Biblio

Export 21377 results:
2013
Remittance Euphoria: Expansion or Dependency?. Baku: Center for Economic and Social Development (CESD), 2013.
Tagarev, Todor, Assya Davidova, Anton Lazarov, and Rossen Ivanov. Report for the activity of the Ministry of Defence in the period of Bulgaria’s Caretaker Government, 13 March – 28 May 2013 (in Bulgarian) In CSDM Views. Sofia: Centre for Security and Defence Management, 2013.
Rescue and Civil Protection Program (PRiOL)., 2013.
Lee, Ji Hee. "Resilience: A Meta‐Analytic Approach." Journal of Counseling & Development 91, no. 3 (2013): 269-279.
Joseph, Jonathan. "Resilience as embedded neoliberalism: a governmentality approach." Resilience 1, no. 1 (2013): 38-52.
Cavelty, Myriam Dunn, and Tim Prior. "Resilience in Security Policy: Present and Future." CSS Analysis in Security Policy 142 (2013): 142.
Linkov, Igor, Daniel Eisenberg, Kenton Plourde, Thomas P. Seager, Julia Allen, and Alexander Kott. "Resilience metrics for cyber systems." Environment Systems & Decisions 33, no. 4 (2013).
Ungar, Michael. "Resilience, Trauma, Context and Culture." Trauma, Violence, & Abuse 14, no. 3 (2013): 255-266.
Bodeau, Deborah, John Brtis, Richard Graubart, and Jonathan Salwen. Resiliency Techniques for System of Systems: Extending and Applying the Cyber Resiliency Engineering Framework to the Space Domain. Bedford, MA: MITRE, 2013.
Pospisil, Jan. "Resilienz: Die Neukonfiguration von Sicherheitspolitik im Zeitalter von Risiko." Austrian Journal of Political Science 1 (2013): 18-42.
Resolution by the Georgian Parliament., 2013.
van Reijn, Joop. "Resource management in an Intelligence and Security Service: a Dutch example." Information & Security: An International Journal 30, no. 1 (2013): 41-54.
Resources for ‘Training and Learning Architecture’ Webinar. ADL Web site, 2013.
Grant, Rachel Staley. Rethinking Nuclear Deterrence and Burden-Sharing. American Security Information Council (BASIC), 2013.
Roth, Kenneth. Rethinking Surveillance., 2013.
Dalrymple, William. Return of the King: The Battle for Afghanistan. London: Bloomsbury, 2013.
Kim, Cheonshik, YongSoo Choi, Hyoung-Joong Kim, Dongkyoo Shin, and Dongil; Shin. "Reversible Data Hiding for Halftone Images Using Histogram Modification." International Information Institute (Tokyo). Information; Koganei 16, no. 3 (2013): 1861-1872.
Liao, Hung-Jen, Chun-Hung Richard Lin, Ying -Chih, and Kuang-Yuan Tung. "Review: Intrusion detection system: A comprehensive review." Journal of Network and Computer Applications (2013).
"Review of European Standards on ICT competences." Information Management (in Russian) 7 (2013): 30-35.
Briggs, Rachel, and Sebastien Feve. Review of Programs to Counter Narratives of Violent Extremism: What Works and What are the Implications for Government?. Institute for Strategic Dialogue, 2013.
Lackenbauer, Helené, and Richard Langlais. Review of the Practical Implementation of UNSCR 1325 for the Conduct of NATO-led Operations and Missions. Stockholm: Swedish Defence Research Agency FOI, 2013.
Lackenbauer, Helené, and Richard Langlais. Review of the Practical Implications of UNSCR 1325 for the Conduct of NATO-led Operations and Missions. Stockholm: Swedish Defense Research Agency (FOI), 2013.
RF Foreign Policy Concept In Approved by RF President V.V. Putin., 2013.
Bongo, Pathias P., Paul Chipangura, Mkhokheli Sithole, and Funa Moyo. "A rights-based analysis of disaster risk reduction framework in Zimbabwe and its implications for policy and practice." Journal of Disaster Risk Studies 5, no. 2 (2013): article 81.
Thompson, James. "The Rise of All." Connections: The Quarterly Journal 12, no. 3 (2013): 63-86.

Pages