Biblio

Export 21337 results:
0
Manifesto of the Pan-Russian National Front.
Velev, Grigor, and Maya Bozhilova. Model Cluster Routing Algorithm for Mobile Self-Organizing Defense and Security Networks In Scientific Conference with International Participation "The 21st Century Knowledge Society and Humanism," Sofia, (UniBIT, BAS).
Jolicoeur, Pierre, and Frederic Labarre. "NATO’s engagement in the South Caucasus: Looking for Energy Security or Expanding Norms and Values?" In Reassessing Security in the South Caucasus: Regional Conflicts and Transformation , 163-167. Farnham: Ashgate.
Thoß, Bruno. NATO-Strategie und nationale Verteidigungsplanung: Planung und Auf¬bau der Bundeswehr unter den Bedingungen einer massiven atomaren Vergel¬tungs¬strategie 1952 bis 1960 . München: München: Oldenbourg Verlag.
"Nuklearstrategie – Zwischen Abschreckung und Einsatzdoktrin." Bundeszentrale für politische Bildung.
Dai, You, Jin Yan, Xiaoxin Tang, Han Zhao, and Minyi Guo. "Online Credit Card Fraud Detection: A Hybrid Framework with Big Data Technologies." In IEEE Trustcom/BigDataSE/ISPA. Tianjin, China .
Ordinance of the Council of Ministers of 15 December 2009 .
S., Gaw, and Felten E.W.. Password Management Strategies For Online Accounts. USA: Symposium on Usable Privacy and Security (SOUPS) 2006.
Gupta, P.. "Pesticide Exposure." Toxicology Consulting Services Inc. 198: 83-90.
Gladkevich, Yury. "Poshel v Gory." Profil.
Shakespeare-Finch, Jane, Ian Shochet, Colette Roos, Cameron Craig, Deanne Maree Armstrong, Ross Young, and Astrid Wurfl. Promoting Posttraumatic Growth in Police Recruits: Preliminary Results of a Randomised Controlled Resilience Intervention Trial In Australian and New Zealand Disaster and Emergency Management Conference: Book of Proceedings. Australia: Association for Sustainability in Business Inc.
Remittance Prices Worldwide: Making Markets More Transparent. The World Bank.
Reply by the Federal Government: Procurement of weapons from the East by the Federal Intelligence Service and transit shipment to friendly states In Bundestag print.
Linkevicius, Linas. "Reset with Russia, but with Reassurance." International Herald Tribune.
McCants, Nicholas. The Resource Allocation Process and the Effects on Cybersecurity Culture In . Vol. Doctor of Information Technology. Capella University.
Douglas, Nadja. "Revising the Framework of Civilian Control." In Public Control of Armed Forces in the Russian Federation, 63-104. Cham: Palgrave Macmillan.
Llanque, Marcus. "The Rhetoric of intellectual Manifestos from the First World War to the War against Terrorism." In The Ashgate Research Companion to the Politics of Democratization in Europe. Ashgate Publishing, Ltd.
"SARS-CoV-1 and SARS-CoV-2 are related but different viruses and produce related but different infections." WHO.
Sato, H., M. Kubo, and A. Namatame. "Sato, H." In Soft Computing and Intelligent Systems (SCIS) and 13th International Symposium on Advanced Intelligent Systems (ISIS), 2012 Joint 6th International Conference on. Kobe: IEEE.
Navrátil, Matej, and Michal Onderco. "Slovakia: Creating and Transforming Civil-Military Relations." In Oxford Research Encyclopedia of Politics.
Kuldeep, Singh, Jøsang Audun, Sadek Ferdous, and Ravishankar Borgaonkar. Spam Filter Optimality Based on Signal Detection Theory In 2nd international conference on Security of information and networks. Famagusta, North Cyprus.
Standards of higher education 1701 “Information Security“.
On the State Program for Transition of the Armed Forces of Ukraine to Manning with Contract Military Servicemen In Decree by the President of Ukraine No. 348/2002 .
Holliday, P.. "SWARMM - a mobility modelling tool for tactical military networks." In Military Communications Conference. San Diego, CA: IEEE.
Shaw, Mark. Typologies of Transnational Organized Crime Groups. Centre for International Crime Prevention, UNODC.

Pages