Biblio

Export 21406 results:
2012
Orange, Richard. "Al Qaeda Rejects Anders Behring Breivik Comparison." The Telegraph (2012).
Nakashima, Ellen, and Joby Warrick. "Al Qaeda’s Online Forums Go Dark for Extended Period." Washington Post (2012).
Tola, Dorian. Albanian-NATO relations in the fight against international terrorism. Monterey, California: Naval Postgraduate School, 2012.
Benkirane, Reda. "The Alchemy of Revolution: The Role of Social Networks and New Media in the Arab Spring." GCSP Policy Paper 7 (2012).
Benkirane, Reda. The Alchemy of Revolution: The Role of Social Networks and New Media in the Arab Spring. Geneva Centre for Security Policy, 2012.
Glenn, Russell W.. All Glory Is Fleeting: Insights from the Se¬cond Lebanon War . Santa Monica, CA: RAND, 2012.
All Hazards Risk Assessment Methodology Guidelines 2012–2013. Ottawa: Public Safety Canada, 2012.
Biryukov, Sergey. "The All-Invasive Clientella." Svobodnaya Mysl 7 (2012): 32-33.
. Almanac 2012: Governing and Reforming Kyrgyzstan Security Sector., 2012.
al-Filastini, Abu Qatada. al-Muqaraba li nazilat al-’asr. Copenhagen: al-Nur, 2012.
Raghavan, Sudarsan, and Peter Finn. "Al-Qaeda bombmaker Ibrahim Hassan al-Asiri has tried to attack the U.S. three times, officials say." Washington Post (2012).
Gonçalves, Francisco. "A Ameaça Jihadista nos Estabelecimentos Prisionais: Desafios e Dilemas." Nação e Defesa 132 (2012): 192-211 .
Panetta, Leon E.. America’s Pacific Rebalance In Project Syndicate., 2012.
Zareapoor, Masoumeh, K.R. Seeja, and M.Afshar.Alam. "Analysis of Credit Card Fraud Detection Techniques: based on Certain Design Criteria." International Journal of Computer Applications (0975 – 8887) 52, no. 3 (2012).
Tagarev, Todor, Venelin Georgiev, and Petya Ivanova. "Analytical Support to Critical Infrastructure Protection Policy and Investment Decision-Making." Information & Security: An International Journal 28, no. 1 (2012): 13-20.
Annexes to Chapter 1 of the Small Arms Survey 2011: States of Security., 2012.
Annual Report of the ICC., 2012.
Annual Report of the Ministry of Defence for 2011. Ljubljana, 2012.
Annual Report of the Security Information Service for 2012. Security Information Service, 2012.
Ministers, Council of. Annual Report on the Status of National Security of the Republic of Bulgaria in 2011., 2012.
Kolegov, Ivaylo. Apple patent describes a great 3D camera., 2012.
Anifowose, Fatai Adesina, and Safiriyu Ibiyemi Eludiora. "Application of Artificial Intelligence in Network Intrusion Detection." World Applied Programming 2, no. 3 (2012): 158-166.
Subed, Jishnu. "Application of Information Technology in Disaster and Emergency Management." International Journal of Cyber Warfare and Terrorism (IJCWT) 2, no. 4 (2012).
Brezhnev, Eugene. "An Approach for Assessing Risk of Common Cause Failures in Critical Infrastructures." Information & Security: An International Journal 28, no. 2 (2012): 199-210.
Krasovska, Hanna, Olha Izmailova, and Kateryna Krasovska. "Approach to Construct an Information Basis for Decision-Making System for a Comprehensive Assessment of Innovative Technogenic Safety Projects in Construction." Shliakhy pidvyshchennia efektyvnosti budivnytstva v umovakh formuvannia rynkovykh vidnosyn: Zb. naukovykh prats 28 (2012): 222-229.

Pages