Biblio
Export 21401 results:
Air: New Direction on Pollution." New York Times (2009).
"Al Qaeda and US Strategic Communications In Meeting summary for Interagency Strategic Communication Fusion Team., 2009.
America ‘Can’t Wave Magic Wand’ on Climate Change." The Times (UK) (2009).
"American Government: Political Development and Institutional Change. 5th ed. Taylor & Francis Publishing, Inc., 2009.
Among Climate Scientists, a Dispute over ‘Tipping Points’." New York Times (2009).
"Analysis of DSm belief conditioning rules and extension of their applicability." In Advances and Applications of DSmT for Information Fusion (Collected works). Vol. III. Infinite Study, 2009.
"Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks." In Foundations of Security Analysis and Design V, 289-338. Vol. Lecture Notes in Computer Science, vol. 5705. Berlin, Heidelberg: Springer, 2009.
"Analysis of the Reasons for Incidents with Radioactive Sources in Bulgaria and Preventive Measures." Information & Security: An International Journal 24 (2009): 115-124.
"Anmerkung zum BVerfG-Beschluss vom 17.06.2009 [Comment on the Decision of the Federal Constitutional Court of 17 June 2009] In Deutsches Verwaltungsblatt. Vol. 19., 2009.
Antiterorističke mere u okviru Evropske politike susedstva." Medjunarodni problemi 4 (2009): 427-454.
"Apie demokratiją ir laisvą rinką." Delfi Zinios (2009).
"Applicability of Artificial Neural Networks in Business." In Information Technology Issues & Challenges. India: Excel Books, 2009.
"Application of the Unscented Kalman Filter (UKF) Estimation Techniques for Fault Detection Diagnosis and Isolation (FDDI) in Attitude Control (AC) and Heating Ventilation Air Conditioning (HVAC) Systems." In Attitude Control (AC) and Heating Ventilation Air Conditioning (HVAC) Systems., 2009.
"Applying Mean-Variance Portfolio Analysis to E.ON’s Power Generation Portfolio in the UK and Sweden. E.ON Energy Research Center, RWTH Aachen University, 2009.
An Architectural Approach to Creating a Collaborative Information Environment In Bishop Konstantin Preslavsky Scientific Conference of the University of Shumen, Collection of Papers., 2009.
Architecture based engineering of enterprises with government involvement." In Advances in Government Enterprise Systems Architecture. IGI Global, 2009.
"Armenia at a Strategic Crossroads." Connections: The Quarterly Journal 8, no. 3 (2009): 109-123.
"Armenian Strife Still an Open Wound One Year On. RFE/RL Armenia Report, 2009.
The Art of (Cyber) War." Journal of International Security Affairs (2009).
"As Hu Jin Tao, Obama Prepare to Meet, World Public Gives China, US Low Marks on Climate Change., 2009.
ASIS SPC.1-2009 - Organizational Resilience: Security, Preparedness, And Continuity Management Systems - Requirements with Guidance for Use. Webstore.ANSI.org, 2009.
Assessing the Role of the Military in National Cybersecurity Efforts In Faculty of the U.S. Army Command and General Staff College. Vol. Master of Military art and science. Ankara, Turkey: Land Forces Military Academy, 2009.
The Atlantic Charter., 2009.
Attacking the BitLocker Boot Process. Darmstadt, Germany: Fraunhofer Institute for Secure Information Technology (SIT), 2009.