Biblio

Export 21423 results:
2012
Marz, Nathan, and James Warren. Big Data: Principles and best practices of scalable realtime data systems. Manning, 2012.
Maiti, Chinmay, and Bibhas Chandra Dhara. "A binary watermarking scheme using quantization levels of BTC-PF method." In International Conference on Communications, Devices and Intelligent Systems (CODIS). Kolkata, India , 2012.
Boko Haram’s kingpin confesses: Top Police officers helped me to escape(link is external)., 2012.
Sims, Christopher, Fernando Luján, and Bing West. "Both Sides of the COIN: Defining War After Afghanistan(link is external)." Foreign Affairs (2012).
Briefing by L. Brahimi to the UN Security Council In closed consultations., 2012.
Briefing by Russian MFA official spokesman A.K. Lukashevich(link is external). Vol. 9 February 2012. Official website of the Russian Ministry of Foreign Affairs, 2012.
Sharma, Ruchir. "Broken BRICs: Why the Rest Stopped Rising." Foreign Affairs (2012): 2-7.
Georgescu, E.-S., and A. Pomonis. "Building Damage vs. Territorial Casualty Patterns during the Vrancea (Romania) Earthquakes of 1940 and 1977." In 5th World Conference on Earthquake. Lisboa, 2012.
Barry, Charles. Building Future Transatlantic Interoperability Around a Robust NATO Response Force In Transatlantic Current. Washington, D.C.: National Defense University, Institute for National Strategic Studies, 2012.
Badrak, Valentin. Building Integrity in Defence Establishments: A Ukrainian Case Study. Kyiv: Centre for Army, Conversion and Disarmament Studies, 2012.
Aldrich, Daniel P.. Building Resilience: Social Capital in Post-Disaster Recovery. Chicago: University of Chicago Press, 2012.
Stanchev, Krasen. Bulgarian Economy: What the Politicians Do Not See(link is external). Sofia: Institute for Market Economics, 2012.
Beutel, Martha D.. Buying Decline: The Privatization of Foreign. Vol. Doctor of Philosophy. Coral Gables, Florida: InterventionUniversity of Miami, 2012.
Osipian, Ararat L.. By Iron and Bribe: Corporate, Property & Land Raiding Russian Style. Press, 2012.
Morrow, Bill. "BYOD Security challenges: control and protect your most sensitive data." Network Security 12 (2012): 5-8.
Vardeva, Ivelina, and Valery Gochev. Calculation of Estimations of Messages by Generalized Nets and Intuitionistic Fuzzy Truth Values In 2012 6th IEEE International Conference Intelligent Systems. Sofia, Bulgaria, 2012.
D. Pressman, Elaine, and John Flockton. "Calibrating Risk for Violent Political Extremists and Terrorists: The VERA 2 Structured Assessment." British Journal of Forensic Practice 14, no. 4 (2012): 237-51.
A Case for Intelligence Reforms in India(link is external) In IDSA Task Force Report. New Delhi: Institute for Defence Studies and Analyses, 2012.
Patel, Preeti. "Causes of Conflict." In Conflict and Health, 5-13. Maidenhead: Open University Press, 2012.
Tadjbakhsh, Shahrbanou. Central Asia and Afghanistan: Insulation on the Silk Road between Eurasia and the Heart of Asia . Oslo: PRIO, 2012.
Tynan, Deirdre. Central Asia: Russia Taking Steps to Reinforce Security Relationships(link is external). EurasiaNet.org, 2012.
Kucera, Joshua. Central Asia: What is China’s Policy Driver?(link is external). Eurasianet.org, 2012.
Chairman G.A. Zyuganov of the CPRF CC: “China is the locomotive that is pulling other countries out of the economic crisis”(link is external). Vol. 15 November 2012. People’s Daily Online, 2012.
Dempsey, Martin. Chairman’s Corner: Strategic Direction to the Joint Force(link is external)., 2012.
Galád, Adriana Zobrist. "The Challenges and Role of Structures in the Reconstruction of Afghanistan." Connections: The Quarterly Journal 11, no. 2 (2012): 5-35.

Pages