Biblio

Export 21387 results:
2012
China’s Investment in the Countries of Central Asia Are Almost $250 Billion—Wen Jiabao. Kyrgyz Telegraph Agency, 2012.
Richardson, Michael. "China’s Thirst for Oil and Gas." Canberra Times (2012).
Walton, Timothy A.. China’s Three Warfares. Herndon, VA: Delex Systems, 2012.
China Seeks Regional Energy Cooperation as Challenges Mount. People’s Daily Online, 2012.
Yuan, Luo. China Should Stay Calm, Alert about U.S. Strategy Adjustments. PLA Daily, 2012.
Jiao, Wu. "China Welcomes US Role in Asia-Pacific Region." China Daily (2012).
Malhotra, A.. Chinese Inroads into Central Asia: Focus on Oil and Gas. Journal of Energy Security, 2012.
Illiashenko, Oleg, and Eugene Babeshko. "Choosing FMECA-Based Techniques and Tools for Safety Analysis of Critical Systems." Information & Security: An International Journal 28, no. 2 (2012): 275-285.
CIA World Factbook - Armenia., 2012.
Kilcullen, David. "The City as a System: Future Conflict and Urban Resilience." The Fletcher Forum of World Affairs 36, no. 2 (2012): 19-39.
Procházková, Dana. "Civil protection." In International Conference on “Global Existential Risks” (Globálne existenciálne riziká) . Žilina, 2012.
Civil Protection Cooperation for the Candidate Countries and Potential Candidates In Analytical Study on Host Nation Support., 2012.
Tagarev, Todor. Civilian Control in Defence (in Russian)., 2012.
Appelrouth, Scott A., and Laura Desfor Edles. Classical and Contemporary Theory. 2nd Edition ed. Thousand Oaks, CA: Pine Forge Press, 2012.
Grishin, Vladimir. Classical Control Theory and Methods of Artificial Intelligence. Curse of Dimensionality., 2012.
Brzoska, Michael. "Climate change and the military in China, Russia, the United Kingdom, and the United States." Bulletin of the Atomic Scientists 62, no. 2 (2012): 43-54, p. 48.
Clover, Charles. "Clinton Vows Thwart New Soviet Union." Financial times (2012).
Vilkomir, Sergiy. "Cloud Testing: A State-of-the-Art Review." Information & Security: An International Journal 28, no. 2 (2012): 213-222.
Capodieci, A., A.L. Guido, L. Mainetti, and U. Barchetti. "Collaborative Process Management for the Networked Enterprise: A Case Study." In 26th IEEE International Conference on Advanced Information Networking and Applications Workshops. WAINA, 2012.
Williamson, Wade. Combating Emerging Threats Through Security Collaboration. Security Week, 2012.
Silk, Dan. Community Policing to Prevent Violent Extremism In FBI Law Enforcement Bulletin., 2012.
Hartley, Keith. "Company Survey Series: I: BAE Systems Plc." Defence and Peace Economics 23:4 (2012).
Djebbar, Fatiha, Beghdad Ayad, Karim Abed Meraim, and Habib Hamam. "Comparative study of digital audio steganography techniques." EURASIP Journal on Audio, Speech, and Music Processing 1 (2012): 25.
Son, Joon, Chinedum Irrechukwu, and Patrick Fitzgibbons. "A Comparison of Virtual Lab Solutions for Online Cyber Security Education." Communiactions of the IIMA 2, no. 4 (2012).
Weng, Lilian, Alessandro Flammini, Alessandro Vespignani, and Filippo Menczer. "Competition among Memes in a World with Limited Attention." Nature Scientific Reports 2, no. Article number: 335 (2012).

Pages