Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Abbas Mehdizadeh Zare Anari and Ayyoub Akbari Moghanjoughi. Route optimization security in mobile IPv6 networks. – М.: LAP Lambert Academic Publishing, 2012. – 116 с.

Дополнительные результаты

  1. Security and Privacy in Mobile Information and Communication Systems: Third International ICST Conference, MOBISEC 2011, Aalborg, Denmark, May 17-19, ... and Telecommunications Engineering). – М.: , 2012. – 195 с.
  2. Dennis Dalton. Rethinking Corporate Security in the Post 9-11 Era. – М.: , 2003. – 0 с.
  3. Peter Winker, Peter Winker. Optimization Heuristics in Econometrics : Applications of Threshold Accepting. – М.: , 0. – 0 с.
  4. Gavin Cawthra. Securing South Africa's Democracy: Defense, Development and Security in Transition (International Political Economy Series). – М.: , 0. – 0 с.
  5. Ee-Peng Lim, Keng Siau. Advances in Mobile Commerce Technologies. – М.: , 0. – 0 с.
  6. Joseph S. Nye, William A. Owens, James R. Schlesinger, R. James Woolsey, James A. Lewis, Joseph S., Jr. Nye, James Andrew Lewis, Erin Schlather, Csis Commission on Technology Security in the Twenty-First Century. Computer Exports and National Security: New Tools for a New Century : A Report of the Csis Commission on Technology Security in the 21St-Century (Csis Panel Reports.). – М.: , 0. – 0 с.
  7. Niels Ploug, Jon Kvist. Social Security in Europe: Development or Dismantlement? (Kluwer Sovac Series on Social Security, Vol 3). – М.: , 0. – 0 с.
  8. Aspatore Books. Corporate Security in the Information Age: Industry Leaders from Bose Corporation, Dow Jones, and more on Security Options, Protecting Assets, & Implementing a Strategy (Inside the Minds). – М.: , 2005. – 0 с.
  9. Safety and Security in Tourism: Relationships, Management, and Marketing (Journal of Travel & Tourism Marketing Monographic Separates). – М.: , 2003. – 0 с.
  10. Frontiers of Broadband, Electronic and Mobile Commerce (Contributions to Economics). – М.: , 2004. – 0 с.
  11. Vincenzo Galasso. The Political Future of Social Security in Aging Societies. – М.: , 2008. – 280 с.
  12. Pierre-laurent Chatain, Raul Hernandez-Coss, Kamil Borowik, Andrew Zerzan. Integrity in Mobile Phone Financial Services: Measures for Mitigating the Risks of Money Laundering and Terrorist Financing (World Bank Working Papers) (World Bank Working Papers). – М.: , 2008. – 76 с.
  13. Connectivity and Knowledge Management in Virtual Organizations: Networking and Developing Interactive Communications (Premier Reference Source). – М.: , 2008. – 450 с.
  14. Hans-Werner Franz, Ruggiera Sarcina. Building Leadership in Project and Network Management: A Facilitator's Tool Set. – М.: , 2009. – 284 с.
  15. Findlay Shearer. Power Management in Mobile Devices. – М.: , 2010. – 336 с.
  16. Daniel Minoli. Satellite Systems Engineering in an IPv6 Environment. – М.: , 2009. – 360 с.
  17. Novel Algorithms and Techniques in Telecommunications and Networking. – М.: , 2010. – 400 с.
  18. Qing Li. Mobile IPv6. – М.: , 2010. – 479 с.
  19. Jun-ichiro itojun Hagino. IPv6 Network Programming. – М.: , 2010. – 376 с.
  20. NEMHAUSER. OPTIMIZATION - HANDBOOKS IN OPERATIONS RESEARCH AND MANAGEMENT SCIENCE VOL.*1*. – М.: , 2010. – 0 с.
  21. Paul Goransson. Secure Roaming in 802.11 Networks. – М.: , 2010. – 368 с.
  22. BALL ET AL. NETWORK ROUTING HORM 8HANDBOOKS IN OPERATIONS RESEARCH AND MANAGEMENT SCIENCE VOL.8. – М.: , 2010. – 0 с.
  23. Mark Ungar. Policing Democracy – Overcoming Obstacles to Citizen Security in Latin America. – М.: , 2011. – 336 с.
  24. Bruce Clay. Search Engine Optimization All–in–One For Dummies®. – М.: , 2011. – 840 с.
  25. Robert Legvold. Swords and Sustenance – The Economics of Security in Belarus and Ukraine. – М.: , 2004. – 256 с.
  26. Jeffrey Lewis. The Minimum Means of Reprisal – China?s Search for Security in the Nuclear Age. – М.: , 2007. – 200 с.
  27. Mark Ungar. Policing Democracy – Overcoming Obstacles to Citizen Security in Latin America. – М.: , 2011. – 336 с.
  28. James Cavallaro. Security in Paraquay – Analysis and Responses in Comparative Perspective. – М.: , 2008. – 180 с.
  29. Brad Roberts. U.S Security in an Uncertain Era (Paper). – М.: , 1993. – 428 с.
  30. James Clifford. Routes – Travel & Translation in the Late Twentieth Century (Paper). – М.: , 1997. – 412 с.
  31. Niall Richard Murphy. IPv6 Network Administration. – М.: , 2005. – 306 с.
  32. Jeffrey Lewis. The Minimum Means of Reprisal – China?s Search for Security in the Nuclear Age. – М.: , 2007. – 200 с.
  33. Andrew T Price–smith. Contagion and Chaos – Disease, Ecology and National Security in the Era of Globalization. – М.: , 2009. – 296 с.
  34. Robert Legvold. Swords and Sustenance – The Economics of Security in Belarus and Ukraine. – М.: , 2004. – 256 с.
  35. Stuart. Politics and Security in the Southern Region of th e Atlantic Alliance. – М.: , 1988. – 0 с.
  36. Thomas W. Madron. Network Security in the 90?s. – М.: , 1992. – 304 с.
  37. Joseph S. Park. AS/400 Security in a Client/Server Environment. – М.: , 1995. – 290 с.
  38. DAN. Network Security In A Mixed Environment. – М.: , 1998. – 456 с.
  39. Microsoft Official Academic Course. 70–299 Implementing and Administering Security in a Microsoft® Windows ServerTM 2003 Network Package. – М.: , 2005. – 836 с.
  40. Philip W Porter. Challenging Nature – Local Knowledge, Agroscience, and Food Security in Tanga region, Tanzania. – М.: , 2006. – 288 с.
  41. KV MITAL. Mital: Optimization Methods – In Operations Research & Systems Analysis 2ed. – М.: , 1983. – 344 с.
  42. KV MITAL. Mital ?optimization? Methods In Operations Researc H Ans Systems Analysis (paper Only). – М.: , 1977. – 0 с.
  43. Matthew Strebe. MCSA/MCSE Self–Paced Training Kit (Exam 70–214) – Implemanting and Administering Security in a Microsoft Windows 2000 Network. – М.: , 2003. – 704 с.
  44. John J. McCarthy. Optimality Theory in Phonology. – М.: , 2003. – 624 с.
  45. Michael E Brown. Going Nuclear – Nuclear Proliferation and International Security in the 21st Century. – М.: , 2010. – 416 с.
  46. Carlos Curtis Solari. Security in a Web 2.0+ World. – М.: , 2009. – 268 с.
  47. Social Security in the 21st Century. – М.: , 2001. – 224 с.
  48. S MUFTIC. Muftic: ?security? Mechanisms For Computer Network S. – М.: , 1989. – 196 с.
  49. Joseph Davies. Deploying Secure 802.11 Wireless Networks with Microsoft Windoows. – М.: , 2003. – 416 с.
  50. Andrew T Price–smith. Contagion and Chaos – Disease, Ecology and National Security in the Era of Globalization. – М.: , 2009. – 296 с.
  51. Shlomo Brom. Path Routing in Mesh Optical Networks. – М.: , 2000. – 486 с.
  52. Timothy Rommen. Funky Nassau – Roots, Routes, and Representation in Bahamian Popular Music. – М.: , 2011. – 304 с.
  53. Timothy Rommen. Funky Nassau – Roots, Routes, and Representation in Bahamian Popular Music. – М.: , 2011. – 304 с.
  54. Antennas For Base Stations In Wireless Communications. – М.: , 2011. – 412 с.
  55. Zong Woo Geem. Optimal Design of Water Distribution Networks Using Harmony Search. – М.: LAP Lambert Academic Publishing, 2010. – 116 с.
  56. Amit Wason and R.S. Kaler. Routing & Wavelength Assignment Algorithms in WDM Optical Networks. – М.: LAP Lambert Academic Publishing, 2011. – 188 с.
  57. Evangelin Hema Mariya. Efficient Energy Saving in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2013. – 52 с.
  58. Prof Lucy Lynn Maliwichi,Prof Peter BIkam and Dovhani Johannes Mulaudzi. Energy Needs and Food Security in Mutale Municipality, South Africa. – М.: LAP Lambert Academic Publishing, 2011. – 76 с.
  59. Yannis Benlachtar. Advanced Performance Monitoring in All-Optical Networks. – М.: LAP Lambert Academic Publishing, 2010. – 232 с.
  60. Suleiman Garba,M.B. Mu'azu and D.D. Dajab. Modeling QoS in a Telecommunications Network Using Neuro-Fuzzy Logic. – М.: LAP Lambert Academic Publishing, 2012. – 268 с.
  61. Md. Saifur Rahman. Broadcasting Protocols in Mobile Ad-hoc Network. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  62. Mohammed Chetioui and Fatima Bouasria. CDMA and PRMA for multimedia mobile communication. – М.: LAP Lambert Academic Publishing, 2015. – 112 с.
  63. Idd Pazi Alli. Channel Estimation In Mobile Wireless Systems. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  64. Kulvir Kaur. Shortest path routing problem in networks and optimization algorithms. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  65. Reza Sirjani,Azah Mohamed and Hussain Shareef. Optimal Capacitor Placement in Radial Distribution Networks. – М.: LAP Lambert Academic Publishing, 2012. – 132 с.
  66. Nor Azlina Ab Aziz. Swarm Intelligence In Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 164 с.
  67. Jonthon Coulson. The Strength of Weak Ties in Online Social Networks. – М.: LAP Lambert Academic Publishing, 2010. – 80 с.
  68. Clemence Rusenga. Land Tenure, Gender and Food Security in Zimbabwe. – М.: LAP Lambert Academic Publishing, 2011. – 172 с.
  69. Simon Nangabo. The Impact of HIV/AIDS on Food Security in Rural Africa. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  70. Maurice Kwakkernaat. Directional Dispersion of Radio Waves in Mobile Channels. – М.: LAP Lambert Academic Publishing, 2010. – 168 с.
  71. Never Assan. Food Security in Sub Saharan Africa. – М.: LAP Lambert Academic Publishing, 2013. – 148 с.
  72. Abraham Mudefi. Fast Track Land Reform and Household Food Security in Zimbabwe. – М.: LAP Lambert Academic Publishing, 2011. – 116 с.
  73. Indra Bahadur Hayu. Livelihood Security In Nepal. – М.: LAP Lambert Academic Publishing, 2014. – 76 с.
  74. Demeku Mesfin. The Status Of Food Security In Face Of Climate Change,Central Ethiopia. – М.: LAP Lambert Academic Publishing, 2015. – 140 с.
  75. Rex Cannon. Functional Connectivity of EEG in the default network of the brain. – М.: LAP Lambert Academic Publishing, 2010. – 132 с.
  76. Sylvester Marumahoko. Household food security in Zimbabwe. – М.: LAP Lambert Academic Publishing, 2013. – 104 с.
  77. Scott Nicholas Romaniuk. New Polar Horizons: Conflict and Security in the Arctic. – М.: LAP Lambert Academic Publishing, 2011. – 160 с.
  78. Scott Nicholas Romaniuk. Competing Powers: Security in the Wider Black Sea Region. – М.: LAP Lambert Academic Publishing, 2011. – 408 с.
  79. Indranil Nandy. Exploration and Data Aggregation in Distributed Sensor Networks. – М.: LAP Lambert Academic Publishing, 2011. – 156 с.
  80. Asrul Sani. The Spread of HIV/AIDS in Mobile Populations. – М.: LAP Lambert Academic Publishing, 2010. – 156 с.
  81. Ekaterina Anyanova. The regime of maritime security in international, EU and national law. – М.: LAP Lambert Academic Publishing, 2014. – 324 с.
  82. Maseeh Haseeb. The Theories of Ideology and Discourse: National Security in Canada. – М.: LAP Lambert Academic Publishing, 2013. – 80 с.
  83. Abid Hussain. Achieving Food Security in Pakistan. – М.: LAP Lambert Academic Publishing, 2010. – 124 с.
  84. Nagat Mustafa Elmulthum. Poverty and Food Security in the Sudan. – М.: LAP Lambert Academic Publishing, 2011. – 84 с.
  85. Angelin Jeyaseeli D. Critical Event Monitoring in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  86. Adel Abdelhadi. Algorithms for the integration of Arabic Language in Mobile Phones. – М.: LAP Lambert Academic Publishing, 2013. – 100 с.
  87. Sunil Kumar. Localization in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  88. Deepak Puthal and Bibhudatta Sahoo. Secure Data Collection & Critical Data Transmission in Mobile Sink WSN. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  89. Ahmed Khattab. Multimedia Traffic Scheduling in Future Wireless Networks. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  90. Ayman Wazwaz. Medium Access and Routing In Multi Hop Wireless Infrastructures. – М.: LAP Lambert Academic Publishing, 2011. – 100 с.
  91. Younus Javed and Hassan Tahir. Optimized Security Protocol for Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  92. Sandeep Kr. Agarwal and Dr. K. V. Arya. Security in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  93. Lusheng Miao,Karim Djouani and Anish Kurien. Network routing and coding in wireless sensor networks. – М.: LAP Lambert Academic Publishing, 2012. – 168 с.
  94. Mohammad Usman Ali Khan. Optimization of TCP over Wireless Networks. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  95. Reza Firsandaya Malik and Tharek Abdul Rahman. Routing Optimization Scheme in Wireless Mesh Network. – М.: LAP Lambert Academic Publishing, 2012. – 160 с.
  96. Abbas Mehdizadeh Zare Anari and Ayyoub Akbari Moghanjoughi. Route optimization security in mobile IPv6 networks. – М.: LAP Lambert Academic Publishing, 2012. – 116 с.
  97. Mohamed Amine Ferrag. Study of Attacks in Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  98. Vinothkumar Jambulingam. Secure and Anonymous Routing for Mobile Adhoc Networks. – М.: LAP Lambert Academic Publishing, 2014. – 72 с.
  99. Angela Amphawan and Kashif Nisar. Dynamic Cell Sizing in Mobile Cellular Networks. – М.: LAP Lambert Academic Publishing, 2012. – 116 с.
  100. Ming-Chin Chuang. Resource and Mobility Management Issues in LTE-A Networks. – М.: Scholars' Press, 2014. – 56 с.
  101. Xuanwen Luo and Ming Dong. Distributed Fault-Tolerant Detection in Wireless Sensor Networks. – М.: Scholars' Press, 2013. – 88 с.
  102. Rajesh Deshmukh and Asha Ambhaikar. Exploring AODV Vs DSR. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  103. K. Shaila and K. R. Venugopal. Secure Data Communication in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2014. – 240 с.
  104. Elliot Attipoe. Securing the Public Wireless Network. – М.: LAP Lambert Academic Publishing, 2013. – 92 с.
  105. Heba Elshandidy. Enhancing Security Solutions in Mobile Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2013. – 128 с.
  106. Sherif Kamel. Route Optimization in Mobile IP. – М.: LAP Lambert Academic Publishing, 2014. – 248 с.
  107. Heena Mittal and Gurpreet Singh. Security of Mobile Agents in Distributed Computing. – М.: LAP Lambert Academic Publishing, 2014. – 80 с.
  108. Ramandeep Kaur. Packet dropping attack in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2014. – 52 с.
  109. Nitin K. Mishra and Sumit Dhariwal. Security in Mobile Ad-Hoc Networks. – М.: LAP Lambert Academic Publishing, 2014. – 72 с.
  110. Ali Modirkhazeni. Mitigation of Passive Wormhole Attack in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2015. – 112 с.
  111. Piotr Szczechowiak. Security in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2011. – 248 с.
  112. Wen Hu. Resource Provisioning and Management in Hybrid Sensor Networks. – М.: LAP Lambert Academic Publishing, 2011. – 168 с.
  113. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  114. Elias A. Doumith. From Network Planning to Traffic Engineering in Multi-layer Networks. – М.: LAP Lambert Academic Publishing, 2012. – 272 с.
  115. Jamil Ibriq. Secure Routing in Wireless Sensor Networks. – М.: Scholars' Press, 2013. – 104 с.
  116. Ayesha Ubaid and Ubaid UR Rehman. Intelligent Routing in Multimedia Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  117. S. H. Manjula and Venugopal K. R. Maximizing Energy Efficient Techniques in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 208 с.
  118. Anurag Kumar Jaiswal. Malicious Behavior in Mobile Adhoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 116 с.
  119. Pragati Patil-Bedekar. Energy & Time Performance Metrics in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  120. Megha Sharma Bisht,Seema Verma and G.N. Purohit. Algorithms For Optimal Coverage In Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 188 с.
  121. Sepideh Afkhami Goli. Clustering in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  122. Sanket Gulhane. Modified AODV Routing Protocol For Ad hoc Network. – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  123. Soke Onyemelukwe. On-Demand Routing and Security in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2013. – 128 с.
  124. Amit Kumar Mehta. Sustainable Energy Optimization in Mobile Communication Networks. – М.: LAP Lambert Academic Publishing, 2013. – 240 с.
  125. Janos Tapolcai. Routing Algorithms In Survivable Telecommunication Networks. – М.: LAP Lambert Academic Publishing, 2010. – 136 с.
  126. Djamel DJENOURI and Nadjib BADACHE. Security in Mobile Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 212 с.
  127. ANNADURAI P and Dr. V. PALANISAMY. Impact of Black Hole Attack on Multicast in Ad hoc Network (IBAMA). – М.: LAP Lambert Academic Publishing, 2011. – 84 с.
  128. Mohamed Amnai. Quality of Service Management and Mobility Control in Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 148 с.
  129. Loay Faisal and Aisha-Hassan Abdalla. A Diffserv Approach to Enhance QoS in Mobile IPv6 Based Networks. – М.: LAP Lambert Academic Publishing, 2011. – 136 с.
  130. DHANANJAY BISEN. TCP Variants over Mobile Adhoc Network. – М.: LAP Lambert Academic Publishing, 2012. – 132 с.
  131. Paolo Medagliani and Gianluigi Ferrari. Performance Optimization in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2011. – 212 с.
  132. Bradley Markides and marijke coetzee. Trust in a decentralised mobile social network. – М.: LAP Lambert Academic Publishing, 2012. – 192 с.
  133. Gaurav Kanade. Combinatorial Optimization Problems in Geometric Settings. – М.: Scholars' Press, 2013. – 124 с.
  134. Hans Raj,P. C. Gupta and Gianetan Singh Sekhon. Security Issues,Aspects & Domain Based Security for Mobile Agents. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  135. Firas Abdullah Thweny Al-Saedi and Muhanad Mustafa Asem Al-Adhamee. Performance Study of Mobile IPv6 Using OPNET Simulator. – М.: LAP Lambert Academic Publishing, 2013. – 160 с.
  136. Sivapathalingham Sivavakeesar. Quality of Service Support in Mobile Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 288 с.
  137. Igor Botian. Software Security Vulnerabilities in Mobile Peer-to-peer Environment. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  138. M. Reza Rahimi. QoS-Aware Middleware for Service Allocation in Mobile Cloud Computing. – М.: LAP Lambert Academic Publishing, 2014. – 124 с.
  139. Al-Sakib Khan Pathan. Securing WSN with Lightweight Resource-Efficient Schemes. – М.: LAP Lambert Academic Publishing, 2011. – 116 с.
  140. Reza Malekian and Abdul Hanan Abdullah. Resource Reservation in Mobile Internet Networks. – М.: LAP Lambert Academic Publishing, 2013. – 104 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Наука человековедения. интервью с Д. Уолтоном, профессором London Metropolitan University, экспертом CIPD. Chartered Institute of Personnel and Development, автором программы Master of Arts in Human Resource Strategies. И. Смирнова, "Кадровый менеджмент", № 5, июль-август 2007.
  2. Нюансы управления офисным perpetuum mobile. В. Богданов, "Консультант", № 11, июнь 2007.
  3. Mobile Клиент - простота и эффективность сегодняшнего дня. С. Мастеренко, "Банковское дело в Москве", № 4, апрель 2006.
  4. Иностранные работники - perpetuum mobile российского законодательства. А. А. Курушин, "В курсе правового дела", N 4, февраль 2011 г.
  5. Trade-in как способ обмена автомобиля. С.Н. Гордеева, "Торговля: бухгалтерский учет и налогообложение", N 2, февраль 2011 г.
  6. Проблемы применения универсальной юрисдикции in absentia. Г.А. Королев, "Журнал российского права", № 10, октябрь 2009.
  7. Тонкости trade-in. С.А.Королев, "НДС. Проблемы и решения", № 8, август 2009.
  8. Основной арсенал "охотника" - его network: кого он знает на рынке и качество этих отношений. С. Плетнева, "Управление персоналом", № 12, июнь 2009.
  9. In-store banking - новая модель банковского бизнеса. А. Пятков, "Банковское обозрение", № 11, ноябрь 2008.

Образцы работ

Тема и предметТип и объем работы
Последствия операции НАТО
Политология
Диплом
80 стр.
Понятие и история брендинга. Анализ создания и стратегия продвижения бренда ***
Электроснабжение городов и промышленных предприятий
Другое
72 стр.
Математические модели океанических течений
Переводоведение (теория перевода)
Курсовая работа
42 стр.
Комплекс маркетинговых коммуникаций в продвижении цифровых СМИ
Маркетинг
Диплом
74 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Елена
ОГРОМНОЕ СПАСИБО!!! Защитила на отлично!