Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Ulric J., Jr. Gelinas, Steve G. Sutton, Jane Fedorowicz. Business Processes and Information Technology. – М.: , 0. – 0 с.
  2. Andrew Hawker. Security in Information Systems : A Guide for Business and Accounting. – М.: , 0. – 0 с.
  3. Andy Robinson. Selling Social Change (Without Selling Out): Earned Income Strategies for Nonprofits. – М.: , 0. – 0 с.
  4. Thomas H. Spitters. mySAP FI Fieldbook. – М.: , 2005. – 0 с.
  5. Todd D. Bramson. Real Life Financial Planning for the Young Dental Professional: A Dental Professional?s Guide to Financial Security. – М.: , 2005. – 0 с.
  6. Tiger Tong Xiaohu. Financial Services in China. – М.: China Knowledge Press, 2007. – 548 с.
  7. Ivan E. Brick, Tavy Ronen, Cheng-Few Lee. Advances In Quantitative Analysis Of Finance And Accounting: Essays in Microstructure in Honor of David K. Whitcomb. – М.: World Scientific Publishing Company, 2006. – 268 с.
  8. Ernst & Young LLP, Jan Babiak, John Butters, Mark W. Doll. Defending the Digital Frontier: Practical Security for Management, 2nd Edition. – М.: , 2004. – 253 с.
  9. Joey Hirao, Mimi Choi, Perry Cox, Steven Passer, Jeanmarie Hirao. SAP Security Configuration and Deployment. – М.: Syngress, 2009. – 392 с.
  10. Seppo Sirkemaa. On Local Area Network Management. – М.: LAP Lambert Academic Publishing, 2010. – 248 с.
  11. Kamrul Hasan. An Investigation into Botnet Detection System. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  12. Furhan Mehmood and Rajia Rafique. Information Security in Financial Organizations. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  13. Edith Galy. Organizational Learning, Absorptive Capacity, and Performance for ERP. – М.: LAP Lambert Academic Publishing, 2009. – 124 с.
  14. Jun Zheng,Jiantao Gu and Hong Wang. Financial Management and Information Security of Independent Colleges. – М.: LAP Lambert Academic Publishing, 2014. – 256 с.
  15. Amir Masoud,Md. Mahfuzur Rahman and Mahtab Samadi. Effects of Psychological Empowerment on Its Cognition. – М.: LAP Lambert Academic Publishing, 2012. – 52 с.

Дополнительные результаты

  1. Luc Bauwens, Christian M. Hafner, Sebastien Laurent. Handbook of Volatility Models and Their Applications (Wiley Handbooks in Financial Engineering and Econometrics). – М.: , 2012. – 568 с.
  2. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с.
  3. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 515 с.
  4. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  5. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с.
  6. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с.
  7. Benno Torgler, Maria A. Garcia-Valinas, Alison Macintyre. Participation in Environmental Organizations. – М.: , 2012. – 272 с.
  8. Mr. Amir Manzoor. Information Technology in Business. – М.: , 2012. – 628 с.
  9. T. Balogh. Studies in Financial Organization (National Institute of Economic and Social Research Economic and Social Studies). – М.: , 2012. – 344 с.
  10. Anupam Ghosh. Information Sharing in Supply Chain: The Role of Governance Mechanisms. – М.: , 2012. – 152 с.
  11. Martin Stone, Spencer Strauss. Secure Your Financial Future Investing in Real Estate. – М.: , 0. – 0 с.
  12. Julian Lowenthal, Julian Lowenthal. J K Lasser Pro Survival Skills in Financial Services. – М.: , 0. – 0 с.
  13. Christopher Lee Marshall. Measuring and Managing Operational Risks in Financial Institutions : Tools, Techniques, and other Resources (Wiley Frontiers in Finance). – М.: , 0. – 0 с.
  14. Daniel Moreau, Tracey Longo. Getting Started in Financial Information (Getting Started In.....). – М.: , 0. – 0 с.
  15. John F. Marshall. Dictionary of Financial Engineering (Wiley Series in Financial Engineering). – М.: , 0. – 0 с.
  16. Managing Operational Risk in Financial Markets. – М.: , 0. – 0 с.
  17. Ming Fan, Sayee Srinivasan, Jan Stallaert, Andrew B. Whinston. Electronic Commerce and the Revolution in Financial Markets. – М.: , 0. – 0 с.
  18. Karen P. Schoenebeck. Interpreting and Analyzing Financial Statements (2nd Edition). – М.: , 0. – 0 с.
  19. D. Eric Hirst, Mary Lea McNally, Mary Lea McAnally, D Eric Hirst. Cases in Financial Reporting: An Integrated Approach with an Emphasis on Earnings and Persistence (3rd Edition). – М.: , 0. – 0 с.
  20. Robert P. Gilles, Pieter H.M. Ruys. Imperfections and Behavior in Economic Organizations (Theory and Decision Library C11). – М.: , 0. – 0 с.
  21. Motivating People in Lean Organizations. – М.: , 0. – 0 с.
  22. Edward L. Melnick, Praveen Nayyar, Michael L. Pinedo, Sridhar Seshadri. Creating Value in Financial Services: Strategies, Operations and Technologies. – М.: , 0. – 0 с.
  23. Barton, Ph.D. Kunstler. The Hothouse Effect: Intensify Creativity in Your Organization Using Secrets from History's Most Innovative Communities. – М.: , 0. – 0 с.
  24. Tom Mendina, Johannes J. Britz. Information Ethics in the Electronic Age: Current Issues in Africa and the World. – М.: , 0. – 0 с.
  25. J.A. Wagner III, J.M. Bartunek, K.D. Elsbach. Advances in Qualitative Organization Research, Volume 4. – М.: , 0. – 0 с.
  26. Robert L. Heneman, David B. Greenberger. Human Resource Management in Virtual Organizations (Research in Human Resource Management). – М.: , 0. – 0 с.
  27. Chuck Kremer, Ron Rizzuto, John Case. Managing by the Numbers: A Commonsense Guide to Understanding and Using Your Company's Financials : An Essential Resource for Growing Businesses. – М.: , 0. – 0 с.
  28. Dennis Dalton. Rethinking Corporate Security in the Post 9-11 Era. – М.: , 2003. – 0 с.
  29. Nigel Gann. Managing Change in Voluntary Organizations: A Guide to Practice. – М.: , 0. – 0 с.
  30. Gavin Cawthra. Securing South Africa's Democracy: Defense, Development and Security in Transition (International Political Economy Series). – М.: , 0. – 0 с.
  31. David Fairris. Shopfloor Matters: Labor-Management Relations in Twentieth-Century American Manufacturing (Routledge Studies in Business Organizations and Networks, 5). – М.: , 0. – 0 с.
  32. Melenie Herman, George L. Head, Toni E. Fogarty, Peggy M. Jackson. Managing Risk in Nonprofit Organizations : A Comprehensive Guide. – М.: , 0. – 0 с.
  33. Paul Glasserman. Monte Carlo Methods in Financial Engineering (Stochastic Modelling and Applied Probability). – М.: Springer, 2005. – 616 с.
  34. Dilip K. Ghosh. New Advances in Financial Economics. – М.: , 0. – 0 с.
  35. Pamela P. Peterson, Frank J. Fabozzi. Analysis of Financial Statements (Frank J. Fabozzi Series). – М.: , 0. – 0 с.
  36. Mehdi Khosrow-Pour. Managing Information Technology in a Global Economy ( 2001 IRMA Conference Proceedings). – М.: , 0. – 0 с.
  37. Charles J. Austin, Stuart B. Boxerman. Information Systems for Healthcare Management, Sixth Edition. – М.: , 0. – 0 с.
  38. Mark B. Desman. Building an Information Security Awareness Program. – М.: , 0. – 0 с.
  39. James A. Senn. Information Technology in Business: Principles, Practices, and Opportunities (2nd Edition). – М.: , 0. – 0 с.
  40. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с.
  41. Andrew Hawker. Security in Information Systems : A Guide for Business and Accounting. – М.: , 0. – 0 с.
  42. Marko Nordquist. Towards Improved Security Management Practice: Designing an Organizational Model Procedure for the Implementation of Information Security Management in Heterogeneous Information Management. – М.: , 0. – 0 с.
  43. Mehdi Khosrowpour. Success and Pitfalls of Information Technology (Cases on Information Technology Series). – М.: Idea Group Publishing, 1999. – 238 с.
  44. Steve Purser. A Practical Guide to Managing Information Security (Artech House Technology Management Library). – М.: , 0. – 0 с.
  45. Ronald E. Riggio, Sarah Smith Orr. Improving Leadership in Nonprofit Organizations. – М.: , 0. – 0 с.
  46. Joseph S. Nye, William A. Owens, James R. Schlesinger, R. James Woolsey, James A. Lewis, Joseph S., Jr. Nye, James Andrew Lewis, Erin Schlather, Csis Commission on Technology Security in the Twenty-First Century. Computer Exports and National Security: New Tools for a New Century : A Report of the Csis Commission on Technology Security in the 21St-Century (Csis Panel Reports.). – М.: , 0. – 0 с.
  47. Jacint Jordana. Governing Telecommunications and the New Information Society in Europe. – М.: Edward Elgar Publishing, 2002. – 224 с.
  48. Niels Ploug, Jon Kvist. Social Security in Europe: Development or Dismantlement? (Kluwer Sovac Series on Social Security, Vol 3). – М.: , 0. – 0 с.
  49. Arjen Van Witteloostuijn. Market Evolution: Competition and Cooperation (Studies in Industrial Organization, Vol 20). – М.: , 0. – 0 с.
  50. Marian Quigley, Marian Quiqley. Information Security and Ethics: Social and Organizational Issues. – М.: , 0. – 0 с.
  51. C. Warren Axelrod, Axelrod. Outsourcing Information Security. – М.: , 0. – 0 с.
  52. Zongqing Zhou. E-Commerce and Information Technology in Hospitality and Tourism. – М.: Delmar Cengage Learning, 2003. – 224 с.
  53. Harold F. Tipton, Micki Krause, Micki, Cissp Krause. Information Security Management Handbook, Fifth Edition. – М.: , 0. – 0 с.
  54. Thomas Peltier, Thomas Pelitier, Justin Peltier, John A. Blackley, Peltier, Associates. Information Security Fundamentals. – М.: , 0. – 0 с.
  55. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с.
  56. Bill Treasurer. Positively M.A.D. : Making a Difference in Your Organizations, Communities, and the World. – М.: , 2005. – 0 с.
  57. Conventions and Structures in Economic Organization: Markets, Networks and Organizations (New Horizons in Institutional and Evolutionary Economics Series). – М.: , 2003. – 0 с.
  58. Regional Currency Areas In Financial Globalization: A Survey of Current Issues. – М.: , 2005. – 0 с.
  59. Aspatore Books. Corporate Security in the Information Age: Industry Leaders from Bose Corporation, Dow Jones, and more on Security Options, Protecting Assets, & Implementing a Strategy (Inside the Minds). – М.: , 2005. – 0 с.
  60. Pension Security in the 21st Century: Redrawing the Public-Private Debate. – М.: , 2004. – 0 с.
  61. Safety and Security in Tourism: Relationships, Management, and Marketing (Journal of Travel & Tourism Marketing Monographic Separates). – М.: , 2003. – 0 с.
  62. Nigel Nicholson. Traders: Risks, Decisions, and Management in Financial Markets. – М.: , 2004. – 0 с.
  63. Economics of Information Security (Advances in Information Security). – М.: , 2004. – 0 с.
  64. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с.
  65. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с.
  66. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с.
  67. Knowledge Management for Educational Innovation: IFIP WG 3.7 7th Conference on Information Technology in Educational Management (ITEM), Hamamatsu, Japan, ... Federation for Informa. – М.: , 2007. – 210 с.
  68. Ira Winkler. Zen and the Art of Information Security. – М.: , 2007. – 192 с.
  69. Edward J. CPA, CAE McMillan. Preventing Fraud in Nonprofit Organizations. – М.: , 2006. – 240 с.
  70. Timothy P. Layton. Information Security. – М.: , 2006. – 222 с.
  71. Reinhold Haux, A. Winter, Elske Ammenwerth, Birgit Brigl. Strategic Information Management in Hospitals: An Introduction to Hospital Information Systems (Health Informatics). – М.: , 2004. – 272 с.
  72. Michael E. Whitman, Herbert J. Mattord. Principles of Information Security, Second Edition. – М.: , 2004. – 600 с.
  73. Information Efficiency in Financial and Betting Markets. – М.: , 2006. – 412 с.
  74. Govindan Parayil. Political Economy & Information Capitalism in India: Digital Divide, Development Divide & Equity (Technology, Globalization and Development). – М.: , 2006. – 256 с.
  75. Ngai Hang Chan, Hoi-Ying Wong. Simulation Techniques in Financial Risk Management (Statistics in Practice). – М.: , 2006. – 240 с.
  76. Out of the Shadows: Political Action And the Informal Economy in Latin America. – М.: , 2006. – 280 с.
  77. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с.
  78. Vincenzo Galasso. The Political Future of Social Security in Aging Societies. – М.: , 2008. – 280 с.
  79. Janet R Batsleer. Informal Learning in Youth Work. – М.: , 2008. – 208 с.
  80. Social and Human Elements of Information Security: Emerging Trends and Countermeasures (Premier Reference Source). – М.: , 2008. – 412 с.
  81. Connectivity and Knowledge Management in Virtual Organizations: Networking and Developing Interactive Communications (Premier Reference Source). – М.: , 2008. – 450 с.
  82. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с.
  83. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с.
  84. Gerard Blokdijk, Ivanka Menken. Information Security Management Best Practice Workbook: Implementation and Management Roadmap for Threats, Challenges and Solutions - Ready to use supporting documents bringing Theory into Practice. – М.: , 2008. – 124 с.
  85. W. Krag Brotby. Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement. – М.: Auerbach Publications, 2009. – 200 с.
  86. Alan Calder. Information Security based on ISO 27001/ISO 27002: A Management Guide. – М.: , 2009. – 83 с.
  87. Kevin J. O'sullivan. Strategic Intellectual Capital Management in Multinational Organizations: Sustainability and Successful Implications. – М.: , 2009. – 358 с.
  88. Bel G. Raggad. Information Security Management: Concepts and Practice. – М.: , 2010. – 871 с.
  89. Michael E. Whitman, Herbert J. Mattord. Management of Information Security. – М.: , 2010. – 592 с.
  90. Benno Torgler, Maria A. Garcia-Valinas, Alison Macintyre. Participation in Environmental Organizations (Routledge Explorations in Environmental Economics). – М.: , 2010. – 272 с.
  91. Alexander Styhre. Visual Culture in Organizations: Theory and Cases (Routledge Studies in Management, Organizations and Society). – М.: , 2010. – 242 с.
  92. Alan Calder, Steve G Watkins. Information Security Risk Management for ISO27001 / ISO27002. – М.: , 2010. – 198 с.
  93. William Manning. CISM Certified Information Security Manager Certification Exam Preparation Course in a Book for Passing the CISM Exam - The How To Pass on Your First Try Certification Study Guide. – М.: , 2010. – 188 с.
  94. Amanat Hussain. Managing Operational Risk in Financial Markets. – М.: , 2010. – 288 с.
  95. Tracy Taylor. Managing People in Sport Organizations. – М.: , 2010. – 328 с.
  96. Editors Karl Maria Michael de Leeuw, Jan Bergstra. The History of Information Security: A Comprehensive Handbook. – М.: Elsevier Science, 2007. – 900 с.
  97. Global Perspectives In Information Security. – М.: , 2008. – 896 с.
  98. P.J. Bert Hakkinen. Information Resources in Toxicology. – М.: , 2010. – 0 с.
  99. John Richard. Advances in Physical Organic Chemistry,39. – М.: , 2010. – 326 с.
  100. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с.
  101. E. Burton Swanson. Maintaining Information Systems in Organizations. – М.: , 1989. – 274 с.
  102. Daniel Moreau. Getting Started in Financial Information. – М.: , 1999. – 242 с.
  103. Sep Kamvar. Numerical Algorithms for Personalized Search in Self–Organizing Information Networks. – М.: , 2010. – 184 с.
  104. Information Technology In Water And Wastewater Utilities, Wef Mop 33. – М.: , 2011. – 376 с.
  105. Harold F. Tipton, Micki Krause. Information Security Management Handbook on CD-ROM, 2003 Edition. – М.: , . –  с.
  106. Rohana Mohamad Rashid. Determining Influencing Factors of Information Security Culture. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  107. Mercy Njeri Njogu. Factors Influencing Performance of Informal Labourers in Kenya. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  108. Om Prakash Verma and P. K. Walia. Digital Database of Homoepathic Information Resources in India. – М.: LAP Lambert Academic Publishing, 2012. – 284 с.
  109. B.V. Bhosale (Ed.). Informal Sector in India: Challenges and Consequences. – М.: LAP Lambert Academic Publishing, 2010. – 188 с.
  110. Vaibhav Wagh. Study of PHB production in an organism isolated from activated sludge. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.
  111. Indra Bahadur Hayu. Livelihood Security In Nepal. – М.: LAP Lambert Academic Publishing, 2014. – 76 с.
  112. Evans Gesura Mecha. Information Structure in Ekegusii. – М.: LAP Lambert Academic Publishing, 2014. – 380 с.
  113. Ajit Regmi. IT in Nepalese Banks. – М.: LAP Lambert Academic Publishing, 2010. – 120 с.
  114. Yedji Mbangsoua and Dr. Freddie Acosta. Information Security and its Investment Justification. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  115. Udai Pratap Rao,Dhiren R. Patel and Vidhya Goutham Guntaka. SVD Based Database Watermarking for Security in Database. – М.: LAP Lambert Academic Publishing, 2011. – 56 с.
  116. Yasser Alshehri. Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 156 с.
  117. Stephen Schiavone,Lalit Garg and Kelly Summers. Information Security in Enterprises - an Ontological Perspective. – М.: LAP Lambert Academic Publishing, 2014. – 232 с.
  118. Julien Shabani. Information Security for RFID Systems. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.
  119. Muhammad Ismail. Contaxt-Based Information Retrieval in Semantic Web. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  120. Debasish Jena. On Protocols for Information Security Services. – М.: LAP Lambert Academic Publishing, 2011. – 136 с.
  121. Aliyu Onipede. Biometrics as a tool for Information Security in Aviation industry. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  122. Furhan Mehmood and Rajia Rafique. Information Security in Financial Organizations. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  123. Omar Zakaria. Information Security Culture. – М.: LAP Lambert Academic Publishing, 2013. – 248 с.
  124. frankie tvrz and marijke coetzee. Information Security of a Bluetooth-enabled handheld device. – М.: LAP Lambert Academic Publishing, 2010. – 180 с.
  125. Ahmed AlNunu. How Much Information Security?. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  126. Jeffy Mwakalinga. A Framework for Adaptive Information Security Systems. – М.: LAP Lambert Academic Publishing, 2011. – 364 с.
  127. Meysam Namayandeh. Development of Computer Ethical Framework for Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 132 с.
  128. Muhammad Imran Tariq. SLA based Information Security Metrics in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2014. – 192 с.
  129. Shada Al-Salamah. Towards Information Sharing in Virtual Organisations. – М.: LAP Lambert Academic Publishing, 2010. – 312 с.
  130. Ravi Kumar Gupta. Social Security in Unorganized Sector in India. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  131. Marcel van Oosterhout. Business Agility and Information Technology in Service Organizations. – М.: Scholars' Press, 2014. – 292 с.
  132. Sahil Raj. Strategic Information System In Action. – М.: LAP Lambert Academic Publishing, 2012. – 372 с.
  133. Tareq Jalal Altamimi. Cooperative Information Systems in Europe. – М.: LAP Lambert Academic Publishing, 2012. – 164 с.
  134. Alaa Al-Deen Mohammed Hassan. Information Security Management. – М.: LAP Lambert Academic Publishing, 2013. – 188 с.
  135. Jun Zheng,Jiantao Gu and Hong Wang. Financial Management and Information Security of Independent Colleges. – М.: LAP Lambert Academic Publishing, 2014. – 256 с.
  136. Anupam Ghosh. Information Sharing in Supply Chain. – М.: LAP Lambert Academic Publishing, 2012. – 152 с.
  137. Ying Qian. Mitigating Information Security Risks during Operation Transition. – М.: LAP Lambert Academic Publishing, 2012. – 372 с.
  138. Pietro Sorci. Implementing Sustainable Financial Policies in Public Organizations. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  139. Kwashirai Gomo,Paul Mupa and Maxwell Constantine Chando Musingafi. The Development of Informal Traders in Zimbabwe. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  140. Khosie Ndlangamandla. Library and Information Education in Swaziland. – М.: LAP Lambert Academic Publishing, 2012. – 164 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Наука человековедения. интервью с Д. Уолтоном, профессором London Metropolitan University, экспертом CIPD. Chartered Institute of Personnel and Development, автором программы Master of Arts in Human Resource Strategies. И. Смирнова, "Кадровый менеджмент", № 5, июль-август 2007.
  2. О качестве сервиса, связанного с запросами на медицинскую информацию. Medical Information Service?. А. Беденков, "Ремедиум", № 1, январь 2012.
  3. Trade-in как способ обмена автомобиля. С.Н. Гордеева, "Торговля: бухгалтерский учет и налогообложение", N 2, февраль 2011 г.
  4. Проблемы применения универсальной юрисдикции in absentia. Г.А. Королев, "Журнал российского права", № 10, октябрь 2009.
  5. Тонкости trade-in. С.А.Королев, "НДС. Проблемы и решения", № 8, август 2009.
  6. In-store banking - новая модель банковского бизнеса. А. Пятков, "Банковское обозрение", № 11, ноябрь 2008.
  7. Ключ к проблеме привлечения инвестиций российскими банками". интервью с Н. Леманом, партнером консалтинговой компании Financial Consulting Group. С.Ю. Муртузалиева, "МСФО и МСА в кредитной организации", № 1, январь-март 2008.

Образцы работ

Тема и предметТип и объем работы
Слияния и поглощения Мировая и Российская практика
Мировая экономика
Диплом
99 стр.
Коммерческие банки как субъект кредитного рынка, их операции и сделки
Банковский менеджмент
Диплом
87 стр.
Стиль управления и социально-психологический климат
Теоретические основы электротехники (ТОЭ)
Диплом
64 стр.
Продвижение брендов в шоу-бизнесе
Электроснабжение городов и промышленных предприятий
Диплом
79 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Марина, 18.05
Юленька, спасибо большое за работу!!! Я защетила на отлично! Надеюсь на дальнейшее продолжение сотрудничества! Сегодня позвоню по поводу оплаты двух рефератов...