Biblio

Export 21423 results:
Filters: Filter is   [Clear All Filters]
2011
Vandepeer, Charles. Rethinking Threat: Intelligence Analysis, Intentions, Capabilities, and the Challenge of Non-State Actors. The University of Adelaide, 2011.
Onwubiko, Cyril, and Thomas Owens. "Review of Situational Awareness for Computer Network Defense." In Situational Awareness in Computer Network Defense: Principles, Methods and Applications. International Science Reference, 2011.
Georgescu, Emil-Sever, and Antonios Pomonis. "A review of socio-economic consequences, losses and human casualties of the 1977 Vrancea." romania earthquake, CONSTRUCŢII 2 (2011).
Ma, Jianmin, Chongguo Tian, Roland Kallenborn, and Hayley Hung. "Revolatilization of Per-sistent Organic Pollutants in the Arctic Induced by Climate Change." Nature Climate Change 1, no. 5 (2011).
Somasundaram, K, and Ph Sumitra. "RGB & Gray Scale Component on MPQ-BTC in Image Compression." International Journal on Computer Science and Engineering (IJCSE) 3, no. 4 (2011).
Renna, Mario. Ring Road, sei mesi con gli Alpini in Afghanistan. Milan: Mursia Editore, 2011.
Demchak, Chris C., and Peter Dombrowski. "Rise of a Cybered Westphalian Age." Strategic Studies Quarterly 5, no. 1 (2011): 32-61.
Hegghammer, Thomas. "The Rise of Muslim Foreign Fighters: Islam and Globalization of Jihad." International Security 35, no. 3 (2011): 53-94.
Rising Concern about China’s Increasing Power: Global Poll. BBC World Service Poll, 2011.
Procházková, Dana. Risk Analysis and Risk Management . Praha: Karolinum, 2011.
Gallaher, Carolyn. "Risk and Private MilitaryWork." Antipode (2011): 1-27.
Qiuju, You, Fan Jianchun, and Zhu Wei. "Risk assessment and control measures of accident gas in Beijing." Journal of Safety Science and Technology 7, no. 10 (2011): 93-99.
Zech, Philipp. Risk-Based Security Testing in Cloud Computing Environments In PhD Sym¬posium at the Fourth IEEE International Conference on Software Testing, Verification and Validation (ICST 2011). Berlin, Germany, 2011.
Huff, Ariella. The role of EU defence policy in the Eastern neighbourhood. Paris: EU Institute for Security Studies, 2011.
Stepanova, Ekaterina. The Role of Information Communication Technologies in the Arab Spring. PONARS Eurasia Policy Memo, 2011.
Iliev, Kamen. Role of research and innovation in the process of transforming the defence capabilities of the Bulgarian armed forces In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2011.
Alipiev, Iliyan. The role of special operations in toppling Gaddafi’s regime In CSDM Views. Sofia: Centre for Security and Defence Management, 2011.
Burbridge, John, Jayoti Das, and Cassandra DiRienzo. "The Role of Trust in the Global Acceptance of E-Government." In Information Communication Technologies and the Virtual Public Sphere: Impacts of Network Structures on Civil Society., 2011.
Zaman, Safdar, Wolfgang Slany, and Gerald Steinbauer. "ROS-based mapping, localization and autonomous navigation using a Pioneer 3-DX robot and their relevant issues." In Saudi International Electronics, Communications and Photonics Conference (SIECPC). Riyadh, Saudi Arabia, 2011.
Schmid, Alex P.. The Routledge Handbook of Terrorism Research. London: Routledge, 2011.
Dannreuther, Roland. "Russia and the Arab Revolutions." Russian Analytical Digest 98 (2011).
Katz, Mark. "Russia and the Arab Spring." Russian Analytical Digest (2011): 4-6.
Russia, Britain plan to improve military ties. RIA Novosti, 2011.
Suny, Ronald G.. Russia has Taken on Its Powerful Competitors for the First Time Since 1991. The International Institute for Strategic Studies (IISS), 2011.
Russia Holds the Capability to Deploy Missile Systems in South Ossetia and Abkhazia In RIA News ., 2011.

Pages