Biblio

Export 21362 results:
2014
Rose, Gideon, and Benn Steil. "Foreign Affairs Focus: Benn Steil on Fed Policy." Foreign Affairs (2014).
Foreign fighters from Western countries in the ranks of the rebel organizations affiliated with Al-Qaeda and the global jihad in Syria. Israel: The Meir Amit Intelligence and Terrorism Information Center, 2014.
Barrett, Richard. Foreign Fighters in Syria. New York: TSF, 2014.
Mullins, Sam. "Foreign Fighters in Syria: Tracking the Trends and Assessing the Threat." Per Concordiam 5, no. 3 (2014): 36-43.
Kraehenmann, Sandra. Foreign Fighters under International Law. Geneva: Geneva Academy of International Humanitarian Law and Human Rights, 2014.
Simonyan, Tatevik. Foreign Policy of the Republic of Turkey Towards the South Caucasus through the Paradigm of Neorealism Theory. Vol. Master. Yerevan, Armenia: American University of Armenia, 2014.
Foreign Terrorist Fighters under International Law In Academy Briefing. Geneva: Geneva Academy of International Humanitarian Law and Human Rights, 2014.
The Foreign Trade Turnover of the Republic of Kazakhstan., 2014.
Shchetko, Nick. Forget its Hotels, Sochi’s Tech Has Been Up for the Olympic Challenge. Ars Technica, 2014.
Nepomnyashchyy, Oleksandr. "Formation of a system of public self-regulation of the urban environment in Ukraine: New possibilities vs. old problems." State construction 2 (2014): 9.
Former ISIS Fighter: Islamists Fighting Each Other in Syria. Al-Monitor, 2014.
Former Saudi ISIS Fighter Reveals Secrets of Militant Group. Al Arabiya News video, 2014.
Matthews, Chris. Fortune 5: The biggest organized crime groups in the world In Fortune., 2014.
Doornbos, Harald, and Jenan Moussa. "Found: The Islamic State’s Terror Laptop of Doom." Foreign Policy (2014).
Kharchenko, Vyacheslav, Oleg Illiashenko, Artem Boyarchuk, Chris Phillips, Jüri Vain, and Madli Krispin. "FPGA-based Critical Computing: TEMPUS and FP7 Projects Issues." In Proceedings of the 10th European Workshop on Microelectronics Education, 74-79., 2014.
Framework for Improving Critical Infrastructure Cybersecurity. Vol. Version 1.0,., 2014.
Seeja, K. R., and Masoumeh Zareapoor. "FraudMiner: A Novel Credit Card Fraud Detection Model Based on Frequent Itemset Mining." The Scientific World Journal (2014).
Freedom in the World 2014. Freedom House, 2014.
"The French jihadi: Enfant de la Patrie." The Economist (2014).
Penketh, Anne. "Frenchman in Isis Beheading Video Had Told TV of Caliphate Hopes." The Guardian (2014).
Kozma, Tibor. "From Adjusting to Rebuilding Police Institutions." Connections: The Quarterly Journal 13, no. 3 (2014): 117-123.
Hashim, Ahmed. From Al Qaeda Affiliate to the Rise of the Islamic Caliphate: the Evolution of the Islamic State of Iraq and Syria (ISIS). Singapore: Nanyang Technological University, 2014.
Kashin, Oleg. From Crimea to the Donbass: the adventures of Igor Strelkov and Aleksandr Borodaya. Slon, 2014.
"From Hijrah to Khilafah." Dabiq 1 (2014): 36.
Milina, Velichka. From Post-industrial towards Neo-industrial Economy (in Bulgarian) In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2014.

Pages