Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Marian Quigley, Marian Quiqley. Information Security and Ethics: Social and Organizational Issues. – М.: , 0. – 0 с.

Дополнительные результаты

  1. Security and Privacy in Mobile Information and Communication Systems: Third International ICST Conference, MOBISEC 2011, Aalborg, Denmark, May 17-19, ... and Telecommunications Engineering). – М.: , 2012. – 195 с.
  2. Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  3. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с.
  4. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 515 с.
  5. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  6. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с.
  7. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с.
  8. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с.
  9. Security and Development in Global Politics: A Critical Comparison. – М.: , 2012. – 360 с.
  10. Luis Lobo-Guerrero. Insuring Security: Biopolitics, security and risk. – М.: , 2012. – 178 с.
  11. Godfred Koi-Akrofi. IT Investments and organizational performance of the Telecoms Industry. – М.: , 2012. – 76 с.
  12. Rattan Lal, David Hansen, Norman Uphoff, Steven Slack, Rattan Lal. Food Security and Environmental Quality in the Developing World. – М.: , 0. – 0 с.
  13. Robert Muksian. Mathematics of Interest Rates, Insurance, Social Security, and Pensions. – М.: , 0. – 0 с.
  14. Helen Briassoulis, Jan Van Der Straaten. Tourism and the Environment - Regional, Economic, Cultural and Policy Issues (ENVIRONMENT & ASSESSMENT Volume 6). – М.: , 0. – 0 с.
  15. Craig Hickman, Craig Bott, Marlon Berrett, Brad Angus. The Fourth Dimension : The Next Level of Personal and Organizational Achievement. – М.: , 0. – 0 с.
  16. Robert E. Neilson. Collaborative Technologies and Organizational Learning (Series in Information Technology Management). – М.: , 0. – 0 с.
  17. Steven G. Rogelberg. Blackwell Handbook of Research Methods in Industrial and Organizational Psychology (Blackwell Handbooks of Research Methods in Psychology). – М.: , 0. – 0 с.
  18. Anthony C. Nwadei. The Relationship Between Perceived Values Congruence and Organizational Commitment in Multinational Organization. – М.: , 0. – 0 с.
  19. Knowledge Management and Organizational Design. – М.: , 0. – 0 с.
  20. Alnoor Ebrahim. Ngos and Organizational Change: Discourse, Reporting, and Learning. – М.: , 0. – 0 с.
  21. Hui-Liang Tsai. Information Technology and Business Process Reengineering : New Perspectives and Strategies. – М.: , 0. – 0 с.
  22. Tom W. Goad. Information Literacy and Workplace Performance. – М.: , 0. – 0 с.
  23. Lynda M Applegate, Robert D. Austin, F. Warren McFarlan, Lynda Applegate, Robert Austin, F. Warren McFarlan. Corporate Information Strategy and Management: Text and Cases. – М.: , 0. – 0 с.
  24. Rolf Wigand, Arnold Picot, Ralf Reichwald. Information, Organization and Management: Expanding Markets and Corporate Boundaries. – М.: , 0. – 0 с.
  25. Ken Hultman, Ken Hultman. Balancing Individual and Organizational Values: Walking the Tightrope to Success. – М.: , 0. – 0 с.
  26. Teri C. Tompkins. Cases in Management and Organizational Behavior. – М.: , 0. – 0 с.
  27. Ron Schneiderman. The Mobile Technology Question and Answer Book: A Survival Guide for Business Managers. – М.: , 0. – 0 с.
  28. Rose Dieng-Kuntz, Nada Matta. Knowledge Management and Organizational Memories. – М.: , 0. – 0 с.
  29. Ifip Tc8, Wg8.2 Working Conference on Global and Organizational Discour, Edgar A. Whitley, Micheal D. Myers, Janice I. Degross. Global and Organizational Discourse About Information Technology: Ifip Tc8/Wg8.2 Working Conference on Global and Organizational Discourse About Infor ... on for Information Processing (Series), 110,). – М.: , 0. – 0 с.
  30. Pippa Norris. Digital Divide: Civic Engagement, Information Poverty, and the Internet Worldwide. – М.: Cambridge University Press, 2001. – 320 с.
  31. Maurice, Ph.D. Youakim. Social Security and Medicare for the New Millenium. – М.: , 0. – 0 с.
  32. Chrisanthi Avgerou. Information Systems and Global Diversity. – М.: , 0. – 0 с.
  33. Michael J. Earl, Oxford Institute of Information Management, Pa Consulting Group. Information Management: The Organizational Dimension. – М.: , 0. – 0 с.
  34. Michael S. Scott Morton. The Corporation of the 1990s: Information Technology and Organizational Transformation. – М.: , 0. – 0 с.
  35. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с.
  36. Joanne Yates, John Van Maanen. Information Technology and Organizational Transformation : History, Rhetoric and Preface (Sociological Observations). – М.: , 0. – 0 с.
  37. Ifip Tc8 Wg8.2 International Working Conference on New Information Tec, Ojelanki Ngwenyama, Lucas D. Introna, Michael D. Myers, Janice I. Degross. New Information Technologies in Organizational Processes Mbk: Field Studies and Theoretical Reflections on the Future of Work :Ifip ... l Federation for Information Processing, 20.). – М.: , 0. – 0 с.
  38. ?Helene Bestougeff, Jacques Emile Dubois, Bhavani Thuraisingham, Helene Bestougeff. Heterogeneous Information Exchange and Organizational Hubs. – М.: , 0. – 0 с.
  39. Steve Purser. A Practical Guide to Managing Information Security (Artech House Technology Management Library). – М.: , 0. – 0 с.
  40. Physical Security and the Inspection Process. – М.: , 0. – 0 с.
  41. Eliezer Geisler. Methodology, Theory, and Knowledge in the Managerial and Organizational Sciences. – М.: , 0. – 0 с.
  42. Teri C. Tompkins. Cases in Management and Organizational Behavior, Vol. 2. – М.: , 0. – 0 с.
  43. Louis Barajas. The Latino Journey to Financial Greatness : The 10 Steps to Creating Wealth, Security, and a Prosperous Future for You and Your Family. – М.: , 0. – 0 с.
  44. Jonathan Gruber, David A. Wise. Social Security and Retirement Around the World (NATIONAL BUREAU OF ECONOMIC RESEARCH CONFERENCE REPORT). – М.: , 0. – 0 с.
  45. Geoff Craighead. High-Rise Security and Fire Life Safety, Second Edition. – М.: , 0. – 0 с.
  46. Ifip Tc3, Ethical, and Cognitive I Wg3.1&3.2 Open Conference on Social, Tom J. Van Weert, Robert K. Munro, Tom J. Van Weert. Informatics and the Digital Society: Ifip Tc3/Wg3.1&3.2 Open Conference on Social, Ethical, and Cognitive Issues of Informatics and Ict, July 22-26, 2 ... l Federation for Information Processing, 244). – М.: , 0. – 0 с.
  47. Brian Detlor. Towards Knowledge Portals: From Human Issues to Intelligent Agents (Information Science and Knowledge Management, 19). – М.: , 0. – 0 с.
  48. Marian Quigley, Marian Quiqley. Information Security and Ethics: Social and Organizational Issues. – М.: , 0. – 0 с.
  49. G. David Garson, G. David Information Technology and Computer Applications in Garson. Public Information Technology: Policy and Management Issues. – М.: , 0. – 0 с.
  50. Nancy L. Russo, Brian Fitzgerald, Janice I. Degross. Realigning Research and Practice in Information Systems Development - The Social and Organizational Perspective (International Federation for Information Processing, Volume 194). – М.: , 0. – 0 с.
  51. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с.
  52. Marvin T. Brown. Corporate Integrity : Rethinking Organizational Ethics and Leadership. – М.: , 2005. – 0 с.
  53. Paul E. Spector. Industrial and Organizational Psychology : Research and Practice. – М.: , 2005. – 0 с.
  54. Joseph White. False Alarm : Why the Greatest Threat to Social Security and Medicare Is the Campaign to "Save" Them (Century Foundation Book). – М.: , 2003. – 0 с.
  55. Goran Putnik. Virtual Enterprise Integration: Technological And Organizational Perspectives. – М.: , 2005. – 0 с.
  56. Advances in Security and Payment Methods for Mobile Commerce. – М.: , 2004. – 0 с.
  57. Keri E. Pearlson. Managing and Using Information Systems. – М.: , 2005. – 0 с.
  58. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с.
  59. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с.
  60. Daniel, M.D. Farb. Agent GCP and the Bloody Consent Form Manual and CD, Informed Consent and Institutional Review Boards in Clinical Trials, For Beginner to Advanced, For ... Also Relevant to Biomedical Ethics. – М.: , 2003. – 0 с.
  61. Gerrit Van Wyk. A Systems Approach to Social and Organizational Planning: Cure for the Mess in Health Care. – М.: , 2003. – 0 с.
  62. Group Work And Aging: Issues In Practice, Research, And Education (Published Simultaneously as the Journal of Gerontological So). – М.: , 2005. – 0 с.
  63. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с.
  64. Ron Ben Natan. Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase. – М.: , 2005. – 432 с.
  65. Ronald L. Moomaw, Kent W. Olson. Economics and Contemporary Issues (with Printed Access Card InfoTrac 1-Semester, Economic Applications Online Product). – М.: , 2006. – 496 с.
  66. Ira Winkler. Zen and the Art of Information Security. – М.: , 2007. – 192 с.
  67. Joe Conason. The Raw Deal: How the Bush Republicans Plan to Destroy Social Security and the Legacy of the New Deal. – М.: , 2005. – 141 с.
  68. Research in Personnel and Human Resources Management, Volume 24 (Research in Personnel and Human Resources Management). – М.: , 2005. – 312 с.
  69. Helen James. Security and Stustaibable Developement in Myanmar/Burma (Routledge Contemporary Southeast Asia Series). – М.: , 2006. – 231 с.
  70. Elizabeth Reynolds Welfel. Ethics in Counseling and Psychotherapy: Standards, Research, and Emerging Issues. – М.: , 2005. – 464 с.
  71. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с.
  72. Paul M. Muchinsky. Psychology Applied to Work: An Introduction to Industrial and Organizational Psychology. – М.: , 2008. – 540 с.
  73. Social Security and Development. – М.: , 2008. – 256 с.
  74. Healthcare Information Systems and Informatics: Research and Practices (Advances in Healthcare Information Systems and Informatics) (Advances in Healthcare Information Systems and Informatics). – М.: , 2008. – 448 с.
  75. Social and Human Elements of Information Security: Emerging Trends and Countermeasures (Premier Reference Source). – М.: , 2008. – 412 с.
  76. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с.
  77. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с.
  78. Dr. Robert Shannon Hoover. Ethical Climate, Organizational Support & Affective Well-Being: A Quantitative Analysis of Perceived Ethical Climate, Perceived Organizational Support and Job-Related Affective Well-Being. – М.: , 2008. – 116 с.
  79. V.R. Leonard. The Social Security and Medicare Handbook: What You Need to Know Explained Simply. – М.: , 2008. – 288 с.
  80. Gerard Blokdijk, Ivanka Menken. Information Security Management Best Practice Workbook: Implementation and Management Roadmap for Threats, Challenges and Solutions - Ready to use supporting documents bringing Theory into Practice. – М.: , 2008. – 124 с.
  81. Hamid R. Nemati. Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues (Advances in Information Security and Privacy). – М.: , 2009. – 414 с.
  82. W. Krag Brotby. Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement. – М.: Auerbach Publications, 2009. – 200 с.
  83. Bel G. Raggad. Information Security Management: Concepts and Practice. – М.: , 2010. – 871 с.
  84. Alan Calder, Steve G Watkins. Information Security Risk Management for ISO27001 / ISO27002. – М.: , 2010. – 198 с.
  85. Chuck Eastman, Paul Teicholz, Rafael Sacks, Kathleen Liston. BIM Handbook: A Guide to Building Information Modeling for Owners, Managers, Designers, Engineers and Contractors. – М.: John Wiley and Sons, Ltd, 2008. – 504 с.
  86. The Emirates Center for Strategic Studies and Research. The Information Revolution and the Arab World: Its Impact on State and Society. – М.: I. B. Tauris, 1998. – 236 с.
  87. Pensions, Social Security, and the Privatization of Risk (A Columbia / SSRC Book (Privatization of Risk)). – М.: , 2008. – 128 с.
  88. Madelin Cruice. Access and Inclusion Issues with Aphasia: A Special Issue of Aphasiology. – М.: , 2008. – 136 с.
  89. Teaching Fundamental Concepts of Informatics: 4th International Conference on Informatics in Secondary Schools - Evolution and Perspectives, ISSEP 2010, ... Computer Science and General Issues). – М.: , 2010. – 206 с.
  90. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с.
  91. Suzanne Rivard. Information Technology and Organizational Transformation. – М.: , 2010. – 320 с.
  92. John R. Vacca. Computer and Information Security Handbook. – М.: , 2010. – 928 с.
  93. Jason Furman. Pensions, Social Security, and the Privatization of Risk. – М.: , 2010. – 128 с.
  94. Ethical and Legal Issues in Professional Practice with Families. – М.: , 1997. – 322 с.
  95. Thomas Murray. Performance–Enhancing Technologies in Sports – Ethical, Conceptual, and Scientific Issues. – М.: , 2009. – 304 с.
  96. M GRUNEBERG. Gruneberg ?social? Psychology And Organizational Behaviour. – М.: , 1984. – 274 с.
  97. Key Issues In Industrial and Organizational Psychology. – М.: , 2001. – 462 с.
  98. Key Issues In Industrial and Organizational Psychology. – М.: , 2001. – 354 с.
  99. Frederick Lynch. One Nation under AARP – The Fight over Medicare, Social Security, and America?s Future. – М.: , 2011. – 236 с.
  100. Kristen Renwick Monroe. Fundamentals of the Stem Cell Debate – The Scientific, Religious, Ethical and Political Issues. – М.: , 2007. – 208 с.
  101. Gray. Ethical and Legal Issues in AIDS Research. – М.: , 1994. – 0 с.
  102. Gray. Ethical and Legal Issues in AIDS Research. – М.: , 1994. – 0 с.
  103. Edited by Benjamin J Goold and Liora Lazarus. Security and Human Rights. – М.: , 2011. – 426 с.
  104. Helen Toner, Elspeth Guild and Anneliese Baldaccini. Whose Freedom, Security and Justice?. – М.: , 2011. – 582 с.
  105. Vicki Paskalia. Free Movement, Social Security and Gender in the EU. – М.: , 2011. – 366 с.
  106. John E Clark. The Ethics of Information Technology and Business. – М.: , 2006. – 344 с.
  107. Principles Of Computer Security, Comptia Security+ And Beyond, Second Edition. – М.: , 2011. – 0 с.
  108. Social Security And Welfare:. – М.: , 2011. – 368 с.
  109. Shaikh Salim and Shankar Nawale. Secure Access of RFID System. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  110. Rohana Mohamad Rashid. Determining Influencing Factors of Information Security Culture. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  111. Shukuru Nyagawa,Claude Mung'ong'o and Fanuel Shechambo. Information, Education and Communication (IEC)Strategy. – М.: LAP Lambert Academic Publishing, 2011. – 116 с.
  112. Jeff Nelson. Social Security and Pensions. – М.: Dictus Publishing, 2011. – 184 с.
  113. Alice Oluoko-Odingo. Food Security and Poverty Nexus. – М.: LAP Lambert Academic Publishing, 2011. – 308 с.
  114. Christiana Ayoade. Health and Risk Issues in Adolescent Behavior. – М.: Scholars' Press, 2013. – 256 с.
  115. Muhammad Azfar Anwar and Saif ur Rehman. Defense Spending, National Security and Economic Growth of Pakistan. – М.: LAP Lambert Academic Publishing, 2012. – 128 с.
  116. Satish Kumar and Arun Choudhary. Weighted Sub-Additive Information Measures and Their Applications. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  117. Arsim Gjinovci. Informal Economy and Ethics in Management of HR and Business in Kosovo. – М.: LAP Lambert Academic Publishing, 2014. – 64 с.
  118. Mah-e-Bushra Asghar and Rubina Bhatti. Marketing of Library and Information Services and Products. – М.: LAP Lambert Academic Publishing, 2012. – 124 с.
  119. Tahereh Khezrab and Ali Mahbudi. On the Distribution of Information Structures and Focal Points. – М.: LAP Lambert Academic Publishing, 2013. – 324 с.
  120. Mamon Mohammed and Loay George. Car Guiding System using Web Camera and GPS. – М.: LAP Lambert Academic Publishing, 2013. – 112 с.
  121. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  122. Dhanavandan S. and Magizhnan S. Information Sources and Services. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  123. Yedji Mbangsoua and Dr. Freddie Acosta. Information Security and its Investment Justification. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  124. Yasser Alshehri. Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 156 с.
  125. Mathurajothi S and Dhanavandan S. Information Needs and Uses. – М.: LAP Lambert Academic Publishing, 2013. – 112 с.
  126. Hammad Kazmi. Security and Privacy issues in Near Field Communication (NFC) Systems. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  127. Furhan Mehmood and Rajia Rafique. Information Security in Financial Organizations. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  128. frankie tvrz and marijke coetzee. Information Security of a Bluetooth-enabled handheld device. – М.: LAP Lambert Academic Publishing, 2010. – 180 с.
  129. Meysam Namayandeh. Development of Computer Ethical Framework for Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 132 с.
  130. NASER EL-BATHY and Ghassan Azar. Intelligent Information Retrieval and Web Mining. – М.: LAP Lambert Academic Publishing, 2010. – 220 с.
  131. Ekoningtyas Margu Wardani and Muyanja Ssenyonga. Soaring Food Prices, Food Security, and Poverty in Indonesia. – М.: LAP Lambert Academic Publishing, 2013. – 128 с.
  132. Siddaraju V. G. and Gayathri N. K. Information Technology and Economic Development in India. – М.: LAP Lambert Academic Publishing, 2012. – 116 с.
  133. Narendra Singh,Anupam K.Dixit and B.S. Reddy. Marketing of Maize in India:Policies and Issues for Market Development. – М.: LAP Lambert Academic Publishing, 2011. – 100 с.
  134. Alaa Al-Deen Mohammed Hassan. Information Security Management. – М.: LAP Lambert Academic Publishing, 2013. – 188 с.
  135. Jun Zheng,Jiantao Gu and Hong Wang. Financial Management and Information Security of Independent Colleges. – М.: LAP Lambert Academic Publishing, 2014. – 256 с.
  136. Mandeep Singh,Seyed Mehdi Mousavi Davoudi and Fazel Hajizadeh Ebrahimi. Recent Trends in Business Management and Organizational Studies. – М.: LAP Lambert Academic Publishing, 2014. – 268 с.
  137. Jaynal Ud-din Ahmed. BPR, Information Technology and Organizational Culture. – М.: LAP Lambert Academic Publishing, 2014. – 180 с.
  138. Amy Chin and Bakhtier Pulatov. Project Planning and Organizational Project Planning Support. – М.: LAP Lambert Academic Publishing, 2010. – 104 с.
  139. Anees Janee Ali and Nadia Hezlin Yashaiya. Lecturers'' Work Role Stressors and Organizational Commitment. – М.: LAP Lambert Academic Publishing, 2010. – 88 с.
  140. G. Sree Rekha and V.K. Agrawal. Common Interface Banking - A New perspective. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Наука человековедения. интервью с Д. Уолтоном, профессором London Metropolitan University, экспертом CIPD. Chartered Institute of Personnel and Development, автором программы Master of Arts in Human Resource Strategies. И. Смирнова, "Кадровый менеджмент", № 5, июль-август 2007.
  2. Специализированный модуль FS-CD. Collections and Disbursements - "Сборы и Выплаты" и его возможности. О.А. Глущенко, "Финансовый менеджмент в страховой компании", № 2, II квартал 2007.
  3. Бюджетирование страховой компании на базе Oracle Enterprise Planning and Budgeting. Д.В. Лесоводский, "Финансовый менеджмент в страховой компании", № 3, III квартал 2006.
  4. Регулирование операций торгового финансирования: новые инициативы. интервью с Д. Шмандом, вице-председателем Банковской комиссии ICC по supply chain finance, главой подразделения Trade Finance and Cash Management Corporates EMEA в Global Transaction Banking. GTB division Deutsche Bank. Н. Макарова, "Международные банковские операции", N 2, апрель-июнь 2012 г.
  5. О качестве сервиса, связанного с запросами на медицинскую информацию. Medical Information Service?. А. Беденков, "Ремедиум", № 1, январь 2012.
  6. Ужин в темноте в стиле Малевича и Новый год в Хаммере". Что может выть лучше?". интервью с Н. Саниной, индивидуальным предпринимателем и креативным директором компании "San and stars". М. Сипатова, "Арсенал предпринимателя", N 12, декабрь 2011 г.
  7. На пути к новому стандарту в торговом финансировании. интервью с А.  Кастерманом, руководителем Trade and Supply Chain, SWIFT, сопредседателем рабочей группы ICC-BPO. Э. Шакирова, "Международные банковские операции", N 4, октябрь-декабрь 2011 г.
  8. Уильям Савадж: Мотивировать людей в Нижнем Новгороде и Новосибирске нужно по-разному". интервью с У. Саваджем, вице-президентом корпорации Intel, подразделение Software and Services Group. М. Холкина, "Управление персоналом", N 14, июль 2010 г.
  9. Цены под контролем: the present and the future. С. Стройкова, И. Леметюйнен, "Консультант", № 19, сентябрь 2009.

Образцы работ

Тема и предметТип и объем работы
Лингвистика
Лингвистика
Диплом
69 стр.
Последствия операции НАТО
Политология
Диплом
80 стр.
Привлекательности труда в организации
Психология
Курсовая работа
35 стр.
Совершенствование системы аттестации персонала на примере турфирмы
Управление персоналом
Дипломный проект
103 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Слава
Марина Михайловна, я защитился. Завтра получаю диплом. Перед тем как к вам обратиться у меня были сомнения, что сделаю качественную работу после вашего сопровождения, но потом сомнения исчезли. Спасибо вам за помощь, диплом после вашего сопровождения был сделан на профессиональном уровне