Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Kefa Rabah. Mastering Securing ICT Infrastructure for Corporate Network. – М.: LAP Lambert Academic Publishing, 2014. – 360 с.

Дополнительные результаты

  1. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с.
  2. e-Infrastructure and e-Services for Developing Countries: Third International ICST Conference, AFRICOMM 2011, Zanzibar, Tansania, November 23-24, ... and Telecommunications Engineering). – М.: , 2012. – 269 с.
  3. Terrorism and the Olympics: Major Event Security and Lessons for the Future. – М.: , 2012. – 272 с.
  4. Fred R. Kaen. Blueprint for Corporate Governance: Strategy, Accountability, and the Preservation of Shareholder Value. – М.: AMACOM/American Management Association, 2003. – 256 с.
  5. William T. Moore. Real Options and Option-Embedded Securities. – М.: , 0. – 0 с.
  6. Ahmed Riahi-Belkaoui. The Role of Corporate Reputation for Multinational Firms: Accounting, Organizational, and Market Considerations. – М.: Quorum Books, 2000. – 248 с.
  7. Anna Nagurney, Anna Nugurney. Sustainable Transportation Networks. – М.: , 0. – 0 с.
  8. Stan Herman. Rewiring Organizations for the Networked Economy : Organizing, Managing, and Leading in the Information Age (J-B O-D (Organizational Development)). – М.: , 0. – 0 с.
  9. Pam Lassiter. The New Job Security. – М.: , 0. – 0 с.
  10. David S. Katz, Ilan Caspi, David S. Katz, Ilan Caspi. Executive's Guide to Personal Security. – М.: , 0. – 0 с.
  11. e-Business Strategies for Virtual Organizations (Computer Weekly Professional Series). – М.: , 0. – 0 с.
  12. Thomas Valovic. Corporate Networks: The Strategic Use of Telecommunications (The Artech House Telecommunications Library). – М.: , 0. – 0 с.
  13. Gary Klopfenstein. Fx: Managing Global Currency Risk : The Definitive Handbook for Corporations and Financial Insitutions (Glenlake Business Monographs). – М.: , 0. – 0 с.
  14. Ifip Tc5, Wg5.5 Working Conference on Infrastructures for Virtual Enter, Luis M. Camarinha Matos, Luis Camarinha-Matos. Collaborative Business Ecosystems and Virtual Enterprises (IFIP INTERNATIONAL FEDERATION FOR INFORMATION PROCESSING Volume 213). – М.: , 0. – 0 с.
  15. Maurice, Ph.D. Youakim. Social Security and Medicare for the New Millenium. – М.: , 0. – 0 с.
  16. Jeffrey C. Hooke, Jeff Hooke. Emerging Markets: A Practical Guide for Corporations, Lenders, and Investors. – М.: , 0. – 0 с.
  17. Emergency Response Planning: For Corporate and Municipal Managers. – М.: , 0. – 0 с.
  18. Stanley W. Black, Mathias Moersch, American Institute for Contemporary German Studies. Competition and Convergence in Financial Markets. – М.: , 0. – 0 с.
  19. Paul Windolf. Corporate Networks in Europe and the United States. – М.: , 0. – 0 с.
  20. Roger W. Babson. The Future Method of Investing Money: Economic Facts for Corporations and Investors. – М.: , 0. – 0 с.
  21. Robert B. Harris. Precedence and Arrow Networking Techniques for Construction. – М.: , 0. – 0 с.
  22. Gerald L. Kovacich, Edward P. Halibozek. The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, First Edition. – М.: , 0. – 0 с.
  23. Theo J. W. Renkema. The IT Value Quest: How to Capture the Business Value of IT-Based Infrastructure. – М.: , 0. – 0 с.
  24. Ifip Working Conference on Infrastructures for Virtual Organizations 2, Hamideh Afsarmanesh, Richardo J. Rabelo, Luis M. Camarinha-Matos, Luis Camarinha-Matos, Ricardo J. Rabelo. E-Business and Virtual Enterprises - Managing Business-to-Business Cooperation (International Federation For Information Processing Volume 184). – М.: , 0. – 0 с.
  25. Randy J. Frid. Infrastructure for Knowledge Management. – М.: , 0. – 0 с.
  26. Joseph S. Nye, William A. Owens, James R. Schlesinger, R. James Woolsey, James A. Lewis, Joseph S., Jr. Nye, James Andrew Lewis, Erin Schlather, Csis Commission on Technology Security in the Twenty-First Century. Computer Exports and National Security: New Tools for a New Century : A Report of the Csis Commission on Technology Security in the 21St-Century (Csis Panel Reports.). – М.: , 0. – 0 с.
  27. Joel M. Shulman, Thomas T. Stallkamp. Getting Bigger by Growing Smaller: A New Growth Model for Corporate America. – М.: , 0. – 0 с.
  28. Michael R. Czinkota, Bob Donath, Ilkka A. Ronkainen. Mastering Global Markets: Strategies for Today's Trade Globalist. – М.: , 0. – 0 с.
  29. Langdon Morris. The Knowledge Channel: Corporate Strategies for the Internet. – М.: , 0. – 0 с.
  30. Jeff Townsend, Jeffery E. Townsend. The Master Plan: Retirement Strategies for the Best of Your Life. – М.: , 0. – 0 с.
  31. John Ross, John A. Ross. Computer Networks for Small Business. – М.: , 0. – 0 с.
  32. Roberta Bragg. MCSE Training Guide (70-220): Windows 2000 Network Security Design, Second Edition. – М.: , 0. – 0 с.
  33. Aspatore Books Staff. Inside the Minds: Security Matters - Industry Leaders from eBay, Inc., Motorola, Internet Security Systems & More on Protecting Your Most Valuable Assets. – М.: , 0. – 0 с.
  34. Peter Varhol. Network-Centric Computing: Preparing the Enterprise for the Next Millennium. – М.: , 0. – 0 с.
  35. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с.
  36. Mavis A. Ampah. Connecting Sub-Saharan Africa: A World Bank Group Strategy for Information and Communication Technology Sector Development (World Bank Working Papers) (World Bank Working Papers). – М.: , 2005. – 0 с.
  37. Infrastructure for Poor People: Public Policy for Private Provision. – М.: , 2003. – 0 с.
  38. Payment Technologies for E-Commerce. – М.: , 2003. – 0 с.
  39. Keith Ward. Designing World Class Corporate Strategies : Value Creating Roles for Corporate Centres. – М.: , 2004. – 0 с.
  40. Intelligent Learning Infrastructure for Knowledge Intensive Organizations: A Semantic Web Perspective. – М.: , 2005. – 0 с.
  41. Aspatore Books. Corporate Security in the Information Age: Industry Leaders from Bose Corporation, Dow Jones, and more on Security Options, Protecting Assets, & Implementing a Strategy (Inside the Minds). – М.: , 2005. – 0 с.
  42. Joseph F., Jr. Savage. They Are Coming for You: Dangers for Corporate Executives in the Expanding World of Financial Crime. – М.: , 2004. – 0 с.
  43. Troy Adair. Excel Applications for Corporate Finance. – М.: , 2004. – 0 с.
  44. Intellectual Property Rights in a Networked World: : Theory and Practice. – М.: , 2004. – 0 с.
  45. The Global Information Technology Report 2002-2003: Readiness for the Networked World (Economics). – М.: , 2003. – 0 с.
  46. Jeffrey Bannister. Convergence Technologies for 3G Networks : IP, UMTS, EGPRS and ATM. – М.: , 2004. – 670 с.
  47. Paul A. Erickson. Emergency Response Planning for Corporate and Municipal Managers, Second Edition (Butterworth-Heinemann Homeland Security). – М.: , 2006. – 432 с.
  48. Patrick Traynor, Patrick McDaniel, Thomas La Porta. Security for Telecommunications Networks (Advances in Information Security). – М.: , 2008. – 182 с.
  49. Patrick Regan. MCTS 70-643 Exam Cram: Windows Server 2008 Applications Infrastructure, Configuring (Exam Cram). – М.: , 2008. – 480 с.
  50. Mitsuru Kodama. New Knowledge Creation Through ICT Dynamic Capability Creating Knowledge Communities Using Broadband (HC). – М.: , 2008. – 224 с.
  51. Mike Ackerman. Counterterrorism Strategies for Corporations: The Ackerman Principles. – М.: , 2008. – 328 с.
  52. Ibp Usa. Professional Internet Advertising for Corporate Executives and Business Leaders Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  53. Daniel Clark. Network Access Control 100 Success Secrets - 100 Most Asked NAC Questions on Implementation and Deployment of unify endpoint security technology, user ... and network security enforcement. – М.: , 2008. – 180 с.
  54. Bruce Pounder. Convergence Guidebook for Corporate Financial Reporting. – М.: , 2009. – 256 с.
  55. Alan Calder, Steve G Watkins. Information Security Risk Management for ISO27001 / ISO27002. – М.: , 2010. – 198 с.
  56. OECD Organisation for Economic Co-operation and Development. Effective Transport Policies for Corporate Mobility Management (International Transport Forum). – М.: , 2010. – 108 с.
  57. Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards and Applications (Wireless Networks and Mobile Communications). – М.: , 2008. – 424 с.
  58. Daniel M. Dobkin. RF Engineering for Wireless Networks. – М.: , 2010. – 448 с.
  59. Gerald L. Kovacich. The Manager's Handbook for Corporate Security. – М.: , 2010. – 463 с.
  60. John William Evans. Deploying IP and MPLS QoS for Multiservice Networks. – М.: , 2010. – 456 с.
  61. Rodney Howes. Infrastructure for the Built Environment: Global Procurement Strategies. – М.: , 2010. – 320 с.
  62. Paul Goransson. Secure Roaming in 802.11 Networks. – М.: , 2010. – 368 с.
  63. Arun Handa. System Engineering for IMS Networks. – М.: , 2010. – 340 с.
  64. Merouane Debbah. Game Theory for Wireless Networks. – М.: , 2010. – 400 с.
  65. Mark Stefik. The Internet Edge – Social, Technical & Legal Challenges for a Networked World. – М.: , 1999. – 330 с.
  66. Mark Stefik. Internet Edge – Social, Technical & Legal Challenges for a Networked World. – М.: , 2000. – 338 с.
  67. Christa Anderson and Kristin L. Griffin. Windows Server 2008 R2: Remote Desktop Services: Resource Kit (+ CD-ROM). – М.: Microsoft Press, 2010. – 718 с.
  68. B Epstein. Wiley IAS 98 – Interpretation & Application of International Accounting Standards 1998 for Windows Network User?s Guide. – М.: , 1999. – 0 с.
  69. Barry J. Epstein. Wiley IAS 98 Interpretation and Application of International Accounting Standards 1998 for Windows Network Version. – М.: , 1999. – 0 с.
  70. D Delaney. Wiley CPA Examination Review 3.0 for Windows Network User?s Guide. – М.: , 1999. – 0 с.
  71. B Larkin. Wiley GAAP–NfP for Windows Network CD. – М.: , 1999. – 0 с.
  72. P Delaney. Wiley GAAP 98 for Windows: Interpretation & Application of Generally Accepted Accounting Standards for Windows Network Edition User?s Guide. – М.: , 1998. – 40 с.
  73. B Larkin. Wiley GAAP NfP 99 for Windows Network Quick Start Card. – М.: , 1999. – 0 с.
  74. Glenn E. Weadock. MCSE Windows® 2000 Network Infrastructure For Dummies®. – М.: , 2000. – 432 с.
  75. Microsoft. Security Operations Guide for Microsoft Windows 2000 Server. – М.: , 2002. – 208 с.
  76. Epstein. Wiley IAS 99 for Windows Network Edition Quick Start Card. – М.: , 1999. – 0 с.
  77. David Claiborne. Mathematical Preliminaries for Computer Networking. – М.: , 1990. – 180 с.
  78. R WILLENS. Willens ?taxation? Of Corporate Capital Transactio Ns Guide For Corporate Investment Etc. – М.: , 1984. – 520 с.
  79. Gerry Cooklin. Master Patterns and Grading for Women?s Outsizes. – М.: , 1995. – 128 с.
  80. S MUFTIC. Muftic: ?security? Mechanisms For Computer Network S. – М.: , 1989. – 196 с.
  81. Principles Of Computer Security, Comptia Security+ And Beyond, Second Edition. – М.: , 2011. – 0 с.
  82. Transforming Infoglut! A Pragmatic Strategy For Oracle Enterprise Content Management. – М.: , 2011. – 253 с.
  83. Perfect Phrases For Professional Networking: Hundreds Of Ready-To-Use Phrases For Meeting And Keeping Helpful Contacts – Everywhere You Go. – М.: , 2011. – 208 с.
  84. Tim Speed, Juanita Ellis. Internet Security: A Jumpstart for Systems Administrators and IT Managers. – М.: , . –  с.
  85. Arindam Sarkar and J. K. Mandal. Artificial Neural Network Guided Secured Communication Techniques. – М.: LAP Lambert Academic Publishing, 2012. – 128 с.
  86. Xiangqian Chen. DEFENSE AGAINST NODE COMPROMISE IN SENSOR NETWORK SECURITY. – М.: LAP Lambert Academic Publishing, 2009. – 108 с.
  87. Quoc-Tuan Vien. Distributed Space-Time Block Codes for Relay Networks. – М.: LAP Lambert Academic Publishing, 2011. – 52 с.
  88. Vikram Santhanam. Interference Mitigation Techniques for Heterogeneous Network. – М.: LAP Lambert Academic Publishing, 2013. – 60 с.
  89. Chiranjeev Kumar and Rajeev Tripathi. Mobility Management Techniques for Wireless Networks. – М.: LAP Lambert Academic Publishing, 2010. – 128 с.
  90. Md. Abul Kalam Siddike and S. M. Mannan. Use of Information and Communication Technology (ICT). – М.: LAP Lambert Academic Publishing, 2011. – 180 с.
  91. S. Dhanavandan. ICT Infrastructures in Academic Libraries. – М.: LAP Lambert Academic Publishing, 2011. – 308 с.
  92. Ghada Naiem. Securing Control Link for Remote Sensing Satellites. – М.: LAP Lambert Academic Publishing, 2014. – 92 с.
  93. Vinay Abburi. SECURE AND RELIABLE DEEP SPACE NETWORKS. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  94. Mustafa Zuhaer Nayef Al-Dabagh. Security Robot System for Intelligent Building. – М.: LAP Lambert Academic Publishing, 2014. – 120 с.
  95. Srivaramangai Padmanabhan. Reliable Infrastructure for Cloud Computing. – М.: LAP Lambert Academic Publishing, 2013. – 100 с.
  96. Ivana Zelenika. Barriers to Appropriate Technologies for Sustainable Development. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  97. Ayyaswamy Kathirvel,Srinivasan Rengaramanujam and Mohanambal Kathirvel. Prevention of attacks usign umpiring security model for manets. – М.: LAP Lambert Academic Publishing, 2012. – 192 с.
  98. Wilson Okaka. ICTs for Knowledge and Development Education. – М.: LAP Lambert Academic Publishing, 2014. – 140 с.
  99. Tefera Tamirat and Girma Tamirat. ICT Contribution for Quality Education in Universities. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  100. Shahbaz Khan and Sahibzada Ali Mahmud. Cross Layer Optimization Techniques for Wireless Networks. – М.: LAP Lambert Academic Publishing, 2011. – 192 с.
  101. Supriya Srivastava. Routing protocols for Mobile Ad-Hoc Network. – М.: LAP Lambert Academic Publishing, 2014. – 112 с.
  102. Sandeep Kr. Agarwal and Dr. K. V. Arya. Security in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  103. Suman Bala. Secure Routing in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 72 с.
  104. Hamid Reza Barzegar,Mahdiyeh Barzegar and Neshat Alidad. Energy Efficient And Secured Communication For Manets In Military. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  105. Srikanth Hariharan,Ness B. Shroff and Saurabh Bagchi. Secure Neighbor Discovery in Wireless Networks. – М.: LAP Lambert Academic Publishing, 2011. – 52 с.
  106. Elliot Attipoe. Securing the Public Wireless Network. – М.: LAP Lambert Academic Publishing, 2013. – 92 с.
  107. Manvi Mishra and S.S. Bedi. WBEM for Heterogeneous Network Management. – М.: LAP Lambert Academic Publishing, 2014. – 116 с.
  108. Marco Fotino. Energy Behavior of Routing Protocols for Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2014. – 144 с.
  109. P. Ganesh Kumar and S. Ramesh. Secure Routing Protocol for ICMN. – М.: LAP Lambert Academic Publishing, 2014. – 64 с.
  110. Nitin K. Mishra and Sumit Dhariwal. Security in Mobile Ad-Hoc Networks. – М.: LAP Lambert Academic Publishing, 2014. – 72 с.
  111. Tuncay Ercan. Wireless Networks for Corporations. – М.: LAP Lambert Academic Publishing, 2010. – 120 с.
  112. Piotr Szczechowiak. Security in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2011. – 248 с.
  113. Rakesh Jha. Security Issues In AD-HOC And Infrastructure (WLAN) Networks. – М.: LAP Lambert Academic Publishing, 2011. – 124 с.
  114. Ahmed M. Mahdy. Wireless Networks: A Mobile Broadband Infrastructure. – М.: LAP Lambert Academic Publishing, 2012. – 156 с.
  115. Reena Sharma. Authentication Mechanism for P2P Networks. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  116. Jamil Ibriq. Secure Routing in Wireless Sensor Networks. – М.: Scholars' Press, 2013. – 104 с.
  117. Vinothkumar Jambulingam. Highly consistent and secured data delivery for mobile ad-hoc networks. – М.: LAP Lambert Academic Publishing, 2014. – 76 с.
  118. Yi Ren. Security Mechanisms in Unattended Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2013. – 164 с.
  119. Shriram Sharma. Energy-efficient Secure Routing in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  120. Omid Mahdi Ebadati E.,Harleen Kaur M. Afshar Alam and Kaebeh Yaeghoobi. Micro-Firewalls for Dynamic Network Security Framework. – М.: LAP Lambert Academic Publishing, 2012. – 292 с.
  121. Pallavi Kaliyar and Gagan Singla. A secure routing protocol for MANETs against byzantine attacks. – М.: LAP Lambert Academic Publishing, 2013. – 84 с.
  122. Soke Onyemelukwe. On-Demand Routing and Security in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2013. – 128 с.
  123. Usman Habib. Secure Mobile Authentication for Linux Workstation log on. – М.: LAP Lambert Academic Publishing, 2011. – 120 с.
  124. Mohmed Y. Mohmed Al-sabaawi. Social Network Tools For Corporate Business. – М.: LAP Lambert Academic Publishing, 2013. – 144 с.
  125. Mais Mohammed Hobi and Sarab Majeed Hameed. Biometrics for User Authentication Using Artificial Neural Networks. – М.: LAP Lambert Academic Publishing, 2013. – 108 с.
  126. Kefa Rabah. Mastering Securing ICT Infrastructure for Corporate Network. – М.: LAP Lambert Academic Publishing, 2014. – 360 с.
  127. Shafi'i Muhammad Abdulhamid. Privacy And National Security Challenges in Online Social Networks. – М.: LAP Lambert Academic Publishing, 2013. – 64 с.
  128. RAMARAJ RAVI. AN OPTIMUM RESTORATION ALGORITHM FOR VIRTUAL PRIVATE NETWORKS. – М.: LAP Lambert Academic Publishing, 2011. – 60 с.
  129. Dalibor Dobrilovic. Modeling virtual network laboratory based on virtualization technology. – М.: LAP Lambert Academic Publishing, 2012. – 236 с.
  130. Charles Ndekarisho Tarimo. ICT Security Readiness Checklist for Developing Countries. – М.: LAP Lambert Academic Publishing, 2010. – 280 с.
  131. Tanveer Zia. A Security Framework for Wireless Sensor Networks (WSN). – М.: LAP Lambert Academic Publishing, 2013. – 160 с.
  132. Debashis Sarker. Investment in ICT Sector for Development. – М.: LAP Lambert Academic Publishing, 2014. – 52 с.
  133. Komunte Mary and Prof Venansius Baryamureeba. Web Security. – М.: LAP Lambert Academic Publishing, 2010. – 140 с.
  134. Sathish Kumar. Intrusion Detection and Response Techniques for Mobile Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 200 с.
  135. Ali ElRifaie. A Novel Cos-Sin based Protection for EHV Networks. – М.: LAP Lambert Academic Publishing, 2013. – 160 с.
  136. Sri Nivas Madishetti and Ganka Daniel Nyamsogoro. Accounting for Corporate Securities. – М.: LAP Lambert Academic Publishing, 2012. – 376 с.
  137. Magdi Shaker. The Effect of Securities regulation and Corporate Tax. – М.: LAP Lambert Academic Publishing, 2011. – 68 с.
  138. Chris Cubbage. Security Risk Management in Corporate Governance. – М.: LAP Lambert Academic Publishing, 2010. – 140 с.
  139. Chittaranjan Hota. Quality of Service in IPVPNs. – М.: LAP Lambert Academic Publishing, 2011. – 204 с.
  140. Kota Venkata Ramanaiah. VLSI Architectures for Neural Network Based Image Compression. – М.: , 2015. – 124 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Наука человековедения. интервью с Д. Уолтоном, профессором London Metropolitan University, экспертом CIPD. Chartered Institute of Personnel and Development, автором программы Master of Arts in Human Resource Strategies. И. Смирнова, "Кадровый менеджмент", № 5, июль-август 2007.
  2. Сила легенды. интервью с Э. Кларк, президентом консалтинговой компании Corporate Storytelling. В. Правоторов, "Кадровый менеджмент", № 9, декабрь-январь 2006-2007.
  3. Некоторые практические вопросы осуществления операций по форфетированию. интервью с Д.В. Курышевым, директором по форфейтингу в России и странах СНГ банка Sumitomo Mitsui Banking Corporation. SMBC Europe. Н.А. Ранних, "Международные банковские операции", № 4, июль-август 2006.
  4. Кайдзен непрерывен и бесконечен.... интервью с Т. Хорикири, президентом компании Toyota Engineering Corporation и института управления Toyota. Г. Сергеева, "Управление персоналом", N 14, июль 2012 г.
  5. Регулирование операций торгового финансирования: новые инициативы. интервью с Д. Шмандом, вице-председателем Банковской комиссии ICC по supply chain finance, главой подразделения Trade Finance and Cash Management Corporates EMEA в Global Transaction Banking. GTB division Deutsche Bank. Н. Макарова, "Международные банковские операции", N 2, апрель-июнь 2012 г.
  6. Мы можем управлять собственными мыслями. интервью с С. Харитоновым, врачом-психотерапевтом, психиатором, кандидатом медицинских наук, старшим научным сотрудником Московского НИИ психиатрии Росздрава РФ, членом-корреспондентом Международной академии наук. МАНЭБ, членом Британского общества когнитивных и поведенческих психотерапевтов. Membership British Association for Behavioural & Cognitive Psychoterapies / BABCP. Ф. Кульпин, "Управление персоналом", N 8, апрель 2011 г.
  7. Зачетная реструктуризация долга: институт DEBT-FOR-EQUITY SWAP в России". интервью с М. Григорьевым, старшим юристом корпоративной практики юридической фирмы "Вегас-Лекс". О. Бодрягина, "эж-ЮРИСТ", № 3, январь 2010.
  8. Основной арсенал "охотника" - его network: кого он знает на рынке и качество этих отношений. С. Плетнева, "Управление персоналом", № 12, июнь 2009.
  9. Управление проектами при подборе персонала. PM for HR. Е. Кривов, "Кадровик. Рекрутинг для кадровика", № 9, сентябрь 2008.

Образцы работ

Тема и предметТип и объем работы
Особенности виртуального общения
Психология
Курсовая работа
28 стр.
Word
Информатика
Реферат
7 стр.
Последствия операции НАТО
Политология
Диплом
80 стр.
Слияния и поглощения Мировая и Российская практика
Мировая экономика
Диплом
99 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Юля
Хочу сказать вам еще раз спасибо за помощь!И пожелать всего самого хорошего вашей семье.