Biblio

Export 21362 results:
2014
Suspend and Hibernate. Archlinux.org, 2014.
Hawkins, Timothy G., Wesley S. Randall, Adam V. Coyne, and Mohammad H. Baitalma. "Sustainable integrity: how reverse auctions can benefit suppliers in emerging markets." Supply Chain Management: An International Journal 19, no. 2 (2014): 126-141.
Matusitz, Jonathan. Symbolism in Terrorism: Motivation, Communication, and Behavior. Lanham, MD: Rowman & Littlefield, 2014.
Jefferson, Catherine, Filippa Lentzos, and Claire Marris. "Synthetic Biology and Biosecurity: Challenging the ‘Myths’." Frontiers in Public Health 226, no. 115 (2014).
Nichols, Michelle. Syria Accuses Rebels of Planning Gas Attack Near Damascus. Vol. September 15, 2015. Reuters, 2014.
Sly, Liz, and Ahmed Ramadan. "Syrian regime, rebels reach deal to aid besieged Homs." The Washington Post (2014).
Ihmouda, Rabia, Najwa Hayaati Mo Alwi, and Ismail Abdullah. "A Systematic Review on E-government Security Aspects." International Journal of Enhanced Research in Management & Computer Applications 3, no. 6 (2014): 60-67.
System/Network Administrators from the Former Yugoslav Republic of Macedonia Train in Cyber Defence. NATO A-Z, 2014.
Minkina, Mirosław. Sztuka wywiadu w państwie współczesnym [The Art of Intelligence in the Modern State]. Warszawa: Oficyna Wydawnicza “Rytm”, 2014.
Frye, Timothy. "A Tale of Two Russian Narratives." Perspectives on Peace & Security (2014).
Powell, Jonathan. Talking to Terrorists: How to End Armed Conflicts. London: The Bodley Head, 2014.
Krempel, Erik, and Jürgen Beyerer. "TAM-VS: A Technology Acceptance Model for Video Surveillance." In Privacy Technologies and Policy, Lecture Notes in Computer Science, 86-100. Vol. 8450. Cham: Springer, 2014.
Zimmerman, Carson. Ten Strategies of a World-Class Cybersecurity Operations Center. MITRE, 2014.
Çağlar, Ü. "Terror and Economy." IPAD/İktisat Politikası Araştırmaları Dergisi 1, no. 1 (2014): 67-79.
Nissen, Thomas Elkjer. "Terror.com – IS’s Social Media Warfare in Syria and Iraq." Contemporary Conflicts 2, no. 2 (2014): 1-8.
Bachmann, Sascha-Dominik, and Hakan Gunneriusson. "Terrorism and Cyber Attacks as Hybrid Threats: Defining a Comprehensive Approach for Countering 21st Century Threats to Global Peace and Security." The Journal of Terorism and Security Analysis (2014): 26-36.
Levitt, Matthew. Terrorist Financing and the Islamic State In Testimony submitted to the House Committee on Financial Services. Washington Institute, 2014.
Cilluffo, Frank J., and Joseph R. Clark. "Thinking About Strategic Hybrid Threats – In Theory and in Practice." PRISM 4, no. 1 (2014): 47-63.
Milashina, Elena. "The Threat to Shoot Someone in the Forehead Is Not Illegal?" Novaya Gazeta (2014).
Threats to International Peace and Security Caused by Terrorist Acts In S/RES/2178 (2014). UN Security Council, 2014.
Ingram, Haroro J.. "Three traits of the Islamic State’s information warfare." The RUSI Journal 159, no. 6 (2014): 4-11.
Tibilov: My mission will be accomplished if South Ossetia unites with Russia. Information Agency Regnum, 2014.
Adams, Gordon. Ties that Bind. The Foreign Policy Group, 2014.
Jin, Xi. Title: European Union Representation at the United Nations : Towards More Coherence after the Treaty of Lisbon. Vol. Doctor. Universiteit Leiden, 2014.
Kissinger, Henry A.. "To Settle the Ukraine Crisis, Start at the End." Washington Post (2014).

Pages