Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Sampath V.P. FPGA Based Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  2. Huang-Chun Roan. Network Intrusion Detection Based on Shift-OR Circuit. – М.: LAP Lambert Academic Publishing, 2011. – 60 с.
  3. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.

Дополнительные результаты

  1. Douglas M. Patterson, Richard A. Ashley. A Nonlinear Time Series Workshop - A Toolkit for Detecting and Identifying Nonlinear Serial (DYNAMIC MODELING AND ECONOMETRICS IN ECONOMICS AND). – М.: , 0. – 0 с.
  2. Safe Schools: A Security and Loss Prevention Plan. – М.: , 0. – 0 с.
  3. Gabriel Burstein. Macro Trading & Investment Strategies : Macroeconomic Arbitrage in Global Markets (Wiley Trading Advantage Series). – М.: , 0. – 0 с.
  4. Dorothy E. Denning, Peter J. Denning. Internet Besieged. – М.: , 0. – 0 с.
  5. Paul Piccard, Jeremy Faircloth. Combating Spyware in the Enterprise. – М.: , 2006. – 386 с.
  6. Towards a Knowledge Based Economy?: Knowledge And Learning in European Educational Research. – М.: , 2005. – 246 с.
  7. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с.
  8. Based on the Occupational Outlook Handbo. Top 300 Careers: Your Complete Guideboook to Major Jobs in Every Field (America's Top 300 Jobs). – М.: , 2006. – 766 с.
  9. Commonwealth Secretariat. Tax Audit Techniques in Cash Based Economies: A Practical Guide. – М.: , 2006. – 86 с.
  10. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с.
  11. Trust, Privacy and Security in Digital Business: 5th International Conference, TrustBus 2008 Turin, Italy, September 1-5, 2008, Proceedings (Lecture Notes in Computer Science). – М.: , 2008. – 205 с.
  12. Optimizing Molecular Methods to Detect Human Caliciviruses in Environmental Samples. – М.: , 2008. – 84 с.
  13. Based on Dave Ellis' Becoming a Master Student. From Master Student to Master Employee. – М.: , 2010. – 384 с.
  14. Mark A. Franklin, Patrick Crowley, Haldun Hadimioglu, Peter Z. Onufryk. Network Processor Design, Volume 3: Issues and Practices. – М.: Morgan Kaufmann, 2005. – 336 с.
  15. Shankar Narasimhan, S. Narasimhan, C. Jordache. Data Reconciliation and Gross Error Detection: An Intelligent Use of Process Data. – М.: Gulf Professional Publishing, 2006. – 428 с.
  16. Keith Chugg, Achilleas Anastasopoulos, Xiaopeng Chen. Iterative Detection - Adaptivity, Complexity Reduction, and Applications. – М.: Springer, 2000. – 392 с.
  17. Rory Bray. OSSEC Host-Based Intrusion Detection Guide. – М.: , 2010. – 416 с.
  18. Syngress. Snort Intrusion Detection 2.0. – М.: , 2010. – 550 с.
  19. Brian Caswell. Snort Intrusion Detection and Prevention Toolkit. – М.: , 2010. – 768 с.
  20. Robert Barnard. Intrusion Detection Systems. – М.: , 2010. – 480 с.
  21. Terry Escamilla. Intrusion Detection. – М.: , 1998. – 368 с.
  22. Hacking Exposed Malware And Rootkits. – М.: , 2011. – 400 с.
  23. Fundamentals Of Network Security. – М.: , 2011. – 672 с.
  24. Greg Holden. Guide to Firewalls and Network Security: Intrusion Detection and VPNs. – М.: Course Technology, 2003. – 512 с.
  25. Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky. Cisco Security Professional's Guide to Secure Intrusion Detection Systems. – М.: , . –  с.
  26. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . –  с.
  27. Scott Hauck, Andre DeHon. Reconfigurable Computing: The Theory and Practice of FPGA-Based Computation. – М.: Morgan Kaufmann, 2007. – 944 с.
  28. Ido Dubrawsky. How to Cheat at Securing Your Network. – М.: Syngress, 2007. – 432 с.
  29. Andrea Monteriu. Fault Detection and Isolation for Multi-Sensor Navigation Systems. – М.: LAP Lambert Academic Publishing, 2014. – 172 с.
  30. Dongqing Chen. Curvature Analysis Based Framework for Virtual Colonoscopy. – М.: LAP Lambert Academic Publishing, 2010. – 112 с.
  31. Nguyen Hong Quang. Carbon Nanotube-based Gas Sensors. – М.: LAP Lambert Academic Publishing, 2010. – 136 с.
  32. Anup Bhange and Manmeet Kaur Marhas. Anomaly Detection in Network Traffic; A Statistical Approach. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  33. Peifang Guo and Prabir Bhattacharya. A Model Based Framework for Object Detection via Data Transformation. – М.: LAP Lambert Academic Publishing, 2013. – 64 с.
  34. Yasir Amir Khan, A. Shaikh, A. Samad. Sentry Gun with Face Detection. – М.: LAP Lambert Academic Publishing, 2011. – 96 с.
  35. Xuan Kong and Steve C.S. Cai. Framework of Damage Detection in Vehicle-Bridge Coupled System. – М.: LAP Lambert Academic Publishing, 2013. – 260 с.
  36. Gulshan Kumar. Effective Intrusion Detection using Genetic Algorithms. – М.: LAP Lambert Academic Publishing, 2014. – 100 с.
  37. Peichung Shih. Facial Analysis in Video: Detection and Recognition. – М.: Scholars Press, 2013. – 176 с.
  38. Tanmoy Hazra. Application of PCA in IDS. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  39. Mohammed Nadeemullah Shareef. Detection and Diagnosis of Plant-wide Oscillations. – М.: LAP Lambert Academic Publishing, 2013. – 144 с.
  40. Payam Ghadirian. GIS-based Augmented Reality. – М.: LAP Lambert Academic Publishing, 2009. – 152 с.
  41. Naveen K. S. Moving Object Detection & Scenelock Tracking System. – М.: LAP Lambert Academic Publishing, 2011. – 108 с.
  42. Samundiswary Punniakodi and Dananjayan Perumal. Trust Based Routing Protocols for Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2015. – 120 с.
  43. Suhaas Bhargava Ayyagari. Artificial Neural Network Based Fault Location For Transmission Lines. – М.: LAP Lambert Academic Publishing, 2012. – 124 с.
  44. Anamika Jain. Ann Based Fault Detection, Classification and Distance Location. – М.: LAP Lambert Academic Publishing, 2011. – 140 с.
  45. Rameshwar Murade,Pavan Ingale and Rahul Kale. Design & Implementation of Programmable CRC Computation using FPGA. – М.: LAP Lambert Academic Publishing, 2014. – 104 с.
  46. Hadi T. Ziboon and Wasan S. Rasheed. Adaptive Channel for Mobile Communication Based on SDR. – М.: LAP Lambert Academic Publishing, 2014. – 172 с.
  47. Priyadarshi Kanungo and Pradipta Kumar Nanda. PGA Based Thresholding Schemes for Image Segmentation. – М.: LAP Lambert Academic Publishing, 2012. – 288 с.
  48. Vibhooti Sinha. Bandwidth Efficient Design of Wideband Integrator on FPGA. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  49. Venkatalakshmaiah Madiga and Sreenivasamurthy Ke. FPGA based Digital filtering for different applications. – М.: LAP Lambert Academic Publishing, 2015. – 132 с.
  50. Shui-cheong Kam. Assessing of Circuit Breaker Restrike Risks Using Computer Simulation. – М.: LAP Lambert Academic Publishing, 2012. – 380 с.
  51. Hadi T. Ziboon and Ikhlas M. Farhan. Design and Implementation of Discrete Multitone Modulator Using FPGA. – М.: LAP Lambert Academic Publishing, 2014. – 136 с.
  52. Md. Fasiul Alam and Md. Delwar Hossain. Microcontroller Based Security System. – М.: LAP Lambert Academic Publishing, 2013. – 92 с.
  53. Vahid Roostaie. Memory Subsystem in Multicore Architectures. – М.: LAP Lambert Academic Publishing, 2014. – 172 с.
  54. Subhankar Shome,Rabindra Nath Bera and Samarendra Nath Sur. Spread Spectrum Radar based Doppler Extraction using 2P-Power Method. – М.: LAP Lambert Academic Publishing, 2014. – 56 с.
  55. Naveen K. S. Histogram Equalization & PCA based Face Recognition on MATLAB Platform. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  56. Arindam Sarkar and J. K. Mandal. Artificial Neural Network Guided Secured Communication Techniques. – М.: LAP Lambert Academic Publishing, 2012. – 128 с.
  57. Ian Scott. Practical FPGA Based Direct Conversion VHF Radio Design. – М.: LAP Lambert Academic Publishing, 2012. – 128 с.
  58. Saifur Sabuj. Microcontroller Based Friend or Foe (FoF) Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 52 с.
  59. Sampath V.P. FPGA Based Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  60. Jai Sukh Paul Singh. Cognitive Radio Spectrum Sensing and its Performance Analysis. – М.: LAP Lambert Academic Publishing, 2013. – 124 с.
  61. Victoria Jane Nakanwagi. Design and Implementation of a Remote FPGA iLab. – М.: LAP Lambert Academic Publishing, 2011. – 120 с.
  62. Hammad Khan. PID Controller:Comparative Analysis and Design of Diverse Realizations. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  63. Joydip Jana and Mahendra Lad. A Fast Feedback Control System using FPGA for RF signals. – М.: LAP Lambert Academic Publishing, 2013. – 96 с.
  64. Manav Shah. FPGA Based Self-test Systems. – М.: LAP Lambert Academic Publishing, 2012. – 116 с.
  65. Rashi Kohli and Manoj Kumar. Cryptographic on System-Chip-Design Using VLSI Technique. – М.: LAP Lambert Academic Publishing, 2013. – 92 с.
  66. Huang-Chun Roan. Network Intrusion Detection Based on Shift-OR Circuit. – М.: LAP Lambert Academic Publishing, 2011. – 60 с.
  67. Avvaru Srinivasulu. FPGA implementation of Hopfield Neural Network. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  68. Shabiul Islam,M. Othman and P.K. Choudhury. FPGA Based Image Compression. – М.: LAP Lambert Academic Publishing, 2010. – 152 с.
  69. M. Sadiq Ali Khan and S. M. Aqil Burney. Recent Trends in Intrusion Detection System & Network Monitoring. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  70. Harshanee C. Rajapakshe. Detect Antibodies Against Ascariasis. – М.: LAP Lambert Academic Publishing, 2014. – 52 с.
  71. Yi Xin. Mid-IR-based Gas Detection System Analysis Model. – М.: LAP Lambert Academic Publishing, 2011. – 136 с.
  72. Bouraoui Ouni. Optimization Algorithms For Reconfigurable FPGA Based Architectures. – М.: LAP Lambert Academic Publishing, 2012. – 200 с.
  73. Nandini Manoli,Nandish Manoli and Murali Dhar. Manual Liquid Based Cytology Method For Detection of Cervical Cancer. – М.: LAP Lambert Academic Publishing, 2012. – 140 с.
  74. Ahmed Omar Abdallah,Tarek Moustafa Mahmoud and Tarek Abd. El-Hafeez Abd. El-Rahman. Filtering Pornography Based on Face Detection and Content Analysis. – М.: LAP Lambert Academic Publishing, 2014. – 88 с.
  75. Zelalem Weldesenbet. A Metric Based Automatic Code Smell Detection Tool. – М.: LAP Lambert Academic Publishing, 2014. – 92 с.
  76. Sambit Bakshi. Development of Robust Iris Localization and Impairment Pruning Schemes. – М.: LAP Lambert Academic Publishing, 2011. – 76 с.
  77. Shiblee Sadik. Outlier Detection for Data Streams. – М.: LAP Lambert Academic Publishing, 2011. – 200 с.
  78. Abhay Nath Singh. Honeypot Based Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  79. Shahnawaz Husain,S. C. Gupta and R. C. Joshi. Intrusion Detection Engine for Adhoc Environment. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  80. Sumaya Saad Sulaiman and Sarab M. Hameed. A Fuzzy Based Clustering for Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  81. Shubha Puthran and Ketan Shah. Intrusion Detection System using datamining techniques. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  82. Mohammad S. I. Mamun. Intrusion Detection System Architecture in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  83. Heba Fathy Eid. Computational Intelligence in Network Intrusion Detection System. – М.: Scholars' Press, 2014. – 164 с.
  84. Janakiraman S. Distributed Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 164 с.
  85. Yogesh Kumar,Krishan Kumar and Gulshan Kumar. Feature Selection For Intrusion Detection Systems. – М.: LAP Lambert Academic Publishing, 2014. – 100 с.
  86. Srikanth Hariharan,Ness B. Shroff and Saurabh Bagchi. Secure Neighbor Discovery in Wireless Networks. – М.: LAP Lambert Academic Publishing, 2011. – 52 с.
  87. Saad Usman. Spatio Temporal Anomaly Detector. – М.: LAP Lambert Academic Publishing, 2011. – 84 с.
  88. Syed Zahidur Rashid. Computer Network Security Monitoring. – М.: Scholars' Press, 2015. – 284 с.
  89. K. Shaila and K. R. Venugopal. Secure Data Communication in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2014. – 240 с.
  90. V. G. Shelake and R. K. Kamat. A Monogram On Design And Development Of FPGA Based Firewall. – М.: LAP Lambert Academic Publishing, 2014. – 100 с.
  91. Lanier Watkins. Resource Discovery: Using Network Traffic To Infer CPU And Memory Load. – М.: LAP Lambert Academic Publishing, 2014. – 96 с.
  92. Gulshan Kumar. Effective Intrusion Detection using Feature Selection. – М.: LAP Lambert Academic Publishing, 2014. – 92 с.
  93. Mrutyunjaya Panda and Manas Ranjan Patra. A Data Mining Approach to Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2015. – 216 с.
  94. Glenn Wilkinson. Identification of Hostile TCP Traffic using Support Vector Machines. – М.: LAP Lambert Academic Publishing, 2010. – 80 с.
  95. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  96. Mueen Uddin. Dynamic Multi Layer Signature based IDS System using Mobile Agents. – М.: LAP Lambert Academic Publishing, 2011. – 72 с.
  97. Ivano Malavolta. A tamper resistant Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2011. – 144 с.
  98. Sunit Jindal. Swarm Intelligence Based Hole Detection. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  99. Prashant Kumar Singh and Avimanyou Kumar Vatsa. Taxonomy Based Intrusion Attacks and Detection Scheme in P2P Network. – М.: LAP Lambert Academic Publishing, 2012. – 56 с.
  100. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  101. Shaffali Gupta and Sanmeet Kaur. A GUI Framework for detecting Intrusions using Bro IDS. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  102. Mahmoud Jazzar. Computer Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 240 с.
  103. Siva S. Sivatha Sindhu,S. Geetha and S. Selvakumar. Network Intrusion Detection System using Machine Learning Techniques. – М.: LAP Lambert Academic Publishing, 2013. – 80 с.
  104. Gaurav Mishra and Gulshan Ahuja. Classification of data mining techniques in intrusion detection. – М.: LAP Lambert Academic Publishing, 2013. – 52 с.
  105. Nasim Beigi-Mohammadi. Smart Meter Networks: Intrusion Detection System by Design. – М.: LAP Lambert Academic Publishing, 2014. – 136 с.
  106. Christian Chetachi Umunna. Distributed Intrusion Detection System in Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 104 с.
  107. Iftikhar Ahmad. Feature Subset Selection in Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 220 с.
  108. Saima Munawar. Detection and Classification Of Normal and Anomaly IP Packet. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  109. Jabarweer Singh,Krishan Kumar and Gulshan Kumar. Intrusion detection using artificial intelligence based ensembles. – М.: LAP Lambert Academic Publishing, 2014. – 116 с.
  110. Sivaraman Ramachandran,Shriram K. Vasudevan and Subashri Vasudevan. Speed Control of Synchronous Motor using FPGA. – М.: LAP Lambert Academic Publishing, 2012. – 100 с.
  111. Juan Valverde,Eduardo de la Torre and Jorge Portilla. FPGA-Based High Performance Wireless Sensor Node. – М.: LAP Lambert Academic Publishing, 2014. – 132 с.
  112. Dhuha Basheer Abdullah and Riyadh Zaghlool Mahmood. FPGA-Based High Performance Parallel Computing. – М.: Scholars' Press, 2014. – 232 с.
  113. Govind Sreekar Shenoy. Architecture Support for Intrusion Detection systems. – М.: LAP Lambert Academic Publishing, 2014. – 160 с.
  114. Muhammad Atta Othman A. Khfagy. Artificial Neural Networks Applied For Digital Images with Matlab Code. – М.: LAP Lambert Academic Publishing, 2014. – 152 с.
  115. Monis Akhlaq,Irfan Awan and Faeiz Alserhani. Improved Performance High Speed Network Intrusion Detection Systems. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  116. Prakash Prasad. Intrusion Detection System: Findings. – М.: LAP Lambert Academic Publishing, 2011. – 104 с.
  117. Homam El-Taj and Omar Amer. Network Alert Management System For IDS False Positive Reduction. – М.: LAP Lambert Academic Publishing, 2013. – 156 с.
  118. Manju Bala and R. K. Agrawal. Multiple Classifier Systems Analysis and Design. – М.: LAP Lambert Academic Publishing, 2012. – 128 с.
  119. Sultan H. Aljahdali and Mohd. Junedul Haque. Intelligent Approaches to Data Management. – М.: LAP Lambert Academic Publishing, 2013. – 116 с.
  120. Bibi Masoomeh Aslahi Shahri. Intrusion Detection System Using Hybrid Gsa-kmeans. – М.: LAP Lambert Academic Publishing, 2014. – 128 с.
  121. Muna Elsadig Mohamed Ahmed Elsheik. Bio Inspired Intrusion Prevention and Self healing System for Networks. – М.: LAP Lambert Academic Publishing, 2012. – 256 с.
  122. Amanpreet Chauhan. Survey on data mining techniques in intrusion detection. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  123. Tigabu Dagne Akal. Constructing Predictive Model for Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 160 с.
  124. Kamaruzaman Maskat and Mohd Afizi Mohd Shukran. Agent Based Snort In Distributed Environment. – М.: LAP Lambert Academic Publishing, 2013. – 112 с.
  125. Kamrul Hasan. An Investigation into Botnet Detection System. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  126. Rupali Pathak. Recent Advances In Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  127. Fadel O. Shaban. Spyware Detection. – М.: LAP Lambert Academic Publishing, 2013. – 92 с.
  128. Mafaz M. K. Al-Anezi and Najla B. I. Al-Dabagh. Multilayer Artificial Immune Systems for Intrusion & Malware Detection. – М.: LAP Lambert Academic Publishing, 2012. – 148 с.
  129. Emon Kumar Dey. Computer Vision Based Gender Detection from Facial Image. – М.: LAP Lambert Academic Publishing, 2013. – 80 с.
  130. Ricardo Costa. An IEEE1451.0-compliant FPGA-based reconfigurable weblab. – М.: LAP Lambert Academic Publishing, 2014. – 328 с.
  131. Mohamed Nassar. Voice over IP Networks Monitoring. – М.: LAP Lambert Academic Publishing, 2009. – 172 с.
  132. vudasreenivasa rao. DISTRIBUTED DATA MINING AND MINING MULTI-AGENT DATA. – М.: LAP Lambert Academic Publishing, 2011. – 152 с.
  133. Al-Sakib Khan Pathan. Securing WSN with Lightweight Resource-Efficient Schemes. – М.: LAP Lambert Academic Publishing, 2011. – 116 с.
  134. Usman Qayyum. Notch based Face Detection and Facial Feature Localization. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  135. Mousumi Saha. Simulation of FPGA based Buffered Security Enabled Encoders. – М.: LAP Lambert Academic Publishing, 2012. – 100 с.
  136. Sathish Kumar. Intrusion Detection and Response Techniques for Mobile Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 200 с.
  137. Richard Rimiru. Exploring Immune System's Concepts for the Design of Novel AIS Models. – М.: LAP Lambert Academic Publishing, 2012. – 164 с.
  138. Khandakar Entenam Unayes Ahmed. IDENTITY AND ACCESS MANAGEMENT IN CLOUD COMPUTING. – М.: LAP Lambert Academic Publishing, 2011. – 172 с.
  139. Luciano Oliveira. Semantically integrating laser and vision. – М.: LAP Lambert Academic Publishing, 2012. – 152 с.
  140. Ahsan Ashfaq,Tariq Hameed and Rabid Mehmood. FPGA Based Intellegent Sensor for Image Processing. – М.: , 2012. – 84 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Учет и калькулирование затрат по функциям. Метод АВС. Activity-Based Costing. М.К. Ерижев, "Новое в бухгалтерском учете и отчетности", № 19, октябрь 2003.
  2. Обеспечение безопасности PIN-Based операций с банковскими картами. С.В.  Серебряков, "Расчеты и операционная работа в коммерческом банке", N 2, март-апрель 2012 г.
  3. Risk-based pricing: посткризисные тенденции. А.В. Гидулян, "Банковское кредитование", N 1, январь-февраль 2012 г.

Образцы работ

Тема и предметТип и объем работы
Особенности виртуального общения
Психология
Курсовая работа
28 стр.
Порядок разработки, проектирования системы стратегического менеджмента
Менеджмент
Диплом
100 стр.
Управление формированием и продвижением торговых марок на российском рынке
Маркетинг
Диплом
80 стр.
Брэндинг - технология создания, продвижения и обслуживания торговой марки
Маркетинг
Диплом
110 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Юлия, 18.03
Спасибо огромное! Прочитала вывод, очень хорошо сформулирован. Надеюсь преподаватель это оценит