Biblio

Export 21423 results:
2013
McCulloh, Timothy, and Richard Johnson. Hybrid Warfare (JSOU Report). Florida: The JSOU Press, MacDill Air Force Base, 2013.
Tasevski, Predrag. I can hack your FB, can you catch me...., 2013.
Im, Tobin, Greg Porumbescu, and Hyunkuk Lee. "ICT as a buffer to change: A case study of the Seoul Metropolitan Government's Dasan Call Center." Public Performance & Management Review 36, no. 3 (2013): 436-455.
Mihalic, Tanja, and Dimitrios Buhalis. "ICT as a New Competitive Advantage Factor - Case of Small Transitional Hotel Sector." Economic and Business Review for Central and South - Eastern Europe 15, no. 1 (2013): 33-56.
Stewart, Catrina. "Illegal Ivory Trade Funds al-Shabaab’s Terrorist Attacks." The Independent (2013).
Miklaucic, Michael, and Jacqueline Brewer. Illicit Networks and National Security in the Age of Globalization. Center for Complex Operations (National Defense University Press), 2013.
Yunwen, Zhang, Yao Jingshun, and Dong Tianzhong. "IMM model group selection and parameter setting (IMM 模型组的选择与参数的设定)." Journal of System Simulation 25, no. 004 (2013).
"IMM 模型组的选择与参数的设定." 系统仿真学报 25, no. 004 (2013).
Shehu, B.. "Immigration Officers Who Help Boko Haram." Vanguard 1 (2013): 8-9.
D.Craig, Scotty, Xiangen Hu, Arthur C.Graesser, Anna E.Bargagliott, Allan Sterbinsky, Kyle R. Cheney, and Theresa Okwumabua. "The impact of a technology-based mathematics after-school program using ALEKS on student's knowledge and behaviors." Computers & Education 68, no. 68 (2013): 495-504.
Huang, Yu, and Hualin Cheng. "The impact of climate change on coastal geological disasters in southeastern China." Natural hazards 65 (2013): 377-390.
Ott, Marvin C.. The Imperative for an American Strategy for Southeast Asia. Foreign Policy Research Institute, September, 2013.
Jovetic, Ivan. "Implications of Technological Changes on Police and Strategy of Defense and Security." In International scientific conference: the Balkans between past and future: security, conflict resolution and Euro-Atlantic integration. Ohrid, 2013.
Romo, Güera. "Improving human performance: Industry factors influencing the ability to perform." Knowledge Management & E-Learning: An International Journal 5, no. 1 (2013): 66-83.
Bloom, Mia M.. "In Defense of Honor: Women and Terrorist Recruitment on the Internet." Journal of Postcolonial Cultures and Societies 4, no. 1 (2013): 150-195.
A. Bokwa, Föhn, and P.T Bobrowsky. "In Encyclopedia of Natural Hazards .", 346. Dordrecht, The Netherlands: Springer, 2013.
Krastev, Ivan. In Mistrust We Trust: Can Democracy Survive When We Don’t Trust Our Leaders?. TED Books, 2013.
Ackerman, Spencer, and Paul Lewis. "In Snowden’s wake, Congress cools on spying." Guardian (2013).
In the Interest of the Netherlands. The Netherlands’ Ministry of Defence, 2013.
In the margins of the BRICS summit, Vladimir Putin met with Muhammed Morsi. Vol. 29 March 2013. Vesti.ru, 2013.
Willschick, Aaron. In Too ‘DEEP.’ NATO as an Institutional Educator In NATO Association of Canada., 2013.
Treffers, Stefan R.. "Increased Globalization of Crime." In Crime Classification Manual : A Standard System for Investigating and Classifying Violent Crimes, 431-470. John Wiley & Sons, 2013.
Atanassov, Krassimir, Evdokia Sotirova, and Veselina Bureva. "On Index Matrices Part 4: New Operations over Index Matrices." Advanced Studies in Contemporary Mathe¬matics (Kyungshang) 23, no. 3 (2013): 547-552.
Watson, Sarah J., and Christine C. Fair. "India’s Stalled Internal Security Reforms." India Review 12, no. 4 (2013): 280-299.
Mavhura, Emmanuel, Siambalala Benard Manyena, Andrew E. Collins, and Desmond Manatsa. "Indigenous knowledge, coping strategies and resilience of floods in Muzarabani, Zimbabwe." International Journal of Disaster Risk Reduction 5 (2013): 38-48.

Pages