Biblio

Export 21402 results:
2015
Turner, John. "Strategic Differences: Al Qaeda’s Split with the Islamic State of Iraq and al-Sham." Small Wars and Insurgencies 26, no. 2 (2015): 208-25, 216-17.
Tolipov, Farkhod. "Strategic Implications of the War in Ukraine for the Post-Soviet Space: A View from Central Asia." Connections: The Quarterly Journal 14, no. 4 (2015): 11-20.
Torp, Simon M.. "The Strategic Turn in Communication Science: On the History and Role of Strategy in Communication Science from Ancient Greece." In The Routledge Handbook of Strategic Communication, 24. New York, London: Routledge, Taylor and Francis Group, 2015.
The Strategy for Combating Organized Crime 2014-2016., 2015.
Kane, Gerald, Doug Palmer, Anh Nguyen Phillips, David Kiron, and Natasha Buckley. "Strategy, not Technology, Drives Digital Transformation: Becoming a Digitally Mature Enterprise." IT Sloan Management Review (2015): July 14, 2015.
Nowakowska-Krystman, Aneta. "The Strategy of the Armed Forces based on Core Competencies." Science & Military Journal 10, no. 2 (2015): 54-63.
Structural Equation Modeling, Dell Statistics Textbook., 2015.
Manjula, D., and J. Thilagavathi. "Study on False Positive Reduction i n Unbalanced Datasets through SVM Using Cost Based Learning." International Journal of Trend in Research and Development 2(6), (2015).
Manjula, D., and J. Thilagavathi. "A Study on False Positive Reduction in Unbalanced Datasets through SVM Using Cost Based Learning." International Journal of Trend in Research and Development 2, no. 6 (2015).
United Nations Office on Drugs and Crime. Study on the Effects of New Information Technologies on the Abuse and Exploitation of Children. Vienna, 2015.
The Stuxnet Worm. Norton by Symantec, 2015.
Ihmouda, Rabia, Najwa Hayaati Mo Alwi, and Ismail Abdullah. "Successful Factors on E-Government Security Social-Technical Aspect." ARPN Journal of Engineering and Applied Sciences 10, no. 20 (2015).
Summit Meetings. NATO, 2015.
Summit website., 2015.
Rougier, Bernard. The Sunni Tragedy in the Middle East. Northern Lebanon from al-Qaeda to ISIS. Princeton, NJ: Princeton University Press, 2015.
Hogan, Michael, and Elaine Newton. Supplemental Information for The Interagency Report On Strategic U.S. Government Engagement In International Standardization To Achieve U.S. Objectives For Cybersecurity., 2015.
Wong, Meghan A., Richard Frank, and Russell Allsup. "The supremacy of online white supremacists – an analysis of online discussions by white supremacists." Information & Communications Technology Law 24, no. 1 (2015).
Surf Safely. IFS-EMMAUS, 2015.
Suruc massacre: ‘Turkish student’ was suicide bomber. BBC News, 2015.
Jeong, Seong Hoon, Hana Kim, Youngsang Shin, Taejin Lee, and Huy Kang Kim. "A Survey of Fraud Detection Research based on Transaction Analysis and Data Mining Technique (결제로그 분석 및 데이터 마이닝을 이용한 이상거래 탐지 연구 조사)." Journal of the Korea Institute of Information Security and Cryptology (정보보호학회논문지) 25, no. 6 (2015): 1525-1540.
Survey of Serbian Public Opinion: November 24 – December 3, 2015. Centre for Insight in Survey Research, 2015.
Survey on Income and Living Conditions – Poverty and Social Inclusion Indicators. National Statistics Institute, 2015.
Uwizera, Ch. "Sustainable Development: International Strategy for Disaster Reduction." In General Assembly. UN General Assembly, 2015.
Molodetska, Kateryna. "Syntez synergetychnogo upravlinnja popytom agentiv na kontent u socialnyh internet-servisah." Informatyka ta matematychni metody v modeljuvanni 5, no. 4 (2015): 330-338.
Syria Calling: Radicalisation in Central Asia In Central Asia Briefing. Bishkek/Brussels: International Crisis Group, 2015.

Pages