Biblio

Export 21393 results:
2013
Miklaucic, Michael, and Jacqueline Brewer. Illicit Networks and National Security in the Age of Globalization. Center for Complex Operations (National Defense University Press), 2013.
Yunwen, Zhang, Yao Jingshun, and Dong Tianzhong. "IMM model group selection and parameter setting (IMM 模型组的选择与参数的设定)." Journal of System Simulation 25, no. 004 (2013).
"IMM 模型组的选择与参数的设定." 系统仿真学报 25, no. 004 (2013).
Shehu, B.. "Immigration Officers Who Help Boko Haram." Vanguard 1 (2013): 8-9.
D.Craig, Scotty, Xiangen Hu, Arthur C.Graesser, Anna E.Bargagliott, Allan Sterbinsky, Kyle R. Cheney, and Theresa Okwumabua. "The impact of a technology-based mathematics after-school program using ALEKS on student's knowledge and behaviors." Computers & Education 68, no. 68 (2013): 495-504.
Huang, Yu, and Hualin Cheng. "The impact of climate change on coastal geological disasters in southeastern China." Natural hazards 65 (2013): 377-390.
Ott, Marvin C.. The Imperative for an American Strategy for Southeast Asia. Foreign Policy Research Institute, September, 2013.
Jovetic, Ivan. "Implications of Technological Changes on Police and Strategy of Defense and Security." In International scientific conference: the Balkans between past and future: security, conflict resolution and Euro-Atlantic integration. Ohrid, 2013.
Romo, Güera. "Improving human performance: Industry factors influencing the ability to perform." Knowledge Management & E-Learning: An International Journal 5, no. 1 (2013): 66-83.
Bloom, Mia M.. "In Defense of Honor: Women and Terrorist Recruitment on the Internet." Journal of Postcolonial Cultures and Societies 4, no. 1 (2013): 150-195.
A. Bokwa, Föhn, and P.T Bobrowsky. "In Encyclopedia of Natural Hazards .", 346. Dordrecht, The Netherlands: Springer, 2013.
Krastev, Ivan. In Mistrust We Trust: Can Democracy Survive When We Don’t Trust Our Leaders?. TED Books, 2013.
Ackerman, Spencer, and Paul Lewis. "In Snowden’s wake, Congress cools on spying." Guardian (2013).
In the Interest of the Netherlands. The Netherlands’ Ministry of Defence, 2013.
In the margins of the BRICS summit, Vladimir Putin met with Muhammed Morsi. Vol. 29 March 2013. Vesti.ru, 2013.
Willschick, Aaron. In Too ‘DEEP.’ NATO as an Institutional Educator In NATO Association of Canada., 2013.
Treffers, Stefan R.. "Increased Globalization of Crime." In Crime Classification Manual : A Standard System for Investigating and Classifying Violent Crimes, 431-470. John Wiley & Sons, 2013.
Atanassov, Krassimir, Evdokia Sotirova, and Veselina Bureva. "On Index Matrices Part 4: New Operations over Index Matrices." Advanced Studies in Contemporary Mathe¬matics (Kyungshang) 23, no. 3 (2013): 547-552.
Watson, Sarah J., and Christine C. Fair. "India’s Stalled Internal Security Reforms." India Review 12, no. 4 (2013): 280-299.
Mavhura, Emmanuel, Siambalala Benard Manyena, Andrew E. Collins, and Desmond Manatsa. "Indigenous knowledge, coping strategies and resilience of floods in Muzarabani, Zimbabwe." International Journal of Disaster Risk Reduction 5 (2013): 38-48.
Hristov, Stoyan. Inequality in Bulgaria – Dynamics, Comparative Analysis and Reasons. Sofia: Institute for Market Economics, 2013.
Jatkauskaitė, Justina. Influence of Eu Common Energy Policy on Lithuania’s Energy Security After the Treaty of Lisbon In Euro College. Vol. Master. Tartu: University Of Tartu, 2013.
Zharkov, Jaroslav M., Volodymyr M. Petryk, Mykola M. Prysjazhnjuk, Jevhen D. Skulysh, and Larysa F. Kompanceva. Informacijno-psyhologichne protyborstvo (evoljucija ta suchasnist): monografija. Kyiv: Vipol, 2013.
Ostapenko, Hryhoriy A., Lyudmyla V. Parynova, Volodymyr Y. Belonozhkyn, Yuriy L. Bataronov, and Kyryl V. Symonov. Informacyonnye ryski v socyalnyh setjah. Voronezh: Chair of NIB, 2013.
Hilmi, Mohd Faiz, Shahrier Pawanchik, Yanti Mustapha, and Hafizi Muhamad Ali. "Information Security Perspective of a Learning Management System: An Exploratory Study." International Journal of Knowledge Society Research 4, no. 2 (2013).

Pages