Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Mohammed Firdos Alam Sheikh. Improving Web Security by Blocking SQL Injection Attack(SQLIA). – М.: LAP Lambert Academic Publishing, 2012. – 80 с.

Дополнительные результаты

  1. Elizabeth L. Kamzina, Nikolay L. Kamzin. Diffusion value of the pledge: ollector activity. – М.: , 2012. – 116 с.
  2. Unemployment in China: Economy, Human Resources and Labour Markets (Routledge Contemporary China Series). – М.: , 2012. – 288 с.
  3. Denise Garcia. Disarmament Diplomacy and Human Security: Regimes, Norms and Moral Progress in International Relations. – М.: , 2012. – 0 с.
  4. George T. Friedlob, Lydia L. F. Schleifer, George T. Friedlob, L.F. Schleifer. Essentials of Financial Analysis. – М.: , 0. – 0 с.
  5. Richard M. S. Wilson. Accounting for Marketing. – М.: International Thomson Business Press, 1999. – 192 с.
  6. Charles Ferguson. The Broadband Problem: Anatomy of a Market Failure and a Policy Dilemma. – М.: , 0. – 0 с.
  7. Natali Hritonenko, Yuri Yatsenko, Iu. P. Iatsenko. Mathematical Modeling in Economics, Ecology and the Environment (APPLIED OPTIMIZATION Volume 34). – М.: , 0. – 0 с.
  8. Peter Block. The Answer to How Is Yes: Acting on What Matters. – М.: , 0. – 0 с.
  9. Roz Usheroff, Roz Usheroff. Customize Your Career: How to Develop a Winning Strategy to Move Up, Move Ahead, or Move On. – М.: , 0. – 0 с.
  10. Jason Rich, Jason R. Rich. Brain Storm: Tap into Your Creativity to Generate Awesome Ideas and Remarkable Results. – М.: , 0. – 0 с.
  11. Gary Davies, Rosa Chun, Rui Vinhas Da Silva, Stuart Roper. Corporate Reputation and Competitiveness. – М.: Routledge, 2002. – 224 с.
  12. Robert Heller, Tim Hindle. Essential Managers: Managing Teams. – М.: , 0. – 0 с.
  13. Peter S. Pande, Robert P. Neuman, Roland R. Cavanagh. The Six Sigma Way Team Fieldbook: An Implementation Guide for Process Improvement Teams. – М.: , 0. – 0 с.
  14. Kunio Shirose, Nihon Puranto Mentenansu Kyokai. Tpm Team Guide (Shopfloor Series). – М.: , 0. – 0 с.
  15. Jay Arthur, Lowell Jay Arthur. Six Sigma Simplified. – М.: , 0. – 0 с.
  16. Jerry Spiegel, Cresencio Torres. Manager's Official Guide to Team Working. – М.: Pfeiffer, 1994. – 176 с.
  17. Information Warfare : corporate attack and defence in a digital world (Computer Weekly Professional (Paperback)). – М.: , 0. – 0 с.
  18. Miguel Fernandez-Ranada, F. Xavier Gurrola-Gal, Enrique Lopez-Tello. 3C: A Proven Alternative to MRPII for Optimizing Supply Chain Performance. – М.: , 0. – 0 с.
  19. Bob Hammond. How to Beat the Credit Bureaus: Insiders Guide to Consumer's Credit. – М.: , 0. – 0 с.
  20. Frank J. Fabozzi. Securities Lending and Repurchase Agreements. – М.: , 0. – 0 с.
  21. J. Keith Murnighan, John C. Mowen, J. Keith Murnighan, John C. Mowen. The Art of High Stakes Decision Making: Tough Calls in a Speed Driven World. – М.: , 0. – 0 с.
  22. Theo J. W. Renkema. The IT Value Quest: How to Capture the Business Value of IT-Based Infrastructure. – М.: , 0. – 0 с.
  23. Bunji Tozawa, Norman Bodek. The Idea Generator: Quick and Easy Kaizen. – М.: , 0. – 0 с.
  24. Dan A. Bavly. Corporate Governance and Accountability : What Role for the Regulator, Director, and Auditor?. – М.: , 0. – 0 с.
  25. Robert Damelio. The Basics of Process Mapping. – М.: Productivity Press, 1996. – 80 с.
  26. John Blanchard. Teaching and Targets: Self Evaluation and School Improvement. – М.: , 0. – 0 с.
  27. Henry George Adams, Sudhir, M.D. Arora, Henry G. Adams, Sudhir Arora. Total Quality in Radiology: A Guide to Implementation. – М.: , 0. – 0 с.
  28. Mike Gunderloy, Ed Tittel, Kirk Hausman. MCAD Developing XML Web Services and Server Components with Visual Basic .NET and the .NET Framework Exam Cram 2 (Exam Cram 70-310). – М.: , 0. – 0 с.
  29. Steve Johnson, Inc. Perspection, Inc. Perspections. Show Me Microsoft Office Outlook 2003. – М.: , 0. – 0 с.
  30. Simson Garfinkel, Gene Spafford. Web Security & Commerce (O'Reilly Nutshell). – М.: , 0. – 0 с.
  31. Donald C. Fisher. Homeland Security Assessment Manual: A Comprehensive Organizational Assessment Based On Baldridge Criteria. – М.: , 2004. – 0 с.
  32. Steve Bell. Lean Enterprise Systems: Using IT for Continuous Improvement. – М.: , 2005. – 0 с.
  33. Philip J. Pratt. A Guide to SQL, Seventh Edition. – М.: , 2004. – 312 с.
  34. Chuck Martin. Coffee at Luna's: A Business Fable; Three Secrets to Knowledge, Self-Improvement, and Happiness In Your Work and Life. – М.: , 2005. – 112 с.
  35. Leonard J. Santow, Mark E. Santow. Social Security and the Middle-Class Squeeze: Fact and Fiction about America's Entitlement Programs. – М.: , 2005. – 232 с.
  36. Mike Moran, Bill Hunt. Search Engine Marketing, Inc.: Driving Search Traffic to Your Company's Web Site (2nd Edition). – М.: , 2008. – 672 с.
  37. Jay Hakes. A Declaration of Energy Independence: How Freedom from Foreign Oil Can Improve National Security, Our Economy, and the Environment. – М.: Wiley, 2008. – 256 с.
  38. Pablo Gottret, George Schieber, Hugh R. Waters. Good Practices in Health Financing. – М.: , 2008. – 473 с.
  39. Lewis Stevens. Improving Technician Productivity. – М.: , 2010. – 78 с.
  40. Graeme D. Ruxton, Thomas N. Sherratt, Michael P. Speed. Avoiding Attack: The Evolutionary Ecology of Crypsis, Warning Signals and Mimicry. – М.: Oxford University Press, 2005. – 260 с.
  41. William J. Rothwell, Carolyn K. Hohne, Stephen B. King. Human Performance Improvement: Building Practitioner Competence. – М.: Elsevier, 2007. – 424 с.
  42. Justin Clarke. SQL Injection Attacks and Defense. – М.: , 2010. – 496 с.
  43. Simson Garfinkel. Web Security & Commerce. – М.: , 1997. – 506 с.
  44. Jerri L. Ledford, Joe Teixeira, Mary E. Tyler. Google Analytics. – М.: Wiley, 2009. – 432 с.
  45. Aviel D. Rubin. Web Security Sourcebook. – М.: , 1997. – 368 с.
  46. Microsoft. Improving Web Application Security – Threats and Countermeasures. – М.: , 2003. – 960 с.
  47. Brian Hope. Web Security Testing Cookbook. – М.: , 2008. – 312 с.
  48. Simson Garfinkel. Web Security, Privacy & Commerce 2e. – М.: , 2001. – 790 с.
  49. Ademola Abass. Regional Organisations and the Development of Collective Security. – М.: , 2011. – 272 с.
  50. Hacking Exposed Windows: Microsoft Windows Security Secrets And Solutions, Third Edition. – М.: , 2011. – 451 с.
  51. Oracle Database Ajax & Php Web Application Development. – М.: , 2011. – 458 с.
  52. Principles Of Computer Security, Comptia Security+ And Beyond, Second Edition. – М.: , 2011. – 0 с.
  53. Dynamic Web Programming: A Beginner'S Guide. – М.: , 2011. – 368 с.
  54. Mcitp Sql Server 2005 Database Administration All-In-One Exam Guide (Exams 70-431, 70-443, & 70-444). – М.: , 2011. – 0 с.
  55. Gray Hat Hacking The Ethical Hackers Handbook, 3Rd Edition. – М.: , 2011. – 720 с.
  56. Mobile Application Security. – М.: , 2011. – 432 с.
  57. Value-Added Selling: How To Sell More Profitably, Confidently, And Professionally By Competing On Value, Not Price 3/E. – М.: , 2011. – 288 с.
  58. Hacking Exposed Web Applications, 3Rd Edition. – М.: , 2011. – 482 с.
  59. David Endler, Mark Collier. Hacking Exposed VoIP: Voice Over Ip Security Secrets & Solutions. – М.: McGraw-Hill Osborne Media, 2006. – 574 с.
  60. Effective Oracle Database 10G Security By Design. – М.: , 2011. – 544 с.
  61. Peter Block. The Answer to How Is Yes: Acting on What Matters. – М.: Berrett-Koehler Publishers, 2003. – 194 с.
  62. Joe Celko. Joe Celko's SQL for Smarties: Advanced SQL Programming Third Edition (The Morgan Kaufmann Series in Data Management Systems). – М.: , 2005. – 840 с.
  63. Timothy Stapko. Practical Embedded Security: Building Secure Resource-Constrained Systems. – М.: Newnes, 2007. – 480 с.
  64. Malware, Rootkits and Botnets: A Beginner's Guide. – М.: McGraw-Hill, 2012. – 382 с.
  65. David A. Patterson. Computer Organization and Design: The Hardware / Software Interface (The Morgan Kaufmann Series in Computer Architecture and Design). – М.: Рид Элсивер, 2011. – 916 с.
  66. Jerri Ledford, Joe Teixeira, Mary E. Tyler. Google Analytics. – М.: John Wiley and Sons, Ltd, 2010. – 432 с.
  67. Itzik Ben-Gan. Microsoft SQL Server 2012 T-SQL Fundamentals. – М.: Microsoft Corporation, Microsoft Press, 2012. – 444 с.
  68. Itzik Ben-Gan. Microsoft SQL Server 2012 High-Performance T-SQL Using Window Functions. – М.: Microsoft Corporation, 2012. – 244 с.
  69. Cheng-Min Lee. Fatigue Property Improvement of Ti6Al4V by Thin Film Metallic Glass. – М.: LAP Lambert Academic Publishing, 2014. – 144 с.
  70. Vivek Bhushan. Securing Published Data In Cloud Using Data Incognito. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  71. Subi Khan and R.P. Mahapatra. SQL Injection Attack and Countermeasures. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  72. Vinav Keshari. Secure Web Service:Encryption. – М.: LAP Lambert Academic Publishing, 2012. – 72 с.
  73. Juraj Jagelcak and Vladimir Rievaj. Standard Tension Force. – М.: LAP Lambert Academic Publishing, 2009. – 84 с.
  74. Shaek Rana Mohammad Baki Billah and Mohammad Hafizur Rahman. Design & Development of Network Security System using IP Tables. – М.: LAP Lambert Academic Publishing, 2013. – 164 с.
  75. Shegaw Firiew. Improving Transmission Line Loadability using FACTS Controllers. – М.: LAP Lambert Academic Publishing, 2012. – 144 с.
  76. Enangha Abeng. A Hybrid Hash Message Authentication Code (HMAC). – М.: LAP Lambert Academic Publishing, 2011. – 204 с.
  77. Brooks Garrison. Analysis and Improvement of Virtex-4 Block RAM Built-In Self-Test. – М.: LAP Lambert Academic Publishing, 2010. – 120 с.
  78. Dr. Mukkarum Husain. Hypersonic Aerodynamic Performances of Asymmetric Re-entry Vehicles. – М.: LAP Lambert Academic Publishing, 2011. – 100 с.
  79. Stephan Caruso. Diesel Injection Analysis. – М.: LAP Lambert Academic Publishing, 2011. – 124 с.
  80. Celina Myrann Sorboe. Security and Inclusive Citizenship. – М.: LAP Lambert Academic Publishing, 2013. – 144 с.
  81. Samson Katengeza,Barnabas Kiiza and Lawrence Mapemba. Malawi Agricultural Commodity Exchange and Rice Market Integration. – М.: LAP Lambert Academic Publishing, 2011. – 96 с.
  82. Degye Goshu. Food Security, Agricultural Production and Commercialization. – М.: LAP Lambert Academic Publishing, 2013. – 240 с.
  83. Michael Acheampong. Improving food security in sub-Saharan Africa. – М.: LAP Lambert Academic Publishing, 2011. – 76 с.
  84. Sanjib Kumar Das. Water saving technology of summer rice by using bio-mulches. – М.: LAP Lambert Academic Publishing, 2014. – 64 с.
  85. Rooba Hasan,Virendra Singh and H. P. Singh. Rice Cultivation in Hills of Uttarakhand(India). – М.: LAP Lambert Academic Publishing, 2012. – 72 с.
  86. Maurice Aarts. Electromagnetic Fault Injection using Transient Fault Injections. – М.: LAP Lambert Academic Publishing, 2014. – 168 с.
  87. Marloes Peeters. Biohybrid nanocomposites. – М.: LAP Lambert Academic Publishing, 2010. – 120 с.
  88. Halima Mohammed Lawal. Relationships Between Aggregate Stability and Organic Carbon Pools. – М.: LAP Lambert Academic Publishing, 2011. – 136 с.
  89. Mohammad Ruhul Amin. Spatial Analysis of Suicide Attack Incidences in Kabul City. – М.: LAP Lambert Academic Publishing, 2012. – 100 с.
  90. Lokesh Gupta and PC Murdia. Improvement of roughages by urea and sulphur supplementation. – М.: LAP Lambert Academic Publishing, 2011. – 144 с.
  91. Bhaskar Sanyal and Arun Sharma. EPR and TL techniques in identification of irradiated food. – М.: LAP Lambert Academic Publishing, 2012. – 140 с.
  92. Musa Khan Jalalzai. Sectarian Violence in Northern Ireland. – М.: LAP Lambert Academic Publishing, 2011. – 120 с.
  93. David Grodzki. Doomed to Fail. – М.: LAP Lambert Academic Publishing, 2012. – 200 с.
  94. Rakesh Kumar. Human Security and Civil Society. – М.: LAP Lambert Academic Publishing, 2014. – 220 с.
  95. Pedro Bernaldez. Human Security and Global Governance. – М.: LAP Lambert Academic Publishing, 2012. – 56 с.
  96. Ayyaswamy Kathirvel,Srinivasan Rengaramanujam and Mohanambal Kathirvel. Prevention of attacks usign umpiring security model for manets. – М.: LAP Lambert Academic Publishing, 2012. – 192 с.
  97. Md. Siddiqur Rahman. Brucellosis in pigs of northern region of Bangladesh. – М.: LAP Lambert Academic Publishing, 2011. – 108 с.
  98. Sarfraz Khan Aslam Khan,Alpana Pradeep Kulkarni and Simmi Shabbir Malik. Development and Validation of Periodontal In situ Gel of Articaine. – М.: LAP Lambert Academic Publishing, 2012. – 136 с.
  99. Varsha Gupta. Performance Improvement of RMPA by Artificial meta-material structure. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  100. Munyabarenzi Faustin. The incidence of security interest in movable property. – М.: LAP Lambert Academic Publishing, 2013. – 84 с.
  101. Satish Sharma and Richa Sharma. Sleep Improvement: Aerobics Or Resistance Training. – М.: LAP Lambert Academic Publishing, 2014. – 96 с.
  102. Carol Woody. Applying Security Risk Management to Internet Connectivity. – М.: LAP Lambert Academic Publishing, 2009. – 180 с.
  103. Sandeep Kr. Agarwal and Dr. K. V. Arya. Security in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  104. kalyani chalamalasetty. Architecture for IMS Security to Mobile:. – М.: LAP Lambert Academic Publishing, 2010. – 60 с.
  105. Narayan Ranjan Chakraborty. Analysis of Web security attacks: Bangladesh perspective. – М.: LAP Lambert Academic Publishing, 2012. – 124 с.
  106. Amit Chauhan. Securing MANET with an Enhanced Trust Calculation Method. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  107. Wei Dong and Jan Newmarch. Adding Session and Transaction Management to Web Services by Using SIP. – М.: LAP Lambert Academic Publishing, 2010. – 116 с.
  108. Ricardo Chaves. Secure Computing on Reconfigurable Systems. – М.: LAP Lambert Academic Publishing, 2010. – 212 с.
  109. Natarajan Meghanathan,DeShante C. Johnson and Alexander R. Geoghegan. An Analysis of Software Security Attacks and Mitigation Controls. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  110. Liliana Calderon-Benavides. Identifying the User's Query Intent in Web Search. – М.: LAP Lambert Academic Publishing, 2012. – 136 с.
  111. Jayeeta Majumder and Gargi Saha. SQL Injection Attacks and possible Remedies. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  112. Pharaoh Chaka and Hilton Chikwiriro. An Evaluation of Use of Ontology in Web Assessment Systems. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  113. Mohammed Firdos Alam Sheikh. Improving Web Security by Blocking SQL Injection Attack(SQLIA). – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  114. Herbert Kayitale. The Online Management Information System for UNEB. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  115. Akram Hossain,A. K. M. Zaidi Satter and Shibli Shahriar. Side Channel Attack Prevention. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  116. Edmond K. Machie. Network Attack Traceback And React. – М.: LAP Lambert Academic Publishing, 2013. – 208 с.
  117. Maria Allauddin and Farooque Azam. Dynamic Web Service Composition Using Google API Crawling. – М.: LAP Lambert Academic Publishing, 2013. – 132 с.
  118. Tanveer Zia. A Security Framework for Wireless Sensor Networks (WSN). – М.: LAP Lambert Academic Publishing, 2013. – 160 с.
  119. Saeed Soltanmohammadi. Improving Information System Security by Evaluating Human Factors. – М.: LAP Lambert Academic Publishing, 2014. – 116 с.
  120. Chamseddine Talhi. Memory-Constrained Security Enforcement. – М.: LAP Lambert Academic Publishing, 2009. – 220 с.
  121. Komunte Mary and Prof Venansius Baryamureeba. Web Security. – М.: LAP Lambert Academic Publishing, 2010. – 140 с.
  122. Daniel Caragata,Safwan El Assad and Alexandru Serbanescu. Development of some encryption algorithms using chaotic functions. – М.: LAP Lambert Academic Publishing, 2011. – 88 с.
  123. Yahya AlMurtadha and Md. Nasir Bin Sulaiman. Methods to Improve Web Recommendation System for the Anonymous Users. – М.: LAP Lambert Academic Publishing, 2012. – 132 с.
  124. Joao Antunes. Network Attack Injection. – М.: Scholars' Press, 2013. – 268 с.
  125. Yan Wang. Query Selection in Deep Web Crawling. – М.: Scholars' Press, 2014. – 152 с.
  126. Md Asraful Haque. Multilevel Password Authentication Method using Graphics and Text. – М.: LAP Lambert Academic Publishing, 2013. – 56 с.
  127. Jose Fonseca. Evaluating the [In]security of Web Applications. – М.: LAP Lambert Academic Publishing, 2011. – 408 с.
  128. Jagdish Halde. Basics of SQL injection Analysis, Detection and Prevention. – М.: LAP Lambert Academic Publishing, 2014. – 68 с.
  129. Vishal Andodariya and Shaktisinh Parmar. Multilayered SQL Injection Prevention Mechanism. – М.: LAP Lambert Academic Publishing, 2015. – 68 с.
  130. Jaya Sudha J. S. Web Traffic/Latency Reduction Techniques. – М.: LAP Lambert Academic Publishing, 2011. – 172 с.
  131. Mahmuda Nasrin and Md. Taj Uddin. Land Tenure System and Food Security. – М.: LAP Lambert Academic Publishing, 2014. – 108 с.
  132. Muhabie Mekonnen. Economic Contributions Of Coffee Cooperatives. – М.: LAP Lambert Academic Publishing, 2012. – 152 с.
  133. Maurice Marshalls. COUNTRY IMAGE AND ITS EFFECTS IN PROMOTING A TOURIST DESTINATION. – М.: LAP Lambert Academic Publishing, 2010. – 92 с.
  134. Reza Mohammady Garfamy. Supplier Selection and Business Process Improvement. – М.: LAP Lambert Academic Publishing, 2010. – 116 с.
  135. John A. Akerele. Nigerian Aviation Security Post Abdulmutallab the Christmas Bomber. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  136. Gandikota Prathap Maruthi. Challenge the Interview by Developing Soft Skills. – М.: LAP Lambert Academic Publishing, 2013. – 56 с.
  137. Aleksandar Arsov. Strategic Sustainability of Investment & Business: Commercial Bank. – М.: LAP Lambert Academic Publishing, 2014. – 92 с.
  138. Oluyomi Martins. Improving Customer Service Delivery In Bank PHB. – М.: LAP Lambert Academic Publishing, 2012. – 132 с.
  139. Nicky Epstein. Knitting Block by Block. – М.: , 2015. – 240 с.
  140. Prashant Pittalia. Ecommerce Security Real Life Cases And Practical Solutions. – М.: , 2015. – 72 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Web-мастер. "Кадровик. Кадровое делопроизводство", № 12, декабрь 2007.
  2. Об учете расходов на создание web-сайта. Комментарий к письму Минфина России от 12 марта 2006. № 03-03-04/2/54. В.С. Ржаницына, "Финансовые и бухгалтерские консультации", № 5, май 2006.
  3. Как оптимизировать web-сайт фирмы. М. Воскресенский, "Управление персоналом", № 9-10, май 2005.
  4. Создал web-сайт? Учти расходы!. С. Ларина, "Московский бухгалтер", № 1, январь 2005.
  5. Web-сайт организации: бухгалтерский и налоговый учет. И.Э. Гущина, "Финансовые и бухгалтерские консультации", № 1, январь 2005.
  6. Комментарий к письму Минфина РФ от 22 октября 2004. № 07-05-14/280 "О налогообложении затрат на создание web-сайтов". И.И. Иванцов, "Нормативные акты для бухгалтера", № 22, ноябрь 2004.
  7. Медицинская информатика в Web of Science: доля России в мировом публикационном потоке. Н.Г. Куракова, Л.А. Цветкова, "Врач и информационные технологии", № 4, июль-август 2012.
  8. Бюджетная отчетность и Web-технологии. С.В. Юскаева, "Бюджетный учет", N 4, апрель 2012 г.
  9. On-line коммуникации: от классики до web 2.0-технологий. И. Широкова, "Ремедиум", № 7, июль 2010.
  10. Принципы управления Web-отношениями в банке: риск-ориентированный подход. Л.В. Лямин, "Управление в кредитной организации", № 3, май-июнь 2009.
  11. Анализ защищенности web-сайтов: практика проведения. Д. Евтеев, "Финансовая газета. Региональный выпуск", № 9, февраль 2009.
  12. Учет расходов на разработку web-сайта издательства. О.В. Дмитриева, "Бухгалтерский учет в издательстве и полиграфии", № 11, ноябрь 2008.
  13. Анкета соискателя на вакантную должность Web-программиста. "Кадровик. Кадровое делопроизводство", № 8, август 2008.
  14. Учет и налогообложение расходов организации на создание web-сайта. О.Л. Вольхина, "Налоговая политика и практика", № 6, июнь 2008.
  15. Всемирная паутина: www.. World Wide Web. Н. Филина, "Финансовая газета. Региональный выпуск", № 7, февраль 2008.

Образцы работ

Тема и предметТип и объем работы
Жан-Жак Анно искатель приключений
Культурология
Курсовая работа
25 стр.
Особенности виртуального общения
Психология
Курсовая работа
28 стр.
Платежные системы в Интернете
Информатика
Диплом
102 стр.
Слияния и поглощения Мировая и Российская практика
Мировая экономика
Диплом
99 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Александра (Москва)
Добрый вечер!!! Хочу сказать вам огромное спасибо! Вчера у меня была защита диплома, все прошло отлично: вашему диплому дали самую высокую оценку :-). Защитилась на 5 и в итоге у меня получился красный диплом! УРА!!! Еще раз вам спасибо!! Без вашей помощи у меня бы ничего не получилось!