Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Timothy Stapko. Practical Embedded Security: Building Secure Resource-Constrained Systems. – М.: Newnes, 2007. – 480 с.

Дополнительные результаты

  1. Ron Ashkenas, Todd Jick, Dave Ulrich, Catherine Paul-Chowdhury. The Boundaryless Organization Field Guide: Practical Tools for Building the New Organization. – М.: Jossey-Bass, 1998. – 416 с.
  2. Gordon Curphy, Robert Hogan. The Rocket Model: Practical Advice for Building High Performing Teams. – М.: , 2012. – 198 с.
  3. Jody Zall Kusek, Marelize Goergens. Monitoring and Evaluation Systems That Work: A Resource for Development Practitioners. – М.: , 2012. – 0 с.
  4. Security and Development in Global Politics: A Critical Comparison. – М.: , 2012. – 360 с.
  5. Mohammad Jasim Uddin. Human Resource Practices in Microfinance Institutions of Bangladesh: Contemporary human resource strengths and challenges. – М.: , 2012. – 76 с.
  6. William T. Moore. Real Options and Option-Embedded Securities. – М.: , 0. – 0 с.
  7. Safe Schools: A Security and Loss Prevention Plan. – М.: , 0. – 0 с.
  8. Peter Docherty, Jan Forslin, A. B. Shani, A.B. Shani. Creating Sustainable Work Systems: Emerging Perspectives and Practice. – М.: , 0. – 0 с.
  9. William E. Grant, Ellen K. Pedersen, Sandra L. MarA­n. Ecology and Natural Resource Management : Systems Analysis and Simulation. – М.: , 0. – 0 с.
  10. Martin L. Leibowitz. Franchise Value : A Modern Approach to Security Analysis (Wiley Finance). – М.: , 0. – 0 с.
  11. Timothy Braithwaite. Securing E-Business Systems: A Guide for Managers and Executives. – М.: , 0. – 0 с.
  12. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с.
  13. Andrew Hawker. Security in Information Systems : A Guide for Business and Accounting. – М.: , 0. – 0 с.
  14. Ifip Tc11 Wg11.5 Working Conference on Integrity and Internal Control, Michael Gertz. Integrity and Internal Control in Information Systems V: Ifip Tc11/Wg11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (Iicis), November 11-12, 2002, Bonn, Germany (International Federation for Information Processing. – М.: , 0. – 0 с.
  15. Preventing Corporate Embezzlement. – М.: , 0. – 0 с.
  16. Peter Docherty, Jan Forslin, A. B. Shani. Creating Sustainable Work Systems: Emerging Perspectives and Practice. – М.: , 0. – 0 с.
  17. Kate Thomsen. Building Resilient Students: Integrating Resiliency into What You Already Know and Do. – М.: , 0. – 0 с.
  18. David Vine. Internet Business Intelligence: How to Build a Big Company System on a Small Company Budget. – М.: Cyberage Books, 2000. – 464 с.
  19. Edward C. Schumacher, Timothy L. Seiler. Building Your Endowment (Jossey-Bass Nonprofit and Public Management Series). – М.: , 0. – 0 с.
  20. Wendi Pohs, Gayle Thiel, Seth Earley, Marianne White. Practical Knowledge Management: The Lotus Discovery System. – М.: , 0. – 0 с.
  21. G. William Quatman. The Architect's Guide to Design-Build Services. – М.: , 2003. – 0 с.
  22. In Search of Sustainable Livelihood Systems: Managing Resources and Change. – М.: , 2004. – 0 с.
  23. Efraim Turban. Electronic Commerce 2004: A Managerial Perspective, Third Edition. – М.: , 2003. – 0 с.
  24. Carol L. Barbeito. Human Resource Policies and Procedures for Nonprofit Organizations. – М.: , 2004. – 0 с.
  25. Christopher Eiben. It Pays to be Paranoid : Securing Business Success by Preparing for the Worst. – М.: , 2004. – 0 с.
  26. Edward Borodzicz. Risk, Crisis and Security Management. – М.: , 2005. – 0 с.
  27. Second-Wave Enterprise Resource Planning Systems : Implementing for Effectiveness. – М.: , 2003. – 0 с.
  28. Eric A. Marks, Michael Bell. Service-Oriented Architecture (SOA): A Planning and Implementation Guide for Business and Technology. – М.: Wiley, 2006. – 384 с.
  29. Betty E. Biringer, Rudolph V. Matalucci, Sharon L. O'Connor. Security Risk Assessment and Management: A Professional Practice Guide for Protecting Buildings and Infrastructures. – М.: , 2007. – 384 с.
  30. Stewart/Hill. Management Development: Perspectives from Research and Practice (Routledge Studies in Human Resource Development). – М.: , 2007. – 0 с.
  31. Switzerland Business & Investment Handbook: Economy, Law, Taxation, Real Estate, Residence, Facts & Figures, Key Addresses. – М.: , 2006. – 766 с.
  32. Robert M. Doroghazi, Dan W. French. The Physician's Guide To Investing: A Practical Approach To Building Wealth. – М.: , 2005. – 228 с.
  33. Tay Kratzer, Erno de Korte. Novell GroupWise 7 Administrator Solutions Guide. – М.: , 2005. – 936 с.
  34. Encyclopedia of Human Resources Information Systems: Challenges in E-hrm. – М.: , 2008. – 1010 с.
  35. Michael V. Frank. Choosing Safety: A Guide to Using Probabilistic Risk Assessment and Decision Analysis in Complex, High Consequence Systems (Rff Press). – М.: , 2008. – 242 с.
  36. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с.
  37. V.R. Leonard. The Social Security and Medicare Handbook: What You Need to Know Explained Simply. – М.: , 2008. – 288 с.
  38. Handbook on Information Technology in Finance (International Handbooks on Information Systems). – М.: , 2008. – 800 с.
  39. Towards Sustainable Society on Ubiquitous Networks: The 8th IFIP Conference on e-Business, e-Services, and e-Society (I3E 2008), September 24 - 26, 2008, ... Federation for Information Processing). – М.: , 2008. – 366 с.
  40. Stephen Hardison, David Byrd, Gary Wood, Tim Speed, Michael Martin, Suzanne Livingston, Jason Moore. IBM Lotus Connections 2.5: Planning and Implementing Social Software for Your Enterprise. – М.: , 2010. – 456 с.
  41. Martin Fahy. Enterprise Resource Planning Systems. – М.: , 2010. – 0 с.
  42. Severin Grabski, Stewart Leech, Alan Sangster. Management Accounting in Enterprise Resource Planning Systems. – М.: CIMA Publishing, 2010. – 162 с.
  43. Jeffrey C. Hooke. Security Analysis and Business Valuation on Wall Street + Companion Web Site: A Comprehensive Guide to Today's Valuation Methods. – М.: Wiley, 2010. – 408 с.
  44. Ehud Reiter, Robert Dale, Branimir Boguraev, Steven Bird, Don HIndle, Martin Kay, David McDonald, Hans Uszkoreit. Building Natural Language Generation Systems (Studies in Natural Language Processing). – М.: , 0. – 0 с.
  45. Ehud Reiter, Robert Dale. Building Natural Language Generation Systems (Studies in Natural Language Processing). – М.: , 2006. – 272 с.
  46. David Shapiro. Old Electrical Wiring: Evaluating, Repairing, and Upgrading Dated Systems. – М.: , 2010. – 352 с.
  47. Color Theory and Its Application in Art and Design (With 55 Figures and 6 Color Plates) (IFIP International Federation for Information Processing). – М.: , 2008. – 248 с.
  48. Learning to Live in the Knowledge Society: IFIP 20th World Computer Congress, IFIP TC 3 ED-L2L Conference, September 7-10, 2008, Milano, Italy (IFIP International ... Federation for Information Processing). – М.: , 2008. – 374 с.
  49. Michael V. Frank. Choo Safety: A Guide to Using Probabilistic Risk Assessment and Decision Analysis in Complex, High Consequence Systems (Rff Press). – М.: , 2008. – 241 с.
  50. Richard H. Cushman, Jedrzej Sniatycki. Geometry of Nonholonomically Constrained Systems (Nonlinear Dynamics). – М.: , 2010. – 420 с.
  51. Josh Shaul. Practical Oracle Security. – М.: , 2010. – 288 с.
  52. John Park. Practical Embedded Controllers. – М.: , 2010. – 272 с.
  53. John Park. Practical Data Acquisition for Instrumentation and Control Systems. – М.: , 2010. – 432 с.
  54. Dave Macdonald. Practical Industrial Safety, Risk Assessment and Shutdown Systems. – М.: , 2010. – 384 с.
  55. Jeffrey Price. Practical Aviation Security. – М.: , 2010. – 416 с.
  56. Timothy Braithwaite. Securing E–Business Systems. – М.: , 2002. – 288 с.
  57. Christa Anderson and Kristin L. Griffin. Windows Server 2008 R2: Remote Desktop Services: Resource Kit (+ CD-ROM). – М.: Microsoft Press, 2010. – 718 с.
  58. Open Source Development, Communities and Quality: IFIP 20th World Computer Congress, Working Group 2.3 on Open Source Software, September 7-10, 2008, ... in Information and Communication Technology). – М.: , 2011. – 417 с.
  59. W. Moore. Valuing Real Options and Option–Embedded Securities. – М.: , 2001. – 304 с.
  60. Managerial Issues Of Enterprise Resource Planning Systems. – М.: , 2003. – 336 с.
  61. Building Information Modeling: Planning And Managing Construction Projects With 4D Cad And Simulations (Mcgraw-Hill Construction Series). – М.: , 2011. – 270 с.
  62. The Complete Book Of Home, Site And Office Security. – М.: , 2011. – 309 с.
  63. Designing And Building Fuel Cells. – М.: , 2011. – 434 с.
  64. Hr Transformation: Building Human Resources From The Outside In. – М.: , 2011. – 256 с.
  65. Information Technology In Water And Wastewater Utilities, Wef Mop 33. – М.: , 2011. – 376 с.
  66. Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky. Cisco Security Professional's Guide to Secure Intrusion Detection Systems. – М.: , . –  с.
  67. Thomas Porter, Jan Kanclirz Jr. Practical VoIP Security. – М.: Syngress, 2006. – 564 с.
  68. Yi Qian, James Joshi, David Tipper, Prashant Krishnamurthy. Information Assurance: Dependability and Security in Networked Systems. – М.: Morgan Kaufmann, 2007. – 576 с.
  69. Timothy Stapko. Practical Embedded Security: Building Secure Resource-Constrained Systems. – М.: Newnes, 2007. – 480 с.
  70. Eduardo Fernandez-Buglioni. Security Patterns in Practice: Designing Secure Architectures Using Software Patterns. – М.: Wiley, 2013. – 582 с.
  71. Bruce Dang, Alexandre Gazet, Elias Bachaalany. Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation. – М.: Wiley, 2014. – 384 с.
  72. Bruce Dang, Alexandre Gazet, Elias Bachaalany, Sebastien Josse. Practical Reverse Engineering. – М.: John Wiley and Sons, Ltd, 2014. – 384 с.
  73. Papri Ghosh and Ritam Dutta. Adaptive Approach towards Biometric Authentication System. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  74. Behrouz Maham. Resource-Constrained Cooperative Wireless Networks. – М.: LAP Lambert Academic Publishing, 2010. – 248 с.
  75. Yamille del Valle. Optimization of Power System Performance using FACTS devices. – М.: LAP Lambert Academic Publishing, 2010. – 236 с.
  76. Syed Wahaj Ul Haq,Shahzad Ahmed and Tehseen Sattar. Differential QPSK Based Communication System. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  77. Mouaaz Nahas. Time-Triggered Embedded Systems. – М.: LAP Lambert Academic Publishing, 2013. – 580 с.
  78. Ruben Johnnson Robert Jeremiah,Sakthivel Murugan Shamjith and Allen Vimal. Security System of Oilfield using Wireless in PLC & TESTBED for SCADA. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  79. Huang Huang. Power and Thermal-Aware Scheduling for Real-time Computing Systems. – М.: LAP Lambert Academic Publishing, 2013. – 108 с.
  80. Bishnu Upreti. Management of Natural Resource Conflict in Nepal. – М.: LAP Lambert Academic Publishing, 2010. – 224 с.
  81. Rogers Bariyo and Pascal T. Ngoboka. Community participation for healthcare delivery. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  82. Sibonokuhle Ndlovu. The State of Indigenous Knowledge Systems in Zimbabwe. – М.: LAP Lambert Academic Publishing, 2012. – 140 с.
  83. Simon Ameh Ejembi. Factors affecting resource management practices by farmers in Okpokwu. – М.: LAP Lambert Academic Publishing, 2013. – 136 с.
  84. Abate Shiferaw. Indigenous Rangeland and Water Resources Management Practices. – М.: LAP Lambert Academic Publishing, 2011. – 140 с.
  85. Patricia Chogugudza. Shona Women under Patriarchy: From Feminism to African Womanism. – М.: Scholars' Press, 2014. – 188 с.
  86. A. K. Singh Kashyap,Mandhata Singh and S. P. Singh. Short duration kharif Crop production in Agrihorticultural System. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  87. Mahesh Pathak,Parvez Qamar Rizvi and Pradyumn Kumar. Natural Enemy Fauna in Rice-Wheat System of India. – М.: LAP Lambert Academic Publishing, 2012. – 356 с.
  88. Most. Sharmin Islam,Md. Shahedur Rashid and Md. Zakiur Rahman. Practice of Green Building Technologies and Water Conservation Process. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  89. A. K. Singh. Soil Resource Information System. – М.: LAP Lambert Academic Publishing, 2012. – 184 с.
  90. Bidyut Kumar Mal. Building e-Resource Collection. – М.: LAP Lambert Academic Publishing, 2013. – 268 с.
  91. Fouad Zaro and Mohammad Abido. Multi-Objective Optimal Power Flow. – М.: LAP Lambert Academic Publishing, 2010. – 104 с.
  92. Saeed Toosizadeh and Seyyed Mohammad Reza Farshchi. Rule-based Programming for Building Expert Systems. – М.: LAP Lambert Academic Publishing, 2011. – 452 с.
  93. Puyesh Kant Sharma. Environmental Security and Armed Conflict in Jammu and Kashmir. – М.: LAP Lambert Academic Publishing, 2013. – 124 с.
  94. Tamasi Moyra and Rajsekhar Panua. Building Integrated Photovoltaic (BIPV) system. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  95. Ravindra Reddy and SARJAN RAO. Sheep Management Practices. – М.: LAP Lambert Academic Publishing, 2011. – 228 с.
  96. Mohamed Ghareeb. Decision Support System for Water Demand Management in Egypt. – М.: LAP Lambert Academic Publishing, 2011. – 164 с.
  97. K K Shukla and S. Agrawal. Advances in Real Time Task Scheduling. – М.: LAP Lambert Academic Publishing, 2011. – 220 с.
  98. Subhankar Chattopadhyay and Ashok Kumar Turuk. Key Pre-distribution and Key Revocation in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2011. – 72 с.
  99. Ehsan Khorasani Esmaeili. Secure Keyboard logging system. – М.: LAP Lambert Academic Publishing, 2013. – 124 с.
  100. Munnujahan Ara. Reliable and Secure Wireless Communications Systems. – М.: Scholars' Press, 2014. – 140 с.
  101. Rupa Ch. and Avadhani P. S. Modern Security Methods in Applied Computer Science. – М.: Scholars' Press, 2014. – 124 с.
  102. S. A. Ahsan Rajon. Energy Efficient Data Communication for Resource Constrained Systems. – М.: LAP Lambert Academic Publishing, 2014. – 84 с.
  103. Mohammad AlAhmad. Security threats of finger print biometric in network system. – М.: LAP Lambert Academic Publishing, 2014. – 88 с.
  104. Pragati Patil-Bedekar. Energy & Time Performance Metrics in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  105. Sohail Abbas. A Layered Security Approach for Cooperation Enforcement in MANETs. – М.: LAP Lambert Academic Publishing, 2012. – 280 с.
  106. Supakorn Kungpisdan. Securing Mobile Payments: Modelling, Design, and Analysis. – М.: LAP Lambert Academic Publishing, 2010. – 336 с.
  107. Kirat Pal Singh. MIPS Pipeline Cryptoprocessor. – М.: LAP Lambert Academic Publishing, 2012. – 480 с.
  108. Govind Sreekar Shenoy. Architecture Support for Intrusion Detection systems. – М.: LAP Lambert Academic Publishing, 2014. – 160 с.
  109. Britto R. Kumar and Albert S. Rabara. An Architecture for Secure Mobile Payment System using PKI. – М.: LAP Lambert Academic Publishing, 2013. – 184 с.
  110. Tilaye Bitew Bezu. Building a Soil Information System for Multi-Source Data Integration. – М.: LAP Lambert Academic Publishing, 2011. – 160 с.
  111. Raghavendra K. R. Model-checking infinite state systems for information flow security. – М.: LAP Lambert Academic Publishing, 2014. – 160 с.
  112. Tiwonge Davis Manda. mHealth in Resource-constrained Settings:. – М.: LAP Lambert Academic Publishing, 2011. – 136 с.
  113. Yorrick Bakker. Back to the Future of Human Resource Information Systems?. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  114. Kefa Rabah. Mastering Securing ICT Infrastructure for Corporate Network. – М.: LAP Lambert Academic Publishing, 2014. – 360 с.
  115. Md. Rabiul Islam and M. Abdul Goffar Khan. Retina Recognition: Secure Biometric Authentication System. – М.: LAP Lambert Academic Publishing, 2012. – 72 с.
  116. Raed Alsaqour and Yap Earn. Searchable Symmetric Encryption. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  117. Simon Kawuma and Robert Mugonza. Modeling in Event-B A Practical Approach for Systems Engineers. – М.: LAP Lambert Academic Publishing, 2015. – 96 с.
  118. Raghavendra Kagalavadi Ramesh,Deepak D'Souza and Barbara Sprick. Model checking trace-based information flow properties. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  119. Julien Shabani. Information Security for RFID Systems. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.
  120. Khalil Zebbiche. Digital Watermarking For Securing Fingerprint Data. – М.: LAP Lambert Academic Publishing, 2012. – 156 с.
  121. Krzysztof Wolk. Building an Internet Radio System. – М.: LAP Lambert Academic Publishing, 2013. – 188 с.
  122. Nirmalya Kar and Sharmistha Roy. Secure Electronic Voting. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  123. Ardi Tjandra. Developing A Web Community System For Swiss German University. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  124. Stephen Murove,S. B. Mangena and B. Jones. Firewall Evaluation:Models for Major Decisions in Computer Security. – М.: LAP Lambert Academic Publishing, 2014. – 236 с.
  125. Muhammad Qaiser Saleem,Jafreezal Jaafar and Mohd Fadzil Hassan. Modeling Security Objectives along BPM of SOA Applications. – М.: LAP Lambert Academic Publishing, 2013. – 236 с.
  126. Yiran Shen. Addressing Problems of Embedded Systems via Compressive Sensing. – М.: LAP Lambert Academic Publishing, 2015. – 188 с.
  127. Md. Rajibul Islam. A Secure Personal Identification System. – М.: LAP Lambert Academic Publishing, 2010. – 196 с.
  128. Richard Rimiru. Exploring Immune System's Concepts for the Design of Novel AIS Models. – М.: LAP Lambert Academic Publishing, 2012. – 164 с.
  129. Mohamed Khalgui. Reconfigurable Embedded Control Systems. – М.: LAP Lambert Academic Publishing, 2012. – 176 с.
  130. Saravanakumar V and Jain D.K. Production Efficiency and Pricing Policy for Milk. – М.: LAP Lambert Academic Publishing, 2010. – 192 с.
  131. Amare Abawa. SYSTEMS ANALYSIS AND DESIGN:. – М.: LAP Lambert Academic Publishing, 2010. – 152 с.
  132. Wasim Khaliq and Muhammad Ishtiaq Ishaq. HRM Systems, Employee Behavior and Performance. – М.: LAP Lambert Academic Publishing, 2013. – 108 с.
  133. Nivin Abdelmeguid. Strategic Human Resource Management and Organizational Performance. – М.: LAP Lambert Academic Publishing, 2014. – 132 с.
  134. Sudhir Awati and Rajendra Kumbhar. Human Resource Information System in Private Engineering Institute. – М.: LAP Lambert Academic Publishing, 2012. – 56 с.
  135. Erdem Ozleyen. A Genetic Algorithm for Resource-Constrained Project Scheduling. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  136. Mohammed Rawashdeh,Adnan Al-Bashir and Rami Al-Hadithi. Building Medical Devices Maintenance System Through QFD. – М.: LAP Lambert Academic Publishing, 2013. – 104 с.
  137. Claudia-Georgeta Carstea. New approach about project management of complex information systems. – М.: LAP Lambert Academic Publishing, 2011. – 152 с.
  138. Mohammad Jasim Uddin. Human Resource Practices in Microfinance Institutions of Bangladesh. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  139. Sabih Salahuddin. Human Resource Management in Modern Era. – М.: LAP Lambert Academic Publishing, 2013. – 248 с.
  140. Ban Mustafa and Najla Aldabagh. Building an Ontology Based Access Control Model for Multi-Agent System. – М.: , 2015. – 120 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Human Resources великолепная область для работы, в мире таких интересных направлений немного. интервью с И.Г. Залюбовским, генеральным директором НПО "Эталон", экспертом палаты по информационной политике при правительстве Москвы, разработчиком уникальных алгоритмов управления персоналом, доктором психологических наук, профессором. "Управление персоналом", № 20, октябрь 2007.
  2. Наука человековедения. интервью с Д. Уолтоном, профессором London Metropolitan University, экспертом CIPD. Chartered Institute of Personnel and Development, автором программы Master of Arts in Human Resource Strategies. И. Смирнова, "Кадровый менеджмент", № 5, июль-август 2007.
  3. Банковское отделение будущего. интервью с Камероном МакКворри. Cameron MacQuarrie, менеджером по развитию бизнеса компании Cisco Systems в области корпоративных финансов в регионе EMEA. Европа, Ближний Восток, Африка. Н.Ф. Колюшенко, "Расчеты и операционная работа в коммерческом банке", № 2, февраль 2006.
  4. Team-building как основа современных персонал-технологий. "Управление персоналом", № 3, февраль 2005.
  5. Ловушка для пирата. интервью с И. Слабых, руководителем отдела противодействия интеллектуальному пиратству в России и СНГ Adobe Systems. И. Голова, "Расчет", N 9, сентябрь 2012 г.
  6. Клиента учить сложно. интервью с О. Бердниковой, директором ATLANTA Personnel, Ю. Зайченко, менеджером по развитию агентства рекрутинга "Люди Дела". Екатеринбург, А. Захаровым, директором кадрового агентства Ultra-Staff, У. Павловой, руководителем компаний "Перформия - Башкортостан" и "Экселект - Уфа", Р. Портновым, генеральным директором кадрового агентства KPG Resources. Москва, С. Романчуком, С.  Смольниковой, директором кадрового агентства "Люди Дела". Новосибирск и П. Трубица, директором центра кадрового консалтинга "Инфра". Новосибирск, Омск. А. Асанова, "Управление персоналом", N 19, октябрь 2010 г.
  7. 2009-й стал в России годом стремительной деградации всей области Human Resource. И. Залюбовский, "Управление персоналом", № 24, декабрь 2009.
  8. Best Practice в выборе "образа" компании. "Расчет", № 8, август 2009.
  9. Я воспринимаю персонального помощника как напарника червяк должен нравиться рыбке, а не рыбаку. интервью с П.А. Черкашиным, руководителем российского представительства компании Adobe Systems. "Управление персоналом", № 20, октябрь 2008.
  10. Best practices финансового сообщества. Е. Тихомирова, "Консультант", № 7, апрель 2008.

Образцы работ

Тема и предметТип и объем работы
Последствия операции НАТО
Политология
Диплом
80 стр.
Платежные системы в Интернете
Информатика
Диплом
102 стр.
Роль ОБСЕ в урегулировании конфликтов в Европе
Политология
Курсовая работа
33 стр.
Проблемы реформирования ОБСЕ
Политология
Курсовая работа
29 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Алексей
Курсовую получил. Огромное спасибо.