Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Rfid In The Supply Chain. – М.: , 2011. – 176 с.
  2. Frank Thornton, Brad Haines, Anand M Das, Hersh Bhargava, et al. RFID Security. – М.: , 2006. – 242 с.
  3. Jaydeb Bhaumik and Satyajit Das. Substitution Permutation Network Type Block Cipher. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  4. Jayendra Singh,Satvik Vats and Ankit Dagar. Control Area Network for Vehicle Security System. – М.: LAP Lambert Academic Publishing, 2013. – 88 с.
  5. Hira Ilyas. RFID Based Security Systems With Video Monitering. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  6. Julien Shabani. Information Security for RFID Systems. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.

Дополнительные результаты

  1. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с.
  2. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  3. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с.
  4. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с.
  5. Katia Passerini, Ayman El Tarabishy, Karen Patten. Information Technology for Small Business: Managing the Digital Enterprise. – М.: , 2012. – 140 с.
  6. Rajagopal. Systems Thinking and Process Dynamics for Marketing Systems: Technologies and Applications for Decision Management. – М.: , 2012. – 301 с.
  7. Mario Piattini. Auditing Information Systems. – М.: , 0. – 0 с.
  8. Gerald Kovacich. The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition. – М.: , 0. – 0 с.
  9. Dimitrios Soudris, Christian Piguet, Costas Goutis. Designing Cmos Circuits for Low Power (European Low-Power Initiative for Electronic System Design (Series).). – М.: , 0. – 0 с.
  10. Naim Afgan, Maria De Graca Carvalho, Naim Hamdia Afgan, M. G. Carvalho. Sustainable Assessment Method for Energy Systems: Indicators, Criteria and Decision Making Procedure. – М.: , 0. – 0 с.
  11. Charles J. Austin, Stuart B. Boxerman. Information Systems for Healthcare Management, Sixth Edition. – М.: , 0. – 0 с.
  12. Mark B. Desman. Building an Information Security Awareness Program. – М.: , 0. – 0 с.
  13. Timothy Braithwaite. Securing E-Business Systems: A Guide for Managers and Executives. – М.: , 0. – 0 с.
  14. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с.
  15. Ifip Tc11 Wg11.5 Working Conference on Integrity and Internal Control, Michael Gertz. Integrity and Internal Control in Information Systems V: Ifip Tc11/Wg11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (Iicis), November 11-12, 2002, Bonn, Germany (International Federation for Information Processing. – М.: , 0. – 0 с.
  16. Steve Purser. A Practical Guide to Managing Information Security (Artech House Technology Management Library). – М.: , 0. – 0 с.
  17. H. M. J. Goldschmidt, M.J.T. Cox, R.J.E. Grouls, W.A.J.H. Van De Laar, F.G.G. Van Merode, H.M.J. Goldschmidt, Henk M. J. Goldschmidt. Reference Information Model for Clinical Laboratories: Laboratory Management Toolbox (Studies in Health Technology and Informatics, 55). – М.: , 0. – 0 с.
  18. Marian Quigley, Marian Quiqley. Information Security and Ethics: Social and Organizational Issues. – М.: , 0. – 0 с.
  19. C. Warren Axelrod, Axelrod. Outsourcing Information Security. – М.: , 0. – 0 с.
  20. Harold F. Tipton, Micki Krause, Micki, Cissp Krause. Information Security Management Handbook, Fifth Edition. – М.: , 0. – 0 с.
  21. Kevin Ake, John Clemons, Mark Cubine, Bruce Lilly. Information Technology for Manufacturing: Reducing Costs and Expanding Capabilities. – М.: , 0. – 0 с.
  22. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с.
  23. Water Environment Federation. Financing and Charges for Wastewater Systems (Wef Manual of Practice). – М.: , 2004. – 0 с.
  24. Economics of Information Security (Advances in Information Security). – М.: , 2004. – 0 с.
  25. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с.
  26. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с.
  27. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с.
  28. Ira Winkler. Zen and the Art of Information Security. – М.: , 2007. – 192 с.
  29. Timothy P. Layton. Information Security. – М.: , 2006. – 222 с.
  30. Michael E. Whitman, Herbert J. Mattord. Principles of Information Security, Second Edition. – М.: , 2004. – 600 с.
  31. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с.
  32. Patrick Traynor, Patrick McDaniel, Thomas La Porta. Security for Telecommunications Networks (Advances in Information Security). – М.: , 2008. – 182 с.
  33. James Michael Stewart, Ed Tittel, Mike Chapple. CISSP: Certified Information Systems Security Professional Study Guide. – М.: , 2008. – 841 с.
  34. Social and Human Elements of Information Security: Emerging Trends and Countermeasures (Premier Reference Source). – М.: , 2008. – 412 с.
  35. Selected Readings on Information Technology and Business Systems Management. – М.: , 2008. – 566 с.
  36. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с.
  37. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с.
  38. Gerard Blokdijk, Ivanka Menken. Information Security Management Best Practice Workbook: Implementation and Management Roadmap for Threats, Challenges and Solutions - Ready to use supporting documents bringing Theory into Practice. – М.: , 2008. – 124 с.
  39. Handbook on Information Technology in Finance (International Handbooks on Information Systems). – М.: , 2008. – 800 с.
  40. Hamid R. Nemati. Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues (Advances in Information Security and Privacy). – М.: , 2009. – 414 с.
  41. W. Krag Brotby. Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement. – М.: Auerbach Publications, 2009. – 200 с.
  42. Alan Calder. Information Security based on ISO 27001/ISO 27002: A Management Guide. – М.: , 2009. – 83 с.
  43. Bel G. Raggad. Information Security Management: Concepts and Practice. – М.: , 2010. – 871 с.
  44. Michael E. Whitman, Herbert J. Mattord. Management of Information Security. – М.: , 2010. – 592 с.
  45. Alan Calder, Steve G Watkins. Information Security Risk Management for ISO27001 / ISO27002. – М.: , 2010. – 198 с.
  46. William Manning. CISM Certified Information Security Manager Certification Exam Preparation Course in a Book for Passing the CISM Exam - The How To Pass on Your First Try Certification Study Guide. – М.: , 2010. – 188 с.
  47. Michael Erbschloe. Physical Security for IT. – М.: , 2010. – 256 с.
  48. Michael Erbschloe. Implementing Homeland Security for Enterprise IT. – М.: , 2010. – 299 с.
  49. Chuck Eastman, Paul Teicholz, Rafael Sacks, Kathleen Liston. BIM Handbook: A Guide to Building Information Modeling for Owners, Managers, Designers, Engineers and Contractors. – М.: John Wiley and Sons, Ltd, 2008. – 504 с.
  50. Editors Karl Maria Michael de Leeuw, Jan Bergstra. The History of Information Security: A Comprehensive Handbook. – М.: Elsevier Science, 2007. – 900 с.
  51. Global Perspectives In Information Security. – М.: , 2008. – 896 с.
  52. Bruce Powel Douglass. Design Patterns for Embedded Systems in C. – М.: , 2010. – 416 с.
  53. Bruce Powel Douglass. Real Time UML Workshop for Embedded Systems. – М.: , 2010. – 432 с.
  54. D. Dowson. Tribological Research and Design for Engineering Systems. – М.: , 2010. – 940 с.
  55. John R. Vacca. Managing Information Security. – М.: , 2010. – 320 с.
  56. G. Manoilov. Elsevier's Dictionary of Information Security. – М.: , 2010. – 772 с.
  57. Ahmad Ibrahim. Fuzzy Logic for Embedded Systems Applications. – М.: , 2010. – 312 с.
  58. Derrick Rountree. Security for Microsoft Windows System Administrators. – М.: , 2010. – 400 с.
  59. Carmel Maguire. Information Services for Innovative Organizations. – М.: , 2010. – 319 с.
  60. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с.
  61. Gary E. Musgrave Ph.D. Safety Design for Space Systems. – М.: , 2010. – 992 с.
  62. Roman F. Nalewajski. Information Theory of Molecular Systems. – М.: , 2010. – 462 с.
  63. S.E. Jorgensen. Towards a Thermodynamic Theory for Ecological Systems. – М.: , 2010. – 380 с.
  64. S.E. Jorgensen. Towards a Thermodynamic Theory for Ecological Systems. – М.: , 2010. – 380 с.
  65. George L Stefanek. Information Security Best Practices. – М.: , 2010. – 160 с.
  66. Sari Greene. Sustainable Information Security. – М.: , 2010. – 400 с.
  67. John R. Vacca. Computer and Information Security Handbook. – М.: , 2010. – 928 с.
  68. Karama Kanoun. Dependability Benchmarking for Computer Systems. – М.: , 2008. – 362 с.
  69. MORSE. Morse: ?operations? Research For Public Systems (pr Only). – М.: , 1967. – 0 с.
  70. Timothy Braithwaite. Securing E–Business Systems. – М.: , 2002. – 288 с.
  71. Efraim Turban. Information Technology for Management 7th Edition ISV with Ess of Business Processes & IS WileyPLUS 7th Edition ISV and WileyPLUS Set. – М.: , 2010. – 0 с.
  72. RD PARSLOW. Parslow ?information? Technology For The Eighties (bcs 81). – М.: , 1981. – 770 с.
  73. Krag Brotby. Information Security Governance. – М.: , 2009. – 190 с.
  74. F THOMAS. Thomas ?instructor?s Manual? For ?filing? Systems For Information Management. – М.: , 1983. – 32 с.
  75. T.s. Michael. Greening through IT – Information Technology for Environmental Sustainability. – М.: , 2009. – 288 с.
  76. Efraim Turban. Information Technology for Management. – М.: , 2001. – 848 с.
  77. Microsoft Official Academic Course. 70–298 Designing Security for a Microsoft® Windows ServerTM 2003 Network Package. – М.: , 2005. – 744 с.
  78. H C LEFKOVITS. Lefkovits: Information Resource/data Dictionary Systems (pr Only). – М.: , 1993. – 0 с.
  79. Terry Bernstein. Internet Security for Business. – М.: , 1996. – 464 с.
  80. Efraim Turban. Information Technology for Management. – М.: , 1998. – 848 с.
  81. Efraim Turban. Information Technology for Management First Edition with Two New Chapters. – М.: , 1998. – 106 с.
  82. Michelle Chuaprasert. Thermal and Power Design for Laptop Systems. – М.: , 2000. – 432 с.
  83. M GREENWELL. Greenwell: ?knowledge? Engineeering For Expert Systems (prev. Knowledge Elicitation). – М.: , 1988. – 184 с.
  84. BORKIN. Borkin: ?datamodels? – A Semantic Approach For Database Systems. – М.: , 1980. – 0 с.
  85. Louis Rosenfeld. Information Architecture for the World Wide Web 2e. – М.: , 2002. – 486 с.
  86. Alan Derickson. Health Security for All – Dreams of Universal Health Care in America. – М.: , 2005. – 256 с.
  87. I Bratko. Kardio – A Study in Deep & Qualitative Knowledge for Expert Systems. – М.: , 1990. – 278 с.
  88. Roberta Bragg. MCSE Self–Paced Training Kit (Exam 70–298) – Designing Security for a Microsoft Windows Server 2003 Network. – М.: , 2004. – 864 с.
  89. Efraim Turban. Information Technology for Management. – М.: , 2003. – 784 с.
  90. Ed Robinson. Security for Microsoft Visual Basic .NET. – М.: , 2003. – 416 с.
  91. AW LEIGH. Leigh: ?real Time? Software For Small Systems (pr Only). – М.: , 1988. – 192 с.
  92. S Hardy. Design Standards for Roof Systems. – М.: , 2001. – 448 с.
  93. Ulrich Lang. CORBA Security for Distributed Application Development. – М.: , 2000. – 400 с.
  94. Peter Morville. Information Architecture for the World Wide Web 3e. – М.: , 2006. – 526 с.
  95. Efraim Turban. Information Technology for Management. – М.: , 1996. – 848 с.
  96. Don Morgan. Numerical Methods for DSP Systems in C. – М.: , 1997. – 352 с.
  97. Kornel Terplan. Applications for Distributed Systems and Network Management. – М.: , 1994. – 400 с.
  98. Rfid In The Supply Chain. – М.: , 2011. – 176 с.
  99. Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky. Cisco Security Professional's Guide to Secure Intrusion Detection Systems. – М.: , . –  с.
  100. Roel Wieringa, R. J. Wieringa. Design Methods for Reactive Systems: Yourdon, Statemate, and the UML. – М.: Morgan Kaufmann, . –  с.
  101. Harold F. Tipton, Micki Krause. Information Security Management Handbook on CD-ROM, 2003 Edition. – М.: , . –  с.
  102. Frank Thornton, Brad Haines, Anand M Das, Hersh Bhargava, et al. RFID Security. – М.: , 2006. – 242 с.
  103. Yi Qian, James Joshi, David Tipper, Prashant Krishnamurthy. Information Assurance: Dependability and Security in Networked Systems. – М.: Morgan Kaufmann, 2007. – 576 с.
  104. Ergun Bagc?. RFID Systems Design for Potential Applications. – М.: LAP Lambert Academic Publishing, 2011. – 124 с.
  105. Shaikh Salim and Shankar Nawale. Secure Access of RFID System. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  106. Rohana Mohamad Rashid. Determining Influencing Factors of Information Security Culture. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  107. Muthiah Geethanjali. Artificial Intelligence for power system protection. – М.: LAP Lambert Academic Publishing, 2012. – 284 с.
  108. Jawad Ahmed Malik,Yasir Javed Qazi and Safwan Muhammad. Performance Evaluation Of Error Correcting Techniques For OFDM Systems. – М.: LAP Lambert Academic Publishing, 2014. – 80 с.
  109. Ruben Johnnson Robert Jeremiah,Sakthivel Murugan Shamjith and Allen Vimal. Security System of Oilfield using Wireless in PLC & TESTBED for SCADA. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  110. Ali Salah Mahdi and Ergun Ercelebi. Design of Channel Estimation and Equalization for OFDM Systems. – М.: LAP Lambert Academic Publishing, 2015. – 84 с.
  111. MD. KAFIL UDDIN. An Efficient System for Sensor Tag Management. – М.: LAP Lambert Academic Publishing, 2011. – 148 с.
  112. Ehab E. Elattar,Tahir A. Mohammed and Abdel Mohsen M. Kinawy. Static State Estimation for Power Systems. – М.: LAP Lambert Academic Publishing, 2014. – 132 с.
  113. Almoataz Y. Abdelaziz,Said F. Mekhamer and Fathy M. Mohamed. Novel Optimization Techniques for Distribution Systems Reconfiguration. – М.: LAP Lambert Academic Publishing, 2013. – 172 с.
  114. Hussein M. Khattab,Almoataz Y. Abdelaziz and Said F. Mekhamer. Innovative Approaches for Power System Security Assessment. – М.: LAP Lambert Academic Publishing, 2013. – 224 с.
  115. Nikhil Bhargava. Network Information Flow for Multicast Communication Networks. – М.: LAP Lambert Academic Publishing, 2013. – 84 с.
  116. Ehsan Khorasani Esmaeili. Secure Keyboard logging system. – М.: LAP Lambert Academic Publishing, 2013. – 124 с.
  117. Venkata Krishna Parimala. Dimensions and challenges in providing QoS for wireless systems. – М.: LAP Lambert Academic Publishing, 2012. – 224 с.
  118. Hira Ilyas. RFID Based Security Systems With Video Monitering. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  119. Ka Lok Man,Tomas Krilavicius and Danny Hughes. PAFESD: Process Algebras for Electronic System Design. – М.: LAP Lambert Academic Publishing, 2010. – 132 с.
  120. Britto R. Kumar and Albert S. Rabara. An Architecture for Secure Mobile Payment System using PKI. – М.: LAP Lambert Academic Publishing, 2013. – 184 с.
  121. Raghavendra K. R. Model-checking infinite state systems for information flow security. – М.: LAP Lambert Academic Publishing, 2014. – 160 с.
  122. Yedji Mbangsoua and Dr. Freddie Acosta. Information Security and its Investment Justification. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  123. Yasser Alshehri. Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 156 с.
  124. Julien Shabani. Information Security for RFID Systems. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.
  125. Debasish Jena. On Protocols for Information Security Services. – М.: LAP Lambert Academic Publishing, 2011. – 136 с.
  126. Furhan Mehmood and Rajia Rafique. Information Security in Financial Organizations. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  127. Omar Zakaria. Information Security Culture. – М.: LAP Lambert Academic Publishing, 2013. – 248 с.
  128. Dirk Lessner. Network Security for Embedded Systems. – М.: LAP Lambert Academic Publishing, 2009. – 232 с.
  129. frankie tvrz and marijke coetzee. Information Security of a Bluetooth-enabled handheld device. – М.: LAP Lambert Academic Publishing, 2010. – 180 с.
  130. Ahmed AlNunu. How Much Information Security?. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  131. Jeffy Mwakalinga. A Framework for Adaptive Information Security Systems. – М.: LAP Lambert Academic Publishing, 2011. – 364 с.
  132. Meysam Namayandeh. Development of Computer Ethical Framework for Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 132 с.
  133. Marco Vieira. Dependability Benchmarking for OLTP Systems. – М.: LAP Lambert Academic Publishing, 2009. – 188 с.
  134. Muhammad Imran Tariq. SLA based Information Security Metrics in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2014. – 192 с.
  135. Kavitha Ramachandran and Sivadasan E. T. ICEdu : An Information Cloud for Educational Institutions. – М.: LAP Lambert Academic Publishing, 2014. – 72 с.
  136. Mela Ali and Loay George. A Spatial Invarient Model for Local Attributes of Fingerprint Ridges. – М.: LAP Lambert Academic Publishing, 2013. – 152 с.
  137. Alaa Al-Deen Mohammed Hassan. Information Security Management. – М.: LAP Lambert Academic Publishing, 2013. – 188 с.
  138. Jun Zheng,Jiantao Gu and Hong Wang. Financial Management and Information Security of Independent Colleges. – М.: LAP Lambert Academic Publishing, 2014. – 256 с.
  139. Erick Brenes. Information Strategies for Project Managment. – М.: LAP Lambert Academic Publishing, 2014. – 88 с.
  140. Ying Qian. Mitigating Information Security Risks during Operation Transition. – М.: LAP Lambert Academic Publishing, 2012. – 372 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Банковское отделение будущего. интервью с Камероном МакКворри. Cameron MacQuarrie, менеджером по развитию бизнеса компании Cisco Systems в области корпоративных финансов в регионе EMEA. Европа, Ближний Восток, Африка. Н.Ф. Колюшенко, "Расчеты и операционная работа в коммерческом банке", № 2, февраль 2006.
  2. Ловушка для пирата. интервью с И. Слабых, руководителем отдела противодействия интеллектуальному пиратству в России и СНГ Adobe Systems. И. Голова, "Расчет", N 9, сентябрь 2012 г.
  3. О качестве сервиса, связанного с запросами на медицинскую информацию. Medical Information Service?. А. Беденков, "Ремедиум", № 1, январь 2012.
  4. Мы можем управлять собственными мыслями. интервью с С. Харитоновым, врачом-психотерапевтом, психиатором, кандидатом медицинских наук, старшим научным сотрудником Московского НИИ психиатрии Росздрава РФ, членом-корреспондентом Международной академии наук. МАНЭБ, членом Британского общества когнитивных и поведенческих психотерапевтов. Membership British Association for Behavioural & Cognitive Psychoterapies / BABCP. Ф. Кульпин, "Управление персоналом", N 8, апрель 2011 г.
  5. Зачетная реструктуризация долга: институт DEBT-FOR-EQUITY SWAP в России". интервью с М. Григорьевым, старшим юристом корпоративной практики юридической фирмы "Вегас-Лекс". О. Бодрягина, "эж-ЮРИСТ", № 3, январь 2010.
  6. Я воспринимаю персонального помощника как напарника червяк должен нравиться рыбке, а не рыбаку. интервью с П.А. Черкашиным, руководителем российского представительства компании Adobe Systems. "Управление персоналом", № 20, октябрь 2008.
  7. Управление проектами при подборе персонала. PM for HR. Е. Кривов, "Кадровик. Рекрутинг для кадровика", № 9, сентябрь 2008.

Образцы работ

Тема и предметТип и объем работы
Этапы формирования теории президентства
История государства и права
Курсовая работа
30 стр.
Слияния и поглощения Мировая и Российская практика
Мировая экономика
Диплом
99 стр.
Привлекательности труда в организации
Психология
Курсовая работа
35 стр.
Формирование системы экономической безопасности на Белоярской АЭС
Психофизиология
Диплом
96 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Альбина
Пишу письмо, чтобы выразить Вам благодарность в том, что Вы помогли мне с сопровождением дипломной работы. Дипломную работу после вашего сопровождения я защитила на "хорошо". Огромное Вам спасибо, что Вы есть!!!