Biblio

Export 21377 results:
2012
Healey, Jason. Beyond Attribution: Seeking National Responsibility for Cyber Attacks In January Issue Brief 2012. Atlantic Council, 2012.
Braun, Thomas. "Beyond Counterinsurgency: Why the Concept is Failing." Connections: The Quarterly Journal 11, no. 3 (2012): 77-84.
Baaz, Maria Eriksson, and Mats Utas. "Beyond ‘Gender and Stir’." In Beyond ‘Gender and Stir’: Reflections on Gen¬der and SSR in the Aftermath of African Conflicts, 9. Uppsala: The Nordic Africa Institute, 2012.
Smolny, Dabrowka. "Bezpieczeństwo niemilitarne jako perspektywa rozwoju polskiego przemy-słu obronnego." Szybkobieżne Pojazdy Gąsienicowe, Biuletyn Naukowo-Techniczny 30, no. 12 (2012): 16.
Marz, Nathan, and James Warren. Big Data: Principles and best practices of scalable realtime data systems. Manning, 2012.
Maiti, Chinmay, and Bibhas Chandra Dhara. "A binary watermarking scheme using quantization levels of BTC-PF method." In International Conference on Communications, Devices and Intelligent Systems (CODIS). Kolkata, India , 2012.
Boko Haram’s kingpin confesses: Top Police officers helped me to escape., 2012.
Sims, Christopher, Fernando Luján, and Bing West. "Both Sides of the COIN: Defining War After Afghanistan." Foreign Affairs (2012).
Briefing by L. Brahimi to the UN Security Council In closed consultations., 2012.
Briefing by Russian MFA official spokesman A.K. Lukashevich. Vol. 9 February 2012. Official website of the Russian Ministry of Foreign Affairs, 2012.
Sharma, Ruchir. "Broken BRICs: Why the Rest Stopped Rising." Foreign Affairs (2012): 2-7.
Georgescu, E.-S., and A. Pomonis. "Building Damage vs. Territorial Casualty Patterns during the Vrancea (Romania) Earthquakes of 1940 and 1977." In 5th World Conference on Earthquake. Lisboa, 2012.
Barry, Charles. Building Future Transatlantic Interoperability Around a Robust NATO Response Force In Transatlantic Current. Washington, D.C.: National Defense University, Institute for National Strategic Studies, 2012.
Badrak, Valentin. Building Integrity in Defence Establishments: A Ukrainian Case Study. Kyiv: Centre for Army, Conversion and Disarmament Studies, 2012.
Aldrich, Daniel P.. Building Resilience: Social Capital in Post-Disaster Recovery. Chicago: University of Chicago Press, 2012.
Stanchev, Krasen. Bulgarian Economy: What the Politicians Do Not See. Sofia: Institute for Market Economics, 2012.
Beutel, Martha D.. Buying Decline: The Privatization of Foreign. Vol. Doctor of Philosophy. Coral Gables, Florida: InterventionUniversity of Miami, 2012.
Osipian, Ararat L.. By Iron and Bribe: Corporate, Property & Land Raiding Russian Style. Press, 2012.
Morrow, Bill. "BYOD Security challenges: control and protect your most sensitive data." Network Security 12 (2012): 5-8.
Vardeva, Ivelina, and Valery Gochev. Calculation of Estimations of Messages by Generalized Nets and Intuitionistic Fuzzy Truth Values In 2012 6th IEEE International Conference Intelligent Systems. Sofia, Bulgaria, 2012.
D. Pressman, Elaine, and John Flockton. "Calibrating Risk for Violent Political Extremists and Terrorists: The VERA 2 Structured Assessment." British Journal of Forensic Practice 14, no. 4 (2012): 237-51.
A Case for Intelligence Reforms in India In IDSA Task Force Report. New Delhi: Institute for Defence Studies and Analyses, 2012.
Patel, Preeti. "Causes of Conflict." In Conflict and Health, 5-13. Maidenhead: Open University Press, 2012.
Tadjbakhsh, Shahrbanou. Central Asia and Afghanistan: Insulation on the Silk Road between Eurasia and the Heart of Asia . Oslo: PRIO, 2012.
Tynan, Deirdre. Central Asia: Russia Taking Steps to Reinforce Security Relationships. EurasiaNet.org, 2012.

Pages