Biblio

Export 21404 results:
2012
Tagarev, Todor, Valeri Ratchev, Venelin Georgiev, Petya Ivanova, and Lozan Bizov. Methodology for Planning Wartime Defence Capabilities. Sofia: Centre for Security and Defence Management, IICT-BAS, 2012.
Kharybin, Aleksandr, and Viktoriya Pohyl. "Methods of Assuring the Functional Safety of Aircraft On-Board Instrumentation&Control Systems in Their Life Cycle." Information & Security: An International Journal 28, no. 2 (2012): 296-312.
Andonov, Filip. Metodi za grupovo reshavane na zadachi na mnogokriterialnia analiz. IIKT, BAS, 2012.
MIA Announced the Names of Militants Liquidated in Lopota Valley. Internet.ge, 2012.
Hallett, M.. Microgrids: A Smart Defense Based NATO Contribution to Energy Security. Journal of Enerrgy Security, 2012.
"Militants from Dagestan Eliminated in Georgia Turned Out to be Residents of Georgian Vil-lages." Georgia Times (2012).
Military Expenditures by Country. Stockholm International Peace Research Institute (SIPRI), 2012.
Caforio, Giuseppe. "The Military Profession and Asymmetric Warfare." In New Wars, New Militaries, New Soldiers: Conflicts, the Armed Forces and the Soldierly Subject (Contributions to Conflict Management, Peace Economics and Development), 3-18. Vol. 19. Emerald Group Publishing Limited, 2012.
Military Strategy of the Republic of Lithuania., 2012.
"Ministry of Foreign Affairs, P. R. China." In Regular Press Conference., 2012.
"Ministry of Foreign Affairs, P. R. China, Regular Press Conferences 2011-2012.", 2012.
Rantatalo, Oscar. "The Miscellany of Militaristic Policing: A Literature Review." Journal of Policing, Intelligence and Counter Terrorism 7, no. 1 (2012): 51-65.
Mission Command In Army Doctrine Reference Publication. Washington, D.C.: Headquarters, Department of the Army, 2012.
Murray, Kristy, Peter Berking, Jason Haag, and Nikolaus Hruska. "Mobile Learning and ADL’s Experience API." Connections: The Quarterly Journal 12, no. 1 (2012): 45-49.
Glahn, Christian. "Mobile Learning in Security and Defense Organizations." Connections: The Quarterly Journal 12, no. 1 (2012): 1-3.
Netkachova, Kateryna. "Model and Implementation of Safety Case Cores." Information & Security: An International Journal 28, no. 2 (2012): 286-295.
Bozhilova, Maya. A Model for Defining the Software System State In Sixth International Scientific Conference “Hemus-2012”., 2012.
Cheng, Ma, Sun Hongbo, Xiao Tianyuan, Fan Wenhui, and Li Li. "A model-driven cloud manufacturing federated access technology (一种模型驱动的云制造联邦接入技术)." Computer Integrated Manufacturing System 7 (2012).
Cucciella, Federica. "Modeling Optimal Investments with Portfolio Analysis in Electricity Markets." Energy Education Science and Technology Part A: Energy Science and Research 30, no. 1 (2012): 673-692.
Tagarev, Todor, and Petya Ivanova. "Modelling Extreme Events for the Purposes of Security Foresight." Radioelectronic and Computer Systems, no. 59 (2012): 253-259.
Martins, José, Henriques dos Santos, and Paulo Nunes. "Modelo de Segurança da Informação para Organizações Militares em Ambiente de Guerra de Informação." Proelium (Revista Científica da Academia Militar) VII (2012): 31-66.
Alipiev, Ilian. Modus operandi of organized crime in Bulgaria In CSDM Views. Sofia: Centre for Security and defence Management, 2012.
Troxell, John F.. "The Moldovan Military Academy: Transforming Officer Education." Connections: The Quarterly Journal 11, no. 4 (2012): 99-107.
Bendania, Ahmed, and Salem Ahmed Al Dini. "Motivation for Volunteerism in the Kingdom of Saudi Arabia." In 10th ISTR Conference. Siena: Italy: Siena University, 2012.
Giles, John W.. Motivations and Misperceptions: An Abbreviated Guide to Why Individuals Join Islamic Fundamentalist Terror Organizations. Amazon, 2012.

Pages