Biblio

Export 21393 results:
2012
de Castella, Tom. How Did We Forget about Mutually Assured Destruction?. BBC News, 2012.
Mothana, Ibrahim. "How Drones Help Al Qaeda." New York Times (2012).
Halverson, Jeffry R., Bennett R. Furlow, and Steven R. Corman. How Islamist Extremists Quote the Qur’an., 2012.
Blackwood, Mikaela. "How Smart is Smart Defense? A Review of NATO’s Smart Defense Proposal." Connections: The Quarterly Journal 11, no. 3 (2012): 85-93.
Lis, Andrzej. "How to Strengthen Positive Organizational Behaviors Fostering Experiential Learning? The Case of Military Organizations." Journal of Entrepreneurship Management and Innovation 8, no. 4 (2012): 21-34.
Hodges, J., C. Jackson, and A. Barth. HTTP strict transport security., 2012.
The Human Brain Project: A Report to the European Commission . Lausanne: The HBP-PS Consortium, 2012.
Hungarian National Security Strategy., 2012.
Mansoor, Peter R., Williamson Murray, and Peter R. Mansoor. "Hybrid War in History." In Hybrid Warfare: Fighting Complex Opponents from the Ancient World to the Present. Cambridge: Cambridge University Press, 2012.
Murray, Williamson, and Peter R. Mansoor. Hybrid Warfare: Fighting Complex Opponents from the Ancient World to the Present. Cambridge: Cambridge University Press, 2012.
van Wyk, Milandré Heidi. IBM Incorporated: An exploration of an Egyptian work ethic as constructed by South African expatriates working in Cairo. Vol. , Master of Arts (Sociology). University of Stellenbosch, 2012.
Fitriawan, Helmy, Ouriz Pucu, and Yohanes Baptista. "Identifikasi Plat Nomor Kendaraan Secara Off-Line Berbasis Pengolahan Citra dan Jaringan Syaraf Tiruan." Electrician – Jurnal Rekayasa dan Teknologi Elektro, no. 2 (2012).
Tverdokhlebov, Vladimir. "Identifying the Reasons for Failures in Large-Scale Systems." Information & Security: An International Journal 28, no. 2 (2012): 236-247.
Identity, Motives of Intruders onto Georgian Territory Remain Unclear. Radio Free Europe/Radio Liberty, 2012.
Ilves in Washington: All NATO Allies Must Contribute to Cyber Security. ERR News, 2012.
Khatib, Lina. Image Politics in the Middle East: The Role of the Visual in Political Struggle. I.B.Tauris, 2012.
Sabri, Sahab, and Saeed Sabri-Matanagh. "The Impact of Information and Communications Technology Infrastructure on the Momentum of Organisational Change." The Journal of Applied Business and Economics 13, no. 4 (2012): 85-95.
Archetti, Cristina. "The impact of new media on diplomatic practice: An evolutionary model of change." The Hague Journal of Diplomacy 7, no. 2 (2012): 181-206.
Montagnese, Alfonso. Impact of Social Media on National Security. Centro Militare di Studi Strategici (Italy), 2012.
Arh, Tanja, Borka Blazic, and Vlado Dimovski. "The impact of technology-enhanced organisational learning on business performance: An empirical study." Journal of East European Management Studies 17, no. 3 (2012): 369-383.
Klaic, Aleksandar, and Anita Peresin. "The Impact of the National Information Security Regulation Framework on Cyber Security in Global Environment." In International Scientific Conference on Corporate Security in Dynamic Global Environment - Challenges and Risks, 85-96. Ljubljana, Slovenia: Institute for Corporative Security Studies, 2012.
Grobler, Martie, Joey Jansen Van Vuuren, and Louise Leenen. "Implementation of a Cyber Security Policy in South Africa: Reflection on Progress and the Way Forward." Council for Scientific and Industrial Research (2012).
Kraan, Wilbert, Steve Lay, and Pierre Gorissen. IMS Question & Test Interoperability Assess-ment Test, Section and Item Information Model., 2012.
Zenn, Jacob. "IMU Reestablishes Bases in Northern Afghanistan." CACI Analyst (2012).
Zhengyuan, Xu. "In the Shadow of Great Powers: A Comparative Study of Various Approaches to Regionalism in Central Asia." Connections: The Quarterly Journal 9, no. 4 (2012): 37-52.

Pages