Biblio

Export 21423 results:
Filters: Filter is   [Clear All Filters]
2012
News, AKIpress. UN Secretary General, Foreign Minister Kazakbaev Discuss Reconciliation and Regional Issues. ISI Emerging Markets, 2012.
UN Security Council, press statement on Syria(link is external)., 2012.
UN Security Council Resolution 2043(link is external)., 2012.
UN Security Council Resolution 2059(link is external)., 2012.
Umbach, Frank, and Maximilian Kuhn. "Unconventional Gas Resources:A Transatlantic Shale Alliance?(link is external)" In Transatlantic Energy Futures: Strategic Perspectives on Energy Security, Cli¬mate Change and New Technologies in Europe and the United States. Washington, D.C.: Center for Transatlantic Relations, Johns Hopkins University–SAIS, 2012.
Stewin, Patrick, and Iurii Bystrov. Understanding DMA Malware(link is external) In Security in Telecommunications. Technische Universitat Berlin, 2012.
Kozma, Tibor. "Understanding Gender Mainstreaming in Modern Law Enforcement." Connections: The Quarterly Journal 11, no. 2 (2012): 87-94.
Ifinedo, Princely. "Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory." Computers& Security 31, no. 1 (2012): 83-95.
Spaaij, Ramón. Understanding Lone Wolf Terrorism: Global Patterns, Motivations and Prevention. Dordrecht: Springer, 2012.
Tarra, Hemanth. Understanding Processor (% Processor Time) and Process (%Processor Time)(link is external). Microsoft TechNet Articles, 2012.
Rodgers, Guy. Understanding the Threat of Radical Islam. Broomall, PA: National Highlights, 2012.
Bowring, Bill. The Unexpected After-Life of the ‘Soviet People’? The ‘Pridnestrovskaya Moldavskaya Respublika’ as a Political Fact and Legal Anomaly: A Case-Study., 2012.
United NatE-Government. Survey 2012. E-Government for the People(link is external). United Nations, 2012.
The United Nations SSR Perspective(link is external). United Nations, Department of Peacekeeping Operations, Office of Rule of Law and Security Institutions, Security Sector Reform Unit, 2012.
Cork, Chris. "Unsafe Roads(link is external)." SA GlobalAffairs (2012).
Jen, Alic. "US Gas Pipelines under Cyber Attack(link is external)." Says DHS (2012).
US Government Policy for Oversight of Life Sciences Dual Use Research of Concern., 2012.
Nakashima, Ellen, Greg Miller, and Julie Tate. "U.S., Israel developed Flame computer virus to slow Iranian nuclear efforts(link is external)." The Washington Post (2012).
Sternstein, Aliya. U.S., Russia, Other Nations Near Agreement on Cyber Early-Warning Pact(link is external). Nextgov, 2012.
Fan, Wang. U.S. Should Back up Its Proclaimed ‘Good Intentions’ in Asia-Pacific With Action(link is external). Xinhua News Agency, 2012.
Sheng, Zhong. U.S. Should Not Muddy the Waters Over the South China Seas(link is external). People’s Daily, 2012.
U.S. Should Treat China and Chinese Military Objectively and Rationally: Defence Ministry(link is external). Ministry of National Defense, P. R. China, 2012.
Mackey, Peg. U.S. to Overtake Saudi as Top Oil Producer: IEA(link is external). Reuters, 2012.
Zubkov, Kirill. The U.S. Will Help Uzbekistan to Disperse Demonstrators ‘Not Lethally’. Defense and Security (Russia), 2012.
Achkoski, Jugoslav, and Vladimir Trajkovik. "Usage of Service-Oriented Architecture for Developing Prototype of Intelligence Information System." TEM Journal – Technology education management informatics 1, no. 4 (2012).

Pages