Biblio

Export 21401 results:
2010
D'Mello, Sidney, Blair Lehman, and Natalie Person. Expert Tutors FeedbackI s Immediate, Direct, and Discriminating In Twenty-Third International Florida Artificial Intelligence Research Society Conference (FLAIRS 2010)., 2010.
Wolff, Andrew T.. Explaining NATO expansion into Central and Eastern Europe, 1989–2004: An analysis of geopolitical factors, rationales, and rhetoric. The Johns Hopkins University, 2010.
Annansingh, Fenio, and Ali Bright. "Exploring barriers to effective e-learning: case study of DNPA." Interactive Technology and Smart Education 7, no. 1 (2010): 55-65.
Falliere, Nicolas. "Exploring Stuxnet’s PLC Infection Process." Symantec Connect (2010).
Morselli, Carlo, Thomas Gabor, and John Kiedrowski. The Factors That Shape Organized Crime In Research and National Coordination, Organized Crime Division, Law Enforcement and Policy Branch. Public Safety Canada, 2010.
Davies, Lizzy. "Fatal storm sweeps through France. At least 40 killed as hur¬ricane-force winds and torrential rains bring flooding to central and western France." The Guardian (2010).
Menn, Joseph. Fatal System Error: The Hunt for the New Crime Lords Who Are Bring¬ing Down the Internet . New York: Public Affairs, 2010.
Schreurs, Miranda A.. "Federalism and the Climate: Canada and the European Union." International Journal 66:1 (2010).
Daxner, Michael. "Fifteen Years of Peace-building Activities in the Western Balkans: Lessons Learned and Current Challenges." Connections: The Quarterly Journal 9, no. 3 (2010): 65-76.
Dolnik, Adam. "Fighting to the Death." RUSI Journal 155, no. 2 (2010): 60-68.
Dolnik, Adam. "Fighting to the Death: Mumbai and the Future Fidayeen Threat." RUSI Journal 155, no. 2 (2010): 60-68.
FILIT: Otvorená filozofická encyklopédia., 2010.
Huanan, Li. FIM model applied in disaster situations on the highway network. Southwest Jiaotong University, 2010.
Locher, Anna. "Finland: Crisis Management and Territorial Defence." CSS Analysis in Security Policy 68 (2010).
Fire Safety Act., 2010.
Slatinski, Nickolay. On Five Levels of Security. Sofia: Military publishing house, 2010.
Minchev, Zlatogor. Five years research and development of information systems for security In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2010.
Fixing Intel: A Blueprint for Making Intelligence Relevant in Afghanistan. Washington, D.C.: Center for a New American Security, 2010.
Minchev, Zlatogor, and Ilia Nalbantov. For a new approach to the modernization of the Bulgarian armed forces In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2010.
Tagarev, Todor. For effective and efficient security sector In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2010.
Bonzanni, Andrea. "For the West, ‘Game Over’ in Central Asia." European Dialogue (2010).
Ciluffo, Frank, Magnus Ranstorp, and Jeffrey Cozzens. Foreign Fighters: Trends, Trajectories and Conflict Zones. Washington, DC: George Washington University Homeland Security Policy Institute, 2010.
Schittenhelm, Raimund. "Foreword." Connections: The Quarterly Journal 9, no. 3 (2010): 1-2.
de Dardel, Jean-Jacques. "Foreword." In Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices. Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2010.
Krautsevich, Leanid, Fabio Martinelli, and Artsiom Yautsiukhin. Formal approach to security metrics. What does ‘more secure’ mean for you? In IEEE/ASME International Conference on Mechatronic and Embedded Systems and Applications., 2010.

Pages