Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Emily M. Harwood. Digital CCTV: A Security Professional's Guide. – М.: Butterworth-Heinemann, 2007. – 272 с.
  2. Chirag Sharma. Efficient Watermarking Technique for Quality Loss of Data. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  3. SEEMA KHARB and AASHUTOSH KHARB. SECURE VIDEO COMPRESSION. – М.: LAP Lambert Academic Publishing, 2010. – 80 с.
  4. Vinayak Bharadi and Sujata Dubal. Video Compression Technique for Low Bit Rate Application. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  5. Marc Decombas. Low bitrate video compression by content characterization. – М.: LAP Lambert Academic Publishing, 2014. – 168 с.
  6. Taha Mahdy. Real Time Video Watermarking: A new era of H.264 Security. – М.: LAP Lambert Academic Publishing, 2013. – 128 с.

Дополнительные результаты

  1. Francis Groves. Corporate Actions - A Concise Guide: An introduction to securities events. – М.: , 2012. – 230 с.
  2. Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с.
  3. Data Privacy Management and Autonomous Spontaneus Security: 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, ... Computer Science / Security and Cryptology). – М.: , 2012. – 334 с.
  4. Security and Privacy in Mobile Information and Communication Systems: Third International ICST Conference, MOBISEC 2011, Aalborg, Denmark, May 17-19, ... and Telecommunications Engineering). – М.: , 2012. – 195 с.
  5. Constructive Side-Channel Analysis and Secure Design: Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings ... Computer Science / Security and Cryptology). – М.: , 2012. – 280 с.
  6. Public Key Infrastructures, Services and Applications: 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected ... Computer Science / Security and Cryptology). – М.: , 2012. – 219 с.
  7. Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  8. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с.
  9. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с.
  10. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 515 с.
  11. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  12. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с.
  13. Smart Card Research and Advanced Applications: 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, ... Computer Science / Security and Cryptology). – М.: , 2012. – 357 с.
  14. Video Analytics for Business Intelligence (Studies in Computational Intelligence). – М.: , 2012. – 388 с.
  15. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с.
  16. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с.
  17. Security and Development in Global Politics: A Critical Comparison. – М.: , 2012. – 360 с.
  18. Joseph F. Stenken JD CLU ChFc. Social Security & Medicare Facts 2012. – М.: , 2012. – 451 с.
  19. Gerry Oginski. Secrets of Lawyer Video Marketing in the Age of YouTube. – М.: , 2012. – 300 с.
  20. Luis Lobo-Guerrero. Insuring Security: Biopolitics, security and risk. – М.: , 2012. – 178 с.
  21. Jason Lohman. Video Internet Marketing: Making Your Presence Known On The Internet. – М.: , 2012. – 26 с.
  22. CCH Editorial Staff. Social Security Explained 2012. – М.: , 2012. – 298 с.
  23. Alfred Poor. Insider Secrets to Marketing Your Small Business with Video: How you can boost sales with low-cost video. – М.: , 2012. – 112 с.
  24. Terrorism and the Olympics: Major Event Security and Lessons for the Future. – М.: , 2012. – 272 с.
  25. Sheila R Ronis. Economic Security: Neglected Dimension of National Security?. – М.: , 2012. – 128 с.
  26. Denise Garcia. Disarmament Diplomacy and Human Security: Regimes, Norms and Moral Progress in International Relations. – М.: , 2012. – 0 с.
  27. Securities Compliance Index. Securities Compliance Index, Second Edition: A Topical Guide To U.S. Securities Regulation. – М.: , 2012. – 512 с.
  28. American Bar Association, Thomas Lee Hazen. Securities Regulation: Corporate Counsel Guides. – М.: , 2012. – 540 с.
  29. Lionel Martellini, Philippe Priaulet, StA©phane Priaulet. Fixed-Income Securities : Valuation, Risk Management and Portfolio Strategies (The Wiley Finance Series). – М.: , 0. – 0 с.
  30. Jeffrey C. Hooke. Security Analysis on Wall Street. – М.: , 0. – 0 с.
  31. Martin Stone, Spencer Strauss. Secure Your Financial Future Investing in Real Estate. – М.: , 0. – 0 с.
  32. William Rini. Fundamentals of the Securities Industry. – М.: , 0. – 0 с.
  33. Frank J. Fabozzi, John N. Dunlevy, Frank J. Fabozzi, John N. Dunlevy. Real Estate Backed Securities. – М.: , 0. – 0 с.
  34. David F. Teitelbaum. The Procrastinator's Guide to Financial Security: How Anyone Over 40 Can Still Build a Strong Portfolio--and Retire Comfortably. – М.: , 0. – 0 с.
  35. Giorgio S. Questa. Fixed Income Analysis for the Global Financial Market: Money Market, Foreign Exchange, Securities, and Derivatives. – М.: Wiley, 1999. – 368 с.
  36. Bambi Holzer. Retire Rich : The Baby Boomer's Guide to a Secure Future. – М.: , 0. – 0 с.
  37. Peter A. Diamond. Taxation, Incomplete Markets, and Social Security (Munich Lectures). – М.: , 0. – 0 с.
  38. William T. Moore. Real Options and Option-Embedded Securities. – М.: , 0. – 0 с.
  39. Marilyn Greenstein, Todd M. Feinman. Electronic Commerce: Security Risk Management and Control. – М.: , 0. – 0 с.
  40. Kenneth S. Hackel, Joshua Livnat. Cash Flow and Security Analysis. – М.: , 0. – 0 с.
  41. Changmin Chun. Cross-border Transactions of Intermediated Securities: A Comparative Analysis in Substantive Law and Private International Law. – М.: , 2012. – 524 с.
  42. Paul Osterman. Securing Prosperity: The American Labor Market: How It Has Changed and What to Do About It. – М.: , 0. – 0 с.
  43. Jianmin Zhao, Bruce J. Dickson, Chien-Min Zhao. Remaking the Chinese State: Strategies, Society, and Security (Asia's Transformations). – М.: , 0. – 0 с.
  44. Lenore G. Martin. New Frontiers in Middle East Security. – М.: , 0. – 0 с.
  45. Martin S. Feldstein, Horst Siebert. Social Security Pension Reform in Europe. – М.: , 0. – 0 с.
  46. Rattan Lal, David Hansen, Norman Uphoff, Steven Slack, Rattan Lal. Food Security and Environmental Quality in the Developing World. – М.: , 0. – 0 с.
  47. Frank J. Fabozzi, Frank J. Fabozzi. Investing In Commercial Mortgage-Backed Securities. – М.: , 0. – 0 с.
  48. Henry J. Bailey, Richard B. Hagedorn. Secured Transactions in a Nutshell Nutshell Series) (4th ed). – М.: , 0. – 0 с.
  49. Douglas Hearth, Janis K. Zaima, Janis Zaima. Contemporary Investments: Security and Portfolio Analysis. – М.: , 0. – 0 с.
  50. Dean Baker, Mark Weisbrot. Social Security: The Phony Crisis. – М.: , 0. – 0 с.
  51. Andrew W. Lo. The Industrial Organization and Regulation of the Securities Industry (National Bureau of Economic Research Conference Report). – М.: , 0. – 0 с.
  52. Sylvester J. Schieber, John B. Shoven. The Real Deal: The History and Future of Social Security. – М.: , 0. – 0 с.
  53. Henry J. Aaron, John B. Shoven, Benjamin M. Friedman, Alvin Hansen Symposium on Public Policy 1998 Harvard University). Should the United States Privatize Social Security? (Alvin Hansen Symposium Series on Public Policy). – М.: , 0. – 0 с.
  54. John B. Shoven. Administrative Aspects of Investment-Based Social Security Reform (Conference Report (National Bureau of Economic Research).). – М.: , 0. – 0 с.
  55. Risk Management, Speculation, and Derivative Securities. – М.: , 0. – 0 с.
  56. Allen W., Ph.D. Smith. The Alleged Budget Surplus, Social Security, and Voodoo Economics. – М.: , 0. – 0 с.
  57. Pam Lassiter. The New Job Security. – М.: , 0. – 0 с.
  58. David S. Katz, Ilan Caspi, David S. Katz, Ilan Caspi. Executive's Guide to Personal Security. – М.: , 0. – 0 с.
  59. Paul Voillis, Paul Viollis. Jane's Workplace Security Handbook. – М.: , 0. – 0 с.
  60. Gerald Kovacich. The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition. – М.: , 0. – 0 с.
  61. Saundra Hybels, Richard L Weaver II. Communicating Effectively with free TestPrep and Communication Concepts Video CD-ROM. – М.: , 0. – 0 с.
  62. Gene Bjerke. Writing for Video. – М.: , 0. – 0 с.
  63. Safety and the Security Professional : A Guide to Occupational Safety and Health Strategies. – М.: , 0. – 0 с.
  64. Cheryl Whitten. Milady's Step-By-Step Makeup Videos and Course Management Guide. – М.: , 0. – 0 с.
  65. Asset Protection and Security Management Handbook. – М.: , 0. – 0 с.
  66. Alexis Gutzman. Unforeseen Circumstances : Strategies and Technologies for Protecting Your Business and Your People in a Less Secure World. – М.: , 0. – 0 с.
  67. Safe Schools: A Security and Loss Prevention Plan. – М.: , 0. – 0 с.
  68. Dennis Dalton. Rethinking Corporate Security in the Post 9-11 Era. – М.: , 2003. – 0 с.
  69. Security Operations Management. – М.: , 0. – 0 с.
  70. Julia Lowell, C. R. Neu, Daochi Tong, National Defense Research Institute, National Security Research Institute. Financial Crises and Contagion in Emerging Market Countries. – М.: , 0. – 0 с.
  71. Joseph S. Nye, William A. Owens, James R. Schlesinger, R. James Woolsey, James A. Lewis, Joseph S., Jr. Nye, James Andrew Lewis, Erin Schlather, Csis Commission on Technology Security in the Twenty-First Century. Computer Exports and National Security: New Tools for a New Century : A Report of the Csis Commission on Technology Security in the 21St-Century (Csis Panel Reports.). – М.: , 0. – 0 с.
  72. Scott Firestone, Thiya Ramalingam, Steve Fry. Voice and Video Conferencing Fundamentals. – М.: Cisco Press, 2007. – 408 с.
  73. Committee on Federal Regulation of Securities Committee. The Fund Director's Guidebook: Third Edition (Fund Director's Guidebook). – М.: , 2006. – 128 с.
  74. Fredrik Nilsson, Communications Axis. Intelligent Network Video: Understanding Modern Video Surveillance Systems. – М.: , 2008. – 440 с.
  75. Meridian Securities Market. World Stock Exchange Fact Book. – М.: , 2008. – 0 с.
  76. CompTIA Security+: Certification Kit (комплект из 3 книг + 2 CD-ROM). – М.: Sybex, 2009. – 1440 с.
  77. Jimmy Schaeffler. Digital Video Recorders: DVRs Changing TV and Advertising Forever. – М.: Focal Press, 2009. – 312 с.
  78. Ben Waggoner. Compression for Great Video and Audio: Master Tips and Common Sense. – М.: Focal Press, 2010. – 640 с.
  79. Barry Braverman. Video Shooter: Storytelling with HD Cameras. – М.: Focal Press, 2010. – 314 с.
  80. Cliff Wootton. A Practical Guide to Video and Audio Compression. – М.: , 2010. – 800 с.
  81. Anthony Caputo. Digital Video Surveillance and Security. – М.: , 2010. – 352 с.
  82. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с.
  83. Roger J. Clarke. Digital Compression of Still Images and Video. – М.: , 2010. – 453 с.
  84. Ben Waggoner. Compression for Great Digital Video. – М.: , 2010. – 447 с.
  85. Mira Rubin. Interactive InDesign CS5: Take Your Print Skills to the Web and Beyond. – М.: Focal Press, 2011. – 400 с.
  86. Michael Gough. Video Conferencing over IP: Configure, Secure, and Troubleshoot. – М.: , 2010. – 0 с.
  87. Ida Mengyi Pu. Fundamental Data Compression. – М.: , 2005. – 256 с.
  88. Emily M. Harwood. Digital CCTV: A Security Professional's Guide. – М.: Butterworth-Heinemann, 2007. – 272 с.
  89. Abadi Tsegay and Kumudha Raimond. Video processing for Ethiopian sign language translation. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  90. Akshay Bhosale. An Image Compression Technique for Surveillance Application. – М.: LAP Lambert Academic Publishing, 2013. – 64 с.
  91. Jie Liang. Filter bank design for multimedia coding and digital communications. – М.: LAP Lambert Academic Publishing, 2010. – 164 с.
  92. Yushi Shen. IMAGE AND VIDEO CODING. – М.: LAP Lambert Academic Publishing, 2010. – 100 с.
  93. Md. Hazrat Ali,Amir A. Shafie and Fadhlan Hafiz. "Smart Video Surveillance System". – М.: LAP Lambert Academic Publishing, 2011. – 180 с.
  94. Madhurima Bhatia. Video object Tracking. – М.: LAP Lambert Academic Publishing, 2011. – 76 с.
  95. Jameel Ahmed. Transform-Domain and DSP Based Secure Speech Communication. – М.: LAP Lambert Academic Publishing, 2011. – 252 с.
  96. A.S.M. Mukter Zaman,Aryuanto Soetedjo and Md. Shabiul Islam. Embedded Smart Security System. – М.: LAP Lambert Academic Publishing, 2012. – 128 с.
  97. Shilpa Jadhav and Anup Kalaskar. Shot Boundry detection & key frame extraction using image compression. – М.: LAP Lambert Academic Publishing, 2012. – 100 с.
  98. Mehmet Oztemel. A Secure RFID ID-Card System Via Robust Image Hashing. – М.: LAP Lambert Academic Publishing, 2011. – 64 с.
  99. A. C. Suthar,D. D. Shah and G. R. Kulkarni. Implementation of Secured Color Image Authentication and Protection. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.
  100. Karunakar Kotegar and Manohara Pai M M. Scalable Video Coding Using Wavelet Transformation. – М.: LAP Lambert Academic Publishing, 2011. – 172 с.
  101. Chaminda Thushara Eeriwarawe Ranasinghe Hewage. Perceptual quality driven 3D video communication. – М.: Scholars' Press, 2013. – 332 с.
  102. Jordi Ribas Oliva. Underwater Wireless Video Transmission using Acoustic OFDM. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  103. Sudhakar Radhakrishnan. RESEARCH ISSUES IN IMAGE COMPRESSION USING WAVELET VARIANTS. – М.: LAP Lambert Academic Publishing, 2010. – 188 с.
  104. C. K. Sao and Abhishek Misal. An effective application of wavelet transforms in video compression. – М.: LAP Lambert Academic Publishing, 2012. – 72 с.
  105. Amal Punchihewa. Test Patterns and Compression Artefacts due to Image & Video Codecs. – М.: LAP Lambert Academic Publishing, 2011. – 200 с.
  106. Nadejda Mironov. Public Video Surveillance: ratio of privacy and security in the UK. – М.: LAP Lambert Academic Publishing, 2013. – 100 с.
  107. Mayank Chandra. Digital Video Encryption. – М.: LAP Lambert Academic Publishing, 2012. – 72 с.
  108. Shaimaa A. Elsaid. Securing Multi-Media Transmission over Mobile Communications Channels. – М.: LAP Lambert Academic Publishing, 2012. – 228 с.
  109. Chirag Sharma. Efficient Watermarking Technique for Quality Loss of Data. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  110. Bhumin Pathak. Compressed Video Transmission Over Wireless Channel. – М.: LAP Lambert Academic Publishing, 2012. – 308 с.
  111. D. N. Sujatha and K. R. Venugopal. Performance Evaluation of Video-on-Demand System. – М.: LAP Lambert Academic Publishing, 2014. – 208 с.
  112. Saira Beg,Muhammad Fahad Khan and Faisal Baig. Heuristic Based Video Compression: Past Present and Future Trends. – М.: LAP Lambert Academic Publishing, 2014. – 68 с.
  113. Amit Pandit. Video Compression:Novel and Efficient Fast Block Matching Algorithms. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  114. Zheng Liu,Xue Li and Zhaoyang Dong. Improvements on Data Security Algorithms for Streaming Multimedia. – М.: LAP Lambert Academic Publishing, 2012. – 240 с.
  115. Thai-Son Nguyen and Chin-Chen Chang. Reversible Data Hiding Techniques for VQ-Compressed Domain. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  116. Amit K. Pandit. Reduced Complexity Algorithms for Image and Video Compression. – М.: LAP Lambert Academic Publishing, 2012. – 300 с.
  117. Abdel-Latif Elkouny. Secured Image and Video Stream Across Wireless Networks. – М.: LAP Lambert Academic Publishing, 2011. – 120 с.
  118. Vikram Arkalgud Chandrasetty. Motion Estimation Technique for H.264 Advanced Video Coder. – М.: LAP Lambert Academic Publishing, 2010. – 76 с.
  119. SEEMA KHARB and AASHUTOSH KHARB. SECURE VIDEO COMPRESSION. – М.: LAP Lambert Academic Publishing, 2010. – 80 с.
  120. Khondaker Abdullah-Al-Mamun. Memory Efficient Data Structure For Static Huffman Tree. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  121. Vinayak Bharadi and Sujata Dubal. Video Compression Technique for Low Bit Rate Application. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  122. D. Maheswari Maheshlenin and V. Radha. Compound Image Segmentation and Compression for Secure Transmission. – М.: LAP Lambert Academic Publishing, 2012. – 240 с.
  123. Saurabh Upadhyay. Forensic Analysis Of Digital Surveillance Videos. – М.: LAP Lambert Academic Publishing, 2014. – 152 с.
  124. Marc Decombas. Low bitrate video compression by content characterization. – М.: LAP Lambert Academic Publishing, 2014. – 168 с.
  125. Muhammad Naveed,Abrar Hussain and Syed Oon Haider Zaidi. A New Approach to Video Compression using DWT and MEC. – М.: LAP Lambert Academic Publishing, 2010. – 84 с.
  126. Manoranjan Paul and Manzur Murshed. Very low bit rate video coding. – М.: Scholars' Press, 2014. – 152 с.
  127. Aree Mohammed and Loay George. Intra and Inter Frames Based on Video Compression Techniques. – М.: LAP Lambert Academic Publishing, 2012. – 160 с.
  128. Taha Mahdy. Real Time Video Watermarking: A new era of H.264 Security. – М.: LAP Lambert Academic Publishing, 2013. – 128 с.
  129. Ozana Silvia Dragomir. K-loops: Loop Transformations. – М.: LAP Lambert Academic Publishing, 2011. – 140 с.
  130. Jamal Al Eid,Ameen Hashim and Abdulkhaliq Alsalem. Comparing of Real-Time Properties in Networks Based On IPv6 and IPv4. – М.: LAP Lambert Academic Publishing, 2014. – 100 с.
  131. Nour El-Deen Mahmoud Khalifa. Securing Real-Time Video Over IP Transmission. – М.: LAP Lambert Academic Publishing, 2014. – 120 с.
  132. Murtaza Khan. Image and Video Data Compression using Spline and Quadtree. – М.: LAP Lambert Academic Publishing, 2010. – 164 с.
  133. Manoj Kumar. Hybrid Video watermarking. – М.: LAP Lambert Academic Publishing, 2013. – 144 с.
  134. Tanushyam Chattopadhyay,Utpal Garain and Mita Nasipuri. Value Added Services for Connected TV. – М.: LAP Lambert Academic Publishing, 2012. – 184 с.
  135. Kamal Shah and Sonali Vaidya. Real Time Video Surveillance System. – М.: LAP Lambert Academic Publishing, 2014. – 112 с.
  136. Nigam Sangwan. Using Huffman Compression with Symmetric Key Encryption. – М.: LAP Lambert Academic Publishing, 2014. – 68 с.
  137. Yerlan Akhmetov. Human Identification in Video-streaming. – М.: LAP Lambert Academic Publishing, 2015. – 76 с.
  138. Walaa Mohamed Abd-Elhafiez and Usama Sayed Mohammed. Image and Video Coding Technique Based on Object Extraction. – М.: LAP Lambert Academic Publishing, 2012. – 276 с.
  139. Mohamed Ghoneim. Block Matching Algorithm for Video Coding. – М.: LAP Lambert Academic Publishing, 2013. – 128 с.
  140. Tamur Aziz. Intelligent Watermarking Using Loss Less Compression and RSA Encryption. – М.: LAP Lambert Academic Publishing, 2011. – 60 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

Ничего не найдено

Образцы работ

Тема и предметТип и объем работы
Последствия операции НАТО
Политология
Диплом
80 стр.
Платежные системы в Интернете
Информатика
Диплом
102 стр.
Роль ОБСЕ в урегулировании конфликтов в Европе
Политология
Курсовая работа
33 стр.
Проблемы реформирования ОБСЕ
Политология
Курсовая работа
29 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Ира, 06.02
Я защитилась на 5! УРА! СПАСИБО за диплом.