Biblio

Export 21385 results:
2010
Haralampiev, K., and G. Naidenov. "Waves of the Change and Change of the Waves." Sociological Problems Special Issue (2010).
San Martín, Pablo. Western Sahara: The Refugee Nation. Cardiff: University of Wales Press, 2010.
Zunes, Stephen, and Jacob Mundy. Western Sahara: War, Nationalism and Conflict Irresolution. New York, NY: Syracuse University Press, 2010.
Biscop, Sven, Teija Tiilikainen, Stefano Silvestri, Nicole Gnesotto, Daniel Keohane, and Jolyon Howorth. What do Europeans Want from NATO?. Brussels: European Union Institute for Security Studies, 2010.
Morozov, Yuriy. "What publication of myths about the Chinese threat will lead to." Central Asia and the Caucasus 13, no. 2 (2010): 118-129.
Nyhan, Brendan, and Jason Reifler. "When Corrections Fail: The Persistence of Political Misperceptions." Political Behavior 32, no. 2 (2010): 303-330.
Mugavero, Roberto. "When in Rome…." CBRNe World (2010).
Parveen, Tauhida, and Scott Tilley. When to Migrate Software Testing to the Cloud? In Third International Conference on Software Testing, Verification, and Vali¬dation Workshops (ICSTW). Paris, France, 2010.
White Book on Defence and Armed Forces of Bulgaria. Ministry of Defence of the Republic of Bulgaria, 2010.
White House Strategic Communications Report to Congress. White House, 2010.
White paper on Defence and the Armed Forces of the Republic of Bulgaria., 2010.
White Paper on Defense and the Armed Forces., 2010.
Byers, Michael. Who Owns the Arctic? Understanding Sovereignty Disputes in the North . Vancouver, BC: Douglas & McIntyre, 2010.
Clarke, Richard A., and Robert K. Knake. "Why Cyber Warfare is Important." In Cyber Warfare: The Next Threat to National Security and What to Do About It, 18-21. New York: HarperCollins, 2010.
Cederman, Lars-Erik, Andreas Wimmer, and Brian Min. "Why Do Ethnic Groups Rebel? New Data and Analysis." World Politics 62, no. 1 (2010): 87-119.
Diallo, Saikou Y., Jose J. Padilla, and Andreas Tolk. "Why is Interoperability Bad: Towards a Paradigm Shift in Simulation Composition." In Fall Simulation Interoperability Workshop Orlando, FL. Orlando, FL, 2010.
Roach, Alfred S.. Why Is The United States Losing The War Of Words In The Global War On Terror? Identifying Causes Of Failure In U.S. Communication Strategy. Fort Leavenworth, Kansas: School of Advanced Military Studies, United States Army Command and General Staff College, 2010.
Venhaus, U.S. Army Colon. Why Youth Join al-Qaeda In Special Report. United States Institute of Peace, 2010.
Wife of Virginia Man who Threatened South Park Pleads Guilty. Anti-Defamation League, 2010.
Wi-Fi сети в Германии обязаны стать закрытыми [Wi-Fi networks in Germany need to become closed]. Geektimes, 2010.
Wikileaks: Russia Branded ‘Mafia State’ in Cables. BBC News, 2010.
Ki-Moon, UN Secretary. The World’s Women 2010: Trends and Statistics. Geneva: United Nations, 2010.
Liu, Baolong. XML Security in XML Data Integrity, Authentication, and Confidentiality In School of Computing and Engineering. Vol. Doctor of Philosophy. University of Huddersfield, 2010.
Morelli, Giovanna. Yersinia Pestis Genome Sequencing Identifies Patterns of Global Phylogenetic Diversity In Nature Genetics ., 2010.
Oriol, Manuel, and Faheem Ullah. YETI on the Cloud In Third Interna¬tional Conference on Software Testing, Verification, and Validation Workshops (ICSTW. Paris, 2010.

Pages