Search Result "Homeland Security"
New Techniques and Methods in Explosive Analysis
Ebook: Applications of Modern Mass Spectrometry
Volume: 1 Year: 2020
Author(s): Beril Anilanmert,Salih Cengiz
Doi: 10.2174/9789811433825120010007
Chemical Warfare Agent Degradation and Decontamination
Journal: Current Organic Chemistry
Volume: 11 Issue: 3 Year: 2007 Page: 285-298
Author(s): S. S. Talmage, A. P. Watson, V. Hauschild, N. B. Munro, J. King
The Foundations of Counterintelligence: Definition and Principles
Ebook: The Anatomy of Counterintelligence: European Perspective
Volume: 1 Year: 2016
Author(s): Gasper Hribar
Doi: 10.2174/9781681084114116010006
Crisis Management
Ebook: Redefining University Leadership for the 21st Century
Volume: 1 Year: 2018
Author(s): Christina Chow,Clement Leung
Doi: 10.2174/9781681087498118010030
Chagas Disease: A Global Health Problem
Ebook: Emerging Chagas Disease
Volume: 1 Year: 2009
Author(s): Ana Maria Castro,Marina Clare Vinaud,Antonio Teixeira
Doi: 10.2174/978160805041310901010018
Counterintelligence Operatives, Targets, Foreign Agents and Foreign Operatives
Ebook: The Anatomy of Counterintelligence: European Perspective
Volume: 1 Year: 2016
Author(s): Teodora Ivanusa,Iztok Podbregar
Doi: 10.2174/9781681084114116010008
Cognitive Radio: Primary User Emulation Attacks and Remedies
Journal: Recent Patents on Computer Science
Volume: 5 Issue: 2 Year: 2012 Page: 103-108
Author(s): Sachin Shetty,Meena Thanu,Ravi Ramachandran
Family, School, and Transition: Importance of Family Support in this Process
Ebook: Thriving Across the Lifespan and Around the Globe: Day in the Life Visual Research Approach
Volume: 1 Year: 2021
Author(s): Roseli Fernandes Caldas,Bruno Bertoni Giusti Roque
Doi: 10.2174/9781681088808121010009
The Anatomy of Counterintelligence: The Origins of European Perspective
Ebook: The Anatomy of Counterintelligence: European Perspective
Volume: 1 Year: 2016
Author(s): Janez Zirovnik,Iztok Podbregar
Doi: 10.2174/9781681084114116010005
Biometrics and Privacy
Journal: Recent Patents on Computer Science
Volume: 1 Issue: 2 Year: 2008 Page: 98-109
Author(s): Stelvio Cimato, Roberto Sassi, Fabio Scotti