Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Lorenzo Cozzella. Data and Information Security using Hylemetric Approach. – М.: LAP Lambert Academic Publishing, 2014. – 204 с.

Дополнительные результаты

  1. African Conflicts and Informal Power: Big Men and Networks (Africa Now). – М.: , 2012. – 288 с.
  2. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с.
  3. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 515 с.
  4. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  5. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с.
  6. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с.
  7. Peter A. Diamond. Taxation, Incomplete Markets, and Social Security (Munich Lectures). – М.: , 0. – 0 с.
  8. Risk Management, Speculation, and Derivative Securities. – М.: , 0. – 0 с.
  9. Gerald Kovacich. The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition. – М.: , 0. – 0 с.
  10. Marianne Munday. Opportunities in Data and Word Processing Careers. – М.: , 0. – 0 с.
  11. Judith Hale. Performance Based Evaluation: Tools and Techniques to Measure the Impact of Training. – М.: , 0. – 0 с.
  12. Ulric J., Jr. Gelinas, Steve G. Sutton, Jane Fedorowicz. Business Processes and Information Technology. – М.: , 0. – 0 с.
  13. Jean-Jacques Laffont. The Economics of Uncertainty and Information. – М.: The MIT Press, 1989. – 304 с.
  14. Nico Heerink, Herman Van Keulen, Marijke Kuiper, H. Van Keulen. Economic Policy and Sustainable Land Use: Recent Advances in Quantitative Analysis for Developing Countries (Contributions to Economics). – М.: , 0. – 0 с.
  15. Harrison Roth. LEAPS: Long-Term Equity Anticipation Securites: What They Are and How to Use Them for Profit and Protection. – М.: , 0. – 0 с.
  16. E. Barucci. Financial Markets Theory: Equilibrium, Efficiency, and Information (Springer Finance). – М.: , 0. – 0 с.
  17. Nikitas-Spiros Koutsoukis, Gautam Mitra. Decision Modelling and Information Systems: The Information Value Chain (Operations Research/Computer Science Interfaces Series). – М.: , 0. – 0 с.
  18. Peter Checkland, Sue Holwell. Information, Systems and Information Systems - making sense of the field. – М.: , 0. – 0 с.
  19. Mark B. Desman. Building an Information Security Awareness Program. – М.: , 0. – 0 с.
  20. Jill Dyche, Jill Dyche. e-Data: Turning Data into Information with Data Warehousing (Addison-Wesley Information Technology Series). – М.: , 0. – 0 с.
  21. Gerald L. Kovacich, Edward P. Halibozek. The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, First Edition. – М.: , 0. – 0 с.
  22. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с.
  23. Marko Nordquist. Towards Improved Security Management Practice: Designing an Organizational Model Procedure for the Implementation of Information Security Management in Heterogeneous Information Management. – М.: , 0. – 0 с.
  24. Modern Information Systems for Managers. – М.: , 0. – 0 с.
  25. Steve Purser. A Practical Guide to Managing Information Security (Artech House Technology Management Library). – М.: , 0. – 0 с.
  26. Risk Analysis and the Security Survey. – М.: , 0. – 0 с.
  27. British Library, Ian Stewart, Alan Gomersall, British Library Science Reference and Information Service Market Rese. Market Research: A Guide to British Library Collections. – М.: , 0. – 0 с.
  28. Marian Quigley, Marian Quiqley. Information Security and Ethics: Social and Organizational Issues. – М.: , 0. – 0 с.
  29. Ifip Tc6, Tc11 Joint Working Conference on Communications and Multimedi, Tomaz Klobucar. Advanced Communications and Multimedia Security: Ifip Tc6/Tc11 Sixth Joint Working Conference on Communications and Multimedia Security, September 26-27, 2002, Portoroz, Slovenia (International Federation for Information Processing, 100). – М.: , 0. – 0 с.
  30. C. Warren Axelrod, Axelrod. Outsourcing Information Security. – М.: , 0. – 0 с.
  31. Zongqing Zhou. E-Commerce and Information Technology in Hospitality and Tourism. – М.: Delmar Cengage Learning, 2003. – 224 с.
  32. Harold F. Tipton, Micki Krause, Micki, Cissp Krause. Information Security Management Handbook, Fifth Edition. – М.: , 0. – 0 с.
  33. Charles Cresson Wood. Best Practices In Internet Commerce Security. – М.: , 0. – 0 с.
  34. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с.
  35. Roger Evernden. Information First : Integrating Knowledge and Information Architecture for Business Advantage. – М.: , 2003. – 0 с.
  36. Graham Cheetham. Professions, Competence and Informal Learning. – М.: , 2005. – 0 с.
  37. Peter A. Diamond. Taxation, Incomplete Markets, and Social Security (Munich Lectures). – М.: , 2005. – 0 с.
  38. Thomas C. Glaessner. Electronic Safety and Soundness: Securing Finance in a New Age (World Bank Working Papers). – М.: , 2004. – 0 с.
  39. Barbara C. McNurlin. Information Systems Management in Practice (7th Edition). – М.: , 2005. – 0 с.
  40. Catastrophe Modeling : A New Approach to Managing Risk (Huebner International Series on Risk, Insurance and Economic Security). – М.: , 2004. – 0 с.
  41. Peter R., MBA Ramsaroop. Securing Business Intelligence: Knowledge and CyberSecurity in the Post 9/11 World. – М.: , 2004. – 0 с.
  42. G.E. Gorman. International Yearbook of Library and Information Management, 2003-2004: Metadata Applications and Management : Metadata Applications and Management (International ... of Library and Information Management). – М.: , 2003. – 0 с.
  43. Matthew Hinton. Introducing Information Management: The business approach. – М.: , 2005. – 0 с.
  44. Intelligent Agents for Data Mining and Information Retrieval. – М.: , 2004. – 0 с.
  45. Strategic Marketing in Library and Information Science. – М.: , 2003. – 0 с.
  46. Frances C. Wilkinson. The Complete Guide to Acquisitions Management (Library and Information Science Text Series). – М.: , 2003. – 0 с.
  47. Economics of Information Security (Advances in Information Security). – М.: , 2004. – 0 с.
  48. Sari Greene. Security Policies and Procedures : Principles and Practices (Security). – М.: , 2005. – 0 с.
  49. Lech Janczewski. Managerial Guide for Handling Cyber-Terrorism and Information Warfare. – М.: , 2005. – 0 с.
  50. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с.
  51. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с.
  52. Strategic Marketing in Library and Information Science. – М.: , 2003. – 0 с.
  53. Robert A. Schultz. Contemporary Issues in Ethics and Information Technology. – М.: , 2005. – 0 с.
  54. Margi Levy. Strategies for Growth in SMEs, First Edition : The Role of Information and Information Sytems. – М.: , 2004. – 0 с.
  55. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с.
  56. Catastrophe Modeling:: A New Approach to Managing Risk (Huebner International Series on Risk, Insurance and Economic Security). – М.: , 2005. – 252 с.
  57. Economics and Contemporary Land Use Policy: Development and Conservation at the Rural-Urban Fringe (Resources for the Future S.). – М.: , 2006. – 288 с.
  58. Helen Nesadurai. Globalisation and Economic Security in East Asia: Governance and Institutions. – М.: , 2005. – 256 с.
  59. The Water Encyclopedia, Third Edition: Hydrologic Data and Internet Resources. – М.: , 2007. – 1880 с.
  60. Ira Winkler. Zen and the Art of Information Security. – М.: , 2007. – 192 с.
  61. Timothy P. Layton. Information Security. – М.: , 2006. – 222 с.
  62. Michael E. Whitman, Herbert J. Mattord. Principles of Information Security, Second Edition. – М.: , 2004. – 600 с.
  63. From Data and Information Analysis to Knowledge Engineering : Proceedings of the 29th Annual Conference of the Gesellschaft fA?r Klassifikation e.V., University ... Data Analysis. – М.: , 2006. – 761 с.
  64. John Crawford. The Culture of Evaluation in Library and Information Services. – М.: Chandos Publishing (Oxford) Ltd., 2006. – 204 с.
  65. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с.
  66. Danette McGilvray. Executing Data Quality Projects: Ten Steps to Quality Data and Trusted Information (TM). – М.: , 2008. – 352 с.
  67. Kathleen de la Pena McCook. Opportunities in Library and Information Science (Opportunities in). – М.: , 2008. – 160 с.
  68. Managing the Transition from Print to Electronic Journals and Resources: A Guide for Library and Information Professionals (Routledge Studies in Library and Information Science). – М.: , 2008. – 356 с.
  69. Managing the Transition from Print to Electronic Journals and Resources: A Guide for Library and Information Professionals (Routledge Studies in Library and Information Science). – М.: , 2008. – 300 с.
  70. Environmental Change and Human Security: Recognizing and Acting on Hazard Impacts (NATO Science for Peace and Security Series C: Environmental Security). – М.: , 2008. – 480 с.
  71. Ibp Usa. Cuba Army Defense Policy and National Security Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  72. Social and Human Elements of Information Security: Emerging Trends and Countermeasures (Premier Reference Source). – М.: , 2008. – 412 с.
  73. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с.
  74. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с.
  75. Gerard Blokdijk, Ivanka Menken. Information Security Management Best Practice Workbook: Implementation and Management Roadmap for Threats, Challenges and Solutions - Ready to use supporting documents bringing Theory into Practice. – М.: , 2008. – 124 с.
  76. Charles Halliman. Business Intelligence Using Smart Techniques: Environmental Scanning Using Text Mining and Competitor Analysis Using Scenarios and Manual Simulation, Revised Edition. – М.: , 2009. – 230 с.
  77. W. Krag Brotby. Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement. – М.: Auerbach Publications, 2009. – 200 с.
  78. Alan Calder. Information Security based on ISO 27001/ISO 27002: A Management Guide. – М.: , 2009. – 83 с.
  79. Bel G. Raggad. Information Security Management: Concepts and Practice. – М.: , 2010. – 871 с.
  80. Michael E. Whitman, Herbert J. Mattord. Management of Information Security. – М.: , 2010. – 592 с.
  81. Econophysics Approaches to Large-Scale Business Data and Financial Crisis: Proceedings of Tokyo Tech-Hitotsubashi Interdisciplinary Conference + APFA7. – М.: , 2010. – 342 с.
  82. Alan Calder, Steve G Watkins. Information Security Risk Management for ISO27001 / ISO27002. – М.: , 2010. – 198 с.
  83. William Manning. CISM Certified Information Security Manager Certification Exam Preparation Course in a Book for Passing the CISM Exam - The How To Pass on Your First Try Certification Study Guide. – М.: , 2010. – 188 с.
  84. Handbook of Information and Communication Security. – М.: , 2010. – 800 с.
  85. Reinhard Viertl. Fuzzy Data and Statistics. – М.: , 2011. – 256 с.
  86. Jesus Mena. Investigative Data Mining for Security and Criminal Detection. – М.: , 2010. – 272 с.
  87. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с.
  88. John R. Vacca. Computer and Information Security Handbook. – М.: , 2010. – 928 с.
  89. Hvac Equations, Data, And Rules Of Thumb, 2Nd Ed. – М.: , 2011. – 790 с.
  90. Principles Of Computer Security, Comptia Security+ And Beyond, Second Edition. – М.: , 2011. – 0 с.
  91. Rohana Mohamad Rashid. Determining Influencing Factors of Information Security Culture. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  92. Prof Lucy Lynn Maliwichi,Prof Peter BIkam and Dovhani Johannes Mulaudzi. Energy Needs and Food Security in Mutale Municipality, South Africa. – М.: LAP Lambert Academic Publishing, 2011. – 76 с.
  93. Lorenzo Cozzella. Data and Information Security using Hylemetric Approach. – М.: LAP Lambert Academic Publishing, 2014. – 204 с.
  94. Muhammad Inayat Ullah and Muhammad Shahid. IMPROVING THE EFFICIENCY OF MEDICAL EXPERT SYSTEM. – М.: LAP Lambert Academic Publishing, 2010. – 60 с.
  95. Charles Mundia and Masamu Aniya. Spatial-Temporal Analysis and Modeling of Urban Growth. – М.: LAP Lambert Academic Publishing, 2010. – 156 с.
  96. K.V. Raju and Manasi S. Integrated Water Resources Management in Tungabhadra Sub Basin. – М.: LAP Lambert Academic Publishing, 2011. – 196 с.
  97. Michael Opoku and Richard Nsiah. The Effect of Capitation Payment on the Nat. Health Insurance in Ghana. – М.: LAP Lambert Academic Publishing, 2014. – 88 с.
  98. M. Rezaul Islam and Shankor Paul. Women Perception on Violence and Discrimination in Bangladesh. – М.: LAP Lambert Academic Publishing, 2011. – 68 с.
  99. Ishrat Fatima,Badar Naseem Siddiqui and Kanwal Naeem. Rural Youth and Food Security. – М.: LAP Lambert Academic Publishing, 2014. – 112 с.
  100. Md. Abubakkor Siddik,Mt. Parvina Akhtar and Md. Moniruzzaman. Cyclone Sidr and Housing Sector. – М.: LAP Lambert Academic Publishing, 2012. – 164 с.
  101. Godefroid Ndayikengurukiye. Remote Sensing Data Fusion. – М.: LAP Lambert Academic Publishing, 2012. – 404 с.
  102. Vishal Kothari and Rajesh Patel. Biotic factor management for sustainable agricultural development. – М.: LAP Lambert Academic Publishing, 2014. – 96 с.
  103. Radoslav Ivancik and Pavel Necas. Postmodern Conflicts on African Continent. – М.: LAP Lambert Academic Publishing, 2013. – 180 с.
  104. Anju Lis Kurian and C. Vinodan. Regional Integration and Energy Security:The European Union Experience. – М.: LAP Lambert Academic Publishing, 2014. – 268 с.
  105. Aniza Abd. Aziz,Zurkurnai Yusof and Syed Hatim Noor. Survival And Prognostic Factors of Acute Myocardial Infarction. – М.: LAP Lambert Academic Publishing, 2011. – 104 с.
  106. Omead Hussain. Predicting Breast Cancer Survivability Using Data Mining Techniques. – М.: LAP Lambert Academic Publishing, 2011. – 136 с.
  107. Mohamed A. El-Sisy,Waeil F. Abd El-Waheed and Abd Allah A. Mousa. Ant Colony Algorithm to Support Multi-Criteria Decision Making. – М.: LAP Lambert Academic Publishing, 2013. – 128 с.
  108. Mah-e-Bushra Asghar and Rubina Bhatti. Marketing of Library and Information Services and Products. – М.: LAP Lambert Academic Publishing, 2012. – 124 с.
  109. Vipin Yadav and Mitchell F. Denning. Molecular Signaling Pathways in Human Skin Carcinogenesis. – М.: LAP Lambert Academic Publishing, 2011. – 192 с.
  110. Rupesh S. Mishra and D. K. Chitre. Data Leakage Detection in Relational Database. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  111. Wole Olatokun. Databases and Information Retrieval. – М.: LAP Lambert Academic Publishing, 2012. – 304 с.
  112. Ankit Panch. Enterprise Secure Wireless Authentication (ESWA). – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  113. Yedji Mbangsoua and Dr. Freddie Acosta. Information Security and its Investment Justification. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  114. Yasser Alshehri. Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 156 с.
  115. Vivek Gangwar. Data Mining Of Biological Data And Pattern Matching. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  116. Shafi'i Muhammad Abdulhamid. Privacy And National Security Challenges in Online Social Networks. – М.: LAP Lambert Academic Publishing, 2013. – 64 с.
  117. Julien Shabani. Information Security for RFID Systems. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.
  118. Manoj Kumar Verma and U. N. Singh. Impact of Internet on Library and Information Services of IITs. – М.: LAP Lambert Academic Publishing, 2012. – 164 с.
  119. Affan Yasin,Hafiz Adnan Shafiq and Muhammad Ijlal Hasnain. Software Architecture for Centralized Health Database. – М.: LAP Lambert Academic Publishing, 2013. – 64 с.
  120. Furhan Mehmood and Rajia Rafique. Information Security in Financial Organizations. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  121. Edrisi Munoz,Luis Puigjaner and Antonio Espuna. Knowledge management tool for integrated decision-making in industry. – М.: LAP Lambert Academic Publishing, 2012. – 212 с.
  122. Omar Zakaria. Information Security Culture. – М.: LAP Lambert Academic Publishing, 2013. – 248 с.
  123. Saeed Soltanmohammadi. Improving Information System Security by Evaluating Human Factors. – М.: LAP Lambert Academic Publishing, 2014. – 116 с.
  124. frankie tvrz and marijke coetzee. Information Security of a Bluetooth-enabled handheld device. – М.: LAP Lambert Academic Publishing, 2010. – 180 с.
  125. Ahmed AlNunu. How Much Information Security?. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  126. Jeffy Mwakalinga. A Framework for Adaptive Information Security Systems. – М.: LAP Lambert Academic Publishing, 2011. – 364 с.
  127. Meixia Deng and Liping Di. Facilitating Data-intensive Research and Education in Earth Science. – М.: LAP Lambert Academic Publishing, 2010. – 212 с.
  128. Sena Desmennu and Nicholas Ikhu-Omoregbe. Healthcare Information Management System. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  129. Muhammad Imran Tariq. SLA based Information Security Metrics in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2014. – 192 с.
  130. Mela Ali and Loay George. A Spatial Invarient Model for Local Attributes of Fingerprint Ridges. – М.: LAP Lambert Academic Publishing, 2013. – 152 с.
  131. Padi Koti Prahladha and Kondeti Suneetha. Public Distribution System and Food Security in Andhra Pradesh. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  132. Tekalign Gutu Sakketa. Improving and Protecting Multiple-Use Water Resources. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  133. Kazeem Durodoye, PhD. Impact Of Business And Information Systems Strategy On Firm Performance. – М.: LAP Lambert Academic Publishing, 2011. – 348 с.
  134. Alaa Al-Deen Mohammed Hassan. Information Security Management. – М.: LAP Lambert Academic Publishing, 2013. – 188 с.
  135. Jun Zheng,Jiantao Gu and Hong Wang. Financial Management and Information Security of Independent Colleges. – М.: LAP Lambert Academic Publishing, 2014. – 256 с.
  136. Ying Qian. Mitigating Information Security Risks during Operation Transition. – М.: LAP Lambert Academic Publishing, 2012. – 372 с.
  137. Emaziye Otunaruke Peter. Climate Change and Food Security in Niger Delta Region, Nigeria. – М.: LAP Lambert Academic Publishing, 2013. – 160 с.
  138. Ahmed Mohammed. Non-timber Forest Products and Food Security. – М.: LAP Lambert Academic Publishing, 2013. – 104 с.
  139. Sanjay Srivastava. Alleviating Rural Poverty and Food Security in Changing Climate. – М.: LAP Lambert Academic Publishing, 2010. – 96 с.
  140. Designing News: Changing the World of Editorial Design and Information Graphics. – М.: , . –  с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Применение интеллектуального анализа данных. data mining в управлении страховой компанией. Ю.В. Грызенкова, З.Ф. Шарифьянова, "Управление в страховой компании", № 4, октябрь-декабрь 2007.
  2. Наука человековедения. интервью с Д. Уолтоном, профессором London Metropolitan University, экспертом CIPD. Chartered Institute of Personnel and Development, автором программы Master of Arts in Human Resource Strategies. И. Смирнова, "Кадровый менеджмент", № 5, июль-август 2007.
  3. Специализированный модуль FS-CD. Collections and Disbursements - "Сборы и Выплаты" и его возможности. О.А. Глущенко, "Финансовый менеджмент в страховой компании", № 2, II квартал 2007.
  4. Бюджетирование страховой компании на базе Oracle Enterprise Planning and Budgeting. Д.В. Лесоводский, "Финансовый менеджмент в страховой компании", № 3, III квартал 2006.
  5. Регулирование операций торгового финансирования: новые инициативы. интервью с Д. Шмандом, вице-председателем Банковской комиссии ICC по supply chain finance, главой подразделения Trade Finance and Cash Management Corporates EMEA в Global Transaction Banking. GTB division Deutsche Bank. Н. Макарова, "Международные банковские операции", N 2, апрель-июнь 2012 г.
  6. О качестве сервиса, связанного с запросами на медицинскую информацию. Medical Information Service?. А. Беденков, "Ремедиум", № 1, январь 2012.
  7. Ужин в темноте в стиле Малевича и Новый год в Хаммере". Что может выть лучше?". интервью с Н. Саниной, индивидуальным предпринимателем и креативным директором компании "San and stars". М. Сипатова, "Арсенал предпринимателя", N 12, декабрь 2011 г.
  8. На пути к новому стандарту в торговом финансировании. интервью с А.  Кастерманом, руководителем Trade and Supply Chain, SWIFT, сопредседателем рабочей группы ICC-BPO. Э. Шакирова, "Международные банковские операции", N 4, октябрь-декабрь 2011 г.
  9. Уильям Савадж: Мотивировать людей в Нижнем Новгороде и Новосибирске нужно по-разному". интервью с У. Саваджем, вице-президентом корпорации Intel, подразделение Software and Services Group. М. Холкина, "Управление персоналом", N 14, июль 2010 г.
  10. Цены под контролем: the present and the future. С. Стройкова, И. Леметюйнен, "Консультант", № 19, сентябрь 2009.

Образцы работ

Тема и предметТип и объем работы
Специализация учреждений ООН: правовая характеристика, привелегии и иммунитет
Международная экономика
Реферат
19 стр.
Последствия операции НАТО
Политология
Диплом
80 стр.
Математические модели океанических течений
Переводоведение (теория перевода)
Курсовая работа
42 стр.
Продвижение брендов в шоу-бизнесе
Электроснабжение городов и промышленных предприятий
Диплом
79 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Роман, 27.04
Отлично, спасибо большое