Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Doug Howard, Kevin Prince. Security 2020: Reduce Security Risks This Decade. – М.: Wiley, 2010. – 336 с.

Дополнительные результаты

  1. Jerome L. Stein. Stochastic Optimal Control and the U.S. Financial Debt Crisis. – М.: , 2012. – 173 с.
  2. Victoria A. Greenfield, Henry H. Willis, Tom LaTourrette. Assessing the Benefits of U.S. Customs and Border Protection Regulatory Actions to Reduce Terrorism Risks. – М.: , 2012. – 158 с.
  3. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с.
  4. Amanda Kay McVety. Enlightened Aid: U.S. Development as Foreign Policy in Ethiopia. – М.: , 2012. – 312 с.
  5. Anupam Ghosh. Information Sharing in Supply Chain: The Role of Governance Mechanisms. – М.: , 2012. – 152 с.
  6. Richard Lehman, Lawrence G. McMillan. New Insights on Covered Call Writing: The Powerful Technique That Enhances Return and Lowers Risk in Stock Investing. – М.: , 0. – 0 с.
  7. Julian Walmsley. International Money and Foreign Exchange Markets : An Introduction. – М.: , 0. – 0 с.
  8. Marilyn Greenstein, Todd M. Feinman. Electronic Commerce: Security Risk Management and Control. – М.: , 0. – 0 с.
  9. Miichael Neugart, Klaus Schsmann. Forecasting Labour Markets in Oecd Countries: Measuring and Tackling Mismatches (Labour Markets and Employment Policy Series). – М.: , 0. – 0 с.
  10. Martin Feldstein. Economic and Financial Crises in Emerging Market Economies (Nber Conference Report). – М.: , 0. – 0 с.
  11. Peter B. Kenen. The International Financial Architecture: What's New? What's Missing. – М.: , 0. – 0 с.
  12. Tsuneo Akaha. Politics and Economics in the Russian Far East: Changing Ties With Asia-Pacific. – М.: , 0. – 0 с.
  13. Risk Management, Speculation, and Derivative Securities. – М.: , 0. – 0 с.
  14. Terrell Ward Bynum, Simon Rogerson, Blackwell Pub. Computer Ethics and Professional Responsibility: Introductory Text and Readings. – М.: , 0. – 0 с.
  15. Anthony Baron, Suzanne Hoffman, James G. Merrill. When Work Equals Life : The Next Stage of Workplace Violence. – М.: , 0. – 0 с.
  16. Christina E. Newhill. Client Violence in Social Work Practice: Prevention, Intervention, and Research. – М.: , 0. – 0 с.
  17. Karen Ginsburg Wood. Don't Sabotage Your Success! Make Office Politics Work. – М.: , 0. – 0 с.
  18. Gerald Kovacich. The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition. – М.: , 0. – 0 с.
  19. Protecting Business Information : A Manager's Guide. – М.: , 0. – 0 с.
  20. Bill Smith. Buy a Business Close to Home. – М.: , 0. – 0 с.
  21. Philip P. Purpura. The Security Handbook. – М.: , 0. – 0 с.
  22. Hana Polackova Brixi, Allen Schick. Government at Risk: Contingent Liabilities and Fiscal Risk. – М.: , 0. – 0 с.
  23. Ian Bannon, Paul Collier. Natural Resources and Violent Conflict: Options and Actions. – М.: , 0. – 0 с.
  24. W. Kip Viscusi. The Risks of Terrorism (Studies in Risk and Uncertainty, 15). – М.: , 0. – 0 с.
  25. Charles W. Smithson. Managing Financial Risk: A Guide to Derivative Products, Financial Engineering, and Value Maximization. – М.: McGraw-Hill, 1998. – 664 с.
  26. John Y. Campbell, Andrew W. Lo, A. Craig MacKinlay. The Econometrics of Financial Markets. – М.: Princeton University Press, 0. – 632 с.
  27. Brian Eales. Financial Engineering. – М.: , 0. – 0 с.
  28. Frank J. Fabozzi, Chuck Ramsey, Michael Marz. The Handbook of Nonagency Mortgage-Backed Securities, 2nd Edition. – М.: , 0. – 0 с.
  29. Peter J. Klein. Getting Started in Security Analysis. – М.: , 0. – 0 с.
  30. Jianping Mei, Hsien-Hsing Liao, Prof. Hsien-Hsing Liao. Asset Pricing. – М.: , 0. – 0 с.
  31. Rebecca Herold. The Privacy Papers: Managing Technology, Consumer, Employee and Legislative Actions. – М.: , 0. – 0 с.
  32. Mary Pat McCarthy, Stuart Campbell. Security Transformation: Digital Defense Strategies to Protect your Company's Reputation and Market Share. – М.: , 0. – 0 с.
  33. Rudolph C. Kimiecik. Loss Prevention Guide for Retail Businesses. – М.: , 0. – 0 с.
  34. Preventing Corporate Embezzlement. – М.: , 0. – 0 с.
  35. Steve Purser. A Practical Guide to Managing Information Security (Artech House Technology Management Library). – М.: , 0. – 0 с.
  36. Donn B. Parker. Fighting Computer Crime : A New Framework for Protecting Information. – М.: , 0. – 0 с.
  37. Office & Office Building Security. – М.: , 0. – 0 с.
  38. Ultimate Financial Security Survey. – М.: , 0. – 0 с.
  39. Christopher J. Alberts, Audrey J. Dorofee. Managing Information Security Risks: The OCTAVE Approach. – М.: , 0. – 0 с.
  40. Daniel Jennings, Joseph Boyce. Information Assurance. – М.: , 0. – 0 с.
  41. Silver Lake Editors, Silver Lake Editors. Protect Yourself!: Using Insurance, Personal Security and Common Sense to Keep Your Family, Things and Body Safe. – М.: , 0. – 0 с.
  42. I. Kooijman, Jaap Kooijman. And the Pursuit of National Health.The Incremental Strategy Toward National Health Insurance in the United States of America.(Amsterdam Monographs in American Studies 8). – М.: , 0. – 0 с.
  43. Wendy Bliss. Legal, Effective References: How to Give and Get Them. – М.: , 0. – 0 с.
  44. Oded Goldreich. Foundations of Cryptography: Basic Tools. – М.: , 0. – 0 с.
  45. Charles Carrington, Timothy Speed, Juanita Ellis, Steffano Korper. Enterprise Directory and Security Implementation Guide: Designing and Implementing Directories in Your Organization (The Korper and Ellis E-Commerce Books Series). – М.: , 0. – 0 с.
  46. C. Warren Axelrod, Axelrod. Outsourcing Information Security. – М.: , 0. – 0 с.
  47. Anup K. Ghosh. E-Commerce Security and Privacy. – М.: , 0. – 0 с.
  48. Debra Cameron. The World Wide Web: Strategies and Opportunities for Business. – М.: , 0. – 0 с.
  49. W. E. Perry, J. Kuong. Edp Risk Analysis and Controls Justification (Enterprise Protection, Control, Audit, Security, Risk Management and busineSs Continuity). – М.: , 0. – 0 с.
  50. Gene Tidrick. China: An Evaluation of World Bank Assistance (Operations Evaluation Study). – М.: , 2005. – 0 с.
  51. Maxx Dilley. Natural Disaster Hotspots: A Global Risk Analysis (Disaster Risk Management). – М.: , 2005. – 0 с.
  52. Christopher A. Crayton. Security + Exam Guide (Testtaker's Guide Series). – М.: , 2003. – 0 с.
  53. Post-Conflict Economies in Africa (International Economic Association). – М.: , 2005. – 0 с.
  54. Carol Matheson Connell. A Business in Risk : Jardine Matheson and the Hong Kong Trading Industry. – М.: , 2004. – 0 с.
  55. Hrishikesh (Rick) D Vinod. Preparing for the Worst : Incorporating Downside Risk in Stock Market Investments (Wiley Series in Probability and Statistics). – М.: , 2004. – 0 с.
  56. Nigel Nicholson. Traders: Risks, Decisions, and Management in Financial Markets. – М.: , 2004. – 0 с.
  57. Economics of Information Security (Advances in Information Security). – М.: , 2004. – 0 с.
  58. Sari Greene. Security Policies and Procedures : Principles and Practices (Security). – М.: , 2005. – 0 с.
  59. Ernest Jordan. Beating IT Risks. – М.: , 2005. – 0 с.
  60. Christopher G. Bauer. Better Ethics Now: How to Avoid the Ethics Disaster You Never Saw Coming. – М.: , 2005. – 0 с.
  61. Harry H. Panjer. Operational Risk : Modeling Analytics. – М.: Wiley-Interscience, 2006. – 448 с.
  62. Betty E. Biringer, Rudolph V. Matalucci, Sharon L. O'Connor. Security Risk Assessment and Management: A Professional Practice Guide for Protecting Buildings and Infrastructures. – М.: , 2007. – 384 с.
  63. The Handbook of Country Risk: A Guide to International Business and Trade. – М.: , 2007. – 462 с.
  64. Frank J. Fabozzi, Steven V. Mann. Securities Finance: Securities Lending and Repurchase Agreements (Frank J. Fabozzi Series). – М.: , 2005. – 351 с.
  65. Frank Vielba, Carol Vielba. Reducing the M&A Risks: The Role of IT in Mergers and Acquisitions. – М.: , 2006. – 216 с.
  66. Pat Choate. Dangerous Business: The Risks of Globalization for America. – М.: , 2008. – 288 с.
  67. Stephen Gough. Sustainability and Security within Liberal Societies: Learning to Live with the Future (Routledge Studies in Social and Political Thought). – М.: , 2008. – 148 с.
  68. Andy Walker. Windows Lockdown!: Your XP and Vista Guide Against Hacks, Attacks, and Other Internet Mayhem (Absolute Beginner's Guide). – М.: , 2008. – 480 с.
  69. Julian Talbot, Miles Jakeman. Security Risk Management Body of Knowledge (Wiley Series in Systems Engineering and Management). – М.: , 2009. – 445 с.
  70. The Risks of Prescription Drugs (A Columbia / SSRC Book (Privatization of Risk)). – М.: , 2010. – 128 с.
  71. Alan Calder, Steve G Watkins. Information Security Risk Management for ISO27001 / ISO27002. – М.: , 2010. – 198 с.
  72. Carl Young. Metrics and Methods for Security Risk Management. – М.: , 2010. – 296 с.
  73. Jeffrey C. Hooke. Security Analysis and Business Valuation on Wall Street + Companion Web Site: A Comprehensive Guide to Today's Valuation Methods. – М.: Wiley, 2010. – 408 с.
  74. Evan Wheeler. Security Risk Management: Building an Information Security Risk Management Program from the Ground Up. – М.: , 2011. – 360 с.
  75. The Risks of Prescription Drugs. – М.: Columbia University Press, 2010. – 184 с.
  76. Pensions, Social Security, and the Privatization of Risk (A Columbia / SSRC Book (Privatization of Risk)). – М.: , 2008. – 128 с.
  77. Dan Forsberg, Gunther Horn, Wolf-Dietrich Moeller, Valtteri Niemi. LTE Security. – М.: John Wiley and Sons, Ltd, 2010. – 304 с.
  78. Doug Howard, Kevin Prince. Security 2020: Reduce Security Risks This Decade. – М.: Wiley, 2010. – 336 с.
  79. Gregory A. Keoleian. Product Life Cycle Assessment to Reduce Health Risks and Environmental Impacts. – М.: , 2010. – 299 с.
  80. C Thomas Mitchell. User–Responsive Design – Reducing the Risk of Failure. – М.: , 2002. – 224 с.
  81. Comptia Security+ All-In-One Exam Guide, Second Edition (Exam Sy0-201). – М.: , 2011. – 0 с.
  82. Applied Oracle Security: Developing Secure Database And Middleware Environments. – М.: , 2011. – 640 с.
  83. Fundamentals Of Network Security. – М.: , 2011. – 672 с.
  84. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . –  с.
  85. Dave Tyson. Security Convergence: Managing Enterprise Security Risk. – М.: , 2007. – 232 с.
  86. Eduardo Fernandez-Buglioni. Security Patterns in Practice: Designing Secure Architectures Using Software Patterns. – М.: Wiley, 2013. – 582 с.
  87. George S. Oreku. ENHANCING E-COMMERCE SECURITY. – М.: LAP Lambert Academic Publishing, 2011. – 212 с.
  88. Govind Sharma and Manish Gupta. Secure routing in wireless mobile Ad-Hoc network. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  89. S.H.M. Fakhruddin,Mukand S. Babel and Akiyuki Kawasaki. A decision support framework for flood risk management. – М.: LAP Lambert Academic Publishing, 2012. – 100 с.
  90. Anand Kannan. Evaluation of the Security Mechanisms in Cloud Networks. – М.: LAP Lambert Academic Publishing, 2013. – 192 с.
  91. Divya Sharma and Kamal Kant. Embedded Linux Porting on ARM & RFID Implementation Using ARM SoC. – М.: LAP Lambert Academic Publishing, 2013. – 84 с.
  92. Ubaid Ur Rahman and Farhana Shahid. RFID Based Library Management System. – М.: LAP Lambert Academic Publishing, 2013. – 108 с.
  93. Enangha Abeng. A Hybrid Hash Message Authentication Code (HMAC). – М.: LAP Lambert Academic Publishing, 2011. – 204 с.
  94. Tommaso Giusti. Fire Risk Management for Valuable Contents in Historical Buildings. – М.: Scholars' Press, 2014. – 452 с.
  95. Xinquan Yang. Sport Sponsorship in China. – М.: LAP Lambert Academic Publishing, 2012. – 172 с.
  96. Frank Mbaaga. Perceived Sexual HIV Risks and Prevention. – М.: LAP Lambert Academic Publishing, 2013. – 396 с.
  97. Umar Shehu Usman. Politics, Youth And Thuggery In Developing Societies. – М.: LAP Lambert Academic Publishing, 2012. – 144 с.
  98. Ditte Hjorth Laursen. Reaching the (in)visible men of Vientiane. – М.: LAP Lambert Academic Publishing, 2012. – 128 с.
  99. Michael D. Sears. Torturing Terrorists for National Security Imperatives. – М.: LAP Lambert Academic Publishing, 2014. – 68 с.
  100. Ajit Kumar Paswan and Rakesh Kumar. Efficacy of separate and premix formulation of herbicides on weeds. – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  101. Ishrat Fatima,Badar Naseem Siddiqui and Kanwal Naeem. Rural Youth and Food Security. – М.: LAP Lambert Academic Publishing, 2014. – 112 с.
  102. Monica Kansiime Kagorora. Management practices for reducing climate-induced production risks. – М.: LAP Lambert Academic Publishing, 2014. – 148 с.
  103. Shailendra Bajpai and J. P. Gupta. Site Security. – М.: LAP Lambert Academic Publishing, 2011. – 88 с.
  104. Sreepada Hegde and Vijayalaxmi Hegde. Risk Management. – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  105. Rose Namayanja Nsereko. Parliamentary oversight of the security sector in Uganda. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  106. Katharina Leinius. An Imbalance between Security and Liberty?. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  107. Carter Newman. Countering Nuclear Proliferation. – М.: LAP Lambert Academic Publishing, 2011. – 64 с.
  108. Yurii Bugai. The Role of Interest Groups in Shaping Ukraine's Energy Security. – М.: LAP Lambert Academic Publishing, 2013. – 152 с.
  109. Carol Woody. Applying Security Risk Management to Internet Connectivity. – М.: LAP Lambert Academic Publishing, 2009. – 180 с.
  110. George X. Lapousis. School Physical Education And Risk Factors For Cardiovascular Diseases. – М.: LAP Lambert Academic Publishing, 2012. – 160 с.
  111. Faraz Fatemi Moghaddam. Secure Cloud Computing with Client-Based Control System. – М.: LAP Lambert Academic Publishing, 2013. – 100 с.
  112. Wiem Tounsi. Security and Privacy Controls in RFID Systems. – М.: LAP Lambert Academic Publishing, 2014. – 172 с.
  113. Elliot Attipoe. Securing the Public Wireless Network. – М.: LAP Lambert Academic Publishing, 2013. – 92 с.
  114. Zheng Liu,Xue Li and Zhaoyang Dong. Improvements on Data Security Algorithms for Streaming Multimedia. – М.: LAP Lambert Academic Publishing, 2012. – 240 с.
  115. Firkhan Ali Hamid Ali. Vulnerability Analysis on the Computer Network Security. – М.: LAP Lambert Academic Publishing, 2010. – 72 с.
  116. Amel Chowdhury. Deployment of a Secure VoIP System. – М.: LAP Lambert Academic Publishing, 2014. – 68 с.
  117. Amr Abdel-Hamid and Sofiene Tahar. Watermarking Techniques for Intellectual Property Protection in SOC. – М.: LAP Lambert Academic Publishing, 2012. – 128 с.
  118. Usman Habib. Secure Mobile Authentication for Linux Workstation log on. – М.: LAP Lambert Academic Publishing, 2011. – 120 с.
  119. Mitko Bogdanoski,Aleksandar Risteski and Marjan Bogdanoski. Cyber operations - a permanent part of the global conflict. – М.: LAP Lambert Academic Publishing, 2014. – 60 с.
  120. G.M. Faysal Ahmad. Design and Implementation of a Common System for Office Digitization. – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  121. Tanveer Zia. A Security Framework for Wireless Sensor Networks (WSN). – М.: LAP Lambert Academic Publishing, 2013. – 160 с.
  122. frankie tvrz and marijke coetzee. Information Security of a Bluetooth-enabled handheld device. – М.: LAP Lambert Academic Publishing, 2010. – 180 с.
  123. Amnesh Goel and Nidhi Chandra. Secure Image Archival Based on Image Encryption Technique. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  124. Nelly S. Medina. A Model for Direct Recording Electronic Voting Systems. – М.: LAP Lambert Academic Publishing, 2014. – 108 с.
  125. Muhammad Imran Tariq. SLA based Information Security Metrics in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2014. – 192 с.
  126. Bugra Karabey. Teorem. – М.: LAP Lambert Academic Publishing, 2012. – 116 с.
  127. Burcu Kulahc?oglu. Timed Automata as a Verification Tool for Security Protocols. – М.: LAP Lambert Academic Publishing, 2011. – 104 с.
  128. Kerem Beygo and Cihan Eraslan. Enhancing Security and Usability Features of NFC. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  129. Ramon Arigoni Ortiz. The Value of Reducing Mortality Risk Associated with Air Pollution. – М.: LAP Lambert Academic Publishing, 2010. – 280 с.
  130. Abdul Sattar. Risk Management In Islamic Banking. – М.: LAP Lambert Academic Publishing, 2011. – 96 с.
  131. Supreena Narayanan. Risk Arbitrage in U.S. Financial Markets. – М.: LAP Lambert Academic Publishing, 2012. – 48 с.
  132. Ozioma Michael Ejiofor. Implementation of Traffic Monitoring System in Developing Countries. – М.: LAP Lambert Academic Publishing, 2014. – 88 с.
  133. Ying Qian. Mitigating Information Security Risks during Operation Transition. – М.: LAP Lambert Academic Publishing, 2012. – 372 с.
  134. Prakash Metaparti. Risk Management initiatives for post 9/11 Maritime Security. – М.: LAP Lambert Academic Publishing, 2011. – 336 с.
  135. Chris Cubbage. Security Risk Management in Corporate Governance. – М.: LAP Lambert Academic Publishing, 2010. – 140 с.
  136. Erastus Muthura,Kithinji Mungania and Margaret Muthura. Determinants Of Loan Repayment In Group Lending. – М.: LAP Lambert Academic Publishing, 2013. – 72 с.
  137. Viacheslav Kulish. Credit Risk Management. – М.: LAP Lambert Academic Publishing, 2014. – 108 с.
  138. Asit Ranjan Mohanty. Risk Management and Capital Measurement in Commercial Banks. – М.: Scholars' Press, 2014. – 256 с.
  139. Cengizhan Kaptan. Credit Insurance and Risk Mitigation. – М.: LAP Lambert Academic Publishing, 2014. – 104 с.
  140. K. V. R. Satyakumar,K. Arjun Goud and G. Sree Vani. Security analysis & Portfolio Management. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Контроль реализации стратегии национальной безопасности Российской Федерации до 2020 года. Ю.А. Крохина, "Законодательство", № 3, март 2012 г.
  2. Risk-based pricing: посткризисные тенденции. А.В. Гидулян, "Банковское кредитование", N 1, январь-февраль 2012 г.
  3. О проекте долгосрочной Программы повышения эффективности исполнения судебных решений. 2011-2020 годы. В.М. Шерстюк, "Законодательство", N 11, ноябрь 2011 г.
  4. Стратегия-2020: богатые будут богаче. М. Хазин, О. Григорьев, "Консультант", N 21, ноябрь 2011 г.
  5. Развитие фармацевтической и медицинской промышленности РФ на период до 2020 года и дальнейшую перспективу. М.Р. Зарипова, "Аптека: бухгалтерский учет и налогообложение", N 1, январь 2011 г.
  6. К вопросу о реализации программы развития сестринского дела в Российской Федерации на 2010-2020 годы / И.С. Бахтина / Правовое обеспечение профессиональной деятельности среднего медицинского персонала: сб. науч. ст. Всерос. Науч.-практ. конф. /. С.-Петербург, 22-23 июня 2010. / под ред. Ю.Д. Сергеева. - Иваново, 2010.
  7. Кто вы, CHIEF RISK OFFICER. М. Уилкинсон, "Риск-менеджмент", № 9-10, сентябрь-октябрь 2008.
  8. Банки в 2020-м. С. Моисеев, "БДМ. Банки и деловой мир", № 9, сентябрь 2008.
  9. Комментарий к указаниям Центрального банка РФ от 04.06.2008 № 2017-У, от 04.06.2008 № 2018-У и от 04.06.2008 № 2020-У. "Консультант", № 16, август 2008.
  10. Концепция развития здравоохранения Российской Федерации до 2020.. Ф.Н. Кадыров, "Менеджер здравоохранения", № 8, август 2008.
  11. Комментарий к Указанию ЦБР от 4 июня 2008. № 2017-У, Указанию ЦБР от 4 июня 2008. № 2018-У и Указанию ЦБР от 4 июня 2008. № 2020-У. В.А. Лысых, "Нормативные акты для бухгалтера", № 14, июль 2008.
  12. Банки России до 2020 года: в русле оптимальной стратегии развития. Е.Е. Смирнов, "Регламентация банковских операций. Документы и комментарии", № 4, июль-август 2008.
  13. Задачи для концепции-2020. интервью с А. Вялковым, директором НИИ общественного здоровья и управления здравоохранением, академиком РАМН. М. Цуциев, "Бюджет", № 7, июль 2008.

Образцы работ

Тема и предметТип и объем работы
Топливно-энергетический комплекс России и проблемы регулирования его деятельности.
Экономика
Диплом
100 стр.
Последствия операции НАТО
Политология
Диплом
80 стр.
Платежные системы в Интернете
Информатика
Диплом
102 стр.
Формирование системы экономической безопасности на Белоярской АЭС
Психофизиология
Диплом
96 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Андрей
Спасибо большое, мы еще обратимся к вам по второй работе на следующий семестр (год).