Biblio

Export 21362 results:
2015
Blaney, Leigh, and Vivienne Brunsden. "Resilience and Health Promotion in High-risk Professions: A Pilot Study of Firefighters in Canada and the United Kingdom." The International Journal of Interdisciplinary Organizational Studies 10, no. 2 (2015): 23-32.
Bourbeau, Philippe. "Resilience and International Politics: Premises, Debates, Agenda." International Studies Review 17, no. 3 (2015): 374-395.
Bilban, Christoph. Resilience: Silver Bullet in Challenging Hybrid Warfare? In Resilienz in den Internationalen Beziehungen., 2015.
Ajdukovic, Dean, Shaul Kimhi, and Mooli Lahad. Resiliency: Enhancing Coping with Crisis and Terrorism In NATO Science for Peace and Security series. Vol. 119. Amsterdam: IOS Press, 2015.
Resolution 427 on Climate Change and International Security., 2015.
Brázová, Věra – Karin. "Response of Central European Civil Security Systems to the Economic Crisis." Central European Journal of Public Policy 9 , no. 2 (2015).
Brázová, Věra – Karin. "Response of Central European Civil Security Systems to the Economic Crisis." Central European Journal of Public Policy 9, no. 2 (2015).
Ming, Zhou. "The Response of the Five Central Asian States to the Situation in Afghanistan: History and Trend (in Chinese)." South Asia Research (2015).
Responsibilities of the Ministry. Copenhagen: Ministry of Defence, 2015.
Results of the all-union Population and Housing Census 1989, Latvian SSR. CSB, 2015.
UNESCO. Rethinking Education – Towards Common Goal?., 2015.
Gürer, Heidemaria. "Return to Babel: The Race to Integration in the Southern Caucasus." Connections: The Quarterly Journal 14, no. 2 (2015): 99-103.
Luck, Taylor. Returning Jihadis: At Luxurious Rehab Center, A Saudi Cure for Extremism. Christian Science Monitor, 2015.
Merrill, Jamie, James Hanning, Mark Leftly, and Nick Clark. "Revealed: How Torture Was Used to Foil Al-Qaeda’s 2010 Plot to Bomb Two Airliners 17 Minutes Before Explosion." The Independent (2015).
Wu, Da-Chun, and Ming-Yao Chen. "Reversible data hiding in standard midi files by adjusting delta time values." Multimedia Tools and Applications 74, no. 21 (2015): 9827-9844.
Tahmoush, David. "Review of micro-Doppler signatures." IET Radar Sonar Navigation 9, no. 9 (2015): 1140-1146.
Joshi, Manish, and Theyazn Hassn Hadi. "A review of network traffic analysis and prediction techniques." arXiv preprint arXiv (2015): 1507.05722.
Taştekin, Fehim. The revival of Turkey’s 'lynching' culture. Al-Monitor, 2015.
Hoskins, Brittany N.. The Rhetoric of Commoditized Vulnerabilities: Ethical Discourses in Cybersecurity. Vol. Master of Arts. Blacksburg, VA: Virginia Polytechnic Institute and State University, 2015.
Sekulow, Jay, Jordan Sekulow, Robert W. Ash, and David French. Rise of ISIS: A Threat We Can’t Ignore. Brentwood, TN: Howard Books, 2015.
Cockburn, Patrick. The Rise of Islamic State: ISIS and the New Sunni Revolution. New York: Verso Books, 2015.
Karev, Maksim. "Risk Management as a Part of The Security Strategic Management." Science & Technologies V, no. 7 (2015).
Georgiev, Yuliy. Risk Management in National Security. Second amended and revised edition. Sofia: Iztok-Zapad, 2015.
Risk Models - Understanding disaster risk modelling. Prevention Web, 2015.
Iskandarov, Khayal. "The Road of Integration of Azerbaijan into NATO (1994-2014)." The Caucasus and the World 19 (2015): 89.

Pages