Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с. Firkhan Ali Hamid Ali. Vulnerability Analysis on the Computer Network Security. – М.: LAP Lambert Academic Publishing, 2010. – 72 с. Natarajan Meghanathan,DeShante C. Johnson and Alexander R. Geoghegan. An Analysis of Software Security Attacks and Mitigation Controls. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Igor Botian. Software Security Vulnerabilities in Mobile Peer-to-peer Environment. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Дополнительные результаты Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с. Data Privacy Management and Autonomous Spontaneus Security: 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, ... Computer Science / Security and Cryptology). – М.: , 2012. – 334 с. Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – М.: , 2012. – 283 с. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 515 с. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с. April Kelly. Spaghetti on the Wall: Branding and Networking Methods that Stick. – М.: , 2012. – 216 с. Jeffrey C. Hooke. Security Analysis on Wall Street. – М.: , 0. – 0 с. Fred D. Wilshusen, Carina Y. Enhada, Cheri Turnage Gatlin, American Bar Association Forum on the Construction Industry. Fundamentals of Construction Law. – М.: , 0. – 0 с. Twentieth Century Fund/Century Foundation, Century Foundation Task Force on the Future of Unions. What's Next for Organized Labor?: Report of the Century Foundation Task Force on the Future of Unions. – М.: , 0. – 0 с. Margaret Wheatley, Paula Griffin, Kristine Quade, National OD Network. Organization Development at Work: Conversations on the Values, Applications, and Future of OD (J-B O-D (Organizational Development)). – М.: Pfeiffer, 2003. – 224 с. Anne O. Krueger, Chonira Aturupane, Conference on the World Trade Organization As an International Institu. The Wto As an International Organization. – М.: , 0. – 0 с. John F. Ermisch. An Economic Analysis of the Family. – М.: , 0. – 0 с. Ian R. Bowler, C. R. Bryant, C. Cocklin, Chris Cocklin, International Geographical Union Commission on the Sustainability of R. The Sustainability of Rural Systems - Geographical Interpretations. – М.: , 0. – 0 с. Pam Lassiter. The New Job Security. – М.: , 0. – 0 с. Richard Aston. Electrical Circuit Analysis Using the TI-85 or TI-86. – М.: , 0. – 0 с. Robert E. Litan, Alice M. Rivlin, The Brookings Task Force on the Internet. The Economic Payoff from the Internet Revolution. – М.: , 0. – 0 с. Richard H. Steinberg, Bruce Stokes, Berkeley Roundtable on the International Economy, Council on Foreign Relations. Partners or Competitors?. – М.: , 0. – 0 с. R. F. Ellen, Roy Ellen. On the Edge of the Banda Zone: Past and Present in the Social Organization of a Moluccan Trading Network. – М.: , 0. – 0 с. Dag Harald Claes, Dag Harald Claes ARENA: Advanced Research on the Europeanisation of the Nation-State. The Politics of Oil-Producer Cooperation. – М.: , 0. – 0 с. National Research Council and Institute of Medicine, Committee on the Health and Safety Implications of Child Labor. Protecting Youth at Work: Health, Safety, and Development of Working Children and Adolescents in the United States. – М.: , 0. – 0 с. Philip C. Abrami, Paul Cholmsky, Robert Gordon. Statistical Analysis for the Social Sciences: An Interactive Approach. – М.: , 0. – 0 с. International Conference on the Conduct of Monetary Policy, Jin-Lung Lin, Jia-Dong Shea, Chung-Shu Wu, Gerald P., Jr. Dwyer, Gerald P. Dwyer. Monetary Policy and Taiwan's Economy (Academia Studies in Asian Economies Series). – М.: , 0. – 0 с. Time to take control : The impact of change on corporate computer systems. – М.: , 0. – 0 с. Chun Wei Choo, Brian Detlor, Don Turnbull. Web Work: Information Seeking and Knowledge Work on the World Wide Web (Information Science & Knowledge Management). – М.: , 0. – 0 с. Risk Analysis and the Security Survey. – М.: , 0. – 0 с. James R. Lincoln, Michael L. Gerlach. The Evolution of Japan's Network Economy: A Structural Perspective on Industrial Change (STRUCTURAL ANALYSIS IN THE SOCIAL SCIENCES). – М.: , 0. – 0 с. Daniel, Md Farb, Bruce Gordon, Daniel Farb. Internet Searches Manual and CD: Computer Skills Development Program on the Use of the Internet for Optimal Searching, With an Emphasis on Healthcare, Pharmaceuticals, and Sales. – М.: , 0. – 0 с. Workshop on the Life of a Process Model--From Conception to Action, S. Macchietto, S. P. Asprey. Dynamic Model Development: Methods, Theory and Applications (Computer-Aided Chemical Engineering). – М.: , 0. – 0 с. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с. Michal Pioro, Deepankar Medhi. Routing, Flow, and Capacity Design in Communication and Computer Networks. – М.: Elsevier Digital Press, 0. – 794 с. Committee on Federal Regulation of Securities Committee. The Fund Director's Guidebook: Third Edition (Fund Director's Guidebook). – М.: , 2006. – 128 с. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с. Based on the Occupational Outlook Handbo. Top 300 Careers: Your Complete Guideboook to Major Jobs in Every Field (America's Top 300 Jobs). – М.: , 2006. – 766 с. National Center on Education and the Economy. Tough Choices or Tough Times: The Report of the New Commission on the Skills of the American Workforce. – М.: , 2006. – 208 с. Gunilla Bradley. Social and Community Informatics: Humans on the Net. – М.: , 2006. – 265 с. Research Program on the Social Aspects of HIV/AIDS and Health. A Comparative Analysis of the Financing of HIV/AIDS Programs: in Botswana, Lesotho, Mozambique, South Africa, Swaziland and Zimbabwe. – М.: , 2005. – 72 с. Gunilla Bradley. SOCIAL AND COMMUNITY INFORMATICS: HUMANS ON THE NET. – М.: , 2006. – 280 с. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с. House of Commons - Select Committee on the Modernisation of the House of Commons. Regional Accountability (Hc 282, Third Report of Session 2007-08 - Report, Together With Formal Minutes, Oral and Written Evidence). – М.: , 2008. – 161 с. The Transition Network, Gail Rentsch. Smart Women Don't Retire -- They Break Free: From Working Full-Time to Living Full-Time. – М.: , 2008. – 272 с. Computer & Network Procedures to Manage IT Systems. – М.: , 2008. – 720 с. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с. Daniel Clark. Network Access Control 100 Success Secrets - 100 Most Asked NAC Questions on Implementation and Deployment of unify endpoint security technology, user ... and network security enforcement. – М.: , 2008. – 180 с. Richard Schiere. China's Development Challenges: Economic Vulnerability and Public Sector Reform (Routledge Studies on the Chinese Economy). – М.: , 2010. – 176 с. Rick Spair. The Simple Twitter Guide & Other Social Networks Available: Easy Tips And Techniques for Using Twitter to Promote Your Business On the Internet (Volume 1). – М.: , 2010. – 58 с. Jeff Crume. Inside Internet Security: What Hackers Don't Want You To Know. – М.: , 0. – 0 с. Eskinder Gidey, Arega Bazezew. Drought Vulnerability: Analysis of Drought Vulnerability and Its Effects on Agricultural Production. – М.: , 2012. – 112 с. Protein-p Interactions and Networks: Identification, Computer Analysis, and Prediction (Computational Biology). – М.: , 2008. – 220 с. Committee on the Significance of International Transport of Air Pollutants, National Research Counci. Global Sources of Local Pollution: An Assessment of Long-Range Transport of Key Air Pollutants to and from the United States. – М.: , 2010. – 225 с. Sarp Yeletay?i. A Risk Analysis on the Continuity of the Petroleum Supply Chain: using GIS and Systems Simulation. – М.: , 2010. – 336 с. Jeanna Matthews. Computer Networking. – М.: , 2005. – 288 с. Steve Manzuik. Network Security Assessment: From Vulnerability to Patch. – М.: , 2010. – 500 с. L.J. Balk. Proceedings of the 11th European Symposium on the Reliability of Electron Devices, Failure Physics and Analysis. – М.: , 2010. – 0 с. L.J. Balk. Proceedings of the 11th European Symposium on the Reliability of Electron Devices, Failure Physics and Analysis. – М.: , 2010. – 0 с. Russ Rogers. Network Security Evaluation Using the NSA IEM. – М.: , 2010. – 450 с. Ajit Sadana. Fractal Analysis of the Binding and Dissociation Kinetics for Different Analytes on Biosensor Surfaces. – М.: , 2010. – 372 с. M E Sereno. Neural Computation of Pattern Motion – Modeling Stages of Motion Analysis in the Primate Visual Cortex. – М.: , 2009. – 192 с. Fay Sudweeks. Network & Netplay – Virtual Groups on the Internet. – М.: , 1998. – 330 с. Thomas W. Madron. Network Security in the 90?s. – М.: , 1992. – 304 с. Jeffrey C. Hooke. Security Analysis on Wall Street. – М.: , 1999. – 512 с. Granino A. Korn. Neural Networks & Fuzzy–Logic Control on Personal Computers & Workstations + D3. – М.: , 1995. – 304 с. TL LOQUERY. Laquey: The Users Directory Of Computer ?networks? (pr Only). – М.: , 1990. – 646 с. John R Koza. Genetic Programming – On the Programming of Computers by Means of Natural Selection Pt 1. – М.: , 1993. – 836 с. JS QUARTERMAN. Quarterman: The ?matrix?: Computer Networks & Conferencing Systems Worldwid (pr Only). – М.: , 1989. – 752 с. Jeffrey C. Hooke. Security Analysis on Wall Street. – М.: , 1998. – 448 с. S MUFTIC. Muftic: ?security? Mechanisms For Computer Network S. – М.: , 1989. – 196 с. U PANKOKE–BABATZ. Pankoke–babatz: ?computer? Based Group Communtcati On –the Amigo Activity Model. – М.: , 1989. – 320 с. Erika de Wet. The Chapter VII Powers of the United Nations Security Council. – М.: , 2011. – 432 с. Granino A. Korn. Korn: Neural Network Experiments On Personal Computers & Workstations (pr Only). – М.: , 1991. – 264 с. Albert P.s.o.c. Psychoanalytic Study of the Child V56 – Special Section on Changes in Technique in Child Analysis since the Publication of ?Normality & Pathology?. – М.: , 2002. – 420 с. Juan Pablo Bonta. American Architects & Texts – A Computer Aided Analysis of the Literature. – М.: , 1996. – 444 с. Wireless Network Security A Beginners Guide. – М.: , 2011. – 400 с. Network Security: The Complete Reference. – М.: , 2011. – 896 с. Fundamentals Of Network Security. – М.: , 2011. – 672 с. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . – с. Bang on the Door!. Funky Fashion Designer. – М.: , 2005. – 24 с. Shatha Assaad,Adil Ghassan and Ahlam Jameel. On the Volume and Integral Points of a Polyhedron in Rn. – М.: LAP Lambert Academic Publishing, 2011. – 124 с. Fatema Ahmed Sadeq and Shatha Assaad Salman. On the volume of a polytope in Rn. – М.: LAP Lambert Academic Publishing, 2012. – 64 с. Shaek Rana Mohammad Baki Billah and Mohammad Hafizur Rahman. Design & Development of Network Security System using IP Tables. – М.: LAP Lambert Academic Publishing, 2013. – 164 с. Karel Kocian. Analysis of Traffic Accidents on the Speedway R46. – М.: LAP Lambert Academic Publishing, 2013. – 128 с. Uwakwe Chukwu. Assessment of the Impact of V2G on Distribution System. – М.: LAP Lambert Academic Publishing, 2012. – 404 с. Michele Gallo. MIMO Technology applied to On Body Wireless Networks. – М.: Scholars' Press, 2014. – 196 с. Julius Olujimi. Effects of Facilities on the Rental Value of Properties in Nigeria. – М.: LAP Lambert Academic Publishing, 2012. – 68 с. Pattama Suphunnakul. SOCIAL NETWORK ANALYSIS: ANTI – DRUG ADDICTION NETWORKS THAILAND. – М.: LAP Lambert Academic Publishing, 2010. – 124 с. Adamu Usman. Cost-Benefit Analysis of Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Gurunadh Velidi,Sharma Mbbsr and Ugur Guven. The Exergy Analysis On A Natural Gas Based Combined Cycle Power Plant. – М.: LAP Lambert Academic Publishing, 2012. – 124 с. Muhammad Sajjad Hossain. Analysis on MHD Free Convection Flow Within Trapezoidal Enclosures. – М.: LAP Lambert Academic Publishing, 2014. – 72 с. Alexander Lozovskiy. NUMERICAL ANALYSIS OF THE AERODYNAMIC NOISE PREDICTION IN DNS AND LES. – М.: LAP Lambert Academic Publishing, 2011. – 132 с. Satyendra Singh Narwaria. Geography as a factor to the Environment Security of Bangladesh. – М.: LAP Lambert Academic Publishing, 2014. – 128 с. Charles Mubita. Africa's Demand for a Permanent Seat on the UN Security Council. – М.: LAP Lambert Academic Publishing, 2012. – 132 с. Heba Negm. The Middle East Security: A Critical Multi-Level Analysis. – М.: LAP Lambert Academic Publishing, 2010. – 128 с. Mengistu Kefale. Time Series Analysis on Price and rainfall pattern of Bahir Dar, Ethiopia. – М.: LAP Lambert Academic Publishing, 2010. – 64 с. Urmila Pyakurel. On the Solvability of Open Shop Scheduling Problems. – М.: LAP Lambert Academic Publishing, 2011. – 108 с. Andrew Miller. An Analysis on the Legality of Israeli and American Policies. – М.: LAP Lambert Academic Publishing, 2013. – 76 с. Joseph Nasongo and Lydiah Wamocha. A Critical Analysis Of Views On The Ideal Education For Africa. – М.: LAP Lambert Academic Publishing, 2012. – 96 с. Ashit Kumar Dutta and Abdul Rahaman Wahab Sait. Computer Networks from Scratch. – М.: LAP Lambert Academic Publishing, 2013. – 324 с. Meftah Ur Rahman,Md. Imran Hossain and Sheikh Neyamat. A Comparative Analysis among Different Routing Protocols with QoS. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Ammisetty Veeraswamy and Ammisetty Mahesh Babu. Introduction to Computer Networks. – М.: LAP Lambert Academic Publishing, 2012. – 208 с. Torruam Japheth Terande. Introduction to computer networking. – М.: LAP Lambert Academic Publishing, 2012. – 144 с. Layth A. Hassnawi,R. B. Ahmad and Mario Kabbour. Routing In Motorway Surveillance System Based On Ad Hoc Camera Network. – М.: LAP Lambert Academic Publishing, 2013. – 68 с. Xiaodong He. Automated intrusion prevention mechanism in enhancing network security. – М.: Scholars' Press, 2014. – 128 с. Zhiyang Guo. On the Design of High Performance Data Center Networks. – М.: Scholars' Press, 2015. – 204 с. Syed Zahidur Rashid. Computer Network Security Monitoring. – М.: Scholars' Press, 2015. – 284 с. Chakchai So-In. Resource Allocation and Management in Computer Networks. – М.: LAP Lambert Academic Publishing, 2011. – 212 с. Mehmud Abliz. Denial of Service in Computer Networks. – М.: LAP Lambert Academic Publishing, 2011. – 84 с. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с. Aaron Tureau. Evaluations of Synchronization Loss Equations on High-Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 60 с. Adil Adil Nazir Malik. Modeling and Simulation of computer Network Using OPNET. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с. Mahmoud Jazzar. Computer Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 240 с. Soke Onyemelukwe. On-Demand Routing and Security in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2013. – 128 с. Vincent Omollo. Enhanced Network Security. – М.: LAP Lambert Academic Publishing, 2013. – 76 с. Firkhan Ali Hamid Ali. Vulnerability Analysis on the Computer Network Security. – М.: LAP Lambert Academic Publishing, 2010. – 72 с. Er. Surajit Borah. A Study Of Computer Networking At IOCL(AOD), Digboi(India). – М.: LAP Lambert Academic Publishing, 2011. – 64 с. Natarajan Meghanathan,DeShante C. Johnson and Alexander R. Geoghegan. An Analysis of Software Security Attacks and Mitigation Controls. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Deniz Akkaya and Fabien Thalgott. Honeypots in Network Security. – М.: LAP Lambert Academic Publishing, 2012. – 64 с. M. Elena Martinez-Perez. Computer Analysis of the Geometry of the Retinal Vasculature. – М.: LAP Lambert Academic Publishing, 2011. – 192 с. Qusay Ishaq. A framework based on the Cloud Computing Technology. – М.: LAP Lambert Academic Publishing, 2012. – 144 с. Lidong Bing and Wai Lam. Information Discovery from Semi-structured Record Sets on the Web. – М.: LAP Lambert Academic Publishing, 2014. – 124 с. Manasi Sapre and Nita Parekh. Topological Analysis of Air Transportation Networks. – М.: LAP Lambert Academic Publishing, 2012. – 116 с. Dirk Lessner. Network Security for Embedded Systems. – М.: LAP Lambert Academic Publishing, 2009. – 232 с. Matthieu Rivain. On the Physical Security of Cryptographic Implementations. – М.: LAP Lambert Academic Publishing, 2014. – 232 с. Nathan Darmawan. Shielding Your Company with a Better Network Security Design. – М.: LAP Lambert Academic Publishing, 2010. – 180 с. Emilio Serrano,Juan A. Botia and Jose M. Cadenas. Advancing the state of the art in the analysis of multi-agent systems. – М.: LAP Lambert Academic Publishing, 2011. – 208 с. Wei Gao,Tianwei Xu and Yungang Zhang. Some Topics on the Sparsity and Vulnerability of Ontology. – М.: LAP Lambert Academic Publishing, 2014. – 60 с. Iona Carina. Music Piracy Culture on the Internet. – М.: LAP Lambert Academic Publishing, 2012. – 128 с. Navneet kaur Bajwa. Sanitization of Data in Computer Network. – М.: LAP Lambert Academic Publishing, 2012. – 92 с. Palanivel Kodeswaran. On the Use of Context and Policies in Declarative Networked Systems. – М.: LAP Lambert Academic Publishing, 2012. – 112 с. Francesco Pagano. A Distributed Approach to Privacy on the Cloud. – М.: LAP Lambert Academic Publishing, 2013. – 216 с. G. L. Meena and D. K. Jain. Impact of Dairy Cooperatives on the Economy of Rural Households. – М.: LAP Lambert Academic Publishing, 2011. – 124 с. Gorkem Yaz?c?oglu. An Analysis on US Sub-Prime Mortgage Crisis. – М.: LAP Lambert Academic Publishing, 2011. – 100 с. Hafez Abdo and Matthew Vellacott. The Role of Deepwater Oil Drilling in the US Energy Security. – М.: LAP Lambert Academic Publishing, 2010. – 140 с. Milton Gadina. The impact of HIV/AIDS on the Human Security of Households in Bulawayo. – М.: LAP Lambert Academic Publishing, 2013. – 100 с. Amsalu Mitiku Bora. The Impact of Food Price Inflation on Rural Households' Food Security. – М.: LAP Lambert Academic Publishing, 2012. – 124 с. Marcellin Mugabe. The Total Cost of Ownership (TCO) of Computer Networks in Colleges. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Fares G. Khalil. The Social Networks Behind CSR Identity. – М.: LAP Lambert Academic Publishing, 2013. – 288 с. Ishak Mesic. Comparative Analysis of the World Trade. – М.: LAP Lambert Academic Publishing, 2015. – 80 с. Jesus Puente Trevino. The 1994 Mexican Financial Crisis. – М.: Scholars' Press, 2014. – 92 с. Monday Ahmed. Effect of Income Inequality on the food security. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. Лучшие результаты Ничего не найдено Дополнительные результаты Займы для корпораций: back to the Russia. Т. Мартынова, "Банковское обозрение", № 11, ноябрь 2007. Как в детском пазле. интервью с И. Смелянским, директором московского офиса компании The Boston Consulting Group. М. Тальская, "БДМ. Банки и деловой мир", N 3, март 2012 г. Back side of the moon, или темная сторона поведения персонала. интервью с Н. Русаковой, директором по персоналу ОАО "Хлебпром", А. Сукачёвым, директором "Торговой компании АС", Н. Харитоновой, руководителем службы персонала тверской компании ЗАО "ДКС". А. Колесникова, Т. Тюрина, С. Машарипов, "Управление персоналом", N 16, август 2010 г. Критика on-line. интервью с О. Киселевой, руководителем компании World Gym Consulting. С. Сипатов, "Управление персоналом", N 14, июль 2010 г. On-line коммуникации: от классики до web 2.0-технологий. И. Широкова, "Ремедиум", № 7, июль 2010. Цены под контролем: the present and the future. С. Стройкова, И. Леметюйнен, "Консультант", № 19, сентябрь 2009. Основной арсенал "охотника" - его network: кого он знает на рынке и качество этих отношений. С. Плетнева, "Управление персоналом", № 12, июнь 2009. Когда бизнес и власть встретятся on-line?. И. Пискун, "Московский бухгалтер", № 8, апрель 2009. Новая упрощенная процедура рассмотрения мелких исков в Евросоюзе - the european small claims procedure. escp. Н.В. Сивак, "Законодательство", № 2, февраль 2009. Сдача отчетности on-line: прогресс налицо. М. Дудко, "Консультант", № 13, июль 2008. On-line рекрутмент. интервью с О. Бруковской, директором по маркетингу и PR группы компаний HeadHunter, А. Куракиным, заместителем генерального директора ООО "РДВ-медиа-групп", Я. Топорковым, директором по связям с общественностью ООО "СуперДжоб", С. Сторожевым, руководителем проектов Joblist и 100 Работ. "Управление персоналом", № 7, апрель 2008. Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Татьяна Диплом после вашего сопровождения научный руководитель проверила в общем всё отлично.