Biblio

Export 21423 results:
Filters: Filter is   [Clear All Filters]
2010
A.Saleh, Noura, Hoda N.Boghdady, Samir I.Shaheen, and Ahmed M.Darwish. "High capacity lossless data embedding technique for palette images based on histogram analysis." Digital Signal Processing 20, no. 6 (2010): 1629-1636.
History of Czech Military Participation in Operations Abroad (1990-2011). Ministry of Defence & Armed Forces of the Czech Republic, 2010.
Wilner, Alex S., and Claire-Jehanne Dubouloz. "Homegrown Terrorism and Transforma¬tive Learning: An Interdisciplinary Approach to Understanding Radicalization." Global Change, Peace & Security 22, no. 1 (2010).
How to express EU citizen's solidarity through volunteering: First reflections on a European Voluntary Humanitarian Aid Corps. Brussels: European Commission, 2010.
"How to minimize drop-out rates and resistance to future training programs." Development and Learning in Organizations 24, no. 6 (2010): 20-22.
Greene, James. "The Human in the Loop." In Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices, 208-220. Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2010.
Human Security Report 2009/2010. Human Security Report Project, 2010.
J. Burgess, Peter, and Shahrbanou Tadjbakhsh. "The Human Security Tale of Two Europes." Global Society 24, no. 4 (2010).
Caprile, A., and P. Hakala. Humanitarian Aid., 2010.
Georgieva, Kristalina. The Humanitarian and the Military: Different Mandates and Potential Synergies In Brussels Defence Debate, Royal Military Academy., 2010.
Mbohwa, Charles. "Humanitarian logistics: Review and case study of Zimbabwean experiences." Journal of Transport and Supply Management 4, no. 1 (2010): 176-197.
Hybrid Threat. Washington, DC: Department of the Army, 2010.
D’Agostino, Davi M.. Hybrid warfare (Report GAO-10-1036R Hybrid Warfare). Washington DC: US Government Accountability office, 2010.
Harmon, Christopher C.. "Illustrations of Discrete Uses of Force." In Toward a Grand Strategy Against Terrorism, 114-115. New York: McGraw-Hill, 2010.
Tudoroiu, Nicolae, Mohammed Zaheeruddin, Vladimir Cretu, and Elena-Roxana Tudoroiu. "IMM-UKF Versus Frequency Analysis [Past and Present]." IEEE Industrial Electronics Magazine 4, no. 3 (2010): 7-18.
Missiroli, Antonio. Implementing the Lisbon Treaty: The External Policy Dimension In Bruges Political Research Papers No. 14 ., 2010.
Cobb, Scott E.. The Importance of a U.S. Security Strategy in the Caspian Black Sea N/A Region In USMC Command and Staff College. Vol. Master of Military Studies . Quantico, VA: Marine Corps University, 2010.
Wegener, Anne-Christine, and Mark Pyman. "The Importance of Integrity Building." In Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices, 178-185. Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2010.
Markoff, John, and David E. Sanger. "In a Computer Worm, a Possible Biblical Clue." The New York Times (2010).
Krastev, Nikola. In U.S. Cybercrime Case, Track Record Indicates Russia Willing to Cooperate. Radio Free Europe/Radio Liberty, 2010.
Yau, Hon Keung, and Alison Lai Fong Cheng. "Influence of Organizational Defensive Actions on the Learning of Information and Communication Technology: An Attitude Study in Hong Kong." International Journal of Management 27, no. 3 (2010): 459-469,579.
Information on Defence Expenditures In NATO Topics., 2010.
Minchev, Zlatogor. Information Processes and Threats in Social Networks: A Case Study In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2010.
Peltier, Thomas R.. Information Security Risk Analysis. 3rd ed. Boca Raton, FL: CRC Press, Taylor & Francis Group, 2010.
Savenko, Oleg, and Sergyi Lysenko. "Information Technology of Intelligent Trojan Detection in Computer Systems." Radioelectronic and Computer Systems 5 (2010): 120-126.

Pages