Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Stephen Schiavone,Lalit Garg and Kelly Summers. Information Security in Enterprises - an Ontological Perspective. – М.: LAP Lambert Academic Publishing, 2014. – 232 с.

Дополнительные результаты

  1. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с.
  2. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 515 с.
  3. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  4. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с.
  5. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с.
  6. Mr. Amir Manzoor. Information Technology in Business. – М.: , 2012. – 628 с.
  7. Anne Wolkodaw. Information Management: How to deal with the information paradox in business' daily life. – М.: , 2012. – 84 с.
  8. Anupam Ghosh. Information Sharing in Supply Chain: The Role of Governance Mechanisms. – М.: , 2012. – 152 с.
  9. Henk Langendijk, Dirk Swagerman, Willem Verhoog. Is Fair Value Fair? : Financial Reporting from an International Perspective. – М.: , 0. – 0 с.
  10. Health Education in Context: An International Perspective on Health Education in Schools and Local Communities. – М.: , 2012. – 278 с.
  11. Mark J. Martinko. Attribution Theory: An Organizational Perspective. – М.: , 0. – 0 с.
  12. Tom Mendina, Johannes J. Britz. Information Ethics in the Electronic Age: Current Issues in Africa and the World. – М.: , 0. – 0 с.
  13. Dennis Dalton. Rethinking Corporate Security in the Post 9-11 Era. – М.: , 2003. – 0 с.
  14. A. Gunasekaran, Omar Khalil, Syed Mahbubur Rahman, Angappa Gunasekaran. Knowledge and Information Technology Management: Human and Social Perspectives. – М.: , 0. – 0 с.
  15. Tony Fu-Lai Yu. Firms, Governments and Economic Change: An Entrepreneurial Perspective. – М.: , 0. – 0 с.
  16. Gavin Cawthra. Securing South Africa's Democracy: Defense, Development and Security in Transition (International Political Economy Series). – М.: , 0. – 0 с.
  17. Mehdi Khosrow-Pour. Managing Information Technology in a Global Economy ( 2001 IRMA Conference Proceedings). – М.: , 0. – 0 с.
  18. Mark B. Desman. Building an Information Security Awareness Program. – М.: , 0. – 0 с.
  19. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с.
  20. Marko Nordquist. Towards Improved Security Management Practice: Designing an Organizational Model Procedure for the Implementation of Information Security Management in Heterogeneous Information Management. – М.: , 0. – 0 с.
  21. Steve Purser. A Practical Guide to Managing Information Security (Artech House Technology Management Library). – М.: , 0. – 0 с.
  22. Joseph S. Nye, William A. Owens, James R. Schlesinger, R. James Woolsey, James A. Lewis, Joseph S., Jr. Nye, James Andrew Lewis, Erin Schlather, Csis Commission on Technology Security in the Twenty-First Century. Computer Exports and National Security: New Tools for a New Century : A Report of the Csis Commission on Technology Security in the 21St-Century (Csis Panel Reports.). – М.: , 0. – 0 с.
  23. Jacint Jordana. Governing Telecommunications and the New Information Society in Europe. – М.: Edward Elgar Publishing, 2002. – 224 с.
  24. Niels Ploug, Jon Kvist. Social Security in Europe: Development or Dismantlement? (Kluwer Sovac Series on Social Security, Vol 3). – М.: , 0. – 0 с.
  25. Marian Quigley, Marian Quiqley. Information Security and Ethics: Social and Organizational Issues. – М.: , 0. – 0 с.
  26. C. Warren Axelrod, Axelrod. Outsourcing Information Security. – М.: , 0. – 0 с.
  27. Harold F. Tipton, Micki Krause, Micki, Cissp Krause. Information Security Management Handbook, Fifth Edition. – М.: , 0. – 0 с.
  28. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с.
  29. Robert Sandy. The Economics of Sport : An International Perspective. – М.: , 2004. – 0 с.
  30. Michael Chui. Private Sector Involvement And International Financial Crises: An Analytical Perspective. – М.: , 2005. – 0 с.
  31. Andre Fourcans. Currency Crises: A Theoretical and Empirical Perspective (New Horizons in Money and Finance.). – М.: , 2004. – 0 с.
  32. Aspatore Books. Corporate Security in the Information Age: Industry Leaders from Bose Corporation, Dow Jones, and more on Security Options, Protecting Assets, & Implementing a Strategy (Inside the Minds). – М.: , 2005. – 0 с.
  33. Safety and Security in Tourism: Relationships, Management, and Marketing (Journal of Travel & Tourism Marketing Monographic Separates). – М.: , 2003. – 0 с.
  34. Economics of Information Security (Advances in Information Security). – М.: , 2004. – 0 с.
  35. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с.
  36. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с.
  37. Sean De Burca. International Marketing : An SME Perspective. – М.: , 2004. – 0 с.
  38. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с.
  39. Knowledge Management for Educational Innovation: IFIP WG 3.7 7th Conference on Information Technology in Educational Management (ITEM), Hamamatsu, Japan, ... Federation for Informa. – М.: , 2007. – 210 с.
  40. Ira Winkler. Zen and the Art of Information Security. – М.: , 2007. – 192 с.
  41. Greg N. Gregoriou. Initial Public Offerings (IPO): An International Perspective of IPOs. – М.: Butterworth-Heinemann, 2005. – 464 с.
  42. Timothy P. Layton. Information Security. – М.: , 2006. – 222 с.
  43. Reinhold Haux, A. Winter, Elske Ammenwerth, Birgit Brigl. Strategic Information Management in Hospitals: An Introduction to Hospital Information Systems (Health Informatics). – М.: , 2004. – 272 с.
  44. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с.
  45. Vincenzo Galasso. The Political Future of Social Security in Aging Societies. – М.: , 2008. – 280 с.
  46. Janet R Batsleer. Informal Learning in Youth Work. – М.: , 2008. – 208 с.
  47. Sophie Rainford. Environmental Management in Micro and Small Tourism Enterprises: An Owner-manager Perspective. – М.: , 2008. – 172 с.
  48. Semantic Knowledge Management: An Ontology-based Framework (Premier Reference Source). – М.: , 2008. – 458 с.
  49. Social and Human Elements of Information Security: Emerging Trends and Countermeasures (Premier Reference Source). – М.: , 2008. – 412 с.
  50. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с.
  51. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с.
  52. Gerard Blokdijk, Ivanka Menken. Information Security Management Best Practice Workbook: Implementation and Management Roadmap for Threats, Challenges and Solutions - Ready to use supporting documents bringing Theory into Practice. – М.: , 2008. – 124 с.
  53. Philip Kotler, Kevin Lane Keller, Ang Swee Hoon, Leong Siew Meng, Tan Chin Tiong. Marketing Management: An Asian Perspective - 5th Edition. – М.: , 2008. – 800 с.
  54. Jay Ramanathan, Rajiv Ramnath. Co-engineering Applications and Adaptive Business Technologies in Practice: Enterprise Service Ontologies, Models, and Frameworks (Advances in Information Resources Management). – М.: , 2009. – 426 с.
  55. W. Krag Brotby. Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement. – М.: Auerbach Publications, 2009. – 200 с.
  56. Alan Calder. Information Security based on ISO 27001/ISO 27002: A Management Guide. – М.: , 2009. – 83 с.
  57. Jake Kouns, Daniel Minoli. Information Technology Risk Management in Enterprise Environments: A Review of Industry Practices and a Practical Guide to Risk Management Teams. – М.: , 2010. – 421 с.
  58. Bel G. Raggad. Information Security Management: Concepts and Practice. – М.: , 2010. – 871 с.
  59. Michael E. Whitman, Herbert J. Mattord. Management of Information Security. – М.: , 2010. – 592 с.
  60. Alan Calder, Steve G Watkins. Information Security Risk Management for ISO27001 / ISO27002. – М.: , 2010. – 198 с.
  61. William Manning. CISM Certified Information Security Manager Certification Exam Preparation Course in a Book for Passing the CISM Exam - The How To Pass on Your First Try Certification Study Guide. – М.: , 2010. – 188 с.
  62. Editors Karl Maria Michael de Leeuw, Jan Bergstra. The History of Information Security: A Comprehensive Handbook. – М.: Elsevier Science, 2007. – 900 с.
  63. Global Perspectives In Information Security. – М.: , 2008. – 896 с.
  64. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с.
  65. I. Burhan T++rksen. An Ontological and Epistemological Perspective of Fuzzy Set Theory. – М.: , 2010. – 542 с.
  66. Albert R. Meyer. Research Directions in Computer Science – An MIT Perspective. – М.: , 1991. – 518 с.
  67. James Cavallaro. Security in Paraquay – Analysis and Responses in Comparative Perspective. – М.: , 2008. – 180 с.
  68. Brad Roberts. U.S Security in an Uncertain Era (Paper). – М.: , 1993. – 428 с.
  69. J. Ann Tickner. Gender in International Relations – Feminist Perspectives on Achieving Global Security (Paper). – М.: , 1993. – 196 с.
  70. Fc Keil. Semantic & Conceptual Developmnt – An Ontological Perspective. – М.: , 1979. – 230 с.
  71. Fc Keil. Semantic & Conceptual Developmnt – An Ontological Perspective. – М.: , 1983. – 134 с.
  72. Tomas J Philipson. Private Choices & Public Health – The AIDS Epidemic in an Economic Perspective. – М.: , 1994. – 276 с.
  73. CCTA. Ccta: An Intro To Information Systems In Govt. – М.: , 1989. – 76 с.
  74. Martin N Muller. Sexual Coercion in Primates – An Evolutionary Perspective on Male Aggression Against Females. – М.: , 2009. – 472 с.
  75. Information Technology In Water And Wastewater Utilities, Wef Mop 33. – М.: , 2011. – 376 с.
  76. Harold F. Tipton, Micki Krause. Information Security Management Handbook on CD-ROM, 2003 Edition. – М.: , . –  с.
  77. Rohana Mohamad Rashid. Determining Influencing Factors of Information Security Culture. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  78. Prof Lucy Lynn Maliwichi,Prof Peter BIkam and Dovhani Johannes Mulaudzi. Energy Needs and Food Security in Mutale Municipality, South Africa. – М.: LAP Lambert Academic Publishing, 2011. – 76 с.
  79. Roya Sadeghi. An ecological perspective to adolescent smoking: Study in Iran. – М.: LAP Lambert Academic Publishing, 2012. – 376 с.
  80. Md. Zillur Rahman. Use of Information Technology in Libraries. – М.: LAP Lambert Academic Publishing, 2012. – 220 с.
  81. Fraj Azeeza Siddiqui and Mohd. Faizuddin Siddiqui. Library Information Science Education in India. – М.: LAP Lambert Academic Publishing, 2012. – 144 с.
  82. Shesh Mishra. Information Literacy in Higher Education. – М.: LAP Lambert Academic Publishing, 2013. – 216 с.
  83. Simon Nangabo. The Impact of HIV/AIDS on Food Security in Rural Africa. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  84. Jancy Gupta. Dairy Knowledge Information System: An Indian Perspective. – М.: LAP Lambert Academic Publishing, 2012. – 136 с.
  85. Never Assan. Food Security in Sub Saharan Africa. – М.: LAP Lambert Academic Publishing, 2013. – 148 с.
  86. Abraham Mudefi. Fast Track Land Reform and Household Food Security in Zimbabwe. – М.: LAP Lambert Academic Publishing, 2011. – 116 с.
  87. Joseph Chidanti-Malunga and Keith Weatherhead. WETLAND FARMING AND INFORMAL IRRIGATION IN THE SHIRE VALLEY. – М.: LAP Lambert Academic Publishing, 2010. – 208 с.
  88. Indra Bahadur Hayu. Livelihood Security In Nepal. – М.: LAP Lambert Academic Publishing, 2014. – 76 с.
  89. Demeku Mesfin. The Status Of Food Security In Face Of Climate Change,Central Ethiopia. – М.: LAP Lambert Academic Publishing, 2015. – 140 с.
  90. Ayaz Ahmad. Child Labour in India: An Analytical Study. – М.: LAP Lambert Academic Publishing, 2014. – 116 с.
  91. Satyendra Singh Narwaria. Geography as a factor to the Environment Security of Bangladesh. – М.: LAP Lambert Academic Publishing, 2014. – 128 с.
  92. Marisen Mwale. Philosophy of Education an Analytical Perspective. – М.: LAP Lambert Academic Publishing, 2014. – 180 с.
  93. Margrid Kaasik. Autonomy and informed consent in doctor-patient relationship. – М.: LAP Lambert Academic Publishing, 2010. – 72 с.
  94. Samsudin Wahab and Abdullah Yahya Moqbel Ahmed. Quality Information Delivery in Supply Chain Information Performance. – М.: LAP Lambert Academic Publishing, 2012. – 112 с.
  95. Sylvester Marumahoko. Household food security in Zimbabwe. – М.: LAP Lambert Academic Publishing, 2013. – 104 с.
  96. Scott Nicholas Romaniuk. New Polar Horizons: Conflict and Security in the Arctic. – М.: LAP Lambert Academic Publishing, 2011. – 160 с.
  97. Scott Nicholas Romaniuk. Competing Powers: Security in the Wider Black Sea Region. – М.: LAP Lambert Academic Publishing, 2011. – 408 с.
  98. Ekaterina Anyanova. The regime of maritime security in international, EU and national law. – М.: LAP Lambert Academic Publishing, 2014. – 324 с.
  99. Chris Okereafor. Information Management In Diplomatic Missions. – М.: Dictus Publishing, 2012. – 56 с.
  100. Marian Nwanze. Foreign Investment in Nigeria: An International Perspective. – М.: LAP Lambert Academic Publishing, 2013. – 88 с.
  101. Evans Gesura Mecha. Information Structure in Ekegusii. – М.: LAP Lambert Academic Publishing, 2014. – 380 с.
  102. Maseeh Haseeb. The Theories of Ideology and Discourse: National Security in Canada. – М.: LAP Lambert Academic Publishing, 2013. – 80 с.
  103. Nagat Mustafa Elmulthum. Poverty and Food Security in the Sudan. – М.: LAP Lambert Academic Publishing, 2011. – 84 с.
  104. Juan Daniel Machin Mastromatteo. Exploring Users' Information Behavior in Social Networks. – М.: LAP Lambert Academic Publishing, 2011. – 136 с.
  105. Abbas Mehdizadeh Zare Anari and Ayyoub Akbari Moghanjoughi. Route optimization security in mobile IPv6 networks. – М.: LAP Lambert Academic Publishing, 2012. – 116 с.
  106. Hazim Abed,Alicia Tang and Zaihisma Cob. An Ontology-Based Framework For Information Integration In Education. – М.: LAP Lambert Academic Publishing, 2014. – 116 с.
  107. Dimitrios Papadopoulos and Bernhard Hammerli. Positioning the roles, interfaces & processes in the InfoSec scene. – М.: LAP Lambert Academic Publishing, 2014. – 168 с.
  108. Michael Twum-Darko. THE ROLE OF INFORMATION SYSTEM IN LEGISLATION LED REFORM. – М.: LAP Lambert Academic Publishing, 2011. – 264 с.
  109. Yedji Mbangsoua and Dr. Freddie Acosta. Information Security and its Investment Justification. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  110. Udai Pratap Rao,Dhiren R. Patel and Vidhya Goutham Guntaka. SVD Based Database Watermarking for Security in Database. – М.: LAP Lambert Academic Publishing, 2011. – 56 с.
  111. Yasser Alshehri. Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 156 с.
  112. Stephen Schiavone,Lalit Garg and Kelly Summers. Information Security in Enterprises - an Ontological Perspective. – М.: LAP Lambert Academic Publishing, 2014. – 232 с.
  113. Julien Shabani. Information Security for RFID Systems. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.
  114. Debasish Jena. On Protocols for Information Security Services. – М.: LAP Lambert Academic Publishing, 2011. – 136 с.
  115. Aliyu Onipede. Biometrics as a tool for Information Security in Aviation industry. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  116. Mehtab Afzal,Ijaz Ahmed and Qazi Mudassar Ilyas. Information Extraction from Web for Disaster Management Systems. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  117. Yixin Luo. Improving Software Quality Using An Ontology-based Approach. – М.: LAP Lambert Academic Publishing, 2010. – 144 с.
  118. Furhan Mehmood and Rajia Rafique. Information Security in Financial Organizations. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  119. Nelson K. Y. Leung. Towards an Ontology-based Knowledge Management. – М.: LAP Lambert Academic Publishing, 2012. – 240 с.
  120. Omar Zakaria. Information Security Culture. – М.: LAP Lambert Academic Publishing, 2013. – 248 с.
  121. frankie tvrz and marijke coetzee. Information Security of a Bluetooth-enabled handheld device. – М.: LAP Lambert Academic Publishing, 2010. – 180 с.
  122. Ahmed AlNunu. How Much Information Security?. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  123. Jeffy Mwakalinga. A Framework for Adaptive Information Security Systems. – М.: LAP Lambert Academic Publishing, 2011. – 364 с.
  124. Meysam Namayandeh. Development of Computer Ethical Framework for Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 132 с.
  125. Jason Scott. Facilitating the Application of Information Technology in Construction. – М.: LAP Lambert Academic Publishing, 2010. – 188 с.
  126. Muhammad Imran Tariq. SLA based Information Security Metrics in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2014. – 192 с.
  127. Shada Al-Salamah. Towards Information Sharing in Virtual Organisations. – М.: LAP Lambert Academic Publishing, 2010. – 312 с.
  128. Dimple Patel and Devika P. Madalli. Information Retrieval in Indian Languages. – М.: LAP Lambert Academic Publishing, 2011. – 208 с.
  129. Bashir Ahmad Khilji. HRD in Pakistan an Analytical Study (1947 to 2012). – М.: LAP Lambert Academic Publishing, 2014. – 308 с.
  130. OFFIONG SOLOMON. THE IMPACT OF GOVERNMENT POLICY ON THE INFORMAL SECTOR IN NIGERIA. – М.: LAP Lambert Academic Publishing, 2011. – 400 с.
  131. Padi Koti Prahladha and Kondeti Suneetha. Public Distribution System and Food Security in Andhra Pradesh. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  132. Shasha Yu. Information Technology in Multinational Corporations. – М.: LAP Lambert Academic Publishing, 2011. – 244 с.
  133. Sevenia Victor Madziakapita. A Situational Analysis of the Informal Sector in Malawi. – М.: LAP Lambert Academic Publishing, 2013. – 460 с.
  134. Sahil Raj. Strategic Information System In Action. – М.: LAP Lambert Academic Publishing, 2012. – 372 с.
  135. Artur Steinerowski. Developing social enterprise: an investigation of promoters & barriers. – М.: LAP Lambert Academic Publishing, 2012. – 444 с.
  136. Alaa Al-Deen Mohammed Hassan. Information Security Management. – М.: LAP Lambert Academic Publishing, 2013. – 188 с.
  137. Jun Zheng,Jiantao Gu and Hong Wang. Financial Management and Information Security of Independent Colleges. – М.: LAP Lambert Academic Publishing, 2014. – 256 с.
  138. Anupam Ghosh. Information Sharing in Supply Chain. – М.: LAP Lambert Academic Publishing, 2012. – 152 с.
  139. Ying Qian. Mitigating Information Security Risks during Operation Transition. – М.: LAP Lambert Academic Publishing, 2012. – 372 с.
  140. Ban Mustafa and Najla Aldabagh. Building an Ontology Based Access Control Model for Multi-Agent System. – М.: , 2015. – 120 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Наука человековедения. интервью с Д. Уолтоном, профессором London Metropolitan University, экспертом CIPD. Chartered Institute of Personnel and Development, автором программы Master of Arts in Human Resource Strategies. И. Смирнова, "Кадровый менеджмент", № 5, июль-август 2007.
  2. LEAN ENTERPRISE - дань моде или будущее лучших компаний?. "Управление персоналом", № 13, июль 2006.
  3. Бюджетирование страховой компании на базе Oracle Enterprise Planning and Budgeting. Д.В. Лесоводский, "Финансовый менеджмент в страховой компании", № 3, III квартал 2006.
  4. О качестве сервиса, связанного с запросами на медицинскую информацию. Medical Information Service?. А. Беденков, "Ремедиум", № 1, январь 2012.
  5. Trade-in как способ обмена автомобиля. С.Н. Гордеева, "Торговля: бухгалтерский учет и налогообложение", N 2, февраль 2011 г.
  6. Проблемы применения универсальной юрисдикции in absentia. Г.А. Королев, "Журнал российского права", № 10, октябрь 2009.
  7. Тонкости trade-in. С.А.Королев, "НДС. Проблемы и решения", № 8, август 2009.
  8. In-store banking - новая модель банковского бизнеса. А. Пятков, "Банковское обозрение", № 11, ноябрь 2008.

Образцы работ

Тема и предметТип и объем работы
Анализ финансового состояния предприятия
Анализ хозяйственной деятельности
Диплом
188 стр.
Слияния и поглощения Мировая и Российская практика
Мировая экономика
Диплом
99 стр.
Привлекательности труда в организации
Психология
Курсовая работа
35 стр.
Продвижение брендов в шоу-бизнесе
Электроснабжение городов и промышленных предприятий
Диплом
79 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
GL-7
СПАСИБО за всё. Вчера была защита, защитился на 4, хотели сначала даже 5 ставить, но в этом только моя вина. Сказали что сама работа после вашего сопровождения очень не плохая. Ещё раз спасибо!