Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Yogesh Kumar,Krishan Kumar and Gulshan Kumar. Feature Selection For Intrusion Detection Systems. – М.: LAP Lambert Academic Publishing, 2014. – 100 с.
  2. Iftikhar Ahmad. Feature Subset Selection in Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 220 с.

Дополнительные результаты

  1. Peggy Holman. The Change Handbook: The Definitive Resource on Today's Best Methods for Engaging whole Systems. – М.: , 2012. – 496 с.
  2. Query Processing for Advanced Database Systems (The Morgan Kaufmann Series in Data Management Systems). – М.: , 0. – 0 с.
  3. Safe Schools: A Security and Loss Prevention Plan. – М.: , 0. – 0 с.
  4. Gian Luca Foresti, Carlo S. Regazzoni, Pramod K. Varshney. Multisensor Surveillance Systems: The Fusion Perspective. – М.: , 0. – 0 с.
  5. Ronald J. Lewis. Activity-Based Models for Cost Management Systems. – М.: , 0. – 0 с.
  6. Robert Stegwee, Ton Spil. Strategies for Healthcare Information Systems. – М.: , 0. – 0 с.
  7. Dorothy E. Denning, Peter J. Denning. Internet Besieged. – М.: , 0. – 0 с.
  8. Sanjiv Purba. Architectures for E-Business Systems: Building the Foundation for Tomorrow's Success. – М.: , 0. – 0 с.
  9. Paul C. Green. Get Talent: Interview For Actions, Select For Results. – М.: , 2007. – 264 с.
  10. Paul Piccard, Jeremy Faircloth. Combating Spyware in the Enterprise. – М.: , 2006. – 386 с.
  11. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с.
  12. S. J. Gaston. Getting the Right Systems at the Right Price: Strategies for Successful Management. – М.: John Wiley and Sons, Ltd, 1997. – 272 с.
  13. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с.
  14. Digital Rights Management for E-Commerce Systems (Premier Reference Source). – М.: , 2008. – 404 с.
  15. J. Todd Krajniak. Stock Selection for Independent Investors. – М.: , 2008. – 108 с.
  16. C.-C. Kuo, Shang-Ho Tsai, Layla Tadjpour, Yu-Hao Chang. Precoding Techniques for Digital Communication Systems. – М.: , 2008. – 320 с.
  17. Rory Bray. OSSEC Host-Based Intrusion Detection Guide. – М.: , 2010. – 416 с.
  18. Bruce G. Miller. Combustion Engineering Issues for Solid Fuel Systems. – М.: , 2010. – 528 с.
  19. Syngress. Snort Intrusion Detection 2.0. – М.: , 2010. – 550 с.
  20. Johann Christoph Freytag. Query Processing for Advanced Database Systems. – М.: , 2010. – 512 с.
  21. Derrick Rountree. Security for Microsoft Windows System Administrators. – М.: , 2010. – 400 с.
  22. Brian Caswell. Snort Intrusion Detection and Prevention Toolkit. – М.: , 2010. – 768 с.
  23. Biswa Datta. Numerical Methods for Linear Control Systems. – М.: , 2010. – 640 с.
  24. Sharon Yull. BTEC National for IT Practitioners: Systems units. – М.: , 2010. – 168 с.
  25. J Clayden. Organolithiums: Selectivity for Synthesis,23. – М.: , 2010. – 400 с.
  26. Robert Barnard. Intrusion Detection Systems. – М.: , 2010. – 480 с.
  27. Robert Crease. World in the Balance – The Historic Quest for a Universal System of Measurement. – М.: , 2011. – 0 с.
  28. Richard Chandler. Statistical Methods for Trend Detection and Analysis in the Environmental Sciences. – М.: , 2011. – 384 с.
  29. Simon Saunders. Antennas and Propagation for Wireless Communication Systems. – М.: , 2007. – 546 с.
  30. Warren. Virtual Reality Technologies for Future Telecommunications Systems. – М.: , 1997. – 150 с.
  31. Bernard H. Boar. Cost–Effective Strategies for Client/Server Systems. – М.: , 1996. – 256 с.
  32. Terry Escamilla. Intrusion Detection. – М.: , 1998. – 368 с.
  33. C. Tellambura. Mathematical Techniques for Wireless Communication Systems Design and Analysis. – М.: , 1976. – 572 с.
  34. C. Tellambura. Mathematical Techniques for Wireless Communication Systems Design and Analysis. – М.: , 1971. – 0 с.
  35. Sead Muftic. Security Architecture for Open Distributed Systems. – М.: , 1993. – 298 с.
  36. Klema. Public Regulation of Site Selection for Nuclear Po wer Plants. – М.: , 1977. – 0 с.
  37. WE BYRNE. Byrne: Software Design Techniques For Large Ada Systems. – М.: , 1991. – 326 с.
  38. The AGI Source Book for Geographic Information Systems 1995. – М.: , 1994. – 392 с.
  39. Ronald Mak. The Martian Principles for Successful Enterprise Systems. – М.: , 2006. – 138 с.
  40. Challenges and Strategies for Research in Systems Development. – М.: , 1992. – 492 с.
  41. FR HICKMAN. Hickman: ?analysis? For Knowledge–based Systems: A Practical Guide To The Kads Methodolo. – М.: , 1989. – 190 с.
  42. JoAnn Senger. Designing a Not–for–Profit Compensation System. – М.: , 2005. – 198 с.
  43. Debugging and Performance Tuning for Parallel Computing Systems. – М.: , 1996. – 448 с.
  44. AJ BLUNDELL. Blundell: Bond ?graphs? For Modelling Engineering Systems. – М.: , 1983. – 152 с.
  45. NS SEHMI. Sehmi: ?large? Order Structural Eigenanalysis Tech : Algorithms For Finite Element Systems. – М.: , 1989. – 226 с.
  46. Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky. Cisco Security Professional's Guide to Secure Intrusion Detection Systems. – М.: , . –  с.
  47. Jianbo Yang. Feature selection and model selection in supervised learning. – М.: LAP Lambert Academic Publishing, 2015. – 160 с.
  48. David Zumoffen and Marta Basualdo. Fault Detection Systems Integrated to Fault-Tolerant Control. – М.: LAP Lambert Academic Publishing, 2012. – 236 с.
  49. Anup Bhange and Manmeet Kaur Marhas. Anomaly Detection in Network Traffic; A Statistical Approach. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  50. Ali N. Abbas and Ausama A. Awad. Geno-Fuzzy PID Controller For Optimum Control System. – М.: LAP Lambert Academic Publishing, 2013. – 124 с.
  51. Gulshan Kumar. Effective Intrusion Detection using Genetic Algorithms. – М.: LAP Lambert Academic Publishing, 2014. – 100 с.
  52. Tanmoy Hazra. Application of PCA in IDS. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  53. Ankit Kajaria. Design And Analysis Of Mathematical Model For Human Respiratory System. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  54. Gaganpreet Kaur. Enhanced Iris Recognition System For Person Identification. – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  55. Sugandha Shrama. Power Rotational Interleaver for an IDMA System. – М.: LAP Lambert Academic Publishing, 2014. – 64 с.
  56. Shesharaman K. Narayanan. A Continuous Time Sigma Delta Modulator for MRI Receiver System. – М.: LAP Lambert Academic Publishing, 2014. – 108 с.
  57. Kuo Yuan-Ching. A Study of RNS-to-Binary Converter Design for Residue Number System. – М.: Scholars' Press, 2014. – 88 с.
  58. Luca Gioanola. Pyroelectric and AMR sensors for intelligent transportation systems. – М.: LAP Lambert Academic Publishing, 2010. – 100 с.
  59. Saifur Sabuj. Microcontroller Based Friend or Foe (FoF) Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 52 с.
  60. Kosuru Trinadhachari. A Real World system for Motion Detection and Tracking. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  61. Olutayo Oyerinde. Channel Estimation for Wireless Communication Systems. – М.: LAP Lambert Academic Publishing, 2011. – 228 с.
  62. Muhammad Arif Khan. User Selection and Scheduling Algorithms for MIMO-BC Systems. – М.: Scholars' Press, 2014. – 172 с.
  63. Kiran Jot Singh. A Novel Technique For Edge Detection Using Logical Operations. – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  64. Alexandre Vicente. Fault Detection in Automotive Network Embedded Electronics Systems. – М.: LAP Lambert Academic Publishing, 2011. – 112 с.
  65. Huang-Chun Roan. Network Intrusion Detection Based on Shift-OR Circuit. – М.: LAP Lambert Academic Publishing, 2011. – 60 с.
  66. Amedeo Troiano. A Sensor Network System for Road Ice Formation Detection. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  67. Sasan Asiaei. Microfluidic Functionalization for Protein Detection in Immunoassays. – М.: Scholars' Press, 2014. – 192 с.
  68. Jane Teergele and Kourosh Danai. Selection of Outputs for Distributed Parameter Systems. – М.: LAP Lambert Academic Publishing, 2014. – 64 с.
  69. Qadeer Ahmed,Aamer Iqbal Bhatti and Sohail Iqbal. Robust Control Algorithms for Twin Rotor System. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  70. Heba Abu Samra. Feature Selection. – М.: LAP Lambert Academic Publishing, 2013. – 64 с.
  71. M. Sadiq Ali Khan and S. M. Aqil Burney. Recent Trends in Intrusion Detection System & Network Monitoring. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  72. Cruceru Madalina. Radiation Detection Systems With Applications in High Energy Physics. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  73. Kahiu Ngugi. Marker Assisted Selection for Drought Tolerance and Striga Resistance. – М.: LAP Lambert Academic Publishing, 2012. – 116 с.
  74. S. Baby Gayathri and P. Kamaraj. Synthesis, Characterization and Applications of Nano-CDHA. – М.: LAP Lambert Academic Publishing, 2014. – 68 с.
  75. Shijie Zheng. Photonic Crystal Fiber sensors. – М.: LAP Lambert Academic Publishing, 2013. – 104 с.
  76. Yi Xin. Mid-IR-based Gas Detection System Analysis Model. – М.: LAP Lambert Academic Publishing, 2011. – 136 с.
  77. Hajnalka Kencse. Energy Integration for Distillation Systems. – М.: LAP Lambert Academic Publishing, 2010. – 100 с.
  78. Iyobosa Ogbeide. Optimisation of MALDI-TOF MS for the Detection of Omega-3 Fatty Acids. – М.: LAP Lambert Academic Publishing, 2013. – 180 с.
  79. Sivasathivel KANDASAMY and Audrey A. Minghelli-Roman. Optimal Bands selection for Soil Classification and Moisture Mapping. – М.: LAP Lambert Academic Publishing, 2010. – 80 с.
  80. Mahe Talat and Om Prakash. Urease from pumpkin seeds used for the detection of hazardous metals. – М.: LAP Lambert Academic Publishing, 2011. – 164 с.
  81. Sonu Gandhi. Antibody based biosensor for the detection of opiate drugs. – М.: LAP Lambert Academic Publishing, 2013. – 236 с.
  82. Omololu Toluwanimi Omololu. The Military in the Quest for Stable Federal System in Nigeria. – М.: LAP Lambert Academic Publishing, 2012. – 148 с.
  83. Ikhlas Abdelaziz Hassan. Application of Conventional Radiography for Canine Locomotor System. – М.: LAP Lambert Academic Publishing, 2011. – 176 с.
  84. SUGATA Mukhopadhyay. Collection of abstracts selected for International Conferences. – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  85. Shaheen Ahmed. Feature Selection and Segmentation for Posterior fossa tumors. – М.: LAP Lambert Academic Publishing, 2011. – 140 с.
  86. Abhay Nath Singh. Honeypot Based Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  87. Shahnawaz Husain,S. C. Gupta and R. C. Joshi. Intrusion Detection Engine for Adhoc Environment. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  88. Sumaya Saad Sulaiman and Sarab M. Hameed. A Fuzzy Based Clustering for Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  89. Shubha Puthran and Ketan Shah. Intrusion Detection System using datamining techniques. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  90. Mohammad S. I. Mamun. Intrusion Detection System Architecture in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  91. Heba Fathy Eid. Computational Intelligence in Network Intrusion Detection System. – М.: Scholars' Press, 2014. – 164 с.
  92. Janakiraman S. Distributed Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 164 с.
  93. Yogesh Kumar,Krishan Kumar and Gulshan Kumar. Feature Selection For Intrusion Detection Systems. – М.: LAP Lambert Academic Publishing, 2014. – 100 с.
  94. Syed Zahidur Rashid. Computer Network Security Monitoring. – М.: Scholars' Press, 2015. – 284 с.
  95. Gulshan Kumar. Effective Intrusion Detection using Feature Selection. – М.: LAP Lambert Academic Publishing, 2014. – 92 с.
  96. Mrutyunjaya Panda and Manas Ranjan Patra. A Data Mining Approach to Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2015. – 216 с.
  97. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  98. Mueen Uddin. Dynamic Multi Layer Signature based IDS System using Mobile Agents. – М.: LAP Lambert Academic Publishing, 2011. – 72 с.
  99. Ivano Malavolta. A tamper resistant Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2011. – 144 с.
  100. Shaffali Gupta and Sanmeet Kaur. A GUI Framework for detecting Intrusions using Bro IDS. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  101. Mahmoud Jazzar. Computer Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 240 с.
  102. Siva S. Sivatha Sindhu,S. Geetha and S. Selvakumar. Network Intrusion Detection System using Machine Learning Techniques. – М.: LAP Lambert Academic Publishing, 2013. – 80 с.
  103. Arjun Nichal. Steganography for JPEG2000 Baseline System. – М.: LAP Lambert Academic Publishing, 2013. – 60 с.
  104. Nasim Beigi-Mohammadi. Smart Meter Networks: Intrusion Detection System by Design. – М.: LAP Lambert Academic Publishing, 2014. – 136 с.
  105. Christian Chetachi Umunna. Distributed Intrusion Detection System in Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 104 с.
  106. Iftikhar Ahmad. Feature Subset Selection in Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 220 с.
  107. Saima Munawar. Detection and Classification Of Normal and Anomaly IP Packet. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  108. Jabarweer Singh,Krishan Kumar and Gulshan Kumar. Intrusion detection using artificial intelligence based ensembles. – М.: LAP Lambert Academic Publishing, 2014. – 116 с.
  109. Govind Sreekar Shenoy. Architecture Support for Intrusion Detection systems. – М.: LAP Lambert Academic Publishing, 2014. – 160 с.
  110. Yingjie Hu. Personalised Modelling Framework and Systems for Data Analysis. – М.: LAP Lambert Academic Publishing, 2011. – 300 с.
  111. Monis Akhlaq,Irfan Awan and Faeiz Alserhani. Improved Performance High Speed Network Intrusion Detection Systems. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  112. Prakash Prasad. Intrusion Detection System: Findings. – М.: LAP Lambert Academic Publishing, 2011. – 104 с.
  113. Homam El-Taj and Omar Amer. Network Alert Management System For IDS False Positive Reduction. – М.: LAP Lambert Academic Publishing, 2013. – 156 с.
  114. Bibi Masoomeh Aslahi Shahri. Intrusion Detection System Using Hybrid Gsa-kmeans. – М.: LAP Lambert Academic Publishing, 2014. – 128 с.
  115. Muna Elsadig Mohamed Ahmed Elsheik. Bio Inspired Intrusion Prevention and Self healing System for Networks. – М.: LAP Lambert Academic Publishing, 2012. – 256 с.
  116. Tigabu Dagne Akal. Constructing Predictive Model for Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 160 с.
  117. Kamaruzaman Maskat and Mohd Afizi Mohd Shukran. Agent Based Snort In Distributed Environment. – М.: LAP Lambert Academic Publishing, 2013. – 112 с.
  118. Kamrul Hasan. An Investigation into Botnet Detection System. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  119. Bertold van Voorst. Cluster-based collection selection for information retrieval. – М.: LAP Lambert Academic Publishing, 2011. – 84 с.
  120. Subramanian Appavu alias Balamurugan. Feature Selection Methods Best Practices. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  121. Subramanian Appavu alias Balamurugan. Feature Selection for Knowledge Discovery and Data Mining. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  122. Rupali Pathak. Recent Advances In Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  123. Davoud Mougouei and Man Kwan Yeung. Requirement Engineering for Intrusion Tolerant Systems. – М.: LAP Lambert Academic Publishing, 2013. – 104 с.
  124. Fadel O. Shaban. Spyware Detection. – М.: LAP Lambert Academic Publishing, 2013. – 92 с.
  125. Sait Can Yucebas. A Hybrid Feature Selection Model For Genome Wide Association Studies. – М.: LAP Lambert Academic Publishing, 2014. – 232 с.
  126. Barnali Sahu and Debahuti Mishra. Feature Selection for Cancer Classification. – М.: LAP Lambert Academic Publishing, 2012. – 140 с.
  127. Mafaz M. K. Al-Anezi and Najla B. I. Al-Dabagh. Multilayer Artificial Immune Systems for Intrusion & Malware Detection. – М.: LAP Lambert Academic Publishing, 2012. – 148 с.
  128. Laxmi Ahuja. Evaluation of Quality Attributes for Component Based Systems. – М.: LAP Lambert Academic Publishing, 2012. – 72 с.
  129. Mohamed Nassar. Voice over IP Networks Monitoring. – М.: LAP Lambert Academic Publishing, 2009. – 172 с.
  130. Thibault Helleputte. Stable Feature Selection in Empty Spaces. – М.: LAP Lambert Academic Publishing, 2011. – 268 с.
  131. Senthamarai Kannan Subramanian. Hybrid Methods in Feature Selection: A Data Classification Perspective. – М.: LAP Lambert Academic Publishing, 2011. – 64 с.
  132. Al-Sakib Khan Pathan. Securing WSN with Lightweight Resource-Efficient Schemes. – М.: LAP Lambert Academic Publishing, 2011. – 116 с.
  133. Alpay Doruk. Security Review Program Requirements for Intrusion Management Systems. – М.: LAP Lambert Academic Publishing, 2010. – 88 с.
  134. Manmeet Bawa. Detecting Information Hidden in JPEG Images. – М.: LAP Lambert Academic Publishing, 2010. – 64 с.
  135. Ying Cui. High Dimensional Clustering and Applications of Learning Methods. – М.: LAP Lambert Academic Publishing, 2009. – 160 с.
  136. Sathish Kumar. Intrusion Detection and Response Techniques for Mobile Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 200 с.
  137. Kaushik Roy and Umapada Pal. On the Development of an OCR System for Indian Postal Automation. – М.: LAP Lambert Academic Publishing, 2011. – 148 с.
  138. Moez Krichen. Model Based Testing for Real-Time Systems. – М.: LAP Lambert Academic Publishing, 2010. – 192 с.
  139. Omer Mohamed. Service oriented Architecture for Open Hypermedia Systems. – М.: LAP Lambert Academic Publishing, 2011. – 156 с.
  140. Nadim Al-Mosawi and Frida Ohlson. Occupant Detection System. – М.: , 2015. – 64 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Банковское отделение будущего. интервью с Камероном МакКворри. Cameron MacQuarrie, менеджером по развитию бизнеса компании Cisco Systems в области корпоративных финансов в регионе EMEA. Европа, Ближний Восток, Африка. Н.Ф. Колюшенко, "Расчеты и операционная работа в коммерческом банке", № 2, февраль 2006.
  2. Ловушка для пирата. интервью с И. Слабых, руководителем отдела противодействия интеллектуальному пиратству в России и СНГ Adobe Systems. И. Голова, "Расчет", N 9, сентябрь 2012 г.
  3. Мы можем управлять собственными мыслями. интервью с С. Харитоновым, врачом-психотерапевтом, психиатором, кандидатом медицинских наук, старшим научным сотрудником Московского НИИ психиатрии Росздрава РФ, членом-корреспондентом Международной академии наук. МАНЭБ, членом Британского общества когнитивных и поведенческих психотерапевтов. Membership British Association for Behavioural & Cognitive Psychoterapies / BABCP. Ф. Кульпин, "Управление персоналом", N 8, апрель 2011 г.
  4. Зачетная реструктуризация долга: институт DEBT-FOR-EQUITY SWAP в России". интервью с М. Григорьевым, старшим юристом корпоративной практики юридической фирмы "Вегас-Лекс". О. Бодрягина, "эж-ЮРИСТ", № 3, январь 2010.
  5. Служба безопасности - надежная опора бизнеса. интервью с С. Бугримовым, директором по корпоративной безопасности ОАО "Комстар-ОТС", Д. Зенкиным, директором по маркетингу, компания Perimetrix, группа компаний "Компью-Линк", К. Борисовым, управляющим директором Morgan Hunt Selection. "Управление персоналом", № 7, апрель 2009.
  6. Я воспринимаю персонального помощника как напарника червяк должен нравиться рыбке, а не рыбаку. интервью с П.А. Черкашиным, руководителем российского представительства компании Adobe Systems. "Управление персоналом", № 20, октябрь 2008.
  7. Управление проектами при подборе персонала. PM for HR. Е. Кривов, "Кадровик. Рекрутинг для кадровика", № 9, сентябрь 2008.

Образцы работ

Тема и предметТип и объем работы
Этапы формирования теории президентства
История государства и права
Курсовая работа
30 стр.
Слияния и поглощения Мировая и Российская практика
Мировая экономика
Диплом
99 стр.
Привлекательности труда в организации
Психология
Курсовая работа
35 стр.
Коммерческие банки как субъект кредитного рынка, их операции и сделки
Банковский менеджмент
Диплом
87 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Али, 23.04
Спасибо за работу, я очень признателен