Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Zdziarski. Hacking and Securing iOS Applications. – М.: , 2012. –  с.

Дополнительные результаты

  1. Constructive Side-Channel Analysis and Secure Design: Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings ... Computer Science / Security and Cryptology). – М.: , 2012. – 280 с.
  2. Kenneth S. Hackel, Joshua Livnat. Cash Flow and Security Analysis. – М.: , 0. – 0 с.
  3. Jianmin Zhao, Bruce J. Dickson, Chien-Min Zhao. Remaking the Chinese State: Strategies, Society, and Security (Asia's Transformations). – М.: , 0. – 0 с.
  4. Asset Protection and Security Management Handbook. – М.: , 0. – 0 с.
  5. Anne McKinney. Real Resumes for Police, Law Enforcement and Security Jobs: Including Real Resumes Used to Change Careers and Transfer Skills to Other Industries). – М.: , 0. – 0 с.
  6. Christopher M. Dent. Asia-Pacific Economic and Security Co-Operation: New Regional Agendas. – М.: , 0. – 0 с.
  7. Gavin Cawthra. Securing South Africa's Democracy: Defense, Development and Security in Transition (International Political Economy Series). – М.: , 0. – 0 с.
  8. Alan Gart. Regulation, Deregulation, Reregulation : The Future of the Banking, Insurance, and Securities Industries. – М.: , 0. – 0 с.
  9. Ifip Tc11 Wg11.5 Working Conference on Integrity and Internal Control, Michael Gertz. Integrity and Internal Control in Information Systems V: Ifip Tc11/Wg11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (Iicis), November 11-12, 2002, Bonn, Germany (International Federation for Information Processing. – М.: , 0. – 0 с.
  10. Jothy Rosenberg and David Remy. Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption. – М.: Sams, 2004. – 380 с.
  11. The Deregulation of the Banking and Securities Industries. – М.: , 2003. – 0 с.
  12. Stephen Penman. Financial Statement Analysis and Security Valuation. – М.: , 2003. – 0 с.
  13. Safety and Security in Tourism: Relationships, Management, and Marketing (Journal of Travel & Tourism Marketing Monographic Separates). – М.: , 2003. – 0 с.
  14. Edward Borodzicz. Risk, Crisis and Security Management. – М.: , 2005. – 0 с.
  15. Stephen Gough. Sustainability and Security within Liberal Societies: Learning to Live with the Future (Routledge Studies in Social and Political Thought). – М.: , 2008. – 148 с.
  16. Michael Blyth. Risk and Security Management: Protecting People and Sites Worldwide. – М.: , 2008. – 402 с.
  17. Environmental Change and Human Security: Recognizing and Acting on Hazard Impacts (NATO Science for Peace and Security Series C: Environmental Security). – М.: , 2008. – 480 с.
  18. Ibp Usa. Global National Intelligence and Security Agencies Handbook. – М.: , 2008. – 300 с.
  19. Ibp Usa. EU Intelligence and Security Policy and Cooperation Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  20. Hamid R. Nemati. Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues (Advances in Information Security and Privacy). – М.: , 2009. – 414 с.
  21. John Rittinghouse, James Ransome. Cloud Computing: Implementation, Management, and Security. – М.: CRC Press, 2009. – 340 с.
  22. Jan H. Kalicki. Energy and Security : Toward a New Foreign Policy Strategy. – М.: , 2005. – 640 с.
  23. Molecular Imaging: Computer Reconstruction and Practice (NATO Science for Peace and Security Series B: Physics and Biophysics). – М.: , 2008. – 288 с.
  24. IT Audit, Control and Security. – М.: , 2010. – 792 с.
  25. Francesco Marchioni. JBoss AS 5 Development. – М.: , 2010. – 416 с.
  26. Erkki Nissinen. Basic aspects of Catechol-O-methyltransferase and the clinical applications of its inhibitors,94. – М.: , 2010. – 360 с.
  27. Robert Nisbet. Handbook of Statistical Analysis and Data Mining Applications. – М.: , 2010. – 864 с.
  28. Xueji Zhang. Electrochemical Sensors, Biosensors and their Biomedical Applications. – М.: , 2010. – 616 с.
  29. Jay Beale. Hacking and Penetration Testing Ultimate CD. – М.: , 2010. – 1 с.
  30. D S Bist. Safety and Security at Sea. – М.: , 2010. – 262 с.
  31. J. Thomas August. HIV I: Molecular Biology and Pathogenesis: Clinical Applications,49. – М.: , 2010. – 568 с.
  32. Dennis P. Nolan. Safety and Security Review for the Process Industries. – М.: , 2010. – 250 с.
  33. Cornelius T. Leondes. Fuzzy Logic and Expert Systems Applications,6. – М.: , 2010. – 416 с.
  34. Author Unknown. Frontiers in Electronics: High Temperature and Large Area Applications. – М.: , 2010. – 0 с.
  35. Anthony Caputo. Digital Video Surveillance and Security. – М.: , 2010. – 352 с.
  36. Gerard Honey. Emergency and Security Lighting. – М.: , 2010. – 224 с.
  37. Gerard Honey. Electronic Protection and Security Systems. – М.: , 2010. – 208 с.
  38. T.J. Ulrych. Information-Based Inversion and Processing with Applications,36. – М.: , 2010. – 436 с.
  39. Umer Khan. The Ultimate Cisco and Security and IP Configuration CD. – М.: , 2010. – 0 с.
  40. Jay Beale. 2008 Open Source Penetration Testing and Security Professional CD. – М.: , 2010. – 0 с.
  41. Charles Carrington. Enterprise Directory and Security Implementation Guide. – М.: , 2010. – 272 с.
  42. Robert Fischer. Loss Prevention and Security Procedures. – М.: , 2010. – 320 с.
  43. Behnam Pourdeyhimi. Imaging and Image Analysis Applications for Plastics. – М.: , 2010. – 315 с.
  44. P.J. Ortmeier. Public Safety and Security Administration. – М.: , 2010. – 208 с.
  45. Edwin Herzfeld. Managerial Economics Study Guide and Casebook – Theory, Applications and Cases 7e. – М.: , 2009. – 0 с.
  46. Jason D Ellis. Combating Proliferation – Strategic Intelligence and Security Policy. – М.: , 2007. – 320 с.
  47. Liang Pan. The United Nations in Japan?s Foreign and Security Policymaking, 1945–1992. – М.: , 2006. – 300 с.
  48. Ted Pattison, Andrew Connell, Scot Hillier, and David Mann. Inside Microsoft SharePoint 2010. – М.: Microsoft Press, 2011. – 648 с.
  49. Stuart. Politics and Security in the Southern Region of th e Atlantic Alliance. – М.: , 1988. – 0 с.
  50. Jason D Ellis. Combating Proliferation – Strategic Intelligence and Security Policy. – М.: , 2004. – 320 с.
  51. Stephen T. Welstead. Neural Network and Fuzzy Logic Applications in C/C++. – М.: , 1994. – 0 с.
  52. Stephen T. Welstead. Neural Network and Fuzzy Logic Applications in C/C++. – М.: , 1994. – 494 с.
  53. Stephen T. Welstead. Neural Network and Fuzzy Logic Applications in C/C++. – М.: , 1994. – 494 с.
  54. David Rook. 10 Principles of Secure Web Application Development. – М.: , 2010. – 408 с.
  55. Christoffer Andersson. GPRS and 3G Wireless Applications. – М.: , 2001. – 352 с.
  56. Michael E Brown. Rational Choice and Security Studies – Stephen Walt & His Critics. – М.: , 2000. – 146 с.
  57. Professor Mario Cerrato. The Mathematics of Derivatives Securities with Applications in MATLAB. – М.: , 2011. – 512 с.
  58. Smith. Delete Control and Security of Interconnected Networks Disk. – М.: , 1998. – 0 с.
  59. M. L. Munjal. Acoustics of Ducts and Mufflers With Application to Exhaust and Ventilation System Design. – М.: , 1987. – 352 с.
  60. Paul A. Calter. Introductory Algebra and Trigonometry with Applications. – М.: , 1999. – 768 с.
  61. AL Clunan. The Social Construction of Russia?s Resurgence – Aspirations, Identity, and Security Interests. – М.: , 2009. – 288 с.
  62. Carl Friedman. Introductory Algebra and Trigonometry with Applications. – М.: , 2002. – 144 с.
  63. Bruno Coppieters. Statehood and Security – Georgia after the Rose Revolution. – М.: , 2005. – 280 с.
  64. Bruno Coppieters. Statehood and Security – Georgia after the Rose Revolution. – М.: , 2005. – 280 с.
  65. Christopher Wells. Securing Ajax Applications. – М.: , 2007. – 250 с.
  66. Genserik L.L. Reniers. Multi–Plant Safety and Security Management in the Chemical and Process Industries. – М.: , 2010. – 290 с.
  67. Pramode K. Verma, Ling Wang. Voice over IP Networks: Quality of Service, Pricing and Security (Lecture Notes in Electrical Engineering). – М.: , 2011. – 200 с.
  68. Dieter Dettke. Germany Says ?No? – The Iraq War and the Future of German Foreign and Security Policy. – М.: , 2009. – 304 с.
  69. Jan H Kalicki. Energy and Security – Toward a New Foreign Policy Strategy. – М.: , 2005. – 640 с.
  70. Jan H Kalicki. Energy and Security – Toward a New Foreign Policy Strategy. – М.: , 2005. – 640 с.
  71. Kelly McGrew. Optimizing and Securing Cisco® AVVID Applications. – М.: , 2002. – 312 с.
  72. Leo J. Langevin. VSE JCL and Subroutines for Application Programmers. – М.: , 1993. – 220 с.
  73. Philip B Heymann. Terrorism, Freedom and Security – Winning Without War. – М.: , 2004. – 227 с.
  74. Lewis. Maximal Abellian Subalgebras of the Classical Alge bras and their Physical Applications. – М.: , 2003. – 448 с.
  75. Microsoft Official Academic Course. ISV Supporting Users and Troubleshooting Desktop Applications on a Microsoft® Windows® XP Operating System, Exam 70–272, Package. – М.: , 2007. – 0 с.
  76. Citrix Xenapp™ Platinum Edition Advanced Concepts: The Official Guide. – М.: , 2011. – 454 с.
  77. Locksmith And Security Professionals' Exam Study Guide. – М.: , 2011. – 368 с.
  78. Yi Qian, James Joshi, David Tipper, Prashant Krishnamurthy. Information Assurance: Dependability and Security in Networked Systems. – М.: Morgan Kaufmann, 2007. – 576 с.
  79. Tretola. Developing iOS Applications with Flex 4.5. – М.: , 2011. –  с.
  80. Northrup. MCPD 70-519 Exam Ref: Designing and Developing Web Applications Using Microsoft .NET Framework 4. – М.: , 2011. –  с.
  81. Northrup. MCPD 70-518 Exam Ref: Designing and Developing Windows Applications Using Microsoft .NET Framework 4. – М.: , 2012. –  с.
  82. Turner. Developing Enterprise iOS Applications. – М.: , 2012. –  с.
  83. Zdziarski. Hacking and Securing iOS Applications. – М.: , 2012. –  с.
  84. WIELENGA. JAVA EE AND HTML5 ENTERPRISE APPLICATION DEVELOPMENT. – М.: , 2014. –  с.
  85. Anand Kumar Gupta and Ashish Tiwari. Micromechanical and Electrical Study on Ternary Polymer Blends. – М.: LAP Lambert Academic Publishing, 2014. – 184 с.
  86. Muhammad Wasim and Abdulbasit Shaikh. Rasterstereography Based Partial Face Recognition. – М.: LAP Lambert Academic Publishing, 2014. – 64 с.
  87. Wenhua Wang and Yu Lei. Web Application Testing And Security Testing Techniques Design. – М.: LAP Lambert Academic Publishing, 2011. – 96 с.
  88. Rajani Sharma and Rajender Trivedi. Data Security in a Cloud Environment using Multilevel UEC. – М.: LAP Lambert Academic Publishing, 2014. – 84 с.
  89. Kanjalochan Jena and Brinda Bhowmick. Optimization Of 3 Dimensional Tunnel Fet And Its Digital Applications. – М.: LAP Lambert Academic Publishing, 2014. – 72 с.
  90. Ajit Danti and Hiremath P. S. Face Detection & Recognition. – М.: LAP Lambert Academic Publishing, 2012. – 140 с.
  91. Mowdudur Rahman Dewan,Riasad Amin and Navid Bin Sakhawat. Ensuring Energy Security. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  92. Abdul Kareem and Mohammad Fazle Azeem. Soft Computing Based Control: Theory and Simulation. – М.: LAP Lambert Academic Publishing, 2012. – 124 с.
  93. Shaikh Salim and Shankar Nawale. Secure Access of RFID System. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  94. Ahmed Ullah Abu Saeed,Al Mamun and A.H.M. Zadidul Karim. Study and Applications of PLCs. – М.: LAP Lambert Academic Publishing, 2013. – 96 с.
  95. Mohammad Jafar Taghizadehmarvast. Analog to Digital Converter For High Speed and Low Power Application. – М.: LAP Lambert Academic Publishing, 2015. – 140 с.
  96. Zahid Abbas and Shafqat Abbas. Automatic Surveillance Vehicle design and Applications. – М.: LAP Lambert Academic Publishing, 2013. – 132 с.
  97. Iraj Sadegh Amiri,Ali Nikoukar and Sayed Ehsan Alavi. Soliton and Radio over Fiber (RoF) Applications. – М.: LAP Lambert Academic Publishing, 2014. – 84 с.
  98. Anshul Sharma and Sunil Agrawal. Filters In Halftone Visual Cryptography Via Error Diffusion. – М.: LAP Lambert Academic Publishing, 2013. – 108 с.
  99. Niraj Topare and Sunita Raut. Photocatalytic Reactor Design and It's Application. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  100. Vijay Khare. Strategic and Security Thoughts of Dr. Babasaheb Ambedkar. – М.: Scholars' Press, 2013. – 188 с.
  101. Remya Scaria. Lipase Enzyme Production using Bacteria and its Industrial Application. – М.: LAP Lambert Academic Publishing, 2013. – 88 с.
  102. Dr.Ram Raj Meena and Subrata Mukharjee. Application of PGRs and chemicals on guava. – М.: LAP Lambert Academic Publishing, 2011. – 120 с.
  103. Mutari Abubakari. Handling and 1-MCP Application on the Quality and Shelf Life of Tomato. – М.: LAP Lambert Academic Publishing, 2011. – 100 с.
  104. A. Irshad,Biju P. Habeeb and P. Gokulakrishnan. Applications of nanotechnology in food packaging and food safety. – М.: Scholars' Press, 2013. – 128 с.
  105. Ashwini Singh,Ravindra Kumar and Vinaya Kumar Singh. Effect of RSC water and gypsum application on crop production. – М.: LAP Lambert Academic Publishing, 2014. – 76 с.
  106. Mr. Muhammad Shahbaz,Prof. Dr. Anwar-ul-Hassan and Wazir Ahmed. Improving growth and Yield of Okra through Slurry and compost application. – М.: LAP Lambert Academic Publishing, 2011. – 112 с.
  107. Okorie Ndukwe,Paul Baiyeri and Cosmas Muoneke. Plantain Hybrids: Influence of Fertilizer Type and Time of Application. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  108. Sitaram Kumawat,R.K. Mathukia and M.K. Khistaria. Greengram Response to Phosphorus and Sulphur. – М.: LAP Lambert Academic Publishing, 2014. – 148 с.
  109. Shailendra Bajpai and J. P. Gupta. Site Security. – М.: LAP Lambert Academic Publishing, 2011. – 88 с.
  110. Kawther Ahmed and Karima Hagagg. Microwave Synthesis and Its Textile Application. – М.: LAP Lambert Academic Publishing, 2013. – 88 с.
  111. More Ashok. Ru Amide Organometallics and Catalytic, pharma Applications. – М.: LAP Lambert Academic Publishing, 2011. – 164 с.
  112. Said Shehata,Omaima Darwish and Yasser Ahmed. Compost and its application in Egypt. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  113. Daisuke Akimoto. ''New Komeito'' in Japanese Politics: Its Foreign and Security Policy. – М.: LAP Lambert Academic Publishing, 2014. – 56 с.
  114. Scott Nicholas Romaniuk. New Polar Horizons: Conflict and Security in the Arctic. – М.: LAP Lambert Academic Publishing, 2011. – 160 с.
  115. Nathaniel Umukoro and Joseph Okon. Development and Security. – М.: LAP Lambert Academic Publishing, 2012. – 208 с.
  116. Biljana Avramoska Gjoreska and Igor Gjoreski. Collective Security and Role of the New European Security Treaty. – М.: LAP Lambert Academic Publishing, 2015. – 84 с.
  117. Leyla Arpac. European Union's Common Foreign and Security Policy and Turkey. – М.: LAP Lambert Academic Publishing, 2011. – 84 с.
  118. Ankur Gupta and Bhupendra Gupta. Random Networks and its Applications. – М.: LAP Lambert Academic Publishing, 2013. – 100 с.
  119. Guy Degla and Mmaduabuchi E. Okpala. Variational Methods, Lusternik-Schnirelman Theory and Applications. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  120. Melkamu Aboma Tolera. Common African Defence and Security Policy. – М.: LAP Lambert Academic Publishing, 2012. – 116 с.
  121. Zekarias Beshah. Peace and Security Council of the African Union. – М.: LAP Lambert Academic Publishing, 2011. – 88 с.
  122. Gurmanpreet Kaur,Anand Pawar and Simranpreet Kaur. Cyber Terrorism and Law. – М.: LAP Lambert Academic Publishing, 2012. – 128 с.
  123. Hamid Reza Barzegar,Mahdiyeh Barzegar and Neshat Alidad. Energy Efficient And Secured Communication For Manets In Military. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  124. Irfan Hafeez and Wajahat Nosharwan. WiMAX Wi-Fi Integrated System QoS and Security. – М.: LAP Lambert Academic Publishing, 2011. – 76 с.
  125. Tarek S. Sobh. Effective and Extensive VPN for Securing Web Applications. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  126. Soke Onyemelukwe. On-Demand Routing and Security in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2013. – 128 с.
  127. Keshava Munegowda. Design and Implementation of WLAN Authentication and Security. – М.: LAP Lambert Academic Publishing, 2010. – 124 с.
  128. Anum Haroon and Sadaf Iqbal. Face detection,classification and transformation android application. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  129. Nadire Cavus and Abdullah Younus. Mobile Devices and Mobile Applications. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  130. Stephen Schiavone,Lalit Garg and Kelly Summers. Information Security in Enterprises - an Ontological Perspective. – М.: LAP Lambert Academic Publishing, 2014. – 232 с.
  131. Firas Abdullah Thweny Al-Saedi and Mazin Mohammed Radhi Al-Haidary. Design and implementation of Linux based VSAT monitoring system. – М.: LAP Lambert Academic Publishing, 2013. – 100 с.
  132. Ahmad Siddiqui,Mohd Rahil and Sultan Aljahdali. E-Business and Security. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  133. Fatty Mustafa Salem,Maged Hamada Ibrahim and Ibrahim Ismail Ibrahim. Efficient and Secure Message Transmission in Vehicular Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  134. Mohammed Faisal. Integrative Framework of Requirement Engineering and Security System. – М.: LAP Lambert Academic Publishing, 2013. – 236 с.
  135. Muhammad Qaiser Saleem,Jafreezal Jaafar and Mohd Fadzil Hassan. Modeling Security Objectives along BPM of SOA Applications. – М.: LAP Lambert Academic Publishing, 2013. – 236 с.
  136. Paolo Gasti. Privacy and Security of Internet Communications. – М.: LAP Lambert Academic Publishing, 2011. – 148 с.
  137. Kerem Beygo and Cihan Eraslan. Enhancing Security and Usability Features of NFC. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  138. T. Bezboruah and M. Kalita. NET and Java web applications. – М.: LAP Lambert Academic Publishing, 2011. – 148 с.
  139. Kh. S. Karimov,Muhammad Abid and Z. M. Karieva. Applications of nano and organic composites based devices. – М.: LAP Lambert Academic Publishing, 2013. – 140 с.
  140. S. V. S. Kishore Kumar. Information Systems Audit And Security In Banking. – М.: LAP Lambert Academic Publishing, 2013. – 476 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Наука человековедения. интервью с Д. Уолтоном, профессором London Metropolitan University, экспертом CIPD. Chartered Institute of Personnel and Development, автором программы Master of Arts in Human Resource Strategies. И. Смирнова, "Кадровый менеджмент", № 5, июль-август 2007.
  2. Специализированный модуль FS-CD. Collections and Disbursements - "Сборы и Выплаты" и его возможности. О.А. Глущенко, "Финансовый менеджмент в страховой компании", № 2, II квартал 2007.
  3. Бюджетирование страховой компании на базе Oracle Enterprise Planning and Budgeting. Д.В. Лесоводский, "Финансовый менеджмент в страховой компании", № 3, III квартал 2006.
  4. Регулирование операций торгового финансирования: новые инициативы. интервью с Д. Шмандом, вице-председателем Банковской комиссии ICC по supply chain finance, главой подразделения Trade Finance and Cash Management Corporates EMEA в Global Transaction Banking. GTB division Deutsche Bank. Н. Макарова, "Международные банковские операции", N 2, апрель-июнь 2012 г.
  5. Ужин в темноте в стиле Малевича и Новый год в Хаммере". Что может выть лучше?". интервью с Н. Саниной, индивидуальным предпринимателем и креативным директором компании "San and stars". М. Сипатова, "Арсенал предпринимателя", N 12, декабрь 2011 г.
  6. На пути к новому стандарту в торговом финансировании. интервью с А.  Кастерманом, руководителем Trade and Supply Chain, SWIFT, сопредседателем рабочей группы ICC-BPO. Э. Шакирова, "Международные банковские операции", N 4, октябрь-декабрь 2011 г.
  7. Уильям Савадж: Мотивировать людей в Нижнем Новгороде и Новосибирске нужно по-разному". интервью с У. Саваджем, вице-президентом корпорации Intel, подразделение Software and Services Group. М. Холкина, "Управление персоналом", N 14, июль 2010 г.
  8. Цены под контролем: the present and the future. С. Стройкова, И. Леметюйнен, "Консультант", № 19, сентябрь 2009.

Образцы работ

Тема и предметТип и объем работы
Последствия операции НАТО
Политология
Диплом
80 стр.
Привлекательности труда в организации
Психология
Курсовая работа
35 стр.
Психология личности Фрейда
Психология
Реферат
27 стр.
Понятие и история брендинга. Анализ создания и стратегия продвижения бренда ***
Электроснабжение городов и промышленных предприятий
Другое
72 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Алина, 27.12
Здравствуйте! Хочу поблагодарить Вас за проделанную работу! Курсовая защищена, оценка - отлично! Спасибо огромное за понимание и готовность помочь)))