Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Janakiraman S. Distributed Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 164 с.
  2. Govind Sreekar Shenoy. Architecture Support for Intrusion Detection systems. – М.: LAP Lambert Academic Publishing, 2014. – 160 с.

Дополнительные результаты

  1. Peggy Holman. The Change Handbook: The Definitive Resource on Today's Best Methods for Engaging whole Systems. – М.: , 2012. – 496 с.
  2. Debbe Kennedy, Sally K. Green. Acceptance: Developing Support for Change (Diversity Breakthrough! Strategic Action Series). – М.: , 0. – 0 с.
  3. Query Processing for Advanced Database Systems (The Morgan Kaufmann Series in Data Management Systems). – М.: , 0. – 0 с.
  4. Safe Schools: A Security and Loss Prevention Plan. – М.: , 0. – 0 с.
  5. Robert Stegwee, Ton Spil. Strategies for Healthcare Information Systems. – М.: , 0. – 0 с.
  6. Dorothy E. Denning, Peter J. Denning. Internet Besieged. – М.: , 0. – 0 с.
  7. Sanjiv Purba. Architectures for E-Business Systems: Building the Foundation for Tomorrow's Success. – М.: , 0. – 0 с.
  8. Paul Piccard, Jeremy Faircloth. Combating Spyware in the Enterprise. – М.: , 2006. – 386 с.
  9. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с.
  10. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с.
  11. Susan K. Land, Douglas B. Smith, John W. Walz. Practical Support for Lean Six Sigma Software Process Definition Using IEEE Software Engineering Standards. – М.: , 2008. – 412 с.
  12. Digital Rights Management for E-Commerce Systems (Premier Reference Source). – М.: , 2008. – 404 с.
  13. High Performance Embedded Architectures and Compilers: 5th International Conference, HiPEAC 2010, Pisa, Italy, January 25-27, 2010, Proceedings (Lecture ... Computer Science and General Issues). – М.: , 2010. – 364 с.
  14. C.-C. Kuo, Shang-Ho Tsai, Layla Tadjpour, Yu-Hao Chang. Precoding Techniques for Digital Communication Systems. – М.: , 2008. – 320 с.
  15. Rory Bray. OSSEC Host-Based Intrusion Detection Guide. – М.: , 2010. – 416 с.
  16. Shubu Mukherjee. Architecture Design for Soft Errors. – М.: , 2010. – 360 с.
  17. Bruce G. Miller. Combustion Engineering Issues for Solid Fuel Systems. – М.: , 2010. – 528 с.
  18. Syngress. Snort Intrusion Detection 2.0. – М.: , 2010. – 550 с.
  19. Johann Christoph Freytag. Query Processing for Advanced Database Systems. – М.: , 2010. – 512 с.
  20. Derrick Rountree. Security for Microsoft Windows System Administrators. – М.: , 2010. – 400 с.
  21. Brian Caswell. Snort Intrusion Detection and Prevention Toolkit. – М.: , 2010. – 768 с.
  22. Biswa Datta. Numerical Methods for Linear Control Systems. – М.: , 2010. – 640 с.
  23. Sharon Yull. BTEC National for IT Practitioners: Systems units. – М.: , 2010. – 168 с.
  24. Robert Barnard. Intrusion Detection Systems. – М.: , 2010. – 480 с.
  25. Robert Crease. World in the Balance – The Historic Quest for a Universal System of Measurement. – М.: , 2011. – 0 с.
  26. Richard Chandler. Statistical Methods for Trend Detection and Analysis in the Environmental Sciences. – М.: , 2011. – 384 с.
  27. Simon Saunders. Antennas and Propagation for Wireless Communication Systems. – М.: , 2007. – 546 с.
  28. Warren. Virtual Reality Technologies for Future Telecommunications Systems. – М.: , 1997. – 150 с.
  29. Irv Englander. The Architecture of Computer Hardware and Systems Software. – М.: , 2000. – 784 с.
  30. Bernard H. Boar. Cost–Effective Strategies for Client/Server Systems. – М.: , 1996. – 256 с.
  31. Terry Escamilla. Intrusion Detection. – М.: , 1998. – 368 с.
  32. C. Tellambura. Mathematical Techniques for Wireless Communication Systems Design and Analysis. – М.: , 1976. – 572 с.
  33. C. Tellambura. Mathematical Techniques for Wireless Communication Systems Design and Analysis. – М.: , 1971. – 0 с.
  34. Sead Muftic. Security Architecture for Open Distributed Systems. – М.: , 1993. – 298 с.
  35. Cecil D Elliott. Technics & Architecture – The Development of Materials & Systems for Building. – М.: , 1992. – 478 с.
  36. Cleveland Salmon. Architectural Design for Tropical Regions. – М.: , 1999. – 240 с.
  37. WE BYRNE. Byrne: Software Design Techniques For Large Ada Systems. – М.: , 1991. – 326 с.
  38. Sustaining Financial Support for Community Colleges. – М.: , 2006. – 128 с.
  39. The AGI Source Book for Geographic Information Systems 1995. – М.: , 1994. – 392 с.
  40. Ronald Mak. The Martian Principles for Successful Enterprise Systems. – М.: , 2006. – 138 с.
  41. Challenges and Strategies for Research in Systems Development. – М.: , 1992. – 492 с.
  42. C Ford Peatross. Capital Drawings – Architectural Designs for Washington, D.C. from the Library of Congress. – М.: , 2006. – 264 с.
  43. FR HICKMAN. Hickman: ?analysis? For Knowledge–based Systems: A Practical Guide To The Kads Methodolo. – М.: , 1989. – 190 с.
  44. Cecil D Elliott. Technics & Architecture – The Development of Materials & Systems for Buildings (Paper). – М.: , 1994. – 478 с.
  45. JoAnn Senger. Designing a Not–for–Profit Compensation System. – М.: , 2005. – 198 с.
  46. Debugging and Performance Tuning for Parallel Computing Systems. – М.: , 1996. – 448 с.
  47. AJ BLUNDELL. Blundell: Bond ?graphs? For Modelling Engineering Systems. – М.: , 1983. – 152 с.
  48. NS SEHMI. Sehmi: ?large? Order Structural Eigenanalysis Tech : Algorithms For Finite Element Systems. – М.: , 1989. – 226 с.
  49. Communication Satellite Antennas: System Architecture, Technology, And Evaluation. – М.: , 2011. – 340 с.
  50. Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky. Cisco Security Professional's Guide to Secure Intrusion Detection Systems. – М.: , . –  с.
  51. Doug Abbott. Linux for Embedded and Real-time Applications, Second Edition (Embedded Technology). – М.: Newnes, 2006. – 352 с.
  52. David Zumoffen and Marta Basualdo. Fault Detection Systems Integrated to Fault-Tolerant Control. – М.: LAP Lambert Academic Publishing, 2012. – 236 с.
  53. Anup Bhange and Manmeet Kaur Marhas. Anomaly Detection in Network Traffic; A Statistical Approach. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  54. Ali N. Abbas and Ausama A. Awad. Geno-Fuzzy PID Controller For Optimum Control System. – М.: LAP Lambert Academic Publishing, 2013. – 124 с.
  55. Gulshan Kumar. Effective Intrusion Detection using Genetic Algorithms. – М.: LAP Lambert Academic Publishing, 2014. – 100 с.
  56. Tanmoy Hazra. Application of PCA in IDS. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  57. Ankit Kajaria. Design And Analysis Of Mathematical Model For Human Respiratory System. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  58. Rui Cortesao. Kalman Techniques for Intelligent Control Systems. – М.: LAP Lambert Academic Publishing, 2010. – 240 с.
  59. Sugandha Shrama. Power Rotational Interleaver for an IDMA System. – М.: LAP Lambert Academic Publishing, 2014. – 64 с.
  60. Shesharaman K. Narayanan. A Continuous Time Sigma Delta Modulator for MRI Receiver System. – М.: LAP Lambert Academic Publishing, 2014. – 108 с.
  61. Luca Gioanola. Pyroelectric and AMR sensors for intelligent transportation systems. – М.: LAP Lambert Academic Publishing, 2010. – 100 с.
  62. Saifur Sabuj. Microcontroller Based Friend or Foe (FoF) Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 52 с.
  63. Kosuru Trinadhachari. A Real World system for Motion Detection and Tracking. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  64. Sachin Jadhav. A Novel High Speed FPGA Architecture Design for FIR Filter. – М.: LAP Lambert Academic Publishing, 2014. – 108 с.
  65. Mutamed Khatib. OFDM for Mobile Communications Systems. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  66. Olutayo Oyerinde. Channel Estimation for Wireless Communication Systems. – М.: LAP Lambert Academic Publishing, 2011. – 228 с.
  67. Kiran Jot Singh. A Novel Technique For Edge Detection Using Logical Operations. – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  68. Shahzadi Mahnoor. Multiuser Detection in DSSS Systems. – М.: LAP Lambert Academic Publishing, 2014. – 72 с.
  69. Huang-Chun Roan. Network Intrusion Detection Based on Shift-OR Circuit. – М.: LAP Lambert Academic Publishing, 2011. – 60 с.
  70. Amedeo Troiano. A Sensor Network System for Road Ice Formation Detection. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  71. Parimal Rajkondawar,Robert Dyer and Uri Tasch. Objective Dairy Cattle Lameness Detection System. – М.: LAP Lambert Academic Publishing, 2010. – 176 с.
  72. Sasan Asiaei. Microfluidic Functionalization for Protein Detection in Immunoassays. – М.: Scholars' Press, 2014. – 192 с.
  73. Jane Teergele and Kourosh Danai. Selection of Outputs for Distributed Parameter Systems. – М.: LAP Lambert Academic Publishing, 2014. – 64 с.
  74. Qadeer Ahmed,Aamer Iqbal Bhatti and Sohail Iqbal. Robust Control Algorithms for Twin Rotor System. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  75. Kavita Verma and Biswajit Sardar. Infrastructure Facilities and Financial Support for Physical Education. – М.: LAP Lambert Academic Publishing, 2014. – 76 с.
  76. M. Sadiq Ali Khan and S. M. Aqil Burney. Recent Trends in Intrusion Detection System & Network Monitoring. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  77. Lilian Owoko. Support Systems For The Elderly In Siaya County. – М.: LAP Lambert Academic Publishing, 2013. – 152 с.
  78. Cruceru Madalina. Radiation Detection Systems With Applications in High Energy Physics. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  79. Arren Mendezona Allegretti. Stakeholder Support for Coastal Management in Cebu, Philippines. – М.: LAP Lambert Academic Publishing, 2012. – 188 с.
  80. S. Baby Gayathri and P. Kamaraj. Synthesis, Characterization and Applications of Nano-CDHA. – М.: LAP Lambert Academic Publishing, 2014. – 68 с.
  81. Yi Xin. Mid-IR-based Gas Detection System Analysis Model. – М.: LAP Lambert Academic Publishing, 2011. – 136 с.
  82. Iyobosa Ogbeide. Optimisation of MALDI-TOF MS for the Detection of Omega-3 Fatty Acids. – М.: LAP Lambert Academic Publishing, 2013. – 180 с.
  83. Mahe Talat and Om Prakash. Urease from pumpkin seeds used for the detection of hazardous metals. – М.: LAP Lambert Academic Publishing, 2011. – 164 с.
  84. Sonu Gandhi. Antibody based biosensor for the detection of opiate drugs. – М.: LAP Lambert Academic Publishing, 2013. – 236 с.
  85. Omololu Toluwanimi Omololu. The Military in the Quest for Stable Federal System in Nigeria. – М.: LAP Lambert Academic Publishing, 2012. – 148 с.
  86. Leul Yohannes Hailemariam and Endalkachew Teshome. Local Community Support for Tourism Development. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  87. Matilda Khatovonje Maseno. CHANGES IN DONOR SUPPORT FOR HIGHER EDUCATION IN KENYA. – М.: LAP Lambert Academic Publishing, 2011. – 104 с.
  88. Abhay Nath Singh. Honeypot Based Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  89. Shahnawaz Husain,S. C. Gupta and R. C. Joshi. Intrusion Detection Engine for Adhoc Environment. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  90. Sumaya Saad Sulaiman and Sarab M. Hameed. A Fuzzy Based Clustering for Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  91. Shubha Puthran and Ketan Shah. Intrusion Detection System using datamining techniques. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  92. Mohammad S. I. Mamun. Intrusion Detection System Architecture in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  93. Heba Fathy Eid. Computational Intelligence in Network Intrusion Detection System. – М.: Scholars' Press, 2014. – 164 с.
  94. Janakiraman S. Distributed Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 164 с.
  95. Yogesh Kumar,Krishan Kumar and Gulshan Kumar. Feature Selection For Intrusion Detection Systems. – М.: LAP Lambert Academic Publishing, 2014. – 100 с.
  96. Huanjia Yang and Shuang-Hua Yang. ZigBee RFID Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 232 с.
  97. Syed Zahidur Rashid. Computer Network Security Monitoring. – М.: Scholars' Press, 2015. – 284 с.
  98. Neha Deshpande and A. D. Shaligram. Ad Hoc WSN system for Large Food Grain Warehouse. – М.: LAP Lambert Academic Publishing, 2014. – 192 с.
  99. Mrutyunjaya Panda and Manas Ranjan Patra. A Data Mining Approach to Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2015. – 216 с.
  100. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  101. Mueen Uddin. Dynamic Multi Layer Signature based IDS System using Mobile Agents. – М.: LAP Lambert Academic Publishing, 2011. – 72 с.
  102. Ivano Malavolta. A tamper resistant Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2011. – 144 с.
  103. Ankush Khere,Mayur Patankar and Klesh Shrirame. Proposed Gateway Architecture for an E-Payment System. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  104. Shaffali Gupta and Sanmeet Kaur. A GUI Framework for detecting Intrusions using Bro IDS. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  105. Mahmoud Jazzar. Computer Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 240 с.
  106. Siva S. Sivatha Sindhu,S. Geetha and S. Selvakumar. Network Intrusion Detection System using Machine Learning Techniques. – М.: LAP Lambert Academic Publishing, 2013. – 80 с.
  107. Arjun Nichal. Steganography for JPEG2000 Baseline System. – М.: LAP Lambert Academic Publishing, 2013. – 60 с.
  108. Nasim Beigi-Mohammadi. Smart Meter Networks: Intrusion Detection System by Design. – М.: LAP Lambert Academic Publishing, 2014. – 136 с.
  109. Christian Chetachi Umunna. Distributed Intrusion Detection System in Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 104 с.
  110. Iftikhar Ahmad. Feature Subset Selection in Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 220 с.
  111. Saima Munawar. Detection and Classification Of Normal and Anomaly IP Packet. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  112. Jabarweer Singh,Krishan Kumar and Gulshan Kumar. Intrusion detection using artificial intelligence based ensembles. – М.: LAP Lambert Academic Publishing, 2014. – 116 с.
  113. Maria Jesus Garzaran. Hardware Prefetch, Reduction Support and Speculative State Buffering. – М.: LAP Lambert Academic Publishing, 2010. – 204 с.
  114. Govind Sreekar Shenoy. Architecture Support for Intrusion Detection systems. – М.: LAP Lambert Academic Publishing, 2014. – 160 с.
  115. Nissreen El-Saber. A Method and Tool Support for Software Architecting Activities. – М.: LAP Lambert Academic Publishing, 2011. – 104 с.
  116. Britto R. Kumar and Albert S. Rabara. An Architecture for Secure Mobile Payment System using PKI. – М.: LAP Lambert Academic Publishing, 2013. – 184 с.
  117. Monis Akhlaq,Irfan Awan and Faeiz Alserhani. Improved Performance High Speed Network Intrusion Detection Systems. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  118. Prakash Prasad. Intrusion Detection System: Findings. – М.: LAP Lambert Academic Publishing, 2011. – 104 с.
  119. Homam El-Taj and Omar Amer. Network Alert Management System For IDS False Positive Reduction. – М.: LAP Lambert Academic Publishing, 2013. – 156 с.
  120. Bibi Masoomeh Aslahi Shahri. Intrusion Detection System Using Hybrid Gsa-kmeans. – М.: LAP Lambert Academic Publishing, 2014. – 128 с.
  121. Muna Elsadig Mohamed Ahmed Elsheik. Bio Inspired Intrusion Prevention and Self healing System for Networks. – М.: LAP Lambert Academic Publishing, 2012. – 256 с.
  122. Tigabu Dagne Akal. Constructing Predictive Model for Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 160 с.
  123. Kamaruzaman Maskat and Mohd Afizi Mohd Shukran. Agent Based Snort In Distributed Environment. – М.: LAP Lambert Academic Publishing, 2013. – 112 с.
  124. Kamrul Hasan. An Investigation into Botnet Detection System. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  125. Rupali Pathak. Recent Advances In Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  126. Davoud Mougouei and Man Kwan Yeung. Requirement Engineering for Intrusion Tolerant Systems. – М.: LAP Lambert Academic Publishing, 2013. – 104 с.
  127. Jorge Dias Jr. A Software Architecture Process for SOA Definition. – М.: LAP Lambert Academic Publishing, 2009. – 160 с.
  128. Mafaz M. K. Al-Anezi and Najla B. I. Al-Dabagh. Multilayer Artificial Immune Systems for Intrusion & Malware Detection. – М.: LAP Lambert Academic Publishing, 2012. – 148 с.
  129. Laxmi Ahuja. Evaluation of Quality Attributes for Component Based Systems. – М.: LAP Lambert Academic Publishing, 2012. – 72 с.
  130. Maher Aldukheil. Systematic Architecture Approach For Integrating EMR System. – М.: LAP Lambert Academic Publishing, 2014. – 288 с.
  131. Mohamed Nassar. Voice over IP Networks Monitoring. – М.: LAP Lambert Academic Publishing, 2009. – 172 с.
  132. Al-Sakib Khan Pathan. Securing WSN with Lightweight Resource-Efficient Schemes. – М.: LAP Lambert Academic Publishing, 2011. – 116 с.
  133. Alpay Doruk. Security Review Program Requirements for Intrusion Management Systems. – М.: LAP Lambert Academic Publishing, 2010. – 88 с.
  134. Sathish Kumar. Intrusion Detection and Response Techniques for Mobile Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 200 с.
  135. Jaume Joven,David Castells-Rufas and Jordi Carrabina. System-Level Software and Architectural Support for NoC-based MPSoCs. – М.: LAP Lambert Academic Publishing, 2011. – 228 с.
  136. Moez Krichen. Model Based Testing for Real-Time Systems. – М.: LAP Lambert Academic Publishing, 2010. – 192 с.
  137. Omer Mohamed. Service oriented Architecture for Open Hypermedia Systems. – М.: LAP Lambert Academic Publishing, 2011. – 156 с.
  138. Mahmood Adeiza. Effects of Poor Banking Support for Agriculture in Northern Nigeria. – М.: LAP Lambert Academic Publishing, 2011. – 88 с.
  139. Soo Hoon Lee. Itinerant Specialist Support For Preschool Inclusion. – М.: LAP Lambert Academic Publishing, 2011. – 136 с.
  140. Nadim Al-Mosawi and Frida Ohlson. Occupant Detection System. – М.: , 2015. – 64 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Банковское отделение будущего. интервью с Камероном МакКворри. Cameron MacQuarrie, менеджером по развитию бизнеса компании Cisco Systems в области корпоративных финансов в регионе EMEA. Европа, Ближний Восток, Африка. Н.Ф. Колюшенко, "Расчеты и операционная работа в коммерческом банке", № 2, февраль 2006.
  2. Ловушка для пирата. интервью с И. Слабых, руководителем отдела противодействия интеллектуальному пиратству в России и СНГ Adobe Systems. И. Голова, "Расчет", N 9, сентябрь 2012 г.
  3. Мы можем управлять собственными мыслями. интервью с С. Харитоновым, врачом-психотерапевтом, психиатором, кандидатом медицинских наук, старшим научным сотрудником Московского НИИ психиатрии Росздрава РФ, членом-корреспондентом Международной академии наук. МАНЭБ, членом Британского общества когнитивных и поведенческих психотерапевтов. Membership British Association for Behavioural & Cognitive Psychoterapies / BABCP. Ф. Кульпин, "Управление персоналом", N 8, апрель 2011 г.
  4. Зачетная реструктуризация долга: институт DEBT-FOR-EQUITY SWAP в России". интервью с М. Григорьевым, старшим юристом корпоративной практики юридической фирмы "Вегас-Лекс". О. Бодрягина, "эж-ЮРИСТ", № 3, январь 2010.
  5. Я воспринимаю персонального помощника как напарника червяк должен нравиться рыбке, а не рыбаку. интервью с П.А. Черкашиным, руководителем российского представительства компании Adobe Systems. "Управление персоналом", № 20, октябрь 2008.
  6. Управление проектами при подборе персонала. PM for HR. Е. Кривов, "Кадровик. Рекрутинг для кадровика", № 9, сентябрь 2008.

Образцы работ

Тема и предметТип и объем работы
Анализ l ’architecture d ’aujourd ’hui
Журналистика
Реферат
10 стр.
Этапы формирования теории президентства
История государства и права
Курсовая работа
30 стр.
Слияния и поглощения Мировая и Российская практика
Мировая экономика
Диплом
99 стр.
Привлекательности труда в организации
Психология
Курсовая работа
35 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Саша
еще раз спасибо))Вы как никто с большим терпением и пониманием отнеслись ко мне и требованиям со стороны преподавателя))