Премини към основното съдържание
ИТ в сигурността
Екип
Изследователи
Сътрудници
Специалисти
Докторанти
Проекти
Текущи
Предстоящи
Завършени
Курсове
Отбранителна политика
Изследвания на сигурността
Киберсигурност
Администрация
Мениджмънт
Икономика
Иновации
Теми
виж всички
Ресурси
Публикации
Доклади
Позиции на ЦМСО
Презентации
Книги
Събития
Партньори
Контакти
Biblio
Export 8057 results:
RTF
EndNote XML
2013
Ava 500 е новият робот за видео сътрудничество на iRobot и Cisco TelePresence
. Computerworld, 2013.
Google Scholar
RTF
EndNote XML
"
Base Agreement Will Boost Russia-Tajikistan Relations
."
The Oxford Analytica Daily Brief
(2013).
Google Scholar
RTF
EndNote XML
Big Data
. MSIS Wiki, 2013.
Google Scholar
RTF
EndNote XML
Block, Cobus
.
Bilateral Trade Between Xinjiang and Kazakhstan: Challenges or Opportunities?
. China Policy Institute Blog, 2013.
Google Scholar
RTF
EndNote XML
Cullison, Alan
.
"
Boston Bombing Suspect Was Steeped in Conspiracies
."
The Wall Street Journal
(2013).
Google Scholar
RTF
EndNote XML
Gerstein, Josh
.
Boston Bombing Suspects’ Parents Granted Divorce in 2011
. Politico.com, 2013.
Google Scholar
RTF
EndNote XML
Madden, Lance
.
"
Boston Marathon Bombing Suspect No. 1 Tamerlan Tsarnaev Trained to Box for U.S.
"
Forbes
(2013).
Google Scholar
RTF
EndNote XML
"
Brahimi to Stay on as Syria Envoy after Russia-U.S. Bid
."
Al-Arabiya
(2013).
Google Scholar
RTF
EndNote XML
Borger, Julian
, and
Ian Traynor
.
"
Brazilian president launches ferocious attack on NSA spying
."
Guardian
(2013): 4.
Google Scholar
RTF
EndNote XML
Sanger, David
.
"
Budget documents detail extent of U.S. cyberoperations
."
New York Times
(2013).
Google Scholar
RTF
EndNote XML
Boyer, Dave
.
"
Bush Policies Still Alive in Obama White House
."
The Washington Times
(2013).
Google Scholar
RTF
EndNote XML
Taylor, Matthew
, and
Nick Hopkins
.
"
Campaigners take surveillance fight with GCHQ to European court
."
Guardian
(2013): 6.
Google Scholar
RTF
EndNote XML
Yu, ZHOU
,
TAN Yue-jin
,
JIANG Jiang
,
YANG Ke-wei
, and
ZHAO Qing-song
.
"
Capability requirements oriented weapon system of systems portfolio planning model and algorithm
."
Systems Engineering Theory and Practice
33:3 (2013).
Google Scholar
RTF
EndNote XML
Broers, Lawrence
, and
Gerard Toal
.
"
Cartographic Exhibitionism? Visualizing the Territory of Armenia and Karabakh
."
Problems of Post-Communism
(2013): 16-35.
Google Scholar
RTF
EndNote XML
Mullick, Haider Ali Hussei
.
"
Catching the BUG (Belarus, Ukraine and Georgia)-Russia’s Buffer or NATO’s Annex? A New Framework for Euro-Atlantic-Russian Cooperation
."
Georgetown Journal of International Affairs
(2013).
Google Scholar
RTF
EndNote XML
McDermott, Roger
.
Central Asian security post-2014. Perspectives in Kazakhstan and Uzbekistan
. Copenhagen: Danish Institute for International Studies, 2013.
Google Scholar
RTF
EndNote XML
"
Central Asia's Military Shifts Strengthen Russian Ties
."
The Oxford Analytica Daily Brief
(2013).
Google Scholar
RTF
EndNote XML
Chapter Five: Russia and Eurasia
In
The Military Balance 113
., 2013.
Google Scholar
RTF
EndNote XML
White, Hugh
.
The China Choice: Why We Should Share Power
. Oxford: Oxford University Press, 2013.
Google Scholar
RTF
EndNote XML
Peyrouse, Sébastien
,
Jos Boonstra
, and
Marlène Laruelle
.
China in Central Asia
. EUCAM, 2013.
Google Scholar
RTF
EndNote XML
O’Rourke, Ronald
.
China Naval Modernization: Implications for U.S. Navy Capabilities – Background and Issues for Congress
. Washington, D.C.: Congressional Research Service, 2013.
Google Scholar
RTF
EndNote XML
Freedberg, Jr., Sydney J.
.
China’s Fear of US May Tempt Them To Preempt: Sinologists
. Breaking Defense, 2013.
Google Scholar
RTF
EndNote XML
Morrison, Wayne M.
, and
Marc Labonte
.
China’s Holdings of U.S. Securities: Implications for the U.S. Economy
. Washington, D.C.: Congressional Research Service, 2013.
Google Scholar
RTF
EndNote XML
Chinese Companies to Control Over 40 % of Kazakhstan’s Oil Shortly
. Tengrinews.kz, 2013.
Google Scholar
RTF
EndNote XML
Aid, Matthew
.
"
The CIS’s new black bag is digital
."
Foreign Policy
(2013).
Google Scholar
RTF
EndNote XML
Страници
« първа
‹ предишна
…
2
3
4
5
6
7
8
9
10
…
следваща ›
последна »
Форма за търсене
Търси
Resources
Политика за сигурност
Киберсигурност
Разузнаване
Вътрешен ред и сигурност
Terrorism
Операции
Технологии и индустрия
Управление на човешките ресурси
Управление на аквизицията
Стратегия
Концепции и доктрини
Мениджмънт
Икономика на отбраната
Финансов мениджмънт
Мениджмът на информация и знание
Симулации и подготовка
Управление на промяната
Взимане на решение
Добро управление