Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Divya Rajasekar. Cluster Based Secure Key Establishment Protocol for WSN. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Дополнительные результаты Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с. John L. Daly. Pricing for Profitability: Activity-Based Pricing for Competitive Advantage. – М.: , 0. – 0 с. Roger Camrass, Martin Farncombe, Roger Camrass, Martin Farncombe. The Atomic Corporation: Rational Proposals for Uncertain Times. – М.: , 0. – 0 с. Paul Edwards, Sarah Edwards. The Best Home Businesses for the 21st Century: The Inside Information You Need to Know to Select a Home-Based Business That's Right for You. – М.: , 0. – 0 с. Roger Camrass, Martin Farncombe. The Atomic Corporation: A Rational Proposal for Uncertain Times. – М.: , 0. – 0 с. James E. Lukaszewski. Communication Standards: The Principles and Protocols for Standard-Setting Individual and Corporate Communication. – М.: Lukaszewski Group, 1995. – 10 с. Michael Backman. The Asian Insider: Unconventional Wisdom for Asian Business. – М.: , 0. – 0 с. Roger Fritz. The Manager's Survival Guide. – М.: , 0. – 0 с. Richard W. Baker, Charles E. Morrison. Asia Pacific Security Outlook 2000. – М.: , 0. – 0 с. Thomas R. Krause. The Behavior-Based Safety Process: Managing Involvement for an Injury-Free Culture, 2nd Edition. – М.: , 0. – 0 с. Peter C. Brinckerhoff. Mission-Based Marketing : Positioning Your Not-for-Profit in an Increasingly Competitive World (Brinckerhoff, Peter C., Mission-Based Management Series,). – М.: , 0. – 0 с. Eleanor Selfridge-Field. Beyond MIDI: The Handbook of Musical Codes. – М.: , 0. – 0 с. Mostafa Hashem Sherif. Protocols for Secure Electronic Commerce, Second Edition. – М.: , 0. – 0 с. Workshop on the Life of a Process Model--From Conception to Action, S. Macchietto, S. P. Asprey. Dynamic Model Development: Methods, Theory and Applications (Computer-Aided Chemical Engineering). – М.: , 0. – 0 с. Hans V. Johnsson. Performance-Based Reporting : New Management Tools for Unpredictable Times. – М.: , 2005. – 0 с. Daniel, M.D. Farb. HIPAA Regulatory Documents Manual and CD: The Documents of HIPAA As a Convenient Reference in a Searchable CD-ROM for Healthcare Corporations, Hospitals, ... and Allied Health Professionals. – М.: , 2003. – 0 с. Advances in Security and Payment Methods for Mobile Commerce. – М.: , 2004. – 0 с. A. Okamoto. Tax Policy for Aging Societies: Lessons from Japan. – М.: , 2004. – 167 с. Bill Griffith Jr. CFP. Securing a Retirement Income for Life. – М.: , 2006. – 212 с. CompTIA Security+: Certification Kit (комплект из 3 книг + 2 CD-ROM). – М.: Sybex, 2009. – 1440 с. W. Wisden. In Situ Hybridization Protocols for the Brain,47. – М.: , 2010. – 272 с. Jeanne Daly. Evidence–Based Medicine and the Search for a Science of Clinical Care. – М.: , 2005. – 289 с. Connie Lillas. Infant/Child Mental Health, Early Intervention and Relationship–Based Therapies – A Neurorelational Framework for Interdisciplinary Practice. – М.: , 2009. – 420 с. Timothy A. Craul. Soil Design Protocols for Landscape Architects and Contractors. – М.: , 1995. – 0 с. Edited by Benjamin J Goold and Liora Lazarus. Security and Human Rights. – М.: , 2011. – 426 с. RJ DEASINGTON. Deasington ?x25 Explained? – Protocols For Packet Switnetwks (pre Com Prot Open Systems). – М.: , 1985. – 120 с. Wireless Network Security A Beginners Guide. – М.: , 2011. – 400 с. Priyadarshini Sabut. An Enhanced Medium Access Control Protocol for Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2013. – 60 с. Susmita Mandal. A Key Management Solution for HIPAA Compliance. – М.: LAP Lambert Academic Publishing, 2012. – 68 с. T. Ambikadevi Amma. Inhibitors of Cloud Computing. – М.: LAP Lambert Academic Publishing, 2013. – 72 с. Samundiswary Punniakodi and Dananjayan Perumal. Trust Based Routing Protocols for Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2015. – 120 с. Md. Jahangir Toimoor. Scalability of Modified AODV-UU Routing Protocol for Smart Grid. – М.: LAP Lambert Academic Publishing, 2014. – 88 с. Md. Fasiul Alam and Md. Delwar Hossain. Microcontroller Based Security System. – М.: LAP Lambert Academic Publishing, 2013. – 92 с. Mehul Shah and Namita Mehta. Efficient Routing Algorithm for Delay Tolerant Networks. – М.: LAP Lambert Academic Publishing, 2014. – 76 с. Preetisudha Meher and Mangal Singh. Centralized MAC Protocol for Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2011. – 92 с. Jameel Ahmed. Transform-Domain and DSP Based Secure Speech Communication. – М.: LAP Lambert Academic Publishing, 2011. – 252 с. Md. Samsuzzaman,Md. Ibrahim Abdullah and Md. Abdul Masud. Relay Node Selection Technique in Homogeneous Cluster Based WSN. – М.: LAP Lambert Academic Publishing, 2011. – 108 с. Mohd. Altamash Sheikh. MobileIPv6:Protocol Technology and Application. – М.: LAP Lambert Academic Publishing, 2012. – 68 с. Abhinav Singh and Pankaj Kumar Patel. Analysis of beacon enabled ieee zigbee wireless network in wpan. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. AbdolMajid Shahgholi,Dr. K. K. Shukla and Dr. Rajeev Srivastava. LARGE SCALE WIRELESS SENSOR NETWORK FOR TACTICAL MILITARY APPLICATIONS. – М.: LAP Lambert Academic Publishing, 2012. – 92 с. Smit Tripathi and Mehul Shah. Dynamic Opportunistic Spectrum Access MAC Protocol for Cognitive Radio. – М.: LAP Lambert Academic Publishing, 2014. – 64 с. Syuhaida Ismail. Key Performance Indicators for Private Finance Initiative in Malaysia. – М.: LAP Lambert Academic Publishing, 2011. – 316 с. Alaa K. Farhan. Security Protocol for Mobile Data. – М.: LAP Lambert Academic Publishing, 2013. – 116 с. Adriana Marais. Security and Entanglement in Quantum Key Distribution. – М.: LAP Lambert Academic Publishing, 2010. – 108 с. Tejpal Dhewa. Protocols for Evaluation of Probiotic Attributes of Lactic Cultures. – М.: LAP Lambert Academic Publishing, 2012. – 68 с. Abrar Muslim. Model-based and Model Predictive Control for Chlorine Dosing. – М.: LAP Lambert Academic Publishing, 2010. – 168 с. Govind Sethia,Hari Chand Bajaj and Rajesh S. Somani. Adsorption Properties of Zeolites for Gas Separation. – М.: LAP Lambert Academic Publishing, 2013. – 188 с. Rakesh Kumar Khandal,Geetha Seshadri and Gunjan Suri. Novel Nanocomposites for Optical Applications. – М.: LAP Lambert Academic Publishing, 2013. – 384 с. Ayyaswamy Kathirvel,Srinivasan Rengaramanujam and Mohanambal Kathirvel. Prevention of attacks usign umpiring security model for manets. – М.: LAP Lambert Academic Publishing, 2012. – 192 с. Atul Kumar Verma,Atul Saxena and Perumal P. Synchronization protocols for buffalo heifers for enhancing fertility. – М.: LAP Lambert Academic Publishing, 2012. – 68 с. Manzur Ashraf. Channel Based Medium Access Control for Ad Hoc Wireless Networks. – М.: LAP Lambert Academic Publishing, 2010. – 168 с. Rajvir Singh Tyagi. School-based Instructional Supervision for Quality Management. – М.: LAP Lambert Academic Publishing, 2012. – 116 с. Victoria Yemi-Peters. Mobile Banking Security Services. – М.: LAP Lambert Academic Publishing, 2011. – 88 с. Faraz Fatemi Moghaddam. Secure Cloud Computing with Client-Based Control System. – М.: LAP Lambert Academic Publishing, 2013. – 100 с. Deepak Puthal and Bibhudatta Sahoo. Secure Data Collection & Critical Data Transmission in Mobile Sink WSN. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Rizwan Ahmed Khan. Performance Evaluation of AODV and DSR for Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 64 с. Daniel Camara and Antonio Alfredo Ferreira Loureiro. Formal Verification of Communication Protocols for Wireless Networks. – М.: LAP Lambert Academic Publishing, 2011. – 120 с. Priyadarsini S. Secured & lifetime improved route discovery for MANETs. – М.: LAP Lambert Academic Publishing, 2011. – 64 с. Arnab Banerjee,ANIRUDDHA BHATTACHARYYA and DIPAYAN BOSE. IMPLEMENTATION OF A TRUST BASED SECURE ROUTING PROTOCOL IN MANET. – М.: LAP Lambert Academic Publishing, 2012. – 292 с. Younus Javed and Hassan Tahir. Optimized Security Protocol for Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Sandeep Kr. Agarwal and Dr. K. V. Arya. Security in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 88 с. Prathap Jonnadula and Naga Mani Darajula. Secure Group Communication. – М.: LAP Lambert Academic Publishing, 2012. – 64 с. Suman Bala. Secure Routing in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 72 с. Mohamed Rasslan,Yasser Dakroury and Heba Aslan. Group Key Distribution in Computer Networks. – М.: LAP Lambert Academic Publishing, 2012. – 212 с. Prasad Lokulwar,Vivek Shelkhe and Mangesh Ghonge. Security Aware Routing protocol for MANET. – М.: LAP Lambert Academic Publishing, 2012. – 84 с. Rayala Upendar Rao and K. Palanivel. Secure Routing In Cluster Based Wireless Sensor Network By Using ECC. – М.: LAP Lambert Academic Publishing, 2012. – 96 с. E.A.Mary Anita. Securing Multicast Routing Protocols for Mobile Adhoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 88 с. Hamid Reza Barzegar,Mahdiyeh Barzegar and Neshat Alidad. Energy Efficient And Secured Communication For Manets In Military. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Niroj Kumar Pani and Dr. Ashok Kumar Turuk. A Hybrid Zone-Based Routing Protocol for Secure Communication in MANET. – М.: LAP Lambert Academic Publishing, 2010. – 92 с. Sourav Kanti Addya and Ashok Kumar Turuk. Key Pre-distribution in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2010. – 68 с. Arun Saha. Secure Protocols for Location, Adjacency, and Identity Verification. – М.: LAP Lambert Academic Publishing, 2011. – 248 с. Gaurav Bathla. An Energy-Efficient Routing Protocol for Homogeneous WSN. – М.: LAP Lambert Academic Publishing, 2012. – 72 с. Divya Rajasekar. Cluster Based Secure Key Establishment Protocol for WSN. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. K. Shaila and K. R. Venugopal. Secure Data Communication in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2014. – 240 с. Joan-LLuis Ferrer. Design of Efficient Packet Marking-Based CMM for Cluster Interconnects. – М.: LAP Lambert Academic Publishing, 2013. – 240 с. V. Ramesh and P. Subbaiah. Preemptive Dynamic Source Routing for Mobile Ad-Hoc Networks. – М.: LAP Lambert Academic Publishing, 2015. – 192 с. Karima Aksa. Cluster-based New Virtual Coordinate System for Sensor Networks. – М.: LAP Lambert Academic Publishing, 2013. – 68 с. Manvi Mishra and S.S. Bedi. WBEM for Heterogeneous Network Management. – М.: LAP Lambert Academic Publishing, 2014. – 116 с. Heena Dhawan. A Heterogenous Clustering Protocol in WSN: HREF-LEACH Protocol. – М.: LAP Lambert Academic Publishing, 2014. – 96 с. Marco Fotino. Energy Behavior of Routing Protocols for Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2014. – 144 с. Ajoy Kumar Khan and Shounak Chakraborty. Wireless Sensor Network Routing Protocol and Disaster Mitigation Usage. – М.: LAP Lambert Academic Publishing, 2014. – 92 с. Xianhui Che. Control Protocol for Optical Packet Switched Local Area Network. – М.: LAP Lambert Academic Publishing, 2014. – 188 с. P. Ganesh Kumar and S. Ramesh. Secure Routing Protocol for ICMN. – М.: LAP Lambert Academic Publishing, 2014. – 64 с. Nirbhay Chaubey. Securing AODV Routing Protocol in design of Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2015. – 132 с. Suman Paul. Study of Cluster Based Algorithm in MANET using Network Simulator. – М.: LAP Lambert Academic Publishing, 2015. – 52 с. Orhan AYRAN. REAL-TIME VIDEO TRANSMISSION PROTOCOL FOR WIRELESS SENSOR NETWORKS. – М.: LAP Lambert Academic Publishing, 2010. – 76 с. Hesham Abusaimeh. Efficient AODV Routing Protocol for Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2011. – 156 с. Masahiro Yagisawa. Proposal for New Key Agreement Protocols. – М.: LAP Lambert Academic Publishing, 2011. – 72 с. Albert Wasef. Managing and Complementing PKI for Securing Vehicular Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2011. – 204 с. Iman Almomani. Security Solutions for Wireless Mobile Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2011. – 360 с. Fernando Pereniguez Garcia. Enabling Seamless Handoff for Next Generation Networks. – М.: LAP Lambert Academic Publishing, 2012. – 260 с. Jamil Ibriq. Secure Routing in Wireless Sensor Networks. – М.: Scholars' Press, 2013. – 104 с. Tejpal Singh. Security Protocols for Data Routing in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 68 с. Hong Yu. A Protocol for Multimedia Transmission over Wireless Networks. – М.: LAP Lambert Academic Publishing, 2012. – 272 с. Jawad Shafi and Rab Nawaz Jadoon. A Study on Datagram Congestion Control Protocol for Multimedia. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Amit Bindal and Anuradha Bindal. Centralized Group Aware Duty Cycle Control Protocol for WSNs. – М.: LAP Lambert Academic Publishing, 2012. – 84 с. Marimuthu Kanagaraj and Eswari Venkatachalam. Multifactor Authentication Protocol for a Secured WSN. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Gurpreet juneja. Security:MPLS VPN Network. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Firdous Kausar. Key Management in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 124 с. Sapna Gambhir and Nida Fatima. Op-LEACH: An optimized LEACH method for busty traffic in WSNs. – М.: LAP Lambert Academic Publishing, 2014. – 108 с. Wisam Elmasry. Securing WBAODV Routing Protocol in MANETs. – М.: LAP Lambert Academic Publishing, 2013. – 100 с. Santosh Deshpande,Narasimha Ayachit and V. Kamakshi Prasad. Evolutionary Computing Based Cryptographic Key Management. – М.: LAP Lambert Academic Publishing, 2012. – 148 с. Pallavi Kaliyar and Gagan Singla. A secure routing protocol for MANETs against byzantine attacks. – М.: LAP Lambert Academic Publishing, 2013. – 84 с. Haitham ELwahsh. Secure Service Discovery Protocol for ad-hoc Networks "hash function". – М.: LAP Lambert Academic Publishing, 2013. – 144 с. Kalpana Sharma,Vikash Singh and Meenakshi Sharma. Routing Policies in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2013. – 68 с. Venkatesh Jaganathan,Sangheethaa sukumaran and Arun Korath. Reputation Based Routing Protocol Using Mobile Agents In Manets. – М.: LAP Lambert Academic Publishing, 2013. – 108 с. Zahoor Khan. Routing Protocols for Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2013. – 92 с. Ali Okhamila Yusuf. Determination of Optimal Power for Wireless Sensor Networks (WSNs). – М.: LAP Lambert Academic Publishing, 2015. – 76 с. Pavel Ocenasek. Security Protocols. – М.: LAP Lambert Academic Publishing, 2010. – 112 с. Keshava Munegowda. Design and Implementation of WLAN Authentication and Security. – М.: LAP Lambert Academic Publishing, 2010. – 124 с. Samer Bali. Routing Protocols for Ultra-Wideband Mobile Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2011. – 100 с. Nitin Goel. EPSAR: An Efficient Power Saving Adaptive Routing Protocol for MANETs. – М.: LAP Lambert Academic Publishing, 2012. – 124 с. Ricardo Chaves. Secure Computing on Reconfigurable Systems. – М.: LAP Lambert Academic Publishing, 2010. – 212 с. Britto R. Kumar and Albert S. Rabara. An Architecture for Secure Mobile Payment System using PKI. – М.: LAP Lambert Academic Publishing, 2013. – 184 с. Mohammad Ashjaei. Extending the FTT-SE Protocol for Multi-Master/Multi-Slave Networks. – М.: LAP Lambert Academic Publishing, 2012. – 92 с. Faisal Karim Bhutta. Smartphone based Authentication & Authorization Protocol for SPACS. – М.: LAP Lambert Academic Publishing, 2014. – 56 с. Dejan Gope. Cluster Based Data Labeling for Categorical Data. – М.: LAP Lambert Academic Publishing, 2013. – 116 с. E. Madhusudhana Reddy. Development of Secure Protocols for MHIS Using RMPJK–RSA Cryptosystem. – М.: LAP Lambert Academic Publishing, 2011. – 204 с. Ondrej Vanek. Computational Methods for Transportation Security. – М.: LAP Lambert Academic Publishing, 2014. – 244 с. Ke Liu. Wireless Geometric Routing Protocol. – М.: LAP Lambert Academic Publishing, 2009. – 196 с. Debasish Jena. On Protocols for Information Security Services. – М.: LAP Lambert Academic Publishing, 2011. – 136 с. Bertold van Voorst. Cluster-based collection selection for information retrieval. – М.: LAP Lambert Academic Publishing, 2011. – 84 с. Astha Keshariya. Authenticated Trusted Server Controlled Key Establishment. – М.: LAP Lambert Academic Publishing, 2012. – 180 с. Hanane Houmani. Security Protocols Analysis. – М.: LAP Lambert Academic Publishing, 2012. – 288 с. Nivethaa Shree and Latha Parthiban. Elliptic Curve Cryptography for Digital Signature Authentication. – М.: LAP Lambert Academic Publishing, 2013. – 60 с. Jahidul Arafat. Higher Education Information Security. – М.: LAP Lambert Academic Publishing, 2013. – 176 с. Ubaid Hayee. A Six Sigma Approach to Assure IT Security. – М.: LAP Lambert Academic Publishing, 2011. – 64 с. Angelo Agatino Nicolosi. Efficient RSA Key Generation Protocol in the Two-Party Setting. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Khalid Saeed. Security Concern an Obstacle for the Growth of E-Commerce in Pakistan. – М.: LAP Lambert Academic Publishing, 2014. – 52 с. Saima Maqbool and Nidhi Chandra. OFETR:Protocol Based On Energy And Trust For Routing In WSN. – М.: LAP Lambert Academic Publishing, 2014. – 104 с. Francois Chung. Regional appearance modeling for model-based image segmentation. – М.: LAP Lambert Academic Publishing, 2011. – 196 с. Al-Sakib Khan Pathan. Securing WSN with Lightweight Resource-Efficient Schemes. – М.: LAP Lambert Academic Publishing, 2011. – 116 с. Noor Ul Amin. Secure MANET Communication Based on Hybrid Cryptosystem. – М.: LAP Lambert Academic Publishing, 2013. – 64 с. Shivendra Dubey and Chetan Agrawal. The Hybrid Algorithm for Data Collection over a Tree Topology in WSN. – М.: LAP Lambert Academic Publishing, 2014. – 120 с. Ahmed Rafat. An Adaptive Approach for Clustering Incomplete Data Sets. – М.: LAP Lambert Academic Publishing, 2010. – 192 с. Vladimir Shestak. ROBUST RESOURCE ALLOCATION FOR PARALLEL DISTRIBUTED COMPUTING SYSTEMS. – М.: LAP Lambert Academic Publishing, 2010. – 156 с. Hafez Abdo and Matthew Vellacott. The Role of Deepwater Oil Drilling in the US Energy Security. – М.: LAP Lambert Academic Publishing, 2010. – 140 с. Kaushik Khatua and J. Preetha Roselyn. GA Based Placement of FACTS Devices for Voltage Stability Enhancement. – М.: LAP Lambert Academic Publishing, 2012. – 84 с. Ramkrishna Das and Shyamalendu Kandar. An Approach to Develop Secured Secret Sharing Schemes for Color Image. – М.: LAP Lambert Academic Publishing, 2013. – 116 с. Лучшие результаты Ничего не найдено Дополнительные результаты Учет и калькулирование затрат по функциям. Метод АВС. Activity-Based Costing. М.К. Ерижев, "Новое в бухгалтерском учете и отчетности", № 19, октябрь 2003. Обеспечение безопасности PIN-Based операций с банковскими картами. С.В. Серебряков, "Расчеты и операционная работа в коммерческом банке", N 2, март-апрель 2012 г. Risk-based pricing: посткризисные тенденции. А.В. Гидулян, "Банковское кредитование", N 1, январь-февраль 2012 г. Мы можем управлять собственными мыслями. интервью с С. Харитоновым, врачом-психотерапевтом, психиатором, кандидатом медицинских наук, старшим научным сотрудником Московского НИИ психиатрии Росздрава РФ, членом-корреспондентом Международной академии наук. МАНЭБ, членом Британского общества когнитивных и поведенческих психотерапевтов. Membership British Association for Behavioural & Cognitive Psychoterapies / BABCP. Ф. Кульпин, "Управление персоналом", N 8, апрель 2011 г. Оценка эффективности деятельности и формирование оплаты на основе системы KPI. Key Performance Indicators. Ю.Г. Одегов, Л.Р. Котова, "Нормирование и оплата труда в промышленности", N 2, 3, февраль, март 2011 г. Зачетная реструктуризация долга: институт DEBT-FOR-EQUITY SWAP в России". интервью с М. Григорьевым, старшим юристом корпоративной практики юридической фирмы "Вегас-Лекс". О. Бодрягина, "эж-ЮРИСТ", № 3, январь 2010. Управление проектами при подборе персонала. PM for HR. Е. Кривов, "Кадровик. Рекрутинг для кадровика", № 9, сентябрь 2008. Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Анна, 04.09 Спасибо вам за диплом, вы мне очень помогли.