Biblio

Export 21362 results:
2012
Perkovich, George, Malcolm Chalmers, Steven Pifer, Paul Schulte, and Jaclyn Tandler. Looking Beyond The Chicago Summit: Nuclear Weapons in Europe and the Future of NATO. Washington DC: Carnegie Endowment for International Peace, 2012.
Barrett, Richard. Love, Fear and the Destiny of Nations: The Impact of the Evolution of Human Consciousness on World Affairs. Vol. 1. Bath, UK: Fulfilling Books, 2012.
Contessi, Nicola. Mackinder Reloaded: The Emerging Role of International Security Institutions in the Global Scramble for Central Asia In Faculté des Études Supérieures et Postdoctorales. Québec: l’Université Laval, 2012.
Zieminski, Nick. Made in USA’ Label Popular in China, too: Study. Reuters, 2012.
Naím, Moisés. "Mafia States." Foreign Affairs 91, no. 3 (2012).
MAGERIT version 3: Methodology of Analysis and Risk Management Information Systems. Madrid: Ministry of Finance and Public Administration, 2012.
Kurosakatatsuya. Mail Naiyo wo Yomitoru Interest Match Kokoku ga Butsugi [Interest Match Advertisements Associated with Mail Contents Cause a Controversy]. Diamond Online, 2012.
Rhodes, Richard. The Making of the Atomic Bomb . London: Simon & Schuster, 2012.
Sanfey, Peter, and Simone Zeh. Making sense of competitiveness indicators in South-eastern Europe In EBRD Working paper. EBRD, 2012.
Gessen, Cf. Masha. The Man Without a Face: The Unlikely Rise of Vladimir Putin. New York: Riverhead, 2012.
Ivanchenko, Oleg, Vyacheslav Kharchenko, and Aleksandr Skatkov. "Management of Critical Infrastructures Based on Technical Megastate." Information & Security: An International Journal 28, no. 1 (2012): 37-51.
Khan, Omera, and Adrian Davis. "Managing Cyber and Information Risk." In 17th Annual Logistics Research Network Conference. Cranfield, UK, 2012.
Kotanjian, Hayk. "Managing Strategic Changes Through DEEP Reforms: A View from the Perspective of U.S.–Armenia “Smart Power” Cooperation." Connections: The Quarterly Journal 11, no. 4 (2012): 83-90.
Lukyanov, Fedor. "Maneuvering is the most valuable thing." Rossiskaya gazeta (2012).
Lee, I-Hsum, Ming Chih Lu, Chen-Chien Hsu, and Shih-Shiun Lin. Map Building of Unknown Environment Based on Fuzzy Sensor Fusion of Ultrasonic Ranging Data In Advances in Autonomous Robotics. TAROS 2012. Lecture Notes in Computer Science. Vol. 7429. Berlin, Heidelberg: Springer, 2012.
Schnabel, Albrecht, and Marc Krupanski. Mapping Evolving Internal Roles of the Armed Forces. Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2012.
Hernandez, Gustavo. "Marco Conceptual del Control Parlamentario de la Seguridad Nacional." In Inteligencia y Seguridad. Revista de Análisis y Prospectiva, 12. Madrid: Plaza y Valdés Editores, 2012.
Caralli, Richard, Mark Knight, and Austin Montgomery. Maturity Models 101: A Primer for Applying Maturity Models to Smart Grid Security, Resilience, and Interoperability In White paper. Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, 2012.
Greenberg, Andy. McAfee Explains the Dubious Math behind Its ‘Unscientific’ $1 Trillion Data Loss Claim. Forbes, 2012.
De Nicola, Antonio, Alberto Tofani, Giordano Vicoli, and Maria Luisa Villani. "An MDA-based Approach to Crisis and Emergency Management Modeling." International Journal on Advances in Intelligent Systems 5, no. 1 & 2 (2012): 89-100.
Niemiec, Marcin, and Andrzej R. Pach. "The Measure of Security in Quantum Cryptography." In Cryptog¬raphy,” IEEE Global Telecommunications Conference - GLOBECOM (2012)., 2012.
Measuring the Information Society 2012 . Geneva: International Telecommunications Union, 2012.
Orebiyi, TP, and AO Orebiyi. "The Media and Counter-Insurgency: An Insight into the News Agenda-Setting." Journal of Communication and Culture 3, no. 2 (2012).
Ahmed, Kawser, Sean Byrne, Peter Karari, and Olga Skarlato. "Meeting Rising Expectations of Hopes for Peace in Post Peace Accord Northern Ireland: The Role of the Good Friday Agreement and the Implication for External Economic Aid." Journal of Ethnic Studies 69 (2012): 8-35.
Lindström, Gustav. Meeting the Cyber Security Challenge. Geneva Centre for Security Policy, 2012.

Pages