Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Jie Lu, Lakhmi C Jain, Guangquan Zhang. Handbook on Decision Making: Vol 2: Risk Management in Decision Making (Intelligent Systems Reference Library). – М.: , 2012. – 472 с.
  2. Ann Poe. The McGraw-Hill Handbook of More Business Letters. – М.: , 0. – 0 с.
  3. Handbook of Management Information Systems. – М.: , 0. – 0 с.
  4. John M. D. Hunter. An Information Security Handbook (Computer Communications and Networks). – М.: , 0. – 0 с.
  5. Gerald L. Kovacich, Edward P. Halibozek. The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, First Edition. – М.: , 0. – 0 с.
  6. Handbook on Information Technology in Finance (International Handbooks on Information Systems). – М.: , 2008. – 800 с.
  7. Handbook of Information and Communication Security. – М.: , 2010. – 800 с.
  8. John R. Vacca. Computer and Information Security Handbook. – М.: , 2010. – 928 с.
  9. Oracle Soa Suite 11G Handbook. – М.: , 2011. – 800 с.
  10. Ido Dubrawsky. How to Cheat at Securing Your Network. – М.: Syngress, 2007. – 432 с.

Дополнительные результаты

  1. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с.
  2. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с.
  3. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 515 с.
  4. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  5. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с.
  6. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с.
  7. Constance S. Hawke, Constance S. Hawke. Computer and Internet Use on Campus: A Legal Guide to Issues of Intellectual Property, Free Speech, and Privacy. – М.: , 0. – 0 с.
  8. Abdullah Abdul-Gader, Abdullah H. Al-Abdul-Gader. Managing Computer Based Information Systems in Developing Countries: A Cultural Perspective. – М.: , 0. – 0 с.
  9. Joseph Migga Kizza, Joseph Kizza. Ethical and Social Issues in the Information Age. – М.: , 0. – 0 с.
  10. Tom Forester, Perry Morrison. Computer Ethics, Second Edition: Cautionary Tales and Ethical Dilemmas in Computing. – М.: , 0. – 0 с.
  11. Paul Voillis, Paul Viollis. Jane's Workplace Security Handbook. – М.: , 0. – 0 с.
  12. Gerald Kovacich. The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition. – М.: , 0. – 0 с.
  13. Ron Tepper. Model Letters and Memos : A Handbook for Scientists and Engineers. – М.: , 0. – 0 с.
  14. Ulric J., Jr. Gelinas, Steve G. Sutton, Jane Fedorowicz. Business Processes and Information Technology. – М.: , 0. – 0 с.
  15. Philip P. Purpura. The Security Handbook. – М.: , 0. – 0 с.
  16. Andy Jones, Gerald L. Kovacich, Perry G. Luzwick. Global Information Warfare: How Businesses, Governments, and Others Achieve Objectives and Attain Competitive Advantages. – М.: Auerbach Publications, 2002. – 684 с.
  17. Nikitas-Spiros Koutsoukis, Gautam Mitra. Decision Modelling and Information Systems: The Information Value Chain (Operations Research/Computer Science Interfaces Series). – М.: , 0. – 0 с.
  18. Frederick Betz. Executive Strategy : Strategic Management and Information Technology. – М.: , 0. – 0 с.
  19. Seymour Bosworth, Michel E. Kabay. Computer Security Handbook. – М.: , 0. – 0 с.
  20. Peter Checkland, Sue Holwell. Information, Systems and Information Systems - making sense of the field. – М.: , 0. – 0 с.
  21. Mark B. Desman. Building an Information Security Awareness Program. – М.: , 0. – 0 с.
  22. John M. D. Hunter. An Information Security Handbook (Computer Communications and Networks). – М.: , 0. – 0 с.
  23. Gerald L. Kovacich, Edward P. Halibozek. The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, First Edition. – М.: , 0. – 0 с.
  24. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с.
  25. Marko Nordquist. Towards Improved Security Management Practice: Designing an Organizational Model Procedure for the Implementation of Information Security Management in Heterogeneous Information Management. – М.: , 0. – 0 с.
  26. Information Services for Innovative Organizations (Library and Information Science). – М.: , 0. – 0 с.
  27. Steve Purser. A Practical Guide to Managing Information Security (Artech House Technology Management Library). – М.: , 0. – 0 с.
  28. Risk Analysis and the Security Survey. – М.: , 0. – 0 с.
  29. Darlene E. Weingand. Marketing/Planning Library and Information Services:. – М.: , 0. – 0 с.
  30. British Library, Ian Stewart, Alan Gomersall, British Library Science Reference and Information Service Market Rese. Market Research: A Guide to British Library Collections. – М.: , 0. – 0 с.
  31. Alan Gershenfeld, Mark Loparco, Cecilia Barajas. Game Plan: The Insider's Guide to Breaking In and Succeeding in the Computer and Video Game Business. – М.: , 0. – 0 с.
  32. Marian Quigley, Marian Quiqley. Information Security and Ethics: Social and Organizational Issues. – М.: , 0. – 0 с.
  33. Ifip Tc6, Tc11 Joint Working Conference on Communications and Multimedi, Tomaz Klobucar. Advanced Communications and Multimedia Security: Ifip Tc6/Tc11 Sixth Joint Working Conference on Communications and Multimedia Security, September 26-27, 2002, Portoroz, Slovenia (International Federation for Information Processing, 100). – М.: , 0. – 0 с.
  34. C. Warren Axelrod, Axelrod. Outsourcing Information Security. – М.: , 0. – 0 с.
  35. Harold F. Tipton, Micki Krause, Micki, Cissp Krause. Information Security Management Handbook, Fifth Edition. – М.: , 0. – 0 с.
  36. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с.
  37. Christopher Meyer. It's Alive : The Coming Convergence of Information, Biology, and Business. – М.: , 2003. – 0 с.
  38. Thomas C. Glaessner. Electronic Safety and Soundness: Securing Finance in a New Age (World Bank Working Papers). – М.: , 2004. – 0 с.
  39. Peter R., MBA Ramsaroop. Securing Business Intelligence: Knowledge and CyberSecurity in the Post 9/11 World. – М.: , 2004. – 0 с.
  40. Economics of Information Security (Advances in Information Security). – М.: , 2004. – 0 с.
  41. Sari Greene. Security Policies and Procedures : Principles and Practices (Security). – М.: , 2005. – 0 с.
  42. Lech Janczewski. Managerial Guide for Handling Cyber-Terrorism and Information Warfare. – М.: , 2005. – 0 с.
  43. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с.
  44. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с.
  45. Robert A. Schultz. Contemporary Issues in Ethics and Information Technology. – М.: , 2005. – 0 с.
  46. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с.
  47. Ira Winkler. Zen and the Art of Information Security. – М.: , 2007. – 192 с.
  48. Timothy P. Layton. Information Security. – М.: , 2006. – 222 с.
  49. Michael E. Whitman, Herbert J. Mattord. Principles of Information Security, Second Edition. – М.: , 2004. – 600 с.
  50. Kenneth K. Humphreys. Project and Cost Engineers' Handbook, Fourth Edition (Cost Engineering). – М.: , 2004. – 360 с.
  51. Dipak Laha & Purnendu Mandal. Handbook of Computational Intelligence in Manufacturing and Production Management. – М.: Idea Group Reference, 2007. – 516 с.
  52. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с.
  53. Kathleen de la Pena McCook. Opportunities in Library and Information Science (Opportunities in). – М.: , 2008. – 160 с.
  54. Ibp Usa. Thailand Army, National Security And Defense Policy Handbook. – М.: , 2008. – 300 с.
  55. Ibp Usa. Turkey Army, National Security And Defense Policy Handbook (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с.
  56. Ibp Usa. Ukraine Army, National Security And Defense Policy Handbook (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с.
  57. Ibp Usa. Denmark Government and Business Contacts Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  58. Ibp Usa. Belgium Justice System and National Police Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  59. Ibp Usa. CZECH REPUBLIC ARMY, NATIONAL SECURITY AND DEFENSE POLICY HANDBOOK (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с.
  60. Ibp Usa. ESTONIA ARMY, NATIONAL SECURITY AND DEFENSE POLICY HANDBOOK (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с.
  61. Ibp Usa. Finland Army, National Security And Defense Policy Handbook (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с.
  62. Ibp Usa. Germany Army, National Security And Defense Policy Handbook (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с.
  63. Ibp Usa. China Army, National Security and Defense Policy Handbook. – М.: , 2008. – 300 с.
  64. Ibp Usa. Cuba Army, National Security And Defense Policy Handbook (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с.
  65. Ibp Usa. US Securities and Exchange Commission Handbook. – М.: , 2008. – 300 с.
  66. Ibp Usa. Myanmar Army, National Security And Defense Policy Handbook. – М.: , 2008. – 300 с.
  67. Ibp Usa. Philippines Army National Security and Defense Policy Handbook. – М.: , 2008. – 300 с.
  68. Ibp Usa. Global National Security and Intelligence Agencies Handbook. – М.: , 2008. – 300 с.
  69. Ibp Usa. Germany Army, National Security and Defense Policy Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  70. Ibp Usa. Australia Army, National Security and Defense Policy Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  71. Ibp Usa. Australia Aviation and Aerospace Industry Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  72. Ibp Usa. Australia Government and Business Contacts Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  73. Ibp Usa. Australia Justice System and National Police Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  74. Ibp Usa. Austria Aviation and Aerospace Industry Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  75. Ibp Usa. Austria Justice System and National Police Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  76. Ibp Usa. Azerbaijan Government and Business Contacts Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  77. Ibp Usa. Bangladesh Army, National Security and Defense Policy Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  78. Ibp Usa. Bangladesh Government and Business Contacts Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  79. Ibp Usa. Bangladesh Justice System and National Police Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  80. Ibp Usa. France Middle East & Arabic Countries Economic and Political Relations Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  81. Ibp Usa. France US Economic and Political Relations Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  82. Ibp Usa. Germany Aviation and Aerospace Industry Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  83. Ibp Usa. Germany Government and Business Contacts Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  84. Ibp Usa. Germany Justice System and National Police Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  85. Ibp Usa. Ghana Banking and Financial Sector Business and Investment Opportunities Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  86. Ibp Usa. Global Business Lawyer Associations and Arbitration Centers Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  87. Ibp Usa. Global Customs Laws and Trade Regulations Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  88. Ibp Usa. Global Foreign Trade Barriers to the US Products and Services Exports Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  89. Ibp Usa. Arab Authority for Agricultural Investment and Development (AAAID) Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  90. Ibp Usa. Arab Fund for Economic and Social Development Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  91. Ibp Usa. Arab Gulf Business and Development Programs Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  92. Ibp Usa. Argentina Government and Business Contacts Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  93. Ibp Usa. Costa Rica Ecological and Nature Protection Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  94. Ibp Usa. Costa Rica Government and Business Contacts Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  95. Ibp Usa. Cuba Army Defense Policy and National Security Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  96. Ibp Usa. Czech Republic Army, National Security and Defense Policy Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  97. Ibp Usa. Finland Army, National Security and Defense Policy Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  98. Ibp Usa. France Army, National Security and Defense Policy Handbook (World Business Information Catalog). – М.: , 2008. – 300 с.
  99. Ibp Usa. Estonia Army, National Security and Defense Policy Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  100. Social and Human Elements of Information Security: Emerging Trends and Countermeasures (Premier Reference Source). – М.: , 2008. – 412 с.
  101. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с.
  102. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с.
  103. Gerard Blokdijk, Ivanka Menken. Information Security Management Best Practice Workbook: Implementation and Management Roadmap for Threats, Challenges and Solutions - Ready to use supporting documents bringing Theory into Practice. – М.: , 2008. – 124 с.
  104. W. Krag Brotby. Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement. – М.: Auerbach Publications, 2009. – 200 с.
  105. Bel G. Raggad. Information Security Management: Concepts and Practice. – М.: , 2010. – 871 с.
  106. Michael E. Whitman, Herbert J. Mattord. Management of Information Security. – М.: , 2010. – 592 с.
  107. Jon Marks. Check Your English Vocabulary for Computers and Information Technology. – М.: Bloomsbury Publishing PLC, 2012. – 80 с.
  108. Editors Karl Maria Michael de Leeuw, Jan Bergstra. The History of Information Security: A Comprehensive Handbook. – М.: Elsevier Science, 2007. – 900 с.
  109. Handbook of Information and Communication Security. – М.: , 2010. – 800 с.
  110. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с.
  111. John R. Vacca. Computer and Information Security Handbook. – М.: , 2010. – 928 с.
  112. Computer Security Handbook. – М.: , 2002. – 1224 с.
  113. Robert A. Stern. An Introduction to Computers and Information Processing. – М.: , 1985. – 168 с.
  114. RA STERN. Stern Introduction To Computers And ?information? Processing 2ed. – М.: , 1984. – 738 с.
  115. RH BAKER. Baker ?computer Security? Handbook. – М.: , 1985. – 288 с.
  116. Hutt. Computer Security Handbook, 3rd Edition, 2000 Cumu lative Supplement. – М.: , 2000. – 112 с.
  117. Computer Security Handbook. – М.: , 1995. – 1088 с.
  118. Principles Of Computer Security, Comptia Security+ And Beyond, Second Edition. – М.: , 2011. – 0 с.
  119. Harold F. Tipton, Micki Krause. Information Security Management Handbook on CD-ROM, 2003 Edition. – М.: , . –  с.
  120. Prof Lucy Lynn Maliwichi,Prof Peter BIkam and Dovhani Johannes Mulaudzi. Energy Needs and Food Security in Mutale Municipality, South Africa. – М.: LAP Lambert Academic Publishing, 2011. – 76 с.
  121. Mohd. Hudzari Haji Razali,Wan Ishak Wan Ismail and Noordin Asimi Mohd Noor. Computer and Electronic in Agriculture: Farm Mechanization Essentials. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  122. Ishrat Fatima,Badar Naseem Siddiqui and Kanwal Naeem. Rural Youth and Food Security. – М.: LAP Lambert Academic Publishing, 2014. – 112 с.
  123. T. Bezboruah and R. Gogoi. Information storage and retrieval systems. – М.: LAP Lambert Academic Publishing, 2011. – 120 с.
  124. Anju Lis Kurian and C. Vinodan. Regional Integration and Energy Security:The European Union Experience. – М.: LAP Lambert Academic Publishing, 2014. – 268 с.
  125. Dilip Kumar Gayen,Jitendra Nath Roy and Rajat Kumar Pal. Optics in Computing. – М.: LAP Lambert Academic Publishing, 2012. – 192 с.
  126. Mah-e-Bushra Asghar and Rubina Bhatti. Marketing of Library and Information Services and Products. – М.: LAP Lambert Academic Publishing, 2012. – 124 с.
  127. Nateq Be-Nazir Ibn Minar. Bluetooth Networking and its Security Architecture. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  128. Nadire Cavus and Mustafa Asaad Alani. Cloud computing and its adaptation. – М.: LAP Lambert Academic Publishing, 2014. – 80 с.
  129. Yedji Mbangsoua and Dr. Freddie Acosta. Information Security and its Investment Justification. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  130. Yasser Alshehri. Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 156 с.
  131. Manoj Kumar Verma and U. N. Singh. Impact of Internet on Library and Information Services of IITs. – М.: LAP Lambert Academic Publishing, 2012. – 164 с.
  132. Furhan Mehmood and Rajia Rafique. Information Security in Financial Organizations. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  133. frankie tvrz and marijke coetzee. Information Security of a Bluetooth-enabled handheld device. – М.: LAP Lambert Academic Publishing, 2010. – 180 с.
  134. Meysam Namayandeh. Development of Computer Ethical Framework for Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 132 с.
  135. Muhammad Imran Tariq. SLA based Information Security Metrics in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2014. – 192 с.
  136. Mela Ali and Loay George. A Spatial Invarient Model for Local Attributes of Fingerprint Ridges. – М.: LAP Lambert Academic Publishing, 2013. – 152 с.
  137. Gurpreet Kaur and Parvinder Singh Baweja. Dental Informatics. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  138. Alaa Al-Deen Mohammed Hassan. Information Security Management. – М.: LAP Lambert Academic Publishing, 2013. – 188 с.
  139. Jun Zheng,Jiantao Gu and Hong Wang. Financial Management and Information Security of Independent Colleges. – М.: LAP Lambert Academic Publishing, 2014. – 256 с.
  140. Ying Qian. Mitigating Information Security Risks during Operation Transition. – М.: LAP Lambert Academic Publishing, 2012. – 372 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Наука человековедения. интервью с Д. Уолтоном, профессором London Metropolitan University, экспертом CIPD. Chartered Institute of Personnel and Development, автором программы Master of Arts in Human Resource Strategies. И. Смирнова, "Кадровый менеджмент", № 5, июль-август 2007.
  2. Специализированный модуль FS-CD. Collections and Disbursements - "Сборы и Выплаты" и его возможности. О.А. Глущенко, "Финансовый менеджмент в страховой компании", № 2, II квартал 2007.
  3. Бюджетирование страховой компании на базе Oracle Enterprise Planning and Budgeting. Д.В. Лесоводский, "Финансовый менеджмент в страховой компании", № 3, III квартал 2006.
  4. Регулирование операций торгового финансирования: новые инициативы. интервью с Д. Шмандом, вице-председателем Банковской комиссии ICC по supply chain finance, главой подразделения Trade Finance and Cash Management Corporates EMEA в Global Transaction Banking. GTB division Deutsche Bank. Н. Макарова, "Международные банковские операции", N 2, апрель-июнь 2012 г.
  5. О качестве сервиса, связанного с запросами на медицинскую информацию. Medical Information Service?. А. Беденков, "Ремедиум", № 1, январь 2012.
  6. Ужин в темноте в стиле Малевича и Новый год в Хаммере". Что может выть лучше?". интервью с Н. Саниной, индивидуальным предпринимателем и креативным директором компании "San and stars". М. Сипатова, "Арсенал предпринимателя", N 12, декабрь 2011 г.
  7. На пути к новому стандарту в торговом финансировании. интервью с А.  Кастерманом, руководителем Trade and Supply Chain, SWIFT, сопредседателем рабочей группы ICC-BPO. Э. Шакирова, "Международные банковские операции", N 4, октябрь-декабрь 2011 г.
  8. Уильям Савадж: Мотивировать людей в Нижнем Новгороде и Новосибирске нужно по-разному". интервью с У. Саваджем, вице-президентом корпорации Intel, подразделение Software and Services Group. М. Холкина, "Управление персоналом", N 14, июль 2010 г.
  9. Цены под контролем: the present and the future. С. Стройкова, И. Леметюйнен, "Консультант", № 19, сентябрь 2009.

Образцы работ

Тема и предметТип и объем работы
Специализация учреждений ООН: правовая характеристика, привелегии и иммунитет
Международная экономика
Реферат
19 стр.
Лингвистика
Лингвистика
Диплом
69 стр.
Последствия операции НАТО
Политология
Диплом
80 стр.
Математические модели океанических течений
Переводоведение (теория перевода)
Курсовая работа
42 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Kate
Марин, спасибо Вам огромное за Вашу работу! Защитилась на 5!)