Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Hans Raj,P. C. Gupta and Gianetan Singh Sekhon. Security Issues,Aspects & Domain Based Security for Mobile Agents. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.

Дополнительные результаты

  1. Wireless Communications and Applications: First International Conference, ICWCA 2011, Sanya, China, August 1-3, 2011, Revised Selected Papers (Lecture ... and Telecommunications Engineering). – М.: , 2012. – 468 с.
  2. Security and Privacy in Mobile Information and Communication Systems: Third International ICST Conference, MOBISEC 2011, Aalborg, Denmark, May 17-19, ... and Telecommunications Engineering). – М.: , 2012. – 195 с.
  3. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с.
  4. Medical Content-Based Retrieval for Clinical Decision Support: Second MICCAI International Workshop, MCBR-CDS 2011, Toronto, Canada, September 22, ... Vision, Pattern Recognition, and Graphics). – М.: , 2012. – 163 с.
  5. Debbie J. Goodman. Enforcing Ethics: A Scenario-Based Workbook for Police and Corrections Recruits, Officers and Supervisors, Second Edition. – М.: , 0. – 0 с.
  6. International Labour Office. World Labour Report 2000 : Income Security and Social Protection in a Changing World. – М.: , 0. – 0 с.
  7. Kurt Frantzen. Risk-Based Analysis for Environmental Managers. – М.: , 0. – 0 с.
  8. George S Faigen, Boris Fridman, Arielle Emmett. Wireless Data for the Enterprise. – М.: , 0. – 0 с.
  9. Steve Purser. A Practical Guide to Managing Information Security (Artech House Technology Management Library). – М.: , 0. – 0 с.
  10. HAROLD L. LUSTIG. 4 Steps to Financial Security for Lesbian and Gay Couples. – М.: , 0. – 0 с.
  11. Helen L. Burz, Kit Marshall. Performance-Based Curriculum for Social Studies: From Knowing to Showing (Burz, Helen L. from Knowing to Showing.). – М.: , 0. – 0 с.
  12. Helen L. Burz, Kit Marshall. Performance-Based Curriculum for Science: From Knowing to Showing (Burz, Helen L. from Knowing to Showing.). – М.: , 0. – 0 с.
  13. Vesna Hassler. Security Fundamentals for E-Commerce (Artech House Computer Security Series). – М.: , 0. – 0 с.
  14. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с.
  15. Pension Security in the 21st Century: Redrawing the Public-Private Debate. – М.: , 2004. – 0 с.
  16. Beyond the Basics: Research-Based Rules for Internet Retailing Advantage. – М.: , 2005. – 0 с.
  17. Advances in Security and Payment Methods for Mobile Commerce. – М.: , 2004. – 0 с.
  18. Ron Ben Natan. Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase. – М.: , 2005. – 432 с.
  19. Ernst & Young LLP, Jan Babiak, John Butters, Mark W. Doll. Defending the Digital Frontier: Practical Security for Management, 2nd Edition. – М.: , 2004. – 253 с.
  20. Paul Edwards, Sarah Edwards, Peter Economy. Home-Based Business For Dummies (For Dummies (Business & Personal Finance)). – М.: , 2005. – 380 с.
  21. Patrick Traynor, Patrick McDaniel, Thomas La Porta. Security for Telecommunications Networks (Advances in Information Security). – М.: , 2008. – 182 с.
  22. Michael Erbschloe. Physical Security for IT. – М.: , 2010. – 256 с.
  23. Michael Erbschloe. Implementing Homeland Security for Enterprise IT. – М.: , 2010. – 299 с.
  24. Brent J. Bahnub. Activity–Based Management for Financial Institutions. – М.: , 2010. – 224 с.
  25. Aaron Strout. Location Based Marketing For Dummies®. – М.: , 2011. – 360 с.
  26. Jennifer B Freeman, Abbe Marrs Garcia. Family Based Treatment for Young Children With OCD Therapist Guide (Treatments That Work). – М.: , 2008. – 208 с.
  27. Martin ; Smith. Paediatric Neurosurgery for Nurses: Evidence-based care for children and their families. – М.: , 2008. – 272 с.
  28. Evidence–Based Design for Multiple Building Types. – М.: , 2009. – 288 с.
  29. Dan Forsberg, Gunther Horn, Wolf-Dietrich Moeller, Valtteri Niemi. LTE Security. – М.: John Wiley and Sons, Ltd, 2010. – 304 с.
  30. Peter Braun. Mobile Agents. – М.: , 2010. – 464 с.
  31. Ronen Barzel. Physically-Based Modeling for Computer Graphics. – М.: , 2010. – 334 с.
  32. Derrick Rountree. Security for Microsoft Windows System Administrators. – М.: , 2010. – 400 с.
  33. Mohammed Al-Mualla. Video Coding for Mobile Communications. – М.: , 2010. – 225 с.
  34. J. Robertson. Carbon-Based Materials for Micoelectronics,86. – М.: , 2010. – 0 с.
  35. Laura P Roerden. Net Lessons – Web–Based Projects for your Classroom. – М.: , 1997. – 306 с.
  36. Frank T Leighton. Complexity Issues in VLSI – Optimal Layouts for the Shuffle–Exchange Graph & Other Networks. – М.: , 2003. – 156 с.
  37. N Ayache. Artificial Vision for Mobile Robots – Stereo Vision & Multisensory Perception. – М.: , 1991. – 362 с.
  38. Dr. Yi–Bing Lin. Charging for Mobile All–IP Telecommunications. – М.: , 1987. – 176 с.
  39. Paul Edwards. Home–Based Business For Dummies®. – М.: , 2000. – 384 с.
  40. Paul Edwards. Home–Based Business For Dummies®. – М.: , 2010. – 384 с.
  41. Douglas T. Hicks. Activity–Based Costing for Small and Mid–Sized Businesses. – М.: , 1997. – 328 с.
  42. Microsoft Official Academic Course. 70–298 Designing Security for a Microsoft® Windows ServerTM 2003 Network Package. – М.: , 2005. – 744 с.
  43. Jiannong Cao. Mobile Agents in Networking and Distributed Computing. – М.: , 2012. – 450 с.
  44. J. G. Anderson. Beginning Flash Development for Mobile Devices. – М.: , 2011. – 304 с.
  45. Shona Kallestrup. Art and Design in Romania, 1866 – 1927 – Local and International Aspects of the Search for National Expression. – М.: , 2007. – 320 с.
  46. Terry Bernstein. Internet Security for Business. – М.: , 1996. – 464 с.
  47. Dr. Silke Holtmanns. Cellular Authentication for Mobile and Internet Services. – М.: , 2008. – 212 с.
  48. Alan Derickson. Health Security for All – Dreams of Universal Health Care in America. – М.: , 2005. – 256 с.
  49. U SCHENDEL. Schendel: Sparse ?matrices? – Numerical Aspects Wi Th Applications For Scientists & Engineers. – М.: , 1988. – 124 с.
  50. Roberta Bragg. MCSE Self–Paced Training Kit (Exam 70–298) – Designing Security for a Microsoft Windows Server 2003 Network. – М.: , 2004. – 864 с.
  51. Ed Robinson. Security for Microsoft Visual Basic .NET. – М.: , 2003. – 416 с.
  52. Andy Wigley. Building Microsoft ASP.NET Applications for Mobile Devices 2e. – М.: , 2003. – 720 с.
  53. Sanam S Haghighi. Energy Security. – М.: , 2011. – 510 с.
  54. Ulrich Lang. CORBA Security for Distributed Application Development. – М.: , 2000. – 400 с.
  55. R Langlands. Base Change for Gl2 (Paper). – М.: , 1992. – 248 с.
  56. Citrix® Access Suite Security For It Administrators. – М.: , 2011. – 268 с.
  57. Praveena Chaturvedi. Mobile Agent Technology & its Applications. – М.: LAP Lambert Academic Publishing, 2014. – 160 с.
  58. Hatem Alismail. Visual Odometry for Mobile Robots. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  59. Arindam Sarkar and J. K. Mandal. Artificial Neural Network Guided Secured Communication Techniques. – М.: LAP Lambert Academic Publishing, 2012. – 128 с.
  60. Levente Tamas. Sensor Fusion Based Position Estimation for Mobile Robots. – М.: LAP Lambert Academic Publishing, 2012. – 144 с.
  61. Sarah Alhumoud. The Dynamic Counter-Based Broadcast for Mobile Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2013. – 128 с.
  62. Abdinasir Hassan Ali. Wireless security Handbook 2011. – М.: LAP Lambert Academic Publishing, 2011. – 124 с.
  63. Manoj Kollam. A Low-cost Embedded Smart Car Security And Theft Control System. – М.: LAP Lambert Academic Publishing, 2011. – 84 с.
  64. Ashish Khare. Wavelet Transform Based Techniques for Denoising of Medical Images. – М.: LAP Lambert Academic Publishing, 2010. – 180 с.
  65. Alaa K. Farhan. Security Protocol for Mobile Data. – М.: LAP Lambert Academic Publishing, 2013. – 116 с.
  66. Abdurahman Nour,Hernawati Lahading and Rosli Yunus. Chitosan Based Adsorbent for Removal of Oil from Industrial Wastewater. – М.: LAP Lambert Academic Publishing, 2011. – 128 с.
  67. Ritu Verma. Integrative Paradigm for Mobility in a 3rd World Megacity - Bangalore. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  68. Fahmi Ahmed. African Peace & Security Architecture. – М.: LAP Lambert Academic Publishing, 2011. – 96 с.
  69. Yurii Bugai. The Role of Interest Groups in Shaping Ukraine's Energy Security. – М.: LAP Lambert Academic Publishing, 2013. – 152 с.
  70. vanshika sethi,Swati Mishra and Rashmi Tiwari. Evidence Based Physiotherapy For Stroke Patients. – М.: LAP Lambert Academic Publishing, 2013. – 84 с.
  71. Jorge Caiado. Classification and clustering of time series. – М.: LAP Lambert Academic Publishing, 2010. – 208 с.
  72. Zhaoxin Wan. Flocking for Multi-Agent Dynamical Systems. – М.: LAP Lambert Academic Publishing, 2012. – 116 с.
  73. Natania Locke. Aspects of Traditional Securitisation in South African Law. – М.: LAP Lambert Academic Publishing, 2010. – 416 с.
  74. Jana Chihai. Community-based Services For Patients With Psychiatric Disorders. – М.: LAP Lambert Academic Publishing, 2013. – 244 с.
  75. Mueen Uddin. Integration of Web Services & Mobile Agents in Distributed Systems. – М.: LAP Lambert Academic Publishing, 2011. – 76 с.
  76. Sandeep Kr. Agarwal and Dr. K. V. Arya. Security in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  77. Prasad Lokulwar,Vivek Shelkhe and Mangesh Ghonge. Security Aware Routing protocol for MANET. – М.: LAP Lambert Academic Publishing, 2012. – 84 с.
  78. E.A.Mary Anita. Securing Multicast Routing Protocols for Mobile Adhoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  79. Abbas Mehdizadeh Zare Anari and Ayyoub Akbari Moghanjoughi. Route optimization security in mobile IPv6 networks. – М.: LAP Lambert Academic Publishing, 2012. – 116 с.
  80. Hamid Reza Barzegar,Mahdiyeh Barzegar and Neshat Alidad. Energy Efficient And Secured Communication For Manets In Military. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  81. Prapti Mankad,Shuchi Modi and Hardik Joshi. Seamless Wi-Fi Offloading For Mobile Applications. – М.: LAP Lambert Academic Publishing, 2013. – 112 с.
  82. Vinothkumar Jambulingam. Secure and Anonymous Routing for Mobile Adhoc Networks. – М.: LAP Lambert Academic Publishing, 2014. – 72 с.
  83. Seyi Osunade. Java-Based Mobile Agent Systems. – М.: LAP Lambert Academic Publishing, 2012. – 156 с.
  84. Ming-Chin Chuang. Resource and Mobility Management Issues in LTE-A Networks. – М.: Scholars' Press, 2014. – 56 с.
  85. Olusegun Ojesanmi,Timothy Oyebisi and Adesola Aderounmu. Congestion Control Scheme for Mobile Communication Network. – М.: LAP Lambert Academic Publishing, 2012. – 156 с.
  86. K. Shaila and K. R. Venugopal. Secure Data Communication in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2014. – 240 с.
  87. Heena Mittal and Gurpreet Singh. Security of Mobile Agents in Distributed Computing. – М.: LAP Lambert Academic Publishing, 2014. – 80 с.
  88. Richa Mahajan,Gurpreet Singh and Rahul Hans. Fault Tolerance of Mobile Agent Systems in Distributed Computing. – М.: LAP Lambert Academic Publishing, 2014. – 76 с.
  89. Gulshan Kumar. Effective Intrusion Detection using Feature Selection. – М.: LAP Lambert Academic Publishing, 2014. – 92 с.
  90. Nitin K. Mishra and Sumit Dhariwal. Security in Mobile Ad-Hoc Networks. – М.: LAP Lambert Academic Publishing, 2014. – 72 с.
  91. kalyani chalamalasetty. Architecture for IMS Security to Mobile:. – М.: LAP Lambert Academic Publishing, 2010. – 60 с.
  92. Mueen Uddin. Dynamic Multi Layer Signature based IDS System using Mobile Agents. – М.: LAP Lambert Academic Publishing, 2011. – 72 с.
  93. Srikanthreddy Arimanda and Manojkumar Kolli. Performance Study Of Security Mechanismsm For Mobile Agent Domain. – М.: LAP Lambert Academic Publishing, 2011. – 84 с.
  94. Nuno Lopes. An Adjustable QoS-aware Architecture for Mobile Internet. – М.: LAP Lambert Academic Publishing, 2012. – 236 с.
  95. Vinothkumar Jambulingam. Highly consistent and secured data delivery for mobile ad-hoc networks. – М.: LAP Lambert Academic Publishing, 2014. – 76 с.
  96. Marimuthu Kanagaraj and Eswari Venkatachalam. Multifactor Authentication Protocol for a Secured WSN. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  97. Zheng Liu,Xue Li and Zhaoyang Dong. Improvements on Data Security Algorithms for Streaming Multimedia. – М.: LAP Lambert Academic Publishing, 2012. – 240 с.
  98. Saja Taha Ahmed and Loay E. George. SMS Encryption Using RC4 with Dynamic Key Based on Android. – М.: LAP Lambert Academic Publishing, 2015. – 108 с.
  99. Soke Onyemelukwe. On-Demand Routing and Security in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2013. – 128 с.
  100. Wei Ren. Lightweight and Robust Security for Applications in Internet of Things. – М.: LAP Lambert Academic Publishing, 2013. – 188 с.
  101. Venkatesh Jaganathan,Sangheethaa sukumaran and Arun Korath. Reputation Based Routing Protocol Using Mobile Agents In Manets. – М.: LAP Lambert Academic Publishing, 2013. – 108 с.
  102. Amal Al Dweik. Fault tolerance of mobile agents. – М.: LAP Lambert Academic Publishing, 2012. – 268 с.
  103. Britto R. Kumar and Albert S. Rabara. An Architecture for Secure Mobile Payment System using PKI. – М.: LAP Lambert Academic Publishing, 2013. – 184 с.
  104. Hazim Abed,Alicia Tang and Zaihisma Cob. An Ontology-Based Framework For Information Integration In Education. – М.: LAP Lambert Academic Publishing, 2014. – 116 с.
  105. D. Maheswari Maheshlenin and V. Radha. Compound Image Segmentation and Compression for Secure Transmission. – М.: LAP Lambert Academic Publishing, 2012. – 240 с.
  106. Kefa Rabah. Mastering Securing ICT Infrastructure for Corporate Network. – М.: LAP Lambert Academic Publishing, 2014. – 360 с.
  107. Michele Schiano di Zenise. A User-Centric Solution for Mobile Identification. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  108. Gunasekar Kumar and Anirudh Chelikani. Analysis of Security Issues in Cloud Based E-Learning. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  109. Julien Shabani. Information Security for RFID Systems. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.
  110. Hans Raj,P. C. Gupta and Gianetan Singh Sekhon. Security Issues,Aspects & Domain Based Security for Mobile Agents. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  111. Abdeldjalil Khelassi. Distributed Case-Based Reasoning Classifier for Cardiac Arrhythmias. – М.: LAP Lambert Academic Publishing, 2012. – 112 с.
  112. Vishwas Patil,Rudrapatna Shyamasundar and Alessandro Mei. Access Control for a Collaborative, Distributed Business Environment. – М.: LAP Lambert Academic Publishing, 2012. – 220 с.
  113. Patrick D. Kihoza. ICT and Project Based Learning for Sustainable Conservation Education. – М.: LAP Lambert Academic Publishing, 2012. – 116 с.
  114. Benjamin Eze. Policy-based Data Sharing for Event-driven Services in B2B Networks. – М.: LAP Lambert Academic Publishing, 2011. – 148 с.
  115. Apoorva Kumar Singhal and Mohit Kumar. Security For ARM Based Embedded Systems. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  116. Magdy Shayboub A. Mahmoud. Intelligent Mobile Agents For Information Retrieval. – М.: Scholars' Press, 2014. – 456 с.
  117. Milan Senesi. Web systems security testing. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  118. Roula Karam. Multi-Providers Location-Based Services for Mobile-Tourism. – М.: LAP Lambert Academic Publishing, 2012. – 268 с.
  119. Nivethaa Shree and Latha Parthiban. Elliptic Curve Cryptography for Digital Signature Authentication. – М.: LAP Lambert Academic Publishing, 2013. – 60 с.
  120. M. Sarosh Umar,Zeba Khanam and Shagufta A. RFID Based System for Child Safety. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  121. Suneth Pathirana. A Fuzzy-Mathematical Model to Motion Detection with Monocular Vision. – М.: LAP Lambert Academic Publishing, 2015. – 156 с.
  122. Dirk Lessner. Network Security for Embedded Systems. – М.: LAP Lambert Academic Publishing, 2009. – 232 с.
  123. Nidhi Krail and Vishal Gupta. Domain Based Classification For Punjabi Text Documents. – М.: LAP Lambert Academic Publishing, 2014. – 112 с.
  124. Bijan Soleymani. Social Authentication for Mobile Phones. – М.: LAP Lambert Academic Publishing, 2010. – 100 с.
  125. Mayank Keshariya. Policy Based Management Framework for Mobile Networks. – М.: LAP Lambert Academic Publishing, 2011. – 268 с.
  126. Noor Ul Amin. Secure MANET Communication Based on Hybrid Cryptosystem. – М.: LAP Lambert Academic Publishing, 2013. – 64 с.
  127. Mela Ali and Loay George. A Spatial Invarient Model for Local Attributes of Fingerprint Ridges. – М.: LAP Lambert Academic Publishing, 2013. – 152 с.
  128. Sathish Kumar. Intrusion Detection and Response Techniques for Mobile Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 200 с.
  129. Jingchun Yin. Robust Localization and Mapping for Mobile Robotic Navigation. – М.: LAP Lambert Academic Publishing, 2014. – 132 с.
  130. Abdus Salam Khan. Knowledge Acquisition for Case-Based Reasoning. – М.: LAP Lambert Academic Publishing, 2010. – 252 с.
  131. Moez Krichen. Model Based Testing for Real-Time Systems. – М.: LAP Lambert Academic Publishing, 2010. – 192 с.
  132. Tadeusz Struk. Elliptic Curve Cryptography as suitable solution for mobile devices. – М.: LAP Lambert Academic Publishing, 2010. – 88 с.
  133. Ibrahim Moawad. A Framework for Multi-agent Diagnosis System. – М.: LAP Lambert Academic Publishing, 2011. – 168 с.
  134. Chandran Velmurugan and M. Kannan. Nambatya Prosscoviainternet Based Resources for School Libraries. – М.: LAP Lambert Academic Publishing, 2014. – 152 с.
  135. Haneen Qarabash. An Intranet Based System For Securities Trading. – М.: LAP Lambert Academic Publishing, 2013. – 84 с.
  136. Chukwuemeka Ifegwu Eke. Global System for Mobile Communication and Urban Employment in Nigeria. – М.: LAP Lambert Academic Publishing, 2012. – 100 с.
  137. Bhawani Mishra. Food Security at the Household Level: A Case of Kailali District. – М.: LAP Lambert Academic Publishing, 2013. – 124 с.
  138. Tung-Feng Chuang. A Study of the Process Model for Mobile Base Station Dispute. – М.: LAP Lambert Academic Publishing, 2010. – 188 с.
  139. Theodore Smith. Developing a Competency-Based Curriculum for Online Instruction. – М.: Scholars' Press, 2014. – 216 с.
  140. Audu Jonathan Adoga and Fredah I. Agbeje. Introduction to Internet Security for PHP Web Developers. – М.: , 2014. – 52 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Нюансы управления офисным perpetuum mobile. В. Богданов, "Консультант", № 11, июнь 2007.
  2. Mobile Клиент - простота и эффективность сегодняшнего дня. С. Мастеренко, "Банковское дело в Москве", № 4, апрель 2006.
  3. Учет и калькулирование затрат по функциям. Метод АВС. Activity-Based Costing. М.К. Ерижев, "Новое в бухгалтерском учете и отчетности", № 19, октябрь 2003.
  4. Обеспечение безопасности PIN-Based операций с банковскими картами. С.В.  Серебряков, "Расчеты и операционная работа в коммерческом банке", N 2, март-апрель 2012 г.
  5. Risk-based pricing: посткризисные тенденции. А.В. Гидулян, "Банковское кредитование", N 1, январь-февраль 2012 г.
  6. Мы можем управлять собственными мыслями. интервью с С. Харитоновым, врачом-психотерапевтом, психиатором, кандидатом медицинских наук, старшим научным сотрудником Московского НИИ психиатрии Росздрава РФ, членом-корреспондентом Международной академии наук. МАНЭБ, членом Британского общества когнитивных и поведенческих психотерапевтов. Membership British Association for Behavioural & Cognitive Psychoterapies / BABCP. Ф. Кульпин, "Управление персоналом", N 8, апрель 2011 г.
  7. Иностранные работники - perpetuum mobile российского законодательства. А. А. Курушин, "В курсе правового дела", N 4, февраль 2011 г.
  8. Зачетная реструктуризация долга: институт DEBT-FOR-EQUITY SWAP в России". интервью с М. Григорьевым, старшим юристом корпоративной практики юридической фирмы "Вегас-Лекс". О. Бодрягина, "эж-ЮРИСТ", № 3, январь 2010.
  9. Управление проектами при подборе персонала. PM for HR. Е. Кривов, "Кадровик. Рекрутинг для кадровика", № 9, сентябрь 2008.
  10. Арбитражное дело "AKAI ELECTRIC" и "PHENOMENON AGENTS" VS. Роспатент. Е. Н. Трикоз, "Арбитражное правосудие в России", № 9, сентябрь 2008.

Образцы работ

Тема и предметТип и объем работы
Порядок разработки, проектирования системы стратегического менеджмента
Менеджмент
Диплом
100 стр.
Проблемы стратегического менеджмента в организации
Менеджмент
Диплом
80 стр.
Последствия операции НАТО
Политология
Диплом
80 стр.
Разработка рекомендаций по эффективному использованию зарубежного опыта реализации прогрессивных систем и методов менеджмента на предприятии
Стратегический менеджмент
Диплом
150 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Надежда (Москва)
Добрый день, Ирина. Большое спасибо за консультацию. Надеюсь все будут Отлично.Еще раз спасибо.