Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Abhay Nath Singh. Honeypot Based Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  2. Kamrul Hasan. An Investigation into Botnet Detection System. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.

Дополнительные результаты

  1. Safe Schools: A Security and Loss Prevention Plan. – М.: , 0. – 0 с.
  2. Martin Loney. The Pursuit of Division: Race, Gender, and Preferential Hiring in Canada. – М.: McGill-Queens University Press, 1998. – 396 с.
  3. Jens Rasmussen, Annelise Mark Pejtersen, L. P. Goodstein. Cognitive Systems Engineering. – М.: , 0. – 0 с.
  4. Gerhard Knolmayer, Peter Mertens, Alexander Zeier. Supply Chain Management Based on SAP Systems. – М.: , 0. – 0 с.
  5. Dorothy E. Denning, Peter J. Denning. Internet Besieged. – М.: , 0. – 0 с.
  6. Martin Kay, Jean Mark Gawron, Peter Norvig. Verbmobil: A Translation System for Face-To-Face Dialog (Csli Lecture Notes, No 33). – М.: , 0. – 0 с.
  7. Paul Piccard, Jeremy Faircloth. Combating Spyware in the Enterprise. – М.: , 2006. – 386 с.
  8. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с.
  9. George F. Cole, Christopher E. Smith. The American System of Criminal Justice. – М.: , 2006. – 656 с.
  10. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с.
  11. Semantic Knowledge Management: An Ontology-based Framework (Premier Reference Source). – М.: , 2008. – 458 с.
  12. Trust, Privacy and Security in Digital Business: 5th International Conference, TrustBus 2008 Turin, Italy, September 1-5, 2008, Proceedings (Lecture Notes in Computer Science). – М.: , 2008. – 205 с.
  13. Alexander Lohr. Measurability of IT/IT-Security: Business process mapping as technical systems. – М.: , 2010. – 56 с.
  14. Rory Bray. OSSEC Host-Based Intrusion Detection Guide. – М.: , 2010. – 416 с.
  15. Syngress. Snort Intrusion Detection 2.0. – М.: , 2010. – 550 с.
  16. Brian Caswell. Snort Intrusion Detection and Prevention Toolkit. – М.: , 2010. – 768 с.
  17. Robert Barnard. Intrusion Detection Systems. – М.: , 2010. – 480 с.
  18. Terry Escamilla. Intrusion Detection. – М.: , 1998. – 368 с.
  19. Michel R. Klein. Knowledge–Based Decision Support Systems With Applications in Business. – М.: , 1995. – 544 с.
  20. GI DOUKIDIS. Doukidis: Knowledge Based Management ?support? Systems. – М.: , 1989. – 256 с.
  21. Edward H. Y. Lim, James N. K. Liu, Raymond S.T. Lee. Knowledge Seeker - Ontology Modelling for Information Search and Management: A Compendium (Intelligent Systems Reference Library). – М.: , 2011. – 238 с.
  22. Theodore T. Allen. Introduction to Discrete Event Simulation and Agent-based Modeling: Voting Systems, Health Care, Military, and Manufacturing. – М.: , 2011. – 215 с.
  23. Hacking Exposed Malware And Rootkits. – М.: , 2011. – 400 с.
  24. Fundamentals Of Network Security. – М.: , 2011. – 672 с.
  25. Gino Van Den Bergen. Collision Detection in Interactive 3D Environments. – М.: Morgan Kaufmann, 2003. – 278 с.
  26. Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky. Cisco Security Professional's Guide to Secure Intrusion Detection Systems. – М.: , . –  с.
  27. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . –  с.
  28. Christer Ericson. Real-Time Collision Detection (The Morgan Kaufmann Series in Interactive 3-D Technology). – М.: Morgan Kaufmann, 2004. – 594 с.
  29. Ido Dubrawsky. How to Cheat at Securing Your Network. – М.: Syngress, 2007. – 432 с.
  30. Sheikh Mominul Islam. Grid Impact of Renewable Energy on Isolated and Remote Power System. – М.: LAP Lambert Academic Publishing, 2014. – 132 с.
  31. David Zumoffen and Marta Basualdo. Fault Detection Systems Integrated to Fault-Tolerant Control. – М.: LAP Lambert Academic Publishing, 2012. – 236 с.
  32. Anup Bhange and Manmeet Kaur Marhas. Anomaly Detection in Network Traffic; A Statistical Approach. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  33. R?fat Benveniste and Cem Unsalan. Color Coded Structured Light based Range Scanners. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.
  34. Pardeep Rohilla. Soft-Computing Based Pressure Control System. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  35. Gulshan Kumar. Effective Intrusion Detection using Genetic Algorithms. – М.: LAP Lambert Academic Publishing, 2014. – 100 с.
  36. Edward Sazonov. AUTOMATED DAMAGE DETECTION. – М.: LAP Lambert Academic Publishing, 2010. – 208 с.
  37. Ergun Bagc?. RFID Systems Design for Potential Applications. – М.: LAP Lambert Academic Publishing, 2011. – 124 с.
  38. Tanmoy Hazra. Application of PCA in IDS. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  39. Augustine Akuoko Kwarteng. Biomass-based Thermal Power Generation. – М.: LAP Lambert Academic Publishing, 2013. – 104 с.
  40. Md. Rashidul Islam and Md. Rafiqul Islam Sheikh. Enhancement of Power System Stability by Using DFIG Based Wind Farm. – М.: LAP Lambert Academic Publishing, 2014. – 148 с.
  41. Anamika Jain. Ann Based Fault Detection, Classification and Distance Location. – М.: LAP Lambert Academic Publishing, 2011. – 140 с.
  42. Saifur Rahman Sabuj and Sreekrishna Das. OFDM based Cooperative Communication over Nakagami Fading Channel. – М.: LAP Lambert Academic Publishing, 2013. – 60 с.
  43. Gurpreet Kaur. Rice Grading System for Embedded Image Processing. – М.: LAP Lambert Academic Publishing, 2014. – 96 с.
  44. Hong Nie. Software Defined Radio Based Wideband CDMA Systems. – М.: LAP Lambert Academic Publishing, 2011. – 140 с.
  45. Naveen K. S. Histogram Equalization & PCA based Face Recognition on MATLAB Platform. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  46. Saifur Sabuj. Microcontroller Based Friend or Foe (FoF) Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 52 с.
  47. Sunny Jamb,Deepak Kedia and Himanshu Dutt Sharma. DC Motor fault detection and Speed Characterization. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  48. Muhammad Zeeshan and Shoab Ahmed Khan. Power Optimization of CDMA based Tactical Networks. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  49. Sampath V.P. FPGA Based Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  50. Ubaid Ur Rahman and Farhana Shahid. RFID Based Library Management System. – М.: LAP Lambert Academic Publishing, 2013. – 108 с.
  51. Anaahat Dhindsa and Sumit Budhiraja. Content Based Image Retrieval System for CAD Images. – М.: LAP Lambert Academic Publishing, 2013. – 88 с.
  52. Mahdi Majedi. Gsm Based Data Acquisition System. – М.: LAP Lambert Academic Publishing, 2014. – 72 с.
  53. Manav Shah. FPGA Based Self-test Systems. – М.: LAP Lambert Academic Publishing, 2012. – 116 с.
  54. Ravi Mishra. GPS based Taxi Fare System. – М.: LAP Lambert Academic Publishing, 2010. – 56 с.
  55. Huang-Chun Roan. Network Intrusion Detection Based on Shift-OR Circuit. – М.: LAP Lambert Academic Publishing, 2011. – 60 с.
  56. Amedeo Troiano. A Sensor Network System for Road Ice Formation Detection. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  57. Filipe Magalhaes. Gas detection systems based on microstructured optical fibres. – М.: LAP Lambert Academic Publishing, 2010. – 104 с.
  58. Swarnambuj Suman and Sanjay Kumar Jha. Knowledge Based Decision Support System for Steel Industries. – М.: LAP Lambert Academic Publishing, 2013. – 160 с.
  59. Parimal Rajkondawar,Robert Dyer and Uri Tasch. Objective Dairy Cattle Lameness Detection System. – М.: LAP Lambert Academic Publishing, 2010. – 176 с.
  60. Amro Shafik,Magdy Abdelhameed and Ahmed Kassem. CMAC Based Motion Control of Electrohydraulic Servo Systems. – М.: LAP Lambert Academic Publishing, 2013. – 140 с.
  61. Simon Mitton and Michael Dowd. Damage Detection of Bridge Decks Using Artificial Neural Networks. – М.: LAP Lambert Academic Publishing, 2011. – 64 с.
  62. Francesco Lazzarotto. Design of a reliable processing system for satellite data. – М.: LAP Lambert Academic Publishing, 2010. – 352 с.
  63. M. Sadiq Ali Khan and S. M. Aqil Burney. Recent Trends in Intrusion Detection System & Network Monitoring. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  64. Cruceru Madalina. Radiation Detection Systems With Applications in High Energy Physics. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  65. Yi Xin. Mid-IR-based Gas Detection System Analysis Model. – М.: LAP Lambert Academic Publishing, 2011. – 136 с.
  66. He Li. INFRARED SPECTROSCOPIC DETECTION OF CHARGED PARTICLES. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  67. AbdelMonaem AbdAllah,Khalid Eldrandaly and AbdelHadi Ahmed. Intelligent GIS-based Decision Support System for Bus Routing Problem. – М.: LAP Lambert Academic Publishing, 2012. – 124 с.
  68. Sheikh Rafik Manihar Ahmed Shahjada,Ekta Shrivastava and Komal Prasad Dewangan. Fault detection & isolation unit. – М.: LAP Lambert Academic Publishing, 2013. – 192 с.
  69. T. Bezboruah,K. C. Sarma and A. Goswami. Embedded system design based on 8051 and PIC family microcontroller. – М.: LAP Lambert Academic Publishing, 2011. – 100 с.
  70. DOROTHY MPABANGA. The Key Performance Indicator(KPI)based Performance Management System. – М.: LAP Lambert Academic Publishing, 2010. – 436 с.
  71. Shahriar Ahmed,Abu Farzan Mitul and Muhammad Rakeeb. A Vision Based Motion Capture System. – М.: LAP Lambert Academic Publishing, 2013. – 56 с.
  72. Himanshu Shekhar and Vishnu Kant. Thermodynamics of Nicotinamide based Binary Drug Systems. – М.: LAP Lambert Academic Publishing, 2013. – 112 с.
  73. Augustine Ojino,Careena Otieno and Dan Kaseje. Use of Community Based Health Information Systems in Health Systems. – М.: LAP Lambert Academic Publishing, 2012. – 124 с.
  74. Syed Muhammad Yasir Jafri. IP Based Patient Monitoring System. – М.: LAP Lambert Academic Publishing, 2014. – 72 с.
  75. Nzanzu Jeremie,Dan Kaseje and Rose Olayo. Community-based Health Information Systems For Decision Making. – М.: LAP Lambert Academic Publishing, 2014. – 52 с.
  76. SAADIYAH DARUS. A Framework for a Computer-Based Essay Marking System. – М.: LAP Lambert Academic Publishing, 2010. – 284 с.
  77. Absalom Ezugwu. Web-Based Examination Management System (WEMS). – М.: LAP Lambert Academic Publishing, 2011. – 88 с.
  78. Sirak Tesfahun,Etsub W/Kirkos and Semalgn Eshete. Web Based School Management System. – М.: LAP Lambert Academic Publishing, 2013. – 148 с.
  79. Zelalem Weldesenbet. A Metric Based Automatic Code Smell Detection Tool. – М.: LAP Lambert Academic Publishing, 2014. – 92 с.
  80. Abhay Nath Singh. Honeypot Based Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  81. Shahnawaz Husain,S. C. Gupta and R. C. Joshi. Intrusion Detection Engine for Adhoc Environment. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  82. Sumaya Saad Sulaiman and Sarab M. Hameed. A Fuzzy Based Clustering for Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  83. Sumi Anandh. Intrution Detection System To Detect WEB Anomalies. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  84. Shubha Puthran and Ketan Shah. Intrusion Detection System using datamining techniques. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  85. Mohammad S. I. Mamun. Intrusion Detection System Architecture in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  86. Heba Fathy Eid. Computational Intelligence in Network Intrusion Detection System. – М.: Scholars' Press, 2014. – 164 с.
  87. Janakiraman S. Distributed Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 164 с.
  88. Yogesh Kumar,Krishan Kumar and Gulshan Kumar. Feature Selection For Intrusion Detection Systems. – М.: LAP Lambert Academic Publishing, 2014. – 100 с.
  89. Okuthe Kogeda. MODELLING OF RELIABLE SERVICE BASED OPERATIONS SUPPORT SYSTEM. – М.: LAP Lambert Academic Publishing, 2011. – 172 с.
  90. Seyi Osunade. Java-Based Mobile Agent Systems. – М.: LAP Lambert Academic Publishing, 2012. – 156 с.
  91. Syed Zahidur Rashid. Computer Network Security Monitoring. – М.: Scholars' Press, 2015. – 284 с.
  92. Gulshan Kumar. Effective Intrusion Detection using Feature Selection. – М.: LAP Lambert Academic Publishing, 2014. – 92 с.
  93. Mrutyunjaya Panda and Manas Ranjan Patra. A Data Mining Approach to Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2015. – 216 с.
  94. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  95. Mueen Uddin. Dynamic Multi Layer Signature based IDS System using Mobile Agents. – М.: LAP Lambert Academic Publishing, 2011. – 72 с.
  96. Ivano Malavolta. A tamper resistant Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2011. – 144 с.
  97. Prashant Kumar Singh and Avimanyou Kumar Vatsa. Taxonomy Based Intrusion Attacks and Detection Scheme in P2P Network. – М.: LAP Lambert Academic Publishing, 2012. – 56 с.
  98. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  99. Shaffali Gupta and Sanmeet Kaur. A GUI Framework for detecting Intrusions using Bro IDS. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  100. Mahmoud Jazzar. Computer Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 240 с.
  101. Siva S. Sivatha Sindhu,S. Geetha and S. Selvakumar. Network Intrusion Detection System using Machine Learning Techniques. – М.: LAP Lambert Academic Publishing, 2013. – 80 с.
  102. Nasim Beigi-Mohammadi. Smart Meter Networks: Intrusion Detection System by Design. – М.: LAP Lambert Academic Publishing, 2014. – 136 с.
  103. Christian Chetachi Umunna. Distributed Intrusion Detection System in Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 104 с.
  104. Iftikhar Ahmad. Feature Subset Selection in Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 220 с.
  105. Saima Munawar. Detection and Classification Of Normal and Anomaly IP Packet. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  106. Jabarweer Singh,Krishan Kumar and Gulshan Kumar. Intrusion detection using artificial intelligence based ensembles. – М.: LAP Lambert Academic Publishing, 2014. – 116 с.
  107. Govind Sreekar Shenoy. Architecture Support for Intrusion Detection systems. – М.: LAP Lambert Academic Publishing, 2014. – 160 с.
  108. Mahmoud S. Awadallah. Mobile Agent based Electronic Commerce Systems. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  109. Sanni Abubakar Omuya Ogirima. Web-Based Decision Support System for Prescriptions in Herbal Medicine. – М.: LAP Lambert Academic Publishing, 2013. – 164 с.
  110. Monis Akhlaq,Irfan Awan and Faeiz Alserhani. Improved Performance High Speed Network Intrusion Detection Systems. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  111. Prakash Prasad. Intrusion Detection System: Findings. – М.: LAP Lambert Academic Publishing, 2011. – 104 с.
  112. Homam El-Taj and Omar Amer. Network Alert Management System For IDS False Positive Reduction. – М.: LAP Lambert Academic Publishing, 2013. – 156 с.
  113. Bibi Masoomeh Aslahi Shahri. Intrusion Detection System Using Hybrid Gsa-kmeans. – М.: LAP Lambert Academic Publishing, 2014. – 128 с.
  114. Muna Elsadig Mohamed Ahmed Elsheik. Bio Inspired Intrusion Prevention and Self healing System for Networks. – М.: LAP Lambert Academic Publishing, 2012. – 256 с.
  115. Saghar Estehghari. Impact of Client-side Vulnerabilities on Web-based E-voting Systems. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  116. Tigabu Dagne Akal. Constructing Predictive Model for Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 160 с.
  117. Kamaruzaman Maskat and Mohd Afizi Mohd Shukran. Agent Based Snort In Distributed Environment. – М.: LAP Lambert Academic Publishing, 2013. – 112 с.
  118. Kamrul Hasan. An Investigation into Botnet Detection System. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  119. Om Prakash Rishi. Distributed Architecture of CBR based Intelligent Tutoring System. – М.: LAP Lambert Academic Publishing, 2014. – 168 с.
  120. Emmanuel Kusi Achampong. Development of a Web-based Data Entry System for Disease Surveillance. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  121. Rupali Pathak. Recent Advances In Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  122. Fadel O. Shaban. Spyware Detection. – М.: LAP Lambert Academic Publishing, 2013. – 92 с.
  123. Ankur Shah and Hemraj Varachhia. Graph Based Web Recommendation System to Improve Time Efficiency. – М.: LAP Lambert Academic Publishing, 2014. – 60 с.
  124. Md. Rabiul Islam,Md. Sohrab Mahmud and Md. Fayzur Rahman. Vector Quantization based Speech Recognition System. – М.: LAP Lambert Academic Publishing, 2010. – 80 с.
  125. Kamruzzaman Md and Michel Mesa. Web-based Project Information System. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  126. Silvance Onyango Abeka. Determinants for acceptance of web based marketing information systems. – М.: LAP Lambert Academic Publishing, 2013. – 196 с.
  127. Emon Kumar Dey. Computer Vision Based Gender Detection from Facial Image. – М.: LAP Lambert Academic Publishing, 2013. – 80 с.
  128. Cheng-Hsiung Chiang. Soft Computing Based Intelligent Control Systems and Applications. – М.: LAP Lambert Academic Publishing, 2011. – 156 с.
  129. Al-Sakib Khan Pathan. Securing WSN with Lightweight Resource-Efficient Schemes. – М.: LAP Lambert Academic Publishing, 2011. – 116 с.
  130. Segun Olatinwo. Development of a Networked Thumb Print-Based Staff Attendance System. – М.: LAP Lambert Academic Publishing, 2013. – 56 с.
  131. Alpay Doruk. Security Review Program Requirements for Intrusion Management Systems. – М.: LAP Lambert Academic Publishing, 2010. – 88 с.
  132. Sathish Kumar. Intrusion Detection and Response Techniques for Mobile Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 200 с.
  133. Richard Rimiru. Exploring Immune System's Concepts for the Design of Novel AIS Models. – М.: LAP Lambert Academic Publishing, 2012. – 164 с.
  134. Binyam Chakilu Tilahun. Basics of Linked Data based Health Information System Development. – М.: LAP Lambert Academic Publishing, 2014. – 104 с.
  135. Nguyen Nhu. Ontology-based Elearning Management System. – М.: LAP Lambert Academic Publishing, 2010. – 60 с.
  136. Maher Aburrous,Alamgir Hossain and Keshav Dahal. Phishing Website Detection using Intelligent Data Mining Techniques. – М.: LAP Lambert Academic Publishing, 2012. – 192 с.
  137. HAIYAN XIE,Raja R.A. Issa and David (Wei) Shi. User-Based Adaptive Information System in Project Management. – М.: Scholars' Press, 2014. – 372 с.
  138. Dermawan Wibisono. Knowledge-Based Performance Measurement Systems. – М.: LAP Lambert Academic Publishing, 2014. – 296 с.
  139. Tarun soota. Financial Accounting of ISO 9000 based Quality Information System. – М.: LAP Lambert Academic Publishing, 2012. – 164 с.
  140. Nadim Al-Mosawi and Frida Ohlson. Occupant Detection System. – М.: , 2015. – 64 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Банковское отделение будущего. интервью с Камероном МакКворри. Cameron MacQuarrie, менеджером по развитию бизнеса компании Cisco Systems в области корпоративных финансов в регионе EMEA. Европа, Ближний Восток, Африка. Н.Ф. Колюшенко, "Расчеты и операционная работа в коммерческом банке", № 2, февраль 2006.
  2. Учет и калькулирование затрат по функциям. Метод АВС. Activity-Based Costing. М.К. Ерижев, "Новое в бухгалтерском учете и отчетности", № 19, октябрь 2003.
  3. Ловушка для пирата. интервью с И. Слабых, руководителем отдела противодействия интеллектуальному пиратству в России и СНГ Adobe Systems. И. Голова, "Расчет", N 9, сентябрь 2012 г.
  4. Обеспечение безопасности PIN-Based операций с банковскими картами. С.В.  Серебряков, "Расчеты и операционная работа в коммерческом банке", N 2, март-апрель 2012 г.
  5. Risk-based pricing: посткризисные тенденции. А.В. Гидулян, "Банковское кредитование", N 1, январь-февраль 2012 г.
  6. Я воспринимаю персонального помощника как напарника червяк должен нравиться рыбке, а не рыбаку. интервью с П.А. Черкашиным, руководителем российского представительства компании Adobe Systems. "Управление персоналом", № 20, октябрь 2008.

Образцы работ

Тема и предметТип и объем работы
Особенности виртуального общения
Психология
Курсовая работа
28 стр.
Концентрация производства и определение оптимальных размеров
Экономика предприятия
Курсовая работа
25 стр.
Переход от концентрации к развитию малых и средних предприятий
Экономика предприятия
Курсовая работа
21 стр.
Привлекательности труда в организации
Психология
Курсовая работа
35 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Сергей
Марина, спасибо вам огромное с вами приятно иметь дело. Все выполняете в кратчайшие сроки