Biblio

Export 21362 results:
2013
HM Government Emergency Response and Recovery. Non Statutory Guidance Accompanying the Civil Contingencies Act 2004. London: Civil Contingencies Secretariat. , 2013.
Moghadam, Assaf. "How Al Qaeda Innovates." Security Studies 22, no. 3 (2013): 466-97.
Hochwald, Thorsten. "How Do Social Media Affect Intra-State Conflicts other than War?" Connections: The Quarterly Journal 12, no. 3 (2013): 9-37.
Abbas, Hassan. How Drones Create More Terrorists. The Atlantic, 2013.
Plumer, Brad. "How Long Before Fracking Spreads to Europe? A Decade, at Least." The Washington Post (2013).
Greenwald, Glenn. "How NSA can see ‘nearly everything you do online’." Guardian (2013): 1-2.
Lukyanov, Fedor. How Russia Can Profit from Confrontation between the US and China. Vol. 19 February 2013. Forbes, 2013.
Ratchev, Valeri. How to develop an effective, efficient and democratic defence institution - the lessons we are learning., 2013.
Lefèvre, Eric, and Zied Elouedi. "How to preserve the conflict as an alarm in the combination of belief functions?" Decision Support Systems 56 (2013): 326-333.
Gartenstein-Ross, Daveed, and Kelsey D. Atherton. "How we killed privacy – in 4 easy steps." Foreign Policy (2013).
Kleinig, John, and Nicholas G. Evans. "Human Flourishing, Human Dignity, and Human Rights." Law and Philosophy 32 (2013): 539-564.
Gómez, Oscar A., and Des Gasper. Human Security: A Thematic Guidance Note for Regional and National Human Development Report Teams In United Nations Development Programme. Human Development Report Office, 2013.
Sheikh, Mayy El, and Alan Cowell. "Hundreds Die as Egyptian Forces Attack Islamist Protesters." New York Times (2013).
Azani, Eitan. "The Hybrid Terrorist Organization: Hezbollah as a Case Study." Studies in Conflict & Terrorism 36, no. 11 (2013): 899-916.
McCulloh, Timothy, and Richard Johnson. Hybrid Warfare (JSOU Report). Florida: The JSOU Press, MacDill Air Force Base, 2013.
Tasevski, Predrag. I can hack your FB, can you catch me...., 2013.
Im, Tobin, Greg Porumbescu, and Hyunkuk Lee. "ICT as a buffer to change: A case study of the Seoul Metropolitan Government's Dasan Call Center." Public Performance & Management Review 36, no. 3 (2013): 436-455.
Mihalic, Tanja, and Dimitrios Buhalis. "ICT as a New Competitive Advantage Factor - Case of Small Transitional Hotel Sector." Economic and Business Review for Central and South - Eastern Europe 15, no. 1 (2013): 33-56.
Stewart, Catrina. "Illegal Ivory Trade Funds al-Shabaab’s Terrorist Attacks." The Independent (2013).
Miklaucic, Michael, and Jacqueline Brewer. Illicit Networks and National Security in the Age of Globalization. Center for Complex Operations (National Defense University Press), 2013.
Yunwen, Zhang, Yao Jingshun, and Dong Tianzhong. "IMM model group selection and parameter setting (IMM 模型组的选择与参数的设定)." Journal of System Simulation 25, no. 004 (2013).
"IMM 模型组的选择与参数的设定." 系统仿真学报 25, no. 004 (2013).
Shehu, B.. "Immigration Officers Who Help Boko Haram." Vanguard 1 (2013): 8-9.
D.Craig, Scotty, Xiangen Hu, Arthur C.Graesser, Anna E.Bargagliott, Allan Sterbinsky, Kyle R. Cheney, and Theresa Okwumabua. "The impact of a technology-based mathematics after-school program using ALEKS on student's knowledge and behaviors." Computers & Education 68, no. 68 (2013): 495-504.
Huang, Yu, and Hualin Cheng. "The impact of climate change on coastal geological disasters in southeastern China." Natural hazards 65 (2013): 377-390.

Pages