-
1“.... The collaborative methods helped to secure the relevance of the analysis and recommendations and created room...”
Get access
Get access
Book Part -
2by Jacobsen, MarcSubjects: “...Foreign Policy Analysis...”
Published 2019
Get access
Get access
Book -
3“...This book constitutes the refereed proceedings of the 18th Nordic Conference on Secure IT Systems...”
Get access
Get access
-
4by Jacobsen, MarcSubjects: “...Discourse analysis...”
Published 2018
Get access
Get access
Other/Unknown Material -
5by Nøhr, Christian, Faxvaag, Arild, Tsai, Chen Hsi, Harðardóttir, Guðrún Auður, Hyppönen, Hannele, Andreassen, Hege Kristin, Gilstad, Heidi, Jónsson, Héðinn, Reponen, Jarmo, Kaipio, Johanna, Øvlisen, Maja Voigt, Kangas, Maarit, Bertelsen, Pernille, Koch, Sabine, Villumsen, Sidsel, Schmidt, Thomas, Vehko, Tuulikki, Vimarlund, Vivian“... This publication reports the outcomes of the fourth mandate period focusing on five tasks: 1 New analysis...”
Published 2020
Get access
Get access
Book -
6Published 1979“... Security office. Skiers plan to cross state An interest meeting for the "Ski Minnesota Epic," the cross...”
Get access
-
7by Berliner, Peter“... contextual analysis of the photos. Transparency into the step-by-step analysis is used to secure plausibility...”
Published 2012
Get access
Article in Journal/Newspaper -
8“... New Economy [Internet]. O\u2019Reilly Media; 2015. Available: https://books.google.de/books?id...”
Get access
Get access
Text -
9“... polityce zagranicznej Polski, „Myśl Ekonomiczna i Polityczna” 2019, nr 2(65). Bozkurt G.Z., Security policy...”
Get access
Book -
10by The John Muir Center for Regional Studies“..., published in 1849, a book which was re- ||sued, reprinted, expanded, and plagiarized in numerous editions...”
Published 1998
Get access
Get access
Text -
11by The John Muir Center for Regional Studies“..., published in 1849, a book which was re- ||sued, reprinted, expanded, and plagiarized in numerous editions...”
Published 1998
Get access
Get access
Text