Biblio

Export 21393 results:
2011
Guber, A. K., Y. A. Pachepsky, A. M. Yakirevich, D. R. Shelton, A. M. Sadeghi, D. C. Goodrich, and C. L. Unkrich. "Uncertainty in modelling of faecal coliform overland transport associated with manure application in Maryland." Hydrological processes 25, no. 15 (2011).
Underground Economies: Intellectual Capital and Sensitive Corporate Data Now the Latest Cybercrime Currency. McAfee and SAIC, 2011.
Diallo, Saikou Y., Heber Herencia-Zapana, Jose J. Padilla, and Andreas Tolk. Understanding interoperability In EAIA '11 Proceedings of the 2011 Emerging M&S Applications in Industry and Academia Symposium., 2011.
United Nations Security Council Resolution 1973., 2011.
Kitchen, Nicholas. The United States After Unipolarity: Executive Summary In IDEAS reports. London: London School of Economics and Political Science, 2011.
Universalen simulator ot Avstralia., 2011.
Cavelty, Myriam Dunn. "Unraveling the Stuxnet Efect: Of Much Persistence and Little Change in the Cyber Threats Debate." Military and Strategic Affairs 3, no. 3 (2011): 11-19.
Souleimanov, Emil. "The Upsurge of Islamist Violence in the North Caucasus: Exploring the Case Studies of Dagestan and Kabardino-Balkaria." Connections: The Quarterly Journal 10, no. 3 (2011): 117-126.
Mindling, George, and Robert Bolton. U.S. Air Force Tactical Missiles 1949-1969: The Pioneers. Morrisville, North Carolina: Lulu.com Publishing, 2011.
Schmidt, Howard. U.S. and Russia: Expanding the “Reset” to Cyberspace In The White House Blog., 2011.
Kretchik, Walter E.. U.S. Army Doctrine: From the American Revolution to the War on Terror. Lawrence, KS: University Press of Kansas, 2011.
Mattis, James N.. U.S. Central Command Posture Statement., 2011.
U.S. Department of State, Office of the Coordinator for Counterterrorism, Country Reports on Terrorism 2010 . Washington, D.C.: State Department, 2011.
Menn, Joseph. "U.S. Power Plants Vulnerable to Cyberattack." Financial Times (2011).
U.S. Shifts Supply Routes To Central Asia. Radio Free Europe/Radio Liberty, 2011.
Norris, Robert S., and Hans M. Kristensen. "U.S. Tactical Nuclear Weapons in Europe, 2011." Bulletin of the Atomic Scientists 67 (2011): 64-73.
Tian, Wang. U.S. Uses ‘Hedging’ Strategy to Deal with China’s Rise. People’s Daily, 2011.
Pepi, Stephanie. USAID launches the Albanian Cyber-Security Program., 2011.
On the use of Sigint by DISS In Annual Report . Committee on the Intelligence and Security Services, 2011.
Blanchet, Bruno. "Using Horn Clauses for Analyzing Security Protocols." In Formal Models and Techniques for Analyzing Security Protocols, 86-111. Amsterdam: IOS Press, 2011.
Averill, Bruce. "Using Public-Private Partnerships to Improve International Energy Infrastructure Security." (2011).
Brönnimann, Gabriel, Thomas Gartmann, Jennifer Giroux, Manuel Suter, and Myriam Dunn Cavelty. Using scenarios to assess risks examining trends in the public sector., 2011.
McGee, Joshua. US-Russia Diplomacy -The “Reset” of Relations in Cyberspace. Center for Strategic and International Studies Web Site, 2011.
Trilling, David. Uzbekistan’s Karimov Lashes Out at Putin’s Union. Eurasia Net.org, 2011.
VA Education Benefits: Actions Taken, but Outreach and Oversight Could Be Improved. Washington, D.C.: U.S. Government Accountability Office, 2011.

Pages