Электронная библиотека

ЭЛЕКТРОННАЯ БИБЛИОТЕКА






Добро пожаловать на сайт электронной библиотеки!
Здесь можно найти произведения русских и зарубежных авторов.
Скачать множество книг и журналов различных жанров и направлений.
Большой выбор художественной, бизнес, учебной и технической литературы.
Все представленные здесь книги и журналы имеют подробное описание и обложку.
Наша библиотека регулярно пополняется только новыми и интересными материалами!

«Подробнее о сайте»            «Правила сайта»            «Написать нам»            «Статьи»

Global Airlines, Third Edition: Competition in a Transnational Industry

Бизнес





Разместил: robotuz

4-04-2012, 18:12

Просмотров: 503





Global Airlines, Third Edition: Competition in a Transnational Industry



Автор: Pat Hanlon
Название: Global Airlines, Third Edition: Competition in a Transnational Industry
Издательство:Butterworth-Heinemann
Год: 2007
Кол-во страниц: 392
Формат: Pdf
Размер: 3.8 MB
Язык: Английский

Global Airlines: Competition in a Transnational Industry presents an overview of the changing scene in air transport covering current issues such as security, no frills airlines, 'open skies' agreements, the outcome of the recent downturn in economic activity and the emergence of transnational airlines, and takes a forward looking view of these challenges for the industry.










Похожие публикации

Computer Security. Principles and Practice Computer Security. Principles and Practice
In recent years, the need for education in computer security and related topics has grown dramatically - and is essential for anyone studying Computer Science or Computer Engineering. This is the only text available to provide integrated,

Fundamentals of Information Systems Security Fundamentals of Information Systems Security
Part of the New Jones & Bartlett Learning Information Systems Security & Assurance Series! Fundamentals of Information System Security provides a comprehensive overview of the essential concepts readers must know as they pursue careers in

Cybercrime and Espionage provides a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the per Cybercrime and Espionage provides a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the per
Cybercrime and Espionage provides a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence within all industry. This book will educate you on

Open Server 5.2.2 Видеоуроки + Программы (2014) Open Server 5.2.2 Видеоуроки + Программы (2014)
Open Server - это портативная программная платформа, созданная специально для веб-разработчиков с учётом их рекомендаций и пожеланий. Программный комплекс имеет богатый набор серверного программного обеспечения, удобный, многофункциональный

Practical Hadoop Security Practical Hadoop Security
Practical Hadoop Security is an excellent resource for administrators planning a production Hadoop deployment who want to secure their Hadoop clusters. A detailed guide to the security options and configuration within Hadoop itself, author Bhushan

Золотое руно (956 схем) Золотое руно (956 схем)
С незапамятных времен женщины увлекались ручной работой. Рукоделие считалось изысканным, благородным делом. В среде аристократии вышивка, вышивка крестом и вязание были традиционным время препровождением - таким образом молодые княжны и княгини не

Encyclopedia of Cryptography and Security Encyclopedia of Cryptography and Security
Expanded into two volumes, the Second Edition of Springer’s Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly

Transport Science and Technology Transport Science and Technology
The book will offer a representative sample of the best papers presented at the Transport Science and Technology Congress (TRANSTEC) Athens 2004. It will also serve as the peer reviewed conference proceedings. As in the congress writing, in this

Computer and Information Security Handbook Computer and Information Security Handbook
The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they

Information Security and Ethics: Concepts, Methodologies, Tools and Applications Information Security and Ethics: Concepts, Methodologies, Tools and Applications
Ethical dilemmas and security challenges have emerged rapidly alongside the accelerated evolution of information processing and management technologies. As technology continues to advance, the need for strong responses to these challenges, well




Отзывы и Комментарии





Добавление комментария

Ваше Имя:
Ваш E-Mail:(необязательно)
  • bowtiesmilelaughingblushsmileyrelaxedsmirk
    heart_eyeskissing_heartkissing_closed_eyesflushedrelievedsatisfiedgrin
    winkstuck_out_tongue_winking_eyestuck_out_tongue_closed_eyesgrinningkissingstuck_out_tonguesleeping
    worriedfrowninganguishedopen_mouthgrimacingconfusedhushed
    expressionlessunamusedsweat_smilesweatdisappointed_relievedwearypensive
    disappointedconfoundedfearfulcold_sweatperseverecrysob
    joyastonishedscreamtired_faceangryragetriumph
    sleepyyummasksunglassesdizzy_faceimpsmiling_imp
    neutral_faceno_mouthinnocent

Книги




Союз образовательных сайтов