Biblio

Export 21362 results:
2013
Sbardella, Alex. Ten Tips for Mobile UX. Red Ant Blog, 2013.
Acharya, A.. Ten years after 9/11: Rethinking the jihadist threat., 2013.
Tensions Rise in Georgia’s Breakaway Regions. Radio Free Europe – Radio Liberty, 2013.
Terrorism and Financial Intelligence. US Department of the Treasury, 2013.
Freeman, Michael, and Moyara Ruehsen. "Terrorism Financing Methods: An Overview." Perspectives on Terrorism 4, no. 7 (2013): 5-26.
Forster, Peter K.. "Terrorist Innovation: Homegrown Terrorism and the Internet." In The Dangerous Landscape, 79-86., 2013.
Abrams, Elliott. Tested by Zion: The Bush Administration and the Israeli-Palestinian Conflict. Cambridge University Press, 2013.
Zimmerman, Katherine L.. "Testimony: AQAP’s Role in the al Qaeda Network: Statement before the House Committee on Homeland Security Subcommittee on Counterterrorism and Intelligence." In Understanding the Threat to the Homeland from AQAP. American Enterprise Institute for Public Policy Research (AEI), 2013.
Stavridis, James G.. Testimony before the 113th Congress, House and Senate Armed Services Committee Testimony., 2013.
Malhotra, Rahul, and Prince Jain. "Testing Techniques and its Challenges in a Cloud Computing Environment." The SIJ Transactions on Computer Science Engineering & its Applications (CSEA) 1, no. 3 (2013).
Tethered Aerostat Systems Application Note: System Assessment and Validation for Emergency Responders (SAVER). Space and Naval Warfare Systems Center Atlantic, 2013.
"Text of President Obama’s May 23 speech on national security." Washington Post (2013).
Bamford, James. They know much more than you think. The New York Review of Books, 2013.
Howcroft, James. Things Americans Need to Know: How to Be Better Partners. Small Wars Journal, 2013.
Kahneman, Daniel. Thinking, Fast and Slow. New York: Farrar, Strauss, and Giroux, 2013.
Johnson, Loch J., and Allison M. Shelton. "Thoughts on the State of Intelligence Studies: A Survey Report." Intelligence and National Security 28, no. 1 (2013).
The Threat Landscape. Kaspersky, 2013.
-Janev, Hadji. "Threats to the Critical Infrastructure in South-East Europe posed by Al Qaeda and its Associated Movements: the case of Macedonia." In Counterterrorism challenges regarding the Critical Infrastructure protection. Vol. pp. 187-201. Center for Civil - Military Relation, Monterey, USA, Ljubljana, Slovenia, , 2013.
Tigran Sargsyan expressed dissatisfaction with the position of individual members of the Collective Security Treaty Organization and the CU regarding the Karabakh conflict. ArmInfo Information Agency, 2013.
Terpstra, Jan, Bas Van Stokkom, and Ruben Spreeuwers. Toezichthouders En Handhavers in de (Semi)Publieke Ruimte-Een Internationale Vergelijking . Nijmegen, The Netherlands: Criminologisch Instituut, Radboud Universiteit Nijmegen, 2013.
Temple-Raston, Dina. The Tony Soprano of Karachi: Gangster or Politician?. NPR, 2013.
The Top 25 Facebook games Page., 2013.
Palacio, Raymundo Riva. Topos en el CISEN. Eje Central, 2013.
Bui, Lam Thu, and Van Vien Mac. Toward an agent based distillation approach for protesting crowd simulation., 2013.
Wickramarathne, Thanuka L., Kamal Premaratne, and Manohar N. Murthi. "Toward Efficient Computation of the Dempster–Shafer Belief Theoretic Conditionals." IEEE Transactions on Cybernetics 43, no. 2 (2013): 712-724.

Pages