Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Satyendra Singh Thakur and Dr. Manish Manoria. Secure Cryptosystem for Biometric Information using RSA. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.

Дополнительные результаты

  1. Security and Privacy in Mobile Information and Communication Systems: Third International ICST Conference, MOBISEC 2011, Aalborg, Denmark, May 17-19, ... and Telecommunications Engineering). – М.: , 2012. – 195 с.
  2. Van Haren Publishing. BiSL: A Framework for Business Information Management 2nd Edition. – М.: , 2012. – 0 с.
  3. Gerald Kovacich. The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition. – М.: , 0. – 0 с.
  4. John A. Carey, Jim Business Letters for Busy People Dugger, National Press Publications. Business Letters for Busy People. – М.: , 0. – 0 с.
  5. Carol Andrus. Fat-Free Writing: Business Writing for the Information Age (Crisp Fifty-Minute Book). – М.: , 0. – 0 с.
  6. Bruce Ross-Larson. Writing for the Information Age. – М.: , 0. – 0 с.
  7. Donald A. Marchand, Don Marchand. Competing with Information: A Manager's Guide to Creating Business Value with Information Content. – М.: , 0. – 0 с.
  8. Information Warfare : corporate attack and defence in a digital world (Computer Weekly Professional (Paperback)). – М.: , 0. – 0 с.
  9. John C. Braddock. Derivatives Demystified : Using Structured Financial Products (Wiley Series in Financial Engineering). – М.: , 1997. – 306 с.
  10. Nikolai Dokuchaev. Dynamic Portfolio Strategies: Quantitative Methods and Empirical Rules for Incomplete Information (International Series in Operations Research and Management Science, Volume 47). – М.: , 0. – 0 с.
  11. Gerald L. Kovacich, Edward P. Halibozek. The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, First Edition. – М.: , 0. – 0 с.
  12. Marko Nordquist. Towards Improved Security Management Practice: Designing an Organizational Model Procedure for the Implementation of Information Security Management in Heterogeneous Information Management. – М.: , 0. – 0 с.
  13. Mary Pat McCarthy, Stuart Campbell. Security Transformation: Digital Defense Strategies to Protect your Company's Reputation and Market Share. – М.: , 0. – 0 с.
  14. Robert Stegwee, Ton Spil. Strategies for Healthcare Information Systems. – М.: , 0. – 0 с.
  15. Donn B. Parker. Fighting Computer Crime : A New Framework for Protecting Information. – М.: , 0. – 0 с.
  16. Bernard H. Boar. Practical Steps for Aligning Information Technology with Business Strategies: How to Achieve a Competitive Advantage. – М.: , 0. – 0 с.
  17. Peter Varhol. Implementing a World Wide Web Site for Your Organization. – М.: , 0. – 0 с.
  18. Roger Evernden. Information First : Integrating Knowledge and Information Architecture for Business Advantage. – М.: , 2003. – 0 с.
  19. Thomas C. Glaessner. Electronic Safety and Soundness: Securing Finance in a New Age (World Bank Working Papers). – М.: , 2004. – 0 с.
  20. Arlita W. Hallam. Managing Budgets and Finances: A How-to-Do-It Manual for Librarians and Information Professionals (How to Do It Manuals for Librarians, No. 138) (How to Do It Manuals for Librarians). – М.: , 2005. – 0 с.
  21. Jeffrey M. Cohen. Put Options : How to Use This Powerful Financial Tool for Profit & Protection. – М.: , 2003. – 0 с.
  22. Charles Fleetham. The Search For Unrational Leadership: Using Rational And Irrational Methods To Change Your Life. – М.: , 2005. – 0 с.
  23. Carol E. Osborn. Statistical Applications for Health Information Management. – М.: , 2005. – 0 с.
  24. Robert A. Schultz. Contemporary Issues in Ethics and Information Technology. – М.: , 2005. – 0 с.
  25. Rickland Hollar. Enterprise Web Services Security (Internet Series). – М.: , 2005. – 432 с.
  26. Kevin Ruse. XML for Web Designers Using Macromedia Studio MX 2004 (Internet Series). – М.: , 2004. – 448 с.
  27. Jim Davis, Gloria J. Miller, Allan Russell. Information Revolution : Using the Information Evolution Model to Grow Your Business. – М.: , 2006. – 224 с.
  28. Jeffrey M. Stanton, Kathryn R. Stam. The Visible Employee: Using Workplace Monitoring and Surveillance to Protect Information Assets-Without Compromising Employee Privacy or Trust. – М.: , 2006. – 272 с.
  29. Stephen J. Andriole. Technology Due Diligence: Best Practices for Chief Information Officers, Venture Capitalists, and Technology Vendors. – М.: , 2008. – 422 с.
  30. Dr. Florian Wieneke. Acceptance Analysis of New Technology for Sustainable WATSAN Management: A Case Study of Operating Farm Households in the Mekong Delta, Viet Nam. – М.: , 2008. – 252 с.
  31. CompTIA Security+: Certification Kit (комплект из 3 книг + 2 CD-ROM). – М.: Sybex, 2009. – 1440 с.
  32. Hamid R. Nemati. Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues (Advances in Information Security and Privacy). – М.: , 2009. – 414 с.
  33. Alan Calder. Information Security based on ISO 27001/ISO 27002: A Management Guide. – М.: , 2009. – 83 с.
  34. Bel G. Raggad. Information Security Management: Concepts and Practice. – М.: , 2010. – 871 с.
  35. Alan Calder, Steve G Watkins. Information Security Risk Management for ISO27001 / ISO27002. – М.: , 2010. – 198 с.
  36. Kathryn Critchley. Coaching Skills Training Course: Business and Life Coaching Techniques for Improving Performance Using NLP and Goal Setting: Your Toolkit to Coaching... Free Downloadable Templates, Ready to Use. – М.: Universe of Learning Ltd., 2010. – 204 с.
  37. S.Y. Kung, M.W. Mak, S.H. Lin. Biometric Authentication: A Machine Learning Approach (Prentice Hall Information and System Sciences Series). – М.: , 2010. – 496 с.
  38. Donald A. Marchand. Competing with Information. – М.: , 2000. – 352 с.
  39. Mamdouh Refaat. Data Preparation for Data Mining Using SAS. – М.: , 2010. – 424 с.
  40. Dennis P. Nolan. Safety and Security Review for the Process Industries. – М.: , 2010. – 250 с.
  41. Gerald W Brock. Telecommunication Policy for the Information Age – From Monopoly to Competition. – М.: , 1994. – 336 с.
  42. Donald Schon. High Technology & Low–Income Communities – Prospects for the Positive Use of Advanced Information Technology. – М.: , 1998. – 424 с.
  43. Kaufman. U.S. National Security Strategy for the 1990s. – М.: , 1991. – 0 с.
  44. Kaufman. U.S. National Security Strategy for the 1990s. – М.: , 1991. – 0 с.
  45. Science for Society: Informing Policy and Practice Through Research in Developmental Psychology. – М.: , 2003. – 100 с.
  46. Sead Muftic. Security Architecture for Open Distributed Systems. – М.: , 1993. – 298 с.
  47. M SS BERGERUD. Bergerud: ?computers? For ?managing? Information. – М.: , 1987. – 480 с.
  48. Microsoft. Security Operations for Microsoft Exchange 2000 Server. – М.: , 2002. – 136 с.
  49. The AGI Source Book for Geographic Information Systems 1995. – М.: , 1994. – 392 с.
  50. M SS BERGERUD. Bergerud: ?tm? Instructor?s Manual T/a ?computers? For?managing? Information (pr Only). – М.: , 1987. – 106 с.
  51. S MUFTIC. Muftic: ?security? Mechanisms For Computer Network S. – М.: , 1989. – 196 с.
  52. Amitai Etzioni. Security First – For A Muscular, Moral Foreign Policy. – М.: , 2008. – 336 с.
  53. Kostas Terzidis. Algorithms for Visual Design Using the Processing Language. – М.: , 2009. – 384 с.
  54. Harold Kerzner. Strategic Planning for Project Management Using a Project Management Maturity Model. – М.: , 2001. – 272 с.
  55. Visualizing Information With Microsoft® Office Visio® 2007. – М.: , 2011. – 448 с.
  56. Citrix® Access Suite Security For It Administrators. – М.: , 2011. – 268 с.
  57. Security Valuation And Risk Analysis: Assessing Value In Investment Decision-Making. – М.: , 2011. – 614 с.
  58. Project Management For Healthcare Information Technology. – М.: , 2011. – 288 с.
  59. Fundamentals Of Network Security. – М.: , 2011. – 672 с.
  60. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . –  с.
  61. For Your Information NEd 3 SB. – М.: Pearson Education, 2014. –  с.
  62. Vivek Bhushan. Securing Published Data In Cloud Using Data Incognito. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  63. Jaydeb Bhaumik and Satyajit Das. Substitution Permutation Network Type Block Cipher. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  64. Satyendra Singh Thakur and Dr. Manish Manoria. Secure Cryptosystem for Biometric Information using RSA. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.
  65. Nitin Kanzariya and Ashish Nimavat. Security of Digital Image Using Hybrid Steganography. – М.: LAP Lambert Academic Publishing, 2013. – 84 с.
  66. Jameel Ahmed. Transform-Domain and DSP Based Secure Speech Communication. – М.: LAP Lambert Academic Publishing, 2011. – 252 с.
  67. Azam Khan. Algorithm Study & Matlab Model for TIFF CCITT Group4. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  68. Mohammad A. Dabbah. Secure Biometric Face Recognition. – М.: LAP Lambert Academic Publishing, 2010. – 144 с.
  69. Ali Keyvani. Modular Fixture Design for BIW Lines Using Process Simulate. – М.: LAP Lambert Academic Publishing, 2012. – 72 с.
  70. Liang Cui. Developing a Virtual Test Environment for Granular Materials Using DEM. – М.: LAP Lambert Academic Publishing, 2010. – 392 с.
  71. Raul Carlson. Structure Information Systems for Industrial Environmental Management. – М.: LAP Lambert Academic Publishing, 2010. – 124 с.
  72. MOHD HASMADI ISMAIL. ALLOCATING ACCESS ROAD FOR FOREST HARVESTING USING GIS. – М.: LAP Lambert Academic Publishing, 2010. – 84 с.
  73. Alaa K. Farhan. Security Protocol for Mobile Data. – М.: LAP Lambert Academic Publishing, 2013. – 116 с.
  74. Oliver Mtapuri. Developing a Poverty Index for African Economies using the Consensual Approach:. – М.: LAP Lambert Academic Publishing, 2010. – 224 с.
  75. Moira Gundu. An Information Appraoch To Household Food Security. – М.: LAP Lambert Academic Publishing, 2011. – 156 с.
  76. Rasak Olajide. Utilisation of EE for Agric Information Dissemination in Nigeria. – М.: LAP Lambert Academic Publishing, 2011. – 164 с.
  77. Ashfaq Ahmed Sheikh and Muhammad Ashraf. Use of Low Quality Groundwater for Sustainable Crop Production. – М.: LAP Lambert Academic Publishing, 2010. – 72 с.
  78. David Okoedo-Okojie and Vera Kenechi Okeke. Cassava and Yam Farmers' Preference for Agricultural Information Vol. 1. – М.: LAP Lambert Academic Publishing, 2013. – 224 с.
  79. Teresa Santos. Producing Geographical Information for Land Planning using VHR Data. – М.: LAP Lambert Academic Publishing, 2011. – 332 с.
  80. Ayyaswamy Kathirvel,Srinivasan Rengaramanujam and Mohanambal Kathirvel. Prevention of attacks usign umpiring security model for manets. – М.: LAP Lambert Academic Publishing, 2012. – 192 с.
  81. Shirley Magazi. AN ASSESSMENT OF FOOD SECURITY INTERVENTIONS. – М.: LAP Lambert Academic Publishing, 2011. – 104 с.
  82. Padmashali. A Secure communication for wireless sensor networks. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  83. Mohamed Nagy Saad Mohamed Elziftawy. Comparative Study & Hybrid Technique for Biomidical Image Compression. – М.: LAP Lambert Academic Publishing, 2012. – 184 с.
  84. Deepak Puthal and Bibhudatta Sahoo. Secure Data Collection & Critical Data Transmission in Mobile Sink WSN. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  85. Dmitry Khovratovich. New Methods in Symmetric Cryptanalysis. – М.: LAP Lambert Academic Publishing, 2011. – 220 с.
  86. Hamid Reza Barzegar,Mahdiyeh Barzegar and Neshat Alidad. Energy Efficient And Secured Communication For Manets In Military. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  87. Hamdy Morsy. Developing a New Technique for Hiding Information in Images. – М.: LAP Lambert Academic Publishing, 2013. – 116 с.
  88. Rupa Ch. and Avadhani P. S. Modern Security Methods in Applied Computer Science. – М.: Scholars' Press, 2014. – 124 с.
  89. Mohammad AlAhmad. Security threats of finger print biometric in network system. – М.: LAP Lambert Academic Publishing, 2014. – 88 с.
  90. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  91. Iman Almomani. Security Solutions for Wireless Mobile Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2011. – 360 с.
  92. M. Amutha Prabakar. Authentication Scheme for Dynamic Group Using Threshold Cryptography. – М.: LAP Lambert Academic Publishing, 2014. – 80 с.
  93. R. Baskaran,M. S. Saleem Basha and A. Balasubramanian. Two Tier Security Framework for Service Oriented Systems. – М.: LAP Lambert Academic Publishing, 2012. – 176 с.
  94. Tejpal Singh. Security Protocols for Data Routing in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  95. Omid Mahdi Ebadati E.,Harleen Kaur M. Afshar Alam and Kaebeh Yaeghoobi. Micro-Firewalls for Dynamic Network Security Framework. – М.: LAP Lambert Academic Publishing, 2012. – 292 с.
  96. Zheng Liu,Xue Li and Zhaoyang Dong. Improvements on Data Security Algorithms for Streaming Multimedia. – М.: LAP Lambert Academic Publishing, 2012. – 240 с.
  97. Pallavi Kaliyar and Gagan Singla. A secure routing protocol for MANETs against byzantine attacks. – М.: LAP Lambert Academic Publishing, 2013. – 84 с.
  98. Pushphas Chaturvedi and Kunal Gupta. Enhanced Packet Dissembling Schemes For Jamming Attacks Prevention. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  99. Britto R. Kumar and Albert S. Rabara. An Architecture for Secure Mobile Payment System using PKI. – М.: LAP Lambert Academic Publishing, 2013. – 184 с.
  100. Raghavendra K. R. Model-checking infinite state systems for information flow security. – М.: LAP Lambert Academic Publishing, 2014. – 160 с.
  101. Martin Drahansky. Biometric Cryptography Based on Fingerprints. – М.: LAP Lambert Academic Publishing, 2010. – 160 с.
  102. Emre Sezgin and Sevgi Ozkan. ASSESSMENT OF INFORMATION TECHNOLOGY USE IN ORGANIZATIONS. – М.: LAP Lambert Academic Publishing, 2011. – 144 с.
  103. Usman Habib. Secure Mobile Authentication for Linux Workstation log on. – М.: LAP Lambert Academic Publishing, 2011. – 120 с.
  104. Mais Mohammed Hobi and Sarab Majeed Hameed. Biometrics for User Authentication Using Artificial Neural Networks. – М.: LAP Lambert Academic Publishing, 2013. – 108 с.
  105. Ankit Vidyarthi and Ankita Sharma. Semantic Ontology Merging for Effective Information Retrieval System. – М.: LAP Lambert Academic Publishing, 2014. – 112 с.
  106. Yedji Mbangsoua and Dr. Freddie Acosta. Information Security and its Investment Justification. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  107. Zhuozhi Chen and Rob Pooley. Requirement Elicitation for Enterprise Information Systems. – М.: LAP Lambert Academic Publishing, 2011. – 256 с.
  108. Wole Olatokun. Information Technology Tools and Applications. – М.: LAP Lambert Academic Publishing, 2011. – 296 с.
  109. E. Madhusudhana Reddy. Development of Secure Protocols for MHIS Using RMPJK–RSA Cryptosystem. – М.: LAP Lambert Academic Publishing, 2011. – 204 с.
  110. Sandeep Kumar. Simulator for Database Aggregation using Metadata. – М.: LAP Lambert Academic Publishing, 2013. – 88 с.
  111. Mahimn Bhupendrabhai Pandya,Ashish Jani and Nalin Jani. Bespoke Technique For Copyright Digital Images & Secure Communication. – М.: LAP Lambert Academic Publishing, 2014. – 84 с.
  112. Uros Damnjanovic. Clustering of Visual Information Using Spectral Methods. – М.: LAP Lambert Academic Publishing, 2010. – 172 с.
  113. Drake Patrick Mirembe. Security Framework for Telemedicine, eHealth, and Wellness Services. – М.: LAP Lambert Academic Publishing, 2010. – 72 с.
  114. Ramon Mangion. Are biometric passports the way forward?. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.
  115. Julien Shabani. Information Security for RFID Systems. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.
  116. Debasish Jena. On Protocols for Information Security Services. – М.: LAP Lambert Academic Publishing, 2011. – 136 с.
  117. Mohammed Firdos Alam Sheikh. Improving Web Security by Blocking SQL Injection Attack(SQLIA). – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  118. Mehtab Afzal,Ijaz Ahmed and Qazi Mudassar Ilyas. Information Extraction from Web for Disaster Management Systems. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  119. Samuel Macharia Were and Jasper Mogaka Masese. Information Processing for Effective Storage and Retrieval. – М.: LAP Lambert Academic Publishing, 2014. – 92 с.
  120. Bertold van Voorst. Cluster-based collection selection for information retrieval. – М.: LAP Lambert Academic Publishing, 2011. – 84 с.
  121. Cyrus Abanti Makori,Jane Onsongo and Lusiba Badru. ICT Security Applications. – М.: LAP Lambert Academic Publishing, 2012. – 112 с.
  122. Magdy Shayboub A. Mahmoud. Intelligent Mobile Agents For Information Retrieval. – М.: Scholars' Press, 2014. – 456 с.
  123. Kshamamayee Dash. A Novel BPNN Approach For Speaker Identification Using MFCC. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  124. Hassen Alsafi and Mohammed Azhruddin. The Security Issues for Smart Grids Applications on Cloud Computing. – М.: LAP Lambert Academic Publishing, 2013. – 60 с.
  125. Ganesan G. Algebra of Information Systems using Rough Sets and Fuzzy Sets. – М.: LAP Lambert Academic Publishing, 2014. – 128 с.
  126. Dirk Lessner. Network Security for Embedded Systems. – М.: LAP Lambert Academic Publishing, 2009. – 232 с.
  127. Ahmed AlNunu. How Much Information Security?. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  128. Jeffy Mwakalinga. A Framework for Adaptive Information Security Systems. – М.: LAP Lambert Academic Publishing, 2011. – 364 с.
  129. Khalid Saeed. Security Concern an Obstacle for the Growth of E-Commerce in Pakistan. – М.: LAP Lambert Academic Publishing, 2014. – 52 с.
  130. Ahmed S. Yesuf. Context-based attack tree modelling for software development. – М.: LAP Lambert Academic Publishing, 2014. – 100 с.
  131. Muhammad Imran Tariq. SLA based Information Security Metrics in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2014. – 192 с.
  132. Vinayak Bharadi and Hemchandra Kekre. Biometric Authentication Systems. – М.: LAP Lambert Academic Publishing, 2012. – 364 с.
  133. Khalid Hussain and Waqas Ahmed. Sub Table Access Based Model For OLAP tools. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  134. Daniel Oranova Siahaan. Query Languages as Tools for Retrieving Information on the Internet. – М.: LAP Lambert Academic Publishing, 2011. – 140 с.
  135. Shada Al-Salamah. Towards Information Sharing in Virtual Organisations. – М.: LAP Lambert Academic Publishing, 2010. – 312 с.
  136. Tamur Aziz. Intelligent Watermarking Using Loss Less Compression and RSA Encryption. – М.: LAP Lambert Academic Publishing, 2011. – 60 с.
  137. Kerem Beygo and Cihan Eraslan. Enhancing Security and Usability Features of NFC. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  138. Tadeusz Struk. Elliptic Curve Cryptography as suitable solution for mobile devices. – М.: LAP Lambert Academic Publishing, 2010. – 88 с.
  139. Marcos Ortega Hortas. Biometric authentication using the retinal vessel tree. – М.: LAP Lambert Academic Publishing, 2011. – 184 с.
  140. Vijayan Prasath. Secure Architecture for Web Service Discovery and Retrieval. – М.: LAP Lambert Academic Publishing, 2012. – 116 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. О качестве сервиса, связанного с запросами на медицинскую информацию. Medical Information Service?. А. Беденков, "Ремедиум", № 1, январь 2012.
  2. Мы можем управлять собственными мыслями. интервью с С. Харитоновым, врачом-психотерапевтом, психиатором, кандидатом медицинских наук, старшим научным сотрудником Московского НИИ психиатрии Росздрава РФ, членом-корреспондентом Международной академии наук. МАНЭБ, членом Британского общества когнитивных и поведенческих психотерапевтов. Membership British Association for Behavioural & Cognitive Psychoterapies / BABCP. Ф. Кульпин, "Управление персоналом", N 8, апрель 2011 г.
  3. Зачетная реструктуризация долга: институт DEBT-FOR-EQUITY SWAP в России". интервью с М. Григорьевым, старшим юристом корпоративной практики юридической фирмы "Вегас-Лекс". О. Бодрягина, "эж-ЮРИСТ", № 3, январь 2010.
  4. Управление проектами при подборе персонала. PM for HR. Е. Кривов, "Кадровик. Рекрутинг для кадровика", № 9, сентябрь 2008.

Образцы работ

Тема и предметТип и объем работы
Специализация учреждений ООН: правовая характеристика, привелегии и иммунитет
Международная экономика
Реферат
19 стр.
Последствия операции НАТО
Политология
Диплом
80 стр.
Платежные системы в Интернете
Информатика
Диплом
102 стр.
Формирование системы экономической безопасности на Белоярской АЭС
Психофизиология
Диплом
96 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Юлия (Ростов-на-Дону)
Ирина добрый день! Ездила сегодня к преподу забирала диплом после вашего сопровождения. Все супер ей все понравилось, ничего исправлять или сокращать не надо, написала мне уже отличный отзыв. Спасибо вам большое!