Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Paul Gerrard, Neil Thompson. Risk Based E-Business Testing. – М.: , 0. – 0 с. Ellen Hodgson Brown. Web of Debt: The Shocking Truth About Our Money System and How We Can Break Free. – М.: , 2008. – 530 с. Alexander Lohr. Measurability of IT/IT-Security: Business process mapping as technical systems. – М.: , 2010. – 56 с. Vivek Chopra, Sing Li, Jeff Genender. Professional Apache Tomcat 6. – М.: Wiley Publishing, Inc, 2007. – 672 с. Gray Hat Hacking The Ethical Hackers Handbook, 3Rd Edition. – М.: , 2011. – 720 с. Ido Dubrawsky, Jeremy Faircloth, Michael Gregg, Eli Faskha. Security+ Study Guide. – М.: , 2007. – 864 с. Ido Dubrawsky. CompTIA Security+ Certification Study Guide, Third Edition: Exam SYO-201 3E. – М.: , 2009. – 752 с. Vivek Chopra, Sing Li, Jeff Genender. Professional Apache Tomcat 6. – М.: Wrox, 2013. – 642 с. Paul Allen, Joseph Bambara. OCM Java EE 6 Enterprise Architect Exam Guide (Exams 1Z0-807, 1Z0-865 & 1Z0-866). – М.: McGraw-Hill Osborne Media, 2014. – 672 с. R. Baskaran,M. S. Saleem Basha and A. Balasubramanian. Two Tier Security Framework for Service Oriented Systems. – М.: LAP Lambert Academic Publishing, 2012. – 176 с. G. Sreedhar. A Set Of Qualitative Measures For Effective Website Design. – М.: LAP Lambert Academic Publishing, 2013. – 84 с. Milan Senesi. Web systems security testing. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Firas Abdullah Thweny Al-Saedi and Mazin Mohammed Radhi Al-Haidary. Design and implementation of Linux based VSAT monitoring system. – М.: LAP Lambert Academic Publishing, 2013. – 100 с. Lwanga Newton Kigingi,Ashaba Justus and Sekibira Rogers. Online Fees Payment System for Makerere University (MUK-OFPS). – М.: LAP Lambert Academic Publishing, 2014. – 72 с. Marco Balduzzi. Automated Measurements of Novel Internet Threats. – М.: LAP Lambert Academic Publishing, 2013. – 120 с. Georgia Weidman. Penetration Testing: A Hands-On Introduction to Hacking. – М.: No Starch Press, 2014. – 528 с. Дополнительные результаты Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с. Smart Card Research and Advanced Applications: 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, ... Computer Science / Security and Cryptology). – М.: , 2012. – 357 с. Securities Compliance Index. Securities Compliance Index, Second Edition: A Topical Guide To U.S. Securities Regulation. – М.: , 2012. – 512 с. Paul Shaw. E-Business Privacy and Trust: Planning and Management Strategies. – М.: , 0. – 0 с. Systems Thinker Newsletter. Making It Happen: Stories from Inside the New Workplace. – М.: , 0. – 0 с. Gerald Kovacich. The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition. – М.: , 0. – 0 с. Sue Spielman, Liz Winfeld. The Web Conferencing Book: Understanding the Technology, Choose the Right Vendors, Software, and Equipment, Start Saving Time and Money Today. – М.: , 0. – 0 с. I NATO Conference on Manpower Planning and Organization Design Stresa, Richard J. Niehaus, Donald T. Bryant, NATO Special Program Panel on Human Factors, NATO Special Program Panel on Systems Science. Manpower Planning and Organization Design. (NATO Conference Series : Ii, Systems Science, 7). – М.: , 0. – 0 с. Crisp Learn Systems. Organizing Your Workspace (Self Study II). – М.: , 0. – 0 с. Board of Governors of the Federal Reserve System. The Federal Reserve System: Purposes & Functions. – М.: , 0. – 0 с. Julia Lowell, C. R. Neu, Daochi Tong, National Defense Research Institute, National Security Research Institute. Financial Crises and Contagion in Emerging Market Countries. – М.: , 0. – 0 с. Ada Decision Systems. Dpl 4.0: Professional Decision Analysis Software : Academic Version. – М.: , 0. – 0 с. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с. Ifip Tc8 & Tc9, Wg8.2 & Wg9.4 Working Conference on Information Systems, Ramiro Montealegre, Angeliki Poulymenakou. Organizational Information Systems in the Context of Globalization: Ifip Tc8 & Tc9/Wg8.2 & Wg9.4 Working Conference on Information Systems Perspective ... ion for Information Processing (Series), 126). – М.: , 0. – 0 с. Computer Security. – М.: , 0. – 0 с. U s Games System. Patton on Leadership: Seventy Motivational Cards for Success. – М.: , 0. – 0 с. Joseph S. Nye, William A. Owens, James R. Schlesinger, R. James Woolsey, James A. Lewis, Joseph S., Jr. Nye, James Andrew Lewis, Erin Schlather, Csis Commission on Technology Security in the Twenty-First Century. Computer Exports and National Security: New Tools for a New Century : A Report of the Csis Commission on Technology Security in the 21St-Century (Csis Panel Reports.). – М.: , 0. – 0 с. Inc Wizdom Systems, Inc. Wizdom Systems. Process Optimization in Home Healthcare: A Step by Step Guide to Understanding and Improving Healthcare Delivery to Home Bound Patients. – М.: , 0. – 0 с. Paul Gerrard, Neil Thompson. Risk Based E-Business Testing. – М.: , 0. – 0 с. Jothy Rosenberg and David Remy. Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption. – М.: Sams, 2004. – 380 с. Jose Nazario, Nazario. Defense and Detection Strategies against Internet Worms. – М.: , 0. – 0 с. Mehdi Khosrow-Pour. Web-Based instructional Learning. – М.: , 0. – 0 с. Elfriede Dustin, Jeff Rashka, Douglas McDiarmid, Jakob Nielson. Quality Web Systems: Performance, Security, and Usability. – М.: , 0. – 0 с. Kurt Bauknecht, Sanjay Kumar Madria, Gunther Pernul, G. Pernul, International Conference on Electronic Commerce and Web Technologies 2. Electronic Commerce and Web Technologies: First International Conference, Ec-Web 2000, London, Uk, September 4-6, 2000 Proceedings (Lecture Notes in Computer Science, 1875). – М.: , 0. – 0 с. Harold F. Tipton, Micki Krause, Micki, Cissp Krause. Information Security Management Handbook, Fifth Edition. – М.: , 0. – 0 с. Simson Garfinkel, Gene Spafford. Web Security & Commerce (O'Reilly Nutshell). – М.: , 0. – 0 с. Dermot McCormack. 10 Technologies Every Executive Should Know. – М.: , 2004. – 0 с. Political Economy of the World-System Conference 2001 Virginia Polyte. Emerging Issues in the 21st Century World-System (Contributions in Economics and Economic History, No. 230). – М.: , 2003. – 0 с. James Jiambalvo. Managerial Accounting. – М.: , 2003. – 0 с. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с. Rickland Hollar. Enterprise Web Services Security (Internet Series). – М.: , 2005. – 432 с. Robert Radvanovsky. Critical Infrastructure. – М.: , 2006. – 336 с. Committee on Federal Regulation of Securities Committee. The Fund Director's Guidebook: Third Edition (Fund Director's Guidebook). – М.: , 2006. – 128 с. John R. Vacca. Guide to Wireless Network Security. – М.: , 2006. – 848 с. James Michael Stewart, Ed Tittel, Mike Chapple. CISSP: Certified Information Systems Security Professional Study Guide. – М.: , 2008. – 841 с. Ellen Hodgson Brown. Web of Debt: The Shocking Truth About Our Money System and How We Can Break Free. – М.: , 2008. – 530 с. Meridian Securities Market. World Stock Exchange Fact Book. – М.: , 2008. – 0 с. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с. Trust, Privacy and Security in Digital Business: 5th International Conference, TrustBus 2008 Turin, Italy, September 1-5, 2008, Proceedings (Lecture Notes in Computer Science). – М.: , 2008. – 205 с. DayMark Safety Systems. True Kitchen Confessions: Infusing DayMark s Passion for Making the World a Safer Place to Eat, Work, & Live. – М.: , 2008. – 116 с. Ronald Hall. Biometrics 100 Most asked Questions on Physiological (face, fingerprint, hand, iris, DNA) and Behavioral (keystroke, signature, voice) Biometrics Technologies, ... Implementation and Performance evaluation. – М.: , 2008. – 176 с. Alexander Lohr. Measurability of IT/IT-Security: Business process mapping as technical systems. – М.: , 2010. – 56 с. Bobrow Test Preparation Services. CliffsNotes® AP Chemistry. – М.: , 2009. – 480 с. Roderick W. Smith. CompTIA Linux+ Study Guide. – М.: , 2010. – 648 с. John R. Vacca. Network and System Security. – М.: , 2010. – 408 с. Michael Cross. Developer's Guide to Web Application Security. – М.: , 2010. – 500 с. Gerald L. Kovacich. The Information Systems Security Officer's Guide. – М.: , 2010. – 361 с. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с. Luis Chaparro. Signals and Systems Online Testing Registration Card. – М.: , 2010. – 0 с. Microsoft. Web Services Security – Scenarios, Patterns and Implementation Guidance for Web Service Enhancements (WSE) 3.0. – М.: , 2006. – 384 с. Future Systems. For Inspiration ONLY. – М.: , 1996. – 128 с. Hadi Nahari. Web Commerce Security. – М.: , 2011. – 600 с. E–SYSTEMS. How To 2000. – М.: , 1997. – 656 с. Software Systems Corp. Thermodynamic Properties. – М.: , 1988. – 112 с. Microsoft. Improving Web Application Security – Threats and Countermeasures. – М.: , 2003. – 960 с. Brian Hope. Web Security Testing Cookbook. – М.: , 2008. – 312 с. O SYSTEM. Hofer Handbook Of Primatology: Systematik–phylogenie–ontogenie. – М.: , 1971. – 0 с. Edward H. Y. Lim, James N. K. Liu, Raymond S.T. Lee. Knowledge Seeker - Ontology Modelling for Information Search and Management: A Compendium (Intelligent Systems Reference Library). – М.: , 2011. – 238 с. Test. Test Title 09/14/93. – М.: , 1993. – 0 с. Microsoft® Office Sharepoint® Server 2007: A Beginner'S Guide. – М.: , 2011. – 625 с. Shon Harris. CISSP All-in-One Exam Guide (+ CD-ROM). – М.: McGraw-Hill Companies, 2010. – 1216 с. How To Do Everything Netbook. – М.: , 2011. – 320 с. Cissp Practice Exams. – М.: , 2011. – 414 с. Operating Systems Demystified. – М.: , 2011. – 400 с. Web Services Security. – М.: , 2011. – 312 с. Atec and Xnet Information Systems. The Internet Watchdog Personal Edition Windows. – М.: , . – с. Ido Dubrawsky, Jeremy Faircloth, Michael Gregg, Eli Faskha. Security+ Study Guide. – М.: , 2007. – 864 с. Laura Taylor. Fisma Certification & Accreditation Handbook. – М.: , 2006. – 498 с. Ido Dubrawsky. CompTIA Security+ Certification Study Guide, Third Edition: Exam SYO-201 3E. – М.: , 2009. – 752 с. Hung Q. Nguyen, Bob Johnson, Michael Hackett, Robert Johnson. Testing Applications on the Web: Test Planning for Mobile and Internet-Based Systems. – М.: Wiley, 2003. – 672 с. Editors at America's Test Kitchen. The America's Test Kitchen DIY Cookbook. – М.: , 2012. – 368 с. Eduardo Fernandez-Buglioni. Security Patterns in Practice: Designing Secure Architectures Using Software Patterns. – М.: Wiley, 2013. – 582 с. Jianbo Liu,Nagaraj Neerchal and Uri Tasch. Lameness Models that use Transformations to Enhance their Performance:. – М.: LAP Lambert Academic Publishing, 2010. – 108 с. Nathanael Gingrich. Field Robotics Power Systems. – М.: LAP Lambert Academic Publishing, 2009. – 80 с. Claudio Talarico. Evaluating Power Consumption of Embedded SoC Designs. – М.: LAP Lambert Academic Publishing, 2009. – 140 с. Wenhua Wang and Yu Lei. Web Application Testing And Security Testing Techniques Design. – М.: LAP Lambert Academic Publishing, 2011. – 96 с. Rafael Zarate-Minano. Optimal Power Flow with Stability Constraints. – М.: LAP Lambert Academic Publishing, 2012. – 272 с. Shaek Rana Mohammad Baki Billah and Mohammad Hafizur Rahman. Design & Development of Network Security System using IP Tables. – М.: LAP Lambert Academic Publishing, 2013. – 164 с. Sadhan Gope. Dynamic Optimal Power Flow with the presence of wind farm. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Trapti Jain. Available Transfer Capability in Electricity Markets. – М.: LAP Lambert Academic Publishing, 2012. – 248 с. Adnan Masood,Adrian Porch and David Barrow. Microwave Resonators for Highly Sensitive Compositional Analysis. – М.: LAP Lambert Academic Publishing, 2010. – 192 с. Jaber Al-Balushi and Afaq Ahmad. Response Data Compression Techniques in Digital Circuit Testing. – М.: LAP Lambert Academic Publishing, 2014. – 96 с. Basil Hamed and Mohammed EL-Moghany. Sun and Maximum Power Point Tracking Using Fuzzy Controllers via FPGA. – М.: LAP Lambert Academic Publishing, 2011. – 128 с. Van Liem Nguyen. Power Systems Modeling and Control Coordination. – М.: LAP Lambert Academic Publishing, 2010. – 280 с. Belkacem MAHDAD. Examination of the Optimal Power Flow based FACTS Devices. – М.: LAP Lambert Academic Publishing, 2010. – 284 с. Srinivasan Venkatesan,Robert Williams and Erick C. Jones. Investigation of RFID in Tracking Vehicles. – М.: LAP Lambert Academic Publishing, 2012. – 144 с. Hany Hassanin. Nanotechnology and Powder processing for Ceramic Microfabrication. – М.: LAP Lambert Academic Publishing, 2012. – 228 с. ahmad mohsenimanesh. Development of a Finite Element Model of Tyre-Soil Interaction. – М.: LAP Lambert Academic Publishing, 2010. – 120 с. Muhammad Masoom Pahore,Naoyuki Funamizu and Ryusei Ito. Design of onsite volume reduction system for human urine. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Kabiru Abbas. Practice and Strategies of Library Automation in Nigerian Universities. – М.: LAP Lambert Academic Publishing, 2014. – 160 с. Perumal Kumar,Kalappan thangamuthu Parthiban and Velusamy Saravanan. Study Of Genetic Advances In Populus Clones. – М.: LAP Lambert Academic Publishing, 2013. – 84 с. J. M. Hemani,F. K. Savani and D. M. Paradava. Hydraulic Performance of Drip Emitters under Field Condition. – М.: LAP Lambert Academic Publishing, 2014. – 104 с. Venu Yarlagadda,R.M.Rao K. and V.Sanker Ram B. Implementation Of Control Circuit Of 1-PH SVC Using Microcontroller. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Hussein M. Khattab,Almoataz Y. Abdelaziz and Said F. Mekhamer. Innovative Approaches for Power System Security Assessment. – М.: LAP Lambert Academic Publishing, 2013. – 224 с. Vinod Tejwani and Satish Joshi. Pricing of Reactive Power in Deregulated Environment. – М.: LAP Lambert Academic Publishing, 2014. – 92 с. Maria Hallfors. The validity of a bioclimatic vegetation scheme. – М.: LAP Lambert Academic Publishing, 2011. – 92 с. Jean-marc Mwenge Kahinda. A Spatial Decision Support System for Rainwater Harvesting. – М.: LAP Lambert Academic Publishing, 2013. – 196 с. Jawaria Tareen. EFFECTIVENESS OF WASTEWATER MANAGEMENT IN DEVELOPING COUNTRIES. – М.: LAP Lambert Academic Publishing, 2011. – 136 с. T. Bezboruah,K. C. Sarma and A. Goswami. Embedded system design based on 8051 and PIC family microcontroller. – М.: LAP Lambert Academic Publishing, 2011. – 100 с. Mehak Basharat and Waleed Ejaz. Bit Loading for Mobile WiMAX Physical Layer. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Deepak Sharma and Shashank Tiwari. Process Validation of Ceftriaxone Sodium Dry Injection. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. BURCU KOR. EVALUATION AND EFFICIENCY OF E-LEARNING SYSTEMS. – М.: LAP Lambert Academic Publishing, 2010. – 128 с. Thea Munjishvili and Zurab Munjishvili. The system of Discovery and Estimation of Knowledge “Cyber2”. – М.: Scholars' Press, 2015. – 108 с. Sofana Alfuhaid,Salha Abdullah and Norah Alshahrani. Class Attendance System Using Fingerprint Technique. – М.: LAP Lambert Academic Publishing, 2013. – 204 с. Someshwar Gande and Srilatha Rondla. Security Testing for Web Applications in SDLC. – М.: LAP Lambert Academic Publishing, 2013. – 96 с. Thangam Algarsamy,Dhanabhakyam M. and Paramasivan Mokkan. Quick loan Processing systems. – М.: LAP Lambert Academic Publishing, 2012. – 124 с. Mehedi Al Mamun. Operating systems security: LINUX. – М.: LAP Lambert Academic Publishing, 2011. – 52 с. Ahmad Mudhar. The CSF Firewall. – М.: LAP Lambert Academic Publishing, 2013. – 52 с. Hassan Azam Qureshi,Khalid Mahmood Ul Hasan and Umar Farooq. Three Phase Low Voltage Induction Motor Drive. – М.: LAP Lambert Academic Publishing, 2012. – 88 с. Ricardo Chaves. Secure Computing on Reconfigurable Systems. – М.: LAP Lambert Academic Publishing, 2010. – 212 с. Govind Sreekar Shenoy. Architecture Support for Intrusion Detection systems. – М.: LAP Lambert Academic Publishing, 2014. – 160 с. Dimitrios Baltazis. Dynamic Authorizations for Secure Internet Applications. – М.: LAP Lambert Academic Publishing, 2012. – 152 с. Yedji Mbangsoua and Dr. Freddie Acosta. Information Security and its Investment Justification. – М.: LAP Lambert Academic Publishing, 2011. – 132 с. Pavan Kumar Bollineni and Kumar Neupane. Implications for adopting cloud computing in e-Health. – М.: LAP Lambert Academic Publishing, 2011. – 88 с. Saghar Estehghari. Impact of Client-side Vulnerabilities on Web-based E-voting Systems. – М.: LAP Lambert Academic Publishing, 2011. – 80 с. Hans Raj,P. C. Gupta and Gianetan Singh Sekhon. Security Issues,Aspects & Domain Based Security for Mobile Agents. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Sheetal Kudari. Ontology-Based Automated Test Oracle Comparator for Web Applications. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Danish Jamil. Designing and Evaluating the honeypots using virtual machine. – М.: LAP Lambert Academic Publishing, 2012. – 164 с. Mohammed Firdos Alam Sheikh. Improving Web Security by Blocking SQL Injection Attack(SQLIA). – М.: LAP Lambert Academic Publishing, 2012. – 80 с. James Francisco. Fingerprints in Place of Passwords. – М.: LAP Lambert Academic Publishing, 2012. – 156 с. Shubham Raina. System security through log analysis. – М.: LAP Lambert Academic Publishing, 2013. – 80 с. Todd Deshane. A Desktop System for Attack-Resistance and Rapid Recovery. – М.: LAP Lambert Academic Publishing, 2010. – 124 с. Cyrus Abanti Makori,Jane Onsongo and Lusiba Badru. ICT Security Applications. – М.: LAP Lambert Academic Publishing, 2012. – 112 с. Igor Botian. Software Security Vulnerabilities in Mobile Peer-to-peer Environment. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Milan Senesi. Web systems security testing. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Saeed Soltanmohammadi. Improving Information System Security by Evaluating Human Factors. – М.: LAP Lambert Academic Publishing, 2014. – 116 с. Jeffy Mwakalinga. A Framework for Adaptive Information Security Systems. – М.: LAP Lambert Academic Publishing, 2011. – 364 с. Vijaya Krishna Cherukuri and Piyush Gupta. MBT for Non-Functional Requirements. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Taha Triki. Filtering and reduction techniques of combinatorial tests. – М.: Scholars' Press, 2014. – 180 с. Mohammed Baqer M. Kamel and Loay E. George. Trusty Patient Monitoring System. – М.: LAP Lambert Academic Publishing, 2014. – 100 с. inayat ullah khan and Syed Majid Ali Shah Bukhari. SWOT Analysis of IP Multimedia Sub System Security Authentication. – М.: LAP Lambert Academic Publishing, 2010. – 52 с. Alpay Doruk. Security Review Program Requirements for Intrusion Management Systems. – М.: LAP Lambert Academic Publishing, 2010. – 88 с. Ayman AbuBaker and Rami Qahwaji. Detection of Breast Cancer Microcalcifications in Mammograms. – М.: LAP Lambert Academic Publishing, 2012. – 148 с. Muhammad Qaisar Hanif and Umar Sajjad Rizvi. Issues and Challenges of Requirement Elicitation in Large Web Projects. – М.: LAP Lambert Academic Publishing, 2010. – 68 с. Xuan Li. Java Interaction Testing. – М.: LAP Lambert Academic Publishing, 2011. – 100 с. Jose Fonseca. Evaluating the [In]security of Web Applications. – М.: LAP Lambert Academic Publishing, 2011. – 408 с. Khurram Ashfaq Qazi. Research By Genius Qazi. – М.: LAP Lambert Academic Publishing, 2012. – 76 с. AMERICA'S TEST KITCHEN. HEALTHY SLOW COOKER REVOLUTION. – М.: , 2015. – с. AMERICA'S TEST KITCHEN. COMP VEG COOKBOOK, THE. – М.: , 2015. – с. AMERICA'S TEST KITCHEN. BEST OF ATK 2016. – М.: , 2015. – с. Лучшие результаты Ничего не найдено Дополнительные результаты Web-мастер. "Кадровик. Кадровое делопроизводство", № 12, декабрь 2007. Об учете расходов на создание web-сайта. Комментарий к письму Минфина России от 12 марта 2006. № 03-03-04/2/54. В.С. Ржаницына, "Финансовые и бухгалтерские консультации", № 5, май 2006. Банковское отделение будущего. интервью с Камероном МакКворри. Cameron MacQuarrie, менеджером по развитию бизнеса компании Cisco Systems в области корпоративных финансов в регионе EMEA. Европа, Ближний Восток, Африка. Н.Ф. Колюшенко, "Расчеты и операционная работа в коммерческом банке", № 2, февраль 2006. Как оптимизировать web-сайт фирмы. М. Воскресенский, "Управление персоналом", № 9-10, май 2005. Создал web-сайт? Учти расходы!. С. Ларина, "Московский бухгалтер", № 1, январь 2005. Web-сайт организации: бухгалтерский и налоговый учет. И.Э. Гущина, "Финансовые и бухгалтерские консультации", № 1, январь 2005. Комментарий к письму Минфина РФ от 22 октября 2004. № 07-05-14/280 "О налогообложении затрат на создание web-сайтов". И.И. Иванцов, "Нормативные акты для бухгалтера", № 22, ноябрь 2004. Ловушка для пирата. интервью с И. Слабых, руководителем отдела противодействия интеллектуальному пиратству в России и СНГ Adobe Systems. И. Голова, "Расчет", N 9, сентябрь 2012 г. Медицинская информатика в Web of Science: доля России в мировом публикационном потоке. Н.Г. Куракова, Л.А. Цветкова, "Врач и информационные технологии", № 4, июль-август 2012. Бюджетная отчетность и Web-технологии. С.В. Юскаева, "Бюджетный учет", N 4, апрель 2012 г. On-line коммуникации: от классики до web 2.0-технологий. И. Широкова, "Ремедиум", № 7, июль 2010. Принципы управления Web-отношениями в банке: риск-ориентированный подход. Л.В. Лямин, "Управление в кредитной организации", № 3, май-июнь 2009. Анализ защищенности web-сайтов: практика проведения. Д. Евтеев, "Финансовая газета. Региональный выпуск", № 9, февраль 2009. Учет расходов на разработку web-сайта издательства. О.В. Дмитриева, "Бухгалтерский учет в издательстве и полиграфии", № 11, ноябрь 2008. Я воспринимаю персонального помощника как напарника червяк должен нравиться рыбке, а не рыбаку. интервью с П.А. Черкашиным, руководителем российского представительства компании Adobe Systems. "Управление персоналом", № 20, октябрь 2008. Анкета соискателя на вакантную должность Web-программиста. "Кадровик. Кадровое делопроизводство", № 8, август 2008. Учет и налогообложение расходов организации на создание web-сайта. О.Л. Вольхина, "Налоговая политика и практика", № 6, июнь 2008. Всемирная паутина: www.. World Wide Web. Н. Филина, "Финансовая газета. Региональный выпуск", № 7, февраль 2008. Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Гошевичус, 14.02 Премного благодарен! Вы очень мне помогли! Даже не знаю почему! Спасибки :)))