Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Aviel D. Rubin. Web Security Sourcebook. – М.: , 1997. – 368 с.

Дополнительные результаты

  1. Francis Groves. Corporate Actions - A Concise Guide: An introduction to securities events. – М.: , 2012. – 230 с.
  2. Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с.
  3. Bettina Thurnher. Usability bei Web-Applikationen: Eine Empfehlung fur anwenderfreundliche Prozessbeschreibungen (German Edition). – М.: , 2012. – 160 с.
  4. Data Privacy Management and Autonomous Spontaneus Security: 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, ... Computer Science / Security and Cryptology). – М.: , 2012. – 334 с.
  5. Security and Privacy in Mobile Information and Communication Systems: Third International ICST Conference, MOBISEC 2011, Aalborg, Denmark, May 17-19, ... and Telecommunications Engineering). – М.: , 2012. – 195 с.
  6. Web Services and Formal Methods: 8th International Workshop, WS-FM 2011, Clermont-Ferrand, France, September 1-2, 2011, Revised Selected Papers ... / Programming and Software Engineering). – М.: , 2012. – 152 с.
  7. Constructive Side-Channel Analysis and Secure Design: Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings ... Computer Science / Security and Cryptology). – М.: , 2012. – 280 с.
  8. Public Key Infrastructures, Services and Applications: 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected ... Computer Science / Security and Cryptology). – М.: , 2012. – 219 с.
  9. Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  10. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с.
  11. William Buchanan. The Handbook of Data & Networks Security. – М.: , 2012. – 1800 с.
  12. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 515 с.
  13. Current Trends in Web Engineering: Workshops, Doctoral Symposium, and Tutorials, Held at ICWE 2011, Paphos, Cyprus, June 20-21, 2011. Revised Selected ... Applications, incl. Internet/Web, and HCI). – М.: , 2012. – 393 с.
  14. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  15. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с.
  16. Smart Card Research and Advanced Applications: 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, ... Computer Science / Security and Cryptology). – М.: , 2012. – 357 с.
  17. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с.
  18. Online Business All-In-One For Dummies. – М.: , 2012. – 704 с.
  19. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с.
  20. Mukhiya Gurung (Mike G.). Power of Web Marketing: Key Strategies To Grow Your Business Online. Your Customers Are Looking For You Online... Can They Find You?. – М.: , 2012. – 74 с.
  21. Security and Development in Global Politics: A Critical Comparison. – М.: , 2012. – 360 с.
  22. Joseph F. Stenken JD CLU ChFc. Social Security & Medicare Facts 2012. – М.: , 2012. – 451 с.
  23. Advances in Electronic Commerce, Web Application and Communication: Volume 2 (Advances in Intelligent and Soft Computing). – М.: , 2012. – 640 с.
  24. Mr. John M Cassidy Jr. What Is Web Analytics And How To Get Started: An Introduction To The Web Analytics Process. – М.: , 2012. – 198 с.
  25. Waqar Nadeem, Ijaz. A Qureshi, Jari Salo. Technology Acceptance in Motorcycle Retail Industry: An Inclination Towards Adaption of Web 2.O. – М.: , 2012. – 84 с.
  26. J. Bruce Jones. How to Stand Out Online: Simple Techniques to be Found Online Using Social Media and the Web. – М.: , 2012. – 34 с.
  27. Luis Lobo-Guerrero. Insuring Security: Biopolitics, security and risk. – М.: , 2012. – 178 с.
  28. Paul Hill. The Panic Free Job Search: Unleash the Power of the Web and Social Networking to Get Hired. – М.: , 2012. – 256 с.
  29. CCH Editorial Staff. Social Security Explained 2012. – М.: , 2012. – 298 с.
  30. Andre Bender. Modell eines idealisierten Kampagnenprozesses fur virales Marketing: Identifikation und Analyse der Einfluss- & Erfolgsfaktoren epidemischer Informationsverbreitung im Social Web (German Edition). – М.: , 2012. – 100 с.
  31. Terrorism and the Olympics: Major Event Security and Lessons for the Future. – М.: , 2012. – 272 с.
  32. Sheila R Ronis. Economic Security: Neglected Dimension of National Security?. – М.: , 2012. – 128 с.
  33. Denise Garcia. Disarmament Diplomacy and Human Security: Regimes, Norms and Moral Progress in International Relations. – М.: , 2012. – 0 с.
  34. Securities Compliance Index. Securities Compliance Index, Second Edition: A Topical Guide To U.S. Securities Regulation. – М.: , 2012. – 512 с.
  35. American Bar Association, Thomas Lee Hazen. Securities Regulation: Corporate Counsel Guides. – М.: , 2012. – 540 с.
  36. Lionel Martellini, Philippe Priaulet, StA©phane Priaulet. Fixed-Income Securities : Valuation, Risk Management and Portfolio Strategies (The Wiley Finance Series). – М.: , 0. – 0 с.
  37. Jeffrey C. Hooke. Security Analysis on Wall Street. – М.: , 0. – 0 с.
  38. Martin Stone, Spencer Strauss. Secure Your Financial Future Investing in Real Estate. – М.: , 0. – 0 с.
  39. William Rini. Fundamentals of the Securities Industry. – М.: , 0. – 0 с.
  40. Frank J. Fabozzi, John N. Dunlevy, Frank J. Fabozzi, John N. Dunlevy. Real Estate Backed Securities. – М.: , 0. – 0 с.
  41. David F. Teitelbaum. The Procrastinator's Guide to Financial Security: How Anyone Over 40 Can Still Build a Strong Portfolio--and Retire Comfortably. – М.: , 0. – 0 с.
  42. Giorgio S. Questa. Fixed Income Analysis for the Global Financial Market: Money Market, Foreign Exchange, Securities, and Derivatives. – М.: Wiley, 1999. – 368 с.
  43. Bambi Holzer. Retire Rich : The Baby Boomer's Guide to a Secure Future. – М.: , 0. – 0 с.
  44. Peter A. Diamond. Taxation, Incomplete Markets, and Social Security (Munich Lectures). – М.: , 0. – 0 с.
  45. William T. Moore. Real Options and Option-Embedded Securities. – М.: , 0. – 0 с.
  46. Daniel Singer, Douglas Ross, Albert Avery, Daniel Singer, Douglas Ross, Albert Avery. Successful Web Portals in Retail Banking. – М.: , 0. – 0 с.
  47. Marilyn Greenstein, Todd M. Feinman. Electronic Commerce: Security Risk Management and Control. – М.: , 0. – 0 с.
  48. Paul Shaw. E-Business Privacy and Trust: Planning and Management Strategies. – М.: , 0. – 0 с.
  49. Kenneth S. Hackel, Joshua Livnat. Cash Flow and Security Analysis. – М.: , 0. – 0 с.
  50. Sue Spielman, Liz Winfeld. The Web Conferencing Book: Understanding the Technology, Choose the Right Vendors, Software, and Equipment, Start Saving Time and Money Today. – М.: , 0. – 0 с.
  51. Julia Lowell, C. R. Neu, Daochi Tong, National Defense Research Institute, National Security Research Institute. Financial Crises and Contagion in Emerging Market Countries. – М.: , 0. – 0 с.
  52. Mary Pat McCarthy, Stuart Campbell. Security Transformation: Digital Defense Strategies to Protect your Company's Reputation and Market Share. – М.: , 0. – 0 с.
  53. Joseph S. Nye, William A. Owens, James R. Schlesinger, R. James Woolsey, James A. Lewis, Joseph S., Jr. Nye, James Andrew Lewis, Erin Schlather, Csis Commission on Technology Security in the Twenty-First Century. Computer Exports and National Security: New Tools for a New Century : A Report of the Csis Commission on Technology Security in the 21St-Century (Csis Panel Reports.). – М.: , 0. – 0 с.
  54. Student Services, Sourcebooks. The B Student's Complete Scholarship Book. – М.: , 0. – 0 с.
  55. Thomas Erl. Service-Oriented Architecture: A Field Guide to Integrating XML and Web Services. – М.: Prentice Hall, 2004. – 560 с.
  56. Jothy Rosenberg and David Remy. Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption. – М.: Sams, 2004. – 380 с.
  57. Peter Ladka. ASP.NET for Web Designers. – М.: , 0. – 0 с.
  58. Roberta Bragg. MCSE Training Guide (70-220): Windows 2000 Network Security Design, Second Edition. – М.: , 0. – 0 с.
  59. Marian Quigley, Marian Quiqley. Information Security and Ethics: Social and Organizational Issues. – М.: , 0. – 0 с.
  60. Peter Varhol. Implementing a World Wide Web Site for Your Organization. – М.: , 0. – 0 с.
  61. Bhavani Thuraisingham. Web Data Management and Electronic Commerce. – М.: , 0. – 0 с.
  62. Jonathan S. Held, John R. Bowers. Securing E-Business Applications and Communications. – М.: , 0. – 0 с.
  63. Anup K. Ghosh. E-Commerce Security and Privacy. – М.: , 0. – 0 с.
  64. Kurt Bauknecht, Sanjay Kumar Madria, Gunther Pernul, G. Pernul, International Conference on Electronic Commerce and Web Technologies 2. Electronic Commerce and Web Technologies: First International Conference, Ec-Web 2000, London, Uk, September 4-6, 2000 Proceedings (Lecture Notes in Computer Science, 1875). – М.: , 0. – 0 с.
  65. Vesna Hassler. Security Fundamentals for E-Commerce (Artech House Computer Security Series). – М.: , 0. – 0 с.
  66. Debra Cameron. The World Wide Web: Strategies and Opportunities for Business. – М.: , 0. – 0 с.
  67. Simson Garfinkel, Gene Spafford. Web Security & Commerce (O'Reilly Nutshell). – М.: , 0. – 0 с.
  68. Rickland Hollar. Enterprise Web Services Security (Internet Series). – М.: , 2005. – 432 с.
  69. Committee on Federal Regulation of Securities Committee. The Fund Director's Guidebook: Third Edition (Fund Director's Guidebook). – М.: , 2006. – 128 с.
  70. Frank Fabozzi. The Handbook of Fixed Income Securities. – М.: McGraw-Hill, 2005. – 1500 с.
  71. Mehdi Khosrow-Pour. Web Technologies for Commerce and Services Online. – М.: Idea Group Reference, 2007. – 392 с.
  72. Ellen Hodgson Brown. Web of Debt: The Shocking Truth About Our Money System and How We Can Break Free. – М.: , 2008. – 530 с.
  73. Amanda Spink. Handbook of Web Log Analysis (Handbook of Research On...). – М.: , 2008. – 628 с.
  74. Meridian Securities Market. World Stock Exchange Fact Book. – М.: , 2008. – 0 с.
  75. E-Commerce and Web Technologies: 9th International Conference, EC-Web 2008 Turin, Italy, September 3-4, 2008, Proceedings (Lecture Notes in Computer Science). – М.: , 2008. – 145 с.
  76. CompTIA Security+: Certification Kit (комплект из 3 книг + 2 CD-ROM). – М.: Sybex, 2009. – 1440 с.
  77. Bob LeVitus, Jeff Evans. WebMaster Windows: How to Build Your Own World Wide Web Server Without Really Trying (+ CD-ROM). – М.: AP Professional, 1997. – 512 с.
  78. Jeffrey C. Hooke. Security Analysis and Business Valuation on Wall Street + Companion Web Site: A Comprehensive Guide to Today's Valuation Methods. – М.: Wiley, 2010. – 408 с.
  79. Р.М. Ганеев. Проектирование интерактивных Web-приложений. Учебное пособие. – М.: Горячая Линия - Телеком, 2001. – 272 с.
  80. Security Analysis and Business Valuation on Wall Street + Companion Web Site. – М.: , 2010. – 432 с.
  81. John Paul Mueller. NET Development Security SolutionsTM. – М.: , 2003. – 472 с.
  82. Michael Cross. Developer's Guide to Web Application Security. – М.: , 2010. – 500 с.
  83. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с.
  84. Simson Garfinkel. Web Security & Commerce. – М.: , 1997. – 506 с.
  85. Microsoft. Web Services Security – Scenarios, Patterns and Implementation Guidance for Web Service Enhancements (WSE) 3.0. – М.: , 2006. – 384 с.
  86. Hadi Nahari. Web Commerce Security. – М.: , 2011. – 600 с.
  87. David Rook. 10 Principles of Secure Web Application Development. – М.: , 2010. – 408 с.
  88. Aviel D. Rubin. Web Security Sourcebook. – М.: , 1997. – 368 с.
  89. Microsoft. Improving Web Application Security – Threats and Countermeasures. – М.: , 2003. – 960 с.
  90. Ian S. Graham. XHTML 1.0 Web Development Sourcebook. – М.: , 2000. – 496 с.
  91. Brian Hope. Web Security Testing Cookbook. – М.: , 2008. – 312 с.
  92. Carlos Curtis Solari. Security in a Web 2.0+ World. – М.: , 2009. – 268 с.
  93. Simson Garfinkel. Web Security, Privacy & Commerce 2e. – М.: , 2001. – 790 с.
  94. Hacking Exposed Web 2.0: Web 2.0 Security Secrets And Solutions. – М.: , 2011. – 258 с.
  95. Applied Sap Bi 7.0 Web Reports: Using Bex Web Analyzer And Web Application Designer. – М.: , 2011. – 512 с.
  96. Small Business Web Sites Made Easy. – М.: , 2011. – 272 с.
  97. Secure Metrics: A Beginners Guide. – М.: , 2011. – 400 с.
  98. Gray Hat Hacking The Ethical Hackers Handbook, 3Rd Edition. – М.: , 2011. – 720 с.
  99. Hacking Exposed Web Applications, 3Rd Edition. – М.: , 2011. – 482 с.
  100. Web Services Security. – М.: , 2011. – 312 с.
  101. Андрей Гарнаев, Сергей Гарнаев. WEB-программирование на Java и JavaScript. – СПб.: БХВ-Петербург, 2005. – 1040 с.
  102. Б.Кришнамурти, Дж. Рексфорд. Web-протоколы. Теория и практика. HTTP/1.1, взаимодействие протоколов, кэширование, измерение трафика. – М.: Бином, 2002. – 592 с.
  103. Игорь Шапошников. Web-сервисы Microsoft .NET. – СПб.: БХВ-Петербург, 2002. – 334 с.
  104. Р.М. Ганеев. Web-интерфейс баз данных ODBC. – М.: Горячая Линия - Телеком, 2002. – 208 с.
  105. Ido Dubrawsky, Jeremy Faircloth, Michael Gregg, Eli Faskha. Security+ Study Guide. – М.: , 2007. – 864 с.
  106. Ido Dubrawsky. How to Cheat at Securing Your Network. – М.: Syngress, 2007. – 432 с.
  107. Ido Dubrawsky. CompTIA Security+ Certification Study Guide, Third Edition: Exam SYO-201 3E. – М.: , 2009. – 752 с.
  108. Eduardo Fernandez-Buglioni. Security Patterns in Practice: Designing Secure Architectures Using Software Patterns. – М.: Wiley, 2013. – 582 с.
  109. Wenhua Wang and Yu Lei. Web Application Testing And Security Testing Techniques Design. – М.: LAP Lambert Academic Publishing, 2011. – 96 с.
  110. Vinav Keshari. Secure Web Service:Encryption. – М.: LAP Lambert Academic Publishing, 2012. – 72 с.
  111. Shaek Rana Mohammad Baki Billah and Mohammad Hafizur Rahman. Design & Development of Network Security System using IP Tables. – М.: LAP Lambert Academic Publishing, 2013. – 164 с.
  112. Ronan O'Driscoll. Internet Controlled Security Robot. – М.: LAP Lambert Academic Publishing, 2014. – 52 с.
  113. Adrian Cioranu. Facilitation versus Security. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  114. Carol Woody. Applying Security Risk Management to Internet Connectivity. – М.: LAP Lambert Academic Publishing, 2009. – 180 с.
  115. Fatimah Abdullahi. Design and Implementation of a Web-Based GIS. – М.: LAP Lambert Academic Publishing, 2012. – 128 с.
  116. Someshwar Gande and Srilatha Rondla. Security Testing for Web Applications in SDLC. – М.: LAP Lambert Academic Publishing, 2013. – 96 с.
  117. Victoria Yemi-Peters. Mobile Banking Security Services. – М.: LAP Lambert Academic Publishing, 2011. – 88 с.
  118. R. Baskaran,M. S. Saleem Basha and A. Balasubramanian. Two Tier Security Framework for Service Oriented Systems. – М.: LAP Lambert Academic Publishing, 2012. – 176 с.
  119. Narayan Ranjan Chakraborty. Analysis of Web security attacks: Bangladesh perspective. – М.: LAP Lambert Academic Publishing, 2012. – 124 с.
  120. Tarek S. Sobh. Effective and Extensive VPN for Securing Web Applications. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  121. Sreedhar G. Methodology for Testing The Web Applications. – М.: LAP Lambert Academic Publishing, 2014. – 72 с.
  122. Seifedine Kadry and Firas Hazzaa. Web-based Voting System Using Fingerprint. – М.: LAP Lambert Academic Publishing, 2013. – 80 с.
  123. Saghar Estehghari. Impact of Client-side Vulnerabilities on Web-based E-voting Systems. – М.: LAP Lambert Academic Publishing, 2011. – 80 с.
  124. Shadi A Aljawarneh. Survivability of Web Content: Theoretical and Practical Approaches. – М.: LAP Lambert Academic Publishing, 2012. – 240 с.
  125. Md. Hamidul Islam. Security Issues of Web Applications in Asp.Net Platform. – М.: LAP Lambert Academic Publishing, 2012. – 92 с.
  126. Mohammed Firdos Alam Sheikh. Improving Web Security by Blocking SQL Injection Attack(SQLIA). – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  127. Haruna Isah. Full Data Controlled Web Based Feed Aggregator. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  128. Amos Omamo. The effectiveness of IDPS's in enhancing database security. – М.: LAP Lambert Academic Publishing, 2012. – 88 с.
  129. Milan Senesi. Web systems security testing. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  130. Silvance Onyango Abeka. Determinants for acceptance of web based marketing information systems. – М.: LAP Lambert Academic Publishing, 2013. – 196 с.
  131. Muhammad Qaiser Saleem,Jafreezal Jaafar and Mohd Fadzil Hassan. Modeling Security Objectives along BPM of SOA Applications. – М.: LAP Lambert Academic Publishing, 2013. – 236 с.
  132. Komunte Mary and Prof Venansius Baryamureeba. Web Security. – М.: LAP Lambert Academic Publishing, 2010. – 140 с.
  133. Paul Denys. Security of Personal Information in Cloud Computing. – М.: LAP Lambert Academic Publishing, 2012. – 144 с.
  134. Vijayan Prasath. Secure Architecture for Web Service Discovery and Retrieval. – М.: LAP Lambert Academic Publishing, 2012. – 116 с.
  135. Jose Fonseca. Evaluating the [In]security of Web Applications. – М.: LAP Lambert Academic Publishing, 2011. – 408 с.
  136. Haneen Qarabash. An Intranet Based System For Securities Trading. – М.: LAP Lambert Academic Publishing, 2013. – 84 с.
  137. Arpita Mondal. Simple and Secured Access to Networked Home Appliances via Internet. – М.: LAP Lambert Academic Publishing, 2010. – 180 с.
  138. Shih Zoe Chu. Initial online trust formation: the role of web assurance & location. – М.: LAP Lambert Academic Publishing, 2011. – 160 с.
  139. Audu Jonathan Adoga and Fredah I. Agbeje. Introduction to Internet Security for PHP Web Developers. – М.: , 2014. – 52 с.
  140. Kathleen Taylor,Bud E. Smith. Getting a Web Development Job For Dummies. – М.: , 2015. –  с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Web-мастер. "Кадровик. Кадровое делопроизводство", № 12, декабрь 2007.
  2. Об учете расходов на создание web-сайта. Комментарий к письму Минфина России от 12 марта 2006. № 03-03-04/2/54. В.С. Ржаницына, "Финансовые и бухгалтерские консультации", № 5, май 2006.
  3. Как оптимизировать web-сайт фирмы. М. Воскресенский, "Управление персоналом", № 9-10, май 2005.
  4. Создал web-сайт? Учти расходы!. С. Ларина, "Московский бухгалтер", № 1, январь 2005.
  5. Web-сайт организации: бухгалтерский и налоговый учет. И.Э. Гущина, "Финансовые и бухгалтерские консультации", № 1, январь 2005.
  6. Комментарий к письму Минфина РФ от 22 октября 2004. № 07-05-14/280 "О налогообложении затрат на создание web-сайтов". И.И. Иванцов, "Нормативные акты для бухгалтера", № 22, ноябрь 2004.
  7. Медицинская информатика в Web of Science: доля России в мировом публикационном потоке. Н.Г. Куракова, Л.А. Цветкова, "Врач и информационные технологии", № 4, июль-август 2012.
  8. Бюджетная отчетность и Web-технологии. С.В. Юскаева, "Бюджетный учет", N 4, апрель 2012 г.
  9. On-line коммуникации: от классики до web 2.0-технологий. И. Широкова, "Ремедиум", № 7, июль 2010.
  10. Принципы управления Web-отношениями в банке: риск-ориентированный подход. Л.В. Лямин, "Управление в кредитной организации", № 3, май-июнь 2009.
  11. Анализ защищенности web-сайтов: практика проведения. Д. Евтеев, "Финансовая газета. Региональный выпуск", № 9, февраль 2009.
  12. Учет расходов на разработку web-сайта издательства. О.В. Дмитриева, "Бухгалтерский учет в издательстве и полиграфии", № 11, ноябрь 2008.
  13. Анкета соискателя на вакантную должность Web-программиста. "Кадровик. Кадровое делопроизводство", № 8, август 2008.
  14. Учет и налогообложение расходов организации на создание web-сайта. О.Л. Вольхина, "Налоговая политика и практика", № 6, июнь 2008.
  15. Всемирная паутина: www.. World Wide Web. Н. Филина, "Финансовая газета. Региональный выпуск", № 7, февраль 2008.

Образцы работ

Тема и предметТип и объем работы
Особенности виртуального общения
Психология
Курсовая работа
28 стр.
Разработка и формирование эффективной маркетинговой стратегии продвижения
Маркетинг
Диплом
80 стр.
Последствия операции НАТО
Политология
Диплом
80 стр.
Проблемы малого бизнеса
Предпринимательство
Диплом
100 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Анастасия
Хотела бы выразить Вам свою благодарность за проделанную работу. Комиссии очень понравилась диссертация! Вы мне очень помогли!!! Спасибо за терпение и ответственность. Желаю Вам успехов в вашей деятельности!