Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Steve Manzuik. Network Security Assessment: From Vulnerability to Patch. – М.: , 2010. – 500 с.

Дополнительные результаты

  1. Bob Doppelt. From Me to We: The Five Transformational Commitments Required to Rescue the Planet, Your Organization, and Your Life. – М.: , 2012. – 180 с.
  2. Lyn Scott. From Passion to Execution: How to Start and Grow an Effective Nonprofit Organization. – М.: , 2012. – 316 с.
  3. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с.
  4. Karen Buzzard. Tracking the Audience: The Ratings Industry From Analog to Digital. – М.: , 2012. – 192 с.
  5. Catherine Stenzel, Joe Stenzel. From Cost to Performance Management: A Blueprint for Organizational Development. – М.: Wiley Publishing, Inc, 0. – 352 с.
  6. Ephren Taylor. The Elite Entrepreneur: How to Master the 7 Phases of Business & Take Your Company from Pennies to Billions. – М.: , 2012. – 204 с.
  7. Gregory Dicum, Nina Luttinger. The Coffee Book: Anatomy of an Industry from Crop to the Last Drop. – М.: , 0. – 0 с.
  8. Margaret Ellen Newell. From Dependency to Independence: Economic Revolution in Colonial New England. – М.: , 0. – 0 с.
  9. Susan M., Phd Campbell. From Chaos to Confidence: Survival Strategies for the New Workplace. – М.: , 0. – 0 с.
  10. Eduardo Wiesner. Fiscal Federalism in Latin America: From Entitlements to Markets. – М.: , 0. – 0 с.
  11. J. Roberts, Amy Hite. From Modernization to Globalization: Perspectives on Development and Social Change (Blackwell Readers in Sociology). – М.: , 0. – 0 с.
  12. Gary S. Becker, Guity Nashat Becker. The Economics of Life: From Baseball to Affermative Action to Immigration, How Real-World Issues Affect Our Everyday Life. – М.: , 0. – 0 с.
  13. J. Barkley Rosser. From Catastrophe to Chaos: A General Theory of Economic Discontinuities: Mathematics, Microeconomics, Macroeconomics, and Finance (Volume I). – М.: , 0. – 0 с.
  14. Raanan Weitz. From Peasant to Farmer. – М.: Columbia University Press, 1971. – 312 с.
  15. Joe Rubino. Secrets Of Building A Million Dollar Network Marketing Organization From A Guy Who's Been There Done That And Shows You How To Do It Too. – М.: , 0. – 0 с.
  16. Mimi Sheller. Consuming the Caribbean: From Arawaks to Zombies. – М.: , 0. – 0 с.
  17. Sy Landau, Barbara Landau, Daryl Landau. From Conflict to Creativity: How Resolving Workplace Disagreements Can Inspire Innovation and Productivity. – М.: , 0. – 0 с.
  18. Bonnie Wesorick. The Closing and Opening of a Millennium : A Journey From Old to New Relationships in the Work Setting. – М.: , 0. – 0 с.
  19. Melvin J. Gravely. Making It Your Business: The Personal Transition from Employee to Entrepreneur. – М.: , 0. – 0 с.
  20. Frank Bettger. How I Raised Myself from Failure to Success in Selling. – М.: Fireside, 1992. – 192 с.
  21. Lawrence A. Stuenkel. From Here ... to There: A Self-Paced Program for Transition in Employment. – М.: , 0. – 0 с.
  22. Frank Derfler, Les Freed. Practical Network Cabling. – М.: , 0. – 0 с.
  23. Michael P. Dombeck, Christopher A. Wood, Jack E. Williams. From Conquest to Conservation: Our Public Lands Legacy. – М.: , 0. – 0 с.
  24. Frank L. Ellsworth, Joseph Lumarda. From Grantmaker to Leader: Emerging Strategies for 21st Century Foundations. – М.: , 0. – 0 с.
  25. Bettye H. Pruitt. Timken: From Missouri to Mars-A Century of Leadership in Manufacturing. – М.: , 0. – 0 с.
  26. Ronnie Lessem, Sudhanshu Palsule. Managing in Four Worlds: From Competition to Co-Creation (Developmental Management). – М.: , 0. – 0 с.
  27. Jeanne Farrington, James Fuller. From Training to Performance Improvement. – М.: , 0. – 0 с.
  28. Bill Donaldson, Tom O'Toole. Strategic Market Relationships : From Strategy to Implementation. – М.: , 0. – 0 с.
  29. Tim Manners. Cool News About Retail: From Warhol To Wal-mart. – М.: , 0. – 0 с.
  30. Dianna Booher. From Contact to Contract. – М.: , 0. – 0 с.
  31. Juanita Ellis, Tim Speed. The Internet Security Guidebook: From Planning to Deployment. – М.: , 0. – 0 с.
  32. Wendy M. Grossman. From Anarchy to Power The Net Comes of Age. – М.: , 0. – 0 с.
  33. Workshop on the Life of a Process Model--From Conception to Action, S. Macchietto, S. P. Asprey. Dynamic Model Development: Methods, Theory and Applications (Computer-Aided Chemical Engineering). – М.: , 0. – 0 с.
  34. William H. Meyer. Security, Economics, and Morality in American Foreign Policy: Contemporary Issues in Historical Context. – М.: , 2003. – 0 с.
  35. Andrew Kimber. Credit Risk: From Transaction to Portfolio Management (Securities Institute Global Capital Markets). – М.: , 2003. – 0 с.
  36. Hanqin Qiu Zhang. Tourism and Hotel Development in China: From Political to Economic Success. – М.: , 2005. – 0 с.
  37. From Walden to Wall Street : Frontiers of Conservation Finance. – М.: , 2005. – 0 с.
  38. E-Commerce Security: Advice from Experts (IT Solutions series). – М.: , 2004. – 0 с.
  39. T. A. Brown. Business Security: Over 50 Ways To Protect Your Business!. – М.: , 2004. – 0 с.
  40. Linda Clark-Borre. From Inspiration to Implementation : The Art of Making Ideas Fly. – М.: , 2004. – 0 с.
  41. Sudhanshu Kairab. A Practical Guide to Security Assessments. – М.: , 2004. – 498 с.
  42. David Aaker. From Fargo to the World of Brands: My Story So Far. – М.: , 2005. – 408 с.
  43. Don Mastrangelo. Ready, Set, SELL! How to get from ZERO to Sales HERO in 90 Days. – М.: , 2005. – 128 с.
  44. John Tschohl. Loyal for Life: How to Take Unhappy Customers from Hell to Heaven in 60 Seconds or Less. – М.: , 2005. – 111 с.
  45. Stephen R. Covey. The 8th Habit Personal Workbook: Strategies to Take You from Effectiveness to Greatness. – М.: Free Press, 2006. – 272 с.
  46. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с.
  47. Gregory Dicum, Nina Luttinger. The Coffee Book: Anatomy of an Industry from Crop to the Last Drop, Revised and Updated Edition. – М.: , 2006. – 224 с.
  48. Andrew J. Sherman, Milledge A. Hart. Mergers & Acquisitions from A to Z. – М.: , 2006. – 288 с.
  49. Gary W. Carter. J.K. Lasser's From Ebay to Mary Kay: Taxes Made Easy for Your Home Business (J.K. Lasser). – М.: , 2005. – 286 с.
  50. Murray B. Light. From Butler to Buffett: The Story Behind the Buffalo News. – М.: , 2004. – 422 с.
  51. Peter Csermely. Weak Links: Stabilizers of Complex Systems from Proteins to Social Networks (The Frontiers Collection). – М.: , 2006. – 410 с.
  52. From Postgraduate to Social Scientist: A Guide to Key Skills (Sage Study Skills Series). – М.: , 2006. – 240 с.
  53. Dan Finnigan, Marc Karasu. From Learning to Earning: Yahoo! HotJobs Success Strategies for New Grads (HotJobs Career Advisors). – М.: , 2005. – 192 с.
  54. Samuel Mark. From Egypt to Mesopotamia: A Study of Predynastic Trade Routes (Studies in Nautical Archaeology). – М.: , 2006. – 181 с.
  55. Jo Manion. From Management to Leadership: Practical Strategies for Health Care Leaders (J-B AHA Press). – М.: , 2005. – 400 с.
  56. Scott Stratton. Your Last Five Years: Making the Transition from Work to Retirement. – М.: , 2008. – 177 с.
  57. Network Security. – М.: , 2008. – 370 с.
  58. Stephen Wall. A Stranger in Europe: Britain and the EU from Thatcher to Blair. – М.: , 2008. – 240 с.
  59. Managing the Transition from Print to Electronic Journals and Resources: A Guide for Library and Information Professionals (Routledge Studies in Library and Information Science). – М.: , 2008. – 356 с.
  60. Managing the Transition from Print to Electronic Journals and Resources: A Guide for Library and Information Professionals (Routledge Studies in Library and Information Science). – М.: , 2008. – 300 с.
  61. Duncan Green. From Poverty to Power: How Active Citizens and Effective States Can Change the World. – М.: , 2008. – 540 с.
  62. From Parastatals to Private Trade: Lessons from Asian Agriculture (International Food Policy Research Institute). – М.: , 2008. – 280 с.
  63. Jim Smith. From Average to Awesome: Lessons for Living an Extraordinary Life. – М.: , 2008. – 260 с.
  64. Daniel Clark. Network Access Control 100 Success Secrets - 100 Most Asked NAC Questions on Implementation and Deployment of unify endpoint security technology, user ... and network security enforcement. – М.: , 2008. – 180 с.
  65. Meagan Johnson, Larry Johnson. Generations, Inc.: From Boomers to Linksters--Managing the Friction Between Generations at Work. – М.: , 2010. – 272 с.
  66. Randall Kowalenko. 10,000+ Selling Words & Phrases: From A to Z (Volume 1). – М.: , 2010. – 280 с.
  67. Carl Taylor. The Knowledge: Management and Leadership from A to Z. – М.: , 2010. – 184 с.
  68. Andrew Kimber. Credit Risk: From Transaction to Portfolio Management. – М.: , 2010. – 272 с.
  69. Bruce C. N. Greenwald, Judd Kahn, Paul D. Sonkin, Michael van Biema. Value Investing: From Graham to Buffett and Beyond. – М.: John Wiley and Sons, Ltd, 2001. – 320 с.
  70. Iain Hampsher-Monk. A History of Modern Political Thought: Major Political Thinkers from Hobbes to Marx. – М.: , 1993. – 624 с.
  71. Diane Larsen-Freeman. Teaching Languages: From Grammar to Grammaring. – М.: Heinle Elt, 2003. – 180 с.
  72. Milton Roth. Ship Modeling from Stem to Stern. – М.: , 1988. – 280 с.
  73. Nikolay Karpan. From Chernobyl to Fukushima. – М.: С. Подгорнов, 2012. – 304 с.
  74. Roy Close. IN ACTION WITH THE SAS : A Soldiers Odyssey from Dunkirk to Berlin. – М.: , 2005. – 256 с.
  75. Jan Palmowski. A Dictionary of Contemporary World History: From 1900 to the Present. – М.: Oxford University Press, 2008. – 768 с.
  76. Nanoelectronics and Photonics: From Atoms to Materials, Devices, and Architectures (Nanostructure Science and Technology). – М.: , 2008. – 410 с.
  77. Stuart A. Klugman, Harry H. Panjer, Gordon E. Willmot. Loss Models: From Data to Decisions (Wiley Series in Probability and Statistics). – М.: , 2008. – 0 с.
  78. Acute Endocrinology:: From Cause to Consequence (Contemporary Endocrinology). – М.: , 2008. – 316 с.
  79. MDCT: From Protocols to Practice. – М.: , 2008. – 412 с.
  80. RNA Interference: From Biology to Clinical Applications (Methods in Molecular Biology). – М.: , 2010. – 432 с.
  81. David Darling. The Universal Book of Mathematics: From Abracadabra to Zeno's Paradoxes. – М.: Wiley, 2004. – 400 с.
  82. Asa Briggs and Peter Burke. A Social History of the Media: From Gutenberg to the Internet. – М.: Polity, 2009. – 358 с.
  83. Hermona Soreq, Alon Friedman, Daniela Kaufer. Stress - From Molecules to Behavior: A Comprehensive Analysis of the Neurobiology of Stress Responses. – М.: , 2010. – 395 с.
  84. Paul Cooper. From Inclusion to Engagement. – М.: , 2011. – 192 с.
  85. Paul Cooper. From Inclusion to Engagement. – М.: , 2011. – 192 с.
  86. Joseph Roisman. Ancient Greece from Homer to Alexander. – М.: , 2010. – 624 с.
  87. Joseph Roisman. Ancient Greece from Homer to Alexander. – М.: , 2010. – 624 с.
  88. Rob Cameron. Juniper(r) Networks Secure Access SSL VPN Configuration Guide. – М.: , 2010. – 656 с.
  89. Stephen Waxman. From NEUROSCIENCE To NEUROLOGY. – М.: , 2010. – 552 с.
  90. J. van Pelt. Development, Dynamics and Pathology of Neuronal Networks: From Molecules to Functional Circuits,147. – М.: , 2010. – 402 с.
  91. Owen Poole. Network Security. – М.: , 2010. – 224 с.
  92. Nick Iuppa, Terry Borst. End-to-End Game Development: Creating Independent Serious Games and Simulations from Start to Finish. – М.: Рид Элсивер, Focal Press, 2010. – 384 с.
  93. James Joshi. Network Security: Know It All. – М.: , 2010. – 368 с.
  94. Steve Manzuik. Network Security Assessment: From Vulnerability to Patch. – М.: , 2010. – 500 с.
  95. T. Bradley. Essential Computer Security: Everyone's Guide to Email, Internet, andWireless Security. – М.: , 2010. – 0 с.
  96. Luo Yiqi. Food Webs: From Connectivity to Energetics,36. – М.: , 2010. – 208 с.
  97. Jan L. Harrington. Network Security. – М.: , 2010. – 384 с.
  98. Robert K. Willardson. From Physics to Devices: Light Emissions in Silicon,49. – М.: , 2010. – 351 с.
  99. John H. Byrne. From Molecules to Networks. – М.: , 2010. – 656 с.
  100. Steven Andres. Security Sage's Guide to Hardening the Network Infrastructure. – М.: , 2010. – 608 с.
  101. Paul Gregory. Terror By Quota – State Security from Lenin to Stalin (an Archival Study). – М.: , 2009. – 288 с.
  102. Daniel H Deudney. Bounding Power – Republican Security Theory from the Polis to the Global Village. – М.: , 2008. – 384 с.
  103. Christof Koch. Methods in Neuronal Modeling – From Ions to Networks, 2e. – М.: , 1998. – 680 с.
  104. Dennis Pirages. From Resource Scarcity to Ecological Security – Exploring New Limits to Growth (OIP). – М.: , 2005. – 280 с.
  105. Christine L Borgman. From Gutenberg to the Global Information Infrastructure – Access to Information in the Networked World. – М.: , 2003. – 344 с.
  106. Dennis Pirages. From Resource Scarcity to Ecological Security – Exploring New Limits to Growth (OIP). – М.: , 2005. – 280 с.
  107. Daniel Wirls. Irrational Security – The Politics of Defense from Reagan to Obama. – М.: , 2010. – 256 с.
  108. Daniel Wirls. Irrational Security – The Politics of Defense from Reagan to Obama. – М.: , 2010. – 256 с.
  109. Christine Borgman. From Gutenburg to the Global Information Infrastructure – Access to Information in the Networked World. – М.: , 2000. – 350 с.
  110. Chris Mcnab. Network Security Assessment 2e. – М.: , 2007. – 464 с.
  111. Cryptography & Network Security. – М.: , 2007. – 0 с.
  112. From Idea To Success: The Dartmouth Entrepreneurial Network'S Guide For Start-Ups. – М.: , 2011. – 288 с.
  113. Wireless Network Security A Beginners Guide. – М.: , 2011. – 400 с.
  114. Network Security: The Complete Reference. – М.: , 2011. – 896 с.
  115. Fundamentals Of Network Security. – М.: , 2011. – 672 с.
  116. Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky. Cisco Security Professional's Guide to Secure Intrusion Detection Systems. – М.: , . –  с.
  117. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . –  с.
  118. John R. Walker. The Restaurant, Student Workbook : From Concept to Operation. – М.: , 2004. – 96 с.
  119. Julian Holland and David Spaven. Mapping the Railways: The Journey of Britain's Railways through Maps from 1819 to the Present Day. – М.: Collins, 2013. – 304 с.
  120. Antonio Heriberto Teixeira. Water productivity assessments from field to large scale. – М.: LAP Lambert Academic Publishing, 2010. – 236 с.
  121. Shaek Rana Mohammad Baki Billah and Mohammad Hafizur Rahman. Design & Development of Network Security System using IP Tables. – М.: LAP Lambert Academic Publishing, 2013. – 164 с.
  122. Tanja Wolf. Assessing vulnerability to heat stress in urban areas. – М.: LAP Lambert Academic Publishing, 2010. – 296 с.
  123. DB Subedi. From Student to Transnational Migrant. – М.: LAP Lambert Academic Publishing, 2012. – 124 с.
  124. Enos Kawina. Vulnerability to Food Insecurity in a Tonga Village. – М.: LAP Lambert Academic Publishing, 2014. – 56 с.
  125. Andualem Zewdie. Differential Vulnerability to Conflict in Ethiopia. – М.: LAP Lambert Academic Publishing, 2012. – 168 с.
  126. Hussein M. Khattab,Almoataz Y. Abdelaziz and Said F. Mekhamer. Innovative Approaches for Power System Security Assessment. – М.: LAP Lambert Academic Publishing, 2013. – 224 с.
  127. Mahdi Yousefi. Model-Plant Mismatch: From Diagnosis to Treatment. – М.: LAP Lambert Academic Publishing, 2014. – 100 с.
  128. Wenhong Tian and Wenbin Chen. NETWORK ALIGNMENT: FROM PAIRWISE TO MULTIPLE. – М.: LAP Lambert Academic Publishing, 2011. – 128 с.
  129. Moushumi Lodh,Ashok Parida and Alpana Saxena. Assessing plaque vulnerability in Acute Coronary Syndrome. – М.: LAP Lambert Academic Publishing, 2011. – 56 с.
  130. Paul Rabe. From ‘Squatters’ to Citizens?. – М.: Scholars' Press, 2014. – 484 с.
  131. Soumen Dhar Choudhury. Soviet Strategic Doctrine from Khrushchev to Gorbachev. – М.: LAP Lambert Academic Publishing, 2012. – 408 с.
  132. Xiaodong He. Automated intrusion prevention mechanism in enhancing network security. – М.: Scholars' Press, 2014. – 128 с.
  133. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  134. Shilpa Jaiswal. Elimination of Security Threats Using Trusted Proactive Routing. – М.: LAP Lambert Academic Publishing, 2014. – 56 с.
  135. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  136. Vincent Omollo. Enhanced Network Security. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  137. Raj Shree and Ravi Prakash Pandey. Security Advancement in ZRP based Wireless Networks. – М.: LAP Lambert Academic Publishing, 2014. – 92 с.
  138. Firkhan Ali Hamid Ali. Vulnerability Analysis on the Computer Network Security. – М.: LAP Lambert Academic Publishing, 2010. – 72 с.
  139. Imran Sohail and Sikandar Hayat. Network Security and DDoS. – М.: LAP Lambert Academic Publishing, 2010. – 64 с.
  140. Tung Duc Phung. Vulnerability to Poverty in Rural Vietnam. – М.: LAP Lambert Academic Publishing, 2012. – 188 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Займы для корпораций: back to the Russia. Т. Мартынова, "Банковское обозрение", № 11, ноябрь 2007.
  2. Счет 97 - to be or not to be. Реквием. А.В. Анищенко, "Актуальные вопросы бухгалтерского учета и налогообложения", N 23, декабрь 2011 г.
  3. Зомбирование банков, или Too-big-to-fail problem. Г.Б. Петров, "Управление в кредитной организации", N 2, март-апрель 2011 г.
  4. Основной арсенал "охотника" - его network: кого он знает на рынке и качество этих отношений. С. Плетнева, "Управление персоналом", № 12, июнь 2009.

Образцы работ

Тема и предметТип и объем работы
Многостороннее регулирование внешней торговли
Международные экономические отношения
Диплом
154 стр.
Роль ОБСЕ в урегулировании конфликтов в Европе
Политология
Курсовая работа
33 стр.
Государственное регулирование ВЭД
Государственное и муниципальное управление
Диплом
93 стр.
Проблемы реформирования ОБСЕ
Политология
Курсовая работа
29 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Мария
Хочу поблагодарить за оказанную услугу и сказать спасибо за помощь в сопровождении диплома. Я защитилась на 5. Вы мне во многом помогли. Еще раз спасибо. Я не ошиблась в выборе надежного сайта. Теперь, при случае, буду Вас рекомендовать.