Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Sunil Kumar Senapati and Prof. Pabitra Mohan Khilar. SECURING FSR PROTOCOL AGAINST DATA PACKET DROPPING IN MANET. – М.: LAP Lambert Academic Publishing, 2010. – 64 с.

Дополнительные результаты

  1. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с.
  2. Anindya Banerjee, J.W. Galbraith, Juan Dolado, David Hendry. Co-Integration, Error Correction, and the Econometric Analysis of Non-Stationary Data (Advanced Texts in Econometrics). – М.: Oxford University Press, 1993. – 352 с.
  3. Gavin Cawthra. Securing South Africa's Democracy: Defense, Development and Security in Transition (International Political Economy Series). – М.: , 0. – 0 с.
  4. Douglas W. Allen, Dean Lueck. The Nature of the Farm: Contracts, Risk, and Organization in Agriculture. – М.: , 0. – 0 с.
  5. Klaus M. Leisinger, Karin Schmitt, Rajul Pandya-Lorch. Six Billion and Counting: Population Growth and Food Security in the 21st Century. – М.: , 0. – 0 с.
  6. Parag Pendharkar. Managing Data Mining Technologies in Organizations: Techniques and Applications. – М.: , 0. – 0 с.
  7. Roger Blanpain. Employee Rights in Bankruptcy: A Comparative-Law Assessment (Bulletin of Comparative Labour Relations, 46). – М.: , 0. – 0 с.
  8. Jothy Rosenberg and David Remy. Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption. – М.: Sams, 2004. – 380 с.
  9. Charles Carrington, Timothy Speed, Juanita Ellis, Steffano Korper. Enterprise Directory and Security Implementation Guide: Designing and Implementing Directories in Your Organization (The Korper and Ellis E-Commerce Books Series). – М.: , 0. – 0 с.
  10. David G. Loomis, Lester D. Taylor. Forecasting the Internet: Understanding the Explosive Growth of Data Communications (TOPICS IN REGULATORY ECONOMICS AND POLICY). – М.: , 0. – 0 с.
  11. Stefan Kokot. The Econometrics of Sequential Trade Models : Theory and Applications Using High Frequency Data (Lecture Notes in Economics and Mathematical Systems). – М.: , 2004. – 0 с.
  12. Thomas C. Glaessner. Electronic Safety and Soundness: Securing Finance in a New Age (World Bank Working Papers). – М.: , 2004. – 0 с.
  13. Economics of Information Security (Advances in Information Security). – М.: , 2004. – 0 с.
  14. Sustainable Metals Management : Securing Our Future - Steps Towards a Closed Loop Economy (Eco-Efficiency in Industry and Science) (Eco-Efficiency in Industry and Science). – М.: , 2006. – 607 с.
  15. Privacy-Preserving Data Mining: Models and Algorithms (Advances in Database Systems). – М.: , 2008. – 514 с.
  16. Stephen Gough. Sustainability and Security within Liberal Societies: Learning to Live with the Future (Routledge Studies in Social and Political Thought). – М.: , 2008. – 148 с.
  17. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с.
  18. Alan Calder. Information Security based on ISO 27001/ISO 27002: A Management Guide. – М.: , 2009. – 83 с.
  19. Doug Stokes, Sam Raphael. Global Energy Security and American Hegemony (Themes in Global Social Change). – М.: , 2010. – 296 с.
  20. Robert Schmansky CFP. Avoid Retirement Clumsiness: Secure your retirement against costly and ineffective investment schemes, and achieve true retirement guarantees with a bond ladder. – М.: , 2010. – 132 с.
  21. Craig K. Enders PhD. Applied Missing Data Analysis (Methodology In The Social Sciences). – М.: , 2010. – 377 с.
  22. John Shade. Data Analysis in Business and Industry (Statistics in Practice). – М.: , 2010. – 384 с.
  23. Steven H. Goldberg. Billions of Drops in Millions of Buckets. – М.: , 2009. – 302 с.
  24. John Bender, Michael Marrinan. The Culture of Diagram. – М.: , 2010. – 296 с.
  25. Side Effects of Drugs Annual 30, Volume 30: A worldwide yearly survey of new data and trends in adverse drug reactions (Side Effects of Drugs Annual) (Side Effects of Drugs Annual). – М.: , 2008. – 672 с.
  26. Redox-Mediated Signal Transduction: Methods and Protocols (Methods in Molecular Biology). – М.: , 2008. – 234 с.
  27. Padmashree Gehl Sampath, Banji Oyeyinka. The Gene Revolution and Global Food Security: Biotechnology Innovation in Latecomers. – М.: , 2010. – 288 с.
  28. Jamil Naji. ROAD SAFETY MANAGEMENT IN YEMEN:: The identification of shortcomings in accident data, data adjustment, cost and modelling of road accident fatalities. – М.: , 2010. – 184 с.
  29. Konstantinos Tsiptsis. Data Mining Techniques in CRM. – М.: , 2010. – 372 с.
  30. W. J. Emery. Data Analysis Methods in Physical Oceanography, 3E. – М.: , 2010. – 654 с.
  31. Jennifer J Baker. Securing the Commonwealth – Debt, Speculation, and Writing in the Making of Early America. – М.: , 2008. – 232 с.
  32. Davide Rodogno. Against Massacre – Humanitarian Interventions in the Ottoman Empire. – М.: , 2011. – 0 с.
  33. Len Silverston, Paul Agnew. The Data Model Resource Book, Vol. 3: Universal Patterns for Data Modeling. – М.: Wiley, 2009. – 648 с.
  34. Clastres. Society Against the State – Essays in Political Anthropology. – М.: , 1988. – 0 с.
  35. P Clastres. Society Against the State – Essays in Political Anthropology (Paper). – М.: , 1990. – 218 с.
  36. Jennifer J Baker. Securing the Commonwealth – Debt, Speculation, and Writing in the Making of Early America. – М.: , 2006. – 240 с.
  37. S Berger. Peasants Against Politics – Rural Organization in Britanny 1911–1967. – М.: , 1974. – 312 с.
  38. Isaiah Berlin. Against the Current – Essays in the History of Ideas. – М.: , 2002. – 474 с.
  39. Brajendra C. Sutradhar. Dynamic Mixed Models for Familial Longitudinal Data (Springer Series in Statistics). – М.: , 2011. – 506 с.
  40. L FINKEL. Finkel: Data File Programming In Basic (pr Only). – М.: , 1981. – 338 с.
  41. Security Valuation And Risk Analysis: Assessing Value In Investment Decision-Making. – М.: , 2011. – 614 с.
  42. Voice & Data Communications Handbook, Fifth Edition. – М.: , 2011. – 650 с.
  43. David Endler, Mark Collier. Hacking Exposed VoIP: Voice Over Ip Security Secrets & Solutions. – М.: McGraw-Hill Osborne Media, 2006. – 574 с.
  44. Leon Shklar, Richard Rosen. Web Application Architecture: Principles, Protocols and Practices. – М.: , . –  с.
  45. Vivek Bhushan. Securing Published Data In Cloud Using Data Incognito. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  46. Habis Al-Zoubi. Pretreatment in Desalination: Prediction of NF membranes. – М.: LAP Lambert Academic Publishing, 2011. – 304 с.
  47. Abhishek Purohit. An Efficient Energy Utilization in MANET. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  48. Vinav Keshari. Secure Web Service:Encryption. – М.: LAP Lambert Academic Publishing, 2012. – 72 с.
  49. Mukul Pratap Singh and Kunal Gupta. Draining injected invalid data using EBCAS scheme in WSN. – М.: LAP Lambert Academic Publishing, 2013. – 64 с.
  50. Govind Sharma and Manish Gupta. Secure routing in wireless mobile Ad-Hoc network. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  51. Maitrik Shah. Packet Watermarking using IP options field. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  52. Samiullah Durrani. Mobile Device Data Entry Error in Emergency Operations Centers. – М.: LAP Lambert Academic Publishing, 2011. – 112 с.
  53. Patrick Ezigbo. Model for Data Integration in Financial Services Institutions. – М.: LAP Lambert Academic Publishing, 2011. – 180 с.
  54. Sharup Barua and Ratan Chandra Mondal. Impact of Node Mobility on the Voice Quality in Mobile Ad-hoc Network. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  55. Sandeep Singh. Performance Evaluation of IP and MPLS Based Networks. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  56. Jaber Al-Balushi and Afaq Ahmad. Response Data Compression Techniques in Digital Circuit Testing. – М.: LAP Lambert Academic Publishing, 2014. – 96 с.
  57. Mohammed Chetioui and Fatima Bouasria. CDMA and PRMA for multimedia mobile communication. – М.: LAP Lambert Academic Publishing, 2015. – 112 с.
  58. Punit N. Dhirawani. A Holistic Security System Using Motion Sensors. – М.: LAP Lambert Academic Publishing, 2011. – 72 с.
  59. Asad Ali and Sajjad Ali. Performance Analysis of AODV, DSR and OLSR in MANET. – М.: LAP Lambert Academic Publishing, 2011. – 84 с.
  60. Sankalp Bahadur Singh and Asha Ambhaikar. Optimization Of Routing Protocol In Manet Using GA. – М.: LAP Lambert Academic Publishing, 2013. – 64 с.
  61. Samy S. Soliman. Hierarchically Clustered Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 156 с.
  62. Sukanta Dash and Manmath Roul. Two phase flow pressure drop in sudden expansion and contraction. – М.: LAP Lambert Academic Publishing, 2010. – 136 с.
  63. Prasanna Sridhar and Asad M. Madni. Fault-Tolerant Data Aggregation Methods in Sensor Networks. – М.: LAP Lambert Academic Publishing, 2010. – 172 с.
  64. Celina Myrann Sorboe. Security and Inclusive Citizenship. – М.: LAP Lambert Academic Publishing, 2013. – 144 с.
  65. Anne Chepkurui. Impact of Tobacco Farming on Household Food Security in Ang'urai Kenya. – М.: LAP Lambert Academic Publishing, 2013. – 180 с.
  66. Jude Kagoro. The Urban (In)Security Paradox in Uganda. – М.: LAP Lambert Academic Publishing, 2012. – 124 с.
  67. Thanh Yen Thao Phan. HIV Infection among Female Sex Workers in VinhLong, Vietnam, 2009. – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  68. Nestory Riwa. Security and Illegal Immigrants in TANZANIA. – М.: LAP Lambert Academic Publishing, 2012. – 52 с.
  69. Olukemi Asemota. HIV/AIDS MANAGEMENT IN THE WORKPLACE: FOCUS ON SECURITY FORCES. – М.: LAP Lambert Academic Publishing, 2010. – 240 с.
  70. Muhammad Zakaullah. Design of 20 G router on NETFPGA. – М.: LAP Lambert Academic Publishing, 2011. – 72 с.
  71. Carike Verbooy. The use of nude celebrities in development communication campaigns. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  72. Monirul Islam. Violence against Women in Bangladesh. – М.: LAP Lambert Academic Publishing, 2013. – 96 с.
  73. Lighton Dube. Land Tenure Security and Agriculture Performance in Zimbabwe. – М.: LAP Lambert Academic Publishing, 2015. – 124 с.
  74. Ronald Lulijwa. The Fish Export Trade and Food Security. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  75. Rafatu Mohammed. Food Security And Coping Strategies Of Farm Households In Ejura, Ghana. – М.: LAP Lambert Academic Publishing, 2013. – 60 с.
  76. Tesfaye Hailu. Effective entomopathognic fungi against pink stem borer in sugarcane. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  77. Agatha Daniel and Charles Olungah. Women's Indigenous Knowledge in Household Food Security. – М.: LAP Lambert Academic Publishing, 2012. – 100 с.
  78. Muhammad Subtain Raza. Evaluation of Bio-Nematicides against Root Knot Nematode in Tomato. – М.: LAP Lambert Academic Publishing, 2014. – 108 с.
  79. Jacob Tsado. Women involvement in farming activities and household food security. – М.: LAP Lambert Academic Publishing, 2011. – 128 с.
  80. Emmanuel Nepolo. Genetic variations of marama bean in the Namibian germplasm. – М.: LAP Lambert Academic Publishing, 2011. – 88 с.
  81. MOHAMMED AL-AMIN. APPLICATION OF SPATIAL DATA IN FOREST ECOLOGY AND MANAGEMENT. – М.: LAP Lambert Academic Publishing, 2011. – 252 с.
  82. Evangelin Hema Mariya,Dhivya Rajasankaran and Aswini Ramaswamy. Trusted Data Forwarding using POR in Manet. – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  83. Ayyaswamy Kathirvel,Srinivasan Rengaramanujam and Mohanambal Kathirvel. Prevention of attacks usign umpiring security model for manets. – М.: LAP Lambert Academic Publishing, 2012. – 192 с.
  84. Rupesh S. Mishra and D. K. Chitre. Data Leakage Detection in Relational Database. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  85. Ayyoub Akbari Moghanjoughi and Abbas Mehdizadeh Zare Anari. Performance Analysis of Swarm Intelligence Based Routing Protocols. – М.: LAP Lambert Academic Publishing, 2012. – 112 с.
  86. Deepak Puthal and Bibhudatta Sahoo. Secure Data Collection & Critical Data Transmission in Mobile Sink WSN. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  87. Aref Hassan Poor. Enhancement of DSDV Routing Protocol in Vehicular Ad Hoc Network. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  88. Nisarg Gandhewar and Rahila Sheikh. Performance Valuation of AODV Under Sinkhole Attack In MANET Using NS2. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  89. Arnab Banerjee,ANIRUDDHA BHATTACHARYYA and DIPAYAN BOSE. IMPLEMENTATION OF A TRUST BASED SECURE ROUTING PROTOCOL IN MANET. – М.: LAP Lambert Academic Publishing, 2012. – 292 с.
  90. Sandeep Kr. Agarwal and Dr. K. V. Arya. Security in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  91. E.A.Mary Anita. Securing Multicast Routing Protocols for Mobile Adhoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  92. Abbas Mehdizadeh Zare Anari and Ayyoub Akbari Moghanjoughi. Route optimization security in mobile IPv6 networks. – М.: LAP Lambert Academic Publishing, 2012. – 116 с.
  93. Yassar Aziz and Muhammad Naeem Aslam. Traffic Engineering with Multi-Protocol Label Switching. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  94. Niroj Kumar Pani and Dr. Ashok Kumar Turuk. A Hybrid Zone-Based Routing Protocol for Secure Communication in MANET. – М.: LAP Lambert Academic Publishing, 2010. – 92 с.
  95. Kiran Kotla. Can delay based protocols survive in real world?. – М.: LAP Lambert Academic Publishing, 2014. – 76 с.
  96. Kundan Munjal,Shilpa Verma and Namita Munjal. Cooperative Black Hole Attack Detection by Modifying AODV. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  97. Heba Elshandidy. Enhancing Security Solutions in Mobile Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2013. – 128 с.
  98. Saurabh Sharma and Sapna Gambhir. Cooperative Malicious Nodes Detection and Removal Scheme in MANETs. – М.: LAP Lambert Academic Publishing, 2014. – 108 с.
  99. Premalatha Natarajan. Mitigating congestion and collision in adhoc networks. – М.: LAP Lambert Academic Publishing, 2014. – 200 с.
  100. Xianhui Che. Control Protocol for Optical Packet Switched Local Area Network. – М.: LAP Lambert Academic Publishing, 2014. – 188 с.
  101. Ramandeep Kaur. Packet dropping attack in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2014. – 52 с.
  102. Ali Modirkhazeni. Mitigation of Passive Wormhole Attack in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2015. – 112 с.
  103. Nirbhay Chaubey. Securing AODV Routing Protocol in design of Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2015. – 132 с.
  104. Suman Paul. Study of Cluster Based Algorithm in MANET using Network Simulator. – М.: LAP Lambert Academic Publishing, 2015. – 52 с.
  105. Amol Zade. A New Cluster Approach for Wormhole Attack Removal in MANET using NS2. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  106. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  107. Tejpal Singh. Security Protocols for Data Routing in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  108. Vinothkumar Jambulingam. Highly consistent and secured data delivery for mobile ad-hoc networks. – М.: LAP Lambert Academic Publishing, 2014. – 76 с.
  109. Amit Bhati. Congestion Control: Problem and Solution for Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  110. Shaila S. Math,Manjula R. Bharamagoudra and Sunil Kumar S. Manvi. VCS verified data transactions on SoC bus using AMBA AXI-04 protocol. – М.: LAP Lambert Academic Publishing, 2012. – 116 с.
  111. Marimuthu Kanagaraj and Eswari Venkatachalam. Multifactor Authentication Protocol for a Secured WSN. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  112. Saurabh Mittal,Ankita Mittal and Sapna Boora. Security Enhancement using Dynamic Cache on DSR Based MANETS. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  113. Gurpreet juneja. Security:MPLS VPN Network. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  114. Shilpa Jaiswal and Sumeet Agrawal. Detection of Network Worm to Eliminate Security Threats in MANET. – М.: LAP Lambert Academic Publishing, 2012. – 52 с.
  115. Wisam Elmasry. Securing WBAODV Routing Protocol in MANETs. – М.: LAP Lambert Academic Publishing, 2013. – 100 с.
  116. Pallavi Kaliyar and Gagan Singla. A secure routing protocol for MANETs against byzantine attacks. – М.: LAP Lambert Academic Publishing, 2013. – 84 с.
  117. Haitham ELwahsh. Secure Service Discovery Protocol for ad-hoc Networks "hash function". – М.: LAP Lambert Academic Publishing, 2013. – 144 с.
  118. Soke Onyemelukwe. On-Demand Routing and Security in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2013. – 128 с.
  119. Sunil Kumar Senapati and Prof. Pabitra Mohan Khilar. SECURING FSR PROTOCOL AGAINST DATA PACKET DROPPING IN MANET. – М.: LAP Lambert Academic Publishing, 2010. – 64 с.
  120. RAJIV GHIMIRE. IP BASED Networks. – М.: LAP Lambert Academic Publishing, 2010. – 72 с.
  121. Muhammad Naeem Aslam and Yassar Aziz. Traffic Engineering with Multiprotocol label switching. – М.: LAP Lambert Academic Publishing, 2010. – 72 с.
  122. Gergely Acs. Secure Routing in Multi-hop Wireless Networks. – М.: LAP Lambert Academic Publishing, 2010. – 116 с.
  123. ANNADURAI P and Dr. V. PALANISAMY. Impact of Black Hole Attack on Multicast in Ad hoc Network (IBAMA). – М.: LAP Lambert Academic Publishing, 2011. – 84 с.
  124. Manuj Mishra,Govind Sharma and Ram Pathak. Secure Routing In Wireless Mobile Ad Hoc Network. – М.: LAP Lambert Academic Publishing, 2014. – 84 с.
  125. Ricardo Chaves. Secure Computing on Reconfigurable Systems. – М.: LAP Lambert Academic Publishing, 2010. – 212 с.
  126. Lamek Ronoh. Security Concern of Cloud Computing Models. – М.: LAP Lambert Academic Publishing, 2014. – 88 с.
  127. C. Balakrishnan and D. I. George Amalarethinam. Data Allocation Strategies in Distributed Database Systems. – М.: Scholars' Press, 2014. – 212 с.
  128. Anju Yadav. Study and Implementation on protocol in MANET. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  129. Debasish Jena. On Protocols for Information Security Services. – М.: LAP Lambert Academic Publishing, 2011. – 136 с.
  130. Benjamin Eze. Policy-based Data Sharing for Event-driven Services in B2B Networks. – М.: LAP Lambert Academic Publishing, 2011. – 148 с.
  131. Hanane Houmani. Security Protocols Analysis. – М.: LAP Lambert Academic Publishing, 2012. – 288 с.
  132. Yacoob Tanveer. IDS in MANET. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  133. Angelo Agatino Nicolosi. Efficient RSA Key Generation Protocol in the Two-Party Setting. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  134. Amit Choudhary. Routing Security Issues in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2014. – 80 с.
  135. Noor Ul Amin. Secure MANET Communication Based on Hybrid Cryptosystem. – М.: LAP Lambert Academic Publishing, 2013. – 64 с.
  136. Soumya Chatterjee. Importance of Security in E-learning. – М.: LAP Lambert Academic Publishing, 2013. – 112 с.
  137. Navneet kaur Bajwa. Sanitization of Data in Computer Network. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  138. Hrituparna Paul. Transmission Control Protocol Adaption Technique in MANET. – М.: LAP Lambert Academic Publishing, 2012. – 112 с.
  139. Tarachand Verma,Piyusha Tyagi and Somya Arya. Biometric Template Security in Iris Based Systems: A Novel Approach. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  140. S. V. S. Kishore Kumar. Information Systems Audit And Security In Banking. – М.: LAP Lambert Academic Publishing, 2013. – 476 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Применение интеллектуального анализа данных. data mining в управлении страховой компанией. Ю.В. Грызенкова, З.Ф. Шарифьянова, "Управление в страховой компании", № 4, октябрь-декабрь 2007.
  2. Наука человековедения. интервью с Д. Уолтоном, профессором London Metropolitan University, экспертом CIPD. Chartered Institute of Personnel and Development, автором программы Master of Arts in Human Resource Strategies. И. Смирнова, "Кадровый менеджмент", № 5, июль-август 2007.
  3. Trade-in как способ обмена автомобиля. С.Н. Гордеева, "Торговля: бухгалтерский учет и налогообложение", N 2, февраль 2011 г.
  4. Проблемы применения универсальной юрисдикции in absentia. Г.А. Королев, "Журнал российского права", № 10, октябрь 2009.
  5. Тонкости trade-in. С.А.Королев, "НДС. Проблемы и решения", № 8, август 2009.
  6. In-store banking - новая модель банковского бизнеса. А. Пятков, "Банковское обозрение", № 11, ноябрь 2008.

Образцы работ

Тема и предметТип и объем работы
Последствия операции НАТО
Политология
Диплом
80 стр.
Особенности экономической деятельности и управления франчайзинговыми структурами
Эстетика
Диплом
77 стр.
Математические модели океанических течений
Переводоведение (теория перевода)
Курсовая работа
42 стр.
Продвижение брендов в шоу-бизнесе
Электроснабжение городов и промышленных предприятий
Диплом
79 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Руслан
Это альтернативно одаренный преподаватель - объяснять или доказывать ему что-либо бесполезно. Остается надеяться, что на втором разе он остановится. Спасибо за консультацию.