Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Huang-Chun Roan. Network Intrusion Detection Based on Shift-OR Circuit. – М.: LAP Lambert Academic Publishing, 2011. – 60 с.

Дополнительные результаты

  1. Catherine Hardwicke. Twilight: Director's Notebook: The Story of How We Made the Movie Based on the Novel by Stephenie Meyer. – М.: Little, Brown Young Readers, 2009. – 176 с.
  2. Jackson Toby. The Lowering of Higher Education in America: Why Student Loans Should Be Based on Credit Worthiness. – М.: , 2012. – 228 с.
  3. Jist Publishing. Standard Occupational Classification Manual 2002: Based on Information from the U.S. Office of Management and Budget. – М.: , 0. – 0 с.
  4. Diane M. Browder, Levan Lim. Improving Work Efficiency: Job Training Based on Engineering Principles (Innovations). – М.: , 0. – 0 с.
  5. Anthony B. L. Cheung, Ian Scott. Governance and Public Sector Reform in Asia: Paradigm Shift or Business as Usual?. – М.: , 0. – 0 с.
  6. Martin Loney. The Pursuit of Division: Race, Gender, and Preferential Hiring in Canada. – М.: McGill-Queens University Press, 1998. – 396 с.
  7. Michael Harris. Stock Trading Techniques: Based on Price Patterns. – М.: Traders Press, 2000. – 246 с.
  8. Herbert N. Casson, Forbes P B C. Forbes Publishing Company. Tips on Leadership or The Life Stories of Twenty Five Leaders. – М.: , 0. – 0 с.
  9. Raymond L. Wenderlich. The ABCs of Successful Leadership: Proven, Practical Attitudes, Behaviors & Concepts Based on Core Values That Result in Successful Leadership. – М.: , 0. – 0 с.
  10. Amjad Hadjikhani. Non-Business Actors in a Business Network : A Comparative Case on Firms' actions in Developing and Developed Countries (International Business and Management). – М.: , 2005. – 0 с.
  11. Donald C. Fisher. Homeland Security Assessment Manual: A Comprehensive Organizational Assessment Based On Baldridge Criteria. – М.: , 2004. – 0 с.
  12. Daniel, M.D. Farb. Laugh and Learn Pharmaceutical Sales Code Manual and CD: Pharmaceutical and Medical Device Ethics and Compliance Training Based on the PHRMA Sales and ... Code for Sales Representatives and Marketers. – М.: , 2003. – 0 с.
  13. Lora Arduser, Douglas Robert Brown. HACCP & Sanitation in Restaurants and Food Service Operations: A Practical Guide Based on the USDA Food Code With Companion CD-ROM. – М.: Atlantic Publishing Company, 2005. – 552 с.
  14. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с.
  15. Based on the Occupational Outlook Handbo. Top 300 Careers: Your Complete Guideboook to Major Jobs in Every Field (America's Top 300 Jobs). – М.: , 2006. – 766 с.
  16. Susan G. Fowler. Information Entrepreneurship: Information Services Based on the Information Lifecycle. – М.: , 2004. – 116 с.
  17. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с.
  18. Stephen A. Ruffa. Going Lean: How the Best Companies Apply Lean Manufacturing Principles to Shatter Uncertainty, Drive Innovation, and Maximize Profits. – М.: , 2008. – 288 с.
  19. Marta Luc??a Zuluaga Cardona. Does System Dynamics Facilitate Learning in Resource Management?: A Study Based on a Laboratory Experiment. – М.: , 2008. – 112 с.
  20. Based on Dave Ellis' Becoming a Master Student. From Master Student to Master Employee. – М.: , 2010. – 384 с.
  21. T. Martin. Automated Systems Based on Human Skill (Joint Design of Technology and Organisation). – М.: , 2010. – 0 с.
  22. Rory Bray. OSSEC Host-Based Intrusion Detection Guide. – М.: , 2010. – 416 с.
  23. Syngress. Snort Intrusion Detection 2.0. – М.: , 2010. – 550 с.
  24. Brian Caswell. Snort Intrusion Detection and Prevention Toolkit. – М.: , 2010. – 768 с.
  25. C Stumer. Organic Syntheses Based on Name Reactions,22. – М.: , 2010. – 454 с.
  26. A. Hassner. Organic Syntheses Based on Name Reactions, 3rd edition. – М.: , 2010. – 454 с.
  27. Robert Barnard. Intrusion Detection Systems. – М.: , 2010. – 480 с.
  28. H Greilich. Vehicles – A Program Based on the book – Macintosh Version Diskette. – М.: , 1988. – 0 с.
  29. Fay Sudweeks. Network & Netplay – Virtual Groups on the Internet. – М.: , 1998. – 330 с.
  30. Charlton Hinman. The Norton Facsimile the First Folio of Shakespeare – Based on Folios in the Folder Shakespeare Library Collection 2e. – М.: , 1996. – 968 с.
  31. Terry Escamilla. Intrusion Detection. – М.: , 1998. – 368 с.
  32. David Vine. Island of Shame – The Secret History of the U.S. Military Base on Diego Garcia. – М.: , 2009. – 280 с.
  33. Granino A. Korn. Neural Networks & Fuzzy–Logic Control on Personal Computers & Workstations + D3. – М.: , 1995. – 304 с.
  34. HP KIMMICH. Kimmich Implantable ?telemetry? Systems Based On Integrated Circuits (pr Only). – М.: , 1980. – 86 с.
  35. Stephen Greenblatt. The Norton Shakespeare Based on the Oxford Edition (ISE) (Paper). – М.: , 1997. – 3440 с.
  36. Stephen Greenblatt. The Norton Shakespeare Based on the Oxford Edition. – М.: , 1997. – 3440 с.
  37. Harold Edgerton. Exploring the Art & Science of Stopping Time – (CD–ROM) Based on the Life & Work of Harold E Edgerton. – М.: , 2000. – 0 с.
  38. Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky. Cisco Security Professional's Guide to Secure Intrusion Detection Systems. – М.: , . –  с.
  39. Zainab Khalid Awan,Aamir Khan and Anam Iftikhar. Hybrid Neural Networks: From Application Point Of View. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  40. Lija Chacko. Edge Enhancement Based on Wavelet Transform In Indoor Digital Images. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  41. Gulshan Kumar. Effective Intrusion Detection using Genetic Algorithms. – М.: LAP Lambert Academic Publishing, 2014. – 100 с.
  42. Jinlong Guo and Xiaoqiang Dai. Researches on Reliability of Hull Life Based on Zero-Failure Data. – М.: LAP Lambert Academic Publishing, 2012. – 180 с.
  43. Hina B. Chandwani and Meeta K. Matnani. AC Link Inverter Based On Multiple Carrier PWM For Fuel Cell. – М.: LAP Lambert Academic Publishing, 2012. – 100 с.
  44. Minakshi Vivek Gupta and Ketki Deshmukh. 3 Factor Security Based on RFID, GSM and Face Recognition. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  45. Hadi T. Ziboon and Wasan S. Rasheed. Adaptive Channel for Mobile Communication Based on SDR. – М.: LAP Lambert Academic Publishing, 2014. – 172 с.
  46. Shima Ramesh. An uncompressed image encryption Algorithm based on DNA sequnces. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  47. Qiushu Zhang. POLYMER LIGHT EMITTING DIODES BASED ON POLYFLUORENES. – М.: LAP Lambert Academic Publishing, 2010. – 164 с.
  48. Muhammad Farooq and Wang Dao Bo. A geometrical visual servoing approach based on statistical modeling. – М.: LAP Lambert Academic Publishing, 2010. – 168 с.
  49. Salih Salih. Proposed Models for MC-CDMA Based on FFT and WT. – М.: LAP Lambert Academic Publishing, 2010. – 176 с.
  50. Husam Shaheen. Voltage Control Based on Fuzzy Adaptive Particle Swarm Optimization. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  51. Vishwanatha K. Advanced Motion Detection Algorithm for Patient Monitoring. – М.: LAP Lambert Academic Publishing, 2012. – 124 с.
  52. Martina Eckert. Advanced Motion Compensation for Video Coding Based on Delaunay Meshes. – М.: LAP Lambert Academic Publishing, 2012. – 236 с.
  53. Amro Qandour,Daryoush Habibi and Iftekhar Ahmad. Application Framework for Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 128 с.
  54. Hoi-Shun Lui. Radar Target Recognition based on Transient Electromagnetic Scattering. – М.: LAP Lambert Academic Publishing, 2009. – 260 с.
  55. Ashish Jadhav,Mahesh Kumbhar and Mahesh Walunjkar. Cell Phone Controlled Applications and Systems based on DTMF signaling. – М.: LAP Lambert Academic Publishing, 2013. – 240 с.
  56. Ivo Maljevic and Elvino S. Sousa. Analysis of Analog Despreading CDMA Receiver Based on 5-Port Device. – М.: LAP Lambert Academic Publishing, 2009. – 176 с.
  57. Jordi Verdu,Pedro de Paco and Oscar Menendez. Microwave/RF Filters based on Bulk Acoustic Wave Resonators. – М.: LAP Lambert Academic Publishing, 2011. – 196 с.
  58. Md. Yeasin Arafath,Debabrata Mazumder and Rakib Hassan. Automatic Meter Reading by Radio Frequency (RF) Technology. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  59. Antonio Mollfulleda. Ultra-Wideband Communications Based on Impulse Radio. – М.: LAP Lambert Academic Publishing, 2013. – 164 с.
  60. Jelte Peter Vink. Performance Analysis of SoC Architectures based on Network Calculi. – М.: LAP Lambert Academic Publishing, 2010. – 164 с.
  61. Jose Luis Carmona Maqueda. Speech Recognition Based on VoIP Coding. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.
  62. Huang-Chun Roan. Network Intrusion Detection Based on Shift-OR Circuit. – М.: LAP Lambert Academic Publishing, 2011. – 60 с.
  63. Pilar Jimenez,Enrique Castillo and Roberto Minguez. Traffic prediction based on plate scanning. – М.: LAP Lambert Academic Publishing, 2011. – 412 с.
  64. Moayed Daneshyari. Bifurcation and Nonlinear Dynamics in Neural Network. – М.: LAP Lambert Academic Publishing, 2010. – 96 с.
  65. Ihsan A. Baqer,Somer M. Nacy and Mauwafak A. Tawfik. Modeling of 3D Grasping of Artificial Hand Under Dynamic Load. – М.: Scholars' Press, 2015. – 228 с.
  66. Manh Tuan Nguyen. Fatigue Analysis of Asphalt Concrete Based on Crack Development. – М.: Scholars' Press, 2014. – 136 с.
  67. Isodiana Crupi. Non volatile memories based on Silicon dots. – М.: LAP Lambert Academic Publishing, 2010. – 124 с.
  68. M. Sadiq Ali Khan and S. M. Aqil Burney. Recent Trends in Intrusion Detection System & Network Monitoring. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  69. Mahmoud Bakr,Mahmoud Rasheedy and Mahmoud Hefni. Theoretical Studies on the Thermoluminescence Phenomenon. – М.: LAP Lambert Academic Publishing, 2012. – 192 с.
  70. Alessio Tierno. Laser Sources and Nonlinear Optics Based on Quantum Dots. – М.: LAP Lambert Academic Publishing, 2012. – 204 с.
  71. Burcu Guneri and Ayse Saide Sarigul. COMPLETE DYNAMIC ANALYSIS OF STEWART PLATFORM BASED ON WORKSPACE. – М.: LAP Lambert Academic Publishing, 2011. – 140 с.
  72. Tomas Lasota. FE model of fibre composite based on large strain Cosserat elasticity. – М.: Scholars' Press, 2014. – 160 с.
  73. Mohammed Abdelmanan. Applications of Remote Sensing in the Forests. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  74. Shifeng Yang,Jimin Zhao and Daudi S Simbeye. Aquaculture Environment Control Based on WSN. – М.: LAP Lambert Academic Publishing, 2015. – 144 с.
  75. Tamer Mashtoly and Steven Alm. Improving the efficacy of Biopesticides based on Bt. – М.: LAP Lambert Academic Publishing, 2012. – 176 с.
  76. Manoj M. and Ravinder Singh Gandhi. Selection of Sahiwal cattle based on growth and first lactation traits. – М.: LAP Lambert Academic Publishing, 2013. – 260 с.
  77. Mr. Awanish and Nuzhat Husain. Detection of Haemophilia A Carriers in North Indian Population. – М.: LAP Lambert Academic Publishing, 2014. – 100 с.
  78. Nedal Tahat. Digital Signature Schemes Based on Multiple Hard Problems. – М.: LAP Lambert Academic Publishing, 2011. – 136 с.
  79. Mohammad Al-Amin. Analysis of Metal-loss Corrosion on Energy Pipelines Based on ILI Data. – М.: LAP Lambert Academic Publishing, 2012. – 200 с.
  80. Abdulrazzaq F. Atto. Enhancing the Stability Performance using UPFC devices based on GA. – М.: LAP Lambert Academic Publishing, 2014. – 128 с.
  81. Silvester Tursiloadi. MESOPOROUS OXIDE MATERIALS BASED ON THE SOL-GEL METHOD. – М.: LAP Lambert Academic Publishing, 2010. – 124 с.
  82. Sabina Birgersson,Steven Birot de la Pommeraye and Fabienne Delfour. Dolphin personality study based on ethology and social network theory. – М.: LAP Lambert Academic Publishing, 2014. – 60 с.
  83. Nithin Babu Kante. An Approach of Face Recognition Based on Hidden Markov Model. – М.: LAP Lambert Academic Publishing, 2013. – 56 с.
  84. Abeer Kassem,Fatma Ismail and Elsayed Aboulmagd. Formulation Of Drug Delivery Systems Based On Gel-forming Polymers. – М.: LAP Lambert Academic Publishing, 2014. – 112 с.
  85. Hlako Choma and Mahodiela Ramafalo. Dismissal based on operational requirements in the workplace. – М.: LAP Lambert Academic Publishing, 2014. – 112 с.
  86. Hamideh Zahmatkesh and Kourosh Akef. "City of Glass"translation,assessing based on House's TQA model. – М.: LAP Lambert Academic Publishing, 2013. – 100 с.
  87. Ratnah Wasding. Developing ESP for Tourism Based on Needs Analysis. – М.: LAP Lambert Academic Publishing, 2014. – 168 с.
  88. Chih-Hao Liu and Jason Jen-Yen Chen. A Group Agent Architecture Based on FIPA and Ontology. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  89. Bouchaib Falah. An Approach to Regression Test Selection Based on Complexity Metrics. – М.: Scholars' Press, 2013. – 136 с.
  90. Abhay Nath Singh. Honeypot Based Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  91. Shahnawaz Husain,S. C. Gupta and R. C. Joshi. Intrusion Detection Engine for Adhoc Environment. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  92. Sumaya Saad Sulaiman and Sarab M. Hameed. A Fuzzy Based Clustering for Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  93. Shubha Puthran and Ketan Shah. Intrusion Detection System using datamining techniques. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  94. Mohammad S. I. Mamun. Intrusion Detection System Architecture in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  95. Heba Fathy Eid. Computational Intelligence in Network Intrusion Detection System. – М.: Scholars' Press, 2014. – 164 с.
  96. Janakiraman S. Distributed Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 164 с.
  97. Layth A. Hassnawi,R. B. Ahmad and Mario Kabbour. Routing In Motorway Surveillance System Based On Ad Hoc Camera Network. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  98. Yogesh Kumar,Krishan Kumar and Gulshan Kumar. Feature Selection For Intrusion Detection Systems. – М.: LAP Lambert Academic Publishing, 2014. – 100 с.
  99. Jamal Raiyn. Development of Resource Allocation Strategies Based on Cognitive Radio. – М.: LAP Lambert Academic Publishing, 2014. – 112 с.
  100. Muhsen Hammoud. LTE-Advanced Simulation Framework Based On OMNeT++. – М.: LAP Lambert Academic Publishing, 2014. – 120 с.
  101. Mrutyunjaya Panda and Manas Ranjan Patra. A Data Mining Approach to Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2015. – 216 с.
  102. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  103. Ivano Malavolta. A tamper resistant Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2011. – 144 с.
  104. Prashant Kumar Singh and Avimanyou Kumar Vatsa. Taxonomy Based Intrusion Attacks and Detection Scheme in P2P Network. – М.: LAP Lambert Academic Publishing, 2012. – 56 с.
  105. Babar Zulfiqar,Anil Ahmed and Rizwan Akhtar. Efficient Surveillance System Based on Cognitive Radio. – М.: LAP Lambert Academic Publishing, 2013. – 80 с.
  106. Shaffali Gupta and Sanmeet Kaur. A GUI Framework for detecting Intrusions using Bro IDS. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  107. Mahmoud Jazzar. Computer Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 240 с.
  108. Siva S. Sivatha Sindhu,S. Geetha and S. Selvakumar. Network Intrusion Detection System using Machine Learning Techniques. – М.: LAP Lambert Academic Publishing, 2013. – 80 с.
  109. Debasis Das and Rajiv Misra. Cellular Automata Based on Block Cipher and Road Traffic Model. – М.: LAP Lambert Academic Publishing, 2013. – 56 с.
  110. Mostafa Arbabi Monfared,Reza Abrishambaf and Sener Uysal. Localization in Wireless Sensor Networks Based on Sugeno Fuzzy Logic. – М.: LAP Lambert Academic Publishing, 2013. – 80 с.
  111. Nasim Beigi-Mohammadi. Smart Meter Networks: Intrusion Detection System by Design. – М.: LAP Lambert Academic Publishing, 2014. – 136 с.
  112. Christian Chetachi Umunna. Distributed Intrusion Detection System in Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 104 с.
  113. Iftikhar Ahmad. Feature Subset Selection in Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 220 с.
  114. Jabarweer Singh,Krishan Kumar and Gulshan Kumar. Intrusion detection using artificial intelligence based ensembles. – М.: LAP Lambert Academic Publishing, 2014. – 116 с.
  115. Govind Sreekar Shenoy. Architecture Support for Intrusion Detection systems. – М.: LAP Lambert Academic Publishing, 2014. – 160 с.
  116. Ali Lemus. Characteristics of Neural Networks based on Energy Functions. – М.: LAP Lambert Academic Publishing, 2013. – 88 с.
  117. Peter Podbreznik and Bozidar Potocnik. Dense feature matching method based on ASIFT. – М.: LAP Lambert Academic Publishing, 2014. – 64 с.
  118. Monis Akhlaq,Irfan Awan and Faeiz Alserhani. Improved Performance High Speed Network Intrusion Detection Systems. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  119. Mohammed S. Khalil. Fingerprint Authentication Based on Statistical Features. – М.: LAP Lambert Academic Publishing, 2012. – 180 с.
  120. Aree Mohammed and Loay George. Intra and Inter Frames Based on Video Compression Techniques. – М.: LAP Lambert Academic Publishing, 2012. – 160 с.
  121. Bibi Masoomeh Aslahi Shahri. Intrusion Detection System Using Hybrid Gsa-kmeans. – М.: LAP Lambert Academic Publishing, 2014. – 128 с.
  122. Tigabu Dagne Akal. Constructing Predictive Model for Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 160 с.
  123. Dalibor Dobrilovic. Modeling virtual network laboratory based on virtualization technology. – М.: LAP Lambert Academic Publishing, 2012. – 236 с.
  124. Kamrul Hasan. An Investigation into Botnet Detection System. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  125. Jamal Al Eid,Ameen Hashim and Abdulkhaliq Alsalem. Comparing of Real-Time Properties in Networks Based On IPv6 and IPv4. – М.: LAP Lambert Academic Publishing, 2014. – 100 с.
  126. Rupali Pathak. Recent Advances In Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  127. Gulzar Mehmood,Nizamud Din and Muhammad Nawaz Khan. Privacy Preserving Scheme for Body Sensor Networks Based on CDLP. – М.: LAP Lambert Academic Publishing, 2014. – 56 с.
  128. Sathish Kumar. Intrusion Detection and Response Techniques for Mobile Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 200 с.
  129. Lara Kanbar,Hasnaa Rabbat and Adam Aboudan. A Biometric Based on Online Text-Independent Arabic Handwriting. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  130. Richard Rimiru. Exploring Immune System's Concepts for the Design of Novel AIS Models. – М.: LAP Lambert Academic Publishing, 2012. – 164 с.
  131. Alfonso E. Marquez Chamorro. Protein Structure Prediction based on Evolutionary Methods. – М.: LAP Lambert Academic Publishing, 2013. – 204 с.
  132. Xiao Cai and Tie Duan. A Reliable Study of Software Reputation Based on User Experience. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  133. Tarmo Pruunes. IT SERVICES COSTING BASED ON MICROLINK EESTI SMM DEPARTMENT. – М.: LAP Lambert Academic Publishing, 2010. – 116 с.
  134. Dumitru Margulescu,Emilia Vasile and Serghei Margulescu. Diagnosis of the Company’s Costs Based on Deviations. – М.: LAP Lambert Academic Publishing, 2012. – 148 с.
  135. Anita Gupta. Rural Indians' Perceptions of Brands Based on Ethics in Advertising. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  136. Julia Botan. Automatic Risk Identification: an Approach based on Inductive Learning. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  137. Naveen Upadhyay and Sandhya Sharma. Microstrip Fractal Antenna Based on Resonant Frequency. – М.: LAP Lambert Academic Publishing, 2013. – 104 с.
  138. Wirata Adi Dharma and Subiakto Soekarno. Mutual Funds Investment Strategy Based on Business Cycle in Indonesia. – М.: LAP Lambert Academic Publishing, 2014. – 72 с.
  139. Kristina McGowan. More Modern Top-Down Knitting: 24 Garments Based on Barbara G. Walker's 12 Top-Down Templates. – М.: A Melanie Falick Book, 2013. – 160 с.
  140. Gaspar Teixeira de Queiroz. Urban Stormwater Runoff based on Microbial Source Tracking Methods. – М.: , 2015. – 100 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Учет и калькулирование затрат по функциям. Метод АВС. Activity-Based Costing. М.К. Ерижев, "Новое в бухгалтерском учете и отчетности", № 19, октябрь 2003.
  2. Обеспечение безопасности PIN-Based операций с банковскими картами. С.В.  Серебряков, "Расчеты и операционная работа в коммерческом банке", N 2, март-апрель 2012 г.
  3. Risk-based pricing: посткризисные тенденции. А.В. Гидулян, "Банковское кредитование", N 1, январь-февраль 2012 г.
  4. Счет 97 - to be or not to be. Реквием. А.В. Анищенко, "Актуальные вопросы бухгалтерского учета и налогообложения", N 23, декабрь 2011 г.
  5. Критика on-line. интервью с О. Киселевой, руководителем компании World Gym Consulting. С. Сипатов, "Управление персоналом", N 14, июль 2010 г.
  6. On-line коммуникации: от классики до web 2.0-технологий. И. Широкова, "Ремедиум", № 7, июль 2010.
  7. Основной арсенал "охотника" - его network: кого он знает на рынке и качество этих отношений. С. Плетнева, "Управление персоналом", № 12, июнь 2009.
  8. Когда бизнес и власть встретятся on-line?. И. Пискун, "Московский бухгалтер", № 8, апрель 2009.
  9. Сдача отчетности on-line: прогресс налицо. М. Дудко, "Консультант", № 13, июль 2008.
  10. On-line рекрутмент. интервью с О. Бруковской, директором по маркетингу и PR группы компаний HeadHunter, А. Куракиным, заместителем генерального директора ООО "РДВ-медиа-групп", Я. Топорковым, директором по связям с общественностью ООО "СуперДжоб", С. Сторожевым, руководителем проектов Joblist и 100 Работ. "Управление персоналом", № 7, апрель 2008.

Образцы работ

Тема и предметТип и объем работы
Последствия операции НАТО
Политология
Диплом
80 стр.
Слияния и поглощения Мировая и Российская практика
Мировая экономика
Диплом
99 стр.
Реорганизация и ликвидация юридических лиц
Гражданское право
Дипломный проект
71 стр.
Реорганизация юридических лиц
Гражданское право
Курсовая работа
37 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Света
Большое Вам спасибо за дипломную работу после вашего сопровождения, за терпение. Защитилась на отлично.