Biblio

Export 8062 results:
2012
Global Trends 2030: Alternative Worlds. U.S. National Intelligence Council, 2012.
Global Trends 2030. Alternative Worlds. Washington, D.C: National Intelligence Council, 2012.
Global Trends 2030: Citizens in an Interconnected and Polycentric World. European Union Institute for Security Studies, European Strategy and Policy Analysis System Report, 2012.
Cookson, Clive. "GM Crop Study Finds Health Damage in Rats." Financial Times (2012).
Z. Jgharkava, Zaza. "Guerillas in Lopota or Putin’s Trap?" Georgia Today (2012).
Boot, Max. "A Hard-Won Account of a Hard-Won Victory." The Wall Street Journal (2012).
Identity, Motives of Intruders onto Georgian Territory Remain Unclear. Radio Free Europe/Radio Liberty, 2012.
Ilves in Washington: All NATO Allies Must Contribute to Cyber Security. ERR News, 2012.
Montagnese, Alfonso. Impact of Social Media on National Security. Centro Militare di Studi Strategici (Italy), 2012.
Kraan, Wilbert, Steve Lay, and Pierre Gorissen. IMS Question & Test Interoperability Assess-ment Test, Section and Item Information Model., 2012.
Zenn, Jacob. "IMU Reestablishes Bases in Northern Afghanistan." CACI Analyst (2012).
Nakashima, Ellen. "In U.S.-Russia Deal, Nuclear Communication System May Be Used for Cybersecurity." Washington Post (2012).
Increase in Opium Production in Afghanistan Gives Cause for Concern. Tajikistan News-NA “Asia-Plus”, 2012.
Prusty, Nigam. Indian Government Wins Vote on Wal-Mart-type Stores. Reuters, 2012.
Infanterist der Zukunft. Deutsches Heeresamt, 2012.
Dimitrov, Tulechka, and Paunova. Information Threats in the Internet, social networks and games.2012 In International Scientific Conference ‘Informatics in the Scientific Knowledge’. Varna, Bulgaria, 2012.
Warner, Michael. "Intelligence and Reflexivity: An Invitation to a Dialogue." Intelligence and National Security 27, no. 2 (2012): 167-171.
Gill, Peter, and Mark Phythian. Intelligence in an Insecure World. Cambridge: Polity, 2012.
Gill, Peter. "Intelligence, Threat, Risk and the Challenge of Oversight." Intelligence and National Security 27, no. 2 (2012): 206-222.
Intel® Virtualization Technology for Directed I/O (VT-d): Enhancing Intel platforms for efficient virtualization of I/O devices. Software Intel.com, 2012.
Internet Security Threat Report In 2011 trends, vol. 17. Symantec, 2012.
Shaikh, Nermeen. Interview with Lila Abu-Lughod, Asia Source: “Why we can’t save Afghan women., 2012.
Warrick, Joby. "Iran Bolsters Retaliation Capability in the Persian Gulf, Experts Say." The Washington Post (2012).
Iranian Submarines to Navigate Caspian Sea. Russia Today, 2012.
Islam Karimov Says, Region Becomes Object of Close Attention. UzDaily.com, 2012.

Страници