Biblio

Export 21441 results:
2012
ADL Mobile Learning Handbook. ADL Web site, 2012.
Advanced Distributed Learning (ADL) Initiative In Experience API. Draft Specification., 2012.
Adventures with Daisy in Thunderbolt-DMA-land: Hacking Macs through the Thunderbolt interface. Break&Enter.org, Security News, Tools & Methodology, 2012.
Tolipov, Farhod. Afghan Worries Prompt US Defence Aid for Uzbekistan. Institute for War and Peace Reporting, 2012.
Afghanistan Index: Tracking Variables of Reconstruction & Security in Post-9/11 Afghanistan. Brookings Institute, 2012.
Afghanistan to 2015 and Beyond In Adelphi Series. Vol. 425–26. International Institute for Strategic Studies, 2012.
Brzezinski, Zbigniew. "After America." Foreign Policy (2012): 26-29.
Barnett, Thomas P. M.. "AirSea Battle: The Military-Industrial Complex’s Self-Serving Fantasy." Time (2012).
Akhmed Chataev Innocent – MIA Compelled Witness to Sign Fake Testimonies. Human-rights.ge, 2012.
Riedel, Bruce. "Al Qaeda 3.0: Terrorism’s Emergent New Power Bases." The Daily Beast (2012).
Orange, Richard. "Al Qaeda Rejects Anders Behring Breivik Comparison." The Telegraph (2012).
Nakashima, Ellen, and Joby Warrick. "Al Qaeda’s Online Forums Go Dark for Extended Period." Washington Post (2012).
Tola, Dorian. Albanian-NATO relations in the fight against international terrorism. Monterey, California: Naval Postgraduate School, 2012.
Benkirane, Reda. The Alchemy of Revolution: The Role of Social Networks and New Media in the Arab Spring. Geneva Centre for Security Policy, 2012.
Benkirane, Reda. "The Alchemy of Revolution: The Role of Social Networks and New Media in the Arab Spring." GCSP Policy Paper 7 (2012).
Glenn, Russell W.. All Glory Is Fleeting: Insights from the Se¬cond Lebanon War . Santa Monica, CA: RAND, 2012.
All Hazards Risk Assessment Methodology Guidelines 2012–2013. Ottawa: Public Safety Canada, 2012.
Biryukov, Sergey. "The All-Invasive Clientella." Svobodnaya Mysl 7 (2012): 32-33.
. Almanac 2012: Governing and Reforming Kyrgyzstan Security Sector., 2012.
al-Filastini, Abu Qatada. al-Muqaraba li nazilat al-’asr. Copenhagen: al-Nur, 2012.
Raghavan, Sudarsan, and Peter Finn. "Al-Qaeda bombmaker Ibrahim Hassan al-Asiri has tried to attack the U.S. three times, officials say." Washington Post (2012).
Gonçalves, Francisco. "A Ameaça Jihadista nos Estabelecimentos Prisionais: Desafios e Dilemas." Nação e Defesa 132 (2012): 192-211 .
Panetta, Leon E.. America’s Pacific Rebalance In Project Syndicate., 2012.
Zareapoor, Masoumeh, K.R. Seeja, and M.Afshar.Alam. "Analysis of Credit Card Fraud Detection Techniques: based on Certain Design Criteria." International Journal of Computer Applications (0975 – 8887) 52, no. 3 (2012).
Tagarev, Todor, Venelin Georgiev, and Petya Ivanova. "Analytical Support to Critical Infrastructure Protection Policy and Investment Decision-Making." Information & Security: An International Journal 28, no. 1 (2012): 13-20.

Pages