<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Disaster Resilience: A National Imperative</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2012</style></year></dates><publisher><style face="normal" font="default" size="100%">The National Academies Press</style></publisher><pub-location><style face="normal" font="default" size="100%">Washington, DC</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Achieving Effective Acquisition of Information Technology in the Department of Defense</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year></dates><publisher><style face="normal" font="default" size="100%">National Academies Press</style></publisher><pub-location><style face="normal" font="default" size="100%">Washington, D.C.</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Review of the Department of Homeland Security’s Approach to Risk Analysis</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year></dates><publisher><style face="normal" font="default" size="100%">The National Academies Press</style></publisher><pub-location><style face="normal" font="default" size="100%">Washington, DC</style></pub-location><pages><style face="normal" font="default" size="100%">Chapter 5</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Emerging Cognitive Neuroscience and Related Technologies</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2008</style></year></dates><publisher><style face="normal" font="default" size="100%">National Academies Press</style></publisher><pub-location><style face="normal" font="default" size="100%">Washington, DC</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%"> Adaptive Management for Water Resources Project Planning</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2004</style></year></dates><publisher><style face="normal" font="default" size="100%">The National Academies Press</style></publisher><pub-location><style face="normal" font="default" size="100%">Washington, D.C.</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Biotechnology Research in an Age of Terrorism</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2004</style></year></dates><publisher><style face="normal" font="default" size="100%">National Academies Press</style></publisher><pub-location><style face="normal" font="default" size="100%">Washington, DC</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>23</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">National Research Council</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cryptography’s Role in Securing the Information Society </style></title><secondary-title><style face="normal" font="default" size="100%">National Academy Press</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1996</style></year></dates><pub-location><style face="normal" font="default" size="100%">Washington, DC</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record></records></xml>