Biblio

Export 21401 results:
2012
Tagarev, Todor, Venelin Georgiev, and Valeri Ratchev. "A Taxonomy of Essential Services." Radioelectronic and Computer Systems 6, no. 58 (2012): 191-196.
van der Steen, Corian. Team task allocation support by using the human body as a sensor. Real-time estimated stress of team members as input for decision support for military commanders In Faculty of Science Theses. Vol. Master Thesis Content and Knowledge Engineering. Universiteit Utrecht, 2012.
World Health Organization. Technical Consultation on H5N1 Research Issues – Consensus Points ., 2012.
Technology in the 21st Century. WordPress.com, 2012.
Kharchenko, Vyacheslav, Artem Boyarchuk, and Chris Phillips. "TEMPUS-SAFEGUARD: National Safety IT-Engineering Network of Centres of Innovative Academia-Industry Handshaking." Information & Security: An International Journal 28, no. 2 (2012): 315-318.
Ten Facts on Climate Change and Health., 2012.
Tolk, Andreas. "Terms and Application Domains." In Engineering Principles of Combat Modeling and Distributed Simulation. Wiley Online Library , 2012.
Dyson, William. Terrorism: An Investigator’s Handbook. New York: Elsevier, 2012.
Matusitz, Jonathan. Terrorism and Communication: A Critical Introduction. Thousand Oaks, CA: Sage, 2012.
White, Jonathan R.. Terrorism and Homeland Security. Wadsworth: Cengage Press, 2012.
Rollins, Johns, and Liana Sun Wyler. Terrorism and Transnational Crime: Foreign Policy Issues for Congress In Congressional Research Service., 2012.
Williams, Phil. "The Terrorism Debate over Mexican Drug Trafficking Violence." Terrorism and Political Violence 24, no. 2 (2012): 259-78.
Mueller, John, and Mark Stewart. "The Terrorism Delusion: America’s Overwrought Response to September 11." International Security 37, no. 1 (2012): 103.
Forrest, James J. F.. The Terrorism Lectures: A Comprehensive Collection for. Students of Terrorism, Counterterrorism, and National Security. Santa Anna, CA: Nortia Press, 2012.
S., Weichert, and Elter A.. "Terrorismus 2.0. Über die Propaganda der Tat im digitalen Zeitalter." In Die Welt nach 9/11. Sonderheft der Zeitschrift für Außen- und Sicherheitspolitik. Wiesbaden: VS Verlag für Sozialwissenschaften, 2012.
Ogun, M.N.. "Terrorist Use of Internet: Possible Suggestions to Prevent the Usage for Terrorist Purposes." Journal of Applied Security Research 7, no. 2 (2012): 203-217.
Ibraheem, Basem, Abeer Hamdy, and Nevien Darwish. "Textual Signs Reading for Indoor Semantic Map Construction." International Journal of Computer Applications (0975 – 8887) 53, no. 10 (2012).
Thematic scenario portfolio (Work Packages 3-7) with reference scenarios for “Security Research 2035” . FOCUS Deliverable 8.1, 2012.
Šenovský, Michail, Milan Oravec, and Pavel Šenovský. Theory of Crisis Management. Ostrava: SPBI, 2012.
Third ECIS Disaster Risk Reduction Community of Practice Workshop In Ulcinj Capacity Assessment Report. ECIS, 2012.
Strachan-Morris, David. "Threat and Risk: What Is the Difference and Why Does It Matter?" Intelligence and National Security 27, no. 2 (2012): 172-186.
Salin, Pavel. "Three paths for Russia in Asia." Russia in global politics (2012).
"Tihipko poobitsiav vyrishyty viyskovi problem." Ekonomichna Pravda (2012).
Warrick, Joby. "Tiny Azerbaijan Unleashes Pop-Power Against Iran’s Mullahs." Washington Post (2012).
Top 15 Most Popular Social Networking Sites., 2012.

Pages