 с.
  82. Open Source Development, Communities and Quality: IFIP 20th World Computer Congress, Working Group 2.3 on Open Source Software, September 7-10, 2008, ... in Information and Communication Technology). – М.: , 2011. – 417 с.
  83. RJ DEASINGTON. Deasington Practical Guide To ?computer? Communications And Networking. – М.: , 1982. – 132 с.
  84. Greenberger. Computers, Communications and the Public Interest. – М.: , 1971. – 0 с.
  85. RJ DEASINGTON. Deasington Practical Guide To ?computer? Communications And Networking. – М.: , 1982. – 132 с.
  86. Jerry FitzGerald. Business Data Communications and Networking. – М.: , 2004. – 560 с.
  87. Jerry FitzGerald. Business Data Communications and Networking. – М.: , 2001. – 480 с.
  88. Jeffrey R. Bedell. Handbook for Communication and Problem–Solving Skills Training. – М.: , 1996. – 288 с.
  89. Greg Holden. Guide to Firewalls and Network Security: Intrusion Detection and VPNs. – М.: Course Technology, 2003. – 512 с.
  90. Harold F. Tipton, Micki Krause. Information Security Management Handbook on CD-ROM, 2003 Edition. – М.: , . –  с.
  91. Jonghoek Kim,Magnus Egerstedt and Fumin Zhang. Simultaneous Cooperative Exploration and Networking. – М.: Scholars Press, 2013. – 124 с.
  92. Soledad Escolar and Jesus Carretero. Generic architecture for sensor network applications. – М.: LAP Lambert Academic Publishing, 2010. – 280 с.
  93. Jagannath Samanta and Asish Kumar Singh. An Improved Mosfet I-V Model and its Application in Nano-Cmos Circuits. – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  94. Sanjay Singh,S.K. Singh and Nishant Tripathi. Design and Analysis of Clock Subsystem Elements. – М.: LAP Lambert Academic Publishing, 2012. – 152 с.
  95. Md. Islam and Md. Jabbar. Sexual harassment of the adolescent girls in Bangladesh. – М.: LAP Lambert Academic Publishing, 2014. – 76 с.
  96. Om Prakash Verma and P. K. Walia. Digital Database of Homoepathic Information Resources in India. – М.: LAP Lambert Academic Publishing, 2012. – 284 с.
  97. Manir Abdullahi Kamba and Yushiana Mansor. Circular Model of Information Seeking Behaviour. – М.: LAP Lambert Academic Publishing, 2012. – 408 с.
  98. Sudip Banerjee,Krishnendu Mondal and Subhendu Mondal. COMMUNITY AND DIVERSITY OF WATERFOWLS IN SANTRAGACHHI WETLAND, INDIA. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.
  99. Harikrishnan C. P.,Kunhamu T. K. and Ajeesh R. Structural and Functional Analysis of Tropical Urban Homegardens. – М.: LAP Lambert Academic Publishing, 2014. – 92 с.
  100. Carlos A. F. Marques and Rogerio N. Nogueira. Fiber Optic Components for Optical Communications and Sensing. – М.: Scholars' Press, 2014. – 308 с.
  101. Rakesh Tada,Pankaj Nariya and Manish Shah. An approach to Study of Thiosemicarbazone And their metal complexes. – М.: LAP Lambert Academic Publishing, 2013. – 104 с.
  102. Hedyeh Nasser Ranjbar and Megha M. Uplane. Video & Computer Games and Behavioral Problems. – М.: LAP Lambert Academic Publishing, 2012. – 304 с.
  103. Masumbuko Y. Mwashambwa and Rastagaev A. Vyacheslavovich. An Introduction to Upper Gastrointestinal, Chest and Thyroid Surgery. – М.: LAP Lambert Academic Publishing, 2013. – 256 с.
  104. Sam''an Malik Masudi,Jalal Jafar Alshakhshir and Akram Hassan. APICAL SEALING ABILITY OF NANO HYBRID RESIN BASED ENDODONTIC SEALER. – М.: LAP Lambert Academic Publishing, 2010. – 88 с.
  105. Geetanjali Sharma and G.N. Purohit. Performance evaluation of wireless Communication Networks. – М.: LAP Lambert Academic Publishing, 2013. – 148 с.
  106. Rupesh S. Mishra and D. K. Chitre. Data Leakage Detection in Relational Database. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  107. Faraz Fatemi Moghaddam. Secure Cloud Computing with Client-Based Control System. – М.: LAP Lambert Academic Publishing, 2013. – 100 с.
  108. Younus Javed and Hassan Tahir. Optimized Security Protocol for Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  109. Wei Lu. Analysis of Inter-Vehicle Communication Using Network Simulator. – М.: LAP Lambert Academic Publishing, 2013. – 112 с.
  110. Lei Liang,Zhili Sun and Haitham Cruickshank. IP Performance over GEO Satellite Networks. – М.: LAP Lambert Academic Publishing, 2009. – 192 с.
  111. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  112. Mahmood Ahmadi. High-performance Processing in Grid and Networked Environements. – М.: LAP Lambert Academic Publishing, 2011. – 168 с.
  113. Mais Mohammed Hobi and Sarab Majeed Hameed. Biometrics for User Authentication Using Artificial Neural Networks. – М.: LAP Lambert Academic Publishing, 2013. – 108 с.
  114. Dimitrios Papadopoulos and Bernhard Hammerli. Positioning the roles, interfaces & processes in the InfoSec scene. – М.: LAP Lambert Academic Publishing, 2014. – 168 с.
  115. Yedji Mbangsoua and Dr. Freddie Acosta. Information Security and its Investment Justification. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  116. Yasser Alshehri. Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 156 с.
  117. Stephen Schiavone,Lalit Garg and Kelly Summers. Information Security in Enterprises - an Ontological Perspective. – М.: LAP Lambert Academic Publishing, 2014. – 232 с.
  118. Vasilios Katos. Symmetric cryptography in computer communications. – М.: LAP Lambert Academic Publishing, 2011. – 344 с.
  119. Mehdi Hussain and Mureed Hussain. Efficient Data Hiding Techniques with Enhanced Capacity. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  120. Rajesh Lekhwar,Harikesh Maurya and Sarita Lekhwar. Conception of Computer Fundamental and Its Inspiration. – М.: LAP Lambert Academic Publishing, 2012. – 136 с.
  121. Furhan Mehmood and Rajia Rafique. Information Security in Financial Organizations. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  122. Athina Lazakidou and Ibrahiem El Emary. Learning-Oriented Technologies, Devices and Networks. – М.: LAP Lambert Academic Publishing, 2011. – 304 с.
  123. Edmond K. Machie. Network Attack Traceback And React. – М.: LAP Lambert Academic Publishing, 2013. – 208 с.
  124. Tanveer Zia. A Security Framework for Wireless Sensor Networks (WSN). – М.: LAP Lambert Academic Publishing, 2013. – 160 с.
  125. frankie tvrz and marijke coetzee. Information Security of a Bluetooth-enabled handheld device. – М.: LAP Lambert Academic Publishing, 2010. – 180 с.
  126. Meysam Namayandeh. Development of Computer Ethical Framework for Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 132 с.
  127. Sekar Koneti,Praveen Sam Rachapudy and Dileep Kumar Reddy Pallela. Computer Organization and Architecture. – М.: LAP Lambert Academic Publishing, 2014. – 368 с.
  128. Muhammad Imran Tariq. SLA based Information Security Metrics in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2014. – 192 с.
  129. Kavitha Ramachandran and Sivadasan E. T. ICEdu : An Information Cloud for Educational Institutions. – М.: LAP Lambert Academic Publishing, 2014. – 72 с.
  130. S. Ramakrishnan and Ibrahiem M.M.El Emary. Computational Techniques and Algorithms for Image Processing. – М.: LAP Lambert Academic Publishing, 2010. – 592 с.
  131. Faeiz Alserhani,Irfan Awan and Monis Akhlaq. Correlation and Aggregation of Security Alerts in Networks. – М.: LAP Lambert Academic Publishing, 2012. – 256 с.
  132. Venugopal Prabhakar Gantasala,Krishna Naik Chanda Naik Gari and Swapna Bhargavi Gantasala. Organizational Culture, Knowledge Management and Network Embeddedness. – М.: LAP Lambert Academic Publishing, 2012. – 332 с.
  133. Alaa Al-Deen Mohammed Hassan. Information Security Management. – М.: LAP Lambert Academic Publishing, 2013. – 188 с.
  134. Jun Zheng,Jiantao Gu and Hong Wang. Financial Management and Information Security of Independent Colleges. – М.: LAP Lambert Academic Publishing, 2014. – 256 с.
  135. HARIKANTH DUMPETI,NARESH REDDY G and SAISHARAN K. COMPUTER APPLICATION IN BUSINESS. – М.: LAP Lambert Academic Publishing, 2010. – 452 с.
  136. Nader Sh. Kandelousi,A. Janee Ali and A. Abdollahi. Interpersonal Communication and Communication Satisfaction. – М.: LAP Lambert Academic Publishing, 2010. – 112 с.
  137. Ying Qian. Mitigating Information Security Risks during Operation Transition. – М.: LAP Lambert Academic Publishing, 2012. – 372 с.
  138. Nasser Oroujlou,Sedigheh Haghjou and Belghis Rovshan. Quick Guides to Write a Scientific Paper. – М.: LAP Lambert Academic Publishing, 2012. – 312 с.
  139. Jitendra Joshi and Keshav Dev Gupta. Introduction to Computer System and Architecture. – М.: LAP Lambert Academic Publishing, 2013. – 248 с.
  140. Craig E. Carroll. The Handbook of Communication and Corporate Reputation. – М.: , 2015. –  с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Наука человековедения. интервью с Д. Уолтоном, профессором London Metropolitan University, экспертом CIPD. Chartered Institute of Personnel and Development, автором программы Master of Arts in Human Resource Strategies. И. Смирнова, "Кадровый менеджмент", № 5, июль-август 2007.
  2. Специализированный модуль FS-CD. Collections and Disbursements - "Сборы и Выплаты" и его возможности. О.А. Глущенко, "Финансовый менеджмент в страховой компании", № 2, II квартал 2007.
  3. Бюджетирование страховой компании на базе Oracle Enterprise Planning and Budgeting. Д.В. Лесоводский, "Финансовый менеджмент в страховой компании", № 3, III квартал 2006.
  4. Построить идеальный каскад информации удается далеко не всегда. интервью с А. Синикас. Angela D. Sinickas, президентом международной консалтинговой компании Sinickas Communications, Inc. США, www.sinicom. com. В. Правоторов, "Кадровый менеджмент", № 4, май-июнь 2006.
  5. Регулирование операций торгового финансирования: новые инициативы. интервью с Д. Шмандом, вице-председателем Банковской комиссии ICC по supply chain finance, главой подразделения Trade Finance and Cash Management Corporates EMEA в Global Transaction Banking. GTB division Deutsche Bank. Н. Макарова, "Международные банковские операции", N 2, апрель-июнь 2012 г.
  6. О качестве сервиса, связанного с запросами на медицинскую информацию. Medical Information Service?. А. Беденков, "Ремедиум", № 1, январь 2012.
  7. Ужин в темноте в стиле Малевича и Новый год в Хаммере". Что может выть лучше?". интервью с Н. Саниной, индивидуальным предпринимателем и креативным директором компании "San and stars". М. Сипатова, "Арсенал предпринимателя", N 12, декабрь 2011 г.
  8. На пути к новому стандарту в торговом финансировании. интервью с А.  Кастерманом, руководителем Trade and Supply Chain, SWIFT, сопредседателем рабочей группы ICC-BPO. Э. Шакирова, "Международные банковские операции", N 4, октябрь-декабрь 2011 г.
  9. Уильям Савадж: Мотивировать людей в Нижнем Новгороде и Новосибирске нужно по-разному". интервью с У. Саваджем, вице-президентом корпорации Intel, подразделение Software and Services Group. М. Холкина, "Управление персоналом", N 14, июль 2010 г.
  10. Цены под контролем: the present and the future. С. Стройкова, И. Леметюйнен, "Консультант", № 19, сентябрь 2009.
  11. Основной арсенал "охотника" - его network: кого он знает на рынке и качество этих отношений. С. Плетнева, "Управление персоналом", № 12, июнь 2009.

Образцы работ

Тема и предметТип и объем работы
Лингвистика
Лингвистика
Диплом
69 стр.
Привлекательности труда в организации
Психология
Курсовая работа
35 стр.
Математические модели океанических течений
Переводоведение (теория перевода)
Курсовая работа
42 стр.
Продвижение брендов в шоу-бизнесе
Электроснабжение городов и промышленных предприятий
Диплом
79 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Женя
Здравствуйте Марина Михайловна! Спасибо за сотрудничество, защитилась на 5. Удачи вам.