Biblio

Export 21393 results:
2012
K. Lawlor, Blaine, and Martin J. Hornyak. "Smart Goals: How the Application of Smart Goals Can Contribute to Achievement of Student Learning Outcomes." Developments in Business Simulation and Experiential Learning 29 (2012).
Lerman, Kristina, Rumi Ghosh, and Tawan Surachawala. "Social Contagion: An Empirical Study of Information Spread on Digg and Twitter Follower Graphs." arXiv preprint arXiv:1202.3162 (2012).
Social network demographics in 2012., 2012.
Social Networks Security Aspects. A Technological and User Based Perspectives In Jubilee National Conference with Foreign Participation TELECOM ., 2012.
Brymann, A.. Social Research Methods. 4th edition. Oxford: Oxford University Press, 2012.
Brymann, Alan. Social Research Methods. 4th ed. Oxford, UK: Oxford University Press, 2012.
Zulean, Marian. Social Science for Public Policy. Vol. Habilitation Dissertation. University of Bucharest, 2012.
Bai-wu, Wan. "Sociocybernetics and its progress: a review." Control Theory & Applications 29, no. 1 (2012).
Avgeriou, Paris. Software Engineering for Resilient Systems In Proceedings of 4th International Workshop on SERENE 2012. Berlin, Heidelberg: Springer-Verlag, 2012.
Lysenko, Sergiy, and Oleg Savenko. "Software for Computer Systems Trojans Detection as a Safety-Case Tool." Information & Security: An International Journal 28, no. 1 (2012): 121-132.
Somalia: Somali Political Process under Threat: UN. Horseed Media, 2012.
Sotirova, Evdokia, D.D. Dimitrov, and Krassimir Atanassov. "On Some Applications of Game Method for Modelling Part 1: Forest Dynamics." Proceedings of the Jangjeon Mathematical Society 15, no. 2 (2012): 115-123.
Corum, James S.. "Some Key Principles of Multinational Military Education." Connections: The Quarterly Journal 11, no. 4 (2012): 10-26.
Abikoye, O.C., J.O. Omolehin, and J.S. Sadiku. "Some Refinement on Iris Localization Algorithm." International Journal of Engineering and Technology 2, no. 11 (2012).
South East Europe Regular Economic Report: From Double-Dip Recession to Accelerated Reforms. World Bank, 2012.
Kucharkin, N. E., N. N. Ponomarev-Stepnoy, and V. A. Usov. Space Nuclear Power (Nuclear reactors with thermo-electric and thermionic conversion – “Romashka” and “Yenisey”). 2nd ed. Moscow: IzdAt, 2012.
Special Ops now Defines the Pentagon’s Expanding Wars. Global Research, 2012.
Keagle, James M.. "A Special Relationship: U.S. and NATO Engagement with the Partnership for Peace to Build Partner Capacity Through Education." Connections: The Quarterly Journal 11, no. 4 (2012): 59-73.
Spielman, Daniel. "Spectral Graph Theory." In Combinatorial Scientific Computing, 495-524. Boca Raton: Chapman & Hall/CRC Computational Science, CRC Press, 2012.
Scharre, Paul. "Spectrum of What?" Military Review 92, no. 6 (2012): 73-79.
Stout, Joseph. Spies, Politics and Power: El Departamento Confidencial en México, 1922-1946. Fort Worth: TCU Press, 2012.
Clarke, Justin. SQL Injection Attacks and Defense . USA: Syngress, 2012.
Bogdanor, Vernon. "Srebrenica: The Silence over Britain’s Guilt Must Be Ended." The Guardian (2012).
SSR in a nutshell: Manual for Introductory Training on Security Sector Reform. DCAF centre for security, development and the rule of law, and The International Security Sector Advisory Team (ISSAT), 2012.
Melenets, Andrey. "The State Corporate Cloud Computing- Based Network for Registration of Potentially Dangerous Objects." Information & Security: An International Journal 28, no. 1 (2012): 52-62.

Pages