Biblio

Export 21362 results:
2012
Černe, Matej, Marko Jaklic, Miha Skerlavaj, Arzu Ülgen Aydinlik, and Dilek Dönmez Polat. "Organizational learning culture and innovativeness in Turkish firms." Journal of Management and Organization 18, no. 2 (2012): 193-219.
Picarelli, John. "Osama bin Corleone? Vito the Jackal? Framing Threat Convergence through an Examination of Transnational Organized Crime and International Terrorism." Terrorism and Political Violence 24, no. 2 (2012): 180-98.
Carr, Jeffrey. OSCE’s Cyber Security Confidence Building Measures Revealed by Anonymous. Digital Dao, 2012.
Reid-Martinez, Kathaleen. "Overcoming the Challenge of Legacy Learning Methods." Connections: The Quarterly Journal 11, no. 4 (2012): 43-51.
Procházková, Dana. "Overview of Fine Exact Methods of Safety Engineering." Information & Security: An International Journal 28, no. 2 (2012): 167-178.
Dimitrov, Vladimir. "An Overview of the Department of Defense Architecture Framework (DoDAF)." Proceedings of the Sixth International Conference “Information Systems & Grid Technologies” (ISGT’2012), (2012).
Stahl, Frederic, and Ivan Jordanov. "An overview of the use of neural networks for data mining tasks." WIREs Data Mining and Knowledge Discovery 2, no. 3 (2012): 193-208.
Prasanna, S., and Srinivasa Rao. "An Overview of Wireless Sensor Networks Applications and Security." International Journal of Soft Computing and Engineering 2, no. 2 (2012): 538-540.
Overview – United States Department of Defense Fiscal Year 2013 Budget Request. Washington, D.C.: U.S. Department of Defense, 2012.
Tohidi, Faranak. Ownership Authentication by Digital Image Watermarking Based on Block Truncation Coding In Advanced Informatics School. Vol. Master of Computer Science (Information Security). Universiti Teknologi Malaysia, 2012.
Hudson, Carl. Pacific Endeavor 2012 Begins. United States Pacific Command Web Site, 2012.
Bumiller, Elisabeth, and Thom Shanker. "Panetta Warns of Dire Threat of Cyberattack on U.S." The New York Times (2012).
Hofstadter, Richard. The paranoid style in American politics. Vintage, 2012.
Braun, David Asher and. Party of Fraud: Hizballah's Criminal Enterprises. PolicyWatch 1911, 2012.
Stecher, Tina. Pathways to Regional Resilience In The Governance of Adaptation., 2012.
Ibish, Hussein. A Patronizing Narrative Pigeonholes Arabs In NOW Lebanon ., 2012.
Miller, Greg. "Pentagon Establishes Defense Clandestine Service, New Espionage Unit." Washington Post (2012).
Ismaila, W.O., Boniface Kayode Alese, Olajide Olusegun Adeosun, and OT Arulogun. Performance Evaluation of Unsupervised Neural Network in Fraud Detection., 2012.
Bechev, Dimitar. The Periphery of the Periphery: the Western Balkans and the Euro Crisis In European Council of Foreign Relations Brief., 2012.
Hennessy, Orla. The Phenomenon of Foreign Fighters in Europe. International Centre for Counter-Terrorism, 2012.
Marsh, Sarah, and Hans-Edzard Busemann. Pirates Party’s Rapid Rise Upsets German Landscape. Reuters.com, 2012.
Manyin, Mark E.. Pivot to the Pacific? The Obama Administration’s “Rebalancing” Toward Asia. Washington, D.C.: Congressional Research Service, 2012.
Barbosa, Diana, and Américo Azevedo. "A platform specification of a space project management Handbook." Procedia Technology 5 (2012): 589-598.
Daniel, Milan. Plausibility in DSmT In Belief Functions: Theory and Applications, Proceedings of the 2nd International Conference on Belief Functions. Compiègne, France, 2012.
Morwood, James. The Pocket Oxford Latin Dictionary. Oxford: Oxford University Press, 2012.

Pages