Biblio

Export 21404 results:
2016
Commitment to Enhance Resilience. E-Library, NATO, 2016.
Commitment to Enhance Resilience Issued by the Heads of State and Government Participating in the Meeting of the North Atlantic Council in Warsaw, 8-9 July 2016 In NATO official text., 2016.
The Committee on the Challenges of Modern Society., 2016.
Burnside-Lawry, Judy, and Peter Rogers. "Communication research to build societal resilience." International Journal of Disaster Resilience in the Built Environment 7, no. 1 (2016): 2-3.
Platts-Fowler, Deborah, and David Robinson. "Community Resilience: A Policy Tool for Local Government?" Local Government Studies 42, no. 5 (2016): 762-784.
C. Ataç, Akça. "A Comparative Civilizational Reading for the Middle East and Turkey’s New Role in It." Global Change, Peace & Security 28, no. 1 (2016): 99-115.
Khalili, Mostafa. "A comparative study of ethnic identity among Azerbaijani speakers in the Islamic Republic of Iran and the Republic of Azerbaijan." Ritsumeikan Journal of Asia Pacific Studies 34 (2016).
Ferkova, Zuzana. Comparison and Analysis of Multiple 3D Shapes. Vol. MSc thesis. Brno, Czech Republic: Masarykova Univerzita, 2016.
Barman, Subhas, Utpal Pal, Asif Sarfaraj, Biswajit Biswas, Animesh Mahata, and Palash Mandal. "A complete literature review on financial fraud detection applying data mining techniques ." International Journal of Trust Management in Computing and Communications (IJTMCC) 3, no. 4 (2016).
Velasquez, Luis Carlos Her. A Comprehensive Instrument for Identifying Critical Information Infrastructure Services In Institute of Computer Science, Cyber Security Curriculum. Vol. Master’s Thesis. University of Tartu, 2016.
King, Joseph B.. "A Comprehensive Strategy for Combating Terrorism." In Combating Transnational Terrorism, 253-270. Sofia: Procon, 2016.
Concept of the Development of the Security and Defense Sector of Ukraine. President of Ukraine, 2016.
Akin, Gülsün Kiliç. "Confidence of the University Youth in Armed Forces and Information Sources." In Current Topics in Social Sciences, 474-483. Sofia: St. Kliment Ohridski University Press, 2016.
Kuchler, Hannah. "Connected devices create millions of cyber security weak spots." Financial Times (2016).
Choe, Jong-min. "The Construction of an IT Infrastructure for Knowledge Management." Asian Academy of Management Journal 21, no. 1 (2016).
Hoffman, Frank. The Contemporary Spectrum of Conflict. Protracted, Gray Zone, Ambiguous, and Hybrid Modes of War. Washington, D.C.: The Heritage Foundation, 2016.
Israel, Steven A., and Erik Blasch. "Context Assumptions for Threat Assessment Systems." In Context-Enhanced Information Fusion. Advances in Computer Vision and Pattern Recognition. Cham: Springer, 2016.
Márquez, CA Britez Sil. Cooperación en seguridad: Narcotráfico en la Cuenca del Amazonas. Vol. Licenciatura en Relaciones Internacionales. Universidad Empresarial Siglo 21, 2016.
Nowakowska-Krystman, Aneta, and Piotr Gawliczek. "Core Competencies of Piracy and Maritime Terrorism." Journal of Defense Resources Management (2016).
Chen, Kedi, Fengcai Qiao, and Hui Wang. "Correlation Analysis Using Global Dataset of Events, Location and Tone." In 2016 IEEE First International Conference on Data Science in Cyberspace (DSC). Changsha, China, 2016.
Council Decision (EU) 2016/1351 of 4 August 2016 concerning the Staff Regulations of the European Defence Agency. European Defence Agency, 2016.
Council Decision (EU) 2016/1353 of 4 August 2016 concerning the financial rules of the European Defence Agency. European Defence Agency, 2016.
GAO), United States Gov. Counterfeit Parts: DOD Needs to Improve Reporting and Oversight to Reduce Supply Chain Risk. Washington D.C.: US GAO, 2016.
Counterfeiting. Encyclopedia Britannica Online, 2016.
Willis, Daniel C.. Countering Putin’s Nuclear-backed Aggression with a Continuous Nuclear-Capable Bomber Presence In Technical Report. Newport Ri, United States: Naval War College, 2016.

Pages