Biblio

Export 21387 results:
2011
Khan, Mirwais, and Rahim Faiez. "Afghans Anxious About Exit of Foreign Troops." USA Today (2011).
Braithwaite, Rodric. Afghantsy: The Russians in Afghanistan 1979–1989. London: Profile Books, 2011.
Chetrafilski, Dimitar. "After Lisbon: Considerations over NATO-related Military Implications for the Bulgarian Security and Defense Policy." Securitate Prin Cooperare 6 (2011).
Lacey, Stephen. "After North Sea Oil Spill, Shell Plans to Continue Arctic Drilling." Grist (2011).
Stolk, D.. Aftermath Crisis Management – Approaches and Solutions. Deliverable D5.1. ACRIMAS project, 2011.
Alberts, David S.. The agility advantage: a survival guide for complex enterprises and endeavors In DoD Command and Control Research Program. Washington, DC, 2011.
Wigglesworth, Robin, and Simeon Kerr. "Ahmadinejad Condemns Foreign Troops in Bahrain." Financial Times (2011).
Akcioni plan uspostave BIH CERT-a., 2011.
Page, Michael, Lara Challita, and Alistair Harris. "Al Qaeda in the Arabian Peninsula: Framing Narratives and Prescriptions." Terrorism and Political Violence 23, no. 2 (2011): 159.
Jenkins, Brian M.. Is Al Qaeda’s Internet Strategy Working? In Testimony presented before the U.S. House of Representatives Homeland Security Committee. RAND Corporation, Subcommittee on Counterterrorism and Intelligence, 2011.
Donilon, Tom. "America is Back in the Pacific and Will Uphold the Rules." Financial Times (2011).
Choong, William. "America’s Clout: That Shrinking Feeling." The Straits Times (2011).
Clinton, Hillary. "America’s Pacific Century." Foreign Policy (2011).
Clinton, Hillary Rodham. America’s Pacific Century. Honolulu: East-West Centre, 2011.
"Is America Spending Too Much on Homeland Security?" The Economist (2011).
Srihari, Sargur N.. Analysis of Footwear Impression Evidence In US DoJ Report., 2011.
Peng, Lan. "An Analysis of the Feasibility of Cooperation in the Energy Sector Between China and Central Asia Based on the SWOT Method (Strengths, Weaknesses, Opportunities, Threats)." KejiaoDaokan – The Guide of Science and Education (2011): 240-41.
Anti Evil Maid. The Invisible Things blog.com, 2011.
Grishin, Vladimir. "Application of Artificial Intelligence Methods in Unmanned Aerial Vehicle Control." Journal of Information, Intelligence and Knowledge 3, no. 4 (2011): 297-314.
.W.T.Ngai, E, , Y.H.Wong, , and . "The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature." Decision Support Systems 50, no. 3 (2011): 559-569.
Arcioni, Sandro. Apport des théories de la gouvernance des entreprises pour définir une gouvernance du cyberespace., 2011.
Tsai, Wei-Tek, Yinong Chen, Xiaoying, Jay Elston, Janaka Balasooriya, and Peide Zhong. An Approach for Service Composition and Testing for Cloud Computing In 10th International Workshop on Assurance in Distributed Systems and Networks (ADSN). Hiroshima, 2011.
Mehisto, Peeter, and David Marsh. "Approaching the economic, cognitive and health benefits of bilingualism: Fuel for CLIL." In Content and Foreign Language Integrated Learning, 36. Bern: Peter Lang, 2011.
Robertson, Graeme. "Arab Autocrats May be Tottering, but the World’s Tyrants Aren’t All Quaking in their Steel Toed Boots." Foreign Policy 186 (2011).
Herd, Graeme P.. "The Arab Spring: Challenges, Obstacles and Dilemmas." Connections: The Quarterly Journal 10, no. 4 (2011): 103-120.

Pages