Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. David Crystal. Internet Linguistics: A Student Guide. – М.: Routledge, 2011. – 192 с.
  2. Tim Speed. The Personal Internet Security Guidebook. – М.: , 2010. – 202 с.

Дополнительные результаты

  1. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с.
  2. The Future Internet: Future Internet Assembly 2012: From Promises to Reality (Lecture Notes in Computer Science / Information Systems and Applications, incl. Internet/Web, and HCI). – М.: , 2012. – 263 с.
  3. Orlan Lee. Waiving Our Rights: The Personal Data Collection Complex and Its Threat to Privacy and Civil Liberties. – М.: , 2012. – 306 с.
  4. Jill Andresky Fraser. The Business Owner's Guide to Personal Finance. – М.: , 0. – 0 с.
  5. Abhijit Chaudhury, Jean-Pierre Kuilboer. E-Business & E-Commerce Infrastructure: Technologies Supporting the E-Business Initiative. – М.: , 0. – 0 с.
  6. Antony Iozzi. The Personal Success Handbook: How to Achieve Personal Excellence, and Lead Yourself to Wealth, Health and Happiness. – М.: , 0. – 0 с.
  7. Tony Iozzi. The Personal Success Handbook: Your Personal Guide for Achieving a Wealthy, Happy and Successful Life. – М.: , 0. – 0 с.
  8. Milton L. Mueller. Ruling the Root: Internet Governance and the Taming of Cyberspace. – М.: , 0. – 0 с.
  9. Paul J. Albanese. The Personality Continuum and Consumer Behavior:. – М.: , 0. – 0 с.
  10. Bruce Mitchel Kogut, Bruce Kogut. The Global Internet Economy. – М.: , 0. – 0 с.
  11. Pam Lassiter. The New Job Security. – М.: , 0. – 0 с.
  12. Gerald Kovacich. The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition. – М.: , 0. – 0 с.
  13. Robert Kehn, Adams Media Corporation. Internet Job Search Almanac (Admas Internet Job Search Almanac, 6th Ed). – М.: , 0. – 0 с.
  14. Melvin J. Gravely. Making It Your Business: The Personal Transition from Employee to Entrepreneur. – М.: , 0. – 0 с.
  15. Afsaneh Nahavandi, Ali R. Malekzadeh. Organizational Behavior: The Person-Organization Fit. – М.: , 0. – 0 с.
  16. Philip P. Purpura. The Security Handbook. – М.: , 0. – 0 с.
  17. Ed Paulson. The Technology M&A Guidebook. – М.: Wiley Publishing, Inc, 2001. – 420 с.
  18. Henry J. Aaron, Robert D. Reischauer. Countdown to Reform: The Greater Social Security Debate. – М.: , 0. – 0 с.
  19. Daniel Gross. Bull Run: Wall Street, the Democrats, and the New Politics of Personal Finance. – М.: , 0. – 0 с.
  20. Allen W., Ph.D. Smith. The Looting of Social Security: How the Government Is Draining Americas Retirement Account. – М.: , 0. – 0 с.
  21. Jon Barnett. The Meaning of Environmental Security: Environmental Politics and Policy in the New Security Era. – М.: , 0. – 0 с.
  22. Donald Bruce Keim, William T. Ziemba. Security Market Imperfections in World Wide Equity Markets (Publications of the Newton Institute , No 9). – М.: , 0. – 0 с.
  23. Art Collins, Kevin D. Stokes. Market Rap : The Odyssey of a Still-Struggling Commodity Trader. – М.: , 0. – 0 с.
  24. Jeff McClure. The Personal Wealth Coach: Creating and Rebuilding Invested Wealth in the 21st Century. – М.: , 0. – 0 с.
  25. Ilyce R. Glink. 100 Questions You Should Ask About Your Personal Finances: And the Answers You Need to Help You Save, Invest, and Grow Your Money. – М.: , 0. – 0 с.
  26. Greg Elmer. Profiling Machines: Mapping the Personal Information Economy. – М.: , 0. – 0 с.
  27. Charles Jennings, Elizabeth Dyson, Lori Fena. The Hundredth Window: Protecting Your Privacy and Security in the Age of the Internet. – М.: , 0. – 0 с.
  28. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с.
  29. Sanjiv Purba. New Directions in Internet Management. – М.: , 0. – 0 с.
  30. Computer Security. – М.: , 0. – 0 с.
  31. Physical Security and the Inspection Process. – М.: , 0. – 0 с.
  32. Peter G. W. Keen, Walid Mougayar, Tracy Torregrossa. The Business Internet and Intranets: A Manager's Guide to Key Terms and Concepts. – М.: , 0. – 0 с.
  33. David Bunnell. Making the Cisco Connection : The Story Behind the Real Internet Superpower. – М.: , 0. – 0 с.
  34. Dan Steinbock. The Birth of Internet Marketing Communications:. – М.: , 0. – 0 с.
  35. Laura Fisher Kaiser, Michael B. Kaiser, Pierre Omidyar. The Official Ebay Guide to Buying, Selling and Collecting Just About Anything. – М.: , 0. – 0 с.
  36. Trevor Merriden. Irresistible Forces : The Business Legacy of Napster and the Growth of the Underground Internet. – М.: , 0. – 0 с.
  37. Janet Wickell. Everything Real Estate Investing Book: How to get started and make the most of your money (Everything: Business and Personal Finance). – М.: , 0. – 0 с.
  38. Juanita Ellis, Tim Speed. The Internet Security Guidebook: From Planning to Deployment. – М.: , 0. – 0 с.
  39. Dorothy E. Denning, Peter J. Denning. Internet Besieged. – М.: , 0. – 0 с.
  40. Anup K. Ghosh. E-Commerce Security and Privacy. – М.: , 0. – 0 с.
  41. Aspatore Books Staff. Inside the Minds: Security Matters - Industry Leaders from eBay, Inc., Motorola, Internet Security Systems & More on Protecting Your Most Valuable Assets. – М.: , 0. – 0 с.
  42. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с.
  43. Josh Kaufman. The Personal MBA. – М.: Portfolio Penguin, 2012. – 462 с.
  44. Swords and Sustenance : The Economics of Security in Belarus and Ukraine (American Academy Studies in Global Security). – М.: , 2004. – 0 с.
  45. Edward Burman. Shift! : The Unfolding Internet - Hype, Hope and History. – М.: , 2003. – 0 с.
  46. The Global Internet Economy. – М.: , 2004. – 0 с.
  47. The Deregulation of the Banking and Securities Industries. – М.: , 2003. – 0 с.
  48. Jeffrey R. Yost. The Computer Industry (Emerging Industries in the United States). – М.: , 2005. – 0 с.
  49. Charles C. Sharpe. The Senior Volunteer: Where And How Retired Americans Can Give Back. – М.: , 2005. – 0 с.
  50. Peter J. Sander. The 250 Personal Finance Questions Everyone Should Ask. – М.: , 2005. – 0 с.
  51. Mike Dandridge. The One-Year Business Turnaround. – М.: , 2005. – 0 с.
  52. Ira Winkler. Zen and the Art of Information Security. – М.: , 2007. – 192 с.
  53. The Personal Security Handbook. – М.: , 2005. – 328 с.
  54. Committee on Federal Regulation of Securities Committee. The Fund Director's Guidebook: Third Edition (Fund Director's Guidebook). – М.: , 2006. – 128 с.
  55. The Personal Vision Workbook. – М.: , 2006. – 224 с.
  56. Peter Hoflich, The Asian Banker. Asias Banking CEOs: The Future of Finance in Asia. – М.: , 2008. – 250 с.
  57. Andy Walker. Windows Lockdown!: Your XP and Vista Guide Against Hacks, Attacks, and Other Internet Mayhem (Absolute Beginner's Guide). – М.: , 2008. – 480 с.
  58. Lehman Hailey. The DNA of Internet Marketing: Keeping You Ahead of the Internet Marketing Game. – М.: , 2009. – 116 с.
  59. Robert C. Seacord. The CERT C Secure Coding Standard. – М.: Addison-Wesley Professional, 2008. – 720 с.
  60. The Editors of Geekpreneur. Internet Marketing Hype: 40 Online Money Making Myths that Kill Success (and How to Beat Them). – М.: , 2011. – 370 с.
  61. Owen P. Miller. 11 Foolproof Internet Marketing Secrets For The Newbie Internet Marketer: An Essential Start Up Guide To Internet Marketing With Top-Notch Marketing ... To Guarantee Your Internet Marketing Success!. – М.: , 2011. – 60 с.
  62. David Crystal. Internet Linguistics: A Student Guide. – М.: Routledge, 2011. – 192 с.
  63. John R. Wenburg, William W. Wilmot. The Personal Communication Process. – М.: John Wiley and Sons, Ltd, 1973. – 236 с.
  64. Zach Shelby, Carsten Bormann. 6LoWPAN: The Wireless Embedded Internet. – М.: Wiley, 2009. – 248 с.
  65. Juanita Ellis. The Internet Security Guidebook. – М.: , 2010. – 320 с.
  66. Gerald L. Kovacich. The Information Systems Security Officer's Guide. – М.: , 2010. – 361 с.
  67. Tim Speed. The Personal Internet Security Guidebook. – М.: , 2010. – 202 с.
  68. Richard Sennett. The Corrosion of Character – The Personal Consequences of Work in the New Capitalism. – М.: , 1998. – 176 с.
  69. Jill H. Ellsworth. The New Internet Business Book. – М.: , 1996. – 500 с.
  70. Orin Thomas. MCSA/MCSE Self–Paced Training Kit (Exam 70–350) – Implementing Microsoft Internet Security and Acceleration Server 2004. – М.: , 2005. – 1104 с.
  71. Ross Anderson. The Global Internet Trust Register 1999 Edition. – М.: , 1999. – 183 с.
  72. David Funder. The Personality Puzzle 5e. – М.: , 2010. – 0 с.
  73. David C Funder. Pieces of the Personality Puzzle 3e. – М.: , 2004. – 0 с.
  74. David Funder. The Personality Puzzle 3e. – М.: , 2004. – 0 с.
  75. Robert Legvold. Swords and Sustenance – The Economics of Security in Belarus and Ukraine. – М.: , 2004. – 256 с.
  76. Lee W Mcknight. Creative Destruction – Business Survival Strategies in the Global Internet Economy. – М.: , 2001. – 302 с.
  77. Saul Levmore. The Offensive Internet – Speech, Privacy, and Reputation. – М.: , 2010. – 296 с.
  78. DC Funder. The Personality Puzzle IM/TIF D3. – М.: , 2001. – 214 с.
  79. Ed Paulson. The Technology M&A Guidebook. – М.: , 2000. – 432 с.
  80. Milton Mueller. Ruling the Root – Internet Governance & the Taming of Cyberspace. – М.: , 2002. – 332 с.
  81. Richard Sennett. The Corrosion of Character – The Personal Consequence of Work in the New Capitalism (Paper). – М.: , 1999. – 176 с.
  82. Robert Legvold. Swords and Sustenance – The Economics of Security in Belarus and Ukraine. – М.: , 2004. – 256 с.
  83. David C Funder. The Personality Puzzle 2e. – М.: , 2001. – 622 с.
  84. C Haber. Old Age & the Search for Security – An American Social History. – М.: , 1994. – 212 с.
  85. Harris. The Person with Alzheimer?s Disease. – М.: , 2002. – 336 с.
  86. Harris. The Person with Alzheimer?s Disease. – М.: , 2002. – 336 с.
  87. Kerry Gleeson. The Personal Efficiency Program. – М.: , 2000. – 226 с.
  88. K Sharpe. The Personal Rule of Charles I (Paper). – М.: , 1987. – 202 с.
  89. D?rfer. The Nordic Nations in the New Western Security Reg ime. – М.: , 1997. – 0 с.
  90. D?rfer. The Nordic Nations in the New Western Security Reg ime. – М.: , 1997. – 0 с.
  91. John Viega. The Myths of Security. – М.: , 2009. – 260 с.
  92. Ian Hurd. After Anarchy – Legitimacy And Power in the United Nations Security Council. – М.: , 2008. – 240 с.
  93. Greg Elmer. Profiling Machines – Mapping the Personal Information Economy. – М.: , 2004. – 176 с.
  94. Gabrielle Suchon. Woman Who Defends All the Persons of Her Sex – Selected Philosophical and Moral Writings. – М.: , 2010. – 448 с.
  95. Gabrielle Suchon. Woman Who Defends All the Persons of Her Sex – Selected Philosophical and Moral Writings. – М.: , 2010. – 448 с.
  96. Bruce Kogut. The Global Internet Economy. – М.: , 2003. – 536 с.
  97. Kerry Gleeson. The Personal Efficiency Program: How to Stop Feeling Overwhelmed and Win Back Control of Your Work. – М.: John Wiley and Sons, Ltd, 2009. – 272 с.
  98. David C Funder. The Personality Puzzle IM/TIF. – М.: , 1997. – 172 с.
  99. Terry Bernstein. Internet Security for Business. – М.: , 1996. – 464 с.
  100. Joe Pantuso. The Complete Internet Gamer. – М.: , 1996. – 368 с.
  101. SICHTERMANN. Femininity: The Politics Of The Personal. – М.: , 1986. – 0 с.
  102. Deanna Garcia. Making Money on the Mobile Internet. – М.: , 2007. – 304 с.
  103. ED. Personal Computer Security. – М.: , 1996. – 360 с.
  104. Donald A Norman. The Invisible Computer – Why Good Products Can Fail, The Personal Computer is So Complex, & Information Appliances are the Solution (Cloth). – М.: , 1998. – 316 с.
  105. Lubomyr Hajda. Ukraine In The World – Studies in the International Relations & Security Structure of a Newly Independent State (Paper). – М.: , 1999. – 380 с.
  106. Bruce Kogut. The Global Internet Economy. – М.: , 2004. – 536 с.
  107. S D Stahl. Literary Folkloristics & the Personal Narrative. – М.: , 1989. – 160 с.
  108. SICHTERMANN. Femininity: The Politics Of The Personal. – М.: , 1986. – 0 с.
  109. Kerry Gleeson. The Personal Efficiency Program. – М.: , 2003. – 288 с.
  110. Donald Norman. The Invisible Computer – Why Good Products Can Fail, the Personal Computer Is So Complex & Information Appliacnes are the Solution (Paper). – М.: , 1999. – 316 с.
  111. David C Funder. The Personality Puzzle. – М.: , 1996. – 494 с.
  112. Peter Weverka. The Everyday Internet All–in–One Desk Reference For Dummies®. – М.: , 2005. – 624 с.
  113. Christian Smith. What Is a Person? – Rethinking Humanity, Social Life, and the Moral Good from the Person Up. – М.: , 2010. – 544 с.
  114. Laura Wayman. A Loving Approach to Dementia Care – Making Meaningful Connections with the Person Who Has Alzheimer?s Disease or Other Dementia or Memory. – М.: , 2011. – 112 с.
  115. Laura Wayman. A Loving Approach to Dementia Care – Making Meaningful Connections with the Person Who Has Alzheimer?s Disease or Other Dementia or Memory. – М.: , 2011. – 112 с.
  116. Winn Schwartau. The Complete Internet Business Toolkit. – М.: , 1996. – 262 с.
  117. Private Wealth Management: The Complete Reference For The Personal Financial Planner. – М.: , 2011. – 696 с.
  118. Tim Speed, Juanita Ellis. Internet Security: A Jumpstart for Systems Administrators and IT Managers. – М.: , . –  с.
  119. Atec and Xnet Information Systems. The Internet Watchdog Personal Edition Windows. – М.: , . –  с.
  120. John Markoff. What the Dormouse Said: How the Sixties Counterculture Shaped the Personal Computer Industry. – М.: Penguin, 2006. – 336 с.
  121. Darrel Ince. Oxford Dictionary of the Internet. – М.: Oxford University Press, 2003. – 272 с.
  122. Josh Kaufman. The Personal MBA: Master the Art of Business. – М.: Portfolio Trade, 2012. – 464 с.
  123. Jude Kagoro. The Urban (In)Security Paradox in Uganda. – М.: LAP Lambert Academic Publishing, 2012. – 124 с.
  124. Masuda Kamal. Community Based Rehabilitation(CBR)of the Persons with Disabilities. – М.: LAP Lambert Academic Publishing, 2013. – 100 с.
  125. Maria Perevalova. Contextualization of the Mobile Internet. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  126. Heba Negm. The Middle East Security: A Critical Multi-Level Analysis. – М.: LAP Lambert Academic Publishing, 2010. – 128 с.
  127. Vibha Verma. Multicrypt Vs Single Encryption Scheme. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  128. Tulia Ackson. Coordination of Social Security Systems in the SADC Region. – М.: LAP Lambert Academic Publishing, 2009. – 96 с.
  129. Munyabarenzi Faustin. The incidence of security interest in movable property. – М.: LAP Lambert Academic Publishing, 2013. – 84 с.
  130. Ruben C. Fajardo. The Personal and Professional Qualities of an Effective Facilitator. – М.: LAP Lambert Academic Publishing, 2013. – 132 с.
  131. Carol Woody. Applying Security Risk Management to Internet Connectivity. – М.: LAP Lambert Academic Publishing, 2009. – 180 с.
  132. Eleni Charalampous. The feeling of security in mathematics. – М.: LAP Lambert Academic Publishing, 2013. – 108 с.
  133. Wei Ren. Lightweight and Robust Security for Applications in Internet of Things. – М.: LAP Lambert Academic Publishing, 2013. – 188 с.
  134. Firkhan Ali Hamid Ali. Vulnerability Analysis on the Computer Network Security. – М.: LAP Lambert Academic Publishing, 2010. – 72 с.
  135. Hammad Kazmi. Security and Privacy issues in Near Field Communication (NFC) Systems. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  136. Paolo Gasti. Privacy and Security of Internet Communications. – М.: LAP Lambert Academic Publishing, 2011. – 148 с.
  137. Benny Benyamin Nasution,Asad I. Khan and Bala S. Srinivasan. Internet Security Control System. – М.: LAP Lambert Academic Publishing, 2010. – 256 с.
  138. Yi-Jung Teresa Hsieh. Learning English - The personal journey of seven Australian immigrants. – М.: LAP Lambert Academic Publishing, 2012. – 172 с.
  139. Audu Jonathan Adoga and Fredah I. Agbeje. Introduction to Internet Security for PHP Web Developers. – М.: , 2014. – 52 с.
  140. The Personalized Diet: The Revolutionary Plan to Help You Lose Weight, Prevent Disease and Feel Incredible. – М.: , . –  с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Займы для корпораций: back to the Russia. Т. Мартынова, "Банковское обозрение", № 11, ноябрь 2007.
  2. Особенности национального - ИТ рекрутмента. интервью с Е. Позняковой, генеральным директором специализированного кадрового агентства CONNECT PERSONAL. "Управление персоналом", № 19, октябрь 2005.
  3. Internet: очевидное и невероятное. Выпуск 5, март 2001.
  4. INTERNET: торговля ценными бумагами. А. Шачин, "Финансовая газета", № 1, январь 2001.
  5. Как в детском пазле. интервью с И. Смелянским, директором московского офиса компании The Boston Consulting Group. М. Тальская, "БДМ. Банки и деловой мир", N 3, март 2012 г.
  6. Back side of the moon, или темная сторона поведения персонала. интервью с Н. Русаковой, директором по персоналу ОАО "Хлебпром", А. Сукачёвым, директором "Торговой компании АС", Н. Харитоновой, руководителем службы персонала тверской компании ЗАО "ДКС". А. Колесникова, Т. Тюрина, С.  Машарипов, "Управление персоналом", N 16, август 2010 г.
  7. Цены под контролем: the present and the future. С. Стройкова, И. Леметюйнен, "Консультант", № 19, сентябрь 2009.
  8. Новая упрощенная процедура рассмотрения мелких исков в Евросоюзе - the european small claims procedure. escp. Н.В. Сивак, "Законодательство", № 2, февраль 2009.
  9. Персонал от слова "person". Попробуем оценить?. Т. Лобанова, "Консультант", № 7, апрель 2008.

Образцы работ

Тема и предметТип и объем работы
Особенности виртуального общения
Психология
Курсовая работа
28 стр.
Типология современной прессы
Журналистика
Курсовая работа
40 стр.
ФПГ и их роль в экономике России
Предпринимательство
Курсовая работа
26 стр.
Последствия операции НАТО
Политология
Диплом
80 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Мария
Здравствуйте Марина! Вчера была защита диплома.Хочу выразить вам слова благодарности. Диплом после вашего сопровождения очень понравился, оценка 5! Огромное Вам спасибо за вашу работу!Успехов вам! Буду вас рекомендовать всем своим друзьям!