Biblio

Export 21415 results:
2012
Halverson, Jeffry R., Bennett R. Furlow, and Steven R. Corman. How Islamist Extremists Quote the Qur’an., 2012.
Blackwood, Mikaela. "How Smart is Smart Defense? A Review of NATO’s Smart Defense Proposal." Connections: The Quarterly Journal 11, no. 3 (2012): 85-93.
Lis, Andrzej. "How to Strengthen Positive Organizational Behaviors Fostering Experiential Learning? The Case of Military Organizations." Journal of Entrepreneurship Management and Innovation 8, no. 4 (2012): 21-34.
Hodges, J., C. Jackson, and A. Barth. HTTP strict transport security., 2012.
The Human Brain Project: A Report to the European Commission . Lausanne: The HBP-PS Consortium, 2012.
Hungarian National Security Strategy., 2012.
Mansoor, Peter R., Williamson Murray, and Peter R. Mansoor. "Hybrid War in History." In Hybrid Warfare: Fighting Complex Opponents from the Ancient World to the Present. Cambridge: Cambridge University Press, 2012.
Murray, Williamson, and Peter R. Mansoor. Hybrid Warfare: Fighting Complex Opponents from the Ancient World to the Present. Cambridge: Cambridge University Press, 2012.
van Wyk, Milandré Heidi. IBM Incorporated: An exploration of an Egyptian work ethic as constructed by South African expatriates working in Cairo. Vol. , Master of Arts (Sociology). University of Stellenbosch, 2012.
Fitriawan, Helmy, Ouriz Pucu, and Yohanes Baptista. "Identifikasi Plat Nomor Kendaraan Secara Off-Line Berbasis Pengolahan Citra dan Jaringan Syaraf Tiruan." Electrician – Jurnal Rekayasa dan Teknologi Elektro, no. 2 (2012).
Tverdokhlebov, Vladimir. "Identifying the Reasons for Failures in Large-Scale Systems." Information & Security: An International Journal 28, no. 2 (2012): 236-247.
Identity, Motives of Intruders onto Georgian Territory Remain Unclear. Radio Free Europe/Radio Liberty, 2012.
Ilves in Washington: All NATO Allies Must Contribute to Cyber Security. ERR News, 2012.
Khatib, Lina. Image Politics in the Middle East: The Role of the Visual in Political Struggle. I.B.Tauris, 2012.
Sabri, Sahab, and Saeed Sabri-Matanagh. "The Impact of Information and Communications Technology Infrastructure on the Momentum of Organisational Change." The Journal of Applied Business and Economics 13, no. 4 (2012): 85-95.
Archetti, Cristina. "The impact of new media on diplomatic practice: An evolutionary model of change." The Hague Journal of Diplomacy 7, no. 2 (2012): 181-206.
Montagnese, Alfonso. Impact of Social Media on National Security. Centro Militare di Studi Strategici (Italy), 2012.
Arh, Tanja, Borka Blazic, and Vlado Dimovski. "The impact of technology-enhanced organisational learning on business performance: An empirical study." Journal of East European Management Studies 17, no. 3 (2012): 369-383.
Klaic, Aleksandar, and Anita Peresin. "The Impact of the National Information Security Regulation Framework on Cyber Security in Global Environment." In International Scientific Conference on Corporate Security in Dynamic Global Environment - Challenges and Risks, 85-96. Ljubljana, Slovenia: Institute for Corporative Security Studies, 2012.
Grobler, Martie, Joey Jansen Van Vuuren, and Louise Leenen. "Implementation of a Cyber Security Policy in South Africa: Reflection on Progress and the Way Forward." Council for Scientific and Industrial Research (2012).
Kraan, Wilbert, Steve Lay, and Pierre Gorissen. IMS Question & Test Interoperability Assess-ment Test, Section and Item Information Model., 2012.
Zenn, Jacob. "IMU Reestablishes Bases in Northern Afghanistan." CACI Analyst (2012).
Zhengyuan, Xu. "In the Shadow of Great Powers: A Comparative Study of Various Approaches to Regionalism in Central Asia." Connections: The Quarterly Journal 9, no. 4 (2012): 37-52.
Nakashima, Ellen. "In U.S.-Russia Deal, Nuclear Communication System May Be Used for Cybersecurity." Washington Post (2012).
Increase in Opium Production in Afghanistan Gives Cause for Concern. Tajikistan News-NA “Asia-Plus”, 2012.

Pages