Biblio

Export 21376 results:
2013
Rukavishnikov, Vladimir. "Ageing Russia, possibilities of substantial revolutionary changes and youth-related problems." Medjunarodni problemi 65, no. 3 (2013): 295-314.
Timberg, Craig, and Ellen Nakashima. "Agreement with private companies protect US access to cables’ data for surveillance." Washington Post (2013).
Etzioni, Amitai. Air-Sea Battle: A Dangerous Way to Deal with China. The Diplomat, 2013.
Lake, Eli. "Al Qaeda’s Recipe for Pressure-Cooker Bombs." The Daily Beast (2013).
Albanian HFA Monitoring Report 2011-2013., 2013.
Gupta, Sandeep, BS Dhaliwal, and Rahul Malhotra. "All-Embracing Review Of Wireless Network Protocol, Optimum Network Simulator." International Journal of Computer & Organization Trends 3, no. 3 (2013).
Lewis, Jessica. Al-Qaeda in Iraq Resurgent: the Breaking the Walls Campaign. Washington DC: Institute for the Study of War, 2013.
Smith, Jonathan. "Amateur Hour? Experience and Faculty Qualifications in U.S. Intelligence Courses." Journal of Strategic Security 6, no. 3 (2013).
Füle, Štefan. Ambitions of EU and East Partners for the Vilnius Summit In Press Releases Rapid., 2013.
Foster, Peter, and Raf Sanchez. America Is ‘Livid’ with the British and Could Launch Syria Strikes on its own In Business Insider., 2013.
Matsumoto, Masakazu. "The American just war theory in the 21st century: continuity or renewal?" Protestantismo em Revista 10 (2013): 11-31.
Gross, Eva. The American Sequester and Us. European Union Institute for Security Studies, 2013.
Rana, Nripendra P., Yogesh K. Dwivedi, and Michael D. Williams. "Analysing challenges, barriers and CSF of egov adoption." Transforming Government People Process and Policy 7, no. 2 (2013).
Parsons, Kathryn, Agata McCormac, Malcolm Pattinson, Marcus Butavicius, and Cate Jerram. An Analysis of Information Security Vulnerabilities at Three Australian Government Organisations In Proceedings of theEuropean Information Security Multi-Conference (EISMC 2013)., 2013.
Conková, Monika. "Analysis of Perceptions of Conventional and E-Learning Education in Corporate Training." Journal of Competitiveness 5, no. 4 (2013).
Genchev, Anguel D.. Analysis of Virtualization Systems in Cloud Architecture Design In MT&S-2013,. Sofia, Bulgaria: Defence Institute, 2013.
Tagarev, Todor, and Petya Ivanova. "Analytical support to foresighting EU roles as a Global Security Actor." Information & Security: An International Journal 29, no. 1 (2013): 21-33.
Kaplan, Robert D.. Anarchy and Hegemony. Stratfor, 2013.
Annual Report 2013 on Radiation and Nuclear Safety in the Republic of Slovenia, Ministry of agriculture and the environment. Slovenian nuclear safety administration, 2013.
Annual Report on the Protection of the Constitution. Summary. Federal Ministry of the Interior, 2013.
Ungar, Michael, Mehdi Ghazinour, and Jörg Richter. "Annual Research Review: What is Resilience within the Social Ecology of Human Development?" Journal of Child Psychology and Psychiatry 54, no. 4 (2013): 348-366.
Zhang, Yong Hua. "Anonymity Query Method of Outsourced Database." Advanced Materials Research 798-799 (2013): 837-841.
Barnett, David. Ansar Jerusalem Announces Deaths of 3 Fighters, Including Commander. Threat Matrix, 2013.
Appendix IV for a description of DOD counterpiracy costs., 2013.
The Applicability of International Law in Cyberspace-From If to How?. Panel Three at the Georgetown University Conference on the International Law on Cyber, 2013.

Pages