Biblio

Export 21387 results:
2010
Gaillard, Jean-Christophe. "Vulnerability, Capacity and Resilience: Perspectives for Climate and Development Policy." Journal of International Development 22, no. 2 (2010): 218-232.
Izquierdo, Lisa Marie, Mari Stangerhaugen, Diana Castillo, Robert Nixon, and Gloria Jimenez. Water Crisis in Central Asia: Key Challenges and Opportunities. New York: New School University, 2010.
Haralampiev, K., and G. Naidenov. "Waves of the Change and Change of the Waves." Sociological Problems Special Issue (2010).
San Martín, Pablo. Western Sahara: The Refugee Nation. Cardiff: University of Wales Press, 2010.
Zunes, Stephen, and Jacob Mundy. Western Sahara: War, Nationalism and Conflict Irresolution. New York, NY: Syracuse University Press, 2010.
Biscop, Sven, Teija Tiilikainen, Stefano Silvestri, Nicole Gnesotto, Daniel Keohane, and Jolyon Howorth. What do Europeans Want from NATO?. Brussels: European Union Institute for Security Studies, 2010.
Morozov, Yuriy. "What publication of myths about the Chinese threat will lead to." Central Asia and the Caucasus 13, no. 2 (2010): 118-129.
Nyhan, Brendan, and Jason Reifler. "When Corrections Fail: The Persistence of Political Misperceptions." Political Behavior 32, no. 2 (2010): 303-330.
Mugavero, Roberto. "When in Rome…." CBRNe World (2010).
Parveen, Tauhida, and Scott Tilley. When to Migrate Software Testing to the Cloud? In Third International Conference on Software Testing, Verification, and Vali¬dation Workshops (ICSTW). Paris, France, 2010.
White Book on Defence and Armed Forces of Bulgaria. Ministry of Defence of the Republic of Bulgaria, 2010.
White House Strategic Communications Report to Congress. White House, 2010.
White paper on Defence and the Armed Forces of the Republic of Bulgaria., 2010.
White Paper on Defense and the Armed Forces., 2010.
Byers, Michael. Who Owns the Arctic? Understanding Sovereignty Disputes in the North . Vancouver, BC: Douglas & McIntyre, 2010.
Clarke, Richard A., and Robert K. Knake. "Why Cyber Warfare is Important." In Cyber Warfare: The Next Threat to National Security and What to Do About It, 18-21. New York: HarperCollins, 2010.
Cederman, Lars-Erik, Andreas Wimmer, and Brian Min. "Why Do Ethnic Groups Rebel? New Data and Analysis." World Politics 62, no. 1 (2010): 87-119.
Diallo, Saikou Y., Jose J. Padilla, and Andreas Tolk. "Why is Interoperability Bad: Towards a Paradigm Shift in Simulation Composition." In Fall Simulation Interoperability Workshop Orlando, FL. Orlando, FL, 2010.
Roach, Alfred S.. Why Is The United States Losing The War Of Words In The Global War On Terror? Identifying Causes Of Failure In U.S. Communication Strategy. Fort Leavenworth, Kansas: School of Advanced Military Studies, United States Army Command and General Staff College, 2010.
Venhaus, U.S. Army Colon. Why Youth Join al-Qaeda In Special Report. United States Institute of Peace, 2010.
Wife of Virginia Man who Threatened South Park Pleads Guilty. Anti-Defamation League, 2010.
Wi-Fi сети в Германии обязаны стать закрытыми [Wi-Fi networks in Germany need to become closed]. Geektimes, 2010.
Wikileaks: Russia Branded ‘Mafia State’ in Cables. BBC News, 2010.
Ki-Moon, UN Secretary. The World’s Women 2010: Trends and Statistics. Geneva: United Nations, 2010.
Liu, Baolong. XML Security in XML Data Integrity, Authentication, and Confidentiality In School of Computing and Engineering. Vol. Doctor of Philosophy. University of Huddersfield, 2010.

Pages