Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Data Privacy Management and Autonomous Spontaneus Security: 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, ... Computer Science / Security and Cryptology). – М.: , 2012. – 334 с.
  2. Wireless Communications and Applications: First International Conference, ICWCA 2011, Sanya, China, August 1-3, 2011, Revised Selected Papers (Lecture ... and Telecommunications Engineering). – М.: , 2012. – 468 с.
  3. Traffic Monitoring and Analysis: 4th International Workshop, TMA 2012, Vienna, Austria, March 12, 2012, Proceedings (Lecture Notes in Computer Science ... Networks and Telecommunications). – М.: , 2012. – 200 с.
  4. Carl Bergquist. Guide to Electronic Surveillance Devices. – М.: Prompt (DPI - 8/01), 2002. – 280 с.
  5. Amjad Umar. E-Business and Distributed Systems Handbook: Management Module. – М.: , 0. – 0 с.
  6. The Security Economy (Safety Standards Series:). – М.: , 2004. – 0 с.
  7. Oracle Soa Suite 11G Handbook. – М.: , 2011. – 800 с.
  8. Santhosh Ragan. Soft-I-Robot. – М.: LAP Lambert Academic Publishing, 2012. – 56 с.
  9. M. Sadiq Ali Khan and S. M. Aqil Burney. Recent Trends in Intrusion Detection System & Network Monitoring. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  10. Sumaya Saad Sulaiman and Sarab M. Hameed. A Fuzzy Based Clustering for Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  11. Anil Kumar V. and Prasad E. Dynamic Broadcast Routing With Security Enhancement. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  12. Nandhakumar Kathiresshan. Eagle Eye. – М.: LAP Lambert Academic Publishing, 2012. – 180 с.
  13. Syed Zahidur Rashid. Computer Network Security Monitoring. – М.: Scholars' Press, 2015. – 284 с.
  14. Shaffali Gupta and Sanmeet Kaur. A GUI Framework for detecting Intrusions using Bro IDS. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  15. Peter Kemei. Framework for Monitoring Hardware Firewall Functionality Using NIDS. – М.: LAP Lambert Academic Publishing, 2013. – 176 с.
  16. Deniz Akkaya and Fabien Thalgott. Honeypots in Network Security. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  17. Kamrul Hasan. An Investigation into Botnet Detection System. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  18. Tanveer Zia. A Security Framework for Wireless Sensor Networks (WSN). – М.: LAP Lambert Academic Publishing, 2013. – 160 с.
  19. Joao Antunes. Network Attack Injection. – М.: Scholars' Press, 2013. – 268 с.
  20. Gulzar Mehmood,Nizamud Din and Muhammad Nawaz Khan. Privacy Preserving Scheme for Body Sensor Networks Based on CDLP. – М.: LAP Lambert Academic Publishing, 2014. – 56 с.
  21. Nirmalya Kar,Ashim Saha and Mrinal Kanti Debbarma. Biometric Based Attendance System. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.

Дополнительные результаты

  1. Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с.
  2. Data Privacy Management and Autonomous Spontaneus Security: 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, ... Computer Science / Security and Cryptology). – М.: , 2012. – 334 с.
  3. Passive and Active Measurement: 13th International Conference, PAM 2012, Vienna, Austria, March 12-14, 2012, Proceedings (Lecture Notes in Computer ... Networks and Telecommunications). – М.: , 2012. – 290 с.
  4. Constructive Side-Channel Analysis and Secure Design: Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings ... Computer Science / Security and Cryptology). – М.: , 2012. – 280 с.
  5. Public Key Infrastructures, Services and Applications: 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected ... Computer Science / Security and Cryptology). – М.: , 2012. – 219 с.
  6. Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  7. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с.
  8. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с.
  9. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 515 с.
  10. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  11. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с.
  12. Smart Card Research and Advanced Applications: 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, ... Computer Science / Security and Cryptology). – М.: , 2012. – 357 с.
  13. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с.
  14. Constance S. Hawke, Constance S. Hawke. Computer and Internet Use on Campus: A Legal Guide to Issues of Intellectual Property, Free Speech, and Privacy. – М.: , 0. – 0 с.
  15. Carl Bergquist. Guide to Electronic Surveillance Devices. – М.: Prompt (DPI - 8/01), 2002. – 280 с.
  16. Kenneth C. Mansfield, James L. Antonakos. Introduction to Computers for Engineering and Technology. – М.: , 0. – 0 с.
  17. Leigh Wade. Careers in Private Security: How to Get Started, How to Get Ahead. – М.: , 0. – 0 с.
  18. James J. O'Brien, Fredric L. Plotnick. CPM In Construction Management. – М.: , 0. – 0 с.
  19. Ilkka Tuomi. Networks of Innovation: Change and Meaning in the Age of the Internet. – М.: , 2003. – 0 с.
  20. Thomas J. Parenty. Digital Defense: What You Should Know About Protecting Your Company's Assets. – М.: , 0. – 0 с.
  21. Henry Chan, Raymond Lee, Tharam Dillon, Elizabeth Chang, Henry Chan, Raymond Lee, Tharam Dillon. Electronic Commerce: Fundamentals & Applications. – М.: , 0. – 0 с.
  22. John Ross, John A. Ross. Computer Networks for Small Business. – М.: , 0. – 0 с.
  23. Roberta Bragg. MCSE Training Guide (70-220): Windows 2000 Network Security Design, Second Edition. – М.: , 0. – 0 с.
  24. Janet G. Butler. Enterprisewide Network Management. – М.: , 0. – 0 с.
  25. Peter Varhol. Network-Centric Computing: Preparing the Enterprise for the Next Millennium. – М.: , 0. – 0 с.
  26. Paul Fortier, Howard Michel. Computer Systems Performance Evaluation and Prediction. – М.: , 0. – 0 с.
  27. Michal Pioro, Deepankar Medhi. Routing, Flow, and Capacity Design in Communication and Computer Networks. – М.: Elsevier Digital Press, 0. – 794 с.
  28. John W Farber. Essential Electronics For PC Technicians (Electrical and Computer Engineering Series). – М.: , 2004. – 0 с.
  29. George H. Bodnar. Accounting Information Systems (9th Edition). – М.: , 2003. – 0 с.
  30. Peter R., MBA Ramsaroop. Securing Business Intelligence: Knowledge and CyberSecurity in the Post 9/11 World. – М.: , 2004. – 0 с.
  31. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с.
  32. Rickland Hollar. Enterprise Web Services Security (Internet Series). – М.: , 2005. – 432 с.
  33. Ron Ben Natan. Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase. – М.: , 2005. – 432 с.
  34. Xiaoqiang Cai, Dan Sha, C.K. Wong. Time-Varying Network Optimization (International Series in Operations Research & Management Science). – М.: , 2007. – 248 с.
  35. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с.
  36. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с.
  37. Network Security. – М.: , 2008. – 370 с.
  38. Computer & Network Procedures to Manage IT Systems. – М.: , 2008. – 720 с.
  39. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с.
  40. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с.
  41. Daniel Clark. Network Access Control 100 Success Secrets - 100 Most Asked NAC Questions on Implementation and Deployment of unify endpoint security technology, user ... and network security enforcement. – М.: , 2008. – 180 с.
  42. W. Krag Brotby. Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement. – М.: Auerbach Publications, 2009. – 200 с.
  43. Jeff Crume. Inside Internet Security: What Hackers Don't Want You To Know. – М.: , 0. – 0 с.
  44. Handbook of Information and Communication Security. – М.: , 2010. – 800 с.
  45. Jeanna Matthews. Computer Networking. – М.: , 2005. – 288 с.
  46. Rob Cameron. Juniper(r) Networks Secure Access SSL VPN Configuration Guide. – М.: , 2010. – 656 с.
  47. Owen Poole. Network Security. – М.: , 2010. – 224 с.
  48. James Joshi. Network Security: Know It All. – М.: , 2010. – 368 с.
  49. Steve Manzuik. Network Security Assessment: From Vulnerability to Patch. – М.: , 2010. – 500 с.
  50. Jan L. Harrington. Network Security. – М.: , 2010. – 384 с.
  51. Russ Rogers. Network Security Evaluation Using the NSA IEM. – М.: , 2010. – 450 с.
  52. Brien Posey. GFI Network Security and PCI Compliance Power Tools. – М.: , 2010. – 488 с.
  53. Larry L. Peterson. Computer Networks ISE. – М.: , 2010. – 848 с.
  54. Larry L. Peterson. Computer Networks. – М.: , 2010. – 848 с.
  55. Emad Aboelela. Computer networks bundle. – М.: , 2010. – 0 с.
  56. Graham King. Understanding and Designing Computer Networks. – М.: , 2010. – 224 с.
  57. Syngress. Managing Cisco Network Security 2E. – М.: , 2010. – 752 с.
  58. Bill English. MCSA/MCSE: Windows® 2000 Network Security Administration Study Guide. – М.: , 2003. – 574 с.
  59. Russ Kaufman. MCSA/MCSE: Windows® Server 2003 Network Security Administration Study Guide. – М.: , 2004. – 560 с.
  60. Nitesh Dhanjani. Network Security Tools. – М.: , 2005. – 340 с.
  61. Thomas W. Madron. Network Security in the 90?s. – М.: , 1992. – 304 с.
  62. Microsoft. MCSE Training Kit (Exam 70–220) – Designing Microsoft Windows 2000 Network Security. – М.: , 2001. – 864 с.
  63. Andrew Lockhart. Network Security Hacks. – М.: , 2004. – 316 с.
  64. DAN. Network Security In A Mixed Environment. – М.: , 1998. – 456 с.
  65. TL LOQUERY. Laquey: The Users Directory Of Computer ?networks? (pr Only). – М.: , 1990. – 646 с.
  66. JS QUARTERMAN. Quarterman: The ?matrix?: Computer Networks & Conferencing Systems Worldwid (pr Only). – М.: , 1989. – 752 с.
  67. Gerald D. Cole. Computer Networking for Systems Programmers. – М.: , 1990. – 242 с.
  68. David Claiborne. Mathematical Preliminaries for Computer Networking. – М.: , 1990. – 180 с.
  69. Matthew Strebe. Network Security JumpStartTM. – М.: , 2002. – 384 с.
  70. Pawan K Bhardwaj. A+. Network+, Security+ Exams in a Nutshell. – М.: , 2007. – 812 с.
  71. Eric Cole. Network Security Bible. – М.: , 2005. – 694 с.
  72. S MUFTIC. Muftic: ?security? Mechanisms For Computer Network S. – М.: , 1989. – 196 с.
  73. Eric Cole. Wiley Pathways Network Security Fundamentals Project Manual. – М.: , 2008. – 312 с.
  74. Andrew Lockhart. Network Security Hacks 2e. – М.: , 2006. – 352 с.
  75. Pascale Vicat–Blanc Primet. Cluster and Computing Networks. – М.: , 2011. – 0 с.
  76. Chris Mcnab. Network Security Assessment 2e. – М.: , 2007. – 464 с.
  77. Cryptography & Network Security. – М.: , 2007. – 0 с.
  78. Computer Networks: An Open Source Approach. – М.: , 2011. – 0 с.
  79. Securing Global Transportation Networks. – М.: , 2011. – 312 с.
  80. Wireless Network Security A Beginners Guide. – М.: , 2011. – 400 с.
  81. Principles Of Computer Security Comptia Security+ And Beyond Lab Manual, Second Edition. – М.: , 2011. – 352 с.
  82. Network Security: The Complete Reference. – М.: , 2011. – 896 с.
  83. Fundamentals Of Network Security. – М.: , 2011. – 672 с.
  84. Eoghan Casey. Digital Evidence and Computer Crime. – М.: , . –  с.
  85. Greg Holden. Guide to Firewalls and Network Security: Intrusion Detection and VPNs. – М.: Course Technology, 2003. – 512 с.
  86. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . –  с.
  87. Dave Tyson. Security Convergence: Managing Enterprise Security Risk. – М.: , 2007. – 232 с.
  88. Ido Dubrawsky. How to Cheat at Securing Your Network. – М.: Syngress, 2007. – 432 с.
  89. Shaek Rana Mohammad Baki Billah and Mohammad Hafizur Rahman. Design & Development of Network Security System using IP Tables. – М.: LAP Lambert Academic Publishing, 2013. – 164 с.
  90. Sudipta Bhattacharjee,Debasis Deb and Samir Pal. Wireless Sensor Network for Monitoring of Roof Vibration in Mines. – М.: LAP Lambert Academic Publishing, 2014. – 124 с.
  91. Xiangqian Chen. DEFENSE AGAINST NODE COMPROMISE IN SENSOR NETWORK SECURITY. – М.: LAP Lambert Academic Publishing, 2009. – 108 с.
  92. James Gadze. Embedded Wireless Sensor Network for monitoring and control. – М.: LAP Lambert Academic Publishing, 2010. – 168 с.
  93. M. Sadiq Ali Khan and S. M. Aqil Burney. Recent Trends in Intrusion Detection System & Network Monitoring. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  94. Vinay Abburi. SECURE AND RELIABLE DEEP SPACE NETWORKS. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  95. Ahmed Bayomy Zaky Ahmed,Hala Helmy Zayed and May Salama. Enhancing Video on Demand over Computer Networks. – М.: LAP Lambert Academic Publishing, 2013. – 128 с.
  96. Ashit Kumar Dutta and Abdul Rahaman Wahab Sait. Computer Networks from Scratch. – М.: LAP Lambert Academic Publishing, 2013. – 324 с.
  97. Anil Kumar V. and Prasad E. Dynamic Broadcast Routing With Security Enhancement. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  98. Ammisetty Veeraswamy and Ammisetty Mahesh Babu. Introduction to Computer Networks. – М.: LAP Lambert Academic Publishing, 2012. – 208 с.
  99. Torruam Japheth Terande. Introduction to computer networking. – М.: LAP Lambert Academic Publishing, 2012. – 144 с.
  100. Xiaodong He. Automated intrusion prevention mechanism in enhancing network security. – М.: Scholars' Press, 2014. – 128 с.
  101. Syed Zahidur Rashid. Computer Network Security Monitoring. – М.: Scholars' Press, 2015. – 284 с.
  102. Elliot Attipoe. Securing the Public Wireless Network. – М.: LAP Lambert Academic Publishing, 2013. – 92 с.
  103. Mrutyunjaya Panda and Manas Ranjan Patra. A Data Mining Approach to Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2015. – 216 с.
  104. Mohammad AlAhmad. Security threats of finger print biometric in network system. – М.: LAP Lambert Academic Publishing, 2014. – 88 с.
  105. Nirbhay Chaubey. Securing AODV Routing Protocol in design of Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2015. – 132 с.
  106. Aditya Kumar. Cryptography and Chaos a New Approach in Network Security. – М.: LAP Lambert Academic Publishing, 2015. – 80 с.
  107. Chakchai So-In. Resource Allocation and Management in Computer Networks. – М.: LAP Lambert Academic Publishing, 2011. – 212 с.
  108. Mehmud Abliz. Denial of Service in Computer Networks. – М.: LAP Lambert Academic Publishing, 2011. – 84 с.
  109. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  110. Trunal Patel. Computer Network. – М.: LAP Lambert Academic Publishing, 2012. – 572 с.
  111. Gurpreet juneja. Security:MPLS VPN Network. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  112. Omid Mahdi Ebadati E.,Harleen Kaur M. Afshar Alam and Kaebeh Yaeghoobi. Micro-Firewalls for Dynamic Network Security Framework. – М.: LAP Lambert Academic Publishing, 2012. – 292 с.
  113. Adil Adil Nazir Malik. Modeling and Simulation of computer Network Using OPNET. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  114. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  115. Shaffali Gupta and Sanmeet Kaur. A GUI Framework for detecting Intrusions using Bro IDS. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  116. Syed Baarrij. Comprehensive Network Capacity Monitoring Guideline (GSM and UMTS). – М.: LAP Lambert Academic Publishing, 2013. – 56 с.
  117. Peter Kemei. Framework for Monitoring Hardware Firewall Functionality Using NIDS. – М.: LAP Lambert Academic Publishing, 2013. – 176 с.
  118. Vincent Omollo. Enhanced Network Security. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  119. Firkhan Ali Hamid Ali. Vulnerability Analysis on the Computer Network Security. – М.: LAP Lambert Academic Publishing, 2010. – 72 с.
  120. Imran Sohail and Sikandar Hayat. Network Security and DDoS. – М.: LAP Lambert Academic Publishing, 2010. – 64 с.
  121. Er. Surajit Borah. A Study Of Computer Networking At IOCL(AOD), Digboi(India). – М.: LAP Lambert Academic Publishing, 2011. – 64 с.
  122. Ricardo Chaves. Secure Computing on Reconfigurable Systems. – М.: LAP Lambert Academic Publishing, 2010. – 212 с.
  123. Volkan ERTURK,Dr. Ali ARIFOGLU and Dr. Attila OZGIT. A Framework Based On Continuous Security Monitoring. – М.: LAP Lambert Academic Publishing, 2010. – 148 с.
  124. Deniz Akkaya and Fabien Thalgott. Honeypots in Network Security. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  125. Kefa Rabah. Mastering Securing ICT Infrastructure for Corporate Network. – М.: LAP Lambert Academic Publishing, 2014. – 360 с.
  126. Jerry Bent. Design and Simulation of a Secured and Robust Campus Area Network. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  127. Muna Elsadig Mohamed Ahmed Elsheik. Bio Inspired Intrusion Prevention and Self healing System for Networks. – М.: LAP Lambert Academic Publishing, 2012. – 256 с.
  128. Mohammad Faisal. Networks Security and Communication. – М.: LAP Lambert Academic Publishing, 2012. – 56 с.
  129. MD UDDIN. COMPUTER NETWORKING AND MANAGEMENT. – М.: LAP Lambert Academic Publishing, 2010. – 44 с.
  130. Oluwafemi Osho and Victor Waziri. Conceptual Models and Simulation of Computer Worm Propagation. – М.: LAP Lambert Academic Publishing, 2013. – 116 с.
  131. Tanveer Zia. A Security Framework for Wireless Sensor Networks (WSN). – М.: LAP Lambert Academic Publishing, 2013. – 160 с.
  132. Dirk Lessner. Network Security for Embedded Systems. – М.: LAP Lambert Academic Publishing, 2009. – 232 с.
  133. Mohamed Nassar. Voice over IP Networks Monitoring. – М.: LAP Lambert Academic Publishing, 2009. – 172 с.
  134. Nathan Darmawan. Shielding Your Company with a Better Network Security Design. – М.: LAP Lambert Academic Publishing, 2010. – 180 с.
  135. Nirmalya Kar,Ashim Saha and Mrinal Kanti Debbarma. Biometric Based Attendance System. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  136. Otto Dostal. ICT Systems Monitoring. – М.: LAP Lambert Academic Publishing, 2012. – 176 с.
  137. Navneet kaur Bajwa. Sanitization of Data in Computer Network. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  138. Palanivel Kodeswaran. On the Use of Context and Policies in Declarative Networked Systems. – М.: LAP Lambert Academic Publishing, 2012. – 112 с.
  139. Vadim Tarasov. Economic Security: Case of Russia. – М.: LAP Lambert Academic Publishing, 2013. – 112 с.
  140. Marcellin Mugabe. The Total Cost of Ownership (TCO) of Computer Networks in Colleges. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Основной арсенал "охотника" - его network: кого он знает на рынке и качество этих отношений. С. Плетнева, "Управление персоналом", № 12, июнь 2009.

Образцы работ

Тема и предметТип и объем работы
Проблемы бедности в России
Экономика
Курсовая работа
40 стр.
Последствия операции НАТО
Политология
Диплом
80 стр.
Платежные системы в Интернете
Информатика
Диплом
102 стр.
Роль ОБСЕ в урегулировании конфликтов в Европе
Политология
Курсовая работа
33 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Александр
Всё получил. Спасибо вам за то, что смогли сделать! Благодарю вас. Вы очень много смогли сделать, чем очень мне помогли.