Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Shilpa Jaiswal. Elimination of Security Threats Using Trusted Proactive Routing. – М.: LAP Lambert Academic Publishing, 2014. – 56 с.

Дополнительные результаты

  1. Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с.
  2. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с.
  3. Harrison Snow. The Power of Team Building: Using Rope Techniques. – М.: Pfeiffer, 1992. – 216 с.
  4. Patricia A. Davis. The Art of Economic Persuasion: Positive Incentives and German Economic Diplomacy. – М.: University of Michigan Press, 2000. – 216 с.
  5. Henry L. Diamond, Patrick F. Noonan, Lincoln Institute of Land Policy. Land Use in America. – М.: , 0. – 0 с.
  6. William Rini. Mathematics of the Securities Industry. – М.: , 0. – 0 с.
  7. Donald Bruce Keim, William T. Ziemba. Security Market Imperfections in World Wide Equity Markets (Publications of the Newton Institute , No 9). – М.: , 0. – 0 с.
  8. Barrie A. Wigmore. The Crash and Its Aftermath : A History of Securities Markets in the United States, 1929-1933 (Contributions in Economics and Economic History). – М.: , 0. – 0 с.
  9. L. Jean Camp. Trust and Risk in Internet Commerce. – М.: , 0. – 0 с.
  10. Seymour Bosworth, Michel E. Kabay. Computer Security Handbook. – М.: , 0. – 0 с.
  11. Steve Purser. A Practical Guide to Managing Information Security (Artech House Technology Management Library). – М.: , 0. – 0 с.
  12. Encyclopedia of Security Management : Techniques and technology. – М.: , 0. – 0 с.
  13. James A. Rosenthal, Juan M. Ocampo. Securitization of Credit: Inside the New Technology of Finance. – М.: , 0. – 0 с.
  14. Geoff Der, Brian S. Everitt. Handbook of Statistical Analyses Using SAS, Second Edition. – М.: , 0. – 0 с.
  15. Economics of Information Security (Advances in Information Security). – М.: , 2004. – 0 с.
  16. Ronald L. Mendell. The Quiet Threat: Fighting Industrial Espionage in America. – М.: , 2003. – 0 с.
  17. Convention on the Elimination of All Forms of Discrimination Against Women and Its Optional Protocol. – М.: , 2003. – 0 с.
  18. Rickland Hollar. Enterprise Web Services Security (Internet Series). – М.: , 2005. – 432 с.
  19. Ira Winkler. Zen and the Art of Information Security. – М.: , 2007. – 192 с.
  20. Environmental Security and Public Safety (NATO Security through Science Series / NATO Security through Science Series C: Environmental Security). – М.: , 2007. – 200 с.
  21. Committee on Federal Regulation of Securities Committee. The Fund Director's Guidebook: Third Edition (Fund Director's Guidebook). – М.: , 2006. – 128 с.
  22. Frank J. Fabozzi, Steven V. Mann. Securities Finance: Securities Lending and Repurchase Agreements (Frank J. Fabozzi Series). – М.: , 2005. – 351 с.
  23. Jeffrey M. Stanton, Kathryn R. Stam. The Visible Employee: Using Workplace Monitoring and Surveillance to Protect Information Assets-Without Compromising Employee Privacy or Trust. – М.: , 2006. – 272 с.
  24. John G. Miller. Flipping the Switch...: Unleash the Power of Personal Accountability Using the QBQ!. – М.: , 2005. – 144 с.
  25. John J. Fay. Encyclopedia of Security Management. – М.: Butterworth-Heinemann, 2007. – 688 с.
  26. Roy H. Campbell, Prasad G. Naldurg. Security and Survivability: Analyzing, Modeling, and Verifying Dynamic Recovery in Insecure Systems. – М.: , 2008. – 240 с.
  27. Dick Morris, Eileen Mcgann. Fleeced: How Barack Obama, Media Mockery of Terrorist Threats, Liberals Who Want to Kill Talk Radio, the Do-Nothing Congress, Companies That Help Iran, and Washington Lobbyists for Foreign Governments Are Scamming Us ... and What to Do About It. – М.: , 2008. – 352 с.
  28. Prospectus for the Public Offering of Securities in Europe: Volume 1: European and National Legislation in the Member States of the European Economic Area (Law Practitioner Series). – М.: , 2008. – 514 с.
  29. Max Isaacman. Investing with Intelligent ETFs: Strategies for Profiting from the New Breed of Securities (McGraw-Hill Finance & Investing). – М.: , 2008. – 256 с.
  30. Jim Stickley. The Truth About Identity Theft (Truth About). – М.: , 2008. – 208 с.
  31. Social and Human Elements of Information Security: Emerging Trends and Countermeasures (Premier Reference Source). – М.: , 2008. – 412 с.
  32. Gerard Blokdijk, Ivanka Menken. Information Security Management Best Practice Workbook: Implementation and Management Roadmap for Threats, Challenges and Solutions - Ready to use supporting documents bringing Theory into Practice. – М.: , 2008. – 124 с.
  33. Ivanka Menken. Virtualization Architecture, Adoption and Monetization of Virtualization Projects using Best Practice Service Strategy, Service Design, Service Transition, ... and Continual Service Improvement Processes. – М.: , 2008. – 164 с.
  34. Brett Wilder. The Quiet Millionaire: Eliminate Financial Stress and Accumulate Wealth for a Lifetime of Security and Independence. – М.: , 2009. – 438 с.
  35. Marc Hoffman. Harnessing the Power of the Charitable Remainder Trust - 8th. – М.: , 2010. – 348 с.
  36. Council of Europe. Asylum and the European Convention on Human Rights (Human Rights Files No. 9) (2010). – М.: , 2010. – 283 с.
  37. Patrick S. Collins. Regulation of Securities, Markets, and Transactions. – М.: , 2011. – 448 с.
  38. David Naftz. Handbook of Groundwater Remediation using Permeable Reactive Barriers. – М.: , 2010. – 544 с.
  39. Russ Rogers. Network Security Evaluation Using the NSA IEM. – М.: , 2010. – 450 с.
  40. Suzanne Keene. Fragments of the World: Uses of Museum Collections. – М.: , 2010. – 208 с.
  41. Pamela A. Collins. Principles of Security and Crime Prevention. – М.: , 2010. – 490 с.
  42. Imtiaz Ahmed. Use of Waste Materials Used in Highway Construction. – М.: , 2010. – 125 с.
  43. Paul Robinson. Dictionary of International Security. – М.: , 2007. – 208 с.
  44. Robert Legvold. Swords and Sustenance – The Economics of Security in Belarus and Ukraine. – М.: , 2004. – 256 с.
  45. Keeley. Experimental Determination of Stone Tool Uses (Paper Only). – М.: , 1980. – 320 с.
  46. Dan Lindley. Promoting Peace with Information – Transparency as a Tool of Security Regimes. – М.: , 2007. – 304 с.
  47. Robert Legvold. Swords and Sustenance – The Economics of Security in Belarus and Ukraine. – М.: , 2004. – 256 с.
  48. AS KRAMER. Kramer: Taxation Of ?securities? Commodities & Opt Ions1989 Cumulative ?supplement? (pr Only). – М.: , 1989. – 396 с.
  49. JH HALPERIN. Halperin Private Placement Of ?securities 1985 Supplement?. – М.: , 1985. – 50 с.
  50. JH HALPERIN. Halperin Private Placement Of ?securities?. – М.: , 1984. – 350 с.
  51. AS KRAMER. Kramer: Taxation Of ?securities? Commodities & Opt Ions?1987 Cumulative Supp No.2? (pr Only). – М.: , 1987. – 338 с.
  52. John Viega. The Myths of Security. – М.: , 2009. – 260 с.
  53. F Blakey. The Florida Phosphate Industry a History of the Development & use of Vital Mineral. – М.: , 1974. – 190 с.
  54. David Rook. 10 Principles of Secure Web Application Development. – М.: , 2010. – 408 с.
  55. Microsoft. Improving Web Application Security – Threats and Countermeasures. – М.: , 2003. – 960 с.
  56. Mitch Tulloch. Microsoft Encyclopedia of Security. – М.: , 2003. – 480 с.
  57. Vl Smith. Investment & Production – A Study in the Theory of the Capital–Using Enterprise. – М.: , 1974. – 352 с.
  58. J Hermes. Reading Women?s Magazines: An Analysis of Everyday Media Use. – М.: , 1995. – 0 с.
  59. AS KRAMER. Kramer: Taxation Of ?securities? Commodities & Opt Ions. – М.: , 1986. – 896 с.
  60. J HALPERIN. Halperin: Private Placement Of ?securities? 1988 Cumulative Supplement (pr Only). – М.: , 1988. – 82 с.
  61. Bender. East Europe in Search of Security. – М.: , 1972. – 0 с.
  62. Bender. East Europe in Search of Security. – М.: , 1972. – 0 с.
  63. Hacking Exposed Web 2.0: Web 2.0 Security Secrets And Solutions. – М.: , 2011. – 258 с.
  64. Perfect Phrases For Building Strong Teams: Hundreds Of Ready-To-Use Phrases For Fostering Collaboration, Encouraging Communication, And Growing A Winning Team. – М.: , 2011. – 176 с.
  65. Perfect Phrases For Writing Company Announcements: Hundreds Of Ready-To-Use Phrases For Powerful Internal And External Communications. – М.: , 2011. – 224 с.
  66. Perfect Phrases For Sales Presentations: Hundreds Of Ready-To-Use Phrases For Delivering Powerful Presentations That Close Every Sale. – М.: , 2011. – 208 с.
  67. Security Information And Event Management (Siem) Implementation. – М.: , 2011. – 464 с.
  68. Perfect Phrases For Conflict Resolution: Hundreds Of Ready-To-Use Phrases For Encouraging A More Productive And Efficient Work Environment. – М.: , 2011. – 176 с.
  69. Perfect Phrases For Leadership Development: Hundreds Of Ready-To-Use Phrases For Guiding Employees To Reach The Next Level. – М.: , 2011. – 192 с.
  70. Fundamentals Of Network Security. – М.: , 2011. – 672 с.
  71. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . –  с.
  72. Eduardo Fernandez-Buglioni. Security Patterns in Practice: Designing Secure Architectures Using Software Patterns. – М.: Wiley, 2013. – 582 с.
  73. Ahmed Mohamad Abed Al-janaby. Modeling and Simulation of Photovoltaic Module using Matlab Simulink. – М.: LAP Lambert Academic Publishing, 2015. – 156 с.
  74. Abhishek Roy,Sunil Karforma and Subhadeep Banik. Implementation Of Authentication In E-Governance–an Uml Based Approach. – М.: LAP Lambert Academic Publishing, 2013. – 116 с.
  75. Varun Barthwal,Jaydeep Kishore and Bhagawati Prasad Joshi. Estimation of Software Metrics using Function Point Analysis. – М.: LAP Lambert Academic Publishing, 2013. – 84 с.
  76. V. Siva Brahmaiah Rama,Deepak Sharma and Sheetal Joshi. Elimination of harmonics using power electronics equipments. – М.: LAP Lambert Academic Publishing, 2012. – 56 с.
  77. Shaek Rana Mohammad Baki Billah and Mohammad Hafizur Rahman. Design & Development of Network Security System using IP Tables. – М.: LAP Lambert Academic Publishing, 2013. – 164 с.
  78. Rapudo Onyango. Impact of Adoption and Use of Mobile Phone Technology. – М.: LAP Lambert Academic Publishing, 2014. – 108 с.
  79. Nitin Kanzariya and Ashish Nimavat. Security of Digital Image Using Hybrid Steganography. – М.: LAP Lambert Academic Publishing, 2013. – 84 с.
  80. Samundiswary Punniakodi and Dananjayan Perumal. Trust Based Routing Protocols for Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2015. – 120 с.
  81. Tasnuva Ahmed,Rabiul Hossain and Dipesh Barua. Security System Using Ultrasound. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  82. JAYACHANDRA PRASAD TALARI,Dr.G.Rama Chandra Reddy and Dr.K.Satya Prasad. PROCESSING OF COMPLEX SIGNALS USING RELATION FUNCTION. – М.: LAP Lambert Academic Publishing, 2010. – 84 с.
  83. Sarat Kumar Sahoo. Speed Control of Induction Motor Using Microcontroller. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  84. Soumya Shatakshi Panda and Alisha Mahapatro. A Custom Digital Implementation of IC SN74LS682 using CADENCE Tools. – М.: LAP Lambert Academic Publishing, 2013. – 108 с.
  85. Ida Ayu Dwi Giriantari. Condition Monitoring of Composite Insulator using PD Analysis. – М.: LAP Lambert Academic Publishing, 2010. – 216 с.
  86. A. C. Suthar,D. D. Shah and G. R. Kulkarni. Implementation of Secured Color Image Authentication and Protection. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.
  87. Constantinos Votis. Experimental Consideration of Channel Capacity Using MIMO Technology. – М.: LAP Lambert Academic Publishing, 2013. – 280 с.
  88. Anupam Kumar,Vijay Kumar and Manoj Kumar Panda. Tracking Performance Of Maglev System Using Type-2 Fuzzy Logic Control. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  89. Simant Srivastava. ANALYSIS OF THICK PLATE USING FINITE ELEMENT METHOD. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  90. Saima Afzal. Non-Traditional Security Threats to Pakistan Post 9/11. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  91. Yuliya Lyamzina. Hidden and Indirect Effects of War and Political Violence. – М.: LAP Lambert Academic Publishing, 2014. – 104 с.
  92. Mohammed Azmathullah,Asrar Sheriff and Sultan Mohideen. Biocontrol of Mosquito Larvae using Calotropis procera. – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  93. Mrutunjaya Bhuyan. Properties of finite nuclei using effective interaction. – М.: LAP Lambert Academic Publishing, 2014. – 156 с.
  94. Anshita Purohit,Pradeep Verma and Naimesh Patel. Analysis of genetic diversity of Castor cultivars using RAPD. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  95. Narayan Babu Dhital. Evaluating protected area network of Nepal by using GIS. – М.: LAP Lambert Academic Publishing, 2013. – 64 с.
  96. Muhammad Yaseen. HDS Of Fuel Oils Using InSitu Hydrogen Generated Via Alcohol Reforming. – М.: LAP Lambert Academic Publishing, 2014. – 156 с.
  97. Yakubu Azeh and Gabriel Ademola Olatunji. Acetylation Of Wood Cellulose Using Ketene. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  98. Elaheh Kowsari and Issa Yavari. Green chemistry-A new paradigm of organic synthesis using ILs. – М.: LAP Lambert Academic Publishing, 2011. – 128 с.
  99. Tommy Dalgaard. Simulation and Generalisation of Agricultural Resource Use. – М.: LAP Lambert Academic Publishing, 2010. – 192 с.
  100. Arshad Amin and Arif Amin. Study of Urban Land Use Dynamics (A Geospatial Approach). – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  101. S. Balachandar,G. Usharani and G. Kalaivani. Land Use, Land Cover Mapping of ‘H’ and ‘J’ Blocks of FC&RI using GIS. – М.: LAP Lambert Academic Publishing, 2014. – 56 с.
  102. Evangelin Hema Mariya,Dhivya Rajasankaran and Aswini Ramaswamy. Trusted Data Forwarding using POR in Manet. – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  103. Nazia Akbar,Habib Ahmad and Imtiaz Ahmad. Genetic Characterization Of Capsicum Germplasm Using Molecular Markers. – М.: LAP Lambert Academic Publishing, 2014. – 112 с.
  104. Unaza Saqib,Hiba Saqib and Humaira Tariq. Biosorption of Chromium (VI) using Plant Biomass. – М.: LAP Lambert Academic Publishing, 2012. – 128 с.
  105. Xun Liu. Assessment of New Energy Use Policy in Land Use Planning. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  106. Imran Ali Sandano. Separatist Movement of Balochistan. – М.: LAP Lambert Academic Publishing, 2014. – 128 с.
  107. MURTAZA IQBAL. The Real Counterinsurgency, Winning Hearts and Repairing Minds. – М.: LAP Lambert Academic Publishing, 2011. – 160 с.
  108. Jerrin Yomas. SSL based implementation of RFC2289 with dual factor token using GSM. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  109. Ayyaswamy Kathirvel,Srinivasan Rengaramanujam and Mohanambal Kathirvel. Prevention of attacks usign umpiring security model for manets. – М.: LAP Lambert Academic Publishing, 2012. – 192 с.
  110. Jignesh Patel and Arjun Dhami. Evaluation of Quality and Fertility of Bovine Semen using CASA. – М.: LAP Lambert Academic Publishing, 2014. – 156 с.
  111. Benito Mng'ong'o,Estomih Massawe and David Henwood. Mathematical modelling of a beam using finite element method. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  112. Emil Setic. Tax implications of transfer pricing use: Transfer pricing regulation in the world, European union and Republic Croatia. – М.: LAP Lambert Academic Publishing, 2014. – 214 с.
  113. Marina Agaltsova. Elimination of Child Labor:. – М.: LAP Lambert Academic Publishing, 2010. – 100 с.
  114. Munyabarenzi Faustin. The incidence of security interest in movable property. – М.: LAP Lambert Academic Publishing, 2013. – 84 с.
  115. Yury Nizovtsev,Artemiy Nisovtsev and Vladimir Nisovtsev. New approach to the Elimination of near-surface Inflammations. – М.: LAP Lambert Academic Publishing, 2014. – 56 с.
  116. Ataklti Tesfay. The Practice of Teachers in Using Short story to teach Reading Skills. – М.: LAP Lambert Academic Publishing, 2014. – 72 с.
  117. Nooruldeen Qader and Loay George. Design and Implement a Secure Database Using Multi Level Security. – М.: LAP Lambert Academic Publishing, 2014. – 124 с.
  118. Rayala Upendar Rao and K. Palanivel. Secure Routing In Cluster Based Wireless Sensor Network By Using ECC. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  119. Abbas Mehdizadeh Zare Anari and Ayyoub Akbari Moghanjoughi. Route optimization security in mobile IPv6 networks. – М.: LAP Lambert Academic Publishing, 2012. – 116 с.
  120. Ramandeep Kaur. Packet dropping attack in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2014. – 52 с.
  121. P. Ganesh Kumar and S. Ramesh. Secure Routing Protocol for ICMN. – М.: LAP Lambert Academic Publishing, 2014. – 64 с.
  122. Mohammad AlAhmad. Security threats of finger print biometric in network system. – М.: LAP Lambert Academic Publishing, 2014. – 88 с.
  123. Shilpa Jaiswal. Elimination of Security Threats Using Trusted Proactive Routing. – М.: LAP Lambert Academic Publishing, 2014. – 56 с.
  124. Shilpa Jaiswal and Sumeet Agrawal. Detection of Network Worm to Eliminate Security Threats in MANET. – М.: LAP Lambert Academic Publishing, 2012. – 52 с.
  125. Christian Chetachi Umunna. Distributed Intrusion Detection System in Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 104 с.
  126. Gergely Acs. Secure Routing in Multi-hop Wireless Networks. – М.: LAP Lambert Academic Publishing, 2010. – 116 с.
  127. Nitin Goel. EPSAR: An Efficient Power Saving Adaptive Routing Protocol for MANETs. – М.: LAP Lambert Academic Publishing, 2012. – 124 с.
  128. E. Madhusudhana Reddy. Development of Secure Protocols for MHIS Using RMPJK–RSA Cryptosystem. – М.: LAP Lambert Academic Publishing, 2011. – 204 с.
  129. Gunasekar Kumar and Anirudh Chelikani. Analysis of Security Issues in Cloud Based E-Learning. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  130. Abdulwahab Lawan and Kabiru Jinjiri Ringim. On the Unified Theory of Acceptance and Use of Technology. – М.: LAP Lambert Academic Publishing, 2012. – 228 с.
  131. Rajendra Purohit. Performance Evolution of IP SAN using Mirroring. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  132. Keijo Haataja. Security Threats and Countermeasures in Bluetooth-Enabled Systems. – М.: LAP Lambert Academic Publishing, 2009. – 188 с.
  133. Noor Ul Amin. Secure MANET Communication Based on Hybrid Cryptosystem. – М.: LAP Lambert Academic Publishing, 2013. – 64 с.
  134. Eric Amankwa. Assessment of Security Controls. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  135. Marco Balduzzi. Automated Measurements of Novel Internet Threats. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  136. Haneen Qarabash. An Intranet Based System For Securities Trading. – М.: LAP Lambert Academic Publishing, 2013. – 84 с.
  137. Waqar Akram and ZAKIR HUSSAIN. Constraint’s Analysis of Agricultural Credit Use in Pakistan. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.
  138. Stephane Rouhier. Environmental impact of rising energy use in China. – М.: LAP Lambert Academic Publishing, 2011. – 380 с.
  139. Jan Fuka. Management of Crisis Situations in Company Using Game Theory. – М.: Scholars' Press, 2014. – 52 с.
  140. Tirfu Hedeto. Determinants of Inorganic Fertilizers Use. – М.: LAP Lambert Academic Publishing, 2013. – 88 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Наука человековедения. интервью с Д. Уолтоном, профессором London Metropolitan University, экспертом CIPD. Chartered Institute of Personnel and Development, автором программы Master of Arts in Human Resource Strategies. И. Смирнова, "Кадровый менеджмент", № 5, июль-август 2007.
  2. Партнерство вместо подчинения. интервью с Дезо Хорватом, деканом Schulich School of Business. Р. Крецул, "Кадровый менеджмент", № 1, февраль 2006.
  3. Медицинская информатика в Web of Science: доля России в мировом публикационном потоке. Н.Г. Куракова, Л.А. Цветкова, "Врач и информационные технологии", № 4, июль-август 2012.
  4. Back side of the moon, или темная сторона поведения персонала. интервью с Н. Русаковой, директором по персоналу ОАО "Хлебпром", А. Сукачёвым, директором "Торговой компании АС", Н. Харитоновой, руководителем службы персонала тверской компании ЗАО "ДКС". А. Колесникова, Т. Тюрина, С.  Машарипов, "Управление персоналом", N 16, август 2010 г.
  5. Использование Bill of Exchange в аккредитивной форме расчетов. Н.В. Букина, "Международные банковские операции", № 6, ноябрь-декабрь 2009.

Образцы работ

Тема и предметТип и объем работы
Многостороннее регулирование внешней торговли
Международные экономические отношения
Диплом
154 стр.
Последствия операции НАТО
Политология
Диплом
80 стр.
Платежные системы в Интернете
Информатика
Диплом
102 стр.
Управление финансами малого бизнеса
Анализ финансово-хозяйственной деятельности предприятия
Диплом
101 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Полина
Доброе утро, Лилия! С радостью хотела сообщить, что диплом после вашего сопровождения успешно сдан и защищен на отлично. Спасибо!