Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Muhammad Imran Tariq. SLA based Information Security Metrics in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2014. – 192 с.

Дополнительные результаты

  1. Cloud Computing and Services Science (Service Science: Research and Innovations in the Service Economy). – М.: , 2012. – 405 с.
  2. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с.
  3. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  4. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с.
  5. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с.
  6. Markov Networks in Evolutionary Computation (Adaptation, Learning, and Optimization). – М.: , 2012. – 264 с.
  7. Abdullah Abdul-Gader, Abdullah H. Al-Abdul-Gader. Managing Computer Based Information Systems in Developing Countries: A Cultural Perspective. – М.: , 0. – 0 с.
  8. Handbook of Management Information Systems. – М.: , 0. – 0 с.
  9. Mark B. Desman. Building an Information Security Awareness Program. – М.: , 0. – 0 с.
  10. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с.
  11. Marko Nordquist. Towards Improved Security Management Practice: Designing an Organizational Model Procedure for the Implementation of Information Security Management in Heterogeneous Information Management. – М.: , 0. – 0 с.
  12. Information Resources Management Association. International Conference, Mehdi Khosrowpour. Managing Information Technology Resources in Organizations in the Next Millennium: 1999 Information Resources Management Association International Conference, Hershey, Pa, Usa, May 16-19, 1999. – М.: , 0. – 0 с.
  13. Steve Purser. A Practical Guide to Managing Information Security (Artech House Technology Management Library). – М.: , 0. – 0 с.
  14. Alan Gershenfeld, Mark Loparco, Cecilia Barajas. Game Plan: The Insider's Guide to Breaking In and Succeeding in the Computer and Video Game Business. – М.: , 0. – 0 с.
  15. Marian Quigley, Marian Quiqley. Information Security and Ethics: Social and Organizational Issues. – М.: , 0. – 0 с.
  16. C. Warren Axelrod, Axelrod. Outsourcing Information Security. – М.: , 0. – 0 с.
  17. Harold F. Tipton, Micki Krause, Micki, Cissp Krause. Information Security Management Handbook, Fifth Edition. – М.: , 0. – 0 с.
  18. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с.
  19. Barbara C. McNurlin. Information Systems Management in Practice (7th Edition). – М.: , 2005. – 0 с.
  20. Economics of Information Security (Advances in Information Security). – М.: , 2004. – 0 с.
  21. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с.
  22. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с.
  23. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с.
  24. Ira Winkler. Zen and the Art of Information Security. – М.: , 2007. – 192 с.
  25. Timothy P. Layton. Information Security. – М.: , 2006. – 222 с.
  26. Stuart Robbins. Lessons in Grid Computing: The System Is a Mirror. – М.: , 2006. – 384 с.
  27. Mahesh S. Raisinghani. Handbook of Research on Global Information Technology Management in the Digital Economy. – М.: Information Science Reference, 2008. – 588 с.
  28. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с.
  29. Social and Human Elements of Information Security: Emerging Trends and Countermeasures (Premier Reference Source). – М.: , 2008. – 412 с.
  30. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с.
  31. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с.
  32. Gerard Blokdijk, Ivanka Menken. Information Security Management Best Practice Workbook: Implementation and Management Roadmap for Threats, Challenges and Solutions - Ready to use supporting documents bringing Theory into Practice. – М.: , 2008. – 124 с.
  33. W. Krag Brotby. Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement. – М.: Auerbach Publications, 2009. – 200 с.
  34. Alan Calder. Information Security based on ISO 27001/ISO 27002: A Management Guide. – М.: , 2009. – 83 с.
  35. John Rittinghouse, James Ransome. Cloud Computing: Implementation, Management, and Security. – М.: CRC Press, 2009. – 340 с.
  36. Bel G. Raggad. Information Security Management: Concepts and Practice. – М.: , 2010. – 871 с.
  37. Michael E. Whitman, Herbert J. Mattord. Management of Information Security. – М.: , 2010. – 592 с.
  38. Alan Calder, Steve G Watkins. Information Security Risk Management for ISO27001 / ISO27002. – М.: , 2010. – 198 с.
  39. William Manning. CISM Certified Information Security Manager Certification Exam Preparation Course in a Book for Passing the CISM Exam - The How To Pass on Your First Try Certification Study Guide. – М.: , 2010. – 188 с.
  40. Peter Gardenfors, C. J. van Rijsbergen. Belief Revision (Cambridge Tracts in Theoretical Computer Science). – М.: , 0. – 0 с.
  41. Editors Karl Maria Michael de Leeuw, Jan Bergstra. The History of Information Security: A Comprehensive Handbook. – М.: Elsevier Science, 2007. – 900 с.
  42. Global Perspectives In Information Security. – М.: , 2008. – 896 с.
  43. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с.
  44. John R. Vacca. Computer and Information Security Handbook. – М.: , 2010. – 928 с.
  45. Cloud Computing, A Practical Approach. – М.: , 2011. – 352 с.
  46. Secure Metrics: A Beginners Guide. – М.: , 2011. – 400 с.
  47. Management Strategies For The Cloud Revolution: How Cloud Computing Is Transforming Business And Why You Can'T Afford To Be Left Behind. – М.: , 2011. – 272 с.
  48. It Security Metrics: A Practical Framework For Measuring Security & Protecting Data. – М.: , 2011. – 396 с.
  49. Harold F. Tipton, Micki Krause. Information Security Management Handbook on CD-ROM, 2003 Edition. – М.: , . –  с.
  50. Eduardo Fernandez-Buglioni. Security Patterns in Practice: Designing Secure Architectures Using Software Patterns. – М.: Wiley, 2013. – 582 с.
  51. Vaishali Wadhe and Vinayak Bharadi. Cloud Computing. – М.: Scholars Press, 2014. – 252 с.
  52. Vivek Bhushan. Securing Published Data In Cloud Using Data Incognito. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  53. A.M. Mansuri and Pradeep Laxkar. Cloud Computing: The future of technology. – М.: LAP Lambert Academic Publishing, 2014. – 60 с.
  54. Ayad Barsoum. Data Integrity in Cloud Computing Systems. – М.: LAP Lambert Academic Publishing, 2013. – 212 с.
  55. Rohana Mohamad Rashid. Determining Influencing Factors of Information Security Culture. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  56. Anand Kannan. Evaluation of the Security Mechanisms in Cloud Networks. – М.: LAP Lambert Academic Publishing, 2013. – 192 с.
  57. T. Ambikadevi Amma. Inhibitors of Cloud Computing. – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  58. Ashok K. Saini. Information & Communication Technology in ELT. – М.: LAP Lambert Academic Publishing, 2012. – 428 с.
  59. Jude Kagoro. The Urban (In)Security Paradox in Uganda. – М.: LAP Lambert Academic Publishing, 2012. – 124 с.
  60. Mabel Nunoofio. Social Security Arrangements Among Informal Sector Operatives In Accra. – М.: LAP Lambert Academic Publishing, 2014. – 148 с.
  61. Adamu Usman. Cost-Benefit Analysis of Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  62. Vishal Mali. Information Retrieval System in Human Genetics. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  63. Giuseppe Sergioli. Irreversibility and Universality in Quantum Computation. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  64. Shiv Kumar Gupta. Algorithmic Based Fault Tolerance In Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 52 с.
  65. Srivaramangai Padmanabhan. Reliable Infrastructure for Cloud Computing. – М.: LAP Lambert Academic Publishing, 2013. – 100 с.
  66. Syed Tauhid Zuhori. Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 56 с.
  67. Haitham Solh. Conceptual Teaching Strategies in a Computer-Based Math Curriculum. – М.: LAP Lambert Academic Publishing, 2010. – 192 с.
  68. Munyabarenzi Faustin. The incidence of security interest in movable property. – М.: LAP Lambert Academic Publishing, 2013. – 84 с.
  69. V. Karamchand Gandhi. Cloud Computing For E-Governance Of India. – М.: LAP Lambert Academic Publishing, 2013. – 80 с.
  70. Faraz Fatemi Moghaddam. Secure Cloud Computing with Client-Based Control System. – М.: LAP Lambert Academic Publishing, 2013. – 100 с.
  71. Rupa Ch. and Avadhani P. S. Modern Security Methods in Applied Computer Science. – М.: Scholars' Press, 2014. – 124 с.
  72. Variza Negi. The Power of Cloud Computing. – М.: LAP Lambert Academic Publishing, 2014. – 64 с.
  73. Heena Mittal and Gurpreet Singh. Security of Mobile Agents in Distributed Computing. – М.: LAP Lambert Academic Publishing, 2014. – 80 с.
  74. Aldo Wijanarko and Raymond Kosala. A Study of Cloud Computing as a Game Platform. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  75. Yi Ren. Security Mechanisms in Unattended Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2013. – 164 с.
  76. Alireza Nafarieh. SLA based architectures in priority aware shared mesh optical networks. – М.: LAP Lambert Academic Publishing, 2013. – 192 с.
  77. Ashkan Gholamhosseinian and Ahmad Khalifeh. Cloud Computing and Sustainability: Energy Efficiency Aspects. – М.: LAP Lambert Academic Publishing, 2012. – 144 с.
  78. Puneet Kumar. Cloud Computing. – М.: LAP Lambert Academic Publishing, 2013. – 60 с.
  79. Kamal Kant Hiran and Ruchi Doshi. The Proliferation of Smart Devices on Mobile Cloud Computing. – М.: LAP Lambert Academic Publishing, 2014. – 84 с.
  80. Volkan ERTURK,Dr. Ali ARIFOGLU and Dr. Attila OZGIT. A Framework Based On Continuous Security Monitoring. – М.: LAP Lambert Academic Publishing, 2010. – 148 с.
  81. Emre Sezgin and Sevgi Ozkan. ASSESSMENT OF INFORMATION TECHNOLOGY USE IN ORGANIZATIONS. – М.: LAP Lambert Academic Publishing, 2011. – 144 с.
  82. Hossein Pour Taheri and Ab Razak Che Hussin. Cloud Base E-Commerce Trust Model. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  83. Lamek Ronoh. Security Concern of Cloud Computing Models. – М.: LAP Lambert Academic Publishing, 2014. – 88 с.
  84. Nadire Cavus and Mustafa Asaad Alani. Cloud computing and its adaptation. – М.: LAP Lambert Academic Publishing, 2014. – 80 с.
  85. Yedji Mbangsoua and Dr. Freddie Acosta. Information Security and its Investment Justification. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  86. Kefa Rabah. Ubuntu Server Administration and Cloud Computing. – М.: LAP Lambert Academic Publishing, 2011. – 320 с.
  87. Pavan Kumar Bollineni and Kumar Neupane. Implications for adopting cloud computing in e-Health. – М.: LAP Lambert Academic Publishing, 2011. – 88 с.
  88. Gunasekar Kumar and Anirudh Chelikani. Analysis of Security Issues in Cloud Based E-Learning. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  89. Hamzeh Khazaei. Performance and Availability Analysis of Cloud Computing Centers. – М.: Scholars' Press, 2013. – 224 с.
  90. Raed Alsaqour and Yap Earn. Searchable Symmetric Encryption. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  91. Yasser Alshehri. Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 156 с.
  92. Julien Shabani. Information Security for RFID Systems. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.
  93. Debasish Jena. On Protocols for Information Security Services. – М.: LAP Lambert Academic Publishing, 2011. – 136 с.
  94. Saad Ahmed Khan and Saif Ahmad. Security Implications of Cloud computing. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  95. Qusay Ishaq. A framework based on the Cloud Computing Technology. – М.: LAP Lambert Academic Publishing, 2012. – 144 с.
  96. Manish Dhote. Introduction to Cloud Computing Performance Testing. – М.: LAP Lambert Academic Publishing, 2012. – 56 с.
  97. Ganesh Chandra Deka. Prospects of Cloud Computing in Education and e-Governance. – М.: LAP Lambert Academic Publishing, 2012. – 160 с.
  98. Ameen Chilwan. Dependability Differentiation in Cloud Services. – М.: LAP Lambert Academic Publishing, 2012. – 172 с.
  99. Sadia Marium. Analysis of the Security threats to Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  100. Ganesh Chandra Deka. Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 140 с.
  101. Gul Tokdemir. AN ASSESSMENT MODEL FOR WEB-BASED INFORMATION SYSTEM EFFECTIVENESS. – М.: LAP Lambert Academic Publishing, 2010. – 120 с.
  102. Furhan Mehmood and Rajia Rafique. Information Security in Financial Organizations. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  103. Igor Botian. Software Security Vulnerabilities in Mobile Peer-to-peer Environment. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  104. Pallavali Radha Krishna Reddy and Gullapalli Sireesha. The Security Issues of Cloud Computing Over Normal & ITSector. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  105. Madarapu Naresh Kumar,Pothula Sujatha and P. Dharanyadevi. Mitigating EDoS in Cloud Computing using In-Cloud Scrubber Service. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  106. Omar Zakaria. Information Security Culture. – М.: LAP Lambert Academic Publishing, 2013. – 248 с.
  107. Hassen Alsafi and Mohammed Azhruddin. The Security Issues for Smart Grids Applications on Cloud Computing. – М.: LAP Lambert Academic Publishing, 2013. – 60 с.
  108. Shahla Asadi and Elaheh Yadegaridehkordi. Customers perspectives on cloud computing adoption by Banking sector. – М.: LAP Lambert Academic Publishing, 2015. – 128 с.
  109. frankie tvrz and marijke coetzee. Information Security of a Bluetooth-enabled handheld device. – М.: LAP Lambert Academic Publishing, 2010. – 180 с.
  110. Chaudhry Muhammad Nadeem Faisal. Issues in Cloud computing. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  111. Ahmed AlNunu. How Much Information Security?. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  112. Shivan Fazil Sabr. Cloud Computing Security. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  113. Harish Vepuri. Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  114. venkata bhaskar reddy mandala and sharat chandra marepalli. Cloud Computing Organizational Benfits. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  115. Jeffy Mwakalinga. A Framework for Adaptive Information Security Systems. – М.: LAP Lambert Academic Publishing, 2011. – 364 с.
  116. Meysam Namayandeh. Development of Computer Ethical Framework for Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 132 с.
  117. Harjot Dhawan. A Road to Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  118. Arvind Meniya and H. B. Jethva. Next Generation Mobile Application in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 72 с.
  119. Rafal AL-Khashab. An Authentication Model for Cloud Computing Application. – М.: LAP Lambert Academic Publishing, 2014. – 104 с.
  120. M. Reza Rahimi. QoS-Aware Middleware for Service Allocation in Mobile Cloud Computing. – М.: LAP Lambert Academic Publishing, 2014. – 124 с.
  121. Yi Xu and Jun Yan. A cloud-based information integration platform for smart cars. – М.: LAP Lambert Academic Publishing, 2014. – 124 с.
  122. Ali Dehghantanha. Privacy in Pervasive Computing Systems. – М.: LAP Lambert Academic Publishing, 2010. – 136 с.
  123. Faith J Shimba. Cloud Computing. – М.: LAP Lambert Academic Publishing, 2010. – 136 с.
  124. Muhammad Imran Tariq. SLA based Information Security Metrics in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2014. – 192 с.
  125. Bugra Karabey. Teorem. – М.: LAP Lambert Academic Publishing, 2012. – 116 с.
  126. Paul Denys. Security of Personal Information in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 144 с.
  127. Taqwa Hariguna. Prototype cloud computing for e-government. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  128. alok kumar and Bibhudatta Sahoo. Placement of SaaS Components in Cloud Computing Environment. – М.: LAP Lambert Academic Publishing, 2014. – 68 с.
  129. PRASANNA POKHREL and Siva Praneeth Babu Vemulapalli. Web Based Information System (WBIS). – М.: LAP Lambert Academic Publishing, 2010. – 80 с.
  130. Vinicius Vielmo Cogo. Diversity in automatic cloud computing resource selection. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  131. Li Jian. Large scale data processing in Hadoop MapReduce scenario. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  132. Khandakar Entenam Unayes Ahmed. IDENTITY AND ACCESS MANAGEMENT IN CLOUD COMPUTING. – М.: LAP Lambert Academic Publishing, 2011. – 172 с.
  133. S. Balamurugan,M. Sowmiya and S. Charanyaa. Principles of Scheduling in Cloud Computing. – М.: Scholars' Press, 2014. – 148 с.
  134. Ani Brown Mary. Profit Maximization in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2013. – 84 с.
  135. Bindu Sharma and Sangita Gupta. Information Seeking Behavior In Internet Era. – М.: LAP Lambert Academic Publishing, 2014. – 240 с.
  136. Dilip Kumar and Bibhudatta Sahoo. Energy Efficient Resource Allocation in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2014. – 92 с.
  137. Amir Haghbin Shomali,Kamarulzaman Bin Ab Aziz and Mehdi Mohammadi Poorangi. Success Factors for the Establishment of a Cloud Computing Sector. – М.: LAP Lambert Academic Publishing, 2012. – 192 с.
  138. Alaa Al-Deen Mohammed Hassan. Information Security Management. – М.: LAP Lambert Academic Publishing, 2013. – 188 с.
  139. Ahmed Mansour and Yousif Ashour. The Adoption of Cloud Computing Technology: Concerns and Challenges. – М.: LAP Lambert Academic Publishing, 2013. – 176 с.
  140. Ying Qian. Mitigating Information Security Risks during Operation Transition. – М.: LAP Lambert Academic Publishing, 2012. – 372 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Наука человековедения. интервью с Д. Уолтоном, профессором London Metropolitan University, экспертом CIPD. Chartered Institute of Personnel and Development, автором программы Master of Arts in Human Resource Strategies. И. Смирнова, "Кадровый менеджмент", № 5, июль-август 2007.
  2. Учет и калькулирование затрат по функциям. Метод АВС. Activity-Based Costing. М.К. Ерижев, "Новое в бухгалтерском учете и отчетности", № 19, октябрь 2003.
  3. Обеспечение безопасности PIN-Based операций с банковскими картами. С.В.  Серебряков, "Расчеты и операционная работа в коммерческом банке", N 2, март-апрель 2012 г.
  4. О качестве сервиса, связанного с запросами на медицинскую информацию. Medical Information Service?. А. Беденков, "Ремедиум", № 1, январь 2012.
  5. Risk-based pricing: посткризисные тенденции. А.В. Гидулян, "Банковское кредитование", N 1, январь-февраль 2012 г.
  6. Trade-in как способ обмена автомобиля. С.Н. Гордеева, "Торговля: бухгалтерский учет и налогообложение", N 2, февраль 2011 г.
  7. Проблемы применения универсальной юрисдикции in absentia. Г.А. Королев, "Журнал российского права", № 10, октябрь 2009.
  8. Тонкости trade-in. С.А.Королев, "НДС. Проблемы и решения", № 8, август 2009.
  9. In-store banking - новая модель банковского бизнеса. А. Пятков, "Банковское обозрение", № 11, ноябрь 2008.

Образцы работ

Тема и предметТип и объем работы
Особенности виртуального общения
Психология
Курсовая работа
28 стр.
Лингвистика
Лингвистика
Диплом
69 стр.
Привлекательности труда в организации
Психология
Курсовая работа
35 стр.
Математические модели океанических течений
Переводоведение (теория перевода)
Курсовая работа
42 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Александра
Спасибо, что Вы со мной сегодня так мучились, но все-таки все объяснили. Желаем удачи!!!