Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Siva S. Sivatha Sindhu,S. Geetha and S. Selvakumar. Network Intrusion Detection System using Machine Learning Techniques. – М.: LAP Lambert Academic Publishing, 2013. – 80 с.

Дополнительные результаты

  1. Laszlo Gyorfi. Machine Learning for Financial Engineering (Advances in Computer Science and Engineering: Texts). – М.: , 2012. – 250 с.
  2. Richard A. McCormack. Lean Machines: Learning From the Leaders of the Next Industrial Revolution. – М.: , 0. – 0 с.
  3. William Horton. Using E-Learning. – М.: , 0. – 0 с.
  4. George M. Jacobs, Michael A. Power, Wan Inn Loh. Teacher's Sourcebook for Cooperative Learning: Practicle Techniques, Basic Principles, and Frequently Asked Questions. – М.: , 0. – 0 с.
  5. Dorothy E. Denning, Peter J. Denning. Internet Besieged. – М.: , 0. – 0 с.
  6. James C. Vatalaro, Robert E. Taylor. Implementing a Mixed Model Kanban System: The Lean Replenishment Technique for Pull Production. – М.: , 2005. – 125 с.
  7. Paul Piccard, Jeremy Faircloth. Combating Spyware in the Enterprise. – М.: , 2006. – 386 с.
  8. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с.
  9. Elizabeth Barkley, K. Patricia Cross, Claire Howell Major. Collaborative Learning Techniques: A Handbook for College Faculty. – М.: , 2004. – 288 с.
  10. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с.
  11. Data Analysis, Machine Learning and Applications: Proceedings of the 31st Annual Conference of the Gesellschaft fA?r Klassifikation e.V., Albert-Ludwigs-UniversitA¤t ... Data Analysis, and Knowledge Organization). – М.: , 2008. – 720 с.
  12. Ismael Arciniegas Rueda. Explaining Currency Crises: A Statistical Machine Learning Approach: Understanding why some currency crises are followed by strong recesions but others are not. – М.: , 2010. – 472 с.
  13. S.Y. Kung, M.W. Mak, S.H. Lin. Biometric Authentication: A Machine Learning Approach (Prentice Hall Information and System Sciences Series). – М.: , 2010. – 496 с.
  14. Muhammad Ali Mazidi, Sarmad Naimi, Sepehr Naimi. AVR Microcontroller and Embedded Systems: Using Assembly and C. – М.: , 2010. – 792 с.
  15. Advances in Machine Learning I: Dedicated to the Memory of Professor Ryszard S. Michalski (Studies in Computational Intelligence). – М.: , 2010. – 524 с.
  16. Advances in Machine Learning II: Dedicated to the memory of Professor Ryszard S. Michalski (Studies in Computational Intelligence). – М.: , 2010. – 532 с.
  17. Encyclopedia of Machine Learning. – М.: , 2010. – 1020 с.
  18. Rory Bray. OSSEC Host-Based Intrusion Detection Guide. – М.: , 2010. – 416 с.
  19. Balas K. Natarajan. Machine Learning. – М.: , 2010. – 217 с.
  20. Syngress. Snort Intrusion Detection 2.0. – М.: , 2010. – 550 с.
  21. Y. Anzai. Pattern Recognition & Machine Learning. – М.: , 2010. – 407 с.
  22. Katharina Morik. Knowledge Acquisition and Machine Learning. – М.: , 2010. – 305 с.
  23. Brian Caswell. Snort Intrusion Detection and Prevention Toolkit. – М.: , 2010. – 768 с.
  24. Meryl E. Wastney. Investigating Biological Systems Using Modeling. – М.: , 2010. – 382 с.
  25. Ryszard S. Michalski. Machine Learning. – М.: , 2010. – 572 с.
  26. Luis F. Chaparro. Signals and Systems Using MATLAB. – М.: Elsevier, 2011. – 768 с.
  27. Cornelius T. Leondes. Digital Control Systems Implementation and Computational Techniques,79. – М.: , 2010. – 393 с.
  28. Robert Barnard. Intrusion Detection Systems. – М.: , 2010. – 480 с.
  29. Ethem Alpaydin. Introduction to Machine Learning 2e (OISC). – М.: , 2010. – 584 с.
  30. Luis Castaner. Modelling Photovoltaic Systems Using PSpice®. – М.: , 2002. – 376 с.
  31. Etham Alpaydin. Introduction to Machine Learning (OIP). – М.: , 2004. – 400 с.
  32. Joseph J. Byrne. Network+ Certification Study System. – М.: , 1999. – 356 с.
  33. Brednan Jf Frey. Graphical Models for Machine Learning & Digital Communications. – М.: , 1998. – 220 с.
  34. Terry Escamilla. Intrusion Detection. – М.: , 1998. – 368 с.
  35. Norman Witkin. Enterprise Networking for Information Systems Professionals. – М.: , 1997. – 254 с.
  36. Haibo He. Self–Adaptive Systems for Machine Intelligence. – М.: , 2011. – 240 с.
  37. Joaquin Quinone Quinonero–cande. Dataset Shift in Machine Learning. – М.: , 2009. – 248 с.
  38. RS FORSYTH. Forsyth ?machine? Learning – Applications In Exper T Systems & Information Retrieval. – М.: , 1986. – 278 с.
  39. Greg Holden. Guide to Firewalls and Network Security: Intrusion Detection and VPNs. – М.: Course Technology, 2003. – 512 с.
  40. Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky. Cisco Security Professional's Guide to Secure Intrusion Detection Systems. – М.: , . –  с.
  41. Ian H. Witten, Eibe Frank. Data Mining: Practical Machine Learning Tools and Techniques, Second Edition (Morgan Kaufmann Series in Data Management Systems). – М.: , 2005. – 560 с.
  42. Jianbo Yang. Feature selection and model selection in supervised learning. – М.: LAP Lambert Academic Publishing, 2015. – 160 с.
  43. Anup Bhange and Manmeet Kaur Marhas. Anomaly Detection in Network Traffic; A Statistical Approach. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  44. Gulshan Kumar. Effective Intrusion Detection using Genetic Algorithms. – М.: LAP Lambert Academic Publishing, 2014. – 100 с.
  45. Shadab Pattekari. Intelligent Heart Disease Prediction System Using Naive Bayes. – М.: LAP Lambert Academic Publishing, 2014. – 64 с.
  46. Maninder Jeet Kaur,Moin Uddin and Harsh Verma. Capacity Analysis of Cognitive Radio using Soft Computing Techniques. – М.: LAP Lambert Academic Publishing, 2012. – 172 с.
  47. Tanmoy Hazra. Application of PCA in IDS. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  48. Shaek Rana Mohammad Baki Billah and Mohammad Hafizur Rahman. Design & Development of Network Security System using IP Tables. – М.: LAP Lambert Academic Publishing, 2013. – 164 с.
  49. Vulasala Ganesh. Optimization Methods of Electrical Distribution Systems using GA. – М.: LAP Lambert Academic Publishing, 2013. – 200 с.
  50. Tasnuva Ahmed,Rabiul Hossain and Dipesh Barua. Security System Using Ultrasound. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  51. Asmatullah Chaudhry. Image Processing using Punctual Kriging and Machine Learning. – М.: LAP Lambert Academic Publishing, 2009. – 116 с.
  52. Bashar Mudhafar Ahmed and Raad Sami Fyath. Dual Polarization WDM Systems Using CO-OFDM Technique. – М.: Scholars' Press, 2014. – 112 с.
  53. Ahmad A. M. Abushariah and Teddy Surya Gunawan. Speech Recognition System using MATLAB. – М.: LAP Lambert Academic Publishing, 2011. – 112 с.
  54. Kuldeep Singh and Sunil Agrawal. Internet Traffic Classification. – М.: LAP Lambert Academic Publishing, 2011. – 100 с.
  55. Joydip Jana and Mahendra Lad. A Fast Feedback Control System using FPGA for RF signals. – М.: LAP Lambert Academic Publishing, 2013. – 96 с.
  56. Hua Ouyang. Networked Predictive Control Systems. – М.: LAP Lambert Academic Publishing, 2010. – 164 с.
  57. Sarang Patil,Sunil Pawar and Vivek Chaudhari. Implementation wireless A.M.R. system using ZigBee And TCP/IP. – М.: LAP Lambert Academic Publishing, 2013. – 96 с.
  58. Huang-Chun Roan. Network Intrusion Detection Based on Shift-OR Circuit. – М.: LAP Lambert Academic Publishing, 2011. – 60 с.
  59. M. Sadiq Ali Khan and S. M. Aqil Burney. Recent Trends in Intrusion Detection System & Network Monitoring. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  60. Mohammad H. Alomari,Rami S. Qahwaji and Stanley S. Ipson. Applied Machine Learning for Solar Data Processing. – М.: LAP Lambert Academic Publishing, 2011. – 152 с.
  61. Cruceru Madalina. Radiation Detection Systems With Applications in High Energy Physics. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  62. Tufan Colak and Rami Qahwaji. AUTOMATED PREDICTION OF SOLAR FLARES. – М.: LAP Lambert Academic Publishing, 2010. – 128 с.
  63. Neveen Metwally. Carnation Production Using Soilless Culture Technique. – М.: LAP Lambert Academic Publishing, 2011. – 140 с.
  64. Alireza Shahabfar. Construction of an Agricultural Drought Monitoring System Using Remote Sensing Techniques. – М.: LAP Lambert Academic Publishing, 2010. – 192 с.
  65. Yi Xin. Mid-IR-based Gas Detection System Analysis Model. – М.: LAP Lambert Academic Publishing, 2011. – 136 с.
  66. Vadim Rukavitsyn. Ecosystem Condition Modeling Using Machine Learning Tools. – М.: LAP Lambert Academic Publishing, 2015. – 132 с.
  67. Pragya Singh and David R. Goodlett. Characterizing Bacterial Secretion Systems Using Mass Spectrometry. – М.: LAP Lambert Academic Publishing, 2012. – 212 с.
  68. Guy Lebanon. Riemannian Geometry and Statistical Machine Learning. – М.: LAP Lambert Academic Publishing, 2015. – 140 с.
  69. Nataliia Semenenko. Diagnosis of Cross-Browser Compatibility Issues via Machine Learning. – М.: LAP Lambert Academic Publishing, 2014. – 68 с.
  70. Aneta Trajanov. Machine learning in agroecology. – М.: LAP Lambert Academic Publishing, 2011. – 140 с.
  71. Sharad Shandilya. Machine Learning and Non-Linear Dynamics to the Rescue. – М.: Scholars' Press, 2013. – 88 с.
  72. Mark Rossman. Automated Detection of Hematological Patterns Through Machine Learning. – М.: LAP Lambert Academic Publishing, 2014. – 128 с.
  73. Farhana Shahid and Ubaid Ur Rahman. Detection Of Heart Disease Using Decision Tree Technique. – М.: LAP Lambert Academic Publishing, 2014. – 64 с.
  74. Abhay Nath Singh. Honeypot Based Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  75. Shahnawaz Husain,S. C. Gupta and R. C. Joshi. Intrusion Detection Engine for Adhoc Environment. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  76. Sumaya Saad Sulaiman and Sarab M. Hameed. A Fuzzy Based Clustering for Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  77. Shubha Puthran and Ketan Shah. Intrusion Detection System using datamining techniques. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  78. Mohammad S. I. Mamun. Intrusion Detection System Architecture in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  79. Heba Fathy Eid. Computational Intelligence in Network Intrusion Detection System. – М.: Scholars' Press, 2014. – 164 с.
  80. Janakiraman S. Distributed Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2012. – 164 с.
  81. Mohd Nazri Ismail,Mohd Afizi Shukran and Kamaruzaman Maskat. Smarthome Computing System Using Mobile Devices. – М.: LAP Lambert Academic Publishing, 2014. – 88 с.
  82. Yogesh Kumar,Krishan Kumar and Gulshan Kumar. Feature Selection For Intrusion Detection Systems. – М.: LAP Lambert Academic Publishing, 2014. – 100 с.
  83. Syed Zahidur Rashid. Computer Network Security Monitoring. – М.: Scholars' Press, 2015. – 284 с.
  84. Lanier Watkins. Resource Discovery: Using Network Traffic To Infer CPU And Memory Load. – М.: LAP Lambert Academic Publishing, 2014. – 96 с.
  85. Ulya Sabeel and Nidhi Chandra. ADLS: Attack Detection & Localization Scheme in WSN. – М.: LAP Lambert Academic Publishing, 2014. – 68 с.
  86. Gulshan Kumar. Effective Intrusion Detection using Feature Selection. – М.: LAP Lambert Academic Publishing, 2014. – 92 с.
  87. Mrutyunjaya Panda and Manas Ranjan Patra. A Data Mining Approach to Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2015. – 216 с.
  88. Glenn Wilkinson. Identification of Hostile TCP Traffic using Support Vector Machines. – М.: LAP Lambert Academic Publishing, 2010. – 80 с.
  89. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  90. Mueen Uddin. Dynamic Multi Layer Signature based IDS System using Mobile Agents. – М.: LAP Lambert Academic Publishing, 2011. – 72 с.
  91. Ivano Malavolta. A tamper resistant Intrusion Detection System. – М.: LAP Lambert Academic Publishing, 2011. – 144 с.
  92. Shaffali Gupta and Sanmeet Kaur. A GUI Framework for detecting Intrusions using Bro IDS. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  93. Mahmoud Jazzar. Computer Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 240 с.
  94. Siva S. Sivatha Sindhu,S. Geetha and S. Selvakumar. Network Intrusion Detection System using Machine Learning Techniques. – М.: LAP Lambert Academic Publishing, 2013. – 80 с.
  95. Gaurav Mishra and Gulshan Ahuja. Classification of data mining techniques in intrusion detection. – М.: LAP Lambert Academic Publishing, 2013. – 52 с.
  96. Nasim Beigi-Mohammadi. Smart Meter Networks: Intrusion Detection System by Design. – М.: LAP Lambert Academic Publishing, 2014. – 136 с.
  97. Christian Chetachi Umunna. Distributed Intrusion Detection System in Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 104 с.
  98. Iftikhar Ahmad. Feature Subset Selection in Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 220 с.
  99. Saima Munawar. Detection and Classification Of Normal and Anomaly IP Packet. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  100. Jabarweer Singh,Krishan Kumar and Gulshan Kumar. Intrusion detection using artificial intelligence based ensembles. – М.: LAP Lambert Academic Publishing, 2014. – 116 с.
  101. Govind Sreekar Shenoy. Architecture Support for Intrusion Detection systems. – М.: LAP Lambert Academic Publishing, 2014. – 160 с.
  102. Soumyajit Dey and Anupam Basu. Embedded Architectures for Speech and Machine Learning. – М.: LAP Lambert Academic Publishing, 2010. – 128 с.
  103. Britto R. Kumar and Albert S. Rabara. An Architecture for Secure Mobile Payment System using PKI. – М.: LAP Lambert Academic Publishing, 2013. – 184 с.
  104. Tanzila Saba and Amjad Rehman. Machine Learning and Script Recognition. – М.: LAP Lambert Academic Publishing, 2012. – 168 с.
  105. Monis Akhlaq,Irfan Awan and Faeiz Alserhani. Improved Performance High Speed Network Intrusion Detection Systems. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  106. Prakash Prasad. Intrusion Detection System: Findings. – М.: LAP Lambert Academic Publishing, 2011. – 104 с.
  107. Homam El-Taj and Omar Amer. Network Alert Management System For IDS False Positive Reduction. – М.: LAP Lambert Academic Publishing, 2013. – 156 с.
  108. Bibi Masoomeh Aslahi Shahri. Intrusion Detection System Using Hybrid Gsa-kmeans. – М.: LAP Lambert Academic Publishing, 2014. – 128 с.
  109. Noormadinah Allias,Megat Norulazmi Megat Mohamed Noor and Mohd. Nazri Ismail. Email Filtering Based On Swarm Intelligence via Machine Learning. – М.: LAP Lambert Academic Publishing, 2015. – 196 с.
  110. Mehmet ACI. DEVELOPMENT OF TWO HYBRID CLASSIFICATION METHODS FOR MACHINE LEARNING. – М.: LAP Lambert Academic Publishing, 2011. – 48 с.
  111. Vinayak Bharadi and Hemchandra Kekre. Signature Recognition Using Clustering Techniques. – М.: LAP Lambert Academic Publishing, 2012. – 180 с.
  112. Sahar Sabbeh. Adaptation Of Web Operating System Using Semantic Web Techniques. – М.: LAP Lambert Academic Publishing, 2012. – 148 с.
  113. Kunwar Babar Ali. Quality Prediction using Machine Learning Technique(MLT). – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  114. Tigabu Dagne Akal. Constructing Predictive Model for Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2012. – 160 с.
  115. Kamrul Hasan. An Investigation into Botnet Detection System. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  116. Rupali Pathak. Recent Advances In Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  117. Khamael Abbas Al-Dulaimi. Fingerprint Recognition System Using Image Processing Technique. – М.: LAP Lambert Academic Publishing, 2013. – 88 с.
  118. Lum Zhaveli. Gauging affectivity in social networks. – М.: LAP Lambert Academic Publishing, 2013. – 136 с.
  119. Fadel O. Shaban. Spyware Detection. – М.: LAP Lambert Academic Publishing, 2013. – 92 с.
  120. Thanh-Quang Chu. Agent-based models and machine learning in decision support systems. – М.: LAP Lambert Academic Publishing, 2015. – 208 с.
  121. Leonardo Rigutini. Automatic Text Processing: Machine Learning Techniques. – М.: LAP Lambert Academic Publishing, 2010. – 148 с.
  122. Rajnish Kumar,Anju Sharma and Pritish Kumar Varadwaj. Machine Learning and Biological Data. – М.: LAP Lambert Academic Publishing, 2011. – 64 с.
  123. Surafel Teklu. Automatic Categorization Of Amharic News Text. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  124. Stefan Schliebs. Optimisation and Modelling of Spiking Neural Networks. – М.: LAP Lambert Academic Publishing, 2010. – 296 с.
  125. Ravindar Reddy Ravula. Classification of Malware. – М.: LAP Lambert Academic Publishing, 2011. – 108 с.
  126. Dakshina Ranjan Kisku,Phalguni Gupta and Massimo Tistarelli. Multibiometrics Systems: Modern Perspectives to Identity Verification. – М.: LAP Lambert Academic Publishing, 2012. – 176 с.
  127. Sheetal Dabra and Sunil Agrawal. Identification of Handwritten Characters using Machine Learning. – М.: LAP Lambert Academic Publishing, 2013. – 84 с.
  128. Alpay Doruk. Security Review Program Requirements for Intrusion Management Systems. – М.: LAP Lambert Academic Publishing, 2010. – 88 с.
  129. Sathish Kumar. Intrusion Detection and Response Techniques for Mobile Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 200 с.
  130. Babak Loni. Enhanced Question Classification with Optimal Combination of Features. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  131. Richard Rimiru. Exploring Immune System's Concepts for the Design of Novel AIS Models. – М.: LAP Lambert Academic Publishing, 2012. – 164 с.
  132. Sokyna Al-Qatawneh. 3D Facial Feature Extraction and Recognition. – М.: LAP Lambert Academic Publishing, 2012. – 196 с.
  133. Sharmin Rashid Linta,Ridgewan Khan and Faysal Ahmed. Towards E-Learning Management System using Semantic Web Technologies. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  134. Goh Kwang Leng,Ashutosh Kumar Singh and Lim King Hann. Web Spam Detection Application using Neural Network. – М.: Scholars' Press, 2013. – 60 с.
  135. Ismael Arciniegas Rueda. Explaining Currency Crises: A Statistical Machine Learning Approach. – М.: LAP Lambert Academic Publishing, 2010. – 472 с.
  136. Suganya Ramamoorthy and Rajaram Sivasubramanian. Classification of US liver images using machine learning techniques. – М.: LAP Lambert Academic Publishing, 2014. – 164 с.
  137. Victor Boyarshinov. Machine Learning In Computational Finance. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  138. Saul Kornik. Machine Learning for Corporate Failure Prediction. – М.: LAP Lambert Academic Publishing, 2012. – 364 с.
  139. Kevin P. Murphy. Machine Learning: A Probabilistic Perspective. – М.: The MIT Press, 2012. – 1104 с.
  140. Jason Bell. Machine Learning: Hands??“On for Developers and Technical Professionals. – М.: , 2014. –  с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Банковское отделение будущего. интервью с Камероном МакКворри. Cameron MacQuarrie, менеджером по развитию бизнеса компании Cisco Systems в области корпоративных финансов в регионе EMEA. Европа, Ближний Восток, Африка. Н.Ф. Колюшенко, "Расчеты и операционная работа в коммерческом банке", № 2, февраль 2006.
  2. Необходимые и достаточные условия e-learning. М. Удовиченко, "Финансовая газета. Региональный выпуск", № 45, ноябрь 2004.
  3. Ловушка для пирата. интервью с И. Слабых, руководителем отдела противодействия интеллектуальному пиратству в России и СНГ Adobe Systems. И. Голова, "Расчет", N 9, сентябрь 2012 г.
  4. Основной арсенал "охотника" - его network: кого он знает на рынке и качество этих отношений. С. Плетнева, "Управление персоналом", № 12, июнь 2009.
  5. Я воспринимаю персонального помощника как напарника червяк должен нравиться рыбке, а не рыбаку. интервью с П.А. Черкашиным, руководителем российского представительства компании Adobe Systems. "Управление персоналом", № 20, октябрь 2008.
  6. E-learning - противоядие от рутины. О. Сизова, "Расчет", № 10, октябрь 2008.

Образцы работ

Тема и предметТип и объем работы
Концентрация производства и определение оптимальных размеров
Экономика предприятия
Курсовая работа
25 стр.
Переход от концентрации к развитию малых и средних предприятий
Экономика предприятия
Курсовая работа
21 стр.
Этапы формирования теории президентства
История государства и права
Курсовая работа
30 стр.
Продвижение брендов в шоу-бизнесе
Электроснабжение городов и промышленных предприятий
Диплом
79 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Марина
Марина, большое спасибо, диплом после вашего сопровождения защитила на \"отлично\". Без Вас ничего бы не получилось. Еще раз спасибо!