Biblio

Export 21393 results:
2013
Pospisil, Jan. "Resilienz: Die Neukonfiguration von Sicherheitspolitik im Zeitalter von Risiko." Austrian Journal of Political Science 1 (2013): 18-42.
Resolution by the Georgian Parliament., 2013.
van Reijn, Joop. "Resource management in an Intelligence and Security Service: a Dutch example." Information & Security: An International Journal 30, no. 1 (2013): 41-54.
Resources for ‘Training and Learning Architecture’ Webinar. ADL Web site, 2013.
Grant, Rachel Staley. Rethinking Nuclear Deterrence and Burden-Sharing. American Security Information Council (BASIC), 2013.
Roth, Kenneth. Rethinking Surveillance., 2013.
Dalrymple, William. Return of the King: The Battle for Afghanistan. London: Bloomsbury, 2013.
Kim, Cheonshik, YongSoo Choi, Hyoung-Joong Kim, Dongkyoo Shin, and Dongil; Shin. "Reversible Data Hiding for Halftone Images Using Histogram Modification." International Information Institute (Tokyo). Information; Koganei 16, no. 3 (2013): 1861-1872.
Liao, Hung-Jen, Chun-Hung Richard Lin, Ying -Chih, and Kuang-Yuan Tung. "Review: Intrusion detection system: A comprehensive review." Journal of Network and Computer Applications (2013).
"Review of European Standards on ICT competences." Information Management (in Russian) 7 (2013): 30-35.
Briggs, Rachel, and Sebastien Feve. Review of Programs to Counter Narratives of Violent Extremism: What Works and What are the Implications for Government?. Institute for Strategic Dialogue, 2013.
Lackenbauer, Helené, and Richard Langlais. Review of the Practical Implementation of UNSCR 1325 for the Conduct of NATO-led Operations and Missions. Stockholm: Swedish Defence Research Agency FOI, 2013.
Lackenbauer, Helené, and Richard Langlais. Review of the Practical Implications of UNSCR 1325 for the Conduct of NATO-led Operations and Missions. Stockholm: Swedish Defense Research Agency (FOI), 2013.
RF Foreign Policy Concept In Approved by RF President V.V. Putin., 2013.
Bongo, Pathias P., Paul Chipangura, Mkhokheli Sithole, and Funa Moyo. "A rights-based analysis of disaster risk reduction framework in Zimbabwe and its implications for policy and practice." Journal of Disaster Risk Studies 5, no. 2 (2013): article 81.
Thompson, James. "The Rise of All." Connections: The Quarterly Journal 12, no. 3 (2013): 63-86.
Kahler, Miles. "Rising Powers and Global Governance: Negotiating Change in a Resilient Status Quo." International Affairs 89, no. 3 (2013): 711-29.
Beaula, Thangaraj, and J.Partheeban. "Risk Assessment of Natural Hazards in Nagapattinam District Using Fuzzy Logic Model." International Journal of Fuzzy Logic Systems (IJFLS) 3, no. 3 (2013).
"Riven doviry ukrayintsiv do vlady – odyn z najnyzhchykh u Yevropi." The Ukrainian Week (2013).
Riyadh asks GCC states to condemn Qatar’s actions in Egypt and Yemen. Vol. 25 November 2013. Middle East Monitor, 2013.
Balzarotti, D., E. Markatos, and Z. Minchev. "A Roadmap in the area of Systems Security." In The Red Book. SysSec Consortium, 2013.
Kumar, Manoj, Mridul Kumar Gupta, and Saru Kumari. "A Robust Remote User Authentication Scheme using Smart Card." Information & Security: An International Journal 26, no. 2 (2013): 79-97.
Ali, Farhana. "Rocking the Cradle to Rocking the World: The Role of Muslim Female Fighters." Journal of International Women’s Studies 8, no. 1 (2013): 21-35.
Fox, Jesse, Katie M. Warber, and Dana C. Makstaller. "The Role of Facebook in Romantic Relationship Development: An Exploration of Knapp’s Relational Stage Model." Journal of Social and Personal Relationships 30, no. 6 (2013): 771-794.
Mlavius-Cristian, Ciorei, and Mihaela Andreea. "The Role of Intelligenceărcău F in the Fight Against Terror." European Scientific Journal 9, no. 2 (2013).

Pages