Biblio

Export 21372 results:
2015
Fisas, Vinceç. The Design and Architecture of Peace Processes: Lessons Learned in the Wake of Crises. Oslo: Norwegian Peacebuilding Resource Centre, 2015.
Santhi, S, and GS Sadasivam. "Design and development of compact monitoring system for disaster remote health centres." Indian J Med Microbiol [serial online] (2015): 33.
Deepa, R. Design of a clustering protocol and a Trust model for service discovery in Mobile ad hoc networks., 2015.
Designations of Foreign Terrorist Fighters In Press Release| Media Note, U.S. Department of State. Bureau of Public Affairs Department of State. The Office of Website Management, 2015.
Erickson, Anthony, Ben Shaw, Jane Murray, and Sara Branch. "Destructive Leadership: Causes, consequences and countermeasures." Organizational Dynamics 44 (2015): 266-72.
Navozenko, D.. Development of a program complex of password protection by the principle “inquiry answer”. Vol. MR Thesis [manuscript] - in Russian. Dnipropetrovsk, 2015.
Directorate for Science, Technology and Industry. The Development of Fixed Broadband Networks In OECD Digital Economy Papers ., 2015.
Shaporin, Volodymyr, and Olha Plachinda. "Development of Information Security Threat Models to Assess Harm for Assets." Technology audit and production reserves 4, no. 2(24) (2015): 10-15.
Shushpan, V.. Development of the Remote Laboratory Work on the Course “Applied cryptology”. Vol. MR Thesis [manuscript]– in Russian. Dnipropetrovsk, 2015.
Wedeck, Harry E., and Wade Baskin. Dictionary of Pagan Religions. New York: Philosophical Library, 2015.
Werrell, Caitlin E., Francesco Femia, and Troy Sternber. "Did We See It Coming? State Fragility, Climate Vulnerability, and the Uprisings in Syria and Egypt." SAIS Review of International Affairs 35, no. 1 (2015): 29-46, p. 33.
Cavelty, Myriam Dunn. "Die materiellen Ursachen des Cyberkriegs Cybersicherheitspolitik jenseits diskursiver Erklärungen." Journal of self-regulation and regulation 01 (2015).
Cavelty, Myriam Dunn. "Die materiellen Ursachen des Cyberkriegs Cybersicherheitspolitik jenseits diskursiver Erklär ungen ." Journal of self-regulation and regulation 01 (2015).
Commission, European. Digital Agenda for Europe, A Europe 2020 Initiative., 2015.
Committee on Payments and Market Infrastructures. Digital currencies. Bank for International Settlements, 2015.
Diplo Foundation., 2015.
Sending, Ole Jacob, Vincent Pouliot, and Iver B. Neumann. Diplomacy and the making of world politics. Cambridge University Press, 2015.
Commission, European. The Directive on security of network and information systems (NIS Directive) In Digital Agenda for Europe, A Europe 2020 Initiative, Network and Information Security., 2015.
Directorate for Emergency Situations, National Strategy for Emergency Situations. Ministry of Interior, 2015.
Disaster Preparedness and Prevention Initiative for South Eastern Europe., 2015.
Xianghong, Zeng. "Disdain and Revolt in International Relations: National Identity Types and Strategies for Admitting Struggle (in Chinese)." World Economy and Politics (2015).
Kholiqi, Abdulkholiq, and Nabijon Rahimov. Disputable Territories as Hotbeds of Tension on the Border In Bulletin of TSULBP., 2015.
Divide and Conquer: Voting Patterns and Erdoğan’s Campaign Strategy Ahead of Turkey’s Snap Election. Bipartisan Policy Center, 2015.
Ulusoy, Kıvanç. Doğu Akdeniz'de Güç Mücadelesi ve Kıbrıs Sorunu. International Strategic Research Organization (USAK), 2015.
Seelinger, Kim Thuy. Domestic Accountability for Sexual Violence: The Potential of Specialized Units in Kenya, Liberia, Sierra Leone and Uganda In International Review of the Red Cross., 2015.

Pages