Biblio

Export 21404 results:
2014
Mendelsohn, Barak. After Disowning ISIS, al Qaeda is Back on Top. Foreign Affairs, 2014.
Kucera, Joshua. "After Summit, Caspian Sea Questions Linger." The Diplomat (2014).
Alimov, Timur. "’Alabuga’ will make useless enemy equipment (in Russian)." Russian weapons (2014).
Begaj, Eranda. Albania’s Vision towards Cyber Security In Paper from DCAF Young Faces 2014 - Cybersecurity Winter School for the Western Balkans. Geneva: DCAF, 2014.
Al-Da’ma, Muhammad. "al-da’iyya al-urduniyya al-mutashaddad Abu Qatada yantaqad I’lan al-khilafa al-islamiyya." Al-Sharq al-Awsat 16, no. 7 (2014).
DeFillippi, Robert, and Thorsten Rose. "Aligning the co-creation project portfolio with company strategy." Strategy & Leadership 42, no. 1 (2014): 30-36.
Lakoff, George. The ALL NEW Don't Think of an Elephant! Know Your Values and Frame the Debate. White River Junction, VT: Chelsea Green Publishing, 2014.
Schmid, Alex P.. Al-Qaeda’s “Single Narrative” and Attempts to Develop Counter-Narratives: The State of Knowledge In ICCT Research Paper. The Hague: The International Centre for Counter-Terrorism (ICCT), 2014.
Riechmann, Deb. "Al-Qaida decentralized, but not necessarily weaker." Associated Press (2014).
Althea/BiH. European Union External Action, 2014.
Apps, Peter. Ambiguous Warfare’ Providing NATO with New Challenges, Reuters., 2014.
Kovačević, Božo. "Američko javno-privatno partnerstvo i cyber sigurnost." Politička misao 51, no. 3 (2014): 76-100.
Amfilohije osudio politiku Crne Gore prema Rusiji [Amfilohije Condemned Montenegro’s Policy Towards Russia]. Blic, 2014.
Loretoni, Anna. Ampliare lo sguardo. Genere e teoria politica. Roma: Donzelli, 2014.
Ripley, Tim, and Bruce Jones. "Analysis: How Russia Annexed Crimea." IHS Jane’s Defense Weekly 51, no. 14 (2014): 5.
Gospodinova, Elitsa, Mario Angelov, and Taschko Nikolov. Analysis of a Security System for Distributed Data Transmission of Voice In MT&S-2013 Conference. Sofia: Defence Institute, 2014.
Calzarossa, M.C., and L. Massari. Analysis of header usage patterns of HTTP request messages In 16th IEEE Int. Conf. on High Performance Computing and Communications, 11th IEEE Int. Conf. on Embedded Software and Systems., 2014.
Kharchenko, Vyacheslav, and Yuriy P. Kondratenko. "Analysis of Peculiarities of Innovative Collaboration between Academic Institutions and IT Companies in Areas S2B and B2S." Technical News − in Ukrainian 39-40 (2014): 15-19.
Siddiqui, Abdul Hameed, Mansoor Ahsan, Shair Afgan Rind, and Attaullah Memon. "Analysis of varying control inputs for a fixed wing unmanned aerial vehicle." In 17th IEEE International Multi Topic Conference 2014 . Karachi, Pakistan, 2014.
Turgut, Erhan, Salih Ergün, and Abdülkadir Öz. "Analyzing and Determining the Ideal Response Force for Combatting Terrorist Groups." International Journal of Electronics and Communication Engineering 8, no. 3 (2014).
Darczewska, Jolanta. The Anatomy of Russian Information Warfare. The Crimean Operation, a Case Study In OSW Point of View series, Warsaw: Center for Eastern Studies. Vol. 42., 2014.
Angry Birds Web Page., 2014.
Annual National Plan 2014 for implementation of the National Programme for Disaster Protection 2014-2018., 2014.
Annual Report on the Implementation of the Swiss–Latvian Cooperation Programme in Latvia April 2013 – March 2014., 2014.
Ansar Beit al-Maqdis Pledges Allegiance to the Islamic State. SITE Intelligence, 2014.

Pages