Biblio

Export 21362 results:
2015
Mygal, Valeriy, Andrii But, A. Phomin, and I. Klimenko. "Hereditary Functional Individuality of Semiconductor Sensors." Functional Materials 22, no. 3 (2015): 387-391.
Sly, Liz. "The hidden hand behind the Islamic State militants? Saddam Hussein’s." Washington Post (2015).
Muhajirah, Umm Asiya. "Hijra – My Story." Al-Risalah 1 (2015).
Aiyadurai, Yoganand. Hippocratic data sharing in e-government space with contract management In Information Technology in the Department of Information Technology Faculty of Accounting and Informatics. Vol. Magister Technologiae. Durban University of Technology, 2015.
Pawlak, A., H.D. Jørgensen, L.M. Camarinha-Matos, F. Bénaben, and W Picard. "Holistic Design of Collaborative Net-works of Design Engineering Organizations." In Risks and Resilience of Collaborative Networks, IFIP Advances in Information and Communication Technology. Vol. 463., 2015.
Hollande says Paris attacks an ‘act of war’ by Islamic State group. France 24, 2015.
Mullins, Sam. ‘Home-Grown’ Jihad: Understanding Islamist Terrorism in the US and UK. London: Imperial College Press, 2015.
Mullins, Sam. Home-Grown’ Jihad: Understanding Islamist Terrorism in the US and UK. London: Imperial College Press, 2015.
Li, Xingan, Henry Joutsijoki, Jorma Laurikkala, Markku Siermala, and Martti Juhola. "Homicide and Its Social Context: Analysis Using the Self-Organizing Map." Applied Artificial Intelligence An International Journal 29, no. 4 (2015).
Higgins, Kelly Jackson. Hospital Medical Devices Used As Weapons In Cyberattacks. DARKreading, 2015.
Gertz, Bill. "House Adds Funds to Counter Russian Info War." Washington Times (2015).
Dawson, Gregory S., Man Wai Ho, and Robert J. Kauffman. "How are c-suite executives different? A comparative empirical study of the survival of American chief information officers." Decision Support Systems 74 (2015): 88-101.
Cederberg, Aapo, and Pasi Eronen. "How Can Societies Be Defended Against Hybrid Threats?" Strategic Security Analysis 9 (2015).
Goldsmith, Jack L.. "How Cyber Changes the Law of War." Current and Emerging Trends in Cyber Operations: Policy, Strategy and Practice (2015).
Smith-Spark, Laura, and Deborah Feyerich. How ISIS New Hostage Strategy is Shifting the Goalposts. CNN, 2015.
Stanley, Jason. How Propaganda Works. Princeton University Press, 2015.
Studzińska, Zofia. "How Russia, Step by Step, Wants to Regain an Imperial Role in the Global and European Security System." Connections: The Quarterly Journal 14, no. 4 (2015): 21-41.
Office, Department for Educat. How social media is used to encourage travel to Syria and Iraq briefing note for school., 2015.
Mastracci, Davide. How the catastrophic American decision to disband Saddam’s military helped fuel the rise of ISIL. National Post, 2015.
Jenkins, Brian Michael. How the Current Conflicts Are Shaping Future of Syria and Iraq In Perspective. Rand Corporation, 2015.
Gardner, Frank. How the Dark Web Spurs a Spying ‘Arms Race’. BBC News, 2015.
How the Islamic State Uses Women to Control Women. Syria: Direct, 2015.
Harress, Christopher. "How the Ukrainian Diaspora in the US Is Funding the War Effort in East Ukraine." International Business Times (2015).
Wolf, Brett. HSBC loses senior anti-money laundering compliance executive. Reuters, 2015.
Horne, Alistair. Hubris: The Tragedy of War in the Twentieth Century. London: Weidenfeld & Nicolson, 2015.

Pages