Biblio

Export 21393 results:
2013
Foster, Peter, and Raf Sanchez. America Is ‘Livid’ with the British and Could Launch Syria Strikes on its own In Business Insider., 2013.
Matsumoto, Masakazu. "The American just war theory in the 21st century: continuity or renewal?" Protestantismo em Revista 10 (2013): 11-31.
Gross, Eva. The American Sequester and Us. European Union Institute for Security Studies, 2013.
Rana, Nripendra P., Yogesh K. Dwivedi, and Michael D. Williams. "Analysing challenges, barriers and CSF of egov adoption." Transforming Government People Process and Policy 7, no. 2 (2013).
Parsons, Kathryn, Agata McCormac, Malcolm Pattinson, Marcus Butavicius, and Cate Jerram. An Analysis of Information Security Vulnerabilities at Three Australian Government Organisations In Proceedings of theEuropean Information Security Multi-Conference (EISMC 2013)., 2013.
Conková, Monika. "Analysis of Perceptions of Conventional and E-Learning Education in Corporate Training." Journal of Competitiveness 5, no. 4 (2013).
Genchev, Anguel D.. Analysis of Virtualization Systems in Cloud Architecture Design In MT&S-2013,. Sofia, Bulgaria: Defence Institute, 2013.
Tagarev, Todor, and Petya Ivanova. "Analytical support to foresighting EU roles as a Global Security Actor." Information & Security: An International Journal 29, no. 1 (2013): 21-33.
Kaplan, Robert D.. Anarchy and Hegemony. Stratfor, 2013.
Annual Report 2013 on Radiation and Nuclear Safety in the Republic of Slovenia, Ministry of agriculture and the environment. Slovenian nuclear safety administration, 2013.
Annual Report on the Protection of the Constitution. Summary. Federal Ministry of the Interior, 2013.
Ungar, Michael, Mehdi Ghazinour, and Jörg Richter. "Annual Research Review: What is Resilience within the Social Ecology of Human Development?" Journal of Child Psychology and Psychiatry 54, no. 4 (2013): 348-366.
Zhang, Yong Hua. "Anonymity Query Method of Outsourced Database." Advanced Materials Research 798-799 (2013): 837-841.
Barnett, David. Ansar Jerusalem Announces Deaths of 3 Fighters, Including Commander. Threat Matrix, 2013.
Appendix IV for a description of DOD counterpiracy costs., 2013.
The Applicability of International Law in Cyberspace-From If to How?. Panel Three at the Georgetown University Conference on the International Law on Cyber, 2013.
Elhassouny, A., S. Idbraim, A. Bekkari, D. Mammass, and D. Ducrot. "Application of DSmT-ICM with Adaptive decision rule to supervised classification in multisource remote sensing." Journal of Computing 5, no. 1 (2013).
Knapp, Eric D., and Raj Samani. Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure. Waltham, MA: Syngress, 2013.
"Apply International Law to Cyber-Warfare? Good Luck." The Economist (2013).
Krasovska, Hanna, Olha Izmailova, and Kateryna Krasovska. "Approach to Build a Break-out Scenario for Solving Task on Supporting Decision-making Assessment of Real Estate." Upravlinnia rozvytkom skladnykh system 16 (2013): 86-95.
Neama, Tamer. M. Abo, Ismail. A. Ismail, Tarek. S. Sobh, and M. Zaki. "Aproposed Framework for Information Fusion and Obtain Beliefs from Evidences." Egyptian Computer Science Journal 37 , no. 1 (2013).
Arab Spring: A Research and Study Guide. Cornell University Library Guide, 2013.
Fellon, Josef. Arab Spring: Expectations and Reality. Vol. 4 October 2013. Russian Foreign Affairs Council, 2013.
Mirsky, Gеorgiy. The Arab Spring – fog and fear. Vol. 1 May 2013. Global Affairs, 2013.
Armed Forces, Kyrgyzstan. London: IHS Global Limited, 2013.

Pages