Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Joey Hirao, Mimi Choi, Perry Cox, Steven Passer, Jeanmarie Hirao. SAP Security Configuration and Deployment. – М.: Syngress, 2009. – 392 с.
  2. Rabi Jay. Sap® Netweaver Portal Technology: The Complete Reference. – М.: McGraw-Hill, 2008. – 736 с.

Дополнительные результаты

  1. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с.
  2. M. Larry Shillito, M Larry Shillito. Acquiring, Processing, and Deploying Voice of the Customer. – М.: , 0. – 0 с.
  3. Frank J. Fabozzi. Securities Lending and Repurchase Agreements. – М.: , 0. – 0 с.
  4. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с.
  5. Roxannee. Burkey, Charles V. Breakfield. Designing a Total Data Solution: Technology, Implementation, and Deployment. – М.: , 0. – 0 с.
  6. Carol Fallon, Sharon Brown. E-Learning Standards: A Guide to Purchasing, Developing, and Deploying Standards-Conformant E-Learning. – М.: , 0. – 0 с.
  7. Ifip Tc6, Tc11 Joint Working Conference on Communications and Multimedi, Tomaz Klobucar. Advanced Communications and Multimedia Security: Ifip Tc6/Tc11 Sixth Joint Working Conference on Communications and Multimedia Security, September 26-27, 2002, Portoroz, Slovenia (International Federation for Information Processing, 100). – М.: , 0. – 0 с.
  8. Jesus Mena. Homeland Security Techniques and Technologies (Networking Series). – М.: , 0. – 0 с.
  9. V Anand. Cisco IP Routing Protocols: Trouble Shooting Techniques (Networking Series). – М.: , 2004. – 0 с.
  10. Sari Greene. Security Policies and Procedures : Principles and Practices (Security). – М.: , 2005. – 0 с.
  11. Goran Husman. Beginning SharePoint Administration: Windows SharePoint Services and SharePoint Portal Server. – М.: Wrox, 2006. – 552 с.
  12. Jim Stewart. SAP Security: SAP Security Essentials. – М.: Equity Press, 2005. – 136 с.
  13. Patrick Avato, Jonathan D'entremont Coony. Accelerating Clean Energy Technology Research, Development, and Deployment: Lessons from Non-energy Sectors (World Bank Working Papers) (World Bank Working Papers). – М.: , 2008. – 90 с.
  14. Ibp Usa. EU Intelligence and Security Policy and Cooperation Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  15. Ibp Usa. EU Security Strategy and Cooperation Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  16. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с.
  17. IFPO. Security Supervision and Management. – М.: , 2010. – 584 с.
  18. Jeffrey C. Hooke. Security Analysis and Business Valuation on Wall Street + Companion Web Site: A Comprehensive Guide to Today's Valuation Methods. – М.: Wiley, 2010. – 408 с.
  19. Edited by Andrea Bianchi and Alexis Keller. Counterterrorism: Democracy's Challenge. – М.: Hart Publishing, 2008. – 454 с.
  20. Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards and Applications (Wireless Networks and Mobile Communications). – М.: , 2008. – 424 с.
  21. Security Analysis and Business Valuation on Wall Street + Companion Web Site. – М.: , 2010. – 432 с.
  22. Patrick S. Collins. Regulation of Securities, Markets, and Transactions. – М.: , 2011. – 448 с.
  23. Erwin Blackstone. Securing Home and Business. – М.: , 2010. – 310 с.
  24. James Pastor. Security Law and Methods. – М.: , 2010. – 632 с.
  25. Joey Hirao, Mimi Choi, Perry Cox, Steven Passer, Jeanmarie Hirao. SAP Security Configuration and Deployment. – М.: Syngress, 2009. – 392 с.
  26. Marcus Sachs. Securing IM and P2P Applications for the Enterprise. – М.: , 2010. – 650 с.
  27. Suresh Babu. Food Security, Poverty and Nutrition Policy Analysis. – М.: , 2010. – 432 с.
  28. Michael T Nygard. Release It! Design and Deploy Production–Ready Software. – М.: , 2007. – 236 с.
  29. Hillel Cohen. Good Arabs – The Israeli Security Agencies and the Israeli Arabs, 1948–1967. – М.: , 2009. – 272 с.
  30. Hillel Cohen. Good Arabs – The Israeli Security Agencies and the Israeli Arabs, 1948–1967. – М.: , 2011. – 296 с.
  31. Bilal Haidar. Professional ASP.NET 3.5 Security, Membership, and Role Management with C# and VB. – М.: , 2008. – 936 с.
  32. Ted Pattison, Andrew Connell, Scot Hillier, and David Mann. Inside Microsoft SharePoint 2010. – М.: Microsoft Press, 2011. – 648 с.
  33. Christa Anderson and Kristin L. Griffin. Windows Server 2008 R2: Remote Desktop Services: Resource Kit (+ CD-ROM). – М.: Microsoft Press, 2010. – 718 с.
  34. Securities Lending and Repurchase Agreements. – М.: , 1996. – 288 с.
  35. Peter J Katzenstein. The Culture of National Security – Norms and Identity in World Politics. – М.: , 1996. – 580 с.
  36. MOAC. Installing, Configuring and Administering Microsoft Windows XP Professional 2e (70–270) + Lab Manual. – М.: , 2005. – 828 с.
  37. Microsoft. Improving Web Application Security – Threats and Countermeasures. – М.: , 2003. – 960 с.
  38. Donald Lopez. Good Arabs – The Israeli Security Agencies and the Israeli Arabs, 1948–1967. – М.: , 1999. – 290 с.
  39. The American Institute of Architects. Security Planning and Design. – М.: , 2003. – 256 с.
  40. Geoffrey Poitras. Security Analysis and Investment Strategy. – М.: , 2004. – 680 с.
  41. Martin Thomas. Empires of Intelligence – Security Services and Colonial Disorder After 1914. – М.: , 2007. – 486 с.
  42. Edited by Lilian Edwards and Charlotte Waelde. Law and the Internet - Third Edition. – М.: , 2011. – 708 с.
  43. Edited by Marie-Claire Foblets and Trutz von Trotha. Healing the Wounds. – М.: , 2011. – 300 с.
  44. Edited by Marie-Claire Foblets and Trutz von Trotha. Healing the Wounds. – М.: , 2011. – 300 с.
  45. Edited by Andrea Bianchi and Alexis Keller. Counterterrorism: Democracy’s Challenge. – М.: , 2011. – 438 с.
  46. Edited by Kim Brooks, Asa Gunnarson, Lisa Philipps and Maria Wersig. Challenging Gender Inequality in Tax Policy Making. – М.: , 2011. – 300 с.
  47. Stefan Elbe. Virus Alert – Security, Governmentality, and the Global AIDS Pandemic. – М.: , 2009. – 224 с.
  48. Hacking Exposed Windows: Microsoft Windows Security Secrets And Solutions, Third Edition. – М.: , 2011. – 451 с.
  49. Oracle Data Guard 11G Handbook. – М.: , 2011. – 544 с.
  50. Security Valuation And Risk Analysis: Assessing Value In Investment Decision-Making. – М.: , 2011. – 614 с.
  51. Security Information And Event Management (Siem) Implementation. – М.: , 2011. – 464 с.
  52. Microsoft Windows Server 2008: A Beginner'S Guide. – М.: , 2011. – 592 с.
  53. Jonathan Sutherland and Diane Canwell. Key Concepts in Accounting and Finance. – М.: Palgrave Macmillan, 2004. – 272 с.
  54. Михаил Савкин. Автоматизация процессов в SAP BusinessObjects Planning and Consolidation. Функциональные возможности. – М.: Эксперт РП, 2012. – 160 с.
  55. Thomas. MCITP 70-663 Exam Ref: Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010. – М.: , 2012. –  с.
  56. Muhammad Naveed Iqbal Qureshi and Sairah Syed. Quantum Cryptography and its Physical Implementation. – М.: LAP Lambert Academic Publishing, 2011. – 60 с.
  57. Subi Khan and R.P. Mahapatra. SQL Injection Attack and Countermeasures. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  58. Md. Mahmudul Hasan Rafee and Sharmin Akter Lima. Proximity Based Access Control (PBAC). – М.: LAP Lambert Academic Publishing, 2012. – 160 с.
  59. Demin Wang and Dharma P. Agrawal. Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2009. – 136 с.
  60. Eddla Padmalatha,Sheral Ramprasad and Ramasani Ravinderreddy. Performance Analysis of Synchronous Cyphers. – М.: LAP Lambert Academic Publishing, 2012. – 140 с.
  61. Raghul Rajendran,Syed Mohaideen Shahidh and Luca Nelson. Model Identification & Fuzzy Controller Implementation For Evaporator. – М.: LAP Lambert Academic Publishing, 2012. – 148 с.
  62. Shaek Rana Mohammad Baki Billah and Mohammad Hafizur Rahman. Design & Development of Network Security System using IP Tables. – М.: LAP Lambert Academic Publishing, 2013. – 164 с.
  63. Neeraj Kumar and Ajay Rana. Comparative Analysis of Different Digital Image Watermarking Techniques. – М.: LAP Lambert Academic Publishing, 2013. – 80 с.
  64. Omar Said and Yasser Albagory. Internet of Things. – М.: LAP Lambert Academic Publishing, 2014. – 136 с.
  65. Jagadish Pal. Power System Static Security Analysis and Control. – М.: LAP Lambert Academic Publishing, 2010. – 160 с.
  66. Lee Yeng Seng,Mohd. Fareq bin Abd. Malek and Wee Fwen Hoon. Design and Development of Frequency Selective Surface (FSS) Structure. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  67. Piotr Perek and Dariusz Makowski. Intelligent Platform Management Controller for ATCA Carrier Boards. – М.: LAP Lambert Academic Publishing, 2011. – 96 с.
  68. Mohammad Nurul Hoque and Sinin Hamdan. Materials and Methods for Concrete and Composite Conrete Floor. – М.: LAP Lambert Academic Publishing, 2012. – 164 с.
  69. Kazi Tanvir Mahmud,David Hilton and Kazi Sohag. A Tale of Empty Plates. – М.: LAP Lambert Academic Publishing, 2012. – 136 с.
  70. Mohamed Youshah Shameel Mecca and Tirumala Rao Kothaluru. Evaluation of EAP Authentication Methods. – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  71. Halimah Awang and Loo-See Beh. Public Administration: Issues and Paradigms of Development. – М.: LAP Lambert Academic Publishing, 2012. – 188 с.
  72. Misgina Asmelash. Rural Household Food Security Status And Its Determinants. – М.: LAP Lambert Academic Publishing, 2011. – 100 с.
  73. Shifeng Yang,Jimin Zhao and Daudi S Simbeye. Aquaculture Environment Control Based on WSN. – М.: LAP Lambert Academic Publishing, 2015. – 144 с.
  74. Sitaram Kumawat,R.K. Mathukia and M.K. Khistaria. Greengram Response to Phosphorus and Sulphur. – М.: LAP Lambert Academic Publishing, 2014. – 148 с.
  75. Endalkachew Teshome,Hailemariam Birkie and Desalegn Mengesha. Community Based Adaptation to Climate Change for Ethiopian Agriculture. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  76. Kwasi Asante and Jackson D. Cothren. MODERATE TO LOW ACCURACY MAPPING DATA ACQUISITION. – М.: LAP Lambert Academic Publishing, 2010. – 100 с.
  77. Masoud Farhoodnea,Azah Mohamed and Hussain Shareef. Power Quality Enhancement in Smart Distribution Systems. – М.: Scholars' Press, 2014. – 180 с.
  78. Hussein M. Khattab,Almoataz Y. Abdelaziz and Said F. Mekhamer. Innovative Approaches for Power System Security Assessment. – М.: LAP Lambert Academic Publishing, 2013. – 224 с.
  79. Dharmesh Hansora,Sudhir Dabke and Rashmi Pachauri. Modeling & Simulation Of Polymerization Reaction/process/ Reactor. – М.: LAP Lambert Academic Publishing, 2012. – 228 с.
  80. Shailendra Bajpai and J. P. Gupta. Site Security. – М.: LAP Lambert Academic Publishing, 2011. – 88 с.
  81. Thanaa Abdel-Moghny and Mohamed Keshawy. An overview on the treatment of oil spill using sorbent materials. – М.: LAP Lambert Academic Publishing, 2014. – 140 с.
  82. Evangelin Hema Mariya,Dhivya Rajasankaran and Aswini Ramaswamy. Trusted Data Forwarding using POR in Manet. – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  83. Oscar van der Vaart and Dennis Bakker. A business approach for the development of the future Dutch coastline. – М.: LAP Lambert Academic Publishing, 2010. – 108 с.
  84. Banani Afsana and Jonny Klokk. 18 Women 18 Stories. – М.: LAP Lambert Academic Publishing, 2010. – 120 с.
  85. Dodeye Williams. African Security Regimes and the Peace Process in Darfur. – М.: LAP Lambert Academic Publishing, 2012. – 232 с.
  86. Alemu Addisu. Rural household Food Security Status and its Determinants. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  87. Nuno Canas Mendes and Andre Saramago. Dimensions of State-Building. – М.: LAP Lambert Academic Publishing, 2012. – 272 с.
  88. Biljana Avramoska Gjoreska and Igor Gjoreski. Collective Security and Role of the New European Security Treaty. – М.: LAP Lambert Academic Publishing, 2015. – 84 с.
  89. Ayyaswamy Kathirvel,Srinivasan Rengaramanujam and Mohanambal Kathirvel. Prevention of attacks usign umpiring security model for manets. – М.: LAP Lambert Academic Publishing, 2012. – 192 с.
  90. Shweta Rehani,Nirmala N. Rao and Deepak Devgun. Spectrophotometric analysis of Candidal Sap in leukoplakia and OSCC. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  91. Dr. Bianca De Canha,Dr. Kathryn Peck and Dr. Zoe Bengis. Homoeopathic Treatment of Infertility. – М.: LAP Lambert Academic Publishing, 2011. – 304 с.
  92. Brian Oduor,Benard Okelo and Silas Onyango. Financial mathematics. – М.: LAP Lambert Academic Publishing, 2011. – 72 с.
  93. Sourav Gur and Samit Ray Chaudhuri. Performance Assessment of Container Crane Under Stochastic Wind Field. – М.: LAP Lambert Academic Publishing, 2012. – 152 с.
  94. Katja Eman and Gorazd Mesko. Environmental Crime in Criminology. – М.: Scholars' Press, 2014. – 196 с.
  95. Olufemi Fawole,Joseph Fayeye and Kingsley Nwachukwu. Security Agency and The Control And Manangement Of Arms In Nigeria. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  96. Barun Biswas and Shyamal Kanti Guha. Application of Acrylic and Circular ESF in fracture management in goat. – М.: LAP Lambert Academic Publishing, 2013. – 84 с.
  97. Peter Cosman and John Cartmill. Simulation in Surgical Education. – М.: LAP Lambert Academic Publishing, 2011. – 328 с.
  98. Reza Jelveh,Ahmad Moinzadeh and Dariush Nejadansari. The Role of Terminology in Movie Translation. – М.: LAP Lambert Academic Publishing, 2013. – 84 с.
  99. John Byabazaire and Benedict Oyo. Student Centred Learning in Uganda. – М.: LAP Lambert Academic Publishing, 2014. – 64 с.
  100. Reza Mohammad Hossein and Kamran Gholamahmadi. A Combinational Security-Model In Service-Oriented Architecture. – М.: LAP Lambert Academic Publishing, 2014. – 136 с.
  101. Amna Qandeel and Neha Anum. Real-Time QR Code Reader. – М.: LAP Lambert Academic Publishing, 2014. – 64 с.
  102. Asma Thamir Ibraheem and Abeer Waleed Alshami. Effect of Different Shapes Loaded Area on Unbounded Granular Materials. – М.: LAP Lambert Academic Publishing, 2014. – 148 с.
  103. Jeremiah Onaolapo and Aderemi Atayero. Design and Development of CUvLab: iOS-Based Virtual ECE Laboratory. – М.: LAP Lambert Academic Publishing, 2013. – 132 с.
  104. Jiantao Gu,Jun Zheng and Jixun Song. WLAN Monitoring and Management System. – М.: LAP Lambert Academic Publishing, 2012. – 196 с.
  105. Marzieh Yazdanipour and Afsaneh Yazdanipour. Wireless Mesh Networks. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  106. K. Shaila and K. R. Venugopal. Secure Data Communication in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2014. – 240 с.
  107. Sanjeev Karmakar and Manoj K. Kowar. A Comprehensive Lecture Notes on RSA-1024 Cryptography. – М.: LAP Lambert Academic Publishing, 2013. – 160 с.
  108. Saurabh Sharma and Sapna Gambhir. Cooperative Malicious Nodes Detection and Removal Scheme in MANETs. – М.: LAP Lambert Academic Publishing, 2014. – 108 с.
  109. R. Baskaran,M. S. Saleem Basha and A. Balasubramanian. Two Tier Security Framework for Service Oriented Systems. – М.: LAP Lambert Academic Publishing, 2012. – 176 с.
  110. Zheng Liu,Xue Li and Zhaoyang Dong. Improvements on Data Security Algorithms for Streaming Multimedia. – М.: LAP Lambert Academic Publishing, 2012. – 240 с.
  111. Djamel DJENOURI and Nadjib BADACHE. Security in Mobile Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 212 с.
  112. Ashkan Gholamhosseinian and Ahmad Khalifeh. Cloud Computing and Sustainability: Energy Efficiency Aspects. – М.: LAP Lambert Academic Publishing, 2012. – 144 с.
  113. Sammee Mushtaq Bazaz,Junaid Jami Gul and Rabia Riaz. Optimal Guard Node Placement Using SGLD and Energy Factor. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  114. Natarajan Meghanathan,DeShante C. Johnson and Alexander R. Geoghegan. An Analysis of Software Security Attacks and Mitigation Controls. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  115. Juan Antonio Villar Ortiz,Jose Luis Sanchez Garcia and Francisco Jose Alfaro Cortes. A Handbook of High-Radix Combined Switches. – М.: Scholars' Press, 2013. – 184 с.
  116. Britto R. Kumar and Albert S. Rabara. An Architecture for Secure Mobile Payment System using PKI. – М.: LAP Lambert Academic Publishing, 2013. – 184 с.
  117. Adewole Adewumi and Nicholas Omoregbe. Usability Evaluation of Mobile Access to Institutional Repository. – М.: LAP Lambert Academic Publishing, 2013. – 144 с.
  118. Dimitrios Papadopoulos and Bernhard Hammerli. Positioning the roles, interfaces & processes in the InfoSec scene. – М.: LAP Lambert Academic Publishing, 2014. – 168 с.
  119. Gunasekar Kumar and Anirudh Chelikani. Analysis of Security Issues in Cloud Based E-Learning. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  120. Xolisa Vuza and William D. Tucker. Social and Technical Issues of Technology in Developing Countries. – М.: LAP Lambert Academic Publishing, 2010. – 128 с.
  121. Nobert R. Jere,Mamello Thinyane and Alfredo Terzoli. Implementation of a rewards-based negotiation module. – М.: LAP Lambert Academic Publishing, 2012. – 160 с.
  122. Davoud Mougouei and Man Kwan Yeung. Requirement Engineering for Intrusion Tolerant Systems. – М.: LAP Lambert Academic Publishing, 2013. – 104 с.
  123. Oluwafemi Osho and Victor Waziri. Conceptual Models and Simulation of Computer Worm Propagation. – М.: LAP Lambert Academic Publishing, 2013. – 116 с.
  124. Musharrif Hussain and Sulman Mahmood. Secure Software and Comm. on Handheld Devices. – М.: LAP Lambert Academic Publishing, 2011. – 60 с.
  125. Stephen Murove,S. B. Mangena and B. Jones. Firewall Evaluation:Models for Major Decisions in Computer Security. – М.: LAP Lambert Academic Publishing, 2014. – 236 с.
  126. Francisco Canovas Valles,Zaneta Babko and Olga Bzdawka. FingerPal: Biometric Payment System. – М.: LAP Lambert Academic Publishing, 2010. – 108 с.
  127. Sena Desmennu and Nicholas Ikhu-Omoregbe. Healthcare Information Management System. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  128. HongLiang Wang,Thomas Marx and Fritz Wurm. Design and Implementation of GCP in a Make to Order Environment. – М.: LAP Lambert Academic Publishing, 2012. – 124 с.
  129. Hilton Chikwiriro,Pharaoh Chaka and Tarirayi Mukabeta. Use of Artificial Intelligence in highly adaptive e-Revision Systems. – М.: LAP Lambert Academic Publishing, 2013. – 64 с.
  130. Nadeem Ahmed and Muhammad Hamayun. Evaluating Windows Communication Foundation (WCF) 4.0. – М.: LAP Lambert Academic Publishing, 2010. – 148 с.
  131. Kerem Beygo and Cihan Eraslan. Enhancing Security and Usability Features of NFC. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  132. Sachin Tripathi and Gosta Pada Biswas. Enhancements on Internet Applications. – М.: LAP Lambert Academic Publishing, 2011. – 148 с.
  133. Sara Jeza Alotaibi,David Argles and Mike Wald. FingerID. – М.: LAP Lambert Academic Publishing, 2011. – 152 с.
  134. Getachew Shambel and Chanyalew Seyum. Review of Food Security status and Cooping Mechanisms in Ethiopia. – М.: LAP Lambert Academic Publishing, 2011. – 360 с.
  135. Corinne A. D. Patrick and Betty M. E. Liz Ross. Challenges for Women in the 21st Century. – М.: LAP Lambert Academic Publishing, 2013. – 60 с.
  136. Nurul Nazlia Jamil and Sherliza Puat Nelson. Audit Committee's Effectiveness and Financial Reporting Quality. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  137. Salina Daud and Wan Fadzilah Wan Yusoff. KNOWLEDGE MANAGEMENT PROCESSES IN SMALL-MEDIUM ENTERPRISES. – М.: LAP Lambert Academic Publishing, 2010. – 92 с.
  138. Hossein Safarzadeh and Maryam Hashemi Fesharaki. Corporate social responsibility. – М.: LAP Lambert Academic Publishing, 2011. – 112 с.
  139. Vishnuvardhan Reddy Banda,S. Yosuf Anwar and Mugalodi S. Ramesha. Genetic Diversity, Combining Ability, Heterosis and Stability in Rice. – М.: LAP Lambert Academic Publishing, 2012. – 308 с.
  140. Nureddin Abulgasem,Dzulkifli Mohamad and Siti Zaiton Hashim. Libyan vehicle license plate detection and recognition using RBF. – М.: LAP Lambert Academic Publishing, 2013. – 140 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Наука человековедения. интервью с Д. Уолтоном, профессором London Metropolitan University, экспертом CIPD. Chartered Institute of Personnel and Development, автором программы Master of Arts in Human Resource Strategies. И. Смирнова, "Кадровый менеджмент", № 5, июль-август 2007.
  2. Специализированный модуль FS-CD. Collections and Disbursements - "Сборы и Выплаты" и его возможности. О.А. Глущенко, "Финансовый менеджмент в страховой компании", № 2, II квартал 2007.
  3. Бюджетирование страховой компании на базе Oracle Enterprise Planning and Budgeting. Д.В. Лесоводский, "Финансовый менеджмент в страховой компании", № 3, III квартал 2006.
  4. Люди приходят в компанию, а уходят от руководителя. интервью с Л. Хейманом, специальным представителем правления SAP. Р. Крецул, "Кадровый менеджмент", № 8, ноябрь 2005.
  5. Директор по персоналу должен себя мотивировать. интервью с С. Шпиндлер, директором по персоналу Европейского подразделения SAP. "Управление персоналом", № 20, октябрь 2005.
  6. Возможности решений SAP для перевода предприятий России на МСФО. О. Ковалева, Ю. Соломатина, "Финансовая газета", № 14, 15, апрель 2005.
  7. Решения SAP для перехода российских предприятий на МСФО. О. Ковалева, "Финансовая газета", № 33, август 2004.
  8. Регулирование операций торгового финансирования: новые инициативы. интервью с Д. Шмандом, вице-председателем Банковской комиссии ICC по supply chain finance, главой подразделения Trade Finance and Cash Management Corporates EMEA в Global Transaction Banking. GTB division Deutsche Bank. Н. Макарова, "Международные банковские операции", N 2, апрель-июнь 2012 г.
  9. Ужин в темноте в стиле Малевича и Новый год в Хаммере". Что может выть лучше?". интервью с Н. Саниной, индивидуальным предпринимателем и креативным директором компании "San and stars". М. Сипатова, "Арсенал предпринимателя", N 12, декабрь 2011 г.
  10. На пути к новому стандарту в торговом финансировании. интервью с А.  Кастерманом, руководителем Trade and Supply Chain, SWIFT, сопредседателем рабочей группы ICC-BPO. Э. Шакирова, "Международные банковские операции", N 4, октябрь-декабрь 2011 г.
  11. Программные продукты SAP для автоматизации налогового учета. Ф. Лебедев, К. Никитин, Д. Сурченко, С. Сараев, "Финансовая газета", N 33, август 2010 г.
  12. Уильям Савадж: Мотивировать людей в Нижнем Новгороде и Новосибирске нужно по-разному". интервью с У. Саваджем, вице-президентом корпорации Intel, подразделение Software and Services Group. М. Холкина, "Управление персоналом", N 14, июль 2010 г.
  13. Решения SAP: планирование, управление и контроль за капиталоемкими проектами. П. Сорокин, "Финансовая газета", № 42, октябрь 2009.
  14. Цены под контролем: the present and the future. С. Стройкова, И. Леметюйнен, "Консультант", № 19, сентябрь 2009.
  15. Подход SAP к реализации концепции сервисно-ориентированной архитектуры. К. Жуков, Ю. Кудрявцева, "Финансовая газета", № 2, январь 2009.
  16. Не все компании хотят снизить затраты на процесс управления персоналом. интервью с А. Кузнецовым, руководителем отдела развития бизнеса и сервиса в области управления персоналом SAP СНГ. "Управление персоналом", № 18, сентябрь 2008.
  17. Единство финансового учета и управления банком в решениях SAP. О.В. Глущенко, А.В. Волков, "МСФО и МСА в кредитной организации", № 3, июль-сентябрь 2008.

Образцы работ

Тема и предметТип и объем работы
Проблемы бедности в России
Экономика
Курсовая работа
40 стр.
Организационный конфликт как фактор развития организации
Теория организации
Курсовая работа
40 стр.
Последствия операции НАТО
Политология
Диплом
80 стр.
Математические модели океанических течений
Переводоведение (теория перевода)
Курсовая работа
42 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Роман
Отлично, спасибо большое