Biblio

Export 21393 results:
2010
Singel, R.. Report: Teens Using Digital Drugs to Get High., 2010.
Tagarev, Todor. Requirements and constraints in the design and selection of critical infrastructure protection scenarios In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2010.
Daly, John C. K.. Rerouting Logistics In Afghanistan. ISN , 2010.
Rescue Act, adopted., 2010.
Riungu, Leah Muthoni, Ossi Taipale, and Kari Smolander. Research Issues for Software Testing in the Cloud In IEEE Second International Conference on Cloud Com¬puting Technology and Science. Indianapolis, Indiana USA, 2010.
Quan, Wei, Xiaohong Huang, Yan Ma, Xiaosu Zhan, and Jun Wu. Research of Presence Service Testbed on Cloud-Computing Environment In 3rd IEEE International Conference on Broadband Network and Multimedia Technology (IC-BNMT). Beijing, China, 2010.
Gao, Jian, Weitai Liang, and Jingjing Yan. "The research on conflict redistribution of evidential reasoning." In 8th World Congress on Intelligent Control and Automation. Jinan, China , 2010.
Xiao, Ma Cheng, and Tianyuan Fan Yenhui. "Research on two-layer HLA technology based on MDA (基于MDA的两层HLA技术研究)." Journal of System Simulation 11 (2010).
Pooley, Julie A., and Lynne Cohen. "Resilience: A Definition in Context." Australian Community Psychologist 22, no. 1 (2010): 30-37, quote on pp. 30-31.
Davydov, Dmitry M.. "Resilience and Mental Health." Clinical Psychology Review 30, no. 5 (2010): 479-495.
Wilks, Scott E., and Christina A. Spivey. "Resilience in Undergraduate Social Work Students: Social Support and Adjustment to Academic Stress." Social Work Education 29, no. 3 (2010): 276-288.
Anderlini, Sanam. Resolution 1325 is a Starting Point. Public Broadcasting Service, 2010.
Resolution of the Council of Ministers of the Republic of Belarus . Web Portal of the Council of Ministers of the Republic of Belarus, 2010.
Resolution on the National Security Strategy of the Republic of Slovenia. Ljubljana: Ministry of Defence, 2010.
Bellamy, Alex J.. "The Responsibility to Protect – Five Years On." Ethics and International Affairs 24, no. 2 (2010): 143-69.
Marcotte, Ethan. Responsive Web Design. A List Apart (alistapart.com), 2010.
R. Nation, Craig. "Results of the “Reset”." In US-Russian Relations, 9. Vol. Russie.Nei.Visions No. 53 . Paris: IFRI, 2010.
Ismailov, Eldar, and Vladimer Papava. Rethinking Central Eurasia. Washington, D.C.: The Johns Hopkins University Central Asia and Silk Road Institute, 2010.
Lu, Xiang Lu, Wenye Wang, and Cliff Wang. "Review and Evaluation of Security Threats on the Communication Networks in the Smart Grid." In 2010 – MILCOM 2010 Military Communications Conference. San Jose, CA, 2010.
Heathershaw, John. "Review of the book Conflict Transformation in Central Asia: Irrigation Disputes in the Ferghana Valley, by Christine Bichsel." Central Asian Survey 29, no. 1 (2010): 131-142.
Council, National Research. Review of the Department of Homeland Security’s Approach to Risk Analysis. Washington, DC: The National Academies Press, 2010.
Fried, Jason, and David Heinemeier Hansson. Rework. Crown Business, 2010.
Hegghammer, Thomas. "The Rise of Muslim Foreign Fighters: Islam and the Globalization of Jihad." International Security 5, no. 3 (2010): 53-94.
Zaslavskyi, Volodymyr, and Vladislav Ievgiienko. Risk analyses and redundancy for protection of critical infrastructure. Monographs of System Dependability. Oficyna Widawnicza Politechniki Wroclawskiej , 2010.
Prati, Gabriele, and Luca Pietrantoni. "Risk and Resilience Factors among Italian Municipal Police Officers Exposed to Critical Incidents." Journal of Police and Criminal Psychology 25, no. 1 (2010): 27-33.

Pages