Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с. Alaa K. Farhan. Security Protocol for Mobile Data. – М.: LAP Lambert Academic Publishing, 2013. – 116 с. Lungisani Moyo,Trevor Chabwinja and Oluyinka Osunkunle. Freedom of the press in Zimbabwe:From the colonial era to 2009. – М.: LAP Lambert Academic Publishing, 2015. – 92 с. Kriti Jaiswal. Simulation of MANET using GloMoSim Network Simulator. – М.: LAP Lambert Academic Publishing, 2014. – 140 с. RAMARAJ RAVI. AN OPTIMUM RESTORATION ALGORITHM FOR VIRTUAL PRIVATE NETWORKS. – М.: LAP Lambert Academic Publishing, 2011. – 60 с. Debasish Jena. On Protocols for Information Security Services. – М.: LAP Lambert Academic Publishing, 2011. – 136 с. Kerem Beygo and Cihan Eraslan. Enhancing Security and Usability Features of NFC. – М.: LAP Lambert Academic Publishing, 2010. – 68 с. Дополнительные результаты Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с. Arne Beck. Competition for Public Transport Services: Institutional Framework and Empirical Evidence of Bus Services in Germany (Contributions to Economics). – М.: , 2012. – 261 с. Jean-Eric Aubert, Jean-Louis Reiffers, WORLD BANK FORUM ON KNOWLEDGE FOR DEVELO. Knowledge Economies in the Middle East and North Africa: Toward New Development Strategies (Wbi Development Studies). – М.: , 0. – 0 с. James D. Wolfensohn, Nicholas Stern, United Nations International Conference on Financing for Development. A Case for Aid: Building Consensus for Development Assistance. – М.: , 0. – 0 с. E-Business, E-Government 2002 Lisbon, Ifip Conference on E-Commerce, Paula M. C. Swatman, Luis Valadares Tavares, Joao L. Monteiro, L. Valadares Tavares. Towards the Knowledge Society: Ecommerce, Ebusiness, and Egovernment (International Federation for Information Processing, 233). – М.: , 0. – 0 с. Suzanne Woo. On Course for Business : Women and Golf. – М.: , 0. – 0 с. Arthur B. Baskin, George Kovacs, Gianni Jacucci. Cooperative Knowledge Processing for Engineering Design (International Federation for Information Processing (Series), 5.). – М.: , 0. – 0 с. Gerald Kovacich. The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition. – М.: , 0. – 0 с. Ifip Tc5, Wg5.5 Working Conference on Infrastructures for Virtual Enter, Luis M. Camarinha Matos, Luis Camarinha-Matos. Collaborative Business Ecosystems and Virtual Enterprises (IFIP INTERNATIONAL FEDERATION FOR INFORMATION PROCESSING Volume 213). – М.: , 0. – 0 с. NATO Advanced Research Workshop on Science for Reduction of Risk and s, Alik Ismail-Zadeh. Risk Science and Sustainability: Science for Reduction of Risk and Sustainable Development for Society (NATO SCIENCE SERIES II MATHEMATICS, PHYSICS AND CHEMISTRY). – М.: , 0. – 0 с. J. M. Juran. Juran on Leadership for Quality. – М.: , 0. – 0 с. Charles J. Austin, Stuart B. Boxerman. Information Systems for Healthcare Management, Sixth Edition. – М.: , 0. – 0 с. Mark B. Desman. Building an Information Security Awareness Program. – М.: , 0. – 0 с. Gerald L. Kovacich, Edward P. Halibozek. The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, First Edition. – М.: , 0. – 0 с. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с. Ifip Working Conference on Infrastructures for Virtual Organizations 2, Hamideh Afsarmanesh, Richardo J. Rabelo, Luis M. Camarinha-Matos, Luis Camarinha-Matos, Ricardo J. Rabelo. E-Business and Virtual Enterprises - Managing Business-to-Business Cooperation (International Federation For Information Processing Volume 184). – М.: , 0. – 0 с. Ifip Tc11 Wg11.5 Working Conference on Integrity and Internal Control, Michael Gertz. Integrity and Internal Control in Information Systems V: Ifip Tc11/Wg11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (Iicis), November 11-12, 2002, Bonn, Germany (International Federation for Information Processing. – М.: , 0. – 0 с. Brian Kahin, Janet Abbate. Standards Policy for Information Infrastructure. – М.: , 0. – 0 с. Steve Purser. A Practical Guide to Managing Information Security (Artech House Technology Management Library). – М.: , 0. – 0 с. Society for Marketing Professional Services. Marketing Handbook for the Design & Construction Professional: Society for Marketing Professional Services. – М.: , 0. – 0 с. Marian Quigley, Marian Quiqley. Information Security and Ethics: Social and Organizational Issues. – М.: , 0. – 0 с. Roland Traunmuller, R. Traunmuller, Quebec) Ifip World Computer Congress 2002 Montreal. Information Systems: The E-Business Challenge (International Federation for Information Processing, 95). – М.: , 0. – 0 с. Mostafa Hashem Sherif. Protocols for Secure Electronic Commerce, Second Edition. – М.: , 0. – 0 с. E-Business, E-Government 2003 Sao paul Ifip Conference on E-Commerce, Manuel J. Mendes, Reima Suomi, Carlos Passos, International Federation for Information Processing, Kluwer Academic Publishers. Digital Communities in a Networked Society: e-Commerce, e-Business and e-Government (International Federation for Information Processing). – М.: , 0. – 0 с. C. Warren Axelrod, Axelrod. Outsourcing Information Security. – М.: , 0. – 0 с. Harold F. Tipton, Micki Krause, Micki, Cissp Krause. Information Security Management Handbook, Fifth Edition. – М.: , 0. – 0 с. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с. Mavis A. Ampah. Connecting Sub-Saharan Africa: A World Bank Group Strategy for Information and Communication Technology Sector Development (World Bank Working Papers) (World Bank Working Papers). – М.: , 2005. – 0 с. Seeking Success in e-Business : A Multidisciplinary Approach (IFIP International Federation for Information Processing). – М.: , 2003. – 0 с. IT Innovation for Adaptability and Competitiveness (IFIP International Federation for Information Processing). – М.: , 2004. – 0 с. Economics of Information Security (Advances in Information Security). – М.: , 2004. – 0 с. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с. Lifelong Learning in the Digital Age : Sustainable for All in a Changing World (IFIP International Federation for Information Processing). – М.: , 2004. – 0 с. Building the E-Service Society : E-Commerce, E-Business, and E-Government (IFIP International Federation for Information Processing). – М.: , 2004. – 0 с. E-Training Practices for Professional Organizations (IFIP International Federation for Information Processing). – М.: , 2004. – 0 с. Information and Communication Technologies and Real-Life Learning : New Education for the Knowledge Society (IFIP International Federation for Information Processing). – М.: , 2005. – 0 с. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с. Ira Winkler. Zen and the Art of Information Security. – М.: , 2007. – 192 с. Randy Okray, Thomas Lubnau II. Crew Resource Management for the Fire Service. – М.: , 2004. – 300 с. Committee on Federal Regulation of Securities Committee. The Fund Director's Guidebook: Third Edition (Fund Director's Guidebook). – М.: , 2006. – 128 с. Timothy P. Layton. Information Security. – М.: , 2006. – 222 с. L. Peter Edles. Fundraising: Hands-On Tactics for Nonprofit Groups. – М.: McGraw-Hill Irwin, 2005. – 288 с. Michael E. Whitman, Herbert J. Mattord. Principles of Information Security, Second Edition. – М.: , 2004. – 600 с. American Society for Healthcare Central Services Professionals. Training Manual for Health Care Central Service Technicians (Jossey-Bass/Aha Press). – М.: , 2005. – 304 с. Mehdi Khosrow-Pour. Web Technologies for Commerce and Services Online. – М.: Idea Group Reference, 2007. – 392 с. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с. Keith Jahn, Rebecca Lawson. Transforming IT: A Five-Step Plan for Adopting a Service-Centric IT Model. – М.: , 2008. – 126 с. Social and Human Elements of Information Security: Emerging Trends and Countermeasures (Premier Reference Source). – М.: , 2008. – 412 с. Jennie Deneka. Creating an Informed Customer Service Model: Using Action Research. – М.: , 2008. – 104 с. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с. Gerard Blokdijk, Ivanka Menken. Information Security Management Best Practice Workbook: Implementation and Management Roadmap for Threats, Challenges and Solutions - Ready to use supporting documents bringing Theory into Practice. – М.: , 2008. – 124 с. Planning for Information Systems (Advances in Management Information Systems). – М.: , 2009. – 528 с. T.R. Ramanathan. The Role of Organisational Change Management in Offshore Outsourcing of Information Technology Services: Qualitative Case Studies from a Multinational Pharmaceutical Company. – М.: , 2009. – 188 с. W. Krag Brotby. Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement. – М.: Auerbach Publications, 2009. – 200 с. Alan Calder. Information Security based on ISO 27001/ISO 27002: A Management Guide. – М.: , 2009. – 83 с. Bel G. Raggad. Information Security Management: Concepts and Practice. – М.: , 2010. – 871 с. Michael E. Whitman, Herbert J. Mattord. Management of Information Security. – М.: , 2010. – 592 с. Sid Sirisukha. Protecting Management Information Systems: VPN Competitive Advantage. – М.: , 2010. – 316 с. Alan Calder, Steve G Watkins. Information Security Risk Management for ISO27001 / ISO27002. – М.: , 2010. – 198 с. William Manning. CISM Certified Information Security Manager Certification Exam Preparation Course in a Book for Passing the CISM Exam - The How To Pass on Your First Try Certification Study Guide. – М.: , 2010. – 188 с. Vicky Gallas. The Complete Blueprint for an Escort Service. – М.: , 2010. – 220 с. Andy Jones. Risk Management for Computer Security. – М.: , 2010. – 296 с. Evan Wheeler. Security Risk Management: Building an Information Security Risk Management Program from the Ground Up. – М.: , 2011. – 360 с. Editors Karl Maria Michael de Leeuw, Jan Bergstra. The History of Information Security: A Comprehensive Handbook. – М.: Elsevier Science, 2007. – 900 с. Margaret Matthews, Katy Salisbury. Focus on Skills for IELTS Foundation (+ CD). – М.: Pearson Education Limited, 2007. – 176 с. Broadband Satellite Communication Systems and the Challenges of Mobility : IFIP TC6 Workshops on Broadband Satellite Communication Systems and Challenges ... Federation for Information Processing). – М.: , 2005. – 247 с. Global Perspectives In Information Security. – М.: , 2008. – 896 с. Harlan Carvey. Perl Scripting for Windows Security. – М.: , 2010. – 232 с. Eiji Arai. Mechatronics for Safety, Security and Dependability in a New Era. – М.: , 2010. – 464 с. Shigeru Yamamoto. Systems and Human Science - For Safety, Security and Dependability. – М.: , 2010. – 350 с. Gerald L. Kovacich. The Manager's Handbook for Corporate Security. – М.: , 2010. – 463 с. Philip Holder. Defensive Tactics for the Security Professional. – М.: , 2010. – 164 с. John R. Vacca. Managing Information Security. – М.: , 2010. – 320 с. G. Manoilov. Elsevier's Dictionary of Information Security. – М.: , 2010. – 772 с. David Samuelson. Hands-on Manual for Cinematographers. – М.: , 2010. – 400 с. Anthony Piltzecker. Microsoft Vista for IT Security Professionals. – М.: , 2010. – 672 с. B. Bouchon-Meunier. Intelligent Systems for Information Processing: From Representation to Applications. – М.: , 2010. – 488 с. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с. George L Stefanek. Information Security Best Practices. – М.: , 2010. – 160 с. Sari Greene. Sustainable Information Security. – М.: , 2010. – 400 с. John R. Vacca. Computer and Information Security Handbook. – М.: , 2010. – 928 с. Giridhar D. Mandyam. Third Generation CDMA Systems for Enhanced Data Services. – М.: , 2010. – 300 с. W. Wisden. In Situ Hybridization Protocols for the Brain,47. – М.: , 2010. – 272 с. Ds Patterson. Computing Unbound – Hands–On Exercises for the IBM PC. – М.: , 1989. – 288 с. Da Patterson. Computing Unbound – Hands–On Exercises for the Macintosh. – М.: , 1989. – 320 с. John Mingers. Social Theory and Philosophy for Information Systems. – М.: , 2004. – 472 с. Lincoln C Chen. Global Health Challenge for Human Security. – М.: , 2004. – 328 с. Daniel Brown. Memory, Trauma Treatment & the Law – An Essential Reference on Memory for Clinicians, Researchers, Attorneys & Judges. – М.: , 1998. – 800 с. Paul Joyce. Leadership and Strategic Management for the Public Services. – М.: , 2006. – 288 с. Timothy A. Craul. Soil Design Protocols for Landscape Architects and Contractors. – М.: , 1995. – 0 с. Raya Fidel. Database Design for Information Retrieval. – М.: , 1987. – 232 с. Krag Brotby. Information Security Governance. – М.: , 2009. – 190 с. Harold F. Tipton, Micki Krause. Information Security Management Handbook on CD-ROM, 2003 Edition. – М.: , . – с. Priyadarshini Sabut. An Enhanced Medium Access Control Protocol for Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2013. – 60 с. Rohana Mohamad Rashid. Determining Influencing Factors of Information Security Culture. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Samundiswary Punniakodi and Dananjayan Perumal. Trust Based Routing Protocols for Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2015. – 120 с. Md. Jahangir Toimoor. Scalability of Modified AODV-UU Routing Protocol for Smart Grid. – М.: LAP Lambert Academic Publishing, 2014. – 88 с. Tejpal Dhewa. Protocols for Evaluation of Probiotic Attributes of Lactic Cultures. – М.: LAP Lambert Academic Publishing, 2012. – 68 с. C. R. Prajapati,K. P. Singh and A. K. Gupta. Plant Disease Management for Food Security. – М.: LAP Lambert Academic Publishing, 2013. – 676 с. Chukwudi Oparaku. Implication of BOKO HARAM ACTIVITIES for national security in Nigeria. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Bakut Tswah Bakut. The Human Quest for Physiological-security. – М.: Scholars' Press, 2014. – 224 с. Deepak Puthal and Bibhudatta Sahoo. Secure Data Collection & Critical Data Transmission in Mobile Sink WSN. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Prasad Lokulwar,Vivek Shelkhe and Mangesh Ghonge. Security Aware Routing protocol for MANET. – М.: LAP Lambert Academic Publishing, 2012. – 84 с. Marco Fotino. Energy Behavior of Routing Protocols for Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2014. – 144 с. Xianhui Che. Control Protocol for Optical Packet Switched Local Area Network. – М.: LAP Lambert Academic Publishing, 2014. – 188 с. Sushant Sudhakar Bahekar and Prashant Panse. Energy Efficient Mechanism for Detection of Wormhole Attacks. – М.: LAP Lambert Academic Publishing, 2014. – 72 с. Hong Yu. A Protocol for Multimedia Transmission over Wireless Networks. – М.: LAP Lambert Academic Publishing, 2012. – 272 с. Jawad Shafi and Rab Nawaz Jadoon. A Study on Datagram Congestion Control Protocol for Multimedia. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Marimuthu Kanagaraj and Eswari Venkatachalam. Multifactor Authentication Protocol for a Secured WSN. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Haitham ELwahsh. Secure Service Discovery Protocol for ad-hoc Networks "hash function". – М.: LAP Lambert Academic Publishing, 2013. – 144 с. Samer Bali. Routing Protocols for Ultra-Wideband Mobile Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2011. – 100 с. Yedji Mbangsoua and Dr. Freddie Acosta. Information Security and its Investment Justification. – М.: LAP Lambert Academic Publishing, 2011. – 132 с. E. Madhusudhana Reddy. Development of Secure Protocols for MHIS Using RMPJK–RSA Cryptosystem. – М.: LAP Lambert Academic Publishing, 2011. – 204 с. Yasser Alshehri. Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 156 с. Julien Shabani. Information Security for RFID Systems. – М.: LAP Lambert Academic Publishing, 2011. – 92 с. Debasish Jena. On Protocols for Information Security Services. – М.: LAP Lambert Academic Publishing, 2011. – 136 с. Aliyu Onipede. Biometrics as a tool for Information Security in Aviation industry. – М.: LAP Lambert Academic Publishing, 2012. – 88 с. Manoj Kumar Verma and U. N. Singh. Impact of Internet on Library and Information Services of IITs. – М.: LAP Lambert Academic Publishing, 2012. – 164 с. Furhan Mehmood and Rajia Rafique. Information Security in Financial Organizations. – М.: LAP Lambert Academic Publishing, 2010. – 68 с. RAFAEL IBARRA and Silvia Ballesteros. Infopragmatics: an efficient method for information retrieval. – М.: LAP Lambert Academic Publishing, 2010. – 60 с. Zhishun Wang and Qifei Lu. A Method for Analyzing Security of SOA-based Systems. – М.: LAP Lambert Academic Publishing, 2011. – 68 с. Omar Zakaria. Information Security Culture. – М.: LAP Lambert Academic Publishing, 2013. – 248 с. frankie tvrz and marijke coetzee. Information Security of a Bluetooth-enabled handheld device. – М.: LAP Lambert Academic Publishing, 2010. – 180 с. Ahmed AlNunu. How Much Information Security?. – М.: LAP Lambert Academic Publishing, 2010. – 68 с. Jeffy Mwakalinga. A Framework for Adaptive Information Security Systems. – М.: LAP Lambert Academic Publishing, 2011. – 364 с. Meysam Namayandeh. Development of Computer Ethical Framework for Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 132 с. Muhammad Imran Tariq. SLA based Information Security Metrics in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2014. – 192 с. Paolo Romano. Protocols for End-to-End Reliability in Multi-Tier Systems. – М.: LAP Lambert Academic Publishing, 2011. – 172 с. Sri Nivas Madishetti and Ganka Daniel Nyamsogoro. Accounting for Corporate Securities. – М.: LAP Lambert Academic Publishing, 2012. – 376 с. Zil A. Shah. Analysis of Data Recovery Awareness and Corporate Behavior. – М.: LAP Lambert Academic Publishing, 2012. – 96 с. Alaa Al-Deen Mohammed Hassan. Information Security Management. – М.: LAP Lambert Academic Publishing, 2013. – 188 с. Jun Zheng,Jiantao Gu and Hong Wang. Financial Management and Information Security of Independent Colleges. – М.: LAP Lambert Academic Publishing, 2014. – 256 с. Yu Liu. The Research on Chinese Third-Party Logistics Services. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Desere kokt. Establishing efficient operational work teams in private security. – М.: LAP Lambert Academic Publishing, 2010. – 132 с. Ying Qian. Mitigating Information Security Risks during Operation Transition. – М.: LAP Lambert Academic Publishing, 2012. – 372 с. Лучшие результаты Ничего не найдено Дополнительные результаты Страхи сильно преувеличены. интервью с В. Комлевым, генеральным директором компании United Card Services. UCS. А. Башлыков, "БДМ. Банки и деловой мир", № 11, ноябрь 2007. Законы лидерства. интервью с А. Чуркиным, директором агентства "Personnel Service/Служба персонала". "Управление персоналом", № 12, июнь 2007. Интервью с Н. Ереминой, руководителем HR-департамента Coleman Services. "Управление персоналом", № 10, май 2006. Экспертное мнение. интервью с Ю. Вировцом, генеральным директором CEO HeadHunter - Online Hiring Services. "Управление персоналом", № 9, май 2006. Технологии оптимизации обработки документов в офисе Xerox Office Services. М. Лагутин, "Финансовая газета. Региональный выпуск", № 27, июнь 2004. О качестве сервиса, связанного с запросами на медицинскую информацию. Medical Information Service?. А. Беденков, "Ремедиум", № 1, январь 2012. Мы можем управлять собственными мыслями. интервью с С. Харитоновым, врачом-психотерапевтом, психиатором, кандидатом медицинских наук, старшим научным сотрудником Московского НИИ психиатрии Росздрава РФ, членом-корреспондентом Международной академии наук. МАНЭБ, членом Британского общества когнитивных и поведенческих психотерапевтов. Membership British Association for Behavioural & Cognitive Psychoterapies / BABCP. Ф. Кульпин, "Управление персоналом", N 8, апрель 2011 г. Уильям Савадж: Мотивировать людей в Нижнем Новгороде и Новосибирске нужно по-разному". интервью с У. Саваджем, вице-президентом корпорации Intel, подразделение Software and Services Group. М. Холкина, "Управление персоналом", N 14, июль 2010 г. Критика on-line. интервью с О. Киселевой, руководителем компании World Gym Consulting. С. Сипатов, "Управление персоналом", N 14, июль 2010 г. On-line коммуникации: от классики до web 2.0-технологий. И. Широкова, "Ремедиум", № 7, июль 2010. Мы знаем границы, которые не нужно переходить. интервью с О. Банцекиной, главой представительства Coleman Services. "Управление персоналом", N 12, июнь 2010 г. Зачетная реструктуризация долга: институт DEBT-FOR-EQUITY SWAP в России". интервью с М. Григорьевым, старшим юристом корпоративной практики юридической фирмы "Вегас-Лекс". О. Бодрягина, "эж-ЮРИСТ", № 3, январь 2010. Когда бизнес и власть встретятся on-line?. И. Пискун, "Московский бухгалтер", № 8, апрель 2009. Брендинг работодателя: как получить лучшие кадры. интервью с Н. Лучининой, генеральным директором компании "GRP-Service". Консалтинговая группа "КОНСОРТ". "Управление персоналом", № 20, октябрь 2008. Управление проектами при подборе персонала. PM for HR. Е. Кривов, "Кадровик. Рекрутинг для кадровика", № 9, сентябрь 2008. Сдача отчетности on-line: прогресс налицо. М. Дудко, "Консультант", № 13, июль 2008. On-line рекрутмент. интервью с О. Бруковской, директором по маркетингу и PR группы компаний HeadHunter, А. Куракиным, заместителем генерального директора ООО "РДВ-медиа-групп", Я. Топорковым, директором по связям с общественностью ООО "СуперДжоб", С. Сторожевым, руководителем проектов Joblist и 100 Работ. "Управление персоналом", № 7, апрель 2008. Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Ирина, 06.10 Юлия, хочу поблагодарить за курсовик К работе никаких претензий нет. В готовом виде я ее сдавать не буду, а испльзую в качестве материала к диплому. (А то в нашем чудесном ВУЗе об организации и построении обследования никому ничего не известно).Так что спасибо за помощь!