Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Ken Dunham. Mobile Malware Attacks and Defense. – М.: , 2010. – 440 с. Kefa Rabah. Mastering Securing ICT Infrastructure for Corporate Network. – М.: LAP Lambert Academic Publishing, 2014. – 360 с. Дополнительные результаты Critical Infrastructure Protection: Advances in Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 371 с. Martin Perry. Controversies in Local Economic Development: Stories, strategies, solutions (Regions and Cities). – М.: , 2012. – 272 с. Security and Privacy in Mobile Information and Communication Systems: Third International ICST Conference, MOBISEC 2011, Aalborg, Denmark, May 17-19, ... and Telecommunications Engineering). – М.: , 2012. – 195 с. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с. Mobile Lightweight Wireless Systems: Third International ICST Conference, MOBILIGHT 2011, Bilbao, Spain, May 9-10, 2011, Revised Selected Papers ... and Telecommunications Engineering). – М.: , 2012. – 369 с. Smart Card Research and Advanced Applications: 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, ... Computer Science / Security and Cryptology). – М.: , 2012. – 357 с. Ad Hoc Networks: Third International ICST Conference, ADHOCNETS 2011, Paris, France, September 21-23, 2011, Revised Selected Papers (Lecture Notes of ... and Telecommunications Engineering). – М.: , 2012. – 247 с. Su Blakeley. How to Win With Mobile Marketing: Are You Showing Up on 5 Billion Phones? (Volume 1). – М.: , 2012. – 120 с. Alan R. Ackerman. Investing Under Fire: Winning Strategies from the Masters for Bulls, Bears, and the Bewildered. – М.: , 0. – 0 с. Kim M. Bayne, Kim M. Bayne. Marketing Without Wires: Targeting Promotions and Advertising to Mobile Device Users. – М.: , 0. – 0 с. Ron Schneiderman. The Mobile Technology Question and Answer Book: A Survival Guide for Business Managers. – М.: , 0. – 0 с. Information Warfare : corporate attack and defence in a digital world (Computer Weekly Professional (Paperback)). – М.: , 0. – 0 с. Manuel Alcantara Saez, Georges A. Fauriol, Manuel Alcantara Saez. South American Legislatures : Thinking About Economic Integration and Defense Policy (Csis Report). – М.: , 0. – 0 с. Robert F., Jr Dundervill, Peter F. Gerity, Anthony K. Hyder, Lawrence H. Luessen, North Atlantic Treaty Organization Scientific Affairs Division, NATO Advanced Study Institute on Defense Conversion Strategies. Defense Conversion Strategies (NATO Asi Series. Partnership Sub-Series 1, Disarmament Technologies, Vol 9). – М.: , 0. – 0 с. Eric Dezenhall. Nail 'Em!: Confronting High-Profile Attacks on Celebrities & Businesses. – М.: , 0. – 0 с. Mats Lindgren, Jorgen Jedbratt, Erika Svensson. Beyond Mobile: People, Communications and Marketing in a Mobilized World. – М.: , 0. – 0 с. Jose Nazario, Nazario. Defense and Detection Strategies against Internet Worms. – М.: , 0. – 0 с. Nansi Shi. Wireless Communications and Mobile Commerce. – М.: , 0. – 0 с. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с. Geoffrey Elliott. Mobile Commerce and Wireless Computing Systems. – М.: , 2003. – 0 с. Advances in Security and Payment Methods for Mobile Commerce. – М.: , 2004. – 0 с. Grant McCracken. Culture And Consumption II: Markets, Meaning, And Brand Management. – М.: , 2005. – 226 с. Ibp Usa. Thailand Army, National Security And Defense Policy Handbook. – М.: , 2008. – 300 с. Ibp Usa. Turkey Army, National Security And Defense Policy Handbook (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с. Ibp Usa. Ukraine Army, National Security And Defense Policy Handbook (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с. Ibp Usa. CZECH REPUBLIC ARMY, NATIONAL SECURITY AND DEFENSE POLICY HANDBOOK (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с. Ibp Usa. ESTONIA ARMY, NATIONAL SECURITY AND DEFENSE POLICY HANDBOOK (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с. Ibp Usa. Finland Army, National Security And Defense Policy Handbook (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с. Ibp Usa. Germany Army, National Security And Defense Policy Handbook (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с. Ibp Usa. China Army, National Security and Defense Policy Handbook. – М.: , 2008. – 300 с. Ibp Usa. Cuba Army, National Security And Defense Policy Handbook (World Business, Investment and Government Library) (World Business, Investment and Government Library). – М.: , 2008. – 300 с. Ibp Usa. Myanmar Army, National Security And Defense Policy Handbook. – М.: , 2008. – 300 с. Ibp Usa. Philippines Army National Security and Defense Policy Handbook. – М.: , 2008. – 300 с. Ibp Usa. Germany Army, National Security and Defense Policy Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Ibp Usa. Australia Army, National Security and Defense Policy Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Ibp Usa. Bangladesh Army, National Security and Defense Policy Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Ibp Usa. Czech Republic Army, National Security and Defense Policy Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Ibp Usa. Finland Army, National Security and Defense Policy Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Ibp Usa. France Army, National Security and Defense Policy Handbook (World Business Information Catalog). – М.: , 2008. – 300 с. Ibp Usa. Estonia Army, National Security and Defense Policy Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Ibp Usa. Canada Aerospace and Defense Business Opportunities Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с. Mobile Service Innovation and Business Models. – М.: , 2008. – 327 с. The Corporate Guide to Expatriate Employment: An Employer's Guide to Deploying and Managing Internationally Mobile Staff. – М.: , 2009. – 288 с. Broadband Satellite Communication Systems and the Challenges of Mobility : IFIP TC6 Workshops on Broadband Satellite Communication Systems and Challenges ... Federation for Information Processing). – М.: , 2005. – 247 с. Map-based Mobile Services: Design, Interaction and Usability (Lecture Notes in Geoinformation and Cartography). – М.: , 2008. – 352 с. Dale Walters. Plant Defense. – М.: , 2010. – 272 с. Paul Baccas. OS X Exploits and Defense. – М.: , 2010. – 352 с. R.D. Norton. Regional Resilence and Defense-Conversion in the United States. – М.: , 2010. – 0 с. Ken Dunham. Mobile Malware Attacks and Defense. – М.: , 2010. – 440 с. Justin Clarke. SQL Injection Attacks and Defense. – М.: , 2010. – 496 с. Jeffrey K. Adorno. Guilt and Defense – On the Legacies of National Socialism in Postwar Germany. – М.: , 2010. – 264 с. Hacking Exposed Windows: Microsoft Windows Security Secrets And Solutions, Third Edition. – М.: , 2011. – 451 с. Hacking Exposed Web 2.0: Web 2.0 Security Secrets And Solutions. – М.: , 2011. – 258 с. The Mobile Learning Edge: Tools And Technologies For Developing Your Teams. – М.: , 2011. – 288 с. Hacking Exposed Cisco Networks. – М.: , 2011. – 400 с. О.Новачек. О. Новачек. Вечное движение. Для скрипки и фортепьяно / O. Novacek: Perpetuum Mobile for Violin and Piano. – СпБ.: Композитор - Санкт-Петербург, 1995. – 16 с. Malware, Rootkits and Botnets: A Beginner's Guide. – М.: McGraw-Hill, 2012. – 382 с. HTML, CSS, and JavaScript Mobile Development For Dummies. – М.: , 2013. – 432 с. Subi Khan and R.P. Mahapatra. SQL Injection Attack and Countermeasures. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Sanjay Kumar Pal and Samar Sen Sarma. Allurement of Some Graph Algorithms. – М.: LAP Lambert Academic Publishing, 2012. – 112 с. Samundiswary Punniakodi and Dananjayan Perumal. Trust Based Routing Protocols for Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2015. – 120 с. Jayant Gajanan Joshi and Shyam Sundar Pattnaik. Metamaterial Loaded Antennas for Wireless Communication. – М.: LAP Lambert Academic Publishing, 2014. – 284 с. Adel Zein El Dein. Interaction between the Human Body and the Mobile Phone. – М.: LAP Lambert Academic Publishing, 2010. – 208 с. Vigneswaran Ramu and Muralindran Mariappan. Navigation and Instrumentation System for Telediagnostic Mobile Robot. – М.: LAP Lambert Academic Publishing, 2012. – 188 с. Vidhya Janakiraman and Dananjayan Perumal. Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 156 с. Sagar Raj Mahat and Rajendra Dhakal. Performance Analysis of DF Relay with Keyhole and Correlation Effects. – М.: LAP Lambert Academic Publishing, 2012. – 64 с. Shalini Pochineni and Prabin Kumar Panda. Synchronization techniques for 3GPP-LTE. – М.: LAP Lambert Academic Publishing, 2012. – 52 с. Luca Giancane. Side-Channel Attacks and Countermeasures. – М.: LAP Lambert Academic Publishing, 2012. – 172 с. Umair Mughal and Muhammad Iqbal. Break-Even Analysis of Sky Sail for Pakistan Maritime. – М.: LAP Lambert Academic Publishing, 2010. – 84 с. Sunetra Sarkar and Kartik Venkatraman. Unsteady Aerodynamics Of A Flapping Airfoil. – М.: LAP Lambert Academic Publishing, 2010. – 204 с. Umair Mughal,Muhammad Sadiq Sarfaraz and Syed Muhammad Sarim. Comparative CFD Study on Different Under Water Vehicles for Best L/D. – М.: LAP Lambert Academic Publishing, 2010. – 88 с. Sourav Das and Smita Biswas. Consequences of Cyclone Sidr on Socio-economic life. – М.: LAP Lambert Academic Publishing, 2011. – 96 с. Farukh Bashir. US Attack on Afghanistan and Public Response in Pakistan. – М.: LAP Lambert Academic Publishing, 2012. – 84 с. Mohsen A. M. El-Bendary and Mostafa El-Tokhy. Art of Error Recovery Techniques over Wireless Networks. – М.: LAP Lambert Academic Publishing, 2012. – 88 с. Muhammad Yaqoub and Mudassar Hussain Shah. Media and Public Agenda on the National Issues in Pakistan. – М.: LAP Lambert Academic Publishing, 2014. – 160 с. Isaac M. Mutunga. Mobile Phones and Rural Livelihoods in Kenya. – М.: Scholars' Press, 2014. – 388 с. Sanjay K. Teraiya and B. B. Radadia. Biochemical Studies in relation to the Gonadal cycle of Fishes. – М.: LAP Lambert Academic Publishing, 2013. – 64 с. Kavintheran Thambiratnam and Harith Ahmad. Q-Switching and Mode-Locking by Zirconia-Erbium Doped Fibres. – М.: Scholars' Press, 2014. – 192 с. Masthan K. M. K.,Aravindha Babu N. and Tathagata Bhattacharjee. Virus as a bio-weapon. – М.: LAP Lambert Academic Publishing, 2012. – 72 с. Ernesto Rodriguez Leal and Jian S Dai. Evolutionary Design of Parallel Mechanisms. – М.: LAP Lambert Academic Publishing, 2010. – 260 с. K. Baranidharan and M. Vijayabhama. Coastal Ecology and Defense. – М.: LAP Lambert Academic Publishing, 2014. – 80 с. M. Abid Hussain and Wasim Ahmad. Management of Helicoverpa armigera by Entomopathogenic Nematodes. – М.: LAP Lambert Academic Publishing, 2011. – 168 с. Subhash Chander Meena,H. S. Purohit and A. K. Mathur. Phosphorus mobilization under alfisols and inceptisols. – М.: LAP Lambert Academic Publishing, 2011. – 156 с. Sajjad Anwar,Muhammad Siddique Khanzada and Shagufta Rani Khanzada. Effect Of Sowing Dates On Maize Stem Borer And Aphid Infestation. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Saima Ibrahim and Faiza Naz. Effect of Sulphur on Plant growth and defense system. – М.: LAP Lambert Academic Publishing, 2014. – 80 с. Alec Sithole,Cyril Murewi and Fidelis Manyanga. A Beginner’s Guide to Undergraduate Science Research. – М.: LAP Lambert Academic Publishing, 2014. – 96 с. Yakubu Azeh and Gabriel Ademola Olatunji. Acetylation Of Wood Cellulose Using Ketene. – М.: LAP Lambert Academic Publishing, 2013. – 120 с. Emad Yousif,Hajer Saad Najem and Shahbaz Maki. Preparation and characterization of new HPLC stationary phase. – М.: LAP Lambert Academic Publishing, 2012. – 52 с. Kamal Rawal and Ram Ramaswamy. Identification and Characterization of Complex Biological Signals. – М.: LAP Lambert Academic Publishing, 2011. – 156 с. Sangeeta Parikh and Vaishali Mehta. S.O.D.H. [Study of Obesity, Diabetes, Hypertension]. – М.: LAP Lambert Academic Publishing, 2013. – 60 с. Nadeem Ahmad and Riffat Asim Pasha. Temperature Sensitivity of Anti Armour Projectile. – М.: LAP Lambert Academic Publishing, 2011. – 64 с. Julian Di Ridolfo. NATO and the European Security and Defense Policy. – М.: LAP Lambert Academic Publishing, 2013. – 60 с. Wamalwa Nyukuri H. Mobile Phones Usage and Productivity:. – М.: LAP Lambert Academic Publishing, 2012. – 92 с. Nadir Gergin. The Ballots and Bullets. – М.: LAP Lambert Academic Publishing, 2012. – 248 с. Ayyaswamy Kathirvel,Srinivasan Rengaramanujam and Mohanambal Kathirvel. Prevention of attacks usign umpiring security model for manets. – М.: LAP Lambert Academic Publishing, 2012. – 192 с. Vijay Godse and Ladda P. L. Naikwade N. S. Hypolipidemic Activity of Diclofenac with Pioglitazone and Bezafibrate. – М.: LAP Lambert Academic Publishing, 2011. – 64 с. Abhishek Parolia,Kundabala M. and ShashiRashmi Acharya. Methods of Caries Detection. – М.: LAP Lambert Academic Publishing, 2012. – 172 с. Deusdedit Peter Mlay,Jerome Peter Mrema and Johnson J.T. Msaky. Effects of Intercropping Cassava with Some Legumes. – М.: LAP Lambert Academic Publishing, 2012. – 260 с. Jose Noronha Rodrigues. European Union Policy on Security and Defense. – М.: LAP Lambert Academic Publishing, 2013. – 92 с. Venkateswar Rao Vutukuri and T. Jayasree M. D. Comparative Studies Of NSAIDs In Albino Mice By Plethysmograph. – М.: LAP Lambert Academic Publishing, 2013. – 92 с. Khalid Ahmed Hassan. Receptivity and Defensiveness in Communicative Language Learning. – М.: LAP Lambert Academic Publishing, 2009. – 192 с. Elona Mehmeti. Students and Staff Mobility in Albanian Universities. – М.: LAP Lambert Academic Publishing, 2010. – 80 с. Vasilica Negrut and Mirela Arsith. Designing and Implementing Competency-Based Curriculum. – М.: LAP Lambert Academic Publishing, 2013. – 164 с. Shafqat Ali Shad and Enhong Chen. Mobile User Trajectory and Profile Mining. – М.: LAP Lambert Academic Publishing, 2013. – 104 с. Chithra R. and Sarat Kumar Patra. Use of RNS based Pseudo Noise Sequence. – М.: LAP Lambert Academic Publishing, 2012. – 96 с. Lane Thames. Advancing Cyber Security. – М.: LAP Lambert Academic Publishing, 2013. – 256 с. Nitin K. Mishra and Sumit Dhariwal. Security in Mobile Ad-Hoc Networks. – М.: LAP Lambert Academic Publishing, 2014. – 72 с. Madhav P. Namdev. Phishing Attacks and Detection. – М.: LAP Lambert Academic Publishing, 2015. – 68 с. Srikanthreddy Arimanda and Manojkumar Kolli. Performance Study Of Security Mechanismsm For Mobile Agent Domain. – М.: LAP Lambert Academic Publishing, 2011. – 84 с. Inadyuti Dutt and Soumya Paul. Some Research on Optical Fibre Security. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Prashant Kumar Singh and Avimanyou Kumar Vatsa. Taxonomy Based Intrusion Attacks and Detection Scheme in P2P Network. – М.: LAP Lambert Academic Publishing, 2012. – 56 с. E.O. Ibidunmoye and B.K. Alese. Game-Theoretic Analysis of Network Attack-Defense Interactions. – М.: LAP Lambert Academic Publishing, 2013. – 108 с. Kazi Atiqur Rahman. Cross-Layer Treatment of Mobility for MANETs and DSRC/WAVE Systems. – М.: LAP Lambert Academic Publishing, 2014. – 100 с. Raj Shree and Ravi Prakash Pandey. Security Advancement in ZRP based Wireless Networks. – М.: LAP Lambert Academic Publishing, 2014. – 92 с. Imran Sohail and Sikandar Hayat. Network Security and DDoS. – М.: LAP Lambert Academic Publishing, 2010. – 64 с. Javad Akbari Torkestani. Graph Theroy and Its Application to Wireless Mobile Ad-Hoc Networking. – М.: LAP Lambert Academic Publishing, 2010. – 256 с. Natarajan Meghanathan,DeShante C. Johnson and Alexander R. Geoghegan. An Analysis of Software Security Attacks and Mitigation Controls. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Britto R. Kumar and Albert S. Rabara. An Architecture for Secure Mobile Payment System using PKI. – М.: LAP Lambert Academic Publishing, 2013. – 184 с. Jayeeta Majumder and Gargi Saha. SQL Injection Attacks and possible Remedies. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Ahmedin Mohammed Ahmed and Zhu Weihua. Mobile Location Based Services (MLBS). – М.: LAP Lambert Academic Publishing, 2012. – 92 с. Mais Mohammed Hobi and Sarab Majeed Hameed. Biometrics for User Authentication Using Artificial Neural Networks. – М.: LAP Lambert Academic Publishing, 2013. – 108 с. Mitko Bogdanoski,Aleksandar Risteski and Marjan Bogdanoski. Cyber operations - a permanent part of the global conflict. – М.: LAP Lambert Academic Publishing, 2014. – 60 с. Kefa Rabah. Mastering Securing ICT Infrastructure for Corporate Network. – М.: LAP Lambert Academic Publishing, 2014. – 360 с. Stephen Schiavone,Lalit Garg and Kelly Summers. Information Security in Enterprises - an Ontological Perspective. – М.: LAP Lambert Academic Publishing, 2014. – 232 с. Rajib Biswas and Rambabu Garlapati. eHealth Interoperability in Sweden. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Edmond K. Machie. Network Attack Traceback And React. – М.: LAP Lambert Academic Publishing, 2013. – 208 с. frankie tvrz and marijke coetzee. Information Security of a Bluetooth-enabled handheld device. – М.: LAP Lambert Academic Publishing, 2010. – 180 с. Sathish Kumar. Intrusion Detection and Response Techniques for Mobile Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 200 с. B. B. Gupta. An Introduction to DDoS Attacks and Defense Mechanisms. – М.: LAP Lambert Academic Publishing, 2011. – 232 с. Nabaz Khayyat. Adoption of Mobile Telecommunication and its User Satisfaction. – М.: LAP Lambert Academic Publishing, 2012. – 168 с. Rati Mekvabishvili. Self-fulfilling Speculative Attacks and Informational Structure. – М.: LAP Lambert Academic Publishing, 2011. – 60 с. David Nzioka and Prof. Puneetha Palakurthi. Impact of Mobile Banking on Microfinance Institutions. – М.: LAP Lambert Academic Publishing, 2011. – 72 с. Soundar Rajan Chandara Sekaran and Hariharan Ravi. Stock Return Behaviour and Seasonal Anomalies in the Indian Market. – М.: Scholars' Press, 2014. – 184 с. Yuyao Hsiao and Fukwun Wang. Forecasting Analysis for Global Copper Clad Laminate Market. – М.: LAP Lambert Academic Publishing, 2011. – 52 с. Jayaraman Munusamy,Cheam Tat Lim and Shankar Chelliah. THE DETERMINANTS OF CONSUMER BUYING BEHAVIOUR IN MOBILE PHONE INDUSTRY. – М.: LAP Lambert Academic Publishing, 2010. – 64 с. Praveena S. and S. D. Sivakumar. N. Venkatesa Palanichamy. Service Quality Analysis In Cellular Industry In Coimbatore City. – М.: LAP Lambert Academic Publishing, 2013. – 96 с. Luigi Sallustio. Fighting for profit and control in the mobile phone industry. – М.: LAP Lambert Academic Publishing, 2011. – 172 с. Ilker Kecetep. Student Mobility in Turkey and Comparative Analysis with Germany. – М.: LAP Lambert Academic Publishing, 2013. – 68 с. Felix Kutsanedzie and Bernard Okpattah. I Must Succeed. – М.: LAP Lambert Academic Publishing, 2011. – 68 с. Michael Hale Ligh, Andrew Case, Jamie Levy, AAron Walters. The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory. – М.: Wiley, . – 912 с. Лучшие результаты Ничего не найдено Дополнительные результаты Наука человековедения. интервью с Д. Уолтоном, профессором London Metropolitan University, экспертом CIPD. Chartered Institute of Personnel and Development, автором программы Master of Arts in Human Resource Strategies. И. Смирнова, "Кадровый менеджмент", № 5, июль-август 2007. Нюансы управления офисным perpetuum mobile. В. Богданов, "Консультант", № 11, июнь 2007. Специализированный модуль FS-CD. Collections and Disbursements - "Сборы и Выплаты" и его возможности. О.А. Глущенко, "Финансовый менеджмент в страховой компании", № 2, II квартал 2007. Бюджетирование страховой компании на базе Oracle Enterprise Planning and Budgeting. Д.В. Лесоводский, "Финансовый менеджмент в страховой компании", № 3, III квартал 2006. Mobile Клиент - простота и эффективность сегодняшнего дня. С. Мастеренко, "Банковское дело в Москве", № 4, апрель 2006. Регулирование операций торгового финансирования: новые инициативы. интервью с Д. Шмандом, вице-председателем Банковской комиссии ICC по supply chain finance, главой подразделения Trade Finance and Cash Management Corporates EMEA в Global Transaction Banking. GTB division Deutsche Bank. Н. Макарова, "Международные банковские операции", N 2, апрель-июнь 2012 г. Ужин в темноте в стиле Малевича и Новый год в Хаммере". Что может выть лучше?". интервью с Н. Саниной, индивидуальным предпринимателем и креативным директором компании "San and stars". М. Сипатова, "Арсенал предпринимателя", N 12, декабрь 2011 г. На пути к новому стандарту в торговом финансировании. интервью с А. Кастерманом, руководителем Trade and Supply Chain, SWIFT, сопредседателем рабочей группы ICC-BPO. Э. Шакирова, "Международные банковские операции", N 4, октябрь-декабрь 2011 г. Иностранные работники - perpetuum mobile российского законодательства. А. А. Курушин, "В курсе правового дела", N 4, февраль 2011 г. Уильям Савадж: Мотивировать людей в Нижнем Новгороде и Новосибирске нужно по-разному". интервью с У. Саваджем, вице-президентом корпорации Intel, подразделение Software and Services Group. М. Холкина, "Управление персоналом", N 14, июль 2010 г. Цены под контролем: the present and the future. С. Стройкова, И. Леметюйнен, "Консультант", № 19, сентябрь 2009. Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Юлия (Ростов-на-Дону) Ирина добрый день! Ездила сегодня к преподу забирала диплом после вашего сопровождения. Все супер ей все понравилось, ничего исправлять или сокращать не надо, написала мне уже отличный отзыв. Спасибо вам большое!