Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Frank J. Fabozzi. Securities Lending and Repurchase Agreements. – М.: , 0. – 0 с.
  2. Frank J. Fabozzi, Steven V. Mann. Securities Finance: Securities Lending and Repurchase Agreements (Frank J. Fabozzi Series). – М.: , 2005. – 351 с.
  3. Securities Lending and Repurchase Agreements. – М.: , 1996. – 288 с.

Дополнительные результаты

  1. Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  2. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с.
  3. Security and Development in Global Politics: A Critical Comparison. – М.: , 2012. – 360 с.
  4. Kenneth S. Hackel, Joshua Livnat. Cash Flow and Security Analysis. – М.: , 0. – 0 с.
  5. Changmin Chun. Cross-border Transactions of Intermediated Securities: A Comparative Analysis in Substantive Law and Private International Law. – М.: , 2012. – 524 с.
  6. Gerald Kovacich. The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition. – М.: , 0. – 0 с.
  7. Safety and the Security Professional : A Guide to Occupational Safety and Health Strategies. – М.: , 0. – 0 с.
  8. Asset Protection and Security Management Handbook. – М.: , 0. – 0 с.
  9. Safe Schools: A Security and Loss Prevention Plan. – М.: , 0. – 0 с.
  10. Anne McKinney. Real Resumes for Police, Law Enforcement and Security Jobs: Including Real Resumes Used to Change Careers and Transfer Skills to Other Industries). – М.: , 0. – 0 с.
  11. Christopher M. Dent. Asia-Pacific Economic and Security Co-Operation: New Regional Agendas. – М.: , 0. – 0 с.
  12. Penny Davenport. A Practical Guide to Collateral Management in the OTC Derivatives Market (Finance and Capital Markets). – М.: Palgrave Macmillan, 2003. – 304 с.
  13. Moorad Choudhry. Global Repo Markets : Analysis and Strategies (Wiley Finance). – М.: , 0. – 0 с.
  14. J. Kirkland Grant. Securities Arbitration for Brokers, Attorneys, and Investors. – М.: , 0. – 0 с.
  15. Frank J. Fabozzi. Securities Lending and Repurchase Agreements. – М.: , 0. – 0 с.
  16. Edward I. Altman. Distressed Securities: Analyzing and Evaluating Market Potential and Investment Risk. – М.: , 0. – 0 с.
  17. Donald E. Weeden. Weeden & Co.: The New York Stock Exchange and the Struggle Over a National Securities Market. – М.: , 0. – 0 с.
  18. Gerald L. Kovacich, Edward P. Halibozek. The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, First Edition. – М.: , 0. – 0 с.
  19. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с.
  20. Mary Pat McCarthy, Stuart Campbell. Security Transformation: Digital Defense Strategies to Protect your Company's Reputation and Market Share. – М.: , 0. – 0 с.
  21. Physical Security and the Inspection Process. – М.: , 0. – 0 с.
  22. Risk Analysis and the Security Survey. – М.: , 0. – 0 с.
  23. Don Silver. The Generation X Money Book: Achieving Security and Independence. – М.: , 0. – 0 с.
  24. Jonathan Gruber, David A. Wise. Social Security and Retirement Around the World (NATIONAL BUREAU OF ECONOMIC RESEARCH CONFERENCE REPORT). – М.: , 0. – 0 с.
  25. Geoff Craighead. High-Rise Security and Fire Life Safety, Second Edition. – М.: , 0. – 0 с.
  26. Ellen Hoffman. Bankroll your Future: How to Get the Most from Uncle Sam for Your Retirement Years--Social Security, Medicare, and Much More. – М.: , 0. – 0 с.
  27. Ifip Tc6, Tc11 Joint Working Conference on Communications and Multimedi, Tomaz Klobucar. Advanced Communications and Multimedia Security: Ifip Tc6/Tc11 Sixth Joint Working Conference on Communications and Multimedia Security, September 26-27, 2002, Portoroz, Slovenia (International Federation for Information Processing, 100). – М.: , 0. – 0 с.
  28. Jesus Mena. Homeland Security Techniques and Technologies (Networking Series). – М.: , 0. – 0 с.
  29. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с.
  30. William H. Meyer. Security, Economics, and Morality in American Foreign Policy: Contemporary Issues in Historical Context. – М.: , 2003. – 0 с.
  31. Brandon Baum. Non-Disclosure and Confidential Agreements Line by Line: A Detailed Look at NDA's, How to Change Them to Fit Your Needs, and Contract Samples You Can Use. – М.: , 2004. – 0 с.
  32. Christoph Borgmann. Social Security, Demographics, and Risk (Population Economics). – М.: , 2004. – 0 с.
  33. Debt Management and Government Securities Markets in the 21st Century. – М.: , 2004. – 0 с.
  34. Ralf Emmers. Cooperative Security and the Balance of Power in ASEAN and ARF. – М.: , 2003. – 0 с.
  35. Thomas C. Glaessner. Electronic Safety and Soundness: Securing Finance in a New Age (World Bank Working Papers). – М.: , 2004. – 0 с.
  36. Jack W. Plunkett. Plunkett's Banking, Mortgages and Credit Industry Almanac 2005: The Only Complete Guide to the Business of Banking, Lending, Mortgages and Credit Cards ... Mortgages and Credit Industry Almanac). – М.: , 2004. – 0 с.
  37. Peter R., MBA Ramsaroop. Securing Business Intelligence: Knowledge and CyberSecurity in the Post 9/11 World. – М.: , 2004. – 0 с.
  38. Sari Greene. Security Policies and Procedures : Principles and Practices (Security). – М.: , 2005. – 0 с.
  39. Frank J. Fabozzi, Steven V. Mann. Securities Finance: Securities Lending and Repurchase Agreements (Frank J. Fabozzi Series). – М.: , 2005. – 351 с.
  40. Yener Altunbas, Blaise Gadanecz and Alper Kara. Syndicated Loans: A Hybrid of Relationship Lending and Publicly Traded Debt. – М.: Palgrave Macmillan, 2006. – 256 с.
  41. Ibp Usa. EU Intelligence and Security Policy and Cooperation Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  42. Ibp Usa. EU Security Strategy and Cooperation Handbook (World Strategic and Business Information Library). – М.: , 2008. – 300 с.
  43. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с.
  44. IFPO. Security Supervision and Management. – М.: , 2010. – 584 с.
  45. Jeffrey C. Hooke. Security Analysis and Business Valuation on Wall Street + Companion Web Site: A Comprehensive Guide to Today's Valuation Methods. – М.: Wiley, 2010. – 408 с.
  46. Edited by Andrea Bianchi and Alexis Keller. Counterterrorism: Democracy's Challenge. – М.: Hart Publishing, 2008. – 454 с.
  47. Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards and Applications (Wireless Networks and Mobile Communications). – М.: , 2008. – 424 с.
  48. Security Analysis and Business Valuation on Wall Street + Companion Web Site. – М.: , 2010. – 432 с.
  49. Patrick S. Collins. Regulation of Securities, Markets, and Transactions. – М.: , 2011. – 448 с.
  50. Erwin Blackstone. Securing Home and Business. – М.: , 2010. – 310 с.
  51. James Pastor. Security Law and Methods. – М.: , 2010. – 632 с.
  52. Marcus Sachs. Securing IM and P2P Applications for the Enterprise. – М.: , 2010. – 650 с.
  53. Suresh Babu. Food Security, Poverty and Nutrition Policy Analysis. – М.: , 2010. – 432 с.
  54. Hillel Cohen. Good Arabs – The Israeli Security Agencies and the Israeli Arabs, 1948–1967. – М.: , 2009. – 272 с.
  55. Hillel Cohen. Good Arabs – The Israeli Security Agencies and the Israeli Arabs, 1948–1967. – М.: , 2011. – 296 с.
  56. Bilal Haidar. Professional ASP.NET 3.5 Security, Membership, and Role Management with C# and VB. – М.: , 2008. – 936 с.
  57. Securities Lending and Repurchase Agreements. – М.: , 1996. – 288 с.
  58. Peter J Katzenstein. The Culture of National Security – Norms and Identity in World Politics. – М.: , 1996. – 580 с.
  59. Microsoft. Improving Web Application Security – Threats and Countermeasures. – М.: , 2003. – 960 с.
  60. Donald Lopez. Good Arabs – The Israeli Security Agencies and the Israeli Arabs, 1948–1967. – М.: , 1999. – 290 с.
  61. The American Institute of Architects. Security Planning and Design. – М.: , 2003. – 256 с.
  62. Geoffrey Poitras. Security Analysis and Investment Strategy. – М.: , 2004. – 680 с.
  63. Martin Thomas. Empires of Intelligence – Security Services and Colonial Disorder After 1914. – М.: , 2007. – 486 с.
  64. Edited by Lilian Edwards and Charlotte Waelde. Law and the Internet - Third Edition. – М.: , 2011. – 708 с.
  65. Edited by Rainer Bechtold, Ingo Brinker, Wolfgang Bosch and Simon Hirsbrunner. European Competition Law. – М.: , 2011. – 804 с.
  66. Donald R Rothwell and Tim Stephens. The International Law of the Sea. – М.: , 2011. – 516 с.
  67. Edited by Marie-Claire Foblets and Trutz von Trotha. Healing the Wounds. – М.: , 2011. – 300 с.
  68. Edited by Marie-Claire Foblets and Trutz von Trotha. Healing the Wounds. – М.: , 2011. – 300 с.
  69. Edited by Andrea Bianchi and Alexis Keller. Counterterrorism: Democracy’s Challenge. – М.: , 2011. – 438 с.
  70. Edited by Thomas Gruetzner, Ulf Hommel and Klaus Moosmayer. Anti-Bribery Risk Assessment. – М.: , 2011. – 500 с.
  71. Stefan Elbe. Virus Alert – Security, Governmentality, and the Global AIDS Pandemic. – М.: , 2009. – 224 с.
  72. Hacking Exposed Windows: Microsoft Windows Security Secrets And Solutions, Third Edition. – М.: , 2011. – 451 с.
  73. Security Valuation And Risk Analysis: Assessing Value In Investment Decision-Making. – М.: , 2011. – 614 с.
  74. Security Information And Event Management (Siem) Implementation. – М.: , 2011. – 464 с.
  75. European Union and Russia: 10 Years after Signing of Partnership and Cooperation Agreement. – СпБ.: Издательство Санкт-Петербургского университета, 2005. – 152 с.
  76. Jonathan Sutherland and Diane Canwell. Key Concepts in Accounting and Finance. – М.: Palgrave Macmillan, 2004. – 272 с.
  77. Muhammad Naveed Iqbal Qureshi and Sairah Syed. Quantum Cryptography and its Physical Implementation. – М.: LAP Lambert Academic Publishing, 2011. – 60 с.
  78. Subi Khan and R.P. Mahapatra. SQL Injection Attack and Countermeasures. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  79. Md. Mahmudul Hasan Rafee and Sharmin Akter Lima. Proximity Based Access Control (PBAC). – М.: LAP Lambert Academic Publishing, 2012. – 160 с.
  80. Shaek Rana Mohammad Baki Billah and Mohammad Hafizur Rahman. Design & Development of Network Security System using IP Tables. – М.: LAP Lambert Academic Publishing, 2013. – 164 с.
  81. Omar Said and Yasser Albagory. Internet of Things. – М.: LAP Lambert Academic Publishing, 2014. – 136 с.
  82. Jagadish Pal. Power System Static Security Analysis and Control. – М.: LAP Lambert Academic Publishing, 2010. – 160 с.
  83. Kazi Tanvir Mahmud,David Hilton and Kazi Sohag. A Tale of Empty Plates. – М.: LAP Lambert Academic Publishing, 2012. – 136 с.
  84. Mohamed Youshah Shameel Mecca and Tirumala Rao Kothaluru. Evaluation of EAP Authentication Methods. – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  85. Halimah Awang and Loo-See Beh. Public Administration: Issues and Paradigms of Development. – М.: LAP Lambert Academic Publishing, 2012. – 188 с.
  86. Misgina Asmelash. Rural Household Food Security Status And Its Determinants. – М.: LAP Lambert Academic Publishing, 2011. – 100 с.
  87. Sitaram Kumawat,R.K. Mathukia and M.K. Khistaria. Greengram Response to Phosphorus and Sulphur. – М.: LAP Lambert Academic Publishing, 2014. – 148 с.
  88. Endalkachew Teshome,Hailemariam Birkie and Desalegn Mengesha. Community Based Adaptation to Climate Change for Ethiopian Agriculture. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  89. Hussein M. Khattab,Almoataz Y. Abdelaziz and Said F. Mekhamer. Innovative Approaches for Power System Security Assessment. – М.: LAP Lambert Academic Publishing, 2013. – 224 с.
  90. Shailendra Bajpai and J. P. Gupta. Site Security. – М.: LAP Lambert Academic Publishing, 2011. – 88 с.
  91. Oscar van der Vaart and Dennis Bakker. A business approach for the development of the future Dutch coastline. – М.: LAP Lambert Academic Publishing, 2010. – 108 с.
  92. Banani Afsana and Jonny Klokk. 18 Women 18 Stories. – М.: LAP Lambert Academic Publishing, 2010. – 120 с.
  93. Dodeye Williams. African Security Regimes and the Peace Process in Darfur. – М.: LAP Lambert Academic Publishing, 2012. – 232 с.
  94. Alemu Addisu. Rural household Food Security Status and its Determinants. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  95. Nuno Canas Mendes and Andre Saramago. Dimensions of State-Building. – М.: LAP Lambert Academic Publishing, 2012. – 272 с.
  96. Biljana Avramoska Gjoreska and Igor Gjoreski. Collective Security and Role of the New European Security Treaty. – М.: LAP Lambert Academic Publishing, 2015. – 84 с.
  97. Ayyaswamy Kathirvel,Srinivasan Rengaramanujam and Mohanambal Kathirvel. Prevention of attacks usign umpiring security model for manets. – М.: LAP Lambert Academic Publishing, 2012. – 192 с.
  98. Dr. Bianca De Canha,Dr. Kathryn Peck and Dr. Zoe Bengis. Homoeopathic Treatment of Infertility. – М.: LAP Lambert Academic Publishing, 2011. – 304 с.
  99. Brian Oduor,Benard Okelo and Silas Onyango. Financial mathematics. – М.: LAP Lambert Academic Publishing, 2011. – 72 с.
  100. Katja Eman and Gorazd Mesko. Environmental Crime in Criminology. – М.: Scholars' Press, 2014. – 196 с.
  101. Olufemi Fawole,Joseph Fayeye and Kingsley Nwachukwu. Security Agency and The Control And Manangement Of Arms In Nigeria. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  102. Reza Jelveh,Ahmad Moinzadeh and Dariush Nejadansari. The Role of Terminology in Movie Translation. – М.: LAP Lambert Academic Publishing, 2013. – 84 с.
  103. ASHISH MAKWANA and Yogesh Joshi. WTO, GATS and Indian Higher Education. – М.: LAP Lambert Academic Publishing, 2010. – 276 с.
  104. Wondwosen Mitiku,Yitayal Alemu and Semahegn Mengsitu. Opportunities And Challenges To Implement Inclusive Education. – М.: LAP Lambert Academic Publishing, 2014. – 52 с.
  105. Reza Mohammad Hossein and Kamran Gholamahmadi. A Combinational Security-Model In Service-Oriented Architecture. – М.: LAP Lambert Academic Publishing, 2014. – 136 с.
  106. Jiantao Gu,Jun Zheng and Jixun Song. WLAN Monitoring and Management System. – М.: LAP Lambert Academic Publishing, 2012. – 196 с.
  107. K. Shaila and K. R. Venugopal. Secure Data Communication in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2014. – 240 с.
  108. Sanjeev Karmakar and Manoj K. Kowar. A Comprehensive Lecture Notes on RSA-1024 Cryptography. – М.: LAP Lambert Academic Publishing, 2013. – 160 с.
  109. Saurabh Sharma and Sapna Gambhir. Cooperative Malicious Nodes Detection and Removal Scheme in MANETs. – М.: LAP Lambert Academic Publishing, 2014. – 108 с.
  110. R. Baskaran,M. S. Saleem Basha and A. Balasubramanian. Two Tier Security Framework for Service Oriented Systems. – М.: LAP Lambert Academic Publishing, 2012. – 176 с.
  111. Zheng Liu,Xue Li and Zhaoyang Dong. Improvements on Data Security Algorithms for Streaming Multimedia. – М.: LAP Lambert Academic Publishing, 2012. – 240 с.
  112. Djamel DJENOURI and Nadjib BADACHE. Security in Mobile Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 212 с.
  113. Natarajan Meghanathan,DeShante C. Johnson and Alexander R. Geoghegan. An Analysis of Software Security Attacks and Mitigation Controls. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  114. Britto R. Kumar and Albert S. Rabara. An Architecture for Secure Mobile Payment System using PKI. – М.: LAP Lambert Academic Publishing, 2013. – 184 с.
  115. Dimitrios Papadopoulos and Bernhard Hammerli. Positioning the roles, interfaces & processes in the InfoSec scene. – М.: LAP Lambert Academic Publishing, 2014. – 168 с.
  116. Gunasekar Kumar and Anirudh Chelikani. Analysis of Security Issues in Cloud Based E-Learning. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  117. Davoud Mougouei and Man Kwan Yeung. Requirement Engineering for Intrusion Tolerant Systems. – М.: LAP Lambert Academic Publishing, 2013. – 104 с.
  118. Oluwafemi Osho and Victor Waziri. Conceptual Models and Simulation of Computer Worm Propagation. – М.: LAP Lambert Academic Publishing, 2013. – 116 с.
  119. Musharrif Hussain and Sulman Mahmood. Secure Software and Comm. on Handheld Devices. – М.: LAP Lambert Academic Publishing, 2011. – 60 с.
  120. Stephen Murove,S. B. Mangena and B. Jones. Firewall Evaluation:Models for Major Decisions in Computer Security. – М.: LAP Lambert Academic Publishing, 2014. – 236 с.
  121. Nadeem Ahmed and Muhammad Hamayun. Evaluating Windows Communication Foundation (WCF) 4.0. – М.: LAP Lambert Academic Publishing, 2010. – 148 с.
  122. Kerem Beygo and Cihan Eraslan. Enhancing Security and Usability Features of NFC. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  123. Sachin Tripathi and Gosta Pada Biswas. Enhancements on Internet Applications. – М.: LAP Lambert Academic Publishing, 2011. – 148 с.
  124. Sara Jeza Alotaibi,David Argles and Mike Wald. FingerID. – М.: LAP Lambert Academic Publishing, 2011. – 152 с.
  125. Getachew Shambel and Chanyalew Seyum. Review of Food Security status and Cooping Mechanisms in Ethiopia. – М.: LAP Lambert Academic Publishing, 2011. – 360 с.
  126. Shivaji S. Ambhore and Suwarna J. Choudhary. India’s Trade Relations with European Union. – М.: LAP Lambert Academic Publishing, 2014. – 240 с.
  127. Irfan Ahmed,Rana Khurram Shahzad and Akmal Shahzad. Emerging Trends in Financial Markets Integration. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  128. Deepak Bhagat and B. K. Barooah. Consumers Perceived Value and Satisfaction. – М.: LAP Lambert Academic Publishing, 2011. – 88 с.
  129. Corinne A. D. Patrick and Betty M. E. Liz Ross. Challenges for Women in the 21st Century. – М.: LAP Lambert Academic Publishing, 2013. – 60 с.
  130. Nurul Nazlia Jamil and Sherliza Puat Nelson. Audit Committee's Effectiveness and Financial Reporting Quality. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  131. Temesgen Gebregziabher. Quality, Satisfaction and Repurchase Intention. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  132. Thanawin Ratametha and Manasa Veeragandam. CRM: Software as a Service versus On-premise - benefits and drawbacks. – М.: LAP Lambert Academic Publishing, 2010. – 100 с.
  133. Hossein Safarzadeh and Maryam Hashemi Fesharaki. Corporate social responsibility. – М.: LAP Lambert Academic Publishing, 2011. – 112 с.
  134. Swapna Bhargavi Gantasala,Prabhakar Venugopal Gantasala and Krishna Naik Chanda Naik Gari. SERVQUAL in RETAILING. – М.: LAP Lambert Academic Publishing, 2012. – 324 с.
  135. Mahjabeen Mushtaq Butt and Zainab Ijaz. The Impact Of WTO Quality Standards On The Horticulture Sector. – М.: LAP Lambert Academic Publishing, 2011. – 116 с.
  136. Nisha Tamta and Ashwini Arya. Modelling of Facts Controllers in Power System Networks. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  137. Nureddin Abulgasem,Dzulkifli Mohamad and Siti Zaiton Hashim. Libyan vehicle license plate detection and recognition using RBF. – М.: LAP Lambert Academic Publishing, 2013. – 140 с.
  138. Radi Al Atoum and Radi Al Atoum. Radi Dollar Account. – М.: LAP Lambert Academic Publishing, 2012. – 256 с.
  139. Sanya Austin Olowoyo and Tareef Hayat Khan. The Effects of Culture on Non-Occupancy in Public Housing. – М.: LAP Lambert Academic Publishing, 2013. – 88 с.
  140. Sirar Salih and Noureddine Bouhmala. Multilevel Techniques for solving the Satisfiability Problem. – М.: , 2012. – 124 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Наука человековедения. интервью с Д. Уолтоном, профессором London Metropolitan University, экспертом CIPD. Chartered Institute of Personnel and Development, автором программы Master of Arts in Human Resource Strategies. И. Смирнова, "Кадровый менеджмент", № 5, июль-август 2007.
  2. Специализированный модуль FS-CD. Collections and Disbursements - "Сборы и Выплаты" и его возможности. О.А. Глущенко, "Финансовый менеджмент в страховой компании", № 2, II квартал 2007.
  3. Бюджетирование страховой компании на базе Oracle Enterprise Planning and Budgeting. Д.В. Лесоводский, "Финансовый менеджмент в страховой компании", № 3, III квартал 2006.
  4. Регулирование операций торгового финансирования: новые инициативы. интервью с Д. Шмандом, вице-председателем Банковской комиссии ICC по supply chain finance, главой подразделения Trade Finance and Cash Management Corporates EMEA в Global Transaction Banking. GTB division Deutsche Bank. Н. Макарова, "Международные банковские операции", N 2, апрель-июнь 2012 г.
  5. Ужин в темноте в стиле Малевича и Новый год в Хаммере". Что может выть лучше?". интервью с Н. Саниной, индивидуальным предпринимателем и креативным директором компании "San and stars". М. Сипатова, "Арсенал предпринимателя", N 12, декабрь 2011 г.
  6. На пути к новому стандарту в торговом финансировании. интервью с А.  Кастерманом, руководителем Trade and Supply Chain, SWIFT, сопредседателем рабочей группы ICC-BPO. Э. Шакирова, "Международные банковские операции", N 4, октябрь-декабрь 2011 г.
  7. Уильям Савадж: Мотивировать людей в Нижнем Новгороде и Новосибирске нужно по-разному". интервью с У. Саваджем, вице-президентом корпорации Intel, подразделение Software and Services Group. М. Холкина, "Управление персоналом", N 14, июль 2010 г.
  8. Цены под контролем: the present and the future. С. Стройкова, И. Леметюйнен, "Консультант", № 19, сентябрь 2009.

Образцы работ

Тема и предметТип и объем работы
Многостороннее регулирование внешней торговли
Международные экономические отношения
Диплом
154 стр.
Последствия операции НАТО
Политология
Диплом
80 стр.
Гражданско-правовое положение обществ с ограниченной ответственностью по законодательству РФ
Гражданское право
Дипломный проект
80 стр.
Математические модели океанических течений
Переводоведение (теория перевода)
Курсовая работа
42 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Гарма
Курсовую приняли защитил успешно. Огромное Вам спасибо за помощь!