Biblio

Export 21401 results:
2010
White House Strategic Communications Report to Congress. White House, 2010.
White paper on Defence and the Armed Forces of the Republic of Bulgaria., 2010.
White Paper on Defense and the Armed Forces., 2010.
Byers, Michael. Who Owns the Arctic? Understanding Sovereignty Disputes in the North . Vancouver, BC: Douglas & McIntyre, 2010.
Clarke, Richard A., and Robert K. Knake. "Why Cyber Warfare is Important." In Cyber Warfare: The Next Threat to National Security and What to Do About It, 18-21. New York: HarperCollins, 2010.
Cederman, Lars-Erik, Andreas Wimmer, and Brian Min. "Why Do Ethnic Groups Rebel? New Data and Analysis." World Politics 62, no. 1 (2010): 87-119.
Diallo, Saikou Y., Jose J. Padilla, and Andreas Tolk. "Why is Interoperability Bad: Towards a Paradigm Shift in Simulation Composition." In Fall Simulation Interoperability Workshop Orlando, FL. Orlando, FL, 2010.
Roach, Alfred S.. Why Is The United States Losing The War Of Words In The Global War On Terror? Identifying Causes Of Failure In U.S. Communication Strategy. Fort Leavenworth, Kansas: School of Advanced Military Studies, United States Army Command and General Staff College, 2010.
Venhaus, U.S. Army Colon. Why Youth Join al-Qaeda In Special Report. United States Institute of Peace, 2010.
Wife of Virginia Man who Threatened South Park Pleads Guilty. Anti-Defamation League, 2010.
Wi-Fi сети в Германии обязаны стать закрытыми [Wi-Fi networks in Germany need to become closed]. Geektimes, 2010.
Wikileaks: Russia Branded ‘Mafia State’ in Cables. BBC News, 2010.
Ki-Moon, UN Secretary. The World’s Women 2010: Trends and Statistics. Geneva: United Nations, 2010.
Liu, Baolong. XML Security in XML Data Integrity, Authentication, and Confidentiality In School of Computing and Engineering. Vol. Doctor of Philosophy. University of Huddersfield, 2010.
Morelli, Giovanna. Yersinia Pestis Genome Sequencing Identifies Patterns of Global Phylogenetic Diversity In Nature Genetics ., 2010.
Oriol, Manuel, and Faheem Ullah. YETI on the Cloud In Third Interna¬tional Conference on Software Testing, Verification, and Validation Workshops (ICSTW. Paris, 2010.
Ministry of Defence of Finland. Yhteiskunnan turvallisuusstrategia (The Security Strategy for Society). Helsinki: Ministry of Defence, 2010.
Anzalone, Christopher. "Zachary Chesser: An American, Grassroots Jihadist Strategist on Raising the Next Generation of Al Qaeda Supporters." Perspectives on Terrorism 4, no. 5 (2010): 22.
Zimbabwe: Cholera keeps a low profile. IRIN Africa, 2010.
Шелестюк, Елена Влади. "Асимметричность Коммуникации как Фактор Идеологического Воздействия." Вестник Челябинского государственного университета 29, no. 47 (2010): 161-166.
Бяла книга за отбраната и Въоръжените сили на Република България ., 2010.
Голландским гостиницам придется получать лицензию провайдера [Dutch Hotels would need to get a License as Providers]. Open Systems Publications, 2010.
Интегрирана индустриална политика за ерата на глобализацията., 2010.
Pavlov, Georgi. Информационно осигуряване за отбраната и сигурността – проблеми и перспективи, Актуални проблеми на икономиката на отбраната и сигурността. София: Университетско издателство „Стопанство”, 2010.
Сиора, А. А., and Вячеслав Харченко. "Модели многоверсионных вычислений и их обобщение для отказоустойчивых систем." Вісник Харківського національного університету 890 (2010).

Pages