Biblio

Export 21404 results:
2012
National Institute of Standards and Technology. Guide for Conducting Risk Assessments. Vol. SP 800-30 Rev. 1, Publication 800-30. Gaithersburg, MD: U.S. Department of Commerce, 2012.
Diallo, Saikou Y., and Jose J. Padilla. "Handbook of Real-World Applications in Modeling and Simulation." In Handbook of Real-World Applications in Modeling and Simulation. John Wiley & Sons, 2012.
Boot, Max. "A Hard-Won Account of a Hard-Won Victory." The Wall Street Journal (2012).
Labouche, Thomas. "Has U.S. Leadership Been Revitalized Through Barack Obama’s Innovative Use of Force?" Connections: The Quarterly Journal 11, no. 2 (2012): 37-52.
Pryor, P. Hazard as a Concept. Tullamarine, Australia: Safety Institute of Australia, 2012.
Headquarters Department of the Army, ATP 2-22.9 In Army Techniques Publication. Washington, DC., 2012.
Hillary Clinton’s remarks at the Joint Discussion with Israeli President Shimon Peres, hosted by the Brookings Institution., 2012.
Wege, Carl Anthony. "Hizballah's Counterintelligence Apparatus." International Journal of Intelligence and CounterIntelligence (2012): 777.
Khatib, Lina. Hizbullah’s Image Management Strate In CPD Perspectives on Public Diplomacy. Los Angeles: Figueroa Press, 2012.
Gaines, Larry K., and Victor E. Kappeler. Homeland Security. New Jersey: Prentice Hall, 2012.
Lagadec, Patric, and Benjamin Topper. "How Crises Model the Modern World." Journal of Risk Analysis and Crisis Response 2, no. 1 (2012): 21-33.
de Castella, Tom. How Did We Forget about Mutually Assured Destruction?. BBC News, 2012.
Mothana, Ibrahim. "How Drones Help Al Qaeda." New York Times (2012).
Halverson, Jeffry R., Bennett R. Furlow, and Steven R. Corman. How Islamist Extremists Quote the Qur’an., 2012.
Blackwood, Mikaela. "How Smart is Smart Defense? A Review of NATO’s Smart Defense Proposal." Connections: The Quarterly Journal 11, no. 3 (2012): 85-93.
Lis, Andrzej. "How to Strengthen Positive Organizational Behaviors Fostering Experiential Learning? The Case of Military Organizations." Journal of Entrepreneurship Management and Innovation 8, no. 4 (2012): 21-34.
Hodges, J., C. Jackson, and A. Barth. HTTP strict transport security., 2012.
The Human Brain Project: A Report to the European Commission . Lausanne: The HBP-PS Consortium, 2012.
Hungarian National Security Strategy., 2012.
Mansoor, Peter R., Williamson Murray, and Peter R. Mansoor. "Hybrid War in History." In Hybrid Warfare: Fighting Complex Opponents from the Ancient World to the Present. Cambridge: Cambridge University Press, 2012.
Murray, Williamson, and Peter R. Mansoor. Hybrid Warfare: Fighting Complex Opponents from the Ancient World to the Present. Cambridge: Cambridge University Press, 2012.
van Wyk, Milandré Heidi. IBM Incorporated: An exploration of an Egyptian work ethic as constructed by South African expatriates working in Cairo. Vol. , Master of Arts (Sociology). University of Stellenbosch, 2012.
Fitriawan, Helmy, Ouriz Pucu, and Yohanes Baptista. "Identifikasi Plat Nomor Kendaraan Secara Off-Line Berbasis Pengolahan Citra dan Jaringan Syaraf Tiruan." Electrician – Jurnal Rekayasa dan Teknologi Elektro, no. 2 (2012).
Tverdokhlebov, Vladimir. "Identifying the Reasons for Failures in Large-Scale Systems." Information & Security: An International Journal 28, no. 2 (2012): 236-247.
Identity, Motives of Intruders onto Georgian Territory Remain Unclear. Radio Free Europe/Radio Liberty, 2012.

Pages