Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Igor Botian. Software Security Vulnerabilities in Mobile Peer-to-peer Environment. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.

Дополнительные результаты

  1. Security and Privacy in Mobile Information and Communication Systems: Third International ICST Conference, MOBISEC 2011, Aalborg, Denmark, May 17-19, ... and Telecommunications Engineering). – М.: , 2012. – 195 с.
  2. Eseosa Obadiaru. The Global Financial Meltdown And The Nigerian Capital Market: Appraisal Of The Effect Of The Global Financial Meltdown On Security Values In The Nigerian Capital Market. – М.: , 2012. – 104 с.
  3. Larry Lankton, Larry D. Cradle to Grave Lankton. Beyond the Boundaries: Life and Landscape at the Lake Superior Copper Mines 1840-1875. – М.: , 0. – 0 с.
  4. Charles R. Hulten, Edwin Dean, Michael J. Harper, Conference on Research in Income and Wealth. New Developments in Productivity Analysis (Studies in Income and Wealth, Vol 63). – М.: , 0. – 0 с.
  5. James E. Post, Lee E. Preston, Sybille Sauter-Sachs. Redefining the Corporation: Stakeholder Management and Organizational Wealth. – М.: , 0. – 0 с.
  6. Peter Madlem, Larry D. Edwards. Power Investing With Basket Securities: The Investor's Guide to Exchange-Traded Funds. – М.: , 0. – 0 с.
  7. Ee-Peng Lim, Keng Siau. Advances in Mobile Commerce Technologies. – М.: , 0. – 0 с.
  8. Ray Ramon. Technology Solutions for Growing Businesses. – М.: , 0. – 0 с.
  9. Marko Nordquist. Towards Improved Security Management Practice: Designing an Organizational Model Procedure for the Implementation of Information Security Management in Heterogeneous Information Management. – М.: , 0. – 0 с.
  10. Mark Warda. How to Form a Corporation in Florida (How to Form a Corporation in Florida). – М.: , 0. – 0 с.
  11. Anup K. Ghosh. E-Commerce Security and Privacy. – М.: , 0. – 0 с.
  12. Gunjan Samtani, Marcus Healey, Shyam Samtani. B2B Integration: A Practical Guide to Collaborative E-Commerce. – М.: , 0. – 0 с.
  13. Climate Change And Global Food Security (Books in Soils, Plants, and the Environment). – М.: , 2005. – 0 с.
  14. Paul Petillo. Building Wealth in a Paycheck-to-Paycheck World. – М.: , 2004. – 0 с.
  15. Fundraising in Diverse Cultural and Giving Environments: New Directions for Philanthropic Fundraising, No. 37. – М.: , 2003. – 0 с.
  16. Aden Hogan. Infrastructure Security Planning in an Unstable World: : A Public Officials' Guide to Security. – М.: , 2005. – 0 с.
  17. Advances in Computers, Volume 60 : Information Security (Advances in Computers). – М.: , 2004. – 340 с.
  18. Tourism, Security and Safety: From Theory to Practice (The Management of Hospitality and Tourism Enterprises). – М.: , 2005. – 376 с.
  19. Jeanne Machado. Employment Opportunities in Education: How To Secure Your Career. – М.: , 2005. – 192 с.
  20. Stephen Gough. Sustainability and Security within Liberal Societies: Learning to Live with the Future (Routledge Studies in Social and Political Thought). – М.: , 2008. – 148 с.
  21. Transitions: Pathways Towards Sustainable Urban Development in Australia. – М.: , 2008. – 756 с.
  22. Sustainable Development in Small Island Developing States: Issues and Challenges (Economic Paper Series). – М.: , 2008. – 120 с.
  23. Pierre-laurent Chatain, Raul Hernandez-Coss, Kamil Borowik, Andrew Zerzan. Integrity in Mobile Phone Financial Services: Measures for Mitigating the Risks of Money Laundering and Terrorist Financing (World Bank Working Papers) (World Bank Working Papers). – М.: , 2008. – 76 с.
  24. Findlay Shearer. Power Management in Mobile Devices. – М.: , 2010. – 336 с.
  25. Ivan Vince. Major Accidents to the Environment. – М.: , 2010. – 320 с.
  26. Mineo Kimura. Electron Collisions with Molecules in Gases: Applications to Plasma Diagnostics and Modeling,44. – М.: , 2010. – 315 с.
  27. Ron J. Doyle. Microbial Growth in Biofilms, Part B: Special Environments and Physicochemical Aspects,337. – М.: , 2010. – 469 с.
  28. Paul Goransson. Secure Roaming in 802.11 Networks. – М.: , 2010. – 368 с.
  29. K Thalia Grant. Darwin in Galapagos – Footsteps to a New World. – М.: , 2009. – 416 с.
  30. Amitav Acharya. Reassessing Security Cooperation in the Asia– Pacific – Competition, Congruence, and Transformation. – М.: , 2007. – 288 с.
  31. Bruno Latour. Science in Action – How to Follow Scientists & Engineers Through Society (Paper). – М.: , 1988. – 282 с.
  32. B LATOUR. Latour: ?science? In Action – How To Follow Scient Ists & Engineers Through Society (cloth). – М.: , 1987. – 288 с.
  33. Stanley Fischer. Securing Peace in the Middle East – Project on Economic Transition. – М.: , 1994. – 208 с.
  34. Richard L. Ptak. Manager?s Guide to Distributed Environments. – М.: , 1998. – 368 с.
  35. P DEJOURS. Dejours: Comparative ?physiology? Of Envir Adaptat Ions– Adaptations To ?extreme? Environments. – М.: , 1987. – 232 с.
  36. Hardie Truesdale. Hudson River Journey – Images from Lake Tear in the Clouds to New York Harbor. – М.: , 2004. – 96 с.
  37. Charles Lipson. Doing Honest Work In College – How to Prepare Citations, Avoid Plagiarism, and Achieve Real Academic Success 2e. – М.: , 2008. – 260 с.
  38. MJ COMPUTER. Ball Data Processing In Medicine: How To Select A Computerized Hospital Information Systm. – М.: , 1973. – 0 с.
  39. Leaks in the Pipeline to Math, Science, and Technology Careers. – М.: , 2006. – 112 с.
  40. Kathleen R. Hopkins. Teaching How to Learn in a What–to–Learn Culture. – М.: , 2010. – 176 с.
  41. Daniel H Deudney. Bounding Power – Republican Security Theory from the Polis to the Global Village. – М.: , 2008. – 384 с.
  42. B FORST. Forst: Power In ?numbers? – How To Manage For Prof It. – М.: , 1987. – 258 с.
  43. Richard A Brealey. Security Prices in a Competitive Market – More About Risk & Return form Common Stocks. – М.: , 2003. – 246 с.
  44. Roderick. Finding Jobs in the Securities Industry: In Manage ment Consulting, Investment Banking, and Securitie s Trading. – М.: , 2000. – 256 с.
  45. Kaufman. A Key–Word–in–Context Concordance to Targum Neofiti. – М.: , 1993. – 1504 с.
  46. James Winter. Secure from Rash Assault – Sustaining the Victorian Environment. – М.: , 2002. – 354 с.
  47. L P Harvey. Muslims in Spain 1500 to 1614. – М.: , 2006. – 462 с.
  48. Beamish. Getting the Word Out in the Fight to Save the Earth. – М.: , 1995. – 200 с.
  49. Beamish. Getting the Word Out in the Fight to Save the Eart h. – М.: , 1995. – 0 с.
  50. BREALEY. Brealey: ?security? Prices In A Competitive Market – More About Risk & Return Fr Com Stocks. – М.: , 1971. – 0 с.
  51. Johnny Molloy. 50 Hikes in Alabama – Where to Find Perfect Shots and How to Take Them. – М.: , 2011. – 0 с.
  52. Pawan K Bhardwaj. A+. Network+, Security+ Exams in a Nutshell. – М.: , 2007. – 812 с.
  53. EP ECKHOLM. Eckholm Down To ?earth? – Environment And Human Needs. – М.: , 1983. – 254 с.
  54. Edwards. Medical Practice in the Current Health Care Environment. – М.: , 1994. – 280 с.
  55. Genserik L.L. Reniers. Multi–Plant Safety and Security Management in the Chemical and Process Industries. – М.: , 2010. – 290 с.
  56. Anat Pick. Creaturely Poetics – Animality and Vulnerability in Literature and Film. – М.: , 2011. – 256 с.
  57. Anat Pick. Creaturely Poetics – Animality and Vulnerability in Literature and Film. – М.: , 2011. – 256 с.
  58. V. Mitra Gopaul. Developing C/C++ Software in the OS/2/N® Environment. – М.: , 1994. – 450 с.
  59. C WALKER. Walker: Women & Gender In Southern Africa To 1945 (cloth). – М.: , 1991. – 400 с.
  60. Peter H. Raven. Study Guide to Accompany Environment. – М.: , 2000. – 360 с.
  61. 24 Deadly Sins Of Software Security: Programming Flaws And How To Fix Them. – М.: , 2011. – 432 с.
  62. Mobile Application Security. – М.: , 2011. – 432 с.
  63. The Tab Battery Book: An In-Depth Guide To Construction, Design, And Use. – М.: , 2011. – 272 с.
  64. Eduardo Fernandez-Buglioni. Security Patterns in Practice: Designing Secure Architectures Using Software Patterns. – М.: Wiley, 2013. – 582 с.
  65. Govind Sharma and Manish Gupta. Secure routing in wireless mobile Ad-Hoc network. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  66. Sai Suren Kumar Kasireddy. Measurements of Power Consumption in Smartphones. – М.: LAP Lambert Academic Publishing, 2013. – 88 с.
  67. Md. Saifur Rahman. Broadcasting Protocols in Mobile Ad-hoc Network. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  68. Idd Pazi Alli. Channel Estimation In Mobile Wireless Systems. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  69. Ranjan Mishra,Vishu Mittal and Rajkumar Chaurasia. Interference and Path Loss of Cellular Technology. – М.: LAP Lambert Academic Publishing, 2013. – 92 с.
  70. Naseer Ahmad. Security Issues in Wireless Networks. – М.: LAP Lambert Academic Publishing, 2010. – 60 с.
  71. Hazoor Singh and Buta Singh Sidhu. HVOF Coatings in Improving Resistance to Surface Degradation. – М.: LAP Lambert Academic Publishing, 2013. – 272 с.
  72. Tukun Li. Software Measurement Standards in Surface Metrology. – М.: LAP Lambert Academic Publishing, 2012. – 184 с.
  73. Basil Akinnuli,Kamoru Oladosu and Mondiu Durowoju. Development of Software for the Design and Drafting of Helical Gears. – М.: LAP Lambert Academic Publishing, 2012. – 192 с.
  74. Josef Kunik. Inventory Management in Multi-Product Lean Manufacturing Environments. – М.: LAP Lambert Academic Publishing, 2014. – 104 с.
  75. Jude Kagoro. The Urban (In)Security Paradox in Uganda. – М.: LAP Lambert Academic Publishing, 2012. – 124 с.
  76. Yasir Waseem Iqbal. Sociology Of Networking. – М.: LAP Lambert Academic Publishing, 2013. – 88 с.
  77. Maurice Kwakkernaat. Directional Dispersion of Radio Waves in Mobile Channels. – М.: LAP Lambert Academic Publishing, 2010. – 168 с.
  78. Marystella Wabwoba. Factors affecting sustainability of food security projects in Kenya. – М.: LAP Lambert Academic Publishing, 2013. – 80 с.
  79. Narahari Prasad Ghimire. Integrated Pest Management in Policy and Practice: A Case of Nepal. – М.: LAP Lambert Academic Publishing, 2013. – 128 с.
  80. Edward Onyango. Inositol Hexaphosphate Phytate In Diets: Role In The Digestive Process. – М.: Scholars' Press, 2014. – 148 с.
  81. Shreepriya Sreenivasan. Investigating photo-acclimation in plants exposed to high light stress. – М.: LAP Lambert Academic Publishing, 2013. – 92 с.
  82. Ahmad Galadima,Zahraddeen Nasiru G. Getso and Mustapha Danlami Garba. Carbon Capture and Storage in the Fight for Sustainable Environment. – М.: LAP Lambert Academic Publishing, 2012. – 160 с.
  83. Moushumi Lodh,Ashok Parida and Alpana Saxena. Assessing plaque vulnerability in Acute Coronary Syndrome. – М.: LAP Lambert Academic Publishing, 2011. – 56 с.
  84. Marija Lebedina Manzoni,Martina Lotar and Neven Ricijas. Peer Pressure in Adolescence. – М.: LAP Lambert Academic Publishing, 2011. – 100 с.
  85. Devanand Medapati. To Be in Christ is To Be in His Church. – М.: Blessed Hope Publishing, 2013. – 52 с.
  86. Timothy Ellah. Nigeria's Security Interest in the Gulf of Guinea:. – М.: LAP Lambert Academic Publishing, 2011. – 108 с.
  87. Bassie Yizengaw Limenih. Household Income Diversification and Food Security. – М.: LAP Lambert Academic Publishing, 2014. – 132 с.
  88. Shunji Cui. Sino-Japanese Relations and a ‘Security Regime’ in East Asia. – М.: LAP Lambert Academic Publishing, 2010. – 276 с.
  89. Dessalegn Workineh. The post 1991 Resettlement in food security Lens in Ethiopia. – М.: LAP Lambert Academic Publishing, 2011. – 100 с.
  90. AKANU OBASI. TUBERCULOSIS IN NEW ENTRANTS TO LONDON: THE PATIENTS'' PERSPECTIVE. – М.: LAP Lambert Academic Publishing, 2010. – 96 с.
  91. Asrul Sani. The Spread of HIV/AIDS in Mobile Populations. – М.: LAP Lambert Academic Publishing, 2010. – 156 с.
  92. Sergey Nikolenko. Provably secure constructions in cryptography. – М.: LAP Lambert Academic Publishing, 2011. – 112 с.
  93. Tulia Ackson. Coordination of Social Security Systems in the SADC Region. – М.: LAP Lambert Academic Publishing, 2009. – 96 с.
  94. Hai Truong. The Development of a Human Rights Culture in Vietnam, 1986 to present. – М.: LAP Lambert Academic Publishing, 2011. – 344 с.
  95. Munyabarenzi Faustin. The incidence of security interest in movable property. – М.: LAP Lambert Academic Publishing, 2013. – 84 с.
  96. Adel Abdelhadi. Algorithms for the integration of Arabic Language in Mobile Phones. – М.: LAP Lambert Academic Publishing, 2013. – 100 с.
  97. Vladimir Kulyukin and Tharun Tej Tammineni. Digital Labeling And Narrative Mapping In Mobile Remote Audio Signage. – М.: LAP Lambert Academic Publishing, 2014. – 76 с.
  98. Deepak Puthal and Bibhudatta Sahoo. Secure Data Collection & Critical Data Transmission in Mobile Sink WSN. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  99. Sandeep Kr. Agarwal and Dr. K. V. Arya. Security in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  100. Mohammed azharuddin Adhoni. Secure communication in p2p networks. – М.: LAP Lambert Academic Publishing, 2012. – 124 с.
  101. Suman Bala. Secure Routing in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 72 с.
  102. Abbas Mehdizadeh Zare Anari and Ayyoub Akbari Moghanjoughi. Route optimization security in mobile IPv6 networks. – М.: LAP Lambert Academic Publishing, 2012. – 116 с.
  103. Angela Amphawan and Kashif Nisar. Dynamic Cell Sizing in Mobile Cellular Networks. – М.: LAP Lambert Academic Publishing, 2012. – 116 с.
  104. Rupa Ch. and Avadhani P. S. Modern Security Methods in Applied Computer Science. – М.: Scholars' Press, 2014. – 124 с.
  105. Natarajan Meghanathan. A Tutorial on Java Socket Programming and Source Code Analysis. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  106. Heba Elshandidy. Enhancing Security Solutions in Mobile Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2013. – 128 с.
  107. Sherif Kamel. Route Optimization in Mobile IP. – М.: LAP Lambert Academic Publishing, 2014. – 248 с.
  108. Heena Mittal and Gurpreet Singh. Security of Mobile Agents in Distributed Computing. – М.: LAP Lambert Academic Publishing, 2014. – 80 с.
  109. Nitin K. Mishra and Sumit Dhariwal. Security in Mobile Ad-Hoc Networks. – М.: LAP Lambert Academic Publishing, 2014. – 72 с.
  110. Rakesh Jha. Security Issues In AD-HOC And Infrastructure (WLAN) Networks. – М.: LAP Lambert Academic Publishing, 2011. – 124 с.
  111. Srikanthreddy Arimanda and Manojkumar Kolli. Performance Study Of Security Mechanismsm For Mobile Agent Domain. – М.: LAP Lambert Academic Publishing, 2011. – 84 с.
  112. Narayan Ranjan Chakraborty. Analysis of Web security attacks: Bangladesh perspective. – М.: LAP Lambert Academic Publishing, 2012. – 124 с.
  113. Yi Ren. Security Mechanisms in Unattended Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2013. – 164 с.
  114. Shilpa Jaiswal and Sumeet Agrawal. Detection of Network Worm to Eliminate Security Threats in MANET. – М.: LAP Lambert Academic Publishing, 2012. – 52 с.
  115. Devendra Prasad. Relible Data Dissemination in Mobile Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2012. – 144 с.
  116. Soke Onyemelukwe. On-Demand Routing and Security in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2013. – 128 с.
  117. Raj Shree and Ravi Prakash Pandey. Security Advancement in ZRP based Wireless Networks. – М.: LAP Lambert Academic Publishing, 2014. – 92 с.
  118. Manuj Mishra,Govind Sharma and Ram Pathak. Secure Routing In Wireless Mobile Ad Hoc Network. – М.: LAP Lambert Academic Publishing, 2014. – 84 с.
  119. Natarajan Meghanathan,DeShante C. Johnson and Alexander R. Geoghegan. An Analysis of Software Security Attacks and Mitigation Controls. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  120. Britto R. Kumar and Albert S. Rabara. An Architecture for Secure Mobile Payment System using PKI. – М.: LAP Lambert Academic Publishing, 2013. – 184 с.
  121. Adewole Adewumi and Nicholas Omoregbe. Usability Evaluation of Mobile Access to Institutional Repository. – М.: LAP Lambert Academic Publishing, 2013. – 144 с.
  122. Kalimullah Khan. UX in mobile phones to ensure customer satisfaction and loyalty. – М.: LAP Lambert Academic Publishing, 2011. – 96 с.
  123. Gunasekar Kumar and Anirudh Chelikani. Analysis of Security Issues in Cloud Based E-Learning. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  124. Shafi'i Muhammad Abdulhamid. Privacy And National Security Challenges in Online Social Networks. – М.: LAP Lambert Academic Publishing, 2013. – 64 с.
  125. Roopesh Kumar. Steganography :A Technique for Information Hiding in Mobile. – М.: LAP Lambert Academic Publishing, 2014. – 76 с.
  126. Manoj Wakchaure and Shrinivas Sonkar. A Framework to Remove Vulnerability through Analysis Phase of SDLC. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  127. Sivapathalingham Sivavakeesar. Quality of Service Support in Mobile Ad Hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 288 с.
  128. Igor Botian. Software Security Vulnerabilities in Mobile Peer-to-peer Environment. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  129. Amit Choudhary. Routing Security Issues in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2014. – 80 с.
  130. Gabriella Carrozza. Software Faults Diagnosis in Complex Mission Critical Systems. – М.: LAP Lambert Academic Publishing, 2015. – 168 с.
  131. Keijo Haataja. Security Threats and Countermeasures in Bluetooth-Enabled Systems. – М.: LAP Lambert Academic Publishing, 2009. – 188 с.
  132. Ahsan Nawaz and Kashif Masood Malik. Software Testing Process in Agile development. – М.: LAP Lambert Academic Publishing, 2010. – 76 с.
  133. Alka Agrawal and Raees A Khan. Software Vulnerability: Identification and Minimization. – М.: Scholars' Press, 2014. – 192 с.
  134. HongLiang Wang,Thomas Marx and Fritz Wurm. Design and Implementation of GCP in a Make to Order Environment. – М.: LAP Lambert Academic Publishing, 2012. – 124 с.
  135. Faeiz Alserhani,Irfan Awan and Monis Akhlaq. Correlation and Aggregation of Security Alerts in Networks. – М.: LAP Lambert Academic Publishing, 2012. – 256 с.
  136. Viktor Kalman. Modeling and control of omnidirectional wheels. – М.: LAP Lambert Academic Publishing, 2014. – 148 с.
  137. Usha Ramanathan. Role of information exchange in collaborative supply chains. – М.: LAP Lambert Academic Publishing, 2011. – 276 с.
  138. Elio Keko. Personalized Advertising. – М.: LAP Lambert Academic Publishing, 2010. – 64 с.
  139. Fiona Lee. learning to be mothers to be mothers learning mothers learning to be. – М.: LAP Lambert Academic Publishing, 2011. – 152 с.
  140. Jerome K. Jerome. Three Men in a Boat (To Say Nothing of the Dog)/Трое в лодке не считая собаки. – М.: T8RUGRAM, 2018. – 240 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Займы для корпораций: back to the Russia. Т. Мартынова, "Банковское обозрение", № 11, ноябрь 2007.
  2. Наука человековедения. интервью с Д. Уолтоном, профессором London Metropolitan University, экспертом CIPD. Chartered Institute of Personnel and Development, автором программы Master of Arts in Human Resource Strategies. И. Смирнова, "Кадровый менеджмент", № 5, июль-август 2007.
  3. Нюансы управления офисным perpetuum mobile. В. Богданов, "Консультант", № 11, июнь 2007.
  4. Mobile Клиент - простота и эффективность сегодняшнего дня. С. Мастеренко, "Банковское дело в Москве", № 4, апрель 2006.
  5. Два монитора извольте, кофе-машину, широкое кресло, свободный график.... интервью с Ю. Малягановой, директором департамента управления персоналом SUP Media, А. Найко, специалистом по подбору персонала компании CUSTIS, А. Шевченко, руководителем отдела по подбору персонала компании Veeam Software в Европе и регионе Emerging Markets. В. Гусева, "Управление персоналом", N 9, май 2012 г.
  6. Счет 97 - to be or not to be. Реквием. А.В. Анищенко, "Актуальные вопросы бухгалтерского учета и налогообложения", N 23, декабрь 2011 г.
  7. Зомбирование банков, или Too-big-to-fail problem. Г.Б. Петров, "Управление в кредитной организации", N 2, март-апрель 2011 г.
  8. Иностранные работники - perpetuum mobile российского законодательства. А. А. Курушин, "В курсе правового дела", N 4, февраль 2011 г.
  9. Trade-in как способ обмена автомобиля. С.Н. Гордеева, "Торговля: бухгалтерский учет и налогообложение", N 2, февраль 2011 г.
  10. Уильям Савадж: Мотивировать людей в Нижнем Новгороде и Новосибирске нужно по-разному". интервью с У. Саваджем, вице-президентом корпорации Intel, подразделение Software and Services Group. М. Холкина, "Управление персоналом", N 14, июль 2010 г.
  11. Проблемы применения универсальной юрисдикции in absentia. Г.А. Королев, "Журнал российского права", № 10, октябрь 2009.
  12. Тонкости trade-in. С.А.Королев, "НДС. Проблемы и решения", № 8, август 2009.
  13. In-store banking - новая модель банковского бизнеса. А. Пятков, "Банковское обозрение", № 11, ноябрь 2008.

Образцы работ

Тема и предметТип и объем работы
Этапы формирования теории президентства
История государства и права
Курсовая работа
30 стр.
Многостороннее регулирование внешней торговли
Международные экономические отношения
Диплом
154 стр.
Последствия операции НАТО
Политология
Диплом
80 стр.
Математические модели океанических течений
Переводоведение (теория перевода)
Курсовая работа
42 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Ольга
Девочки, огромное Вам спасибо!!!