Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. George Mohay, Alison Anderson, Byron Collie, Olivier de Vel, Rod McKemmish. Computer and Intrusion Forensics (Artech House Computer Security Series). – М.: , 0. – 0 с.

Дополнительные результаты

  1. Public Key Infrastructures, Services and Applications: 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected ... Computer Science / Security and Cryptology). – М.: , 2012. – 219 с.
  2. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с.
  3. Terrell Ward Bynum, Simon Rogerson, Blackwell Pub. Computer Ethics and Professional Responsibility: Introductory Text and Readings. – М.: , 0. – 0 с.
  4. Jennifer A. Manner. Spectrum Wars: The Policy and Technology Debate (Artech House Telecommunications Library). – М.: , 0. – 0 с.
  5. NATO Advanced Research Workshop on Science for Reduction of Risk and s, Alik Ismail-Zadeh. Risk Science and Sustainability: Science for Reduction of Risk and Sustainable Development for Society (NATO SCIENCE SERIES II MATHEMATICS, PHYSICS AND CHEMISTRY). – М.: , 0. – 0 с.
  6. Garry A. Garrard, Garry Gerrard. Cellular Communications: Worldwide Market Development (Artech House Mobile Communications Series). – М.: , 0. – 0 с.
  7. Seymour Bosworth, Michel E. Kabay. Computer Security Handbook. – М.: , 0. – 0 с.
  8. Guy V. Tozer, Guy Tozer. Metadata Management for Information Control and Business Success (Artech House Computing Library). – М.: , 0. – 0 с.
  9. Richard Hunter. World Without Secrets: Business, Crime and Privacy in the Age of Ubiquitous Computing. – М.: , 0. – 0 с.
  10. Steve Purser. A Practical Guide to Managing Information Security (Artech House Technology Management Library). – М.: , 0. – 0 с.
  11. Computer Security. – М.: , 0. – 0 с.
  12. George Mohay, Alison Anderson, Byron Collie, Olivier de Vel, Rod McKemmish. Computer and Intrusion Forensics (Artech House Computer Security Series). – М.: , 0. – 0 с.
  13. Vesna Hassler. Security Fundamentals for E-Commerce (Artech House Computer Security Series). – М.: , 0. – 0 с.
  14. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с.
  15. Amit Mitra. Agile Systems With Reusable Patterns of Business Knowledge: A Component-Based Approach (Artech House Computing Library). – М.: , 2005. – 416 с.
  16. Internet and Network Economics: First International Workshop, WINE 2005, Hong Kong, China, December 15-17, 2005, Proceedings (Lecture Notes in Computer Science). – М.: , 2006. – 1106 с.
  17. David L. Adamy. Ew 103: Communications Electronic Warfare. – М.: , 2009. – 175 с.
  18. Andy Jones. Risk Management for Computer Security. – М.: , 2010. – 296 с.
  19. John and Liz Soars. New Headway English Course. Pre-Intermediate. Student's Book. – М.: Oxford University Press, 2004. – 144 с.
  20. John and Liz Soars. New Headway English Course. Pre-Intermediate. Workbook with key. – М.: Oxford University Press, 2000. – 96 с.
  21. Tim Falla, Liz and John Soars. New Headway English Course. Beginner. Workbook without Key. – М.: Oxford University Press, 2002. – 84 с.
  22. Liz and John Soars. New Headway English Course: Elementary: Student's Book. – М.: Oxford University Press, 2007. – 144 с.
  23. Liz and John Soars. New Headway English Course. – М.: Oxford University Press, 2007. – 96 с.
  24. Molecular Imaging: Computer Reconstruction and Practice (NATO Science for Peace and Security Series B: Physics and Biophysics). – М.: , 2008. – 288 с.
  25. V. M. Buchstaber and I. M. Krichever. Geometry, Topology, and Mathematical Physics (American Mathematical Society Translations Series 2). – М.: , 2008. – 284 с.
  26. Wing Kam Fung, Yue-Qing Hu. Statistical DNA Forensics: Theory, Methods and Computation. – М.: Wiley, 2008. – 262 с.
  27. Jack Wiles. The Best Damn Cybercrime and Digital Forensics Book Period. – М.: , 2010. – 736 с.
  28. Chris Pogue. UNIX and Linux Forensic Analysis DVD Toolkit. – М.: , 2010. – 248 с.
  29. Paul Crowley. CD and DVD Forensics. – М.: , 2010. – 320 с.
  30. T. Bradley. Essential Computer Security: Everyone's Guide to Email, Internet, andWireless Security. – М.: , 2010. – 0 с.
  31. Jesse Varsalone. Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit. – М.: , 2010. – 576 с.
  32. Dale Liu. Cisco Router and Switch Forensics. – М.: , 2010. – 528 с.
  33. John M. Carroll. Computer Security. – М.: , 2010. – 648 с.
  34. Oliver Arnold. The Third Citizen – Shakespeare?s Theater and the Early Modern House of Commons. – М.: , 2007. – 296 с.
  35. Alan G. Konheim. Computer Security and Cryptography. – М.: , 1972. – 0 с.
  36. Computer Security Handbook. – М.: , 2002. – 1224 с.
  37. Matthew G Kirschenbaum. Mechanisms – New Media and the Forensic Imagination. – М.: , 2008. – 316 с.
  38. Ian Hurd. After Anarchy – Legitimacy And Power in the United Nations Security Council. – М.: , 2008. – 240 с.
  39. Dieter Gollmann. Computer Security. – М.: , 1998. – 336 с.
  40. CA TM. Simple Computer Security. – М.: , 2007. – 332 с.
  41. ED. Personal Computer Security. – М.: , 1996. – 360 с.
  42. RH BAKER. Baker ?computer Security? Handbook. – М.: , 1985. – 288 с.
  43. Hutt. Computer Security Handbook, 3rd Edition, 2000 Cumu lative Supplement. – М.: , 2000. – 112 с.
  44. Deborah Russell. Computer Security Basics. – М.: , 1991. – 464 с.
  45. Handbook of Couple and Family Forensics. – М.: , 1999. – 554 с.
  46. Computer Security Handbook. – М.: , 1995. – 1088 с.
  47. Edited by Andrew Bainham, Bridget Lindley, Martin Richards, and Liz Trinder. Children and Their Families. – М.: , 2011. – 430 с.
  48. S. Rao Vallabhaneni. Auditing Computer Security. – М.: , 1989. – 368 с.
  49. Principles Of Computer Security, Comptia Security+ And Beyond, Second Edition. – М.: , 2011. – 0 с.
  50. Principles Of Computer Security Comptia Security+ And Beyond Lab Manual, Second Edition. – М.: , 2011. – 352 с.
  51. Eoghan Casey. Digital Evidence and Computer Crime. – М.: , . –  с.
  52. Ann Temkin and Nora Lawrence. Claude Monet: Water Lilies. – М.: The Museum of Modern Art, 2009. – 58 с.
  53. Steve Zaffron and Dave Logan. The Three Laws of Performance: Rewriting the Future of Your Organization and Your Life (J-B Warren Bennis Series). – М.: , 2012. – 312 с.
  54. Rupert Barrington and Mike Gunton. Life Story: Many Lives one Epic Journey. – М.: BBC Books, 2014. – 288 с.
  55. John and Liz Soars, Mike Sayer. New Headway English Course: Pre-Intermediate: Teacher's Book. – М.: Oxford University Press, 2000. – 160 с.
  56. Abhishek Roy,Sunil Karforma and Subhadeep Banik. Implementation Of Authentication In E-Governance–an Uml Based Approach. – М.: LAP Lambert Academic Publishing, 2013. – 116 с.
  57. Rajani Sharma and Rajender Trivedi. Data Security in a Cloud Environment using Multilevel UEC. – М.: LAP Lambert Academic Publishing, 2014. – 84 с.
  58. Govind Sharma and Manish Gupta. Secure routing in wireless mobile Ad-Hoc network. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  59. Haroon Rashid and Mamoon Rashid. Telephone Activated Remote Access Switch. – М.: LAP Lambert Academic Publishing, 2013. – 96 с.
  60. Rashi Kohli and Manoj Kumar. Cryptographic on System-Chip-Design Using VLSI Technique. – М.: LAP Lambert Academic Publishing, 2013. – 92 с.
  61. Rameez Asif and Bushra Nawaz. Impact of Polarization Mode Dispersion and Non-linear Effects. – М.: LAP Lambert Academic Publishing, 2013. – 64 с.
  62. Martin Simka and Milos Drutarovsky. Selected Blocks for Public-Key Cryptosystems in FPGAs. – М.: LAP Lambert Academic Publishing, 2012. – 192 с.
  63. Shailendra Kumar Shukla,Atul Dwivedi and Ali Abdulruda Farhan. Passive building designs & cfd Applications. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  64. Shweta Mukherjee,P.K. Purohit and A.K. Gwal. Ionospheric study of Equatorial Anomaly Station. – М.: LAP Lambert Academic Publishing, 2012. – 168 с.
  65. Mohamed Youshah Shameel Mecca and Tirumala Rao Kothaluru. Evaluation of EAP Authentication Methods. – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  66. Soumyendra Kishore Datta and Ruma Kundu. Sustainable Development of Inland Capture and Culture Fisheries. – М.: LAP Lambert Academic Publishing, 2010. – 120 с.
  67. Jane Situma,Jeremiah Okello and Lucy Mutuli. Health And Nutrition Status Of Preschool Children. – М.: LAP Lambert Academic Publishing, 2013. – 152 с.
  68. Baby Viruthakkaparambil Ouseph and Kozaliparambil Andrews Stephanson. An Evaluation of Community Housing Project in Kerala. – М.: LAP Lambert Academic Publishing, 2014. – 376 с.
  69. Muhammad Rafique and Bilal Shafique. Time Based Variability Observations in Indoor Radon Concentrations. – М.: LAP Lambert Academic Publishing, 2014. – 140 с.
  70. Yakubu Hunira Ngadda and Ita Okon B. Ewa. Monte Carlo Techniques in Gamma ray Transport. – М.: LAP Lambert Academic Publishing, 2012. – 252 с.
  71. Anshika Pandey,Shubhra Tiwari and Shailesh Jadhav. Green Gold Mine "Azolla". – М.: LAP Lambert Academic Publishing, 2014. – 100 с.
  72. Yishak Gecho and Abrham Shumbulo. The production Status and Roles of ‘Enset’ for Livelihood Security. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  73. Tanmoy Gon Choudhury,Manik Datta and Pampa Bhattacharjee. Fisheries Resources of India. – М.: LAP Lambert Academic Publishing, 2013. – 124 с.
  74. Ajit Kumar Paswan and Rakesh Kumar. Efficacy of separate and premix formulation of herbicides on weeds. – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  75. Geetha Matheswaran,Umamageswari Maruthanayagam and Dhara Rajendran. A Business Analysis of Turmeric Market in Tamil Nadu. – М.: LAP Lambert Academic Publishing, 2014. – 100 с.
  76. Manisha Pant and Sanjai Kumar Srivastava. Major Traditional Crops of the Hills: Economics & Technology Status. – М.: LAP Lambert Academic Publishing, 2012. – 148 с.
  77. Rooba Hasan,Virendra Singh and H. P. Singh. Rice Cultivation in Hills of Uttarakhand(India). – М.: LAP Lambert Academic Publishing, 2012. – 72 с.
  78. Nisreen H. Karam,Jumbad H. Tomma and Ammar H. Al-Dujaili. Liquid Crystals of 2,4-Substituted-1,3-Thiazole Derivatives. – М.: Scholars' Press, 2014. – 180 с.
  79. Jignesh Pandya,Paresh Oza and Sudhir Joshi. Coordination Chemistry Of Acylresorcinol. – М.: LAP Lambert Academic Publishing, 2014. – 64 с.
  80. Md. Swarup Hasnaine. Socio-Economic Condition and Rehabilitation Potential of Housing. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  81. Hasnah Md. Jais,Anis Safirah M Z and Sharifah Rabitah S H. Actinomycetes from Endau Rompin Forest Reserve Johor And Selected Soils of Malaysia. – М.: LAP Lambert Academic Publishing, 2010. – 80 с.
  82. Reena Gupta and Vikas Mahajan. Sustainable science for rural empowerment. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  83. Muhammad Shamoon,Muhammad Atif Randhawa and Muhammad Wasim Sajid. Assessment of AFM1 in Milk Collected from Different Dairy Farms. – М.: LAP Lambert Academic Publishing, 2014. – 128 с.
  84. Omarhan Berkinbay and Gulnar Shabdarbaeva. Bioresources of Kazakhstan: fauna. – М.: LAP Lambert Academic Publishing, 2015. – 500 с.
  85. Farzana Rashid,Hira Fatima and Nadia Sharif. Heavy metals detection in drinking water. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  86. Tatyana A. Makarenya,Yulia S. Bystraya and Svetlana V. Stash. Management Mechanisms in the Sphere of Housing and Municipal Services. – М.: LAP Lambert Academic Publishing, 2014. – 68 с.
  87. Muhammad Azfar Anwar and Saif ur Rehman. Defense Spending, National Security and Economic Growth of Pakistan. – М.: LAP Lambert Academic Publishing, 2012. – 128 с.
  88. Biljana Avramoska Gjoreska and Igor Gjoreski. Collective Security and Role of the New European Security Treaty. – М.: LAP Lambert Academic Publishing, 2015. – 84 с.
  89. Ayyaswamy Kathirvel,Srinivasan Rengaramanujam and Mohanambal Kathirvel. Prevention of attacks usign umpiring security model for manets. – М.: LAP Lambert Academic Publishing, 2012. – 192 с.
  90. Kamlendra S. Bhadoriya and Nitendra Kumar Sahu. In-Silico Screening of Potent Anticonvulsant Agents. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  91. Mukesh C. Sharma and Smita Sharma. Rational Drug Design of Substituted Analogues Angiotensin II Receptor. – М.: LAP Lambert Academic Publishing, 2014. – 100 с.
  92. Birupakhya Prasad Padhy,Umakanta Misra and Mahendra Misra. Summability Methods And Its Applications. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  93. Naheem Mahtab and Md. Nazmul Islam. Real Estate Investment In Bangladesh A Further Study. – М.: LAP Lambert Academic Publishing, 2015. – 60 с.
  94. Jasrit Pahal and Han Zao Li. Discourse Analysis of Resident-Patient Consultations. – М.: LAP Lambert Academic Publishing, 2011. – 124 с.
  95. Sarah Kiggundu and Haneem Hendricks. League of Nations. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  96. Shahnawaz Husain,S. C. Gupta and R. C. Joshi. Intrusion Detection Engine for Adhoc Environment. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  97. Yogesh Kumar,Krishan Kumar and Gulshan Kumar. Feature Selection For Intrusion Detection Systems. – М.: LAP Lambert Academic Publishing, 2014. – 100 с.
  98. Srikanth Hariharan,Ness B. Shroff and Saurabh Bagchi. Secure Neighbor Discovery in Wireless Networks. – М.: LAP Lambert Academic Publishing, 2011. – 52 с.
  99. K. Shaila and K. R. Venugopal. Secure Data Communication in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2014. – 240 с.
  100. R. Baskaran,M. S. Saleem Basha and A. Balasubramanian. Two Tier Security Framework for Service Oriented Systems. – М.: LAP Lambert Academic Publishing, 2012. – 176 с.
  101. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  102. E.O. Ibidunmoye and B.K. Alese. Game-Theoretic Analysis of Network Attack-Defense Interactions. – М.: LAP Lambert Academic Publishing, 2013. – 108 с.
  103. Manuj Mishra,Govind Sharma and Ram Pathak. Secure Routing In Wireless Mobile Ad Hoc Network. – М.: LAP Lambert Academic Publishing, 2014. – 84 с.
  104. Chaman Singh and Kishori Lal Bansal. NAT Traversal and Detection. – М.: LAP Lambert Academic Publishing, 2012. – 324 с.
  105. Navnath Nehe,Vishal Pande and Nandini Bhandari. RFID in Access Control System. – М.: LAP Lambert Academic Publishing, 2011. – 88 с.
  106. Natarajan Meghanathan,DeShante C. Johnson and Alexander R. Geoghegan. An Analysis of Software Security Attacks and Mitigation Controls. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  107. Mitko Bogdanoski,Aleksandar Risteski and Marjan Bogdanoski. Cyber operations - a permanent part of the global conflict. – М.: LAP Lambert Academic Publishing, 2014. – 60 с.
  108. Dimitrios Papadopoulos and Bernhard Hammerli. Positioning the roles, interfaces & processes in the InfoSec scene. – М.: LAP Lambert Academic Publishing, 2014. – 168 с.
  109. Homam El-Taj and Omar Amer. Network Alert Management System For IDS False Positive Reduction. – М.: LAP Lambert Academic Publishing, 2013. – 156 с.
  110. Manju Bala and R. K. Agrawal. Multiple Classifier Systems Analysis and Design. – М.: LAP Lambert Academic Publishing, 2012. – 128 с.
  111. Sultan H. Aljahdali and Mohd. Junedul Haque. Intelligent Approaches to Data Management. – М.: LAP Lambert Academic Publishing, 2013. – 116 с.
  112. Pallavali Radha Krishna Reddy and Gullapalli Sireesha. The Security Issues of Cloud Computing Over Normal & ITSector. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  113. Oluwafemi Osho and Victor Waziri. Conceptual Models and Simulation of Computer Worm Propagation. – М.: LAP Lambert Academic Publishing, 2013. – 116 с.
  114. Fatty Mustafa Salem,Maged Hamada Ibrahim and Ibrahim Ismail Ibrahim. Efficient and Secure Message Transmission in Vehicular Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  115. Stephen Murove,S. B. Mangena and B. Jones. Firewall Evaluation:Models for Major Decisions in Computer Security. – М.: LAP Lambert Academic Publishing, 2014. – 236 с.
  116. Mafaz M. K. Al-Anezi and Najla B. I. Al-Dabagh. Multilayer Artificial Immune Systems for Intrusion & Malware Detection. – М.: LAP Lambert Academic Publishing, 2012. – 148 с.
  117. Aftab Yaseen,S. M. Zakariya and M. Q. Rafiq. Association Rules Mining for AIS based Classification. – М.: LAP Lambert Academic Publishing, 2013. – 100 с.
  118. Irfan Syamsuddin. Guidelines for Computer Forensics Investigations in Developing Country. – М.: LAP Lambert Academic Publishing, 2011. – 104 с.
  119. Dilan Aksoy and Hidayet Takc?. Character Level Authorship Attribution of Turkish Texts. – М.: LAP Lambert Academic Publishing, 2012. – 56 с.
  120. Aminu Umaru and Anono Abdulrahman Zubairu. Unemployment and inflation relationship in Nigeria. – М.: LAP Lambert Academic Publishing, 2012. – 72 с.
  121. Kousik Guhathakurta,Basabi Bhattacharya and Asesh Roychowdhury. Examining Stock Markets : a non linear dynamics perspective. – М.: LAP Lambert Academic Publishing, 2012. – 272 с.
  122. Getachew Shambel and Chanyalew Seyum. Review of Food Security status and Cooping Mechanisms in Ethiopia. – М.: LAP Lambert Academic Publishing, 2011. – 360 с.
  123. Chepchumba Chumo and Timothy Sulo. Food Security Implications of Coco Yam Farming in Kenya. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  124. Alemu Worku and Fentahun Mengistu. Yield components of potato as influenced by seed storage duration. – М.: LAP Lambert Academic Publishing, 2013. – 96 с.
  125. Jegan Ganeshamoorthy and Volker Hoffmann. Assessment of Local Perception of Wealth and Poverty Dynamics. – М.: LAP Lambert Academic Publishing, 2011. – 160 с.
  126. Theivanayagam Janaki and Shahnaz Sultana. A Study on Corporate Social Responsibility at Ashok Leyland Company. – М.: LAP Lambert Academic Publishing, 2012. – 260 с.
  127. Dushko Josheski and Darko Lazarov. Social security wealth system effect on final consumption. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  128. DANIEL LAZAR and K. M. Yaseer. Capital Asset Pricing Model. – М.: LAP Lambert Academic Publishing, 2011. – 204 с.
  129. Ammar Naqvi and Adnan Damani. The Role of Merchandisers in Managing the Supply Chain of Bedsheets. – М.: LAP Lambert Academic Publishing, 2010. – 72 с.
  130. M. Shafi and J. Bakht. Agricultural Research Centers (Management and Operation). – М.: LAP Lambert Academic Publishing, 2011. – 192 с.
  131. Nikan Sadehvandi and Minoo Alemi. An Evaluation of Pacesetter Series in the Iranian EFL Context. – М.: LAP Lambert Academic Publishing, 2013. – 52 с.
  132. Juma Ayoub. Rural –Rural Migration and its Impact on Household Food Security. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  133. Maithreyi Subramaniam,Jaffri Hanafi and Sabzali Musa Kahn. A Mixed Methods Integration. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  134. Murunga Anthony Ekisa Amoo and Janet Lilian Maina. Evolution of Capital Structure Choices for Effective Economic Gain. – М.: LAP Lambert Academic Publishing, 2012. – 56 с.
  135. Ganaraja K. and Dinesha P. T. Housing Finance and Banking Sector in India. – М.: LAP Lambert Academic Publishing, 2012. – 144 с.
  136. Awogbade Mabel and Sodipe,Olubunmi Ebun. COMPARATIVE STUDY OF FORMAL AND NON FORMAL TRAINING IN ADIRE PRODUCTION. – М.: LAP Lambert Academic Publishing, 2010. – 116 с.
  137. Joshua Adeosun and Sunday Odediran. A Proposed Model for Wastewater Recycling in Nigeria. – М.: LAP Lambert Academic Publishing, 2014. – 60 с.
  138. Titus Ebenezer Kwofie,Emmanuel Adinyira and Edward Ayebeng Botchway. Critical Success Criteria For Public Housing Project Delivery In Ghana. – М.: LAP Lambert Academic Publishing, 2012. – 156 с.
  139. Hengameh Fazeli and Ali Goodarzi. Vastu Shastra and the Patterns of Traditional Houses of Iran. – М.: LAP Lambert Academic Publishing, 2013. – 460 с.
  140. Sarjoo Patel and Minal Talwelkar. Scientific Vastu Shastra in Homes. – М.: , 2015. – 132 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Наука человековедения. интервью с Д. Уолтоном, профессором London Metropolitan University, экспертом CIPD. Chartered Institute of Personnel and Development, автором программы Master of Arts in Human Resource Strategies. И. Смирнова, "Кадровый менеджмент", № 5, июль-август 2007.
  2. Специализированный модуль FS-CD. Collections and Disbursements - "Сборы и Выплаты" и его возможности. О.А. Глущенко, "Финансовый менеджмент в страховой компании", № 2, II квартал 2007.
  3. Бюджетирование страховой компании на базе Oracle Enterprise Planning and Budgeting. Д.В. Лесоводский, "Финансовый менеджмент в страховой компании", № 3, III квартал 2006.
  4. Регулирование операций торгового финансирования: новые инициативы. интервью с Д. Шмандом, вице-председателем Банковской комиссии ICC по supply chain finance, главой подразделения Trade Finance and Cash Management Corporates EMEA в Global Transaction Banking. GTB division Deutsche Bank. Н. Макарова, "Международные банковские операции", N 2, апрель-июнь 2012 г.
  5. Ужин в темноте в стиле Малевича и Новый год в Хаммере". Что может выть лучше?". интервью с Н. Саниной, индивидуальным предпринимателем и креативным директором компании "San and stars". М. Сипатова, "Арсенал предпринимателя", N 12, декабрь 2011 г.
  6. На пути к новому стандарту в торговом финансировании. интервью с А.  Кастерманом, руководителем Trade and Supply Chain, SWIFT, сопредседателем рабочей группы ICC-BPO. Э. Шакирова, "Международные банковские операции", N 4, октябрь-декабрь 2011 г.
  7. Уильям Савадж: Мотивировать людей в Нижнем Новгороде и Новосибирске нужно по-разному". интервью с У. Саваджем, вице-президентом корпорации Intel, подразделение Software and Services Group. М. Холкина, "Управление персоналом", N 14, июль 2010 г.
  8. Цены под контролем: the present and the future. С. Стройкова, И. Леметюйнен, "Консультант", № 19, сентябрь 2009.

Образцы работ

Тема и предметТип и объем работы
А.В.Козырев
Политология
Курсовая работа
30 стр.
Последствия операции НАТО
Политология
Диплом
80 стр.
Симуляция психических расстройств
Юридическая психология
Реферат
21 стр.
Математические модели океанических течений
Переводоведение (теория перевода)
Курсовая работа
42 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Анастасия, 12.07
Спасибо вам за работу все чудесно!