Biblio

Export 21393 results:
2012
Caymaz, Ebru, and Fahri Erenel. Addressing the Need of Qualified Personnel in Defense Industry: The Turkish Case In 7th International Scientific Conference “Defense Resources Management in the 21st Century. Braşov, 2012.
ADL Mobile Learning Handbook. ADL Web site, 2012.
Advanced Distributed Learning (ADL) Initiative In Experience API. Draft Specification., 2012.
Adventures with Daisy in Thunderbolt-DMA-land: Hacking Macs through the Thunderbolt interface. Break&Enter.org, Security News, Tools & Methodology, 2012.
Tolipov, Farhod. Afghan Worries Prompt US Defence Aid for Uzbekistan. Institute for War and Peace Reporting, 2012.
Afghanistan Index: Tracking Variables of Reconstruction & Security in Post-9/11 Afghanistan. Brookings Institute, 2012.
Afghanistan to 2015 and Beyond In Adelphi Series. Vol. 425–26. International Institute for Strategic Studies, 2012.
Brzezinski, Zbigniew. "After America." Foreign Policy (2012): 26-29.
Barnett, Thomas P. M.. "AirSea Battle: The Military-Industrial Complex’s Self-Serving Fantasy." Time (2012).
Akhmed Chataev Innocent – MIA Compelled Witness to Sign Fake Testimonies. Human-rights.ge, 2012.
Riedel, Bruce. "Al Qaeda 3.0: Terrorism’s Emergent New Power Bases." The Daily Beast (2012).
Orange, Richard. "Al Qaeda Rejects Anders Behring Breivik Comparison." The Telegraph (2012).
Nakashima, Ellen, and Joby Warrick. "Al Qaeda’s Online Forums Go Dark for Extended Period." Washington Post (2012).
Tola, Dorian. Albanian-NATO relations in the fight against international terrorism. Monterey, California: Naval Postgraduate School, 2012.
Benkirane, Reda. The Alchemy of Revolution: The Role of Social Networks and New Media in the Arab Spring. Geneva Centre for Security Policy, 2012.
Benkirane, Reda. "The Alchemy of Revolution: The Role of Social Networks and New Media in the Arab Spring." GCSP Policy Paper 7 (2012).
Glenn, Russell W.. All Glory Is Fleeting: Insights from the Se¬cond Lebanon War . Santa Monica, CA: RAND, 2012.
All Hazards Risk Assessment Methodology Guidelines 2012–2013. Ottawa: Public Safety Canada, 2012.
Biryukov, Sergey. "The All-Invasive Clientella." Svobodnaya Mysl 7 (2012): 32-33.
. Almanac 2012: Governing and Reforming Kyrgyzstan Security Sector., 2012.
al-Filastini, Abu Qatada. al-Muqaraba li nazilat al-’asr. Copenhagen: al-Nur, 2012.
Raghavan, Sudarsan, and Peter Finn. "Al-Qaeda bombmaker Ibrahim Hassan al-Asiri has tried to attack the U.S. three times, officials say." Washington Post (2012).
Gonçalves, Francisco. "A Ameaça Jihadista nos Estabelecimentos Prisionais: Desafios e Dilemas." Nação e Defesa 132 (2012): 192-211 .
Panetta, Leon E.. America’s Pacific Rebalance In Project Syndicate., 2012.
Zareapoor, Masoumeh, K.R. Seeja, and M.Afshar.Alam. "Analysis of Credit Card Fraud Detection Techniques: based on Certain Design Criteria." International Journal of Computer Applications (0975 – 8887) 52, no. 3 (2012).

Pages