Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Heba Fathy Eid. Computational Intelligence in Network Intrusion Detection System. – М.: Scholars' Press, 2014. – 164 с.
  2. Janakiraman S. Distributed Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 164 с.
  3. Jabarweer Singh,Krishan Kumar and Gulshan Kumar. Intrusion detection using artificial intelligence based ensembles. – М.: LAP Lambert Academic Publishing, 2014. – 116 с.

Дополнительные результаты

  1. Mark Yarnell, Rene Reid Yarnell. Your First Year in Network Marketing: Overcome Your Fears, Experience Success, and Achieve Your Dreams!. – М.: Prima Lifestyles, 1998. – 304 с.
  2. Anuradha Sharma, Neelu Rohmetra. Emotional Intelligence in Telecom Sector in India: Strategy,communication,motivation connect. – М.: , 2012. – 208 с.
  3. Robert K. Cooper, Ayman Sawaf. Executive Eq: Emotional Intelligence in Leadership and Organization. – М.: Perigee Trade, 1998. – 328 с.
  4. Anantha Kumar Duraiappah. Computational Models in the Economics of Environment and Development (Economy & Environment, 27). – М.: , 0. – 0 с.
  5. Robert Mundell, Armand Clesse. The Euro As a Stabilizer in the International Economic System. – М.: , 0. – 0 с.
  6. Cary Cherniss, Daniel Goleman. The Emotionally Intelligent Workplace: How to Select For, Measure, and Improve Emotional Intelligence in Individuals, Groups, and Organizations. – М.: , 0. – 0 с.
  7. Safe Schools: A Security and Loss Prevention Plan. – М.: , 0. – 0 с.
  8. Carol L. Covin. The Best Computer Jobs in America: 20 Minutes from Home. – М.: , 0. – 0 с.
  9. Anantha Kumar Duraiappah. Computational Models in the Economics of Environment and Development (Economy & Environment, ?27). – М.: , 0. – 0 с.
  10. Giovanni Arrighi, Beverly J. Silver, Iftikhar Ahmad. Chaos and Governance in the Modern World System. – М.: University of Minnesota Press, 1999. – 320 с.
  11. Zhengxin Chen. Computational Intelligence for Decision Support. – М.: , 0. – 0 с.
  12. Masoud Mohammadian, Ruhul Amin Sarker, Xin Yao, Ruhul Amin. Computational Intelligence in Control. – М.: , 0. – 0 с.
  13. Cary Cherniss, Mitchel Adler. Promoting Emotional Intelligence in Organizations. – М.: , 0. – 0 с.
  14. Gilbert Paquette, M. David Merrill. Instructional Engineering in Networked Environments (Tech Training Series). – М.: , 0. – 0 с.
  15. Mary Christensen, Wayne Christensen. Make Your First Million in Network Marketing: Proven Techniques You Can Use to Achieve Financial Success. – М.: , 0. – 0 с.
  16. Dorothy E. Denning, Peter J. Denning. Internet Besieged. – М.: , 0. – 0 с.
  17. A. F. Shapiro, L. C. Jain. Intelligent and Other Computational Techniques in Insurance: Theory and Applications (Series on Innovative Intelligence, 6). – М.: , 0. – 0 с.
  18. G. David Garson, G. David Information Technology and Computer Applications in Garson. Public Information Technology: Policy and Management Issues. – М.: , 0. – 0 с.
  19. Shu-Heng Chen, Paul P. Wang. Computational Intelligence in Economics and Finance (Advanced Information Processing). – М.: , 0. – 0 с.
  20. J.M. Binner. Applications of Artificial Intelligence in Finance and Economics, Volume 19 (Advances in Econometrics). – М.: , 2005. – 0 с.
  21. Innovations in Financial and Economic Networks (New Dimensions in Networks). – М.: , 2003. – 0 с.
  22. New Tools of Economic Dynamics (Lecture Notes in Economics and Mathematical Systems). – М.: , 2005. – 0 с.
  23. Joe Rubino, John Terhune. 15 Secrets Every Network Marketer Must Know: Essential Elements and Skills Required to Achieve 6- and 7-Figure Success in Network Marketing. – М.: Wiley, 2006. – 240 с.
  24. Paul Piccard, Jeremy Faircloth. Combating Spyware in the Enterprise. – М.: , 2006. – 386 с.
  25. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с.
  26. Hisashi Tanizaki. Computational Methods in Statistics and Econometrics (Statistics, a Series of Textbooks and Monographs). – М.: , 2004. – 528 с.
  27. Dipak Laha & Purnendu Mandal. Handbook of Computational Intelligence in Manufacturing and Production Management. – М.: Idea Group Reference, 2007. – 516 с.
  28. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с.
  29. Lean Yu, Shouyang Wang, Kin Keung Lai, Ligang Zhou. Bio-Inspired Credit Risk Analysis: Computational Intelligence with Support Vector Machines. – М.: , 2008. – 244 с.
  30. Anthony Brabazon. Natural Computing in Computational Finance: Volume 2 (Studies in Computational Intelligence). – М.: , 2009. – 250 с.
  31. Advances in Statistical Control, Algebraic Systems Theory, and Dynamic Systems Characteristics: A Tribute to Michael K. Sain (Systems & Control: Foundations & Applications). – М.: , 2008. – 386 с.
  32. Brian G., M.D. Orr. A Pediatrician's Journal: Caring for Children in a Broken Medical System. – М.: , 2008. – 288 с.
  33. Computational Intelligence in Biomedicine and Bioinformatics: Current Trends and Applications (Studies in Computational Intelligence). – М.: , 2008. – 432 с.
  34. Reiner Onken, Axel Schulte. System-Ergonomic Design of Cognitive Automation: Dual-Mode Cognitive Design of Vehicle Guidance and Control Work Systems (Studies in Computational Intelligence). – М.: , 2010. – 384 с.
  35. Brain-Inspired Information Technology (Studies in Computational Intelligence). – М.: , 2010. – 182 с.
  36. Biomedical Informatics: Computer Applications in Health Care and Biomedicine (Health Informatics). – М.: , 2010. – 1037 с.
  37. Rory Bray. OSSEC Host-Based Intrusion Detection Guide. – М.: , 2010. – 416 с.
  38. Clifford Headley. Raman Amplification in Fiber Optical Communication Systems. – М.: , 2010. – 392 с.
  39. GARSON. ADVS SOC SCI & COMPUT V2Advances in Social Science & Computers (ASCO). – М.: , 2010. – 0 с.
  40. Syngress. Snort Intrusion Detection 2.0. – М.: , 2010. – 550 с.
  41. W. Fred Ramirez. Computational Methods in Process Simulation. – М.: , 2010. – 512 с.
  42. Christopher Tong. Artificial Intelligence in Engineering Design,3. – М.: , 2010. – 388 с.
  43. Anatoli Torokhti. Computational Methods for Modeling of Nonlinear Systems,212. – М.: , 2010. – 322 с.
  44. Amir Khoei. Computational Plasticity in Powder Forming Processes. – М.: , 2010. – 0 с.
  45. PONS. COMPUTER APPLICATIONS IN BIOTECHNOLOGY 2004IFAC PROCEEDINGS VOLUME (IPV). – М.: , 2010. – 608 с.
  46. P. Ladeveze. Advances in Adaptive Computational Methods in Mechanics,7. – М.: , 2010. – 0 с.
  47. +б. Kozak. New Trends in Design of Control Systems 1997. – М.: , 2010. – 0 с.
  48. L. Boullart. Application of Artificial Intelligence in Process Control. – М.: , 2010. – 0 с.
  49. Carel Jan van Oss. The Properties of Water and their Role in Colloidal and Biological Systems,16. – М.: , 2010. – 236 с.
  50. Brian Caswell. Snort Intrusion Detection and Prevention Toolkit. – М.: , 2010. – 768 с.
  51. JOHNSON. ADVANCES IN ARTIFICIAL INTELLIGENCE IN ECONOMICS, FINANCE ANDMANAGEMENT VOLUME 1Advances in Artificial Intelligence in (AAIE). – М.: , 2010. – 0 с.
  52. Philippe G. Ciarlet. Essential Computational Modeling in Chemistry. – М.: , 2010. – 424 с.
  53. I. Farkas. Artificial Intelligence in Agriculture 2001. – М.: , 2010. – 132 с.
  54. F.Y. Cheng. Computational Mechanics in Structural Engineering. – М.: , 2010. – 0 с.
  55. S.L. Salzberg. Computational Methods in Molecular Biology,32. – М.: , 2010. – 0 с.
  56. Russell C. Eberhart. Computational Intelligence. – М.: , 2010. – 496 с.
  57. Y.H. Pao. Artificial Intelligence in Real-Time Control 1998. – М.: , 2010. – 0 с.
  58. Robert Barnard. Intrusion Detection Systems. – М.: , 2010. – 480 с.
  59. Author Unknown. Clays and clay minerals in natural and synthetic systems,21. – М.: , 2010. – 0 с.
  60. Gary W Flake. The Computational Beauty of Nature – Computer Explorations of Fractals, Chaos, Complex Systems & Adaption (Paper). – М.: , 2000. – 420 с.
  61. Peter Dayan. Theoretical Neuroscience – Computational and Mathematical Modeling of Neural Systems. – М.: , 2005. – 576 с.
  62. Michael I Jordan. Advances in Neural Information Processing Systems – Proceeding of the First 12 Conferences CD. – М.: , 2002. – 0 с.
  63. George F. Luger. Computation & Intelligence – Collective Readings. – М.: , 1995. – 750 с.
  64. Sara A Solla. Advances in Nerual Information Processing Systems 12. – М.: , 2000. – 2002 с.
  65. Toba Schwaber Kerson. Boundary Spanning – An Ecological Reinterpretation of Social Work Practice in Health & Mental Health Systems. – М.: , 2002. – 478 с.
  66. Emil Simiu. Chaotic Transitions in Deterministic & Stochastic Dynamical System – Applications of Melnikov Processes in Engineering, Physics & Neuroscience. – М.: , 2009. – 246 с.
  67. Jost Heintzenberg. Clouds in the Perturbed Climate System – Their Relationship to Energy Balance, Atmospheric Dynamics, and Precipitation. – М.: , 2009. – 576 с.
  68. Dominic Man Kit Lam. Regeneration & Plasticity in the Mammalian Visual System. – М.: , 1992. – 262 с.
  69. Robert J Jeffers. Computational Intelligence in Design and Manufacturing. – М.: , 1982. – 222 с.
  70. Jiannong Cao. Mobile Agents in Networking and Distributed Computing. – М.: , 2012. – 450 с.
  71. James M Beshers. Computer Methods in the Analysis of Large–Scale Social Systems 2e. – М.: , 2003. – 276 с.
  72. Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky. Cisco Security Professional's Guide to Secure Intrusion Detection Systems. – М.: , . –  с.
  73. Michael Lesk. Understanding Digital Libraries, Second Edition (The Morgan Kaufmann Series in Multimedia and Information Systems). – М.: Morgan Kaufmann, 2004. – 456 с.
  74. Tienfuan Kerh. Seismic Data Analysis by Using Computational Intelligence. – М.: LAP Lambert Academic Publishing, 2010. – 136 с.
  75. David Zumoffen and Marta Basualdo. Fault Detection Systems Integrated to Fault-Tolerant Control. – М.: LAP Lambert Academic Publishing, 2012. – 236 с.
  76. Anup Bhange and Manmeet Kaur Marhas. Anomaly Detection in Network Traffic; A Statistical Approach. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  77. Gulshan Kumar. Effective Intrusion Detection using Genetic Algorithms. – М.: LAP Lambert Academic Publishing, 2014. – 100 с.
  78. Tanmoy Hazra. Application of PCA in IDS. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  79. Yatish Choudhary. Neural Network Based Power System Stabilizer. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  80. Saifur Sabuj. Microcontroller Based Friend or Foe (FoF) Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 52 с.
  81. Nurbaizura Ramji and Asrani Lit. Performance Optimization in Network-on-Chip (NoC) Architecture. – М.: LAP Lambert Academic Publishing, 2014. – 88 с.
  82. Congzhi Huang and Yan Bai. Modeling, Analysis, and Synthesis of Networked Cascade Control Systems. – М.: LAP Lambert Academic Publishing, 2011. – 176 с.
  83. Hua Ouyang. Networked Predictive Control Systems. – М.: LAP Lambert Academic Publishing, 2010. – 164 с.
  84. Huang-Chun Roan. Network Intrusion Detection Based on Shift-OR Circuit. – М.: LAP Lambert Academic Publishing, 2011. – 60 с.
  85. M. Sadiq Ali Khan and S. M. Aqil Burney. Recent Trends in Intrusion Detection System & Network Monitoring. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  86. Cruceru Madalina. Radiation Detection Systems With Applications in High Energy Physics. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  87. Mahmood A. Mahdavi and Yen-Han Lin. Computational Approaches In Systems Biology. – М.: LAP Lambert Academic Publishing, 2010. – 124 с.
  88. Yi Xin. Mid-IR-based Gas Detection System Analysis Model. – М.: LAP Lambert Academic Publishing, 2011. – 136 с.
  89. Vyacheslav Abramov. Queueing systems, networks and telecommunication systems. – М.: LAP Lambert Academic Publishing, 2010. – 164 с.
  90. Sheelam Raji Reddy. Computational Techniques in Transient Magneto-hydro Dynamic Flows. – М.: LAP Lambert Academic Publishing, 2014. – 112 с.
  91. Zol Bahri Razali. Practical Intelligence in Engineering Laboratory:PhD Pilot Instrument. – М.: LAP Lambert Academic Publishing, 2013. – 64 с.
  92. Abhay Nath Singh. Honeypot Based Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  93. Shahnawaz Husain,S. C. Gupta and R. C. Joshi. Intrusion Detection Engine for Adhoc Environment. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  94. Sumaya Saad Sulaiman and Sarab M. Hameed. A Fuzzy Based Clustering for Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  95. Shubha Puthran and Ketan Shah. Intrusion Detection System using datamining techniques. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  96. Mohammad S. I. Mamun. Intrusion Detection System Architecture in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  97. Heba Fathy Eid. Computational Intelligence in Network Intrusion Detection System. – М.: Scholars' Press, 2014. – 164 с.
  98. Janakiraman S. Distributed Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 164 с.
  99. Yogesh Kumar,Krishan Kumar and Gulshan Kumar. Feature Selection For Intrusion Detection Systems. – М.: LAP Lambert Academic Publishing, 2014. – 100 с.
  100. Syed Zahidur Rashid. Computer Network Security Monitoring. – М.: Scholars' Press, 2015. – 284 с.
  101. Lanier Watkins. Resource Discovery: Using Network Traffic To Infer CPU And Memory Load. – М.: LAP Lambert Academic Publishing, 2014. – 96 с.
  102. Gulshan Kumar. Effective Intrusion Detection using Feature Selection. – М.: LAP Lambert Academic Publishing, 2014. – 92 с.
  103. Mrutyunjaya Panda and Manas Ranjan Patra. A Data Mining Approach to Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2015. – 216 с.
  104. Mohammad AlAhmad. Security threats of finger print biometric in network system. – М.: LAP Lambert Academic Publishing, 2014. – 88 с.
  105. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  106. Mueen Uddin. Dynamic Multi Layer Signature based IDS System using Mobile Agents. – М.: LAP Lambert Academic Publishing, 2011. – 72 с.
  107. Ivano Malavolta. A tamper resistant Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2011. – 144 с.
  108. Shaffali Gupta and Sanmeet Kaur. A GUI Framework for detecting Intrusions using Bro IDS. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  109. Mahmoud Jazzar. Computer Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 240 с.
  110. Siva S. Sivatha Sindhu,S. Geetha and S. Selvakumar. Network Intrusion Detection System using Machine Learning Techniques. – М.: LAP Lambert Academic Publishing, 2013. – 80 с.
  111. Vincent Omollo. Enhanced Network Security. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  112. Nasim Beigi-Mohammadi. Smart Meter Networks: Intrusion Detection System by Design. – М.: LAP Lambert Academic Publishing, 2014. – 136 с.
  113. Christian Chetachi Umunna. Distributed Intrusion Detection System in Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 104 с.
  114. Iftikhar Ahmad. Feature Subset Selection in Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 220 с.
  115. Saima Munawar. Detection and Classification Of Normal and Anomaly IP Packet. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  116. Jabarweer Singh,Krishan Kumar and Gulshan Kumar. Intrusion detection using artificial intelligence based ensembles. – М.: LAP Lambert Academic Publishing, 2014. – 116 с.
  117. Govind Sreekar Shenoy. Architecture Support for Intrusion Detection systems. – М.: LAP Lambert Academic Publishing, 2014. – 160 с.
  118. Esther Scheurmann. COMPUTATIONAL INTELLIGENCE IN LENDING. – М.: LAP Lambert Academic Publishing, 2010. – 100 с.
  119. Latha Parthiban. Computational Intelligence in Computer Aided Medical Diagnosis. – М.: LAP Lambert Academic Publishing, 2010. – 248 с.
  120. Monis Akhlaq,Irfan Awan and Faeiz Alserhani. Improved Performance High Speed Network Intrusion Detection Systems. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  121. Prakash Prasad. Intrusion Detection System: Findings. – М.: LAP Lambert Academic Publishing, 2011. – 104 с.
  122. Homam El-Taj and Omar Amer. Network Alert Management System For IDS False Positive Reduction. – М.: LAP Lambert Academic Publishing, 2013. – 156 с.
  123. Bibi Masoomeh Aslahi Shahri. Intrusion Detection System Using Hybrid Gsa-kmeans. – М.: LAP Lambert Academic Publishing, 2014. – 128 с.
  124. Tigabu Dagne Akal. Constructing Predictive Model for Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 160 с.
  125. Negm Eldin Mohamed Shawky,El-Sayed Mostafaa Saad and Abd Elrahman Elbardawiny. Advanced data association techniques in multi-target tracking system. – М.: LAP Lambert Academic Publishing, 2012. – 212 с.
  126. Kamaruzaman Maskat and Mohd Afizi Mohd Shukran. Agent Based Snort In Distributed Environment. – М.: LAP Lambert Academic Publishing, 2013. – 112 с.
  127. Kamrul Hasan. An Investigation into Botnet Detection System. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  128. Rupali Pathak. Recent Advances In Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  129. Hannah Inbarani. Web Personalization Models using Computational Intelligence. – М.: LAP Lambert Academic Publishing, 2013. – 200 с.
  130. Gabriella Carrozza. Software Faults Diagnosis in Complex Mission Critical Systems. – М.: LAP Lambert Academic Publishing, 2015. – 168 с.
  131. Al-Sakib Khan Pathan. Securing WSN with Lightweight Resource-Efficient Schemes. – М.: LAP Lambert Academic Publishing, 2011. – 116 с.
  132. Alpay Doruk. Security Review Program Requirements for Intrusion Management Systems. – М.: LAP Lambert Academic Publishing, 2010. – 88 с.
  133. Sathish Kumar. Intrusion Detection and Response Techniques for Mobile Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 200 с.
  134. Richard Rimiru. Exploring Immune System's Concepts for the Design of Novel AIS Models. – М.: LAP Lambert Academic Publishing, 2012. – 164 с.
  135. Telmo Menezes. Evolutionary Computational Intelligence. – М.: LAP Lambert Academic Publishing, 2011. – 264 с.
  136. Khandakar Entenam Unayes Ahmed. IDENTITY AND ACCESS MANAGEMENT IN CLOUD COMPUTING. – М.: LAP Lambert Academic Publishing, 2011. – 172 с.
  137. Adriana Agapie. Computational Intelligence Techniques in Econometric Modeling. – М.: LAP Lambert Academic Publishing, 2009. – 124 с.
  138. HARIKANTH DUMPETI,NARESH REDDY G and SAISHARAN K. COMPUTER APPLICATION IN BUSINESS. – М.: LAP Lambert Academic Publishing, 2010. – 452 с.
  139. Kazeem Osuolale. A Study Of Computer Software In Secondary School Mathematics. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  140. Nadim Al-Mosawi and Frida Ohlson. Occupant Detection System. – М.: , 2015. – 64 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Наука человековедения. интервью с Д. Уолтоном, профессором London Metropolitan University, экспертом CIPD. Chartered Institute of Personnel and Development, автором программы Master of Arts in Human Resource Strategies. И. Смирнова, "Кадровый менеджмент", № 5, июль-август 2007.
  2. Банковское отделение будущего. интервью с Камероном МакКворри. Cameron MacQuarrie, менеджером по развитию бизнеса компании Cisco Systems в области корпоративных финансов в регионе EMEA. Европа, Ближний Восток, Африка. Н.Ф. Колюшенко, "Расчеты и операционная работа в коммерческом банке", № 2, февраль 2006.
  3. Инвестиции в Business Intelligence - прибыльный бизнес. Д. Красюков, "Финансовая газета", № 38, сентябрь 2005.
  4. Ловушка для пирата. интервью с И. Слабых, руководителем отдела противодействия интеллектуальному пиратству в России и СНГ Adobe Systems. И. Голова, "Расчет", N 9, сентябрь 2012 г.
  5. Business Intelligence и Business Performance Management: основные термины и концепции. Ю.В. Амириди, "Управление в кредитной организации", N 5, сентябрь-октябрь 2011 г.
  6. Trade-in как способ обмена автомобиля. С.Н. Гордеева, "Торговля: бухгалтерский учет и налогообложение", N 2, февраль 2011 г.
  7. Проблемы применения универсальной юрисдикции in absentia. Г.А. Королев, "Журнал российского права", № 10, октябрь 2009.
  8. Тонкости trade-in. С.А.Королев, "НДС. Проблемы и решения", № 8, август 2009.
  9. Основной арсенал "охотника" - его network: кого он знает на рынке и качество этих отношений. С. Плетнева, "Управление персоналом", № 12, июнь 2009.
  10. Кто владеет информацией... Business Intelligence - ещё один путь к успеху. Н. Шестопалова, "Бухгалтерия и банки", № 2, февраль 2009.
  11. In-store banking - новая модель банковского бизнеса. А. Пятков, "Банковское обозрение", № 11, ноябрь 2008.
  12. Я воспринимаю персонального помощника как напарника червяк должен нравиться рыбке, а не рыбаку. интервью с П.А. Черкашиным, руководителем российского представительства компании Adobe Systems. "Управление персоналом", № 20, октябрь 2008.
  13. Система управленческой отчетности для руководителей на платформе Oracle Business Intelligence SE One. О. Морозова, "Бухгалтерия и банки", № 4, апрель 2008.

Образцы работ

Тема и предметТип и объем работы
Этапы формирования теории президентства
История государства и права
Курсовая работа
30 стр.
Многостороннее регулирование внешней торговли
Международные экономические отношения
Диплом
154 стр.
Слияния и поглощения Мировая и Российская практика
Мировая экономика
Диплом
99 стр.
Математические модели океанических течений
Переводоведение (теория перевода)
Курсовая работа
42 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Aleksandr, 26.01
Здравствуйте,Юля. Спасибо вам еще раз за диплом.. все сдал на отлично.. оч доволен, буду рекомендовать другим)