Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Md. Rabiul Islam and M. Abdul Goffar Khan. Retina Recognition: Secure Biometric Authentication System. – М.: LAP Lambert Academic Publishing, 2012. – 72 с.
  2. Vinayak Bharadi,Hemchandra Kekre and Rita Vora. Retinal Scan Recognition. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  3. Md. Rajibul Islam. A Secure Personal Identification System. – М.: LAP Lambert Academic Publishing, 2010. – 196 с.

Дополнительные результаты

  1. Securities Compliance Index. Securities Compliance Index, Second Edition: A Topical Guide To U.S. Securities Regulation. – М.: , 2012. – 512 с.
  2. Systems Thinker Newsletter. Making It Happen: Stories from Inside the New Workplace. – М.: , 0. – 0 с.
  3. I NATO Conference on Manpower Planning and Organization Design Stresa, Richard J. Niehaus, Donald T. Bryant, NATO Special Program Panel on Human Factors, NATO Special Program Panel on Systems Science. Manpower Planning and Organization Design. (NATO Conference Series : Ii, Systems Science, 7). – М.: , 0. – 0 с.
  4. Safe Schools: A Security and Loss Prevention Plan. – М.: , 0. – 0 с.
  5. Crisp Learn Systems. Organizing Your Workspace (Self Study II). – М.: , 0. – 0 с.
  6. Board of Governors of the Federal Reserve System. The Federal Reserve System: Purposes & Functions. – М.: , 0. – 0 с.
  7. Julia Lowell, C. R. Neu, Daochi Tong, National Defense Research Institute, National Security Research Institute. Financial Crises and Contagion in Emerging Market Countries. – М.: , 0. – 0 с.
  8. Ada Decision Systems. Dpl 4.0: Professional Decision Analysis Software : Academic Version. – М.: , 0. – 0 с.
  9. Timothy Braithwaite. Securing E-Business Systems: A Guide for Managers and Executives. – М.: , 0. – 0 с.
  10. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с.
  11. Andrew Hawker. Security in Information Systems : A Guide for Business and Accounting. – М.: , 0. – 0 с.
  12. Ifip Tc11 Wg11.5 Working Conference on Integrity and Internal Control, Michael Gertz, Erik Guldentops, Leon Strous. Integrity, Internal Control and Security in Information Systems: Connecting Governance and Technology (International Federation for Information Processing). – М.: , 0. – 0 с.
  13. Ifip Tc11 Wg11.5 Working Conference on Integrity and Internal Control, Michael Gertz. Integrity and Internal Control in Information Systems V: Ifip Tc11/Wg11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (Iicis), November 11-12, 2002, Bonn, Germany (International Federation for Information Processing. – М.: , 0. – 0 с.
  14. Ifip Tc8 & Tc9, Wg8.2 & Wg9.4 Working Conference on Information Systems, Ramiro Montealegre, Angeliki Poulymenakou. Organizational Information Systems in the Context of Globalization: Ifip Tc8 & Tc9/Wg8.2 & Wg9.4 Working Conference on Information Systems Perspective ... ion for Information Processing (Series), 126). – М.: , 0. – 0 с.
  15. U s Games System. Patton on Leadership: Seventy Motivational Cards for Success. – М.: , 0. – 0 с.
  16. Joseph S. Nye, William A. Owens, James R. Schlesinger, R. James Woolsey, James A. Lewis, Joseph S., Jr. Nye, James Andrew Lewis, Erin Schlather, Csis Commission on Technology Security in the Twenty-First Century. Computer Exports and National Security: New Tools for a New Century : A Report of the Csis Commission on Technology Security in the 21St-Century (Csis Panel Reports.). – М.: , 0. – 0 с.
  17. Inc Wizdom Systems, Inc. Wizdom Systems. Process Optimization in Home Healthcare: A Step by Step Guide to Understanding and Improving Healthcare Delivery to Home Bound Patients. – М.: , 0. – 0 с.
  18. In Search of Sustainable Livelihood Systems: Managing Resources and Change. – М.: , 2004. – 0 с.
  19. Political Economy of the World-System Conference 2001 Virginia Polyte. Emerging Issues in the 21st Century World-System (Contributions in Economics and Economic History, No. 230). – М.: , 2003. – 0 с.
  20. Efraim Turban. Electronic Commerce 2004: A Managerial Perspective, Third Edition. – М.: , 2003. – 0 с.
  21. Committee on Federal Regulation of Securities Committee. The Fund Director's Guidebook: Third Edition (Fund Director's Guidebook). – М.: , 2006. – 128 с.
  22. Switzerland Business & Investment Handbook: Economy, Law, Taxation, Real Estate, Residence, Facts & Figures, Key Addresses. – М.: , 2006. – 766 с.
  23. Tay Kratzer, Erno de Korte. Novell GroupWise 7 Administrator Solutions Guide. – М.: , 2005. – 936 с.
  24. The Economy of Puerto Rico: Restoring Growth. – М.: , 2006. – 607 с.
  25. Meridian Securities Market. World Stock Exchange Fact Book. – М.: , 2008. – 0 с.
  26. V.R. Leonard. The Social Security and Medicare Handbook: What You Need to Know Explained Simply. – М.: , 2008. – 288 с.
  27. DayMark Safety Systems. True Kitchen Confessions: Infusing DayMark s Passion for Making the World a Safer Place to Eat, Work, & Live. – М.: , 2008. – 116 с.
  28. Ronald Hall. Biometrics 100 Most asked Questions on Physiological (face, fingerprint, hand, iris, DNA) and Behavioral (keystroke, signature, voice) Biometrics Technologies, ... Implementation and Performance evaluation. – М.: , 2008. – 176 с.
  29. Handbook on Information Technology in Finance (International Handbooks on Information Systems). – М.: , 2008. – 800 с.
  30. Engineering Secure Software and Systems: Second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2010. – 252 с.
  31. S.Y. Kung, M.W. Mak, S.H. Lin. Biometric Authentication: A Machine Learning Approach (Prentice Hall Information and System Sciences Series). – М.: , 2010. – 496 с.
  32. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с.
  33. Timothy Braithwaite. Securing E–Business Systems. – М.: , 2002. – 288 с.
  34. Future Systems. For Inspiration ONLY. – М.: , 1996. – 128 с.
  35. E–SYSTEMS. How To 2000. – М.: , 1997. – 656 с.
  36. Software Systems Corp. Thermodynamic Properties. – М.: , 1988. – 112 с.
  37. O SYSTEM. Hofer Handbook Of Primatology: Systematik–phylogenie–ontogenie. – М.: , 1971. – 0 с.
  38. Low Voltage Wiring: Security/Fire Alarm Systems. – М.: , 2011. – 0 с.
  39. Windows 7 Quicksteps. – М.: , 2011. – 272 с.
  40. The Complete Book Of Home, Site And Office Security. – М.: , 2011. – 309 с.
  41. Linux Administration: A Beginner'S Guide, Fifth Edition. – М.: , 2011. – 662 с.
  42. Microsoft Sql Server 2008 A Beginner'S Guide 4/E. – М.: , 2011. – 709 с.
  43. Mobile Application Security. – М.: , 2011. – 432 с.
  44. Atec and Xnet Information Systems. The Internet Watchdog Personal Edition Windows. – М.: , . –  с.
  45. Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky. Cisco Security Professional's Guide to Secure Intrusion Detection Systems. – М.: , . –  с.
  46. Yi Qian, James Joshi, David Tipper, Prashant Krishnamurthy. Information Assurance: Dependability and Security in Networked Systems. – М.: Morgan Kaufmann, 2007. – 576 с.
  47. Timothy Stapko. Practical Embedded Security: Building Secure Resource-Constrained Systems. – М.: Newnes, 2007. – 480 с.
  48. Bruce Dang, Alexandre Gazet, Elias Bachaalany. Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation. – М.: Wiley, 2014. – 384 с.
  49. Bruce Dang, Alexandre Gazet, Elias Bachaalany, Sebastien Josse. Practical Reverse Engineering. – М.: John Wiley and Sons, Ltd, 2014. – 384 с.
  50. Vedpal Singh. Biometrics: Fingerprint Classification and Identification. – М.: LAP Lambert Academic Publishing, 2013. – 104 с.
  51. Papri Ghosh and Ritam Dutta. Adaptive Approach towards Biometric Authentication System. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  52. Enes Celik and Ali Buldu. Biomedical Applications with Artificial Intelligence Techniques. – М.: LAP Lambert Academic Publishing, 2014. – 76 с.
  53. Satyendra Singh Thakur and Dr. Manish Manoria. Secure Cryptosystem for Biometric Information using RSA. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.
  54. Varun K.,Sushil R. S. and Sanjay J. Recognition of Human Iris Patterns. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  55. Shriram Raut. A Modern Approach for Palmprint Recognition System. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  56. Abbas Elazhari. Face Recognition From Low Resolution Images. – М.: LAP Lambert Academic Publishing, 2014. – 124 с.
  57. Yamille del Valle. Optimization of Power System Performance using FACTS devices. – М.: LAP Lambert Academic Publishing, 2010. – 236 с.
  58. Tirumala Ramashri. Hybrid Image Watermarking Algorithms. – М.: LAP Lambert Academic Publishing, 2013. – 112 с.
  59. Suhas S. Chate. Human Palm:Biometric Recognition and Challenges. – М.: LAP Lambert Academic Publishing, 2013. – 132 с.
  60. Ruben Johnnson Robert Jeremiah,Sakthivel Murugan Shamjith and Allen Vimal. Security System of Oilfield using Wireless in PLC & TESTBED for SCADA. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  61. Abdul Basit. Iris Recognition: An Identification Biometric system. – М.: LAP Lambert Academic Publishing, 2010. – 188 с.
  62. Vivek Chaudhary and Sunil Kumar Singla. BIOMETRICS. – М.: LAP Lambert Academic Publishing, 2011. – 128 с.
  63. Manoj Kollam. A Low-cost Embedded Smart Car Security And Theft Control System. – М.: LAP Lambert Academic Publishing, 2011. – 84 с.
  64. Suvad Selman. Design of DTMF and its Implementation Using TMS320C6713 DSK BOARD. – М.: LAP Lambert Academic Publishing, 2012. – 156 с.
  65. Mohammad A. Dabbah. Secure Biometric Face Recognition. – М.: LAP Lambert Academic Publishing, 2010. – 144 с.
  66. Namje Park. Mobile RFID Security. – М.: LAP Lambert Academic Publishing, 2012. – 216 с.
  67. Patricia Chogugudza. Shona Women under Patriarchy: From Feminism to African Womanism. – М.: Scholars' Press, 2014. – 188 с.
  68. Mahesh Pathak,Parvez Qamar Rizvi and Pradyumn Kumar. Natural Enemy Fauna in Rice-Wheat System of India. – М.: LAP Lambert Academic Publishing, 2012. – 356 с.
  69. Rajneesh Kumar Agnihotri. Physiological Screening of Landraces of Rice in Kumaun Himalaya. – М.: LAP Lambert Academic Publishing, 2011. – 212 с.
  70. Fouad Zaro and Mohammad Abido. Multi-Objective Optimal Power Flow. – М.: LAP Lambert Academic Publishing, 2010. – 104 с.
  71. Jerrin Yomas. SSL based implementation of RFC2289 with dual factor token using GSM. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  72. Kanav Sood. Kerberos Authentication Protocol. – М.: LAP Lambert Academic Publishing, 2011. – 120 с.
  73. Sushma Jaiswal. Automatic 3D Face Recognition And Modeling From 2D Images. – М.: LAP Lambert Academic Publishing, 2011. – 208 с.
  74. Mohammad Ali Khan and Majid Nasir. Human Error and Learnability Evaluation. – М.: LAP Lambert Academic Publishing, 2013. – 124 с.
  75. Ehsan Khorasani Esmaeili. Secure Keyboard logging system. – М.: LAP Lambert Academic Publishing, 2013. – 124 с.
  76. Munnujahan Ara. Reliable and Secure Wireless Communications Systems. – М.: Scholars' Press, 2014. – 140 с.
  77. Rupa Ch. and Avadhani P. S. Modern Security Methods in Applied Computer Science. – М.: Scholars' Press, 2014. – 124 с.
  78. Ming-Chin Chuang. Authentication and Mobility Management Mechanisms in VANETs. – М.: Scholars' Press, 2014. – 96 с.
  79. Ankit Panch. Enterprise Secure Wireless Authentication (ESWA). – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  80. Mohammad AlAhmad. Security threats of finger print biometric in network system. – М.: LAP Lambert Academic Publishing, 2014. – 88 с.
  81. Marimuthu Kanagaraj and Eswari Venkatachalam. Multifactor Authentication Protocol for a Secured WSN. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  82. Ayesha Azam Bhatti. Automated Industrial Processes Control Via WIMAX. – М.: LAP Lambert Academic Publishing, 2013. – 116 с.
  83. Sohail Abbas. A Layered Security Approach for Cooperation Enforcement in MANETs. – М.: LAP Lambert Academic Publishing, 2012. – 280 с.
  84. Mehmet Hilal Ozcanhan. Security & Reliability in Embedded Systems. – М.: LAP Lambert Academic Publishing, 2014. – 152 с.
  85. Supakorn Kungpisdan. Securing Mobile Payments: Modelling, Design, and Analysis. – М.: LAP Lambert Academic Publishing, 2010. – 336 с.
  86. Govind Sreekar Shenoy. Architecture Support for Intrusion Detection systems. – М.: LAP Lambert Academic Publishing, 2014. – 160 с.
  87. Britto R. Kumar and Albert S. Rabara. An Architecture for Secure Mobile Payment System using PKI. – М.: LAP Lambert Academic Publishing, 2013. – 184 с.
  88. Raghavendra K. R. Model-checking infinite state systems for information flow security. – М.: LAP Lambert Academic Publishing, 2014. – 160 с.
  89. Dr Alan McCabe. Sign on the Dotted Line. – М.: LAP Lambert Academic Publishing, 2010. – 200 с.
  90. Martin Drahansky. Biometric Cryptography Based on Fingerprints. – М.: LAP Lambert Academic Publishing, 2010. – 160 с.
  91. Usman Habib. Secure Mobile Authentication for Linux Workstation log on. – М.: LAP Lambert Academic Publishing, 2011. – 120 с.
  92. Mais Mohammed Hobi and Sarab Majeed Hameed. Biometrics for User Authentication Using Artificial Neural Networks. – М.: LAP Lambert Academic Publishing, 2013. – 108 с.
  93. Kefa Rabah. Mastering Securing ICT Infrastructure for Corporate Network. – М.: LAP Lambert Academic Publishing, 2014. – 360 с.
  94. Shubhashis Kumar Shil and Iftekhar Ibney Gias Remon. Iris Recognition: Matrix Index Distance Method. – М.: LAP Lambert Academic Publishing, 2011. – 88 с.
  95. Hiren Joshi. BIOMET: A multimodal Biometric Authentication System. – М.: LAP Lambert Academic Publishing, 2011. – 236 с.
  96. Stepan Mracek. 3D Face Recognition. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.
  97. Md. Rabiul Islam and M. Abdul Goffar Khan. Retina Recognition: Secure Biometric Authentication System. – М.: LAP Lambert Academic Publishing, 2012. – 72 с.
  98. Vinayak Bharadi,Amol Ambardekar and Hemchandra Kekre. Static Signature Recognition using Morphology. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  99. Raed Alsaqour and Yap Earn. Searchable Symmetric Encryption. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  100. Hefeng Xu. Biometric Fusion Studies. – М.: LAP Lambert Academic Publishing, 2012. – 128 с.
  101. Temitope Mapayi. Enhancing Biometric Authentication Using Visual Challenge Response. – М.: LAP Lambert Academic Publishing, 2012. – 116 с.
  102. Mohd Nazri Ismail,Mohd Afizi Shukran and Megat Farez Azril. VoIP over IP with fingerprint authentication and digital signature. – М.: LAP Lambert Academic Publishing, 2014. – 84 с.
  103. Yekta Said Can. Biometric Authentication Using Spread Spectrum Audio Watermarking. – М.: LAP Lambert Academic Publishing, 2015. – 80 с.
  104. Raghavendra Kagalavadi Ramesh,Deepak D'Souza and Barbara Sprick. Model checking trace-based information flow properties. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  105. Julien Shabani. Information Security for RFID Systems. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.
  106. Vinayak Bharadi and Hemchandra Kekre. Signature Recognition Using Clustering Techniques. – М.: LAP Lambert Academic Publishing, 2012. – 180 с.
  107. Christine Mulunda,Peter Wagacha and Alfayo Oyugi. Genetic Algorithm Based Model in Text Steganography. – М.: Scholars' Press, 2014. – 60 с.
  108. Adebayo Kolawole John. Biometric Authentication: An Hybrid Face Recognition System Model. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  109. Khalil Zebbiche. Digital Watermarking For Securing Fingerprint Data. – М.: LAP Lambert Academic Publishing, 2012. – 156 с.
  110. Prateek Verma,Maheedhar Dubey and Praveen Verma. Comparison of Various Segmentation Techniques in Iris Recognition. – М.: LAP Lambert Academic Publishing, 2012. – 116 с.
  111. Adebayo Omotosho and Justice Emuoyibofarhe. Development of a Secure Intelligent Electronic Prescription System. – М.: LAP Lambert Academic Publishing, 2012. – 156 с.
  112. Fadel O. Shaban. Spyware Detection. – М.: LAP Lambert Academic Publishing, 2013. – 92 с.
  113. Saeed Khorashadizadeh. An Improved Hough Transform Algorithm in Iris Recognition System. – М.: LAP Lambert Academic Publishing, 2014. – 140 с.
  114. Dirk Lessner. Network Security for Embedded Systems. – М.: LAP Lambert Academic Publishing, 2009. – 232 с.
  115. Nirmalya Kar and Sharmistha Roy. Secure Electronic Voting. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  116. Penmetsa V. Krishna Raja,A.S.N. Chakravarthy and P.S. Avadhani. Crypto Authentication System Using Hilbert Matrices. – М.: LAP Lambert Academic Publishing, 2014. – 160 с.
  117. Stephen Murove,S. B. Mangena and B. Jones. Firewall Evaluation:Models for Major Decisions in Computer Security. – М.: LAP Lambert Academic Publishing, 2014. – 236 с.
  118. Vinayak Bharadi,Hemchandra Kekre and Rita Vora. Retinal Scan Recognition. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  119. Kamal Shah and Hemchandra Kekre. Face Recognition for Surveillance Purpose. – М.: LAP Lambert Academic Publishing, 2014. – 288 с.
  120. Muhammad Qaiser Saleem,Jafreezal Jaafar and Mohd Fadzil Hassan. Modeling Security Objectives along BPM of SOA Applications. – М.: LAP Lambert Academic Publishing, 2013. – 236 с.
  121. Md. Rajibul Islam. A Secure Personal Identification System. – М.: LAP Lambert Academic Publishing, 2010. – 196 с.
  122. Francisco Canovas Valles,Zaneta Babko and Olga Bzdawka. FingerPal: Biometric Payment System. – М.: LAP Lambert Academic Publishing, 2010. – 108 с.
  123. Shaukat Ali Khan. Facial Recognition Biometric Systems. – М.: LAP Lambert Academic Publishing, 2010. – 64 с.
  124. Vinayak Bharadi and Hemchandra Kekre. Biometric Authentication Systems. – М.: LAP Lambert Academic Publishing, 2012. – 364 с.
  125. Nirmalya Kar,Ashim Saha and Mrinal Kanti Debbarma. Biometric Based Attendance System. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  126. Mousumi Saha. Simulation of FPGA based Buffered Security Enabled Encoders. – М.: LAP Lambert Academic Publishing, 2012. – 100 с.
  127. Richard Rimiru. Exploring Immune System's Concepts for the Design of Novel AIS Models. – М.: LAP Lambert Academic Publishing, 2012. – 164 с.
  128. Matteo Ferrara. Biometric Fingerprint Recognition Systems. – М.: LAP Lambert Academic Publishing, 2010. – 148 с.
  129. Marcos Ortega Hortas. Biometric authentication using the retinal vessel tree. – М.: LAP Lambert Academic Publishing, 2011. – 184 с.
  130. Hussein Mohsen,Karim Jahed and Marwan Fawaz. Multi-Purpose Speech Recognition and Speech Synthesis System. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  131. Md Asraful Haque. Multilevel Password Authentication Method using Graphics and Text. – М.: LAP Lambert Academic Publishing, 2013. – 56 с.
  132. Amare Abawa. SYSTEMS ANALYSIS AND DESIGN:. – М.: LAP Lambert Academic Publishing, 2010. – 152 с.
  133. Nivin Abdelmeguid. Strategic Human Resource Management and Organizational Performance. – М.: LAP Lambert Academic Publishing, 2014. – 132 с.
  134. Claudia-Georgeta Carstea. New approach about project management of complex information systems. – М.: LAP Lambert Academic Publishing, 2011. – 152 с.
  135. Dimple Parekh. Fingerprint Classification. – М.: LAP Lambert Academic Publishing, 2012. – 72 с.
  136. Mohammed Vyada,Anilkumar Suthar and Arvind Yadav. Simulation & Analysis Image Authentication using XSG with MATLAB. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  137. Tarachand Verma,Piyusha Tyagi and Somya Arya. Biometric Template Security in Iris Based Systems: A Novel Approach. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  138. Divya Sushma. facial recognition system. – М.: LAP Lambert Academic Publishing, 2011. – 76 с.
  139. Dilloo Lubna. Face Recognition. – М.: , 2011. – 88 с.
  140. Ban Mustafa and Najla Aldabagh. Building an Ontology Based Access Control Model for Multi-Agent System. – М.: , 2015. – 120 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Банковское отделение будущего. интервью с Камероном МакКворри. Cameron MacQuarrie, менеджером по развитию бизнеса компании Cisco Systems в области корпоративных финансов в регионе EMEA. Европа, Ближний Восток, Африка. Н.Ф. Колюшенко, "Расчеты и операционная работа в коммерческом банке", № 2, февраль 2006.
  2. Ловушка для пирата. интервью с И. Слабых, руководителем отдела противодействия интеллектуальному пиратству в России и СНГ Adobe Systems. И. Голова, "Расчет", N 9, сентябрь 2012 г.
  3. Я воспринимаю персонального помощника как напарника червяк должен нравиться рыбке, а не рыбаку. интервью с П.А. Черкашиным, руководителем российского представительства компании Adobe Systems. "Управление персоналом", № 20, октябрь 2008.

Образцы работ

Тема и предметТип и объем работы
Концентрация производства и определение оптимальных размеров
Экономика предприятия
Курсовая работа
25 стр.
Переход от концентрации к развитию малых и средних предприятий
Экономика предприятия
Курсовая работа
21 стр.
Этапы формирования теории президентства
История государства и права
Курсовая работа
30 стр.
Эффект от увеличения масштабов производства (специализация и комбинирование производства в различных отраслях экономики России и других стран)
Экономика
Курсовая работа
31 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Вячеслав
Спасибо все без единой ошибки!