Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  2. Firkhan Ali Hamid Ali. Vulnerability Analysis on the Computer Network Security. – М.: LAP Lambert Academic Publishing, 2010. – 72 с.
  3. Natarajan Meghanathan,DeShante C. Johnson and Alexander R. Geoghegan. An Analysis of Software Security Attacks and Mitigation Controls. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  4. Igor Botian. Software Security Vulnerabilities in Mobile Peer-to-peer Environment. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.

Дополнительные результаты

  1. Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с.
  2. Data Privacy Management and Autonomous Spontaneus Security: 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, ... Computer Science / Security and Cryptology). – М.: , 2012. – 334 с.
  3. Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  4. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с.
  5. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 515 с.
  6. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с.
  7. April Kelly. Spaghetti on the Wall: Branding and Networking Methods that Stick. – М.: , 2012. – 216 с.
  8. Jeffrey C. Hooke. Security Analysis on Wall Street. – М.: , 0. – 0 с.
  9. Fred D. Wilshusen, Carina Y. Enhada, Cheri Turnage Gatlin, American Bar Association Forum on the Construction Industry. Fundamentals of Construction Law. – М.: , 0. – 0 с.
  10. Twentieth Century Fund/Century Foundation, Century Foundation Task Force on the Future of Unions. What's Next for Organized Labor?: Report of the Century Foundation Task Force on the Future of Unions. – М.: , 0. – 0 с.
  11. Margaret Wheatley, Paula Griffin, Kristine Quade, National OD Network. Organization Development at Work: Conversations on the Values, Applications, and Future of OD (J-B O-D (Organizational Development)). – М.: Pfeiffer, 2003. – 224 с.
  12. Anne O. Krueger, Chonira Aturupane, Conference on the World Trade Organization As an International Institu. The Wto As an International Organization. – М.: , 0. – 0 с.
  13. John F. Ermisch. An Economic Analysis of the Family. – М.: , 0. – 0 с.
  14. Ian R. Bowler, C. R. Bryant, C. Cocklin, Chris Cocklin, International Geographical Union Commission on the Sustainability of R. The Sustainability of Rural Systems - Geographical Interpretations. – М.: , 0. – 0 с.
  15. Pam Lassiter. The New Job Security. – М.: , 0. – 0 с.
  16. Richard Aston. Electrical Circuit Analysis Using the TI-85 or TI-86. – М.: , 0. – 0 с.
  17. Robert E. Litan, Alice M. Rivlin, The Brookings Task Force on the Internet. The Economic Payoff from the Internet Revolution. – М.: , 0. – 0 с.
  18. Richard H. Steinberg, Bruce Stokes, Berkeley Roundtable on the International Economy, Council on Foreign Relations. Partners or Competitors?. – М.: , 0. – 0 с.
  19. R. F. Ellen, Roy Ellen. On the Edge of the Banda Zone: Past and Present in the Social Organization of a Moluccan Trading Network. – М.: , 0. – 0 с.
  20. Dag Harald Claes, Dag Harald Claes ARENA: Advanced Research on the Europeanisation of the Nation-State. The Politics of Oil-Producer Cooperation. – М.: , 0. – 0 с.
  21. National Research Council and Institute of Medicine, Committee on the Health and Safety Implications of Child Labor. Protecting Youth at Work: Health, Safety, and Development of Working Children and Adolescents in the United States. – М.: , 0. – 0 с.
  22. Philip C. Abrami, Paul Cholmsky, Robert Gordon. Statistical Analysis for the Social Sciences: An Interactive Approach. – М.: , 0. – 0 с.
  23. International Conference on the Conduct of Monetary Policy, Jin-Lung Lin, Jia-Dong Shea, Chung-Shu Wu, Gerald P., Jr. Dwyer, Gerald P. Dwyer. Monetary Policy and Taiwan's Economy (Academia Studies in Asian Economies Series). – М.: , 0. – 0 с.
  24. Time to take control : The impact of change on corporate computer systems. – М.: , 0. – 0 с.
  25. Chun Wei Choo, Brian Detlor, Don Turnbull. Web Work: Information Seeking and Knowledge Work on the World Wide Web (Information Science & Knowledge Management). – М.: , 0. – 0 с.
  26. Risk Analysis and the Security Survey. – М.: , 0. – 0 с.
  27. James R. Lincoln, Michael L. Gerlach. The Evolution of Japan's Network Economy: A Structural Perspective on Industrial Change (STRUCTURAL ANALYSIS IN THE SOCIAL SCIENCES). – М.: , 0. – 0 с.
  28. Daniel, Md Farb, Bruce Gordon, Daniel Farb. Internet Searches Manual and CD: Computer Skills Development Program on the Use of the Internet for Optimal Searching, With an Emphasis on Healthcare, Pharmaceuticals, and Sales. – М.: , 0. – 0 с.
  29. Workshop on the Life of a Process Model--From Conception to Action, S. Macchietto, S. P. Asprey. Dynamic Model Development: Methods, Theory and Applications (Computer-Aided Chemical Engineering). – М.: , 0. – 0 с.
  30. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с.
  31. Michal Pioro, Deepankar Medhi. Routing, Flow, and Capacity Design in Communication and Computer Networks. – М.: Elsevier Digital Press, 0. – 794 с.
  32. Committee on Federal Regulation of Securities Committee. The Fund Director's Guidebook: Third Edition (Fund Director's Guidebook). – М.: , 2006. – 128 с.
  33. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с.
  34. Based on the Occupational Outlook Handbo. Top 300 Careers: Your Complete Guideboook to Major Jobs in Every Field (America's Top 300 Jobs). – М.: , 2006. – 766 с.
  35. National Center on Education and the Economy. Tough Choices or Tough Times: The Report of the New Commission on the Skills of the American Workforce. – М.: , 2006. – 208 с.
  36. Gunilla Bradley. Social and Community Informatics: Humans on the Net. – М.: , 2006. – 265 с.
  37. Research Program on the Social Aspects of HIV/AIDS and Health. A Comparative Analysis of the Financing of HIV/AIDS Programs: in Botswana, Lesotho, Mozambique, South Africa, Swaziland and Zimbabwe. – М.: , 2005. – 72 с.
  38. Gunilla Bradley. SOCIAL AND COMMUNITY INFORMATICS: HUMANS ON THE NET. – М.: , 2006. – 280 с.
  39. Intrusion Detection Systems (Advances in Information Security). – М.: , 2008. – 250 с.
  40. House of Commons - Select Committee on the Modernisation of the House of Commons. Regional Accountability (Hc 282, Third Report of Session 2007-08 - Report, Together With Formal Minutes, Oral and Written Evidence). – М.: , 2008. – 161 с.
  41. The Transition Network, Gail Rentsch. Smart Women Don't Retire -- They Break Free: From Working Full-Time to Living Full-Time. – М.: , 2008. – 272 с.
  42. Computer & Network Procedures to Manage IT Systems. – М.: , 2008. – 720 с.
  43. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с.
  44. Daniel Clark. Network Access Control 100 Success Secrets - 100 Most Asked NAC Questions on Implementation and Deployment of unify endpoint security technology, user ... and network security enforcement. – М.: , 2008. – 180 с.
  45. Richard Schiere. China's Development Challenges: Economic Vulnerability and Public Sector Reform (Routledge Studies on the Chinese Economy). – М.: , 2010. – 176 с.
  46. Rick Spair. The Simple Twitter Guide & Other Social Networks Available: Easy Tips And Techniques for Using Twitter to Promote Your Business On the Internet (Volume 1). – М.: , 2010. – 58 с.
  47. Jeff Crume. Inside Internet Security: What Hackers Don't Want You To Know. – М.: , 0. – 0 с.
  48. Eskinder Gidey, Arega Bazezew. Drought Vulnerability: Analysis of Drought Vulnerability and Its Effects on Agricultural Production. – М.: , 2012. – 112 с.
  49. Protein-p Interactions and Networks: Identification, Computer Analysis, and Prediction (Computational Biology). – М.: , 2008. – 220 с.
  50. Committee on the Significance of International Transport of Air Pollutants, National Research Counci. Global Sources of Local Pollution: An Assessment of Long-Range Transport of Key Air Pollutants to and from the United States. – М.: , 2010. – 225 с.
  51. Sarp Yeletay?i. A Risk Analysis on the Continuity of the Petroleum Supply Chain: using GIS and Systems Simulation. – М.: , 2010. – 336 с.
  52. Jeanna Matthews. Computer Networking. – М.: , 2005. – 288 с.
  53. Steve Manzuik. Network Security Assessment: From Vulnerability to Patch. – М.: , 2010. – 500 с.
  54. L.J. Balk. Proceedings of the 11th European Symposium on the Reliability of Electron Devices, Failure Physics and Analysis. – М.: , 2010. – 0 с.
  55. L.J. Balk. Proceedings of the 11th European Symposium on the Reliability of Electron Devices, Failure Physics and Analysis. – М.: , 2010. – 0 с.
  56. Russ Rogers. Network Security Evaluation Using the NSA IEM. – М.: , 2010. – 450 с.
  57. Ajit Sadana. Fractal Analysis of the Binding and Dissociation Kinetics for Different Analytes on Biosensor Surfaces. – М.: , 2010. – 372 с.
  58. M E Sereno. Neural Computation of Pattern Motion – Modeling Stages of Motion Analysis in the Primate Visual Cortex. – М.: , 2009. – 192 с.
  59. Fay Sudweeks. Network & Netplay – Virtual Groups on the Internet. – М.: , 1998. – 330 с.
  60. Thomas W. Madron. Network Security in the 90?s. – М.: , 1992. – 304 с.
  61. Jeffrey C. Hooke. Security Analysis on Wall Street. – М.: , 1999. – 512 с.
  62. Granino A. Korn. Neural Networks & Fuzzy–Logic Control on Personal Computers & Workstations + D3. – М.: , 1995. – 304 с.
  63. TL LOQUERY. Laquey: The Users Directory Of Computer ?networks? (pr Only). – М.: , 1990. – 646 с.
  64. John R Koza. Genetic Programming – On the Programming of Computers by Means of Natural Selection Pt 1. – М.: , 1993. – 836 с.
  65. JS QUARTERMAN. Quarterman: The ?matrix?: Computer Networks & Conferencing Systems Worldwid (pr Only). – М.: , 1989. – 752 с.
  66. Jeffrey C. Hooke. Security Analysis on Wall Street. – М.: , 1998. – 448 с.
  67. S MUFTIC. Muftic: ?security? Mechanisms For Computer Network S. – М.: , 1989. – 196 с.
  68. U PANKOKE–BABATZ. Pankoke–babatz: ?computer? Based Group Communtcati On –the Amigo Activity Model. – М.: , 1989. – 320 с.
  69. Erika de Wet. The Chapter VII Powers of the United Nations Security Council. – М.: , 2011. – 432 с.
  70. Granino A. Korn. Korn: Neural Network Experiments On Personal Computers & Workstations (pr Only). – М.: , 1991. – 264 с.
  71. Albert P.s.o.c. Psychoanalytic Study of the Child V56 – Special Section on Changes in Technique in Child Analysis since the Publication of ?Normality & Pathology?. – М.: , 2002. – 420 с.
  72. Juan Pablo Bonta. American Architects & Texts – A Computer Aided Analysis of the Literature. – М.: , 1996. – 444 с.
  73. Wireless Network Security A Beginners Guide. – М.: , 2011. – 400 с.
  74. Network Security: The Complete Reference. – М.: , 2011. – 896 с.
  75. Fundamentals Of Network Security. – М.: , 2011. – 672 с.
  76. Eric Maiwald, Eric Maiwald. Fundamentals of Network Security. – М.: , . –  с.
  77. Bang on the Door!. Funky Fashion Designer. – М.: , 2005. – 24 с.
  78. Shatha Assaad,Adil Ghassan and Ahlam Jameel. On the Volume and Integral Points of a Polyhedron in Rn. – М.: LAP Lambert Academic Publishing, 2011. – 124 с.
  79. Fatema Ahmed Sadeq and Shatha Assaad Salman. On the volume of a polytope in Rn. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  80. Shaek Rana Mohammad Baki Billah and Mohammad Hafizur Rahman. Design & Development of Network Security System using IP Tables. – М.: LAP Lambert Academic Publishing, 2013. – 164 с.
  81. Karel Kocian. Analysis of Traffic Accidents on the Speedway R46. – М.: LAP Lambert Academic Publishing, 2013. – 128 с.
  82. Uwakwe Chukwu. Assessment of the Impact of V2G on Distribution System. – М.: LAP Lambert Academic Publishing, 2012. – 404 с.
  83. Michele Gallo. MIMO Technology applied to On Body Wireless Networks. – М.: Scholars' Press, 2014. – 196 с.
  84. Julius Olujimi. Effects of Facilities on the Rental Value of Properties in Nigeria. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  85. Pattama Suphunnakul. SOCIAL NETWORK ANALYSIS: ANTI – DRUG ADDICTION NETWORKS THAILAND. – М.: LAP Lambert Academic Publishing, 2010. – 124 с.
  86. Adamu Usman. Cost-Benefit Analysis of Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  87. Gurunadh Velidi,Sharma Mbbsr and Ugur Guven. The Exergy Analysis On A Natural Gas Based Combined Cycle Power Plant. – М.: LAP Lambert Academic Publishing, 2012. – 124 с.
  88. Muhammad Sajjad Hossain. Analysis on MHD Free Convection Flow Within Trapezoidal Enclosures. – М.: LAP Lambert Academic Publishing, 2014. – 72 с.
  89. Alexander Lozovskiy. NUMERICAL ANALYSIS OF THE AERODYNAMIC NOISE PREDICTION IN DNS AND LES. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  90. Satyendra Singh Narwaria. Geography as a factor to the Environment Security of Bangladesh. – М.: LAP Lambert Academic Publishing, 2014. – 128 с.
  91. Charles Mubita. Africa's Demand for a Permanent Seat on the UN Security Council. – М.: LAP Lambert Academic Publishing, 2012. – 132 с.
  92. Heba Negm. The Middle East Security: A Critical Multi-Level Analysis. – М.: LAP Lambert Academic Publishing, 2010. – 128 с.
  93. Mengistu Kefale. Time Series Analysis on Price and rainfall pattern of Bahir Dar, Ethiopia. – М.: LAP Lambert Academic Publishing, 2010. – 64 с.
  94. Urmila Pyakurel. On the Solvability of Open Shop Scheduling Problems. – М.: LAP Lambert Academic Publishing, 2011. – 108 с.
  95. Andrew Miller. An Analysis on the Legality of Israeli and American Policies. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  96. Joseph Nasongo and Lydiah Wamocha. A Critical Analysis Of Views On The Ideal Education For Africa. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  97. Ashit Kumar Dutta and Abdul Rahaman Wahab Sait. Computer Networks from Scratch. – М.: LAP Lambert Academic Publishing, 2013. – 324 с.
  98. Meftah Ur Rahman,Md. Imran Hossain and Sheikh Neyamat. A Comparative Analysis among Different Routing Protocols with QoS. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  99. Ammisetty Veeraswamy and Ammisetty Mahesh Babu. Introduction to Computer Networks. – М.: LAP Lambert Academic Publishing, 2012. – 208 с.
  100. Torruam Japheth Terande. Introduction to computer networking. – М.: LAP Lambert Academic Publishing, 2012. – 144 с.
  101. Layth A. Hassnawi,R. B. Ahmad and Mario Kabbour. Routing In Motorway Surveillance System Based On Ad Hoc Camera Network. – М.: LAP Lambert Academic Publishing, 2013. – 68 с.
  102. Xiaodong He. Automated intrusion prevention mechanism in enhancing network security. – М.: Scholars' Press, 2014. – 128 с.
  103. Zhiyang Guo. On the Design of High Performance Data Center Networks. – М.: Scholars' Press, 2015. – 204 с.
  104. Syed Zahidur Rashid. Computer Network Security Monitoring. – М.: Scholars' Press, 2015. – 284 с.
  105. Chakchai So-In. Resource Allocation and Management in Computer Networks. – М.: LAP Lambert Academic Publishing, 2011. – 212 с.
  106. Mehmud Abliz. Denial of Service in Computer Networks. – М.: LAP Lambert Academic Publishing, 2011. – 84 с.
  107. Sourav Mukherjee and Bibhudatta Sahoo. FPGA Based Network Security Architecture for High Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  108. Aaron Tureau. Evaluations of Synchronization Loss Equations on High-Speed Networks. – М.: LAP Lambert Academic Publishing, 2011. – 60 с.
  109. Adil Adil Nazir Malik. Modeling and Simulation of computer Network Using OPNET. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  110. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  111. Mahmoud Jazzar. Computer Network Intrusion Detection. – М.: LAP Lambert Academic Publishing, 2013. – 240 с.
  112. Soke Onyemelukwe. On-Demand Routing and Security in Mobile Ad-hoc Networks. – М.: LAP Lambert Academic Publishing, 2013. – 128 с.
  113. Vincent Omollo. Enhanced Network Security. – М.: LAP Lambert Academic Publishing, 2013. – 76 с.
  114. Firkhan Ali Hamid Ali. Vulnerability Analysis on the Computer Network Security. – М.: LAP Lambert Academic Publishing, 2010. – 72 с.
  115. Er. Surajit Borah. A Study Of Computer Networking At IOCL(AOD), Digboi(India). – М.: LAP Lambert Academic Publishing, 2011. – 64 с.
  116. Natarajan Meghanathan,DeShante C. Johnson and Alexander R. Geoghegan. An Analysis of Software Security Attacks and Mitigation Controls. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  117. Deniz Akkaya and Fabien Thalgott. Honeypots in Network Security. – М.: LAP Lambert Academic Publishing, 2012. – 64 с.
  118. M. Elena Martinez-Perez. Computer Analysis of the Geometry of the Retinal Vasculature. – М.: LAP Lambert Academic Publishing, 2011. – 192 с.
  119. Qusay Ishaq. A framework based on the Cloud Computing Technology. – М.: LAP Lambert Academic Publishing, 2012. – 144 с.
  120. Lidong Bing and Wai Lam. Information Discovery from Semi-structured Record Sets on the Web. – М.: LAP Lambert Academic Publishing, 2014. – 124 с.
  121. Manasi Sapre and Nita Parekh. Topological Analysis of Air Transportation Networks. – М.: LAP Lambert Academic Publishing, 2012. – 116 с.
  122. Dirk Lessner. Network Security for Embedded Systems. – М.: LAP Lambert Academic Publishing, 2009. – 232 с.
  123. Matthieu Rivain. On the Physical Security of Cryptographic Implementations. – М.: LAP Lambert Academic Publishing, 2014. – 232 с.
  124. Nathan Darmawan. Shielding Your Company with a Better Network Security Design. – М.: LAP Lambert Academic Publishing, 2010. – 180 с.
  125. Emilio Serrano,Juan A. Botia and Jose M. Cadenas. Advancing the state of the art in the analysis of multi-agent systems. – М.: LAP Lambert Academic Publishing, 2011. – 208 с.
  126. Wei Gao,Tianwei Xu and Yungang Zhang. Some Topics on the Sparsity and Vulnerability of Ontology. – М.: LAP Lambert Academic Publishing, 2014. – 60 с.
  127. Iona Carina. Music Piracy Culture on the Internet. – М.: LAP Lambert Academic Publishing, 2012. – 128 с.
  128. Navneet kaur Bajwa. Sanitization of Data in Computer Network. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  129. Palanivel Kodeswaran. On the Use of Context and Policies in Declarative Networked Systems. – М.: LAP Lambert Academic Publishing, 2012. – 112 с.
  130. Francesco Pagano. A Distributed Approach to Privacy on the Cloud. – М.: LAP Lambert Academic Publishing, 2013. – 216 с.
  131. G. L. Meena and D. K. Jain. Impact of Dairy Cooperatives on the Economy of Rural Households. – М.: LAP Lambert Academic Publishing, 2011. – 124 с.
  132. Gorkem Yaz?c?oglu. An Analysis on US Sub-Prime Mortgage Crisis. – М.: LAP Lambert Academic Publishing, 2011. – 100 с.
  133. Hafez Abdo and Matthew Vellacott. The Role of Deepwater Oil Drilling in the US Energy Security. – М.: LAP Lambert Academic Publishing, 2010. – 140 с.
  134. Milton Gadina. The impact of HIV/AIDS on the Human Security of Households in Bulawayo. – М.: LAP Lambert Academic Publishing, 2013. – 100 с.
  135. Amsalu Mitiku Bora. The Impact of Food Price Inflation on Rural Households' Food Security. – М.: LAP Lambert Academic Publishing, 2012. – 124 с.
  136. Marcellin Mugabe. The Total Cost of Ownership (TCO) of Computer Networks in Colleges. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  137. Fares G. Khalil. The Social Networks Behind CSR Identity. – М.: LAP Lambert Academic Publishing, 2013. – 288 с.
  138. Ishak Mesic. Comparative Analysis of the World Trade. – М.: LAP Lambert Academic Publishing, 2015. – 80 с.
  139. Jesus Puente Trevino. The 1994 Mexican Financial Crisis. – М.: Scholars' Press, 2014. – 92 с.
  140. Monday Ahmed. Effect of Income Inequality on the food security. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Займы для корпораций: back to the Russia. Т. Мартынова, "Банковское обозрение", № 11, ноябрь 2007.
  2. Как в детском пазле. интервью с И. Смелянским, директором московского офиса компании The Boston Consulting Group. М. Тальская, "БДМ. Банки и деловой мир", N 3, март 2012 г.
  3. Back side of the moon, или темная сторона поведения персонала. интервью с Н. Русаковой, директором по персоналу ОАО "Хлебпром", А. Сукачёвым, директором "Торговой компании АС", Н. Харитоновой, руководителем службы персонала тверской компании ЗАО "ДКС". А. Колесникова, Т. Тюрина, С.  Машарипов, "Управление персоналом", N 16, август 2010 г.
  4. Критика on-line. интервью с О. Киселевой, руководителем компании World Gym Consulting. С. Сипатов, "Управление персоналом", N 14, июль 2010 г.
  5. On-line коммуникации: от классики до web 2.0-технологий. И. Широкова, "Ремедиум", № 7, июль 2010.
  6. Цены под контролем: the present and the future. С. Стройкова, И. Леметюйнен, "Консультант", № 19, сентябрь 2009.
  7. Основной арсенал "охотника" - его network: кого он знает на рынке и качество этих отношений. С. Плетнева, "Управление персоналом", № 12, июнь 2009.
  8. Когда бизнес и власть встретятся on-line?. И. Пискун, "Московский бухгалтер", № 8, апрель 2009.
  9. Новая упрощенная процедура рассмотрения мелких исков в Евросоюзе - the european small claims procedure. escp. Н.В. Сивак, "Законодательство", № 2, февраль 2009.
  10. Сдача отчетности on-line: прогресс налицо. М. Дудко, "Консультант", № 13, июль 2008.
  11. On-line рекрутмент. интервью с О. Бруковской, директором по маркетингу и PR группы компаний HeadHunter, А. Куракиным, заместителем генерального директора ООО "РДВ-медиа-групп", Я. Топорковым, директором по связям с общественностью ООО "СуперДжоб", С. Сторожевым, руководителем проектов Joblist и 100 Работ. "Управление персоналом", № 7, апрель 2008.

Образцы работ

Тема и предметТип и объем работы
Анализ финансового состояния предприятия
Анализ хозяйственной деятельности
Диплом
188 стр.
Кривые безразличия и модель оптимизации народного хозяйства В. Парето
Экономическая теория
Реферат
19 стр.
Анализ финансового состояния предприятия и пути предотвращения несостоятельности (банкротства) на примере ООО "***"
Анализ хозяйственной деятельности
Диплом
114 стр.
Продвижение брендов в шоу-бизнесе
Электроснабжение городов и промышленных предприятий
Диплом
79 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Татьяна
Диплом после вашего сопровождения научный руководитель проверила в общем всё отлично.