Biblio

Export 21393 results:
2013
Arthur, Charles. "Academics criticise spy agencies." Guardian (2013).
Rifkind, Malcolm. Access to Communications Data by the Intelligence and Security Agencies. Intelligence and Security Committee, British Parliament, 2013.
Solomon, Binyam, and Craig Stone. "Accrual Budgeting and Defence Funding: Theory and Simulations." Defence and Peace Economics 24, no. 3 (2013): 211-227.
Monitor, ISIJ. "Acronyms." Information & Security: An International Journal 29, no. 2 (2013): 185-188.
Act CXCII of 2013 on amending certain laws to increase the effectiveness of disaster management., 2013.
Act of 11 February 2010, containing provisions for the fire services, disaster management, crisis management and medical assistance (Safety Regions Act)., 2013.
Kara, Nuri, and Nese Sevim. "Adaptive Learning Systems: Beyond Teaching Machines." Contemporary Educational Technology 4, no. 2 (2013): 108-120.
Derluguian, Georgi M., and et al.. Adept Bourdieu in the Caucasus. Sketches for the Biography in the World-System Perspective . Directmedia, 2013.
Administrative Regulation of Classified Documents., 2013.
Ahmed, Azam. "Afghan Amnesty Program Falls Short, Leaving Ex-Insurgents Regretful and Angry." New York Times (2013).
Gentilini, Fernando. Afghan Lessons: Culture, Diplomacy and Counterinsurgency. Washington: Brookings Institution, 2013.
Afghanistan Peace and Reintegration Program. ISAF, 2013.
Africa 2013: Cybercrime, Hacking and Malware. IDG Connect, 2013.
Africa 2013, Cybercrime, Hacking and Malware. IDG Connect, 2013.
Bockstette, Carsten. "After Bin Laden: Jihadist Terrorist Use of Strategic Communication to Enlarge the Community of Believers." In The Dangerous Landscape, 63-77., 2013.
Barry, Ellen. "After Boston Bombing, American Ties with Russia Improve." New York Times (2013).
Rukavishnikov, Vladimir. "Ageing Russia, possibilities of substantial revolutionary changes and youth-related problems." Medjunarodni problemi 65, no. 3 (2013): 295-314.
Timberg, Craig, and Ellen Nakashima. "Agreement with private companies protect US access to cables’ data for surveillance." Washington Post (2013).
Etzioni, Amitai. Air-Sea Battle: A Dangerous Way to Deal with China. The Diplomat, 2013.
Lake, Eli. "Al Qaeda’s Recipe for Pressure-Cooker Bombs." The Daily Beast (2013).
Albanian HFA Monitoring Report 2011-2013., 2013.
Gupta, Sandeep, BS Dhaliwal, and Rahul Malhotra. "All-Embracing Review Of Wireless Network Protocol, Optimum Network Simulator." International Journal of Computer & Organization Trends 3, no. 3 (2013).
Lewis, Jessica. Al-Qaeda in Iraq Resurgent: the Breaking the Walls Campaign. Washington DC: Institute for the Study of War, 2013.
Smith, Jonathan. "Amateur Hour? Experience and Faculty Qualifications in U.S. Intelligence Courses." Journal of Strategic Security 6, no. 3 (2013).
Füle, Štefan. Ambitions of EU and East Partners for the Vilnius Summit In Press Releases Rapid., 2013.

Pages