Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Brien Posey. GFI Network Security and PCI Compliance Power Tools. – М.: , 2010. – 488 с.

Дополнительные результаты

  1. Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с.
  2. Security and Privacy in Mobile Information and Communication Systems: Third International ICST Conference, MOBISEC 2011, Aalborg, Denmark, May 17-19, ... and Telecommunications Engineering). – М.: , 2012. – 195 с.
  3. Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  4. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с.
  5. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с.
  6. Katherine Craig. Power Tools For Leadership Success. – М.: , 2012. – 80 с.
  7. Security and Development in Global Politics: A Critical Comparison. – М.: , 2012. – 360 с.
  8. Luis Lobo-Guerrero. Insuring Security: Biopolitics, security and risk. – М.: , 2012. – 178 с.
  9. Terrorism and the Olympics: Major Event Security and Lessons for the Future. – М.: , 2012. – 272 с.
  10. Giorgio S. Questa. Fixed Income Analysis for the Global Financial Market: Money Market, Foreign Exchange, Securities, and Derivatives. – М.: Wiley, 1999. – 368 с.
  11. Georg Von Krogh, Kazuo Ichijo, Ikujiro Nonaka. Enabling Knowledge Creation: How to Unlock the Mystery of Tacit Knowledge and Release the Power of Innovation. – М.: Oxford University Press, 2000. – 304 с.
  12. Rattan Lal, David Hansen, Norman Uphoff, Steven Slack, Rattan Lal. Food Security and Environmental Quality in the Developing World. – М.: , 0. – 0 с.
  13. Yuko Ogasawara. Office Ladies and Salaried Men: Power, Gender, and Work in Japanese Companies. – М.: , 0. – 0 с.
  14. Samuel D. Deep, Lyle Sussman, Sam Deep. Power Tools: 33 Management Inventions You Can Use Today. – М.: , 0. – 0 с.
  15. Susan Echaore-McDavid. Career Opportunities in Law Enforcement, Security, and Protective Services (The Career Opportunities Series). – М.: , 0. – 0 с.
  16. Maurice, Ph.D. Youakim. Social Security and Medicare for the New Millenium. – М.: , 0. – 0 с.
  17. Sergio Lozinsky, Paul Wahl. Enterprise-Wide Software Solutions: Integration Strategies and Practices. – М.: , 0. – 0 с.
  18. Thomas Cleary, Chin-Ning Chu. Thunder in the Sky: Secrets on the Acquisition and Exercise of Power. – М.: , 0. – 0 с.
  19. Retail Security and Loss Prevention. – М.: , 0. – 0 с.
  20. Physical Security and the Inspection Process. – М.: , 0. – 0 с.
  21. John De LA Mothe, Albert N. Link. Networks, Alliances and Partnerships in the Innovation Process (Economics of Science, Technology, and Innovation, 28). – М.: , 0. – 0 с.
  22. Louis Barajas. The Latino Journey to Financial Greatness : The 10 Steps to Creating Wealth, Security, and a Prosperous Future for You and Your Family. – М.: , 0. – 0 с.
  23. Don Silver. The Generation X Money Book: Achieving Security and Independence. – М.: , 0. – 0 с.
  24. Jonathan Gruber, David A. Wise. Social Security and Retirement Around the World (NATIONAL BUREAU OF ECONOMIC RESEARCH CONFERENCE REPORT). – М.: , 0. – 0 с.
  25. Geoff Craighead. High-Rise Security and Fire Life Safety, Second Edition. – М.: , 0. – 0 с.
  26. Shelley Powers, Jerry Peek, Tim O'Reilly, Mike Loukides. Unix Power Tools. – М.: O'Reilly Media, 2002. – 1200 с.
  27. Roberta Bragg. MCSE Training Guide (70-220): Windows 2000 Network Security Design, Second Edition. – М.: , 0. – 0 с.
  28. Marian Quigley, Marian Quiqley. Information Security and Ethics: Social and Organizational Issues. – М.: , 0. – 0 с.
  29. Anup K. Ghosh. E-Commerce Security and Privacy. – М.: , 0. – 0 с.
  30. Kenneth Atchity. How to Escape Lifetime Security and Pursue Your Impossible Dream: A Guide to Transforming Your Career. – М.: , 2004. – 0 с.
  31. Joseph White. False Alarm : Why the Greatest Threat to Social Security and Medicare Is the Campaign to "Save" Them (Century Foundation Book). – М.: , 2003. – 0 с.
  32. Advances in Security and Payment Methods for Mobile Commerce. – М.: , 2004. – 0 с.
  33. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с.
  34. Ron Ben Natan. Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase. – М.: , 2005. – 432 с.
  35. Soumitra Dutta, Irene Mia. Global Information Technology Report 2006-2007: Connecting to the Networked Economy (Global Information Technology Report). – М.: , 2007. – 320 с.
  36. Joe Conason. The Raw Deal: How the Bush Republicans Plan to Destroy Social Security and the Legacy of the New Deal. – М.: , 2005. – 141 с.
  37. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с.
  38. Helen James. Security and Stustaibable Developement in Myanmar/Burma (Routledge Contemporary Southeast Asia Series). – М.: , 2006. – 231 с.
  39. Susan Echaore-McDavid. Career Opportunities In Law Enforcement, Security And Protective Services (Career Opportunities). – М.: , 2005. – 272 с.
  40. Roy H. Campbell, Prasad G. Naldurg. Security and Survivability: Analyzing, Modeling, and Verifying Dynamic Recovery in Insecure Systems. – М.: , 2008. – 240 с.
  41. Network Security. – М.: , 2008. – 370 с.
  42. Ibp Usa. Thailand Army, National Security And Defense Policy Handbook. – М.: , 2008. – 300 с.
  43. Ibp Usa. Turkey Army, National Security And Defense Policy Handbook (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с.
  44. Ibp Usa. Ukraine Army, National Security And Defense Policy Handbook (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с.
  45. Social Security and Development. – М.: , 2008. – 256 с.
  46. Ibp Usa. CZECH REPUBLIC ARMY, NATIONAL SECURITY AND DEFENSE POLICY HANDBOOK (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с.
  47. Ibp Usa. ESTONIA ARMY, NATIONAL SECURITY AND DEFENSE POLICY HANDBOOK (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с.
  48. Ibp Usa. Finland Army, National Security And Defense Policy Handbook (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с.
  49. Ibp Usa. Germany Army, National Security And Defense Policy Handbook (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с.
  50. Ibp Usa. China Army, National Security and Defense Policy Handbook. – М.: , 2008. – 300 с.
  51. Ibp Usa. Cuba Army, National Security And Defense Policy Handbook (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с.
  52. Ibp Usa. US Securities and Exchange Commission Handbook. – М.: , 2008. – 300 с.
  53. Ibp Usa. Myanmar Army, National Security And Defense Policy Handbook. – М.: , 2008. – 300 с.
  54. Ibp Usa. Philippines Army National Security and Defense Policy Handbook. – М.: , 2008. – 300 с.
  55. Ibp Usa. Russia KGB (National Security and Intelligence Handbook: Past And Present (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с.
  56. Ibp Usa. Global National Security and Intelligence Agencies Handbook. – М.: , 2008. – 300 с.
  57. Ibp Usa. Germany Army, National Security and Defense Policy Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  58. Ibp Usa. Australia Army, National Security and Defense Policy Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  59. Ibp Usa. Bangladesh Army, National Security and Defense Policy Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  60. Ibp Usa. Czech Republic Army, National Security and Defense Policy Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  61. Ibp Usa. European System for Security and Cooperation Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  62. Ibp Usa. Finland Army, National Security and Defense Policy Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  63. Ibp Usa. France Army, National Security and Defense Policy Handbook (World Business Information Catalog). – М.: , 2008. – 300 с.
  64. Ibp Usa. Estonia Army, National Security and Defense Policy Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  65. Social Networking Communities and E-Dating Services: Concepts and Implications (Premier Reference Source). – М.: , 2008. – 424 с.
  66. Craig S. Wright. The IT Regulatory and Standards Compliance Handbook: How to Survive Information Systems Audit and Assessments. – М.: , 2008. – 750 с.
  67. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с.
  68. V.R. Leonard. The Social Security and Medicare Handbook: What You Need to Know Explained Simply. – М.: , 2008. – 288 с.
  69. Daniel Clark. Network Access Control 100 Success Secrets - 100 Most Asked NAC Questions on Implementation and Deployment of unify endpoint security technology, user ... and network security enforcement. – М.: , 2008. – 180 с.
  70. Wireless Network Traffic and Quality of Service Support: Trends and Standards (Premier Reference Source). – М.: , 2010. – 549 с.
  71. Network Mergers and Migrations. – М.: , 2010. – 566 с.
  72. Helen Toner, Elspeth Guild, Anneliese Baldaccini. Whose Freedom, Security and Justice?. – М.: Hart Publishing, 2007. – 550 с.
  73. Moorad Choudhry. Fixed Income Securities and Derivatives Handbook. – М.: , 2010. – 496 с.
  74. Rob Cameron. Juniper(r) Networks Secure Access SSL VPN Configuration Guide. – М.: , 2010. – 656 с.
  75. Eiji Arai. Mechatronics for Safety, Security and Dependability in a New Era. – М.: , 2010. – 464 с.
  76. Charles Nemeth. Private Security and the Law. – М.: , 2010. – 488 с.
  77. Owen Poole. Network Security. – М.: , 2010. – 224 с.
  78. Carl Roper. Physical Security and the Inspection Process. – М.: , 2010. – 290 с.
  79. Charles A. Sennewald. Retail Crime, Security, and Loss Prevention. – М.: , 2010. – 704 с.
  80. Richard B. Silverman. The Organic Chemistry of Drug Design and Drug Action, Power PDF. – М.: , 2010. – 0 с.
  81. Shigeru Yamamoto. Systems and Human Science - For Safety, Security and Dependability. – М.: , 2010. – 350 с.
  82. Jesus Mena. Investigative Data Mining for Security and Criminal Detection. – М.: , 2010. – 272 с.
  83. Joseph Donnermeyer. Security and Crime Prevention. – М.: , 2010. – 439 с.
  84. Anton Chuvakin. PCI Compliance. – М.: , 2010. – 368 с.
  85. James Joshi. Network Security: Know It All. – М.: , 2010. – 368 с.
  86. Steve Manzuik. Network Security Assessment: From Vulnerability to Patch. – М.: , 2010. – 500 с.
  87. Ron Ben Natan. Implementing Database Security and Auditing. – М.: , 2010. – 432 с.
  88. Jan L. Harrington. Network Security. – М.: , 2010. – 384 с.
  89. Terrence V. Lillard. Digital Forensics for Network, Internet, and Cloud Computing. – М.: , 2010. – 368 с.
  90. James Doyle. Nuclear Safeguards, Security and Nonproliferation. – М.: , 2010. – 624 с.
  91. Jan Kanclirz. Netcat Power Tools. – М.: , 2010. – 280 с.
  92. Russ Rogers. Network Security Evaluation Using the NSA IEM. – М.: , 2010. – 450 с.
  93. Philip Purpura. Retail Security and Shrinkage Protection. – М.: , 2010. – 336 с.
  94. Brien Posey. GFI Network Security and PCI Compliance Power Tools. – М.: , 2010. – 488 с.
  95. Umer Khan. The Ultimate Windows 2003 Security and Administration CD. – М.: , 2010. – 0 с.
  96. Umer Khan. The Ultimate Cisco and Security and IP Configuration CD. – М.: , 2010. – 0 с.
  97. Syngress. Managing Cisco Network Security 2E. – М.: , 2010. – 752 с.
  98. Charles Nemeth. Private Security and the Investigative Process. – М.: , 2010. – 376 с.
  99. Geoff Craighead. High-Rise Security and Fire Life Safety. – М.: , 2010. – 696 с.
  100. Michael Gough. Video Conferencing over IP: Configure, Secure, and Troubleshoot. – М.: , 2010. – 0 с.
  101. Pamela A. Collins. Principles of Security and Crime Prevention. – М.: , 2010. – 490 с.
  102. J. Barry Hylton. Safe Schools: A Security and Loss Prevention Plan. – М.: , 2010. – 232 с.
  103. Bryan Burns. Security Power Tools. – М.: , 2007. – 856 с.
  104. Nitesh Dhanjani. Network Security Tools. – М.: , 2005. – 340 с.
  105. Edited by Benjamin J Goold and Liora Lazarus. Security and Human Rights. – М.: , 2011. – 426 с.
  106. Helen Toner, Elspeth Guild and Anneliese Baldaccini. Whose Freedom, Security and Justice?. – М.: , 2011. – 582 с.
  107. RF GRAF. Graf Tab Handbook Of Hand And ?power Tools? (paper Only). – М.: , 1985. – 0 с.
  108. Cryptography & Network Security. – М.: , 2007. – 0 с.
  109. Principles Of Computer Security, Comptia Security+ And Beyond, Second Edition. – М.: , 2011. – 0 с.
  110. Wireless Network Security A Beginners Guide. – М.: , 2011. – 400 с.
  111. Principles Of Computer Security Comptia Security+ And Beyond Lab Manual, Second Edition. – М.: , 2011. – 352 с.
  112. Network Security: The Complete Reference. – М.: , 2011. – 896 с.
  113. Fundamentals Of Network Security. – М.: , 2011. – 672 с.
  114. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . –  с.
  115. Ido Dubrawsky. How to Cheat at Securing Your Network. – М.: Syngress, 2007. – 432 с.
  116. Tom Page. Battery Technology in the Development of Power Tools. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  117. Shaek Rana Mohammad Baki Billah and Mohammad Hafizur Rahman. Design & Development of Network Security System using IP Tables. – М.: LAP Lambert Academic Publishing, 2013. – 164 с.
  118. Mohd Zamri Che Wanik. Simulation and Management of Distributed Generation. – М.: LAP Lambert Academic Publishing, 2011. – 140 с.
  119. Xiangqian Chen. DEFENSE AGAINST NODE COMPROMISE IN SENSOR NETWORK SECURITY. – М.: LAP Lambert Academic Publishing, 2009. – 108 с.
  120. Mahdiyeh Eslami,Hussain Shareef and Azah Mohamed. Design and Placement of Power System Stabilizer. – М.: LAP Lambert Academic Publishing, 2012. – 152 с.
  121. Alison E. Green and Mary R. Power. Migrating Close to Home. – М.: LAP Lambert Academic Publishing, 2010. – 200 с.
  122. Vinay Abburi. SECURE AND RELIABLE DEEP SPACE NETWORKS. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  123. Muhammad Azfar Anwar and Saif ur Rehman. Defense Spending, National Security and Economic Growth of Pakistan. – М.: LAP Lambert Academic Publishing, 2012. – 128 с.
  124. Zlatko Milisa and Mirela Tolic. How to acquire media competences?. – М.: LAP Lambert Academic Publishing, 2012. – 116 с.
  125. Hamid Asgari and Kayvan Seyed Nejadian. Science Communication. – М.: LAP Lambert Academic Publishing, 2011. – 200 с.
  126. Subir Biswas. Security and Privacy in Vehicular Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2013. – 204 с.
  127. Lusheng Miao,Karim Djouani and Anish Kurien. Network routing and coding in wireless sensor networks. – М.: LAP Lambert Academic Publishing, 2012. – 168 с.
  128. Xiaodong He. Automated intrusion prevention mechanism in enhancing network security. – М.: Scholars' Press, 2014. – 128 с.
  129. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  130. Omid Mahdi Ebadati E.,Harleen Kaur M. Afshar Alam and Kaebeh Yaeghoobi. Micro-Firewalls for Dynamic Network Security Framework. – М.: LAP Lambert Academic Publishing, 2012. – 292 с.
  131. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  132. Vincent Omollo. Enhanced Network Security. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  133. Faisal Al Mahrouqi. Energy-Aware Security and QoS Routing Trade-offs in Wireless Networks. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  134. Firkhan Ali Hamid Ali. Vulnerability Analysis on the Computer Network Security. – М.: LAP Lambert Academic Publishing, 2010. – 72 с.
  135. Imran Sohail and Sikandar Hayat. Network Security and DDoS. – М.: LAP Lambert Academic Publishing, 2010. – 64 с.
  136. Mohammad Faisal. Networks Security and Communication. – М.: LAP Lambert Academic Publishing, 2012. – 56 с.
  137. Edmond K. Machie. Network Attack Traceback And React. – М.: LAP Lambert Academic Publishing, 2013. – 208 с.
  138. Ekoningtyas Margu Wardani and Muyanja Ssenyonga. Soaring Food Prices, Food Security, and Poverty in Indonesia. – М.: LAP Lambert Academic Publishing, 2013. – 128 с.
  139. Dr. Gisli Thorsteinsson,Dr. Tom Page and Dr. Subramaniam Arunachalam. The Design and Marketing of Power Tools. – М.: LAP Lambert Academic Publishing, 2011. – 68 с.
  140. Prashant Pittalia. Ecommerce Security Real Life Cases And Practical Solutions. – М.: , 2015. – 72 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Наука человековедения. интервью с Д. Уолтоном, профессором London Metropolitan University, экспертом CIPD. Chartered Institute of Personnel and Development, автором программы Master of Arts in Human Resource Strategies. И. Смирнова, "Кадровый менеджмент", № 5, июль-август 2007.
  2. Специализированный модуль FS-CD. Collections and Disbursements - "Сборы и Выплаты" и его возможности. О.А. Глущенко, "Финансовый менеджмент в страховой компании", № 2, II квартал 2007.
  3. Бюджетирование страховой компании на базе Oracle Enterprise Planning and Budgeting. Д.В. Лесоводский, "Финансовый менеджмент в страховой компании", № 3, III квартал 2006.
  4. Регулирование операций торгового финансирования: новые инициативы. интервью с Д. Шмандом, вице-председателем Банковской комиссии ICC по supply chain finance, главой подразделения Trade Finance and Cash Management Corporates EMEA в Global Transaction Banking. GTB division Deutsche Bank. Н. Макарова, "Международные банковские операции", N 2, апрель-июнь 2012 г.
  5. Ужин в темноте в стиле Малевича и Новый год в Хаммере". Что может выть лучше?". интервью с Н. Саниной, индивидуальным предпринимателем и креативным директором компании "San and stars". М. Сипатова, "Арсенал предпринимателя", N 12, декабрь 2011 г.
  6. На пути к новому стандарту в торговом финансировании. интервью с А.  Кастерманом, руководителем Trade and Supply Chain, SWIFT, сопредседателем рабочей группы ICC-BPO. Э. Шакирова, "Международные банковские операции", N 4, октябрь-декабрь 2011 г.
  7. Compliance - необходимость или излишество?. М. Майер, "Консультант", N 15, август 2011 г.
  8. Практические аспекты регулятивного комплаенса, или Who owns regulatory compliance?. М.А. Шалимова, "Внутренний контроль в кредитной организации", N 3, июль-сентябрь 2011 г.
  9. Уильям Савадж: Мотивировать людей в Нижнем Новгороде и Новосибирске нужно по-разному". интервью с У. Саваджем, вице-президентом корпорации Intel, подразделение Software and Services Group. М. Холкина, "Управление персоналом", N 14, июль 2010 г.
  10. Цены под контролем: the present and the future. С. Стройкова, И. Леметюйнен, "Консультант", № 19, сентябрь 2009.
  11. Основной арсенал "охотника" - его network: кого он знает на рынке и качество этих отношений. С. Плетнева, "Управление персоналом", № 12, июнь 2009.
  12. Стандарт PCI DSS - надежная защита банковских карт. А. Чередниченко, "БДМ. Банки и деловой мир", № 12, декабрь 2008.
  13. Compliance-функция в коммерческих и инвестиционных банках: как ее понимают работодатели. Ю. Дорфман, "Корпоративный юрист", № 9, сентябрь 2008.
  14. Программа compliance в американских компаниях. Е. Красникова, В. Морозько, "Корпоративный юрист", № 1, январь 2008.

Образцы работ

Тема и предметТип и объем работы
Сочетание заимствования кельтских мотивов и подсознательного мифологического клише в романе Толкиена «Властелин Колец»
Литература
Курсовая работа
40 стр.
Порядок разработки, проектирования системы стратегического менеджмента
Менеджмент
Диплом
100 стр.
Проблемы стратегического менеджмента в организации
Менеджмент
Диплом
80 стр.
Последствия операции НАТО
Политология
Диплом
80 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Алексей
Здравствуйте, нам выставили оценки за курсовые за обе курсовые нам поставили 4 при защите, ей видимо в курсовой просто не понравилось негативное отношение к оценщикам, поэтому она и поставила такие оценки, а в переделанной работе это все было убрано и она поставила более высокие оценки, а по банковскому делу поставили 5. Так что все хорошо. Спасибо большое!