Biblio

Export 21387 results:
2012
Tagarev, Todor. Good Governance in the Security Sector as a Prerequisite for Bulgaria’s Defence Integration In CSDM Views. Sofia: Centre for Security and Defence Management, 2012.
Emmott, Bill. Good Italy, Bad Italy: Why Italy Must Conquer Its Demons to Face the Future. New Haven and London: Yale University Press, 2012.
Oppermann, Daniel. Governança multisetorial e o processo de governança da internet: Um estudo de caso sobre crime cibernético e filtragem na internet entre 1990 e 2010 In Instituto de Relações Internacionais (IREL) . Vol. Programa de Doutorado. Universidade de Brasília, 2012.
Su, Z., W.F. Ouedraogo, L.M. Camarinha-Matos, L. Xu, Afsarmanesh H., and F. Biennier. "A Governance Framework for Mitigating Risks and Uncertainty in Collaborative Business Processes." Collaborative Networks in the Internet of Services (2012): 667-674.
Meyer, Patrik Kristof. Governing Muslim Minorities as Security Threats: The Case of the Uyghurs and the Concept of a New Chinese Nation In Robinson College. Vol. Doctor of Philosophy in Politics and International Studies. University of Cambridge, 2012.
Ishiwatari, Mikio. "Government Roles in Community-Based Disaster Risk Reduction." In Community-Based Disaster Risk Reduction, 19-33. Bingley: Emerald Group Publishing, 2012.
Governmental Coordination Committee (1150/2012)., 2012.
Z. Jgharkava, Zaza. "Guerillas in Lopota or Putin’s Trap?" Georgia Today (2012).
National Institute of Standards and Technology. Guide for Conducting Risk Assessments. Vol. SP 800-30 Rev. 1, Publication 800-30. Gaithersburg, MD: U.S. Department of Commerce, 2012.
Diallo, Saikou Y., and Jose J. Padilla. "Handbook of Real-World Applications in Modeling and Simulation." In Handbook of Real-World Applications in Modeling and Simulation. John Wiley & Sons, 2012.
Boot, Max. "A Hard-Won Account of a Hard-Won Victory." The Wall Street Journal (2012).
Labouche, Thomas. "Has U.S. Leadership Been Revitalized Through Barack Obama’s Innovative Use of Force?" Connections: The Quarterly Journal 11, no. 2 (2012): 37-52.
Pryor, P. Hazard as a Concept. Tullamarine, Australia: Safety Institute of Australia, 2012.
Headquarters Department of the Army, ATP 2-22.9 In Army Techniques Publication. Washington, DC., 2012.
Hillary Clinton’s remarks at the Joint Discussion with Israeli President Shimon Peres, hosted by the Brookings Institution., 2012.
Wege, Carl Anthony. "Hizballah's Counterintelligence Apparatus." International Journal of Intelligence and CounterIntelligence (2012): 777.
Khatib, Lina. Hizbullah’s Image Management Strate In CPD Perspectives on Public Diplomacy. Los Angeles: Figueroa Press, 2012.
Gaines, Larry K., and Victor E. Kappeler. Homeland Security. New Jersey: Prentice Hall, 2012.
Lagadec, Patric, and Benjamin Topper. "How Crises Model the Modern World." Journal of Risk Analysis and Crisis Response 2, no. 1 (2012): 21-33.
de Castella, Tom. How Did We Forget about Mutually Assured Destruction?. BBC News, 2012.
Mothana, Ibrahim. "How Drones Help Al Qaeda." New York Times (2012).
Halverson, Jeffry R., Bennett R. Furlow, and Steven R. Corman. How Islamist Extremists Quote the Qur’an., 2012.
Blackwood, Mikaela. "How Smart is Smart Defense? A Review of NATO’s Smart Defense Proposal." Connections: The Quarterly Journal 11, no. 3 (2012): 85-93.
Lis, Andrzej. "How to Strengthen Positive Organizational Behaviors Fostering Experiential Learning? The Case of Military Organizations." Journal of Entrepreneurship Management and Innovation 8, no. 4 (2012): 21-34.
Hodges, J., C. Jackson, and A. Barth. HTTP strict transport security., 2012.

Pages