Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Shilpa Jaiswal and Sumeet Agrawal. Detection of Network Worm to Eliminate Security Threats in MANET. – М.: LAP Lambert Academic Publishing, 2012. – 52 с.

Дополнительные результаты

  1. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с.
  2. Terrorism and the Olympics: Major Event Security and Lessons for the Future. – М.: , 2012. – 272 с.
  3. David F. Teitelbaum. The Procrastinator's Guide to Financial Security: How Anyone Over 40 Can Still Build a Strong Portfolio--and Retire Comfortably. – М.: , 0. – 0 с.
  4. David G. Blanchflower, Richard B. Freeman, National Bureau of Economic Research. Youth Employment and Joblessness in Advanced Countries (Nber Comparative Labor Markets Series). – М.: , 0. – 0 с.
  5. Ivan R. Misner, Don Morgan. Masters of Networking: Building Relationships for Your Pocketbook and Soul. – М.: Bard Press, 2000. – 200 с.
  6. Jaime Behar, W. A. Muller, M. Bihn. Cooperation and Competition in a Common Market: Studies on the Formation of Mercosur (Contributions to Economics). – М.: , 0. – 0 с.
  7. David M. Newberry. Privatization, Restructuring, and Regulation of Network Utilities. – М.: The MIT Press, 2002. – 484 с.
  8. David S. Katz, Ilan Caspi, David S. Katz, Ilan Caspi. Executive's Guide to Personal Security. – М.: , 0. – 0 с.
  9. J. Scott Long, Panel to Study Gender Differences in Career Outcomes, Linda C. Skidmore, Catherine D. Gaddy, National Research Council. From Scarcity to Visibility: Gender Differences in the Careers of Doctoral Scientists and Engineer. – М.: , 0. – 0 с.
  10. Robert Wajda. $0 to $1,000,000 in 365 Days!: An Entrepreneur's True Story. – М.: , 0. – 0 с.
  11. Alan Gart. Regulation, Deregulation, Reregulation : The Future of the Banking, Insurance, and Securities Industries. – М.: , 0. – 0 с.
  12. Marko Nordquist. Towards Improved Security Management Practice: Designing an Organizational Model Procedure for the Implementation of Information Security Management in Heterogeneous Information Management. – М.: , 0. – 0 с.
  13. JAMES W. ROBINSON, CHARLES W. KING. The New Professionals : The Rise of Network Marketing As the Next Major Profession. – М.: , 0. – 0 с.
  14. Karen Ann Rolcik, Mark Warda, Karen Rolcik, Mark How to Form a Corporation in Florida Warda. How to Form a Corporation in Ohio (Legal Survival Guides). – М.: , 0. – 0 с.
  15. Louis Columbus. Administrator's Guide to e-Commerce. – М.: , 0. – 0 с.
  16. Jim Banister. Word of Mouse : The New Age of Networked Media. – М.: , 0. – 0 с.
  17. Workshop on the Life of a Process Model--From Conception to Action, S. Macchietto, S. P. Asprey. Dynamic Model Development: Methods, Theory and Applications (Computer-Aided Chemical Engineering). – М.: , 0. – 0 с.
  18. Kai P J Hakkarainen. Communities of Networked Expertise : Professional and Educational Perspectives (Advances in Learning and Instruction). – М.: , 2004. – 0 с.
  19. Chien-Hsun Chen. Banking and Insurance in the New China: Competition and the Challenge of Accession to the Wto (Advances in Chinese Economic Studies Series). – М.: , 2004. – 0 с.
  20. Economics and Management of Franchising Networks (Contributions to Management Science). – М.: , 2004. – 0 с.
  21. Economics of Information Security (Advances in Information Security). – М.: , 2004. – 0 с.
  22. Sudhanshu Kairab. A Practical Guide to Security Assessments. – М.: , 2004. – 498 с.
  23. Larry James. Ten Commitments of Networking: Creative Ways to Maximize Your Personal Connections. – М.: , 2006. – 175 с.
  24. Desertification in the Mediterranean Region: A Security Issue--Proceedings of the NATO Mediterranean Dialogue Workshop, held in Valencia, Spain, 2-5 December 2003 (NATO Security th. – М.: , 2005. – 614 с.
  25. Desertification in the Mediterranean Region. A Security Issue: Proceedings of the NATO Mediterranean Dialogue Workshop, held in Valencia, Spain, 2-5 December ... Science Series C:. – М.: , 2005. – 614 с.
  26. Wayne G. Herbertson. The Practical Safety Guide To Zero Harm: How to Effectively Manage Safety in the Workplace. – М.: , 2008. – 208 с.
  27. Jack Bastide, Diane Walker. Navigating the World of Network Marketing: Third Edition. – М.: , 2008. – 288 с.
  28. Computer & Network Procedures to Manage IT Systems. – М.: , 2008. – 720 с.
  29. Trust, Privacy and Security in Digital Business: 5th International Conference, TrustBus 2008 Turin, Italy, September 1-5, 2008, Proceedings (Lecture Notes in Computer Science). – М.: , 2008. – 205 с.
  30. Strategy and Governance of Networks: Cooperatives, Franchising, and Strategic Alliances (Contributions to Management Science). – М.: , 2008. – 392 с.
  31. Charles R Geisst. Collateral Damaged: The Marketing of Consumer Debt to America. – М.: , 2009. – 288 с.
  32. JD Benjamin F. Renzo. Hall of Fame: How to Manage Financial Success as a Professional Athlete. – М.: , 2010. – 128 с.
  33. Thi Thu Hao Van, Peter J. Microbiological Safety of Food in Vietnam: Detection of Enteric Bacteria in Raw Food and Evaluation of Antibiotic Resistance. – М.: , 2010. – 304 с.
  34. Fabio Oreste. Quantum Trading: Using Principles of Modern Physics to Forecast the Financial Markets. – М.: Wiley, 2011. – 288 с.
  35. Mark Miller. The Hard Times Guide to Retirement Security. – М.: , 2010. – 224 с.
  36. Children?s Hospital of Philadelphia. The Children?s Hospital of Philadelphia Guide to Asthma. – М.: , 2004. – 256 с.
  37. David Bindman. The Image of the Black in Western Art Vol II, From the Early Christian Era to the "Age of Discovery Part 1: From Demonic Threat to Incarnation, New Ed. – М.: , 2010. – 260 с.
  38. National Association of Realtors (NAR). The National Association of Realtors® Guide to Home Selling. – М.: , 2006. – 240 с.
  39. National Association of Realtors (NAR). The National Association of Realtors® Guide to Home Buying. – М.: , 2006. – 296 с.
  40. The Culinary Institute of America. How to Plan Your Career in Food. – М.: , 2006. – 224 с.
  41. Wilko Bolt, Harold Houba. Credible Threats in Negotiations: A Game-theoretic Approach (Theory and Decision Library C). – М.: , 2011. – 344 с.
  42. Mike Meyers' Comptia Network+ Guide To Managing And Troubleshooting Networks, Second Edition. – М.: , 2011. – 0 с.
  43. Fundamentals Of Network Security. – М.: , 2011. – 672 с.
  44. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . –  с.
  45. George Varghese. Network Algorithmics,: An Interdisciplinary Approach to Designing Fast Networked Devices. – М.: Morgan Kaufmann, 2004. – 496 с.
  46. Ido Dubrawsky. CompTIA Security+ Certification Study Guide, Third Edition: Exam SYO-201 3E. – М.: , 2009. – 752 с.
  47. Eduardo Fernandez-Buglioni. Security Patterns in Practice: Designing Secure Architectures Using Software Patterns. – М.: Wiley, 2013. – 582 с.
  48. Reid Hoffman, Ben Casnocha. The Start-up of You: Adapt to the Future, Invest in Yourself, and Transform Your Career. – М.: , 2012. – 272 с.
  49. Tzu-Yang Yu. Damage Detection of GFRP-Concrete Systems Using Electromagnetic Waves. – М.: LAP Lambert Academic Publishing, 2010. – 372 с.
  50. Arun Singh Chandel. Study of Methods Used to Locate Partial Blockage in Subsea Flowlines. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  51. V. Siva Brahmaiah Rama,Deepak Sharma and Sheetal Joshi. Elimination of harmonics using power electronics equipments. – М.: LAP Lambert Academic Publishing, 2012. – 56 с.
  52. Govind Sharma and Manish Gupta. Secure routing in wireless mobile Ad-Hoc network. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  53. Farzam Garshasbi. Supply Chain Security Programs. – М.: LAP Lambert Academic Publishing, 2012. – 52 с.
  54. Bilal Masood,Muhammad Kamran and Sobia Baig. Efficient Fault Detection of Distribution Transformers. – М.: LAP Lambert Academic Publishing, 2012. – 100 с.
  55. D.M. Bappy and Md. Hamidur Rahman. A Study in 3D Structure Detection Implementing Forward Camera Motion. – М.: LAP Lambert Academic Publishing, 2012. – 72 с.
  56. Shaek Rana Mohammad Baki Billah and Mohammad Hafizur Rahman. Design & Development of Network Security System using IP Tables. – М.: LAP Lambert Academic Publishing, 2013. – 164 с.
  57. Mahesh Kumbhar,Ashish Jadhav and Mahesh Walunjkar. Feasibility Study of Gabor Wavelet for Detection of Facial Expression. – М.: LAP Lambert Academic Publishing, 2013. – 88 с.
  58. Kaouther El Kourd,Fares Bougourzi and Abdallah Azizi. Active Detection of Deformable Contours using B-Snake Model for MRI. – М.: LAP Lambert Academic Publishing, 2013. – 128 с.
  59. Naseer Ahmad. Security Issues in Wireless Networks. – М.: LAP Lambert Academic Publishing, 2010. – 60 с.
  60. Anand Parey and Naresh Tandon. Fault Detection of Spur Gears Using Vibration Monitoring. – М.: LAP Lambert Academic Publishing, 2010. – 204 с.
  61. Ye Xia. System Identification and Damage Detection of Nonlinear Structures. – М.: LAP Lambert Academic Publishing, 2012. – 196 с.
  62. Oduor Benson. The Use Of Narrative Voices To Present Ideological Dispensation. – М.: LAP Lambert Academic Publishing, 2012. – 160 с.
  63. Norsuzailina Mohamed Sutan and Mohd. Saleh Jaafar. Effectiveness of NDTs for the Detection of Concrete Deterioration. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  64. Gadadhara Mohapatra. Dynamics of Chronic Poverty and Food Security. – М.: LAP Lambert Academic Publishing, 2011. – 208 с.
  65. Cecilia O. Bolajoko Adewumi. Resource Sharing and the Prospects of Networking. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  66. Saima Afzal. Non-Traditional Security Threats to Pakistan Post 9/11. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  67. M. Sadiq Ali Khan and S. M. Aqil Burney. Recent Trends in Intrusion Detection System & Network Monitoring. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  68. Simon Nangabo. The Impact of HIV/AIDS on Food Security in Rural Africa. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  69. Alina-Mihaela Badescu. Radio Detection of Cosmic Neutrinos in Salt Mines. – М.: LAP Lambert Academic Publishing, 2013. – 180 с.
  70. Thomas Petermann. From the architecture of the Internet to the spreading of an epidemic. – М.: LAP Lambert Academic Publishing, 2009. – 128 с.
  71. Raksha Singh,Anahita Hodiwala and S.A. Samant. Detection of HIV Infection in Pregnant Females. – М.: LAP Lambert Academic Publishing, 2013. – 116 с.
  72. S. K. Mavuri. Detection of transcription silencing sites in Mycobacterium leprae TN. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  73. El-Safey Mohamed. Detection of Escherichia coli O157:H7 in some Egyptian foods. – М.: LAP Lambert Academic Publishing, 2010. – 196 с.
  74. Reshma Anjum. Detection of conjugative plasmids and evaluation of genotoxicity. – М.: LAP Lambert Academic Publishing, 2011. – 140 с.
  75. Ibrahim Garba. Detection Of Some Microbes In Water. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  76. Lata Jain and J. H. Purohit. Detection of BHV-1 infection in breeding bulls. – М.: LAP Lambert Academic Publishing, 2013. – 156 с.
  77. Kuldeep Kumar. PCR Based Detection of Zoonotic Salmonella from Foods. – М.: LAP Lambert Academic Publishing, 2013. – 148 с.
  78. Murat Seyran. RAPID DETECTION OF FUNGICIDE RESISTANCE AND DOSE RESPONSE IN FUNGI. – М.: LAP Lambert Academic Publishing, 2011. – 100 с.
  79. Meline Khachatryan. Land Use and Food Security in the Republic of Armenia. – М.: LAP Lambert Academic Publishing, 2011. – 104 с.
  80. Marystella Wabwoba. Factors affecting sustainability of food security projects in Kenya. – М.: LAP Lambert Academic Publishing, 2013. – 80 с.
  81. Nadeem Sarwar,. Saifullah and Muhammad Imran. Effectiveness Of Zn Application To Minimize Cd Accumulation In Wheat. – М.: LAP Lambert Academic Publishing, 2013. – 92 с.
  82. Mustafa Ojonuba Jibrin. Detection of Seed Borne Pathogens on Farmer-Saved Maize Seeds. – М.: LAP Lambert Academic Publishing, 2011. – 56 с.
  83. Nada Musa,Jason Githeko and Kamal El-Siddig. Challenges of Using ICTs to Disseminate Agricultural Information. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  84. Sabrina Shahrin Sharna. Detection of land cover of Dhaka city from satellite imageries. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  85. Widhi Dubey and Kapil Jain. Novel mplex PCR-RFLP method for detect of MTHFR 677C>T,482G>A Variant. – М.: LAP Lambert Academic Publishing, 2013. – 96 с.
  86. Bhushan Thekedar,Uwe Oeh and Herwig Paretzke. Detection Of Lung Cancer With Breath Gas. – М.: Scholars' Press, 2015. – 172 с.
  87. Richa Jackeray. POLYMER AND QUANTUM DOTS FOR IMMUNOBASED DETECTION OF S.TYPHI IN WATER. – М.: LAP Lambert Academic Publishing, 2011. – 220 с.
  88. He Li. INFRARED SPECTROSCOPIC DETECTION OF CHARGED PARTICLES. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  89. Pinkeshkumar Sutariya,Rinku Patel and Savan Darjee. Lower rim calix[4]arene fluoroionophore for detection of ions. – М.: Scholars' Press, 2015. – 76 с.
  90. Iyobosa Ogbeide. Optimisation of MALDI-TOF MS for the Detection of Omega-3 Fatty Acids. – М.: LAP Lambert Academic Publishing, 2013. – 180 с.
  91. Pinkeshkumar Sutariya,Rinkuben Patel and Kalpeshgiri Goswami. Functionalised calix[4]arene fluoroionophore for detection of ions. – М.: Scholars' Press, 2014. – 68 с.
  92. Zeinab Bakhshipour. Detection of Geotechnical Problems Using Resistivity Methods. – М.: LAP Lambert Academic Publishing, 2011. – 192 с.
  93. Stacey Santi,Glenn Parker and Stephanie Farkouh. Biology of sinus worm (Skrjabingylus) infections in Mustelid species. – М.: LAP Lambert Academic Publishing, 2012. – 168 с.
  94. Mariana Ghabrial,Ahmed Abbas and Ibrahim Zeid. Validity of oral fluid for detection of HCV among Egyptian children. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  95. Anshul Shrivastava. USE OF HLA-B27PCR TECHNIQUE FOR DETECTION OF ANKYLOSING SPONDYLITIS. – М.: LAP Lambert Academic Publishing, 2011. – 76 с.
  96. Sonu Gandhi. Antibody based biosensor for the detection of opiate drugs. – М.: LAP Lambert Academic Publishing, 2013. – 236 с.
  97. Domagoj Svegar. Change detection of facial emotional expressions. – М.: LAP Lambert Academic Publishing, 2014. – 144 с.
  98. Jepi Lentoijoni. The impact of climate change on food security. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  99. Timothy Ellah. Nigeria's Security Interest in the Gulf of Guinea:. – М.: LAP Lambert Academic Publishing, 2011. – 108 с.
  100. Elliot Hentov. Asymmetry of Interest. – М.: LAP Lambert Academic Publishing, 2012. – 312 с.
  101. Getachew Balcha Kelo and Desalegn Fekadu Etefa. The Role Of The Leadership To Ensure Good Governance in Ethiopia. – М.: LAP Lambert Academic Publishing, 2013. – 96 с.
  102. Anna Logun. Narcoterrorism as an international security threat. – М.: LAP Lambert Academic Publishing, 2012. – 172 с.
  103. Ina Tcaci. Threats to the Security in the Black Sea Area. – М.: LAP Lambert Academic Publishing, 2012. – 192 с.
  104. Debora Valentina MALITO. SOMALIA: THE END OF THE STATE. – М.: LAP Lambert Academic Publishing, 2011. – 112 с.
  105. Ayyaswamy Kathirvel,Srinivasan Rengaramanujam and Mohanambal Kathirvel. Prevention of attacks usign umpiring security model for manets. – М.: LAP Lambert Academic Publishing, 2012. – 192 с.
  106. Dessalegn Workineh. The post 1991 Resettlement in food security Lens in Ethiopia. – М.: LAP Lambert Academic Publishing, 2011. – 100 с.
  107. Arfan Ahmad,Masood Rabbani and Khushi Muhammad. Diagnostic Approaches for detection of BVDV Persistency in Dairy Herds. – М.: LAP Lambert Academic Publishing, 2011. – 140 с.
  108. Hakam Alfaqheri,Nidhal Ghaib and Mohammed Mehdi. Shear Bond Strength of Brackets Adhered to laser-Etch Versus Acid-Etch. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  109. Ahmed Ibrahim and Sanaa Eissa. Detection of Methylated RAR in the Urine of Bladder Cancer Patients. – М.: LAP Lambert Academic Publishing, 2012. – 248 с.
  110. Arnab Banerjee,ANIRUDDHA BHATTACHARYYA and DIPAYAN BOSE. IMPLEMENTATION OF A TRUST BASED SECURE ROUTING PROTOCOL IN MANET. – М.: LAP Lambert Academic Publishing, 2012. – 292 с.
  111. Sandeep Kr. Agarwal and Dr. K. V. Arya. Security in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  112. Heba Fathy Eid. Computational Intelligence in Network Intrusion Detection System. – М.: Scholars' Press, 2014. – 164 с.
  113. Suman Bala. Secure Routing in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 72 с.
  114. Kaushik Raviya. Performance Evaluation of Structured Peer To Peer Protocols. – М.: LAP Lambert Academic Publishing, 2012. – 156 с.
  115. Niroj Kumar Pani and Dr. Ashok Kumar Turuk. A Hybrid Zone-Based Routing Protocol for Secure Communication in MANET. – М.: LAP Lambert Academic Publishing, 2010. – 92 с.
  116. Saurabh Sharma and Sapna Gambhir. Cooperative Malicious Nodes Detection and Removal Scheme in MANETs. – М.: LAP Lambert Academic Publishing, 2014. – 108 с.
  117. Ramandeep Kaur. Packet dropping attack in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2014. – 52 с.
  118. Sushant Sudhakar Bahekar and Prashant Panse. Energy Efficient Mechanism for Detection of Wormhole Attacks. – М.: LAP Lambert Academic Publishing, 2014. – 72 с.
  119. Mohammad AlAhmad. Security threats of finger print biometric in network system. – М.: LAP Lambert Academic Publishing, 2014. – 88 с.
  120. Rakesh Jha. Security Issues In AD-HOC And Infrastructure (WLAN) Networks. – М.: LAP Lambert Academic Publishing, 2011. – 124 с.
  121. Rachna H. Key Management Approach in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  122. Yi Ren. Security Mechanisms in Unattended Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2013. – 164 с.
  123. Shilpa Jaiswal. Elimination of Security Threats Using Trusted Proactive Routing. – М.: LAP Lambert Academic Publishing, 2014. – 56 с.
  124. Shilpa Jaiswal and Sumeet Agrawal. Detection of Network Worm to Eliminate Security Threats in MANET. – М.: LAP Lambert Academic Publishing, 2012. – 52 с.
  125. Ahmed EzzEldin. Secure Clustering in Multi-Modal Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2013. – 84 с.
  126. Raj Shree and Ravi Prakash Pandey. Security Advancement in ZRP based Wireless Networks. – М.: LAP Lambert Academic Publishing, 2014. – 92 с.
  127. Manuj Mishra,Govind Sharma and Ram Pathak. Secure Routing In Wireless Mobile Ad Hoc Network. – М.: LAP Lambert Academic Publishing, 2014. – 84 с.
  128. Xiang Fan. Modeling and Simulations of Active Worms. – М.: LAP Lambert Academic Publishing, 2012. – 112 с.
  129. Mais Mohammed Hobi and Sarab Majeed Hameed. Biometrics for User Authentication Using Artificial Neural Networks. – М.: LAP Lambert Academic Publishing, 2013. – 108 с.
  130. Gunasekar Kumar and Anirudh Chelikani. Analysis of Security Issues in Cloud Based E-Learning. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  131. Igor Botian. Software Security Vulnerabilities in Mobile Peer-to-peer Environment. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  132. Oluwafemi Osho and Victor Waziri. Conceptual Models and Simulation of Computer Worm Propagation. – М.: LAP Lambert Academic Publishing, 2013. – 116 с.
  133. Hassen Alsafi and Mohammed Azhruddin. The Security Issues for Smart Grids Applications on Cloud Computing. – М.: LAP Lambert Academic Publishing, 2013. – 60 с.
  134. Amit Choudhary. Routing Security Issues in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2014. – 80 с.
  135. Keijo Haataja. Security Threats and Countermeasures in Bluetooth-Enabled Systems. – М.: LAP Lambert Academic Publishing, 2009. – 188 с.
  136. inayat ullah khan and Syed Majid Ali Shah Bukhari. SWOT Analysis of IP Multimedia Sub System Security Authentication. – М.: LAP Lambert Academic Publishing, 2010. – 52 с.
  137. Bhaarath Venkateswaran. Adaptive Internet Threat Forecasting. – М.: LAP Lambert Academic Publishing, 2011. – 116 с.
  138. Delphine Kessy,Dr Clifford Machogu and Dr Jairus Amayi. Impediments to granting loans to small scale farmers in Tanzania. – М.: LAP Lambert Academic Publishing, 2010. – 80 с.
  139. Eman A. Gani and Loay E. George. Detection of Diabetic Maculopathy Using Image Analysis Techniques. – М.: , 2014. – 164 с.
  140. Michael Hale Ligh, Andrew Case, Jamie Levy, AAron Walters. The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory. – М.: Wiley, . – 912 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Займы для корпораций: back to the Russia. Т. Мартынова, "Банковское обозрение", № 11, ноябрь 2007.
  2. Наука человековедения. интервью с Д. Уолтоном, профессором London Metropolitan University, экспертом CIPD. Chartered Institute of Personnel and Development, автором программы Master of Arts in Human Resource Strategies. И. Смирнова, "Кадровый менеджмент", № 5, июль-август 2007.
  3. Партнерство вместо подчинения. интервью с Дезо Хорватом, деканом Schulich School of Business. Р. Крецул, "Кадровый менеджмент", № 1, февраль 2006.
  4. Медицинская информатика в Web of Science: доля России в мировом публикационном потоке. Н.Г. Куракова, Л.А. Цветкова, "Врач и информационные технологии", № 4, июль-август 2012.
  5. Счет 97 - to be or not to be. Реквием. А.В. Анищенко, "Актуальные вопросы бухгалтерского учета и налогообложения", N 23, декабрь 2011 г.
  6. Зомбирование банков, или Too-big-to-fail problem. Г.Б. Петров, "Управление в кредитной организации", N 2, март-апрель 2011 г.
  7. Trade-in как способ обмена автомобиля. С.Н. Гордеева, "Торговля: бухгалтерский учет и налогообложение", N 2, февраль 2011 г.
  8. Back side of the moon, или темная сторона поведения персонала. интервью с Н. Русаковой, директором по персоналу ОАО "Хлебпром", А. Сукачёвым, директором "Торговой компании АС", Н. Харитоновой, руководителем службы персонала тверской компании ЗАО "ДКС". А. Колесникова, Т. Тюрина, С.  Машарипов, "Управление персоналом", N 16, август 2010 г.
  9. Использование Bill of Exchange в аккредитивной форме расчетов. Н.В. Букина, "Международные банковские операции", № 6, ноябрь-декабрь 2009.
  10. Проблемы применения универсальной юрисдикции in absentia. Г.А. Королев, "Журнал российского права", № 10, октябрь 2009.
  11. Тонкости trade-in. С.А.Королев, "НДС. Проблемы и решения", № 8, август 2009.
  12. Основной арсенал "охотника" - его network: кого он знает на рынке и качество этих отношений. С. Плетнева, "Управление персоналом", № 12, июнь 2009.
  13. In-store banking - новая модель банковского бизнеса. А. Пятков, "Банковское обозрение", № 11, ноябрь 2008.

Образцы работ

Тема и предметТип и объем работы
Особенности мотивационной составляющей корпоративной культуры ОАО «Нижновэнерго»
Менеджмент
Диплом
100 стр.
Последствия операции НАТО
Политология
Диплом
80 стр.
Роль ОБСЕ в урегулировании конфликтов в Европе
Политология
Курсовая работа
33 стр.
Проблемы реформирования ОБСЕ
Политология
Курсовая работа
29 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Ольга
Здравствуйте, Ирина! Хочу сказать Вам ОГОРОМНОЕ СПАСИБО за Вашу помощь в сопровождении диплома!!! Тем более, что это делалось в экстренном режиме!!!