Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Divya Rajasekar. Cluster Based Secure Key Establishment Protocol for WSN. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Дополнительные результаты Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с. John L. Daly. Pricing for Profitability: Activity-Based Pricing for Competitive Advantage. – М.: , 0. – 0 с. Roger Camrass, Martin Farncombe, Roger Camrass, Martin Farncombe. The Atomic Corporation: Rational Proposals for Uncertain Times. – М.: , 0. – 0 с. Paul Edwards, Sarah Edwards. The Best Home Businesses for the 21st Century: The Inside Information You Need to Know to Select a Home-Based Business That's Right for You. – М.: , 0. – 0 с. Roger Camrass, Martin Farncombe. The Atomic Corporation: A Rational Proposal for Uncertain Times. – М.: , 0. – 0 с. James E. Lukaszewski. Communication Standards: The Principles and Protocols for Standard-Setting Individual and Corporate Communication. – М.: Lukaszewski Group, 1995. – 10 с. Michael Backman. The Asian Insider: Unconventional Wisdom for Asian Business. – М.: , 0. – 0 с. Roger Fritz. The Manager's Survival Guide. – М.: , 0. – 0 с. Richard W. Baker, Charles E. Morrison. Asia Pacific Security Outlook 2000. – М.: , 0. – 0 с. Thomas R. Krause. The Behavior-Based Safety Process: Managing Involvement for an Injury-Free Culture, 2nd Edition. – М.: , 0. – 0 с. Peter C. Brinckerhoff. Mission-Based Marketing : Positioning Your Not-for-Profit in an Increasingly Competitive World (Brinckerhoff, Peter C., Mission-Based Management Series,). – М.: , 0. – 0 с. Eleanor Selfridge-Field. Beyond MIDI: The Handbook of Musical Codes. – М.: , 0. – 0 с. Mostafa Hashem Sherif. Protocols for Secure Electronic Commerce, Second Edition. – М.: , 0. – 0 с. Workshop on the Life of a Process Model--From Conception to Action, S. Macchietto, S. P. Asprey. Dynamic Model Development: Methods, Theory and Applications (Computer-Aided Chemical Engineering). – М.: , 0. – 0 с. Hans V. Johnsson. Performance-Based Reporting : New Management Tools for Unpredictable Times. – М.: , 2005. – 0 с. Daniel, M.D. Farb. HIPAA Regulatory Documents Manual and CD: The Documents of HIPAA As a Convenient Reference in a Searchable CD-ROM for Healthcare Corporations, Hospitals, ... and Allied Health Professionals. – М.: , 2003. – 0 с. Advances in Security and Payment Methods for Mobile Commerce. – М.: , 2004. – 0 с. A. Okamoto. Tax Policy for Aging Societies: Lessons from Japan. – М.: , 2004. – 167 с. Bill Griffith Jr. CFP. Securing a Retirement Income for Life. – М.: , 2006. – 212 с. CompTIA Security+: Certification Kit (комплект из 3 книг + 2 CD-ROM). – М.: Sybex, 2009. – 1440 с. W. Wisden. In Situ Hybridization Protocols for the Brain,47. – М.: , 2010. – 272 с. Jeanne Daly. Evidence–Based Medicine and the Search for a Science of Clinical Care. – М.: , 2005. – 289 с. Connie Lillas. Infant/Child Mental Health, Early Intervention and Relationship–Based Therapies – A Neurorelational Framework for Interdisciplinary Practice. – М.: , 2009. – 420 с. Timothy A. Craul. Soil Design Protocols for Landscape Architects and Contractors. – М.: , 1995. – 0 с. Edited by Benjamin J Goold and Liora Lazarus. Security and Human Rights. – М.: , 2011. – 426 с. RJ DEASINGTON. Deasington ?x25 Explained? – Protocols For Packet Switnetwks (pre Com Prot Open Systems). – М.: , 1985. – 120 с. Wireless Network Security A Beginners Guide. – М.: , 2011. – 400 с. Priyadarshini Sabut. An Enhanced Medium Access Control Protocol for Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2013. – 60 с. Susmita Mandal. A Key Management Solution for HIPAA Compliance. – М.: LAP Lambert Academic Publishing, 2012. – 68 с. T. Ambikadevi Amma. Inhibitors of Cloud Computing. – М.: LAP Lambert Academic Publishing, 2013. – 72 с. Samundiswary Punniakodi and Dananjayan Perumal. Trust Based Routing Protocols for Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2015. – 120 с. Md. Jahangir Toimoor. Scalability of Modified AODV-UU Routing Protocol for Smart Grid. – М.: LAP Lambert Academic Publishing, 2014. – 88 с. Md. Fasiul Alam and Md. Delwar Hossain. Microcontroller Based Security System. – М.: LAP Lambert Academic Publishing, 2013. – 92 с. Mehul Shah and Namita Mehta. Efficient Routing Algorithm for Delay Tolerant Networks. – М.: LAP Lambert Academic Publishing, 2014. – 76 с. Preetisudha Meher and Mangal Singh. Centralized MAC Protocol for Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2011. – 92 с. Jameel Ahmed. Transform-Domain and DSP Based Secure Speech Communication. – М.: LAP Lambert Academic Publishing, 2011. – 252 с. Md. Samsuzzaman,Md. Ibrahim Abdullah and Md. Abdul Masud. Relay Node Selection Technique in Homogeneous Cluster Based WSN. – М.: LAP Lambert Academic Publishing, 2011. – 108 с. Mohd. Altamash Sheikh. MobileIPv6:Protocol Technology and Application. – М.: LAP Lambert Academic Publishing, 2012. – 68 с. Abhinav Singh and Pankaj Kumar Patel. Analysis of beacon enabled ieee zigbee wireless network in wpan. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. AbdolMajid Shahgholi,Dr. K. K. Shukla and Dr. Rajeev Srivastava. LARGE SCALE WIRELESS SENSOR NETWORK FOR TACTICAL MILITARY APPLICATIONS. – М.: LAP Lambert Academic Publishing, 2012. – 92 с. Smit Tripathi and Mehul Shah. Dynamic Opportunistic Spectrum Access MAC Protocol for Cognitive Radio. – М.: LAP Lambert Academic Publishing, 2014. – 64 с. Syuhaida Ismail. Key Performance Indicators for Private Finance Initiative in Malaysia. – М.: LAP Lambert Academic Publishing, 2011. – 316 с. Alaa K. Farhan. Security Protocol for Mobile Data. – М.: LAP Lambert Academic Publishing, 2013. – 116 с. Adriana Marais. Security and Entanglement in Quantum Key Distribution. – М.: LAP Lambert Academic Publishing, 2010. – 108 с. Tejpal Dhewa. Protocols for Evaluation of Probiotic Attributes of Lactic Cultures. – М.: LAP Lambert Academic Publishing, 2012. – 68 с. Abrar Muslim. Model-based and Model Predictive Control for Chlorine Dosing. – М.: LAP Lambert Academic Publishing, 2010. – 168 с. Govind Sethia,Hari Chand Bajaj and Rajesh S. Somani. Adsorption Properties of Zeolites for Gas Separation. – М.: LAP Lambert Academic Publishing, 2013. – 188 с. Rakesh Kumar Khandal,Geetha Seshadri and Gunjan Suri. Novel Nanocomposites for Optical Applications. – М.: LAP Lambert Academic Publishing, 2013. – 384 с. Ayyaswamy Kathirvel,Srinivasan Rengaramanujam and Mohanambal Kathirvel. Prevention of attacks usign umpiring security model for manets. – М.: LAP Lambert Academic Publishing, 2012. – 192 с. Atul Kumar Verma,Atul Saxena and Perumal P. Synchronization protocols for buffalo heifers for enhancing fertility. – М.: LAP Lambert Academic Publishing, 2012. – 68 с. Manzur Ashraf. Channel Based Medium Access Control for Ad Hoc Wireless Networks. – М.: LAP Lambert Academic Publishing, 2010. – 168 с. Rajvir Singh Tyagi. School-based Instructional Supervision for Quality Management. – М.: LAP Lambert Academic Publishing, 2012. – 116 с. Victoria Yemi-Peters. Mobile Banking Security Services. – М.: LAP Lambert Academic Publishing, 2011. – 88 с. Faraz Fatemi Moghaddam. Secure Cloud Computing with Client-Based Control System. – М.: LAP Lambert Academic Publishing, 2013. – 100 с. Deepak Puthal and Bibhudatta Sahoo. Secure Data Collection & Critical Data Transmission in Mobile Sink WSN. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Rizwan Ahmed Khan. Performance Evaluation of AODV and DSR for Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 64 с. Daniel Camara and Antonio Alfredo Ferreira Loureiro. Formal Verification of Communication Protocols for Wireless Networks. – М.: LAP Lambert Academic Publishing, 2011. – 120 с. Priyadarsini S. Secured & lifetime improved route discovery for MANETs. – М.: LAP Lambert Academic Publishing, 2011. – 64 с. Arnab Banerjee,ANIRUDDHA BHATTACHARYYA and DIPAYAN BOSE. IMPLEMENTATION OF A TRUST BASED SECURE ROUTING PROTOCOL IN MANET. – М.: LAP Lambert Academic Publishing, 2012. – 292 с. Younus Javed and Hassan Tahir. Optimized Security Protocol for Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Sandeep Kr. Agarwal and Dr. K. V. Arya. Security in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 88 с. Prathap Jonnadula and Naga Mani Darajula. Secure Group Communication. – М.: LAP Lambert Academic Publishing, 2012. – 64 с. Suman Bala. Secure Routing in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 72 с. Mohamed Rasslan,Yasser Dakroury and Heba Aslan. Group Key Distribution in Computer Networks. – М.: LAP Lambert Academic Publishing, 2012. – 212 с. Prasad Lokulwar,Vivek Shelkhe and Mangesh Ghonge. Security Aware Routing protocol for MANET. – М.: LAP Lambert Academic Publishing, 2012. – 84 с. Rayala Upendar Rao and K. Palanivel. Secure Routing In Cluster Based Wireless Sensor Network By Using ECC. – М.: LAP Lambert Academic Publishing, 2012. – 96 с. E.A.Mary Anita. Securing Multicast Routing Protocols for Mobile Adhoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 88 с. Hamid Reza Barzegar,Mahdiyeh Barzegar and Neshat Alidad. Energy Efficient And Secured Communication For Manets In Military. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Niroj Kumar Pani and Dr. Ashok Kumar Turuk. A Hybrid Zone-Based Routing Protocol for Secure Communication in MANET. – М.: LAP Lambert Academic Publishing, 2010. – 92 с. Sourav Kanti Addya and Ashok Kumar Turuk. Key Pre-distribution in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2010. – 68 с. Arun Saha. Secure Protocols for Location, Adjacency, and Identity Verification. – М.: LAP Lambert Academic Publishing, 2011. – 248 с. Gaurav Bathla. An Energy-Efficient Routing Protocol for Homogeneous WSN. – М.: LAP Lambert Academic Publishing, 2012. – 72 с. Divya Rajasekar. Cluster Based Secure Key Establishment Protocol for WSN. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. K. Shaila and K. R. Venugopal. Secure Data Communication in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2014. – 240 с. Joan-LLuis Ferrer. Design of Efficient Packet Marking-Based CMM for Cluster Interconnects. – М.: LAP Lambert Academic Publishing, 2013. – 240 с. V. Ramesh and P. Subbaiah. Preemptive Dynamic Source Routing for Mobile Ad-Hoc Networks. – М.: LAP Lambert Academic Publishing, 2015. – 192 с. Karima Aksa. Cluster-based New Virtual Coordinate System for Sensor Networks. – М.: LAP Lambert Academic Publishing, 2013. – 68 с. Manvi Mishra and S.S. Bedi. WBEM for Heterogeneous Network Management. – М.: LAP Lambert Academic Publishing, 2014. – 116 с. Heena Dhawan. A Heterogenous Clustering Protocol in WSN: HREF-LEACH Protocol. – М.: LAP Lambert Academic Publishing, 2014. – 96 с. Marco Fotino. Energy Behavior of Routing Protocols for Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2014. – 144 с. Ajoy Kumar Khan and Shounak Chakraborty. Wireless Sensor Network Routing Protocol and Disaster Mitigation Usage. – М.: LAP Lambert Academic Publishing, 2014. – 92 с. Xianhui Che. Control Protocol for Optical Packet Switched Local Area Network. – М.: LAP Lambert Academic Publishing, 2014. – 188 с. P. Ganesh Kumar and S. Ramesh. Secure Routing Protocol for ICMN. – М.: LAP Lambert Academic Publishing, 2014. – 64 с. Nirbhay Chaubey. Securing AODV Routing Protocol in design of Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2015. – 132 с. Suman Paul. Study of Cluster Based Algorithm in MANET using Network Simulator. – М.: LAP Lambert Academic Publishing, 2015. – 52 с. Orhan AYRAN. REAL-TIME VIDEO TRANSMISSION PROTOCOL FOR WIRELESS SENSOR NETWORKS. – М.: LAP Lambert Academic Publishing, 2010. – 76 с. Hesham Abusaimeh. Efficient AODV Routing Protocol for Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2011. – 156 с. Masahiro Yagisawa. Proposal for New Key Agreement Protocols. – М.: LAP Lambert Academic Publishing, 2011. – 72 с. Albert Wasef. Managing and Complementing PKI for Securing Vehicular Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2011. – 204 с. Iman Almomani. Security Solutions for Wireless Mobile Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2011. – 360 с. Fernando Pereniguez Garcia. Enabling Seamless Handoff for Next Generation Networks. – М.: LAP Lambert Academic Publishing, 2012. – 260 с. Jamil Ibriq. Secure Routing in Wireless Sensor Networks. – М.: Scholars' Press, 2013. – 104 с. Tejpal Singh. Security Protocols for Data Routing in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 68 с. Hong Yu. A Protocol for Multimedia Transmission over Wireless Networks. – М.: LAP Lambert Academic Publishing, 2012. – 272 с. Jawad Shafi and Rab Nawaz Jadoon. A Study on Datagram Congestion Control Protocol for Multimedia. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Amit Bindal and Anuradha Bindal. Centralized Group Aware Duty Cycle Control Protocol for WSNs. – М.: LAP Lambert Academic Publishing, 2012. – 84 с. Marimuthu Kanagaraj and Eswari Venkatachalam. Multifactor Authentication Protocol for a Secured WSN. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Gurpreet juneja. Security:MPLS VPN Network. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Firdous Kausar. Key Management in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 124 с. Sapna Gambhir and Nida Fatima. Op-LEACH: An optimized LEACH method for busty traffic in WSNs. – М.: LAP Lambert Academic Publishing, 2014. – 108 с. Wisam Elmasry. Securing WBAODV Routing Protocol in MANETs. – М.: LAP Lambert Academic Publishing, 2013. – 100 с. Santosh Deshpande,Narasimha Ayachit and V. Kamakshi Prasad. Evolutionary Computing Based Cryptographic Key Management. – М.: LAP Lambert Academic Publishing, 2012. – 148 с. Pallavi Kaliyar and Gagan Singla. A secure routing protocol for MANETs against byzantine attacks. – М.: LAP Lambert Academic Publishing, 2013. – 84 с. Haitham ELwahsh. Secure Service Discovery Protocol for ad-hoc Networks "hash function". – М.: LAP Lambert Academic Publishing, 2013. – 144 с. Kalpana Sharma,Vikash Singh and Meenakshi Sharma. Routing Policies in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2013. – 68 с. Venkatesh Jaganathan,Sangheethaa sukumaran and Arun Korath. Reputation Based Routing Protocol Using Mobile Agents In Manets. – М.: LAP Lambert Academic Publishing, 2013. – 108 с. Zahoor Khan. Routing Protocols for Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2013. – 92 с. Ali Okhamila Yusuf. Determination of Optimal Power for Wireless Sensor Networks (WSNs). – М.: LAP Lambert Academic Publishing, 2015. – 76 с. Pavel Ocenasek. Security Protocols. – М.: LAP Lambert Academic Publishing, 2010. – 112 с. Keshava Munegowda. Design and Implementation of WLAN Authentication and Security. – М.: LAP Lambert Academic Publishing, 2010. – 124 с. Samer Bali. Routing Protocols for Ultra-Wideband Mobile Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2011. – 100 с. Nitin Goel. EPSAR: An Efficient Power Saving Adaptive Routing Protocol for MANETs. – М.: LAP Lambert Academic Publishing, 2012. – 124 с. Ricardo Chaves. Secure Computing on Reconfigurable Systems. – М.: LAP Lambert Academic Publishing, 2010. – 212 с. Britto R. Kumar and Albert S. Rabara. An Architecture for Secure Mobile Payment System using PKI. – М.: LAP Lambert Academic Publishing, 2013. – 184 с. Mohammad Ashjaei. Extending the FTT-SE Protocol for Multi-Master/Multi-Slave Networks. – М.: LAP Lambert Academic Publishing, 2012. – 92 с. Faisal Karim Bhutta. Smartphone based Authentication & Authorization Protocol for SPACS. – М.: LAP Lambert Academic Publishing, 2014. – 56 с. Dejan Gope. Cluster Based Data Labeling for Categorical Data. – М.: LAP Lambert Academic Publishing, 2013. – 116 с. E. Madhusudhana Reddy. Development of Secure Protocols for MHIS Using RMPJK–RSA Cryptosystem. – М.: LAP Lambert Academic Publishing, 2011. – 204 с. Ondrej Vanek. Computational Methods for Transportation Security. – М.: LAP Lambert Academic Publishing, 2014. – 244 с. Ke Liu. Wireless Geometric Routing Protocol. – М.: LAP Lambert Academic Publishing, 2009. – 196 с. Debasish Jena. On Protocols for Information Security Services. – М.: LAP Lambert Academic Publishing, 2011. – 136 с. Bertold van Voorst. Cluster-based collection selection for information retrieval. – М.: LAP Lambert Academic Publishing, 2011. – 84 с. Astha Keshariya. Authenticated Trusted Server Controlled Key Establishment. – М.: LAP Lambert Academic Publishing, 2012. – 180 с. Hanane Houmani. Security Protocols Analysis. – М.: LAP Lambert Academic Publishing, 2012. – 288 с. Nivethaa Shree and Latha Parthiban. Elliptic Curve Cryptography for Digital Signature Authentication. – М.: LAP Lambert Academic Publishing, 2013. – 60 с. Jahidul Arafat. Higher Education Information Security. – М.: LAP Lambert Academic Publishing, 2013. – 176 с. Ubaid Hayee. A Six Sigma Approach to Assure IT Security. – М.: LAP Lambert Academic Publishing, 2011. – 64 с. Angelo Agatino Nicolosi. Efficient RSA Key Generation Protocol in the Two-Party Setting. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Khalid Saeed. Security Concern an Obstacle for the Growth of E-Commerce in Pakistan. – М.: LAP Lambert Academic Publishing, 2014. – 52 с. Saima Maqbool and Nidhi Chandra. OFETR:Protocol Based On Energy And Trust For Routing In WSN. – М.: LAP Lambert Academic Publishing, 2014. – 104 с. Francois Chung. Regional appearance modeling for model-based image segmentation. – М.: LAP Lambert Academic Publishing, 2011. – 196 с. Al-Sakib Khan Pathan. Securing WSN with Lightweight Resource-Efficient Schemes. – М.: LAP Lambert Academic Publishing, 2011. – 116 с. Noor Ul Amin. Secure MANET Communication Based on Hybrid Cryptosystem. – М.: LAP Lambert Academic Publishing, 2013. – 64 с. Shivendra Dubey and Chetan Agrawal. The Hybrid Algorithm for Data Collection over a Tree Topology in WSN. – М.: LAP Lambert Academic Publishing, 2014. – 120 с. Ahmed Rafat. An Adaptive Approach for Clustering Incomplete Data Sets. – М.: LAP Lambert Academic Publishing, 2010. – 192 с. Vladimir Shestak. ROBUST RESOURCE ALLOCATION FOR PARALLEL DISTRIBUTED COMPUTING SYSTEMS. – М.: LAP Lambert Academic Publishing, 2010. – 156 с. Hafez Abdo and Matthew Vellacott. The Role of Deepwater Oil Drilling in the US Energy Security. – М.: LAP Lambert Academic Publishing, 2010. – 140 с. Kaushik Khatua and J. Preetha Roselyn. GA Based Placement of FACTS Devices for Voltage Stability Enhancement. – М.: LAP Lambert Academic Publishing, 2012. – 84 с. Ramkrishna Das and Shyamalendu Kandar. An Approach to Develop Secured Secret Sharing Schemes for Color Image. – М.: LAP Lambert Academic Publishing, 2013. – 116 с. Лучшие результаты Ничего не найдено Дополнительные результаты Учет и калькулирование затрат по функциям. Метод АВС. Activity-Based Costing. М.К. Ерижев, "Новое в бухгалтерском учете и отчетности", № 19, октябрь 2003. Обеспечение безопасности PIN-Based операций с банковскими картами. С.В. Серебряков, "Расчеты и операционная работа в коммерческом банке", N 2, март-апрель 2012 г. Risk-based pricing: посткризисные тенденции. А.В. Гидулян, "Банковское кредитование", N 1, январь-февраль 2012 г. Мы можем управлять собственными мыслями. интервью с С. Харитоновым, врачом-психотерапевтом, психиатором, кандидатом медицинских наук, старшим научным сотрудником Московского НИИ психиатрии Росздрава РФ, членом-корреспондентом Международной академии наук. МАНЭБ, членом Британского общества когнитивных и поведенческих психотерапевтов. Membership British Association for Behavioural & Cognitive Psychoterapies / BABCP. Ф. Кульпин, "Управление персоналом", N 8, апрель 2011 г. Оценка эффективности деятельности и формирование оплаты на основе системы KPI. Key Performance Indicators. Ю.Г. Одегов, Л.Р. Котова, "Нормирование и оплата труда в промышленности", N 2, 3, февраль, март 2011 г. Зачетная реструктуризация долга: институт DEBT-FOR-EQUITY SWAP в России". интервью с М. Григорьевым, старшим юристом корпоративной практики юридической фирмы "Вегас-Лекс". О. Бодрягина, "эж-ЮРИСТ", № 3, январь 2010. Управление проектами при подборе персонала. PM for HR. Е. Кривов, "Кадровик. Рекрутинг для кадровика", № 9, сентябрь 2008. Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Мария Здравствуйте Марина! Вчера была защита диплома.Хочу выразить вам слова благодарности. Диплом после вашего сопровождения очень понравился, оценка 5! Огромное Вам спасибо за вашу работу!Успехов вам! Буду вас рекомендовать всем своим друзьям!