Biblio

Export 21387 results:
2012
Bowring, Bill. The Unexpected After-Life of the ‘Soviet People’? The ‘Pridnestrovskaya Moldavskaya Respublika’ as a Political Fact and Legal Anomaly: A Case-Study., 2012.
United NatE-Government. Survey 2012. E-Government for the People. United Nations, 2012.
The United Nations SSR Perspective. United Nations, Department of Peacekeeping Operations, Office of Rule of Law and Security Institutions, Security Sector Reform Unit, 2012.
Cork, Chris. "Unsafe Roads." SA GlobalAffairs (2012).
Jen, Alic. "US Gas Pipelines under Cyber Attack." Says DHS (2012).
US Government Policy for Oversight of Life Sciences Dual Use Research of Concern., 2012.
Nakashima, Ellen, Greg Miller, and Julie Tate. "U.S., Israel developed Flame computer virus to slow Iranian nuclear efforts." The Washington Post (2012).
Sternstein, Aliya. U.S., Russia, Other Nations Near Agreement on Cyber Early-Warning Pact. Nextgov, 2012.
Fan, Wang. U.S. Should Back up Its Proclaimed ‘Good Intentions’ in Asia-Pacific With Action. Xinhua News Agency, 2012.
Sheng, Zhong. U.S. Should Not Muddy the Waters Over the South China Seas. People’s Daily, 2012.
U.S. Should Treat China and Chinese Military Objectively and Rationally: Defence Ministry. Ministry of National Defense, P. R. China, 2012.
Mackey, Peg. U.S. to Overtake Saudi as Top Oil Producer: IEA. Reuters, 2012.
Zubkov, Kirill. The U.S. Will Help Uzbekistan to Disperse Demonstrators ‘Not Lethally’. Defense and Security (Russia), 2012.
Achkoski, Jugoslav, and Vladimir Trajkovik. "Usage of Service-Oriented Architecture for Developing Prototype of Intelligence Information System." TEM Journal – Technology education management informatics 1, no. 4 (2012).
The Use of Internet for Terrorist Purposes. New York: United Nations, United Nations Office on Drugs and Crime, 2012.
Volkoviy, Andriy, and Ilya Tikhov. "Use of Mobile Applications in Security and Safety Systems." Information & Security: An International Journal 28, no. 1 (2012): 146-153.
Constantinescu, Maria. The Use of Production Analysis Models in Optimizing the Development of Military Capabilities In The 7th International Scientific Conference “Defense Resources Management in the 21st Century. Braşov, 2012.
Matlala, Mpho Mark. The Use of the Automated Fingerprint Identification System to Improve the Quality of Service Rendered by the South African Police Service on the East Rand. Vol. Magister Technologiae. University of South Africa, 2012.
Matlala, Mpho Mark. The Use of the Automated Fingerprint Identification System to Improve the Quality of Service Rendered by the South African Police Service on the East Rand. Vol. Magister Technologiae. University of South Africa, 2012.
Sarfaraz, Matin, Brian J. Sauser, and Edward W. Bauer. Using System Architecture Maturity Artifacts to Improve Technology Maturity Assessment, Procedia Computer Science In Conference on Systems Engineering Research. Vol. 8., 2012.
Yao, Haibo, Yanbo Huang, Zuzana Hruska, Steven J.Thomson, and Krishna Reddy. "Using vegetation index and modified derivative for early detection of soybean plant injury from glyphosate." Computers and Electronics in Agriculture 89 (2012): 145-157.
Song, Sang-ho. "U.S.-Japan Alliance Grows for Asia-Pacific Security Balance." The Korea Herald (2012).
Bohr, Annette. US–Uzbekistan Ties against Afghani Backdrop. Voice of Russia Radio, 2012.
Horton, Scott. "Uzbekistan as a Values Challenge for NATO." Harper’s Magazine (2012).
Uzbekistan – Rotten to the Core but Number 1 in Some Important Categories. Uznews.net, 2012.

Pages