Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с.
  2. Fundamentals Of Network Security. – М.: , 2011. – 672 с.
  3. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . –  с.

Дополнительные результаты

  1. Trust Management VI: 6th IFIP WG 11.11 International Conference, IFIPTM 2012, Surat, India, May 21-25, 2012, Proceedings (IFIP Advances in Information and Communication Technology). – М.: , 2012. – 298 с.
  2. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с.
  3. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  4. Technological Innovation for Value Creation: Third IFIP WG 5.5/SOCOLNET Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS ... in Information and Communication Technology). – М.: , 2012. – 607 с.
  5. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с.
  6. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с.
  7. Kern Peng. Equipment Management in the Post-Maintenance Era: A New Alternative to Total Productive Maintenance (TPM). – М.: , 2012. – 255 с.
  8. Advances in Management Accounting, Volume 9. – М.: , 0. – 0 с.
  9. J.Y. Lee, M.J. Epstein. Advances in Management Accounting, Volume 11. – М.: , 0. – 0 с.
  10. Marc J. Epstein, John Y. Lee. Advances in Management Accounting, Volume 8. – М.: , 0. – 0 с.
  11. John Wang. Innovations in Information Systems for Business Functionality and Operations Management. – М.: , 2012. – 378 с.
  12. Jacques Janssen, Christos H. Skiadas, Constantin Zopounidis. Advances in Stochastic Modelling and Data Analysis. – М.: , 0. – 0 с.
  13. Fritz Drasgow, Neil Schmitt. Measuring & Analyzing Behavior in Organizations: Advances in Measurement & Data Analysis. – М.: , 0. – 0 с.
  14. Barbara C. McNurlin, Ralph H. Sprague. Information Systems Management in Practice (5th Edition). – М.: , 0. – 0 с.
  15. Safe Schools: A Security and Loss Prevention Plan. – М.: , 0. – 0 с.
  16. Erhan Kozan, Azuma Ohuchi. Operations Research/Management Science at Work (Advances in Information Security). – М.: , 0. – 0 с.
  17. Leigh Wade. Careers in Private Security: How to Get Started, How to Get Ahead. – М.: , 0. – 0 с.
  18. Panos M. Pardalos, Yannis Siskos, Constantin Zopounidis. Advances in Multicriteria Analysis (Nonconvex Optimization and Its Applications ; V. 5). – М.: , 0. – 0 с.
  19. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с.
  20. Andrew Hawker. Security in Information Systems : A Guide for Business and Accounting. – М.: , 0. – 0 с.
  21. Ifip Tc11 Wg11.5 Working Conference on Integrity and Internal Control, Michael Gertz. Integrity and Internal Control in Information Systems V: Ifip Tc11/Wg11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (Iicis), November 11-12, 2002, Bonn, Germany (International Federation for Information Processing. – М.: , 0. – 0 с.
  22. Mehdi Khosrow-Pour. Advanced Topics in Information Resources Management, Volume 2. – М.: , 0. – 0 с.
  23. Edward J., Ph.D. Szewczak, Coral R., Ph.D. Snodgrass. Human Factors in Information Systems. – М.: , 0. – 0 с.
  24. Mehdi Khosrow-Pour. Advanced Topics in Information Resources Management (Advanced Topics in Information Resources Management, Vol 3). – М.: , 0. – 0 с.
  25. Dorothy E. Denning, Peter J. Denning. Internet Besieged. – М.: , 0. – 0 с.
  26. Marvin V. Zelkowitz. Advances in Computers, Volume 53: Emphasizing Distributed Systems. – М.: , 0. – 0 с.
  27. Eugene Kaluzniacky. Managing Psychological Factors in Information Systems Work: An Orientation to Emotional Intelligence. – М.: , 0. – 0 с.
  28. Harold F. Tipton, Micki Krause, Micki, Cissp Krause. Information Security Management Handbook, Fifth Edition. – М.: , 0. – 0 с.
  29. Ifip Tc5, Wg5.7 International Conference on Advances in Production Mana, Harinder S. Jagdev, J. C. Wortmann, H. J. Pels. Collaborative Systems for Production Management: Ifip Tc5/Wg5.7 International Conference on Advanced Sic in Production Management Systems, September 8 ... Federation for Information Processing, ?257). – М.: , 0. – 0 с.
  30. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с.
  31. Barbara C. McNurlin. Information Systems Management in Practice (7th Edition). – М.: , 2005. – 0 с.
  32. Advanced Topics in Information Resources Management (Advanced Topics in Information Resources Management). – М.: , 2004. – 0 с.
  33. Advances in Security and Payment Methods for Mobile Commerce. – М.: , 2004. – 0 с.
  34. Economics of Information Security (Advances in Information Security). – М.: , 2004. – 0 с.
  35. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с.
  36. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с.
  37. Advances in Electronic Marketing. – М.: , 2005. – 317 с.
  38. Paul Piccard, Jeremy Faircloth. Combating Spyware in the Enterprise. – М.: , 2006. – 386 с.
  39. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с.
  40. Advances in Management Accounting. – М.: , 2006. – 228 с.
  41. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с.
  42. Privacy-Preserving Data Mining: Models and Algorithms (Advances in Database Systems). – М.: , 2008. – 514 с.
  43. Patrick Traynor, Patrick McDaniel, Thomas La Porta. Security for Telecommunications Networks (Advances in Information Security). – М.: , 2008. – 182 с.
  44. Major Currents in Information Systems (SAGE Library in Business and Management). – М.: , 2008. – 2424 с.
  45. Healthcare Information Systems and Informatics: Research and Practices (Advances in Healthcare Information Systems and Informatics) (Advances in Healthcare Information Systems and Informatics). – М.: , 2008. – 448 с.
  46. Encyclopedia of Human Resources Information Systems: Challenges in E-hrm. – М.: , 2008. – 1010 с.
  47. Social and Human Elements of Information Security: Emerging Trends and Countermeasures (Premier Reference Source). – М.: , 2008. – 412 с.
  48. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с.
  49. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с.
  50. Gerard Blokdijk, Ivanka Menken. Information Security Management Best Practice Workbook: Implementation and Management Roadmap for Threats, Challenges and Solutions - Ready to use supporting documents bringing Theory into Practice. – М.: , 2008. – 124 с.
  51. Planning for Information Systems (Advances in Management Information Systems). – М.: , 2009. – 528 с.
  52. Hamid R. Nemati. Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues (Advances in Information Security and Privacy). – М.: , 2009. – 414 с.
  53. Jay Ramanathan, Rajiv Ramnath. Co-engineering Applications and Adaptive Business Technologies in Practice: Enterprise Service Ontologies, Models, and Frameworks (Advances in Information Resources Management). – М.: , 2009. – 426 с.
  54. Alan Calder. Information Security based on ISO 27001/ISO 27002: A Management Guide. – М.: , 2009. – 83 с.
  55. Alan Calder, Steve G Watkins. Information Security Risk Management for ISO27001 / ISO27002. – М.: , 2010. – 198 с.
  56. Alan Hevner, Samir Chatterjee. Design Research in Information Systems: Theory and Practice (Integrated Series in Information Systems). – М.: , 2010. – 393 с.
  57. WALLACE. ADVANCES IN EXPERT SYSTEMS FOR MANAGEMENT, VOLUME 2Advances in System Management (AESM). – М.: , 2010. – 0 с.
  58. Innovations and Advances in Computer Sciences and Engineering. – М.: , 2010. – 400 с.
  59. Signal Transduction in the Cardiovascular System in Health and Disease (Advances in Biochemistry in Health and Disease). – М.: , 2008. – 424 с.
  60. Advances in Statistical Control, Algebraic Systems Theory, and Dynamic Systems Characteristics: A Tribute to Michael K. Sain (Systems & Control: Foundations & Applications). – М.: , 2008. – 386 с.
  61. Advances in Music Information Retrieval (Studies in Computational Intelligence). – М.: , 2010. – 420 с.
  62. Global Perspectives In Information Security. – М.: , 2008. – 896 с.
  63. David Avison. Research in Information Systems. – М.: , 2010. – 344 с.
  64. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с.
  65. Nicholas P Cheremisinoff. Advances in Engineering Fluid Mechanics: Multiphase Reactor and Polymerization System Hydr. – М.: , 2010. – 772 с.
  66. Robert Barnard. Intrusion Detection Systems. – М.: , 2010. – 480 с.
  67. Michael I Jordan. Advances in Neural Information Processing Systems – Proceeding of the First 12 Conferences CD. – М.: , 2002. – 0 с.
  68. Sara A Solla. Advances in Nerual Information Processing Systems 12. – М.: , 2000. – 2002 с.
  69. Todd K Leen. Advances in Neural Information Processing Systems 13. – М.: , 2001. – 1100 с.
  70. Sebastian Thrun. Advances in Neural Information Processing Systems 16 – Proceedings of the 2003 Conference. – М.: , 2004. – 1656 с.
  71. Gerald Tesauro. Advances in Neural Information Processing Systems 7 – Proceedings Nov–Dec 1994 Denver Colorado. – М.: , 1995. – 1168 с.
  72. David S Touretzky. Advances in Neural Information Processing Systems 8 – Proceedings of the 1995 Conference. – М.: , 1996. – 1120 с.
  73. Advances in the Valuation and Management of Mortgage–Backed Securities. – М.: , 1999. – 318 с.
  74. John Van Zandt. Parallel Processing in Information Systems. – М.: , 1992. – 224 с.
  75. Advances in Ceramic Coatings and Ceramic–Metal Systems. – М.: , 2006. – 418 с.
  76. Michael Kearns. Advances in Neural Information Processing Systems 11. – М.: , 1999. – 1108 с.
  77. Richard J. Boland. Critical Issues in Information Systems Research. – М.: , 1991. – 410 с.
  78. Budi Martokoesoemo. The On–Line Business Survival Guide in Information Systems and Decision Sciences Featuring the Wall Street Journal Interactive Edition. – М.: , 1998. – 64 с.
  79. Nickerson. Nickerson: ?using? Computers Human Factors In Information Systems (cloth). – М.: , 1986. – 0 с.
  80. CCTA. Justifying Investment in Information Systems. – М.: , 1989. – 94 с.
  81. Jun Akedo. Advances in Multifunctional Materials and Systems. – М.: , 2010. – 188 с.
  82. Raymond S Nickerson. Using Computers Human Factors in Information Systems. – М.: , 1987. – 452 с.
  83. Open Source Development, Communities and Quality: IFIP 20th World Computer Congress, Working Group 2.3 on Open Source Software, September 7-10, 2008, ... in Information and Communication Technology). – М.: , 2011. – 417 с.
  84. LK DORAISWAMY. Doraiswamy Recent Advances In The ?engineering? Analysis Of Chemically Reacting Systems. – М.: , 1984. – 624 с.
  85. Michael I Jordan. Advances in Neural Information Processing Systems 10. – М.: , 1998. – 1116 с.
  86. M Jordan. Advances in Neural Information Processing Systems 9. – М.: , 1997. – 1116 с.
  87. Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky. Cisco Security Professional's Guide to Secure Intrusion Detection Systems. – М.: , . –  с.
  88. Mat Santamouris. Advances in Building Energy Research: Volume 4. – М.: Earthscan, 2010. – 310 с.
  89. Anup Bhange and Manmeet Kaur Marhas. Anomaly Detection in Network Traffic; A Statistical Approach. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  90. Gulshan Kumar. Effective Intrusion Detection using Genetic Algorithms. – М.: LAP Lambert Academic Publishing, 2014. – 100 с.
  91. Huang-Chun Roan. Network Intrusion Detection Based on Shift-OR Circuit. – М.: LAP Lambert Academic Publishing, 2011. – 60 с.
  92. M. Sadiq Ali Khan and S. M. Aqil Burney. Recent Trends in Intrusion Detection System & Network Monitoring. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  93. Cruceru Madalina. Radiation Detection Systems With Applications in High Energy Physics. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  94. Basanti Jena,K. Sadasiva Rao and D. Das. Canine Pyometra: Recent Advances in Therapeutic Management. – М.: LAP Lambert Academic Publishing, 2014. – 204 с.
  95. Abhay Nath Singh. Honeypot Based Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  96. Shahnawaz Husain,S. C. Gupta and R. C. Joshi. Intrusion Detection Engine for Adhoc Environment. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  97. Sumaya Saad Sulaiman and Sarab M. Hameed. A Fuzzy Based Clustering for Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  98. Shubha Puthran and Ketan Shah. Intrusion Detection System using datamining techniques. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  99. Mohammad S. I. Mamun. Intrusion Detection System Architecture in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  100. Heba Fathy Eid. Computational Intelligence in Network Intrusion Detection System. – М.: Scholars' Press, 2014. – 164 с.
  101. Janakiraman S. Distributed Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 164 с.
  102. Yogesh Kumar,Krishan Kumar and Gulshan Kumar. Feature Selection For Intrusion Detection Systems. – М.: LAP Lambert Academic Publishing, 2014. – 100 с.
  103. Syed Zahidur Rashid. Computer Network Security Monitoring. – М.: Scholars' Press, 2015. – 284 с.
  104. Mrutyunjaya Panda and Manas Ranjan Patra. A Data Mining Approach to Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2015. – 216 с.
  105. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  106. Ivano Malavolta. A tamper resistant Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2011. – 144 с.
  107. Shaffali Gupta and Sanmeet Kaur. A GUI Framework for detecting Intrusions using Bro IDS. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  108. Siva S. Sivatha Sindhu,S. Geetha and S. Selvakumar. Network Intrusion Detection System using Machine Learning Techniques. – М.: LAP Lambert Academic Publishing, 2013. – 80 с.
  109. Nasim Beigi-Mohammadi. Smart Meter Networks: Intrusion Detection System by Design. – М.: LAP Lambert Academic Publishing, 2014. – 136 с.
  110. Christian Chetachi Umunna. Distributed Intrusion Detection System in Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 104 с.
  111. Iftikhar Ahmad. Feature Subset Selection in Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 220 с.
  112. Jabarweer Singh,Krishan Kumar and Gulshan Kumar. Intrusion detection using artificial intelligence based ensembles. – М.: LAP Lambert Academic Publishing, 2014. – 116 с.
  113. Govind Sreekar Shenoy. Architecture Support for Intrusion Detection systems. – М.: LAP Lambert Academic Publishing, 2014. – 160 с.
  114. ILKAY VURAL. Success Factors in Information Systems Outsourcing. – М.: LAP Lambert Academic Publishing, 2010. – 92 с.
  115. Yedji Mbangsoua and Dr. Freddie Acosta. Information Security and its Investment Justification. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  116. Monis Akhlaq,Irfan Awan and Faeiz Alserhani. Improved Performance High Speed Network Intrusion Detection Systems. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  117. Prakash Prasad. Intrusion Detection System: Findings. – М.: LAP Lambert Academic Publishing, 2011. – 104 с.
  118. Yasser Alshehri. Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 156 с.
  119. Bibi Masoomeh Aslahi Shahri. Intrusion Detection System Using Hybrid Gsa-kmeans. – М.: LAP Lambert Academic Publishing, 2014. – 128 с.
  120. Julien Shabani. Information Security for RFID Systems. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.
  121. Debasish Jena. On Protocols for Information Security Services. – М.: LAP Lambert Academic Publishing, 2011. – 136 с.
  122. Aliyu Onipede. Biometrics as a tool for Information Security in Aviation industry. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  123. Edmund Balogun and Usang Inah. Paradigms of Interface Design in Information Systems. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  124. Tigabu Dagne Akal. Constructing Predictive Model for Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 160 с.
  125. Kamrul Hasan. An Investigation into Botnet Detection System. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  126. Furhan Mehmood and Rajia Rafique. Information Security in Financial Organizations. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  127. Rupali Pathak. Recent Advances In Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  128. Saeed Soltanmohammadi. Improving Information System Security by Evaluating Human Factors. – М.: LAP Lambert Academic Publishing, 2014. – 116 с.
  129. Ahmed AlNunu. How Much Information Security?. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  130. Jeffy Mwakalinga. A Framework for Adaptive Information Security Systems. – М.: LAP Lambert Academic Publishing, 2011. – 364 с.
  131. Shinsuke Tamura. Elements of Schemes for Preserving Privacies in e-Society Systems. – М.: LAP Lambert Academic Publishing, 2015. – 156 с.
  132. Muhammad Imran Tariq. SLA based Information Security Metrics in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2014. – 192 с.
  133. Al-Sakib Khan Pathan. Securing WSN with Lightweight Resource-Efficient Schemes. – М.: LAP Lambert Academic Publishing, 2011. – 116 с.
  134. Alpay Doruk. Security Review Program Requirements for Intrusion Management Systems. – М.: LAP Lambert Academic Publishing, 2010. – 88 с.
  135. Sathish Kumar. Intrusion Detection and Response Techniques for Mobile Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 200 с.
  136. PRASANNA POKHREL and Siva Praneeth Babu Vemulapalli. Web Based Information System (WBIS). – М.: LAP Lambert Academic Publishing, 2010. – 80 с.
  137. Heba Hatamlah. Health Information Systems (HIS) in Hospitals. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  138. Alaa Al-Deen Mohammed Hassan. Information Security Management. – М.: LAP Lambert Academic Publishing, 2013. – 188 с.
  139. Jun Zheng,Jiantao Gu and Hong Wang. Financial Management and Information Security of Independent Colleges. – М.: LAP Lambert Academic Publishing, 2014. – 256 с.
  140. Ying Qian. Mitigating Information Security Risks during Operation Transition. – М.: LAP Lambert Academic Publishing, 2012. – 372 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Наука человековедения. интервью с Д. Уолтоном, профессором London Metropolitan University, экспертом CIPD. Chartered Institute of Personnel and Development, автором программы Master of Arts in Human Resource Strategies. И. Смирнова, "Кадровый менеджмент", № 5, июль-август 2007.
  2. Банковское отделение будущего. интервью с Камероном МакКворри. Cameron MacQuarrie, менеджером по развитию бизнеса компании Cisco Systems в области корпоративных финансов в регионе EMEA. Европа, Ближний Восток, Африка. Н.Ф. Колюшенко, "Расчеты и операционная работа в коммерческом банке", № 2, февраль 2006.
  3. Ловушка для пирата. интервью с И. Слабых, руководителем отдела противодействия интеллектуальному пиратству в России и СНГ Adobe Systems. И. Голова, "Расчет", N 9, сентябрь 2012 г.
  4. О качестве сервиса, связанного с запросами на медицинскую информацию. Medical Information Service?. А. Беденков, "Ремедиум", № 1, январь 2012.
  5. Trade-in как способ обмена автомобиля. С.Н. Гордеева, "Торговля: бухгалтерский учет и налогообложение", N 2, февраль 2011 г.
  6. Проблемы применения универсальной юрисдикции in absentia. Г.А. Королев, "Журнал российского права", № 10, октябрь 2009.
  7. Тонкости trade-in. С.А.Королев, "НДС. Проблемы и решения", № 8, август 2009.
  8. In-store banking - новая модель банковского бизнеса. А. Пятков, "Банковское обозрение", № 11, ноябрь 2008.
  9. Я воспринимаю персонального помощника как напарника червяк должен нравиться рыбке, а не рыбаку. интервью с П.А. Черкашиным, руководителем российского представительства компании Adobe Systems. "Управление персоналом", № 20, октябрь 2008.

Образцы работ

Тема и предметТип и объем работы
Коммерческие банки как субъект кредитного рынка, их операции и сделки
Банковский менеджмент
Диплом
87 стр.
Понятие и история брендинга. Анализ создания и стратегия продвижения бренда ***
Электроснабжение городов и промышленных предприятий
Другое
72 стр.
Комплекс маркетинговых коммуникаций в продвижении цифровых СМИ
Маркетинг
Диплом
74 стр.
Поиск и внедрение дополнительных каналов монетизации ipad-версии журнала (на примере конкретного проекта с уникальным контентом)
Основы сертификации и стандартизации
Диплом
103 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Мария
Мариночка! Большое Вам спасибо, я защитилась после ваших консультаций с оценкой отлично. Мне очень понравилось с Вами работать!!! Буду рекомендовать другим студентам. С Уважением и большой признательностью. Еще раз спасибо!