Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с.
  2. Alaa K. Farhan. Security Protocol for Mobile Data. – М.: LAP Lambert Academic Publishing, 2013. – 116 с.
  3. Lungisani Moyo,Trevor Chabwinja and Oluyinka Osunkunle. Freedom of the press in Zimbabwe:From the colonial era to 2009. – М.: LAP Lambert Academic Publishing, 2015. – 92 с.
  4. Kriti Jaiswal. Simulation of MANET using GloMoSim Network Simulator. – М.: LAP Lambert Academic Publishing, 2014. – 140 с.
  5. RAMARAJ RAVI. AN OPTIMUM RESTORATION ALGORITHM FOR VIRTUAL PRIVATE NETWORKS. – М.: LAP Lambert Academic Publishing, 2011. – 60 с.
  6. Debasish Jena. On Protocols for Information Security Services. – М.: LAP Lambert Academic Publishing, 2011. – 136 с.
  7. Kerem Beygo and Cihan Eraslan. Enhancing Security and Usability Features of NFC. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.

Дополнительные результаты

  1. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с.
  2. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  3. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с.
  4. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с.
  5. Arne Beck. Competition for Public Transport Services: Institutional Framework and Empirical Evidence of Bus Services in Germany (Contributions to Economics). – М.: , 2012. – 261 с.
  6. Jean-Eric Aubert, Jean-Louis Reiffers, WORLD BANK FORUM ON KNOWLEDGE FOR DEVELO. Knowledge Economies in the Middle East and North Africa: Toward New Development Strategies (Wbi Development Studies). – М.: , 0. – 0 с.
  7. James D. Wolfensohn, Nicholas Stern, United Nations International Conference on Financing for Development. A Case for Aid: Building Consensus for Development Assistance. – М.: , 0. – 0 с.
  8. E-Business, E-Government 2002 Lisbon, Ifip Conference on E-Commerce, Paula M. C. Swatman, Luis Valadares Tavares, Joao L. Monteiro, L. Valadares Tavares. Towards the Knowledge Society: Ecommerce, Ebusiness, and Egovernment (International Federation for Information Processing, 233). – М.: , 0. – 0 с.
  9. Suzanne Woo. On Course for Business : Women and Golf. – М.: , 0. – 0 с.
  10. Arthur B. Baskin, George Kovacs, Gianni Jacucci. Cooperative Knowledge Processing for Engineering Design (International Federation for Information Processing (Series), 5.). – М.: , 0. – 0 с.
  11. Gerald Kovacich. The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition. – М.: , 0. – 0 с.
  12. Ifip Tc5, Wg5.5 Working Conference on Infrastructures for Virtual Enter, Luis M. Camarinha Matos, Luis Camarinha-Matos. Collaborative Business Ecosystems and Virtual Enterprises (IFIP INTERNATIONAL FEDERATION FOR INFORMATION PROCESSING Volume 213). – М.: , 0. – 0 с.
  13. NATO Advanced Research Workshop on Science for Reduction of Risk and s, Alik Ismail-Zadeh. Risk Science and Sustainability: Science for Reduction of Risk and Sustainable Development for Society (NATO SCIENCE SERIES II MATHEMATICS, PHYSICS AND CHEMISTRY). – М.: , 0. – 0 с.
  14. J. M. Juran. Juran on Leadership for Quality. – М.: , 0. – 0 с.
  15. Charles J. Austin, Stuart B. Boxerman. Information Systems for Healthcare Management, Sixth Edition. – М.: , 0. – 0 с.
  16. Mark B. Desman. Building an Information Security Awareness Program. – М.: , 0. – 0 с.
  17. Gerald L. Kovacich, Edward P. Halibozek. The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, First Edition. – М.: , 0. – 0 с.
  18. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с.
  19. Ifip Working Conference on Infrastructures for Virtual Organizations 2, Hamideh Afsarmanesh, Richardo J. Rabelo, Luis M. Camarinha-Matos, Luis Camarinha-Matos, Ricardo J. Rabelo. E-Business and Virtual Enterprises - Managing Business-to-Business Cooperation (International Federation For Information Processing Volume 184). – М.: , 0. – 0 с.
  20. Ifip Tc11 Wg11.5 Working Conference on Integrity and Internal Control, Michael Gertz. Integrity and Internal Control in Information Systems V: Ifip Tc11/Wg11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (Iicis), November 11-12, 2002, Bonn, Germany (International Federation for Information Processing. – М.: , 0. – 0 с.
  21. Brian Kahin, Janet Abbate. Standards Policy for Information Infrastructure. – М.: , 0. – 0 с.
  22. Steve Purser. A Practical Guide to Managing Information Security (Artech House Technology Management Library). – М.: , 0. – 0 с.
  23. Society for Marketing Professional Services. Marketing Handbook for the Design & Construction Professional: Society for Marketing Professional Services. – М.: , 0. – 0 с.
  24. Marian Quigley, Marian Quiqley. Information Security and Ethics: Social and Organizational Issues. – М.: , 0. – 0 с.
  25. Roland Traunmuller, R. Traunmuller, Quebec) Ifip World Computer Congress 2002 Montreal. Information Systems: The E-Business Challenge (International Federation for Information Processing, 95). – М.: , 0. – 0 с.
  26. Mostafa Hashem Sherif. Protocols for Secure Electronic Commerce, Second Edition. – М.: , 0. – 0 с.
  27. E-Business, E-Government 2003 Sao paul Ifip Conference on E-Commerce, Manuel J. Mendes, Reima Suomi, Carlos Passos, International Federation for Information Processing, Kluwer Academic Publishers. Digital Communities in a Networked Society: e-Commerce, e-Business and e-Government (International Federation for Information Processing). – М.: , 0. – 0 с.
  28. C. Warren Axelrod, Axelrod. Outsourcing Information Security. – М.: , 0. – 0 с.
  29. Harold F. Tipton, Micki Krause, Micki, Cissp Krause. Information Security Management Handbook, Fifth Edition. – М.: , 0. – 0 с.
  30. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с.
  31. Mavis A. Ampah. Connecting Sub-Saharan Africa: A World Bank Group Strategy for Information and Communication Technology Sector Development (World Bank Working Papers) (World Bank Working Papers). – М.: , 2005. – 0 с.
  32. Seeking Success in e-Business : A Multidisciplinary Approach (IFIP International Federation for Information Processing). – М.: , 2003. – 0 с.
  33. IT Innovation for Adaptability and Competitiveness (IFIP International Federation for Information Processing). – М.: , 2004. – 0 с.
  34. Economics of Information Security (Advances in Information Security). – М.: , 2004. – 0 с.
  35. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с.
  36. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с.
  37. Lifelong Learning in the Digital Age : Sustainable for All in a Changing World (IFIP International Federation for Information Processing). – М.: , 2004. – 0 с.
  38. Building the E-Service Society : E-Commerce, E-Business, and E-Government (IFIP International Federation for Information Processing). – М.: , 2004. – 0 с.
  39. E-Training Practices for Professional Organizations (IFIP International Federation for Information Processing). – М.: , 2004. – 0 с.
  40. Information and Communication Technologies and Real-Life Learning : New Education for the Knowledge Society (IFIP International Federation for Information Processing). – М.: , 2005. – 0 с.
  41. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с.
  42. Ira Winkler. Zen and the Art of Information Security. – М.: , 2007. – 192 с.
  43. Randy Okray, Thomas Lubnau II. Crew Resource Management for the Fire Service. – М.: , 2004. – 300 с.
  44. Committee on Federal Regulation of Securities Committee. The Fund Director's Guidebook: Third Edition (Fund Director's Guidebook). – М.: , 2006. – 128 с.
  45. Timothy P. Layton. Information Security. – М.: , 2006. – 222 с.
  46. L. Peter Edles. Fundraising: Hands-On Tactics for Nonprofit Groups. – М.: McGraw-Hill Irwin, 2005. – 288 с.
  47. Michael E. Whitman, Herbert J. Mattord. Principles of Information Security, Second Edition. – М.: , 2004. – 600 с.
  48. American Society for Healthcare Central Services Professionals. Training Manual for Health Care Central Service Technicians (Jossey-Bass/Aha Press). – М.: , 2005. – 304 с.
  49. Mehdi Khosrow-Pour. Web Technologies for Commerce and Services Online. – М.: Idea Group Reference, 2007. – 392 с.
  50. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с.
  51. Keith Jahn, Rebecca Lawson. Transforming IT: A Five-Step Plan for Adopting a Service-Centric IT Model. – М.: , 2008. – 126 с.
  52. Social and Human Elements of Information Security: Emerging Trends and Countermeasures (Premier Reference Source). – М.: , 2008. – 412 с.
  53. Jennie Deneka. Creating an Informed Customer Service Model: Using Action Research. – М.: , 2008. – 104 с.
  54. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с.
  55. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с.
  56. Gerard Blokdijk, Ivanka Menken. Information Security Management Best Practice Workbook: Implementation and Management Roadmap for Threats, Challenges and Solutions - Ready to use supporting documents bringing Theory into Practice. – М.: , 2008. – 124 с.
  57. Planning for Information Systems (Advances in Management Information Systems). – М.: , 2009. – 528 с.
  58. T.R. Ramanathan. The Role of Organisational Change Management in Offshore Outsourcing of Information Technology Services: Qualitative Case Studies from a Multinational Pharmaceutical Company. – М.: , 2009. – 188 с.
  59. W. Krag Brotby. Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement. – М.: Auerbach Publications, 2009. – 200 с.
  60. Alan Calder. Information Security based on ISO 27001/ISO 27002: A Management Guide. – М.: , 2009. – 83 с.
  61. Bel G. Raggad. Information Security Management: Concepts and Practice. – М.: , 2010. – 871 с.
  62. Michael E. Whitman, Herbert J. Mattord. Management of Information Security. – М.: , 2010. – 592 с.
  63. Sid Sirisukha. Protecting Management Information Systems: VPN Competitive Advantage. – М.: , 2010. – 316 с.
  64. Alan Calder, Steve G Watkins. Information Security Risk Management for ISO27001 / ISO27002. – М.: , 2010. – 198 с.
  65. William Manning. CISM Certified Information Security Manager Certification Exam Preparation Course in a Book for Passing the CISM Exam - The How To Pass on Your First Try Certification Study Guide. – М.: , 2010. – 188 с.
  66. Vicky Gallas. The Complete Blueprint for an Escort Service. – М.: , 2010. – 220 с.
  67. Andy Jones. Risk Management for Computer Security. – М.: , 2010. – 296 с.
  68. Evan Wheeler. Security Risk Management: Building an Information Security Risk Management Program from the Ground Up. – М.: , 2011. – 360 с.
  69. Editors Karl Maria Michael de Leeuw, Jan Bergstra. The History of Information Security: A Comprehensive Handbook. – М.: Elsevier Science, 2007. – 900 с.
  70. Margaret Matthews, Katy Salisbury. Focus on Skills for IELTS Foundation (+ CD). – М.: Pearson Education Limited, 2007. – 176 с.
  71. Broadband Satellite Communication Systems and the Challenges of Mobility : IFIP TC6 Workshops on Broadband Satellite Communication Systems and Challenges ... Federation for Information Processing). – М.: , 2005. – 247 с.
  72. Global Perspectives In Information Security. – М.: , 2008. – 896 с.
  73. Harlan Carvey. Perl Scripting for Windows Security. – М.: , 2010. – 232 с.
  74. Eiji Arai. Mechatronics for Safety, Security and Dependability in a New Era. – М.: , 2010. – 464 с.
  75. Shigeru Yamamoto. Systems and Human Science - For Safety, Security and Dependability. – М.: , 2010. – 350 с.
  76. Gerald L. Kovacich. The Manager's Handbook for Corporate Security. – М.: , 2010. – 463 с.
  77. Philip Holder. Defensive Tactics for the Security Professional. – М.: , 2010. – 164 с.
  78. John R. Vacca. Managing Information Security. – М.: , 2010. – 320 с.
  79. G. Manoilov. Elsevier's Dictionary of Information Security. – М.: , 2010. – 772 с.
  80. David Samuelson. Hands-on Manual for Cinematographers. – М.: , 2010. – 400 с.
  81. Anthony Piltzecker. Microsoft Vista for IT Security Professionals. – М.: , 2010. – 672 с.
  82. B. Bouchon-Meunier. Intelligent Systems for Information Processing: From Representation to Applications. – М.: , 2010. – 488 с.
  83. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с.
  84. George L Stefanek. Information Security Best Practices. – М.: , 2010. – 160 с.
  85. Sari Greene. Sustainable Information Security. – М.: , 2010. – 400 с.
  86. John R. Vacca. Computer and Information Security Handbook. – М.: , 2010. – 928 с.
  87. Giridhar D. Mandyam. Third Generation CDMA Systems for Enhanced Data Services. – М.: , 2010. – 300 с.
  88. W. Wisden. In Situ Hybridization Protocols for the Brain,47. – М.: , 2010. – 272 с.
  89. Ds Patterson. Computing Unbound – Hands–On Exercises for the IBM PC. – М.: , 1989. – 288 с.
  90. Da Patterson. Computing Unbound – Hands–On Exercises for the Macintosh. – М.: , 1989. – 320 с.
  91. John Mingers. Social Theory and Philosophy for Information Systems. – М.: , 2004. – 472 с.
  92. Lincoln C Chen. Global Health Challenge for Human Security. – М.: , 2004. – 328 с.
  93. Daniel Brown. Memory, Trauma Treatment & the Law – An Essential Reference on Memory for Clinicians, Researchers, Attorneys & Judges. – М.: , 1998. – 800 с.
  94. Paul Joyce. Leadership and Strategic Management for the Public Services. – М.: , 2006. – 288 с.
  95. Timothy A. Craul. Soil Design Protocols for Landscape Architects and Contractors. – М.: , 1995. – 0 с.
  96. Raya Fidel. Database Design for Information Retrieval. – М.: , 1987. – 232 с.
  97. Krag Brotby. Information Security Governance. – М.: , 2009. – 190 с.
  98. Harold F. Tipton, Micki Krause. Information Security Management Handbook on CD-ROM, 2003 Edition. – М.: , . –  с.
  99. Priyadarshini Sabut. An Enhanced Medium Access Control Protocol for Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2013. – 60 с.
  100. Rohana Mohamad Rashid. Determining Influencing Factors of Information Security Culture. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  101. Samundiswary Punniakodi and Dananjayan Perumal. Trust Based Routing Protocols for Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2015. – 120 с.
  102. Md. Jahangir Toimoor. Scalability of Modified AODV-UU Routing Protocol for Smart Grid. – М.: LAP Lambert Academic Publishing, 2014. – 88 с.
  103. Tejpal Dhewa. Protocols for Evaluation of Probiotic Attributes of Lactic Cultures. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  104. C. R. Prajapati,K. P. Singh and A. K. Gupta. Plant Disease Management for Food Security. – М.: LAP Lambert Academic Publishing, 2013. – 676 с.
  105. Chukwudi Oparaku. Implication of BOKO HARAM ACTIVITIES for national security in Nigeria. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  106. Bakut Tswah Bakut. The Human Quest for Physiological-security. – М.: Scholars' Press, 2014. – 224 с.
  107. Deepak Puthal and Bibhudatta Sahoo. Secure Data Collection & Critical Data Transmission in Mobile Sink WSN. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  108. Prasad Lokulwar,Vivek Shelkhe and Mangesh Ghonge. Security Aware Routing protocol for MANET. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  109. Marco Fotino. Energy Behavior of Routing Protocols for Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2014. – 144 с.
  110. Xianhui Che. Control Protocol for Optical Packet Switched Local Area Network. – М.: LAP Lambert Academic Publishing, 2014. – 188 с.
  111. Sushant Sudhakar Bahekar and Prashant Panse. Energy Efficient Mechanism for Detection of Wormhole Attacks. – М.: LAP Lambert Academic Publishing, 2014. – 72 с.
  112. Hong Yu. A Protocol for Multimedia Transmission over Wireless Networks. – М.: LAP Lambert Academic Publishing, 2012. – 272 с.
  113. Jawad Shafi and Rab Nawaz Jadoon. A Study on Datagram Congestion Control Protocol for Multimedia. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  114. Marimuthu Kanagaraj and Eswari Venkatachalam. Multifactor Authentication Protocol for a Secured WSN. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  115. Haitham ELwahsh. Secure Service Discovery Protocol for ad-hoc Networks "hash function". – М.: LAP Lambert Academic Publishing, 2013. – 144 с.
  116. Samer Bali. Routing Protocols for Ultra-Wideband Mobile Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2011. – 100 с.
  117. Yedji Mbangsoua and Dr. Freddie Acosta. Information Security and its Investment Justification. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  118. E. Madhusudhana Reddy. Development of Secure Protocols for MHIS Using RMPJK–RSA Cryptosystem. – М.: LAP Lambert Academic Publishing, 2011. – 204 с.
  119. Yasser Alshehri. Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 156 с.
  120. Julien Shabani. Information Security for RFID Systems. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.
  121. Debasish Jena. On Protocols for Information Security Services. – М.: LAP Lambert Academic Publishing, 2011. – 136 с.
  122. Aliyu Onipede. Biometrics as a tool for Information Security in Aviation industry. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  123. Manoj Kumar Verma and U. N. Singh. Impact of Internet on Library and Information Services of IITs. – М.: LAP Lambert Academic Publishing, 2012. – 164 с.
  124. Furhan Mehmood and Rajia Rafique. Information Security in Financial Organizations. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  125. RAFAEL IBARRA and Silvia Ballesteros. Infopragmatics: an efficient method for information retrieval. – М.: LAP Lambert Academic Publishing, 2010. – 60 с.
  126. Zhishun Wang and Qifei Lu. A Method for Analyzing Security of SOA-based Systems. – М.: LAP Lambert Academic Publishing, 2011. – 68 с.
  127. Omar Zakaria. Information Security Culture. – М.: LAP Lambert Academic Publishing, 2013. – 248 с.
  128. frankie tvrz and marijke coetzee. Information Security of a Bluetooth-enabled handheld device. – М.: LAP Lambert Academic Publishing, 2010. – 180 с.
  129. Ahmed AlNunu. How Much Information Security?. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  130. Jeffy Mwakalinga. A Framework for Adaptive Information Security Systems. – М.: LAP Lambert Academic Publishing, 2011. – 364 с.
  131. Meysam Namayandeh. Development of Computer Ethical Framework for Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 132 с.
  132. Muhammad Imran Tariq. SLA based Information Security Metrics in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2014. – 192 с.
  133. Paolo Romano. Protocols for End-to-End Reliability in Multi-Tier Systems. – М.: LAP Lambert Academic Publishing, 2011. – 172 с.
  134. Sri Nivas Madishetti and Ganka Daniel Nyamsogoro. Accounting for Corporate Securities. – М.: LAP Lambert Academic Publishing, 2012. – 376 с.
  135. Zil A. Shah. Analysis of Data Recovery Awareness and Corporate Behavior. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  136. Alaa Al-Deen Mohammed Hassan. Information Security Management. – М.: LAP Lambert Academic Publishing, 2013. – 188 с.
  137. Jun Zheng,Jiantao Gu and Hong Wang. Financial Management and Information Security of Independent Colleges. – М.: LAP Lambert Academic Publishing, 2014. – 256 с.
  138. Yu Liu. The Research on Chinese Third-Party Logistics Services. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  139. Desere kokt. Establishing efficient operational work teams in private security. – М.: LAP Lambert Academic Publishing, 2010. – 132 с.
  140. Ying Qian. Mitigating Information Security Risks during Operation Transition. – М.: LAP Lambert Academic Publishing, 2012. – 372 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Страхи сильно преувеличены. интервью с В. Комлевым, генеральным директором компании United Card Services. UCS. А. Башлыков, "БДМ. Банки и деловой мир", № 11, ноябрь 2007.
  2. Законы лидерства. интервью с А. Чуркиным, директором агентства "Personnel Service/Служба персонала". "Управление персоналом", № 12, июнь 2007.
  3. Интервью с Н. Ереминой, руководителем HR-департамента Coleman Services. "Управление персоналом", № 10, май 2006.
  4. Экспертное мнение. интервью с Ю. Вировцом, генеральным директором CEO HeadHunter - Online Hiring Services. "Управление персоналом", № 9, май 2006.
  5. Технологии оптимизации обработки документов в офисе Xerox Office Services. М. Лагутин, "Финансовая газета. Региональный выпуск", № 27, июнь 2004.
  6. О качестве сервиса, связанного с запросами на медицинскую информацию. Medical Information Service?. А. Беденков, "Ремедиум", № 1, январь 2012.
  7. Мы можем управлять собственными мыслями. интервью с С. Харитоновым, врачом-психотерапевтом, психиатором, кандидатом медицинских наук, старшим научным сотрудником Московского НИИ психиатрии Росздрава РФ, членом-корреспондентом Международной академии наук. МАНЭБ, членом Британского общества когнитивных и поведенческих психотерапевтов. Membership British Association for Behavioural & Cognitive Psychoterapies / BABCP. Ф. Кульпин, "Управление персоналом", N 8, апрель 2011 г.
  8. Уильям Савадж: Мотивировать людей в Нижнем Новгороде и Новосибирске нужно по-разному". интервью с У. Саваджем, вице-президентом корпорации Intel, подразделение Software and Services Group. М. Холкина, "Управление персоналом", N 14, июль 2010 г.
  9. Критика on-line. интервью с О. Киселевой, руководителем компании World Gym Consulting. С. Сипатов, "Управление персоналом", N 14, июль 2010 г.
  10. On-line коммуникации: от классики до web 2.0-технологий. И. Широкова, "Ремедиум", № 7, июль 2010.
  11. Мы знаем границы, которые не нужно переходить. интервью с О.  Банцекиной, главой представительства Coleman Services. "Управление персоналом", N 12, июнь 2010 г.
  12. Зачетная реструктуризация долга: институт DEBT-FOR-EQUITY SWAP в России". интервью с М. Григорьевым, старшим юристом корпоративной практики юридической фирмы "Вегас-Лекс". О. Бодрягина, "эж-ЮРИСТ", № 3, январь 2010.
  13. Когда бизнес и власть встретятся on-line?. И. Пискун, "Московский бухгалтер", № 8, апрель 2009.
  14. Брендинг работодателя: как получить лучшие кадры. интервью с Н. Лучининой, генеральным директором компании "GRP-Service". Консалтинговая группа "КОНСОРТ". "Управление персоналом", № 20, октябрь 2008.
  15. Управление проектами при подборе персонала. PM for HR. Е. Кривов, "Кадровик. Рекрутинг для кадровика", № 9, сентябрь 2008.
  16. Сдача отчетности on-line: прогресс налицо. М. Дудко, "Консультант", № 13, июль 2008.
  17. On-line рекрутмент. интервью с О. Бруковской, директором по маркетингу и PR группы компаний HeadHunter, А. Куракиным, заместителем генерального директора ООО "РДВ-медиа-групп", Я. Топорковым, директором по связям с общественностью ООО "СуперДжоб", С. Сторожевым, руководителем проектов Joblist и 100 Работ. "Управление персоналом", № 7, апрель 2008.

Образцы работ

Тема и предметТип и объем работы
Характеристика систем сертификации
Стандартизация и сертификация
Реферат
17 стр.
Последствия операции НАТО
Политология
Диплом
80 стр.
Слияния и поглощения Мировая и Российская практика
Мировая экономика
Диплом
99 стр.
Продвижение брендов в шоу-бизнесе
Электроснабжение городов и промышленных предприятий
Диплом
79 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Ирина, 06.10
Юлия, хочу поблагодарить за курсовик К работе никаких претензий нет. В готовом виде я ее сдавать не буду, а испльзую в качестве материала к диплому. (А то в нашем чудесном ВУЗе об организации и построении обследования никому ничего не известно).Так что спасибо за помощь!