Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Paul Shaw. E-Business Privacy and Trust: Planning and Management Strategies. – М.: , 0. – 0 с.
  2. Tom W. Goad. Information Literacy and Workplace Performance. – М.: , 0. – 0 с.
  3. Information Warfare : corporate attack and defence in a digital world (Computer Weekly Professional (Paperback)). – М.: , 0. – 0 с.
  4. Oded Goldreich. Foundations of Cryptography: Basic Tools. – М.: , 0. – 0 с.
  5. Amjad Umar. E-Business and Distributed Systems Handbook: Management Module. – М.: , 0. – 0 с.
  6. Vesna Hassler. Security Fundamentals for E-Commerce (Artech House Computer Security Series). – М.: , 0. – 0 с.
  7. Gary C. Guthrie. Mathematics of Interest Rates and Finance. – М.: , 2003. – 0 с.
  8. James A. Landon. The Weekend Landlord: From Credit Checks and Leases to Necessary Repairs and GETTING PAID!. – М.: , 2005. – 0 с.
  9. Robert L. Dixon, Harold E. Arnett, Howard Davidoff. The McGraw-Hill 36-Hour Accounting Course, 4th Ed. – М.: , 2007. – 416 с.
  10. Andy Walker. Windows Lockdown!: Your XP and Vista Guide Against Hacks, Attacks, and Other Internet Mayhem (Absolute Beginner's Guide). – М.: , 2008. – 480 с.
  11. Michael Jang. MasteringTM Red Hat® Linux 9. – М.: , 2003. – 976 с.
  12. Deborah Russell. Computer Security Basics. – М.: , 1991. – 464 с.
  13. The Mcgraw-Hill 36-Hour Accounting Course, 4Th Ed. – М.: , 2011. – 416 с.
  14. Principles Of Computer Security Comptia Security+ And Beyond Lab Manual, Second Edition. – М.: , 2011. – 352 с.
  15. How To Do Everything With Windows Xp, Third Edition. – М.: , 2011. – 480 с.
  16. Praphul Chandra, David Lide. Wi-Fi Telephony: Challenges and Solutions for Voice over WLANs (Communications Engineering Series). – М.: , 2006. – 288 с.
  17. Emily M. Harwood. Digital CCTV: A Security Professional's Guide. – М.: Butterworth-Heinemann, 2007. – 272 с.
  18. Abadi Tsegay and Kumudha Raimond. Video processing for Ethiopian sign language translation. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  19. Adamu Usman. Cost-Benefit Analysis of Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  20. Sharmin Akter Lima and Md. Mahmudul Hasan Rafee. Pattern Matching With Variable Length Gaps. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  21. Ashit Kumar Dutta and Abdul Rahaman Wahab Sait. Computer Networks from Scratch. – М.: LAP Lambert Academic Publishing, 2013. – 324 с.
  22. Wole Olatokun. Information Technology Tools and Applications. – М.: LAP Lambert Academic Publishing, 2011. – 296 с.
  23. Saad Ahmed Khan and Saif Ahmad. Security Implications of Cloud computing. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  24. Predrag Tasevski. Interactive Cyber Security Awareness Program. – М.: LAP Lambert Academic Publishing, 2012. – 184 с.
  25. Harjot Dhawan. A Road to Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  26. S. Balamurugan and S. Charanyaa. Principles of Database Security. – М.: Scholars' Press, 2014. – 148 с.
  27. S. Balamurugan and S. Charanyaa. Principles of Social Network Data Security. – М.: LAP Lambert Academic Publishing, 2014. – 92 с.

Дополнительные результаты

  1. Public Key Infrastructures, Services and Applications: 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected ... Computer Science / Security and Cryptology). – М.: , 2012. – 219 с.
  2. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с.
  3. Securities Compliance Index. Securities Compliance Index, Second Edition: A Topical Guide To U.S. Securities Regulation. – М.: , 2012. – 512 с.
  4. David Chanoff, Ejovi Nuwere. Hacker Cracker : A Journey from the Mean Streets of Brooklyn to the Frontiers of Cyberspace. – М.: , 0. – 0 с.
  5. Terrell Ward Bynum, Simon Rogerson, Blackwell Pub. Computer Ethics and Professional Responsibility: Introductory Text and Readings. – М.: , 0. – 0 с.
  6. Information Warfare : corporate attack and defence in a digital world (Computer Weekly Professional (Paperback)). – М.: , 0. – 0 с.
  7. Julia Lowell, C. R. Neu, Daochi Tong, National Defense Research Institute, National Security Research Institute. Financial Crises and Contagion in Emerging Market Countries. – М.: , 0. – 0 с.
  8. Seymour Bosworth, Michel E. Kabay. Computer Security Handbook. – М.: , 0. – 0 с.
  9. Richard Hunter. World Without Secrets: Business, Crime and Privacy in the Age of Ubiquitous Computing. – М.: , 0. – 0 с.
  10. Thomas J. Parenty. Digital Defense: What You Should Know About Protecting Your Company's Assets. – М.: , 0. – 0 с.
  11. Computer Security. – М.: , 0. – 0 с.
  12. Donn B. Parker. Fighting Computer Crime : A New Framework for Protecting Information. – М.: , 0. – 0 с.
  13. Joseph S. Nye, William A. Owens, James R. Schlesinger, R. James Woolsey, James A. Lewis, Joseph S., Jr. Nye, James Andrew Lewis, Erin Schlather, Csis Commission on Technology Security in the Twenty-First Century. Computer Exports and National Security: New Tools for a New Century : A Report of the Csis Commission on Technology Security in the 21St-Century (Csis Panel Reports.). – М.: , 0. – 0 с.
  14. Ravi Kalakota, Andrew B. Whinston, Coordination, and Collaboration Conference 1 Organizational Computing. Readings in Electronic Commerce. – М.: , 0. – 0 с.
  15. Perseus Publishing, Basic Books, Perseus Publishing. The Big Book of Business Quotations: More than 5000 Indispensable Observations on the World of Commerce, Work, Finance and Management. – М.: , 0. – 0 с.
  16. Oded Goldreich. Foundations of Cryptography: Basic Tools. – М.: , 0. – 0 с.
  17. Scott D. Korb. Computer Projects BASICS. – М.: , 0. – 0 с.
  18. Roland Traunmuller, R. Traunmuller, Quebec) Ifip World Computer Congress 2002 Montreal. Information Systems: The E-Business Challenge (International Federation for Information Processing, 95). – М.: , 0. – 0 с.
  19. George Mohay, Alison Anderson, Byron Collie, Olivier de Vel, Rod McKemmish. Computer and Intrusion Forensics (Artech House Computer Security Series). – М.: , 0. – 0 с.
  20. Vesna Hassler. Security Fundamentals for E-Commerce (Artech House Computer Security Series). – М.: , 0. – 0 с.
  21. G. David Garson, G. David Information Technology and Computer Applications in Garson. Public Information Technology: Policy and Management Issues. – М.: , 0. – 0 с.
  22. Thomas Peltier, Thomas Pelitier, Justin Peltier, John A. Blackley, Peltier, Associates. Information Security Fundamentals. – М.: , 0. – 0 с.
  23. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с.
  24. Christopher A. Crayton. Security + Exam Guide (Testtaker's Guide Series). – М.: , 2003. – 0 с.
  25. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с.
  26. Committee on Federal Regulation of Securities Committee. The Fund Director's Guidebook: Third Edition (Fund Director's Guidebook). – М.: , 2006. – 128 с.
  27. Bruce Schneier. Schneier on Security. – М.: , 2008. – 336 с.
  28. Meridian Securities Market. World Stock Exchange Fact Book. – М.: , 2008. – 0 с.
  29. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с.
  30. John Rittinghouse, James Ransome. Cloud Computing: Implementation, Management, and Security. – М.: CRC Press, 2009. – 340 с.
  31. Andy Jones. Risk Management for Computer Security. – М.: , 2010. – 296 с.
  32. Jackie Sherman. Basic Computer Skills Made Simple XP Version. – М.: , 2010. – 160 с.
  33. A. S. Troelstra, H. Schwichtenberg, C. J. van Rijsbergen, Anne S. Troelstra. Basic Proof Theory (Cambridge Tracts in Theoretical Computer Science). – М.: , 0. – 0 с.
  34. Toni Lee Hebda, Patricia Czar. Handbook of Informatics for Nurses and Healthcare Professionals (4th Edition). – М.: , 2008. – 576 с.
  35. Bryan Pfaffenberger. Webster?s New WorldTM Computer Dictionary. – М.: , 2003. – 432 с.
  36. Kevin D. Mitnick. The Art of Intrusion. – М.: , 2005. – 270 с.
  37. iSafe. i–SAFE Internet Life Skills Activities. – М.: , 2010. – 160 с.
  38. T. Bradley. Essential Computer Security: Everyone's Guide to Email, Internet, andWireless Security. – М.: , 2010. – 0 с.
  39. Tony Flick, Justin Morehouse. Securing the Smart Grid: Next Generation Power Grid Security. – М.: Рид Элсивер, 2011. – 320 с.
  40. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с.
  41. John R. Vacca. Computer and Information Security Handbook. – М.: , 2010. – 928 с.
  42. John M. Carroll. Computer Security. – М.: , 2010. – 648 с.
  43. Bernd Michael Rode. The Basics of Theoretical and Computational Chemistry. – М.: , 2007. – 195 с.
  44. John Castek. Structured BASIC Programming on IBM Personal Computers. – М.: , 1988. – 688 с.
  45. Alan G. Konheim. Computer Security and Cryptography. – М.: , 1972. – 0 с.
  46. Joseph Hu. Basics of Mortgage–Backed Securities. – М.: , 2001. – 184 с.
  47. Computer Security Handbook. – М.: , 2002. – 1224 с.
  48. J V Lombardi. Computer Literacy – Basic Concepts & Language. – М.: , 1983. – 128 с.
  49. MJ COMPUTER. Ball Data Processing In Medicine: How To Select A Computerized Hospital Information Systm. – М.: , 1973. – 0 с.
  50. W BASIC. Riss Basic Thalamic Structure And Function – Ppr O Nly. – М.: , 1973. – 0 с.
  51. Dieter Gollmann. Computer Security. – М.: , 1998. – 336 с.
  52. A ARA. Mansour: Computer ?programming? With Basic (pr Only) (printed In Arabic). – М.: , 1986. – 332 с.
  53. Thomas C. Bartee. BASIC Computer Programming. – М.: , 1985. – 380 с.
  54. Nancy Stern. Computing With End–User Applications and BASIC. – М.: , 1991. – 0 с.
  55. Nancy Stern. Computing With End–User Applications and BASIC. – М.: , 1991. – 0 с.
  56. Nancy Stern. Computing With End–User Applications and BASIC. – М.: , 1991. – 0 с.
  57. Nancy Stern. Computing With End–User Applications and BASIC. – М.: , 1991. – 0 с.
  58. Nancy Stern. Computing With End–User Applications and BASIC. – М.: , 1991. – 0 с.
  59. Nancy Stern. Computing With End–User Applications and BASIC. – М.: , 1991. – 0 с.
  60. Nancy Stern. Computing With End–User Applications and BASIC. – М.: , 1991. – 0 с.
  61. Nancy Stern. Computing With End–User Applications and BASIC. – М.: , 1991. – 0 с.
  62. Nancy Stern. Computing With End–User Applications and BASIC. – М.: , 1991. – 0 с.
  63. Nancy Stern. Computing With End–User Applications and BASIC. – М.: , 1991. – 0 с.
  64. NS RAO. Rao ?computer? Aided Design Of Plasticating Screws – Programs In Fortran & Basic. – М.: , 1986. – 134 с.
  65. Edward Zimmerman. Basic Surveying Computations. – М.: , 1996. – 250 с.
  66. CA TM. Simple Computer Security. – М.: , 2007. – 332 с.
  67. ED. Personal Computer Security. – М.: , 1996. – 360 с.
  68. RH BAKER. Baker ?computer Security? Handbook. – М.: , 1985. – 288 с.
  69. RA ADEY. Adey: Basic Computational Techniques For Engineers (paper). – М.: , 1983. – 220 с.
  70. RA ADEY. Adey: Basic Computational Techniques For Engineers (cloth). – М.: , 1983. – 220 с.
  71. Hutt. Computer Security Handbook, 3rd Edition, 2000 Cumu lative Supplement. – М.: , 2000. – 112 с.
  72. Deborah Russell. Computer Security Basics. – М.: , 1991. – 464 с.
  73. J HALL. Hall–sheehy: ?computer? Basics For Human Resource Professionals. – М.: , 1986. – 246 с.
  74. Computer Security Handbook. – М.: , 1995. – 1088 с.
  75. S MUFTIC. Muftic: ?security? Mechanisms For Computer Network S. – М.: , 1989. – 196 с.
  76. Ed Robinson. Security for Microsoft Visual Basic .NET. – М.: , 2003. – 416 с.
  77. R COMPUTERS. Dehaene Computers In Radiology. – М.: , 1971. – 0 с.
  78. Apple Computer. Learning Carbon. – М.: , 2001. – 360 с.
  79. KW DAVIS. Davis ?auditing? Computer Applications – A Basic Systematic Approach. – М.: , 1982. – 602 с.
  80. Apple Computer. Learning Cocoa. – М.: , 2001. – 384 с.
  81. J V Lombardi. Computer Literacy – Basic Concepts & Language (Paper). – М.: , 1983. – 128 с.
  82. L MCNITT. Mcnitt ?basic? Computer Simulation (paper Only). – М.: , 1983. – 0 с.
  83. COMPUTER. Computer School ?mastering? Multiplan Tm (paper On Ly). – М.: , 1984. – 0 с.
  84. Center for Professional Computer Education. Multimate ProfessionalTM. – М.: , 1986. – 240 с.
  85. Center for Professional Computer Education. DisplayWrite III. – М.: , 1987. – 224 с.
  86. Center for Professional Computer Education. WordStar®. – М.: , 1987. – 192 с.
  87. Center for Professional Computer Education. LOTUS 1–2–3 Quick Reference Handbook. – М.: , 1986. – 240 с.
  88. COMPUTER PART. Computer Partners: Handbook Of Cobol Techniques & Programming Standards 3ed (pr Only). – М.: , 1993. – 0 с.
  89. S. Rao Vallabhaneni. Auditing Computer Security. – М.: , 1989. – 368 с.
  90. D CHANCE. Chance 33 ?adult? Computer Games In Basic For The Ibm Pc R Appii R/iie R & Trs–80tm (pr Only). – М.: , 1983. – 0 с.
  91. Principles Of Computer Security, Comptia Security+ And Beyond, Second Edition. – М.: , 2011. – 0 с.
  92. Hacking Exposed, Sixth Edition. – М.: , 2011. – 720 с.
  93. Mike Meyers' Comptia A+ Guide: Practical Application, Third Edition (Exam 220-702). – М.: , 2011. – 0 с.
  94. Computer Security: 20 Things Every Employee Should Know. – М.: , 2011. – 0 с.
  95. Mike Meyers' Comptia A+ Guide: Practical Application Lab Manual, Third Edition (Exam 220-702). – М.: , 2011. – 320 с.
  96. Principles Of Computer Security Comptia Security+ And Beyond Lab Manual, Second Edition. – М.: , 2011. – 352 с.
  97. Eoghan Casey. Digital Evidence and Computer Crime. – М.: , . –  с.
  98. Inc. KT Solutions, KT Solutions has focused on what it takes to create efficient, professional multimedia training t KT Solutions specializes in the development of interactive multimedia training products for computer applications. Over the past decade. Beginning Windows NT Workstation 4.0 (Microsoft Windows NT). – М.: , . –  с.
  99. Inc. KT Solutions, KT Solutions has focused on what it takes to create efficient, professional multimedia training t KT Solutions specializes in the development of interactive multimedia training products for computer applications. Over the past decade. Advanced Word for Office 97 (Microsoft Word 97). – М.: , . –  с.
  100. Harry McIntosh. Starting with the Basics: Learn Computer Programming with Visual Basic. – М.: , . –  с.
  101. Dave Tyson. Security Convergence: Managing Enterprise Security Risk. – М.: , 2007. – 232 с.
  102. Ido Dubrawsky, Jeremy Faircloth, Michael Gregg, Eli Faskha. Security+ Study Guide. – М.: , 2007. – 864 с.
  103. Emily M. Harwood. Digital CCTV: A Security Professional's Guide. – М.: Butterworth-Heinemann, 2007. – 272 с.
  104. Tejbanta Singh Chingtham. A Computational Intelligence Paradigm. – М.: LAP Lambert Academic Publishing, 2010. – 60 с.
  105. Adamu Usman. Cost-Benefit Analysis of Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  106. Faraz Fatemi Moghaddam. Secure Cloud Computing with Client-Based Control System. – М.: LAP Lambert Academic Publishing, 2013. – 100 с.
  107. Ashit Kumar Dutta and Abdul Rahaman Wahab Sait. Computer Networks from Scratch. – М.: LAP Lambert Academic Publishing, 2013. – 324 с.
  108. Glenn Wilkinson. Identification of Hostile TCP Traffic using Support Vector Machines. – М.: LAP Lambert Academic Publishing, 2010. – 80 с.
  109. E.O. Ibidunmoye and B.K. Alese. Game-Theoretic Analysis of Network Attack-Defense Interactions. – М.: LAP Lambert Academic Publishing, 2013. – 108 с.
  110. Firkhan Ali Hamid Ali. Vulnerability Analysis on the Computer Network Security. – М.: LAP Lambert Academic Publishing, 2010. – 72 с.
  111. Saima Munawar. Detection and Classification Of Normal and Anomaly IP Packet. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  112. Ricardo Chaves. Secure Computing on Reconfigurable Systems. – М.: LAP Lambert Academic Publishing, 2010. – 212 с.
  113. Lamek Ronoh. Security Concern of Cloud Computing Models. – М.: LAP Lambert Academic Publishing, 2014. – 88 с.
  114. Arvind Maheshwari,Umesh Kumar Singh and Sumit Jain. Basic Computer Engineering. – М.: LAP Lambert Academic Publishing, 2012. – 376 с.
  115. Homam El-Taj and Omar Amer. Network Alert Management System For IDS False Positive Reduction. – М.: LAP Lambert Academic Publishing, 2013. – 156 с.
  116. Ondrej Vanek. Computational Methods for Transportation Security. – М.: LAP Lambert Academic Publishing, 2014. – 244 с.
  117. Akinbode Kayode. Computer operations. – М.: LAP Lambert Academic Publishing, 2011. – 72 с.
  118. Saad Ahmed Khan and Saif Ahmad. Security Implications of Cloud computing. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  119. Sadia Marium. Analysis of the Security threats to Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  120. A. S. N. Chakravarthy. Password Authentication Using Associative Memories. – М.: LAP Lambert Academic Publishing, 2012. – 188 с.
  121. Md. Rabiul Islam,Md. Fayzur Rahman and Faculty of Electrical-Computer Engineering RUET Rajshahi Bang. IMPROVEMENT OF NOISE ROBUST SPEAKER IDENTIFICATION. – М.: LAP Lambert Academic Publishing, 2010. – 88 с.
  122. Pallavali Radha Krishna Reddy and Gullapalli Sireesha. The Security Issues of Cloud Computing Over Normal & ITSector. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  123. Predrag Tasevski. Interactive Cyber Security Awareness Program. – М.: LAP Lambert Academic Publishing, 2012. – 184 с.
  124. Rupali Pathak. Recent Advances In Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  125. Crispen Erinos Bhukuvhani. Introductory Computing. – М.: LAP Lambert Academic Publishing, 2013. – 384 с.
  126. Oluwafemi Osho and Victor Waziri. Conceptual Models and Simulation of Computer Worm Propagation. – М.: LAP Lambert Academic Publishing, 2013. – 116 с.
  127. Hassen Alsafi and Mohammed Azhruddin. The Security Issues for Smart Grids Applications on Cloud Computing. – М.: LAP Lambert Academic Publishing, 2013. – 60 с.
  128. Shivan Fazil Sabr. Cloud Computing Security. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  129. Chandra Umesh. A Hand Book on Computer Basics. – М.: LAP Lambert Academic Publishing, 2012. – 244 с.
  130. Meysam Namayandeh. Development of Computer Ethical Framework for Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 132 с.
  131. Harjot Dhawan. A Road to Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  132. Stephen Murove,S. B. Mangena and B. Jones. Firewall Evaluation:Models for Major Decisions in Computer Security. – М.: LAP Lambert Academic Publishing, 2014. – 236 с.
  133. Mafaz M. K. Al-Anezi and Najla B. I. Al-Dabagh. Multilayer Artificial Immune Systems for Intrusion & Malware Detection. – М.: LAP Lambert Academic Publishing, 2012. – 148 с.
  134. Aftab Yaseen,S. M. Zakariya and M. Q. Rafiq. Association Rules Mining for AIS based Classification. – М.: LAP Lambert Academic Publishing, 2013. – 100 с.
  135. Irfan Syamsuddin. Guidelines for Computer Forensics Investigations in Developing Country. – М.: LAP Lambert Academic Publishing, 2011. – 104 с.
  136. Muhammad Imran Tariq. SLA based Information Security Metrics in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2014. – 192 с.
  137. Khanyisa Malufu. E-Banking Security. – М.: LAP Lambert Academic Publishing, 2013. – 112 с.
  138. Dilan Aksoy and Hidayet Takc?. Character Level Authorship Attribution of Turkish Texts. – М.: LAP Lambert Academic Publishing, 2012. – 56 с.
  139. M. Moses Antony Rajendran. Business Data Processing and BASIC Language. – М.: , 2012. – 240 с.
  140. Guy Kawasaki. Art of the Start 2.0: The Time-Tested, Battle-Hardened Guide for Anyone Starting Anything. – М.: Portfolio Penguin, 2015. – 346 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

Ничего не найдено

Образцы работ

Тема и предметТип и объем работы
Эксель
Информатика
Курсовая работа
54 стр.
Последствия операции НАТО
Политология
Диплом
80 стр.
Платежные системы в Интернете
Информатика
Диплом
102 стр.
Роль ОБСЕ в урегулировании конфликтов в Европе
Политология
Курсовая работа
33 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Валентина, 18.03
Хочу сказать вам огромное спасибо за помощь в написании диплома! Диплом я защитила, все хорошо.