Biblio

Export 21393 results:
2010
Spencer, Alexander. The tabloid terrorist: The predicative construction of new terrorism in the media. New York: Palgrave Macmillan, 2010.
Durbin, Pat, and Terry Doerscher. Taming Change with Portfolio Management: Unify Your Organization, Sharpen Your Strategy and Create Measurable Value . Austin, TX: Greenleaf Book Group Press, 2010.
Bazhanov, Yevgeny. "Tangled Triangle of Russia, China and the U.S." The Moscow Times (2010).
Ivanova, Petya. Technical Evaluation Report In Analytical Support to Defence Transformation. Paris: NATO RTA, 2010.
Serih, Andrey. Technical regulation in construction. Analytical review of world experience. Chicago: SNIP, 2010.
Stocker, Mike. Technology Insertion and Management: Options for the Canadian Forces In Technical memorandum., 2010.
Hryshchuk, Ruslan V.. Teoretychni osnovy modeljuvannja procesiv napadu na informaciju metodamy teorij dyferencialnyh igor ta dyferencialnyh peretvoren. Zhytomyr: Ruta, 2010.
Servenay, David. Terroisme: pourquoi Alliance Base a fermé ȧ Paris. Rue 89, L’Obs, 2010.
Yu, Lian, Wei-Tek Tsai, Liangjie Tang, Wei Zhao, Xiangji Chen, Linqing Liu, and Yan Zhao. Testing as a Service over Cloud In Fifth IEEE International Symposium on Service Oriented System Engineering (SOSE). Nanjing, China, 2010.
Ahmad, Abu Umar Faruq. Theory and Practice of Modern Islamic Finance: The Case Analysis from Australia. Universal-Publishers, 2010.
Jaspal, Zafar Nawaz. "Threat of Extremism &Terrorist Syndicate beyond FATA." Journal of Political Studies 1, no. 2 (2010): 19-49.
Minchev, Zlatogor. Threats and Challenges in Social Networks. A European Glance and Alliance Perspective in the Context of the New Strategic Concept In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2010.
Time for a Human Approach. Zurich: ISN, 2010.
TK_02_60 Project Web Page., 2010.
Park, Hyun-A, JaeHyun Park, JaeTark Choi, and DongHoon Lee. Toward an integrated system between cloud computing and smartcard application In 5th International Conference on Computer Sciences and Convergence Information Technology. Seoul, South Korea , 2010.
Rego, Francisco, Cristina Montiel, and Jorge Agudo. "Towards integrated fire management: The need for a European Framework Directive on Fire." In Conference on Protection of Forests, Spanish Presidency of the European Union. La Granja–Valsaín, 2010.
Meyer, Oliver. "Towards quality CLIL: successful planning and teaching strategies." Puls 10 (2010): 11-29.
Ekström, Thomas. The Transformation from Defence Procurement to Defence Acquisition -Opportunities for New Forms of Analytical Support In SAS-081 Symposium, Sofia., 2010.
Tagarev, Todor. Transformation Strategies In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2010.
Mednikarov, Boyan, Kalin Kalinov, and Nedko Dimitrov. Transforming Maritime Education: Local Decisions in Global Perspective In 11th Annual General Assembly of IAMU. Busan, Corea, 2010.
Transparency International Corruption Perception Index 2010., 2010.
Hughes, Rex. "A Treaty for Cyberspace." International Affairs 86, no. 2 (2010): 533.
Lorenzi, Fabiana, Gabriel Baldo, Rafael Costa, Mara Abel, Ana Bazzan, and Francesco Ricci. "A Trust Model for Multiagent Recommendations." Journal of Emerging Technologies in Web Intelligence 2, no. 4 (2010).
Yeh, Kuo-Hui, Chunhua Su, Nai Wei Lo, Yingjiu Li, and Yi-Xiang Hung. "Two Robust Remote User Authentication Protocols Using Smart Cards." The Journal of Systems and Software 83, no. 12 (2010).
Al-Hakkak, Nada M., and Nawal A. Ibrahim. "UML-XML for Discrete Event Simulation with Automatic Code Generation Ability." Iraq Academic Scientific Journal 25 (2010): 415-430 .

Pages