Biblio

Export 21362 results:
2013
Conková, Monika. "Analysis of Perceptions of Conventional and E-Learning Education in Corporate Training." Journal of Competitiveness 5, no. 4 (2013).
Genchev, Anguel D.. Analysis of Virtualization Systems in Cloud Architecture Design In MT&S-2013,. Sofia, Bulgaria: Defence Institute, 2013.
Tagarev, Todor, and Petya Ivanova. "Analytical support to foresighting EU roles as a Global Security Actor." Information & Security: An International Journal 29, no. 1 (2013): 21-33.
Kaplan, Robert D.. Anarchy and Hegemony. Stratfor, 2013.
Annual Report 2013 on Radiation and Nuclear Safety in the Republic of Slovenia, Ministry of agriculture and the environment. Slovenian nuclear safety administration, 2013.
Annual Report on the Protection of the Constitution. Summary. Federal Ministry of the Interior, 2013.
Ungar, Michael, Mehdi Ghazinour, and Jörg Richter. "Annual Research Review: What is Resilience within the Social Ecology of Human Development?" Journal of Child Psychology and Psychiatry 54, no. 4 (2013): 348-366.
Zhang, Yong Hua. "Anonymity Query Method of Outsourced Database." Advanced Materials Research 798-799 (2013): 837-841.
Barnett, David. Ansar Jerusalem Announces Deaths of 3 Fighters, Including Commander. Threat Matrix, 2013.
Appendix IV for a description of DOD counterpiracy costs., 2013.
The Applicability of International Law in Cyberspace-From If to How?. Panel Three at the Georgetown University Conference on the International Law on Cyber, 2013.
Elhassouny, A., S. Idbraim, A. Bekkari, D. Mammass, and D. Ducrot. "Application of DSmT-ICM with Adaptive decision rule to supervised classification in multisource remote sensing." Journal of Computing 5, no. 1 (2013).
Knapp, Eric D., and Raj Samani. Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure. Waltham, MA: Syngress, 2013.
"Apply International Law to Cyber-Warfare? Good Luck." The Economist (2013).
Krasovska, Hanna, Olha Izmailova, and Kateryna Krasovska. "Approach to Build a Break-out Scenario for Solving Task on Supporting Decision-making Assessment of Real Estate." Upravlinnia rozvytkom skladnykh system 16 (2013): 86-95.
Neama, Tamer. M. Abo, Ismail. A. Ismail, Tarek. S. Sobh, and M. Zaki. "Aproposed Framework for Information Fusion and Obtain Beliefs from Evidences." Egyptian Computer Science Journal 37 , no. 1 (2013).
Arab Spring: A Research and Study Guide. Cornell University Library Guide, 2013.
Fellon, Josef. Arab Spring: Expectations and Reality. Vol. 4 October 2013. Russian Foreign Affairs Council, 2013.
Mirsky, Gеorgiy. The Arab Spring – fog and fear. Vol. 1 May 2013. Global Affairs, 2013.
Armed Forces, Kyrgyzstan. London: IHS Global Limited, 2013.
Beyshenov, Murat. "The Armed Forces of Kyrgyzstan: Brief Overview and Perspectives for Development at the Current Stage." In Almanac 2012: Governing and Reforming Kyrgyzstan Security Sector, 26. Geneva-Bishkek: Geneva Centre of the Democratic Control of the Armed Forces, 2013.
Kovač, Nikolas, and Trista Guertin. Armed Groups in the Sinai Peninsula. Enschede: Civil Military Fusion Centre, 2013.
Souleimanov, Emil, and Maya Ehrmann. "The Armed Incident in Georgia’s Lopota Valley and its Implications for the Security Situation of the South Caucasus." Connections: The Quarterly Journal 12, no. 3 (2013): 118-126.
Socor, Vladimir. "Armenia’s Economic Dependence on Russia Insurmountable by the European Union." Eurasia Daily Monitor 10, no. 221 (2013).
Gordon, IV, John, and John Matsumura. The Army’s Role in Overcoming Anti-Access and Area Denial Challenges. Santa Monica, CA: RAND Corporation, 2013.

Pages