Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Josh Shaul. Practical Oracle Security. – М.: , 2010. – 288 с.
  2. Oracle Enterprise Manager 10G Grid Control Implementation Guide. – М.: , 2011. – 768 с.
  3. Oca Oracle Database 11G Administration I Exam Guide (Exam 1Z0-052). – М.: , 2011. – 0 с.
  4. Oracle Webcenter 11G Handbook. – М.: , 2011. – 528 с.
  5. John Watson, Roopesh Ramklass, Bob Bryla. OCA/OCP Oracle Database 11G: All-in-One Exam Guide (+ CD-ROM). – М.: Oracle Press, 2010. – 1072 с.
  6. Applied Oracle Security: Developing Secure Database And Middleware Environments. – М.: , 2011. – 640 с.
  7. Microsoft Sql Server 2008 Administration For Oracle Dbas. – М.: , 2011. – 592 с.
  8. Oracle Fusion Middleware 11G Architecture And Management. – М.: , 2011. – 576 с.
  9. Peoplesoft Peopletools Tips & Techniques. – М.: , 2011. – 640 с.
  10. Oracle Database 11G Building Xml Applications. – М.: , 2011. – 416 с.
  11. Databases Demystified, 2Nd Edition. – М.: , 2011. – 448 с.
  12. Oracle Crm On Demand Deployment Guide. – М.: , 2011. – 240 с.
  13. Effective Oracle Database 10G Security By Design. – М.: , 2011. – 544 с.
  14. Sam Alapati. OCP Oracle Database 11g: New Features for Administrators Exam Guide (Exam 1Z0-050) (+ CD-ROM). – М.: McGraw-Hill, 2011. – 552 с.
  15. Paul Allen, Joseph Bambara. OCM Java EE 6 Enterprise Architect Exam Guide (Exams 1Z0-807, 1Z0-865 & 1Z0-866). – М.: McGraw-Hill Osborne Media, 2014. – 672 с.
  16. Matthieu Rivain. On the Physical Security of Cryptographic Implementations. – М.: LAP Lambert Academic Publishing, 2014. – 232 с.

Дополнительные результаты

  1. Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с.
  2. Constructive Side-Channel Analysis and Secure Design: Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings ... Computer Science / Security and Cryptology). – М.: , 2012. – 280 с.
  3. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с.
  4. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с.
  5. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  6. Security and Development in Global Politics: A Critical Comparison. – М.: , 2012. – 360 с.
  7. Luis Lobo-Guerrero. Insuring Security: Biopolitics, security and risk. – М.: , 2012. – 178 с.
  8. Julian Burling. Lloyd's: Law and Practice (Lloyd's Insurance Law Library). – М.: , 2012. – 0 с.
  9. Securities Compliance Index. Securities Compliance Index, Second Edition: A Topical Guide To U.S. Securities Regulation. – М.: , 2012. – 512 с.
  10. American Bar Association, Thomas Lee Hazen. Securities Regulation: Corporate Counsel Guides. – М.: , 2012. – 540 с.
  11. Robert H. Spencer, Randolph P. Johnston. Technology Best Practices (Wiley Best Practices). – М.: , 0. – 0 с.
  12. William T. Moore. Real Options and Option-Embedded Securities. – М.: , 0. – 0 с.
  13. Changmin Chun. Cross-border Transactions of Intermediated Securities: A Comparative Analysis in Substantive Law and Private International Law. – М.: , 2012. – 524 с.
  14. The Labor & Employment Law Practice Group of Dinsmore & Shohl LLP, Llp the Labor & Employment Law Practice Group of Dinsmore & Shohl, Llp Labor & Employment Law Practice Group Dinsmore & Shohl. HR Survival Guide to Labor & Employment Law. – М.: , 0. – 0 с.
  15. Jianmin Zhao, Bruce J. Dickson, Chien-Min Zhao. Remaking the Chinese State: Strategies, Society, and Security (Asia's Transformations). – М.: , 0. – 0 с.
  16. Henry J. Aaron, John B. Shoven, Benjamin M. Friedman, Alvin Hansen Symposium on Public Policy 1998 Harvard University). Should the United States Privatize Social Security? (Alvin Hansen Symposium Series on Public Policy). – М.: , 0. – 0 с.
  17. David S. Katz, Ilan Caspi, David S. Katz, Ilan Caspi. Executive's Guide to Personal Security. – М.: , 0. – 0 с.
  18. Gerald Kovacich. The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition. – М.: , 0. – 0 с.
  19. Safety and the Security Professional : A Guide to Occupational Safety and Health Strategies. – М.: , 0. – 0 с.
  20. John R. Harbison, Jr. Peter Pekar. Smart Alliances : A Practical Guide to Repeatable Success (J-B BAH Strategy & Business Series). – М.: , 0. – 0 с.
  21. Security Operations Management. – М.: , 0. – 0 с.
  22. Philip P. Purpura. The Security Handbook. – М.: , 0. – 0 с.
  23. Practical Electronics Handbook. – М.: , 0. – 0 с.
  24. Lori Ann Thrupp. Cultivating Diversity: Agrobiodiversity and Food Security. – М.: , 0. – 0 с.
  25. Jon Barnett. The Meaning of Environmental Security: Environmental Politics and Policy in the New Security Era. – М.: , 0. – 0 с.
  26. Penny Davenport. A Practical Guide to Collateral Management in the OTC Derivatives Market (Finance and Capital Markets). – М.: Palgrave Macmillan, 2003. – 304 с.
  27. Gregory V. Kitter. Investment Mathematics for Finance & Treasury Professionals: A Practical Approach. – М.: , 0. – 0 с.
  28. Bruce Tuckman. Fixed Income Securities: Tools for Today's Markets. – М.: Wiley Publishing, Inc, 2002. – 512 с.
  29. Martin L. Leibowitz. Franchise Value : A Modern Approach to Security Analysis (Wiley Finance). – М.: , 0. – 0 с.
  30. Julia Lowell, C. R. Neu, Daochi Tong, National Defense Research Institute, National Security Research Institute. Financial Crises and Contagion in Emerging Market Countries. – М.: , 0. – 0 с.
  31. T. W. Epps. Pricing Derivative Securities. – М.: , 0. – 0 с.
  32. Peter J. Klein. Getting Started in Security Analysis. – М.: , 0. – 0 с.
  33. Peter Madlem, Larry D. Edwards. Power Investing With Basket Securities: The Investor's Guide to Exchange-Traded Funds. – М.: , 0. – 0 с.
  34. Gerald L. Kovacich, Edward P. Halibozek. The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, First Edition. – М.: , 0. – 0 с.
  35. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с.
  36. Marko Nordquist. Towards Improved Security Management Practice: Designing an Organizational Model Procedure for the Implementation of Information Security Management in Heterogeneous Information Management. – М.: , 0. – 0 с.
  37. Steve Purser. A Practical Guide to Managing Information Security (Artech House Technology Management Library). – М.: , 0. – 0 с.
  38. Computer Security. – М.: , 0. – 0 с.
  39. Encyclopedia of Security Management : Techniques and technology. – М.: , 0. – 0 с.
  40. Retail Security and Shrinkage Protection. – М.: , 0. – 0 с.
  41. Effective Security Management, Fourth Edition (Effective Security Management). – М.: , 0. – 0 с.
  42. Joseph S. Nye, William A. Owens, James R. Schlesinger, R. James Woolsey, James A. Lewis, Joseph S., Jr. Nye, James Andrew Lewis, Erin Schlather, Csis Commission on Technology Security in the Twenty-First Century. Computer Exports and National Security: New Tools for a New Century : A Report of the Csis Commission on Technology Security in the 21St-Century (Csis Panel Reports.). – М.: , 0. – 0 с.
  43. Jothy Rosenberg and David Remy. Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption. – М.: Sams, 2004. – 380 с.
  44. Roberta Bragg. MCSE Training Guide (70-220): Windows 2000 Network Security Design, Second Edition. – М.: , 0. – 0 с.
  45. Charles Carrington, Timothy Speed, Juanita Ellis, Steffano Korper. Enterprise Directory and Security Implementation Guide: Designing and Implementing Directories in Your Organization (The Korper and Ellis E-Commerce Books Series). – М.: , 0. – 0 с.
  46. Ravi Kothuri, Albert Godfrind, Euro Beinat. Pro Oracle Spatial. – М.: Apress, 2004. – 712 с.
  47. Gunjan Samtani, Marcus Healey, Shyam Samtani. B2B Integration: A Practical Guide to Collaborative E-Commerce. – М.: , 0. – 0 с.
  48. Aspatore Books Staff. Inside the Minds: Security Matters - Industry Leaders from eBay, Inc., Motorola, Internet Security Systems & More on Protecting Your Most Valuable Assets. – М.: , 0. – 0 с.
  49. Charles Cresson Wood. Best Practices In Internet Commerce Security. – М.: , 0. – 0 с.
  50. Frank A. Stasiowski. Architect's Essentials of Winning Proposals (The Architect's Essentials of Professional Practice). – М.: , 2003. – 0 с.
  51. Christopher A. Crayton. Security + Exam Guide (Testtaker's Guide Series). – М.: , 2003. – 0 с.
  52. Debt Management and Government Securities Markets in the 21st Century. – М.: , 2004. – 0 с.
  53. Labor Markets and Social Security. – М.: , 2003. – 0 с.
  54. Robert A. Strong. Practical Investment Management. – М.: , 2003. – 0 с.
  55. Barbara C. McNurlin. Information Systems Management in Practice (7th Edition). – М.: , 2005. – 0 с.
  56. Stephen Penman. Financial Statement Analysis and Security Valuation. – М.: , 2003. – 0 с.
  57. The Secure Online Business: E-Commerce, It Functionality & Business Continuity. – М.: , 2003. – 0 с.
  58. E-Commerce Security: Advice from Experts (IT Solutions series). – М.: , 2004. – 0 с.
  59. Peter R., MBA Ramsaroop. Securing Business Intelligence: Knowledge and CyberSecurity in the Post 9/11 World. – М.: , 2004. – 0 с.
  60. Advances in Security and Payment Methods for Mobile Commerce. – М.: , 2004. – 0 с.
  61. William M. Epps. Terrorism and Personal Security : Reduce Your Chances of Becoming a Target. – М.: , 2005. – 0 с.
  62. Robert Anthony Chechile. The ABCs of IPOs : Investment Strategies and Tactics for New Issue Securities. – М.: , 2004. – 0 с.
  63. Scott Slorach, Paul Rylance. Corporate Finance, Mergers & Acquisitions 2005 (Blackstone Legal Practice Course Guide). – М.: Oxford University Press, 2005. – 280 с.
  64. Christopher Eiben. It Pays to be Paranoid : Securing Business Success by Preparing for the Worst. – М.: , 2004. – 0 с.
  65. Sari Greene. Security Policies and Procedures : Principles and Practices (Security). – М.: , 2005. – 0 с.
  66. Edward Borodzicz. Risk, Crisis and Security Management. – М.: , 2005. – 0 с.
  67. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с.
  68. Sudhanshu Kairab. A Practical Guide to Security Assessments. – М.: , 2004. – 498 с.
  69. Ron Ben Natan. Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase. – М.: , 2005. – 432 с.
  70. Jim Stewart. SAP Security: SAP Security Essentials. – М.: Equity Press, 2005. – 136 с.
  71. Brian Gouin. Security Design Consulting: The Business of Security System Design. – М.: , 2007. – 200 с.
  72. Jeremy Bolland. Writing Securities Research: A Best Practice Guide. – М.: , 2007. – 120 с.
  73. Betty E. Biringer, Rudolph V. Matalucci, Sharon L. O'Connor. Security Risk Assessment and Management: A Professional Practice Guide for Protecting Buildings and Infrastructures. – М.: , 2007. – 384 с.
  74. Strategies to Enhance Environmental Security in Transition Countries (NATO Science for Peace and Security Series / NATO Science for Peace and Security Series C: Environmental Secur. – М.: , 2007. – 444 с.
  75. Committee on Federal Regulation of Securities Committee. The Fund Director's Guidebook: Third Edition (Fund Director's Guidebook). – М.: , 2006. – 128 с.
  76. Robert A. Strong. Practical Investment Management (with Stock Track Coupon). – М.: , 2006. – 640 с.
  77. Richard P. Majka. Series 7 Securities Licensing Exam Review Exam Cram (Exam Cram). – М.: , 2005. – 888 с.
  78. Ron Carson, Steve Sanduski. Tested in the Trenches: A 9-Step Plan for Building and Sustaining a Million-Dollar Financial Services Practice. – М.: , 2005. – 288 с.
  79. Robert M. Doroghazi, Dan W. French. The Physician's Guide To Investing: A Practical Approach To Building Wealth. – М.: , 2005. – 228 с.
  80. Tourism, Security and Safety: From Theory to Practice (The Management of Hospitality and Tourism Enterprises). – М.: , 2005. – 376 с.
  81. Timothy P. Layton. Information Security. – М.: , 2006. – 222 с.
  82. Ernst & Young LLP, Jan Babiak, John Butters, Mark W. Doll. Defending the Digital Frontier: Practical Security for Management, 2nd Edition. – М.: , 2004. – 253 с.
  83. Michael Khairallah. Physical Security Systems Handbook: The Design and Implementation of Electronic Security Systems. – М.: , 2005. – 312 с.
  84. Michael Gentile, Ron Collette, Tom August. The Ciso Handbook: A Practical Guide to Securing Your Company. – М.: , 2005. – 352 с.
  85. George Haddow, Jane Bullock. Introduction to Emergency Management, Second Edition (Butterworth-Heinemann Homeland Security). – М.: , 2005. – 424 с.
  86. Frank Buytendijk. Performance Leadership: The Next Practices to Motivate Your People, Align Stakeholders, and Lead Your Industry. – М.: , 2008. – 300 с.
  87. James Michael Stewart, Ed Tittel, Mike Chapple. CISSP: Certified Information Systems Security Professional Study Guide. – М.: , 2008. – 841 с.
  88. Pablo Gottret, George Schieber, Hugh R. Waters. Good Practices in Health Financing. – М.: , 2008. – 473 с.
  89. Alan Calder, Steve Watkins. IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002. – М.: , 2008. – 384 с.
  90. Lloyd's MIU Handbook of Maritime Security. – М.: , 2008. – 400 с.
  91. The Practical Guide to Foreign Direct Investment in the European Union. – М.: , 2008. – 400 с.
  92. Meridian Securities Market. World Stock Exchange Fact Book. – М.: , 2008. – 0 с.
  93. Ray S. Leki. Travel Wise: How to Be Safe, Savvy and Secure Abroad. – М.: , 2008. – 218 с.
  94. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с.
  95. Gerard Blokdijk, Ivanka Menken. Information Security Management Best Practice Workbook: Implementation and Management Roadmap for Threats, Challenges and Solutions - Ready to use supporting documents bringing Theory into Practice. – М.: , 2008. – 124 с.
  96. CompTIA Security+: Certification Kit (комплект из 3 книг + 2 CD-ROM). – М.: Sybex, 2009. – 1440 с.
  97. W. Krag Brotby. Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement. – М.: Auerbach Publications, 2009. – 200 с.
  98. Julian Talbot, Miles Jakeman. Security Risk Management Body of Knowledge (Wiley Series in Systems Engineering and Management). – М.: , 2009. – 445 с.
  99. Jake Kouns, Daniel Minoli. Information Technology Risk Management in Enterprise Environments: A Review of Industry Practices and a Practical Guide to Risk Management Teams. – М.: , 2010. – 421 с.
  100. Bel G. Raggad. Information Security Management: Concepts and Practice. – М.: , 2010. – 871 с.
  101. Digital Business Security Development: Management Technologies. – М.: , 2010. – 318 с.
  102. Christopher B. Barrett, Jeffrey Cason. Overseas Research II: A Practical Guide. – М.: , 2010. – 184 с.
  103. Alan Calder, Steve G Watkins. Information Security Risk Management for ISO27001 / ISO27002. – М.: , 2010. – 198 с.
  104. RITUPARNA DAS. Handbook of Fixed Income Securities: Indian Banking Perspective. – М.: , 2010. – 112 с.
  105. Jeffrey C. Hooke. Security Analysis and Business Valuation on Wall Street + Companion Web Site: A Comprehensive Guide to Today's Valuation Methods. – М.: Wiley, 2010. – 408 с.
  106. Josh Shaul. Practical Oracle Security. – М.: , 2010. – 288 с.
  107. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с.
  108. Jeffrey Price. Practical Aviation Security. – М.: , 2010. – 416 с.
  109. George L Stefanek. Information Security Best Practices. – М.: , 2010. – 160 с.
  110. Patrick Kane. Practical Security Training. – М.: , 2010. – 272 с.
  111. Christa Anderson and Kristin L. Griffin. Windows Server 2008 R2: Remote Desktop Services: Resource Kit (+ CD-ROM). – М.: Microsoft Press, 2010. – 718 с.
  112. PRACTICAL. Practical ?cnc?–training – For Planning & Shop – Fundamentals (paper Only). – М.: , 1986. – 184 с.
  113. EV (Evaluation Practice). Multisite Evaluation Practice. – М.: , 2011. – 112 с.
  114. Steven Feuerstein. Oracle PL/SQL Best Practices 2e. – М.: , 2007. – 292 с.
  115. Steven Feuerstein. Oracle PL/SQL Best Practices. – М.: , 2001. – 208 с.
  116. Oracle Database 11G Pl/Sql Programming Workbook. – М.: , 2011. – 512 с.
  117. Oracle Enterprise Manager 10G Grid Control Implementation Guide. – М.: , 2011. – 768 с.
  118. Oca Oracle Database 11G Administration I Exam Guide (Exam 1Z0-052). – М.: , 2011. – 0 с.
  119. Oracle Webcenter 11G Handbook. – М.: , 2011. – 528 с.
  120. Oracle Rman 11G Backup And Recovery. – М.: , 2011. – 688 с.
  121. John Watson, Roopesh Ramklass, Bob Bryla. OCA/OCP Oracle Database 11G: All-in-One Exam Guide (+ CD-ROM). – М.: Oracle Press, 2010. – 1072 с.
  122. Nitin Vengurlekar, Murali Vallath, Rich Long. Oracle Automatic Storage Management: Under-the-Hood & Practical Deployment Guide. – М.: McGraw-Hill Osborne Media, 2008. – 368 с.
  123. Applied Oracle Security: Developing Secure Database And Middleware Environments. – М.: , 2011. – 640 с.
  124. Microsoft Sql Server 2008 Administration For Oracle Dbas. – М.: , 2011. – 592 с.
  125. Oracle Fusion Middleware 11G Architecture And Management. – М.: , 2011. – 576 с.
  126. Oracle Database 11G Building Xml Applications. – М.: , 2011. – 416 с.
  127. Oracle Database 10G Rman Backup & Recovery. – М.: , 2011. – 666 с.
  128. Information Technology In Water And Wastewater Utilities, Wef Mop 33. – М.: , 2011. – 376 с.
  129. Oracle Crm On Demand Deployment Guide. – М.: , 2011. – 240 с.
  130. Effective Oracle Database 10G Security By Design. – М.: , 2011. – 544 с.
  131. Sam Alapati. OCP Oracle Database 11g: New Features for Administrators Exam Guide (Exam 1Z0-050) (+ CD-ROM). – М.: McGraw-Hill, 2011. – 552 с.
  132. Thomas Porter, Jan Kanclirz Jr. Practical VoIP Security. – М.: Syngress, 2006. – 564 с.
  133. Timothy Stapko. Practical Embedded Security: Building Secure Resource-Constrained Systems. – М.: Newnes, 2007. – 480 с.
  134. Eduardo Fernandez-Buglioni. Security Patterns in Practice: Designing Secure Architectures Using Software Patterns. – М.: Wiley, 2013. – 582 с.
  135. Jane Situma,Jeremiah Okello and Lucy Mutuli. Health And Nutrition Status Of Preschool Children. – М.: LAP Lambert Academic Publishing, 2013. – 152 с.
  136. Ladhu R. Choudhary. The Politics Of Responsibility In International Relations. – М.: LAP Lambert Academic Publishing, 2014. – 116 с.
  137. Matthieu Rivain. On the Physical Security of Cryptographic Implementations. – М.: LAP Lambert Academic Publishing, 2014. – 232 с.
  138. Jennifer. C. F. Loke. Interprofessional Online Learning in Healthcare Education. – М.: LAP Lambert Academic Publishing, 2012. – 368 с.
  139. Prashant Pittalia. Ecommerce Security Real Life Cases And Practical Solutions. – М.: , 2015. – 72 с.
  140. David Rule. How to Cheat at Configuring VmWare ESX Server. – М.: Syngress, 2007. – 408 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Бюджетирование страховой компании на базе Oracle Enterprise Planning and Budgeting. Д.В. Лесоводский, "Финансовый менеджмент в страховой компании", № 3, III квартал 2006.
  2. Программное обеспечение, интегрированное с корпоративной информационной системой "Персонал" Oracle HR в ОАО "ММК", - для совершенствования организации работ по охране труда. О.И. Зимин, Ю.Е. Курзин, А.В.  Медведев, И.Ю. Солохин, "Охрана труда и техника безопасности на промышленных предприятиях", N 2, февраль 2011 г.
  3. Сокращать нужно уметь. интервью с О. Кныш, директором по персоналу компании ORACLE, и М. Савиновой, директором по связям с общественностью в странах СНГ компании ORACLE. "Управление персоналом", № 17, сентябрь 2009.
  4. Best Practice в выборе "образа" компании. "Расчет", № 8, август 2009.
  5. Best practices финансового сообщества. Е. Тихомирова, "Консультант", № 7, апрель 2008.
  6. Система управленческой отчетности для руководителей на платформе Oracle Business Intelligence SE One. О. Морозова, "Бухгалтерия и банки", № 4, апрель 2008.

Образцы работ

Тема и предметТип и объем работы
Организацияавтобусного тура в Польшу
Туризм
Диплом
62 стр.
Последствия операции НАТО
Политология
Диплом
80 стр.
Процессуальные особенности рассмотрения дел судами о компенсации морального вреда
Гражданский процесс
Диплом
70 стр.
Платежные системы в Интернете
Информатика
Диплом
102 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Тимур
Благодарю вас за оказанное мне содействие в сопровождении моей курсовой работы. Надеюсь, я не доставил вам слишком много беспокойств