Intermediate Financial Accounting
Glenn Arnold & Suzanne Kyle
Orthotics and Prosthetics in Rehabilitation
Kevin C. Chui & Sheng-Che Yen & Michelle M. Lusardi & Milagros Jorge
Nuclear Weapons Law
William H. Boothby & Wolff Heintschel von Heinegg
Diagnostic Radiology Physics: A Handbook for Teachers and Students
IAEA
Securing the AI Enterprise: DevOps, MLOps, and MLSecOps Explained
Edgardo Fernandez Climent
The Artificial Intelligence Handbook for Graphic Designers: ...
Jeroen Erne
The Creation and Management of Database Systems
Adele Kuzmiakova
Thinking Programs Logical Modeling and Reasoning About Languages, ...
Wolfgang Schreiner
TRIVERGENCE: Accelerating Innovation with AI, Blockchain, and ...
Bob Tapscott
AI Powered Financial Analysis: Harnessing Artificial Intelligence ...
Reactive Publishing & Hayden Van Der Post
American Foreign Policy and National Security
Paul Viotti
At Cold Wars End US Intelligence on the Soviet Union and Eastern ...
Unknown
Boko Haram: Islamism, politics, security and the state in Nigeria
Marc-Antoine Pérouse de Montclos
Chinese International Relations Theory
Jonathan Ping & Anna Hayes & Brett McCormick
Constitutional Law and Politics
David M. O'Brien
Cognitive Bias in Intelligence Analysis
Martha Whitesmith
Cognitive Bias in Intelligence Analysis Testing the Analysis ...
Conflict Coaching Fundamentals
Samantha Hardy
Conflict of Interest
Jackson Banks
Countering Violent Extremism and Terrorism
Stéfanie Von Hlatky
Counter-terrorism and civil society: Post-9/ 11 progress and ...
Scott N. Romaniuk and Emeka Thaddues Njoku
Counter-Terrorism Financing and Iran
Zeynab Malakouti Khah
Criminology of a Character
Nicole Scarano
Criminal Justice Today
Frank Schmalleger
Critical Infrastructure Protection in Homeland Security
Theodore Gyle Lewis
Cyber Security and Cyber Laws
dept
Cyber Security Digital Forensics (Cyber Security Series 2)
Mark Hayward
Data Science With Rust: A Comprehensive Guide - Data Analysis, ...
Hayden Van Der Post
Data Virtualization in the Cloud Era (for I I)
Daniel Abadi & Andrew Mott
Democratic Elitism
Natasha Piano
Cyber Intelligence Report
Nitin Sharma & Richard Medlin & Justin Casey
Does Counter-Terrorism Work (Richard English)
Emerging Trends in Conflict Management. Volume II Track III ...
Ethical Cyber Security Handbook for Home Users: Cyber Security ...
Ezra Sombrío
Fencing in Democracy Border Walls, Necrocitizenship, and the ...
Miguel Díaz-Barriga and Margaret E. Dorsey
Final Report - National Security Commission on Artificial Intelligence
Foreign Policy and Security Strategy
PAUL S CHULTE
Martin Wight
Gender Violence and the Transnational Politics of the Honor ...
Dana M. Olwan
Green and Transnational Crime in Europe and Beyond
Joanna Beata Banach-Gutierrez & Klaus von Lampe & Paul Larsson & Jackie Harvey & Petrus C. van Duyne & Georgios A. Antonopoulos
Handbook of Military Sciences
Anders McD Sookermany, Harald Høiback
Hybrid Conflicts and Information Warfare
Ofer Fridman & Vitaly Kabernik & James C. Pearce
India's Strategic Culture
Shrikant Paranjpe
Industrial Policy, National Security, and the Perilous Plight ...
Petros C. Mavroidis
Inside Cyber Warfare
Jeffrey Carr
Intelligence Agencies, Technology and Knowledge Production
Rüdiger Bergien & Debora Gerstenberger & Constantin Goschler
Intelligence Analysis
John Michael Weaver
Intelligence Analysis in the Digital Age
Stig Stenslie & Lars Haugom & Brigt H. Vaage
International Relations
PW ONLY IAS
Lithuania in the global context National security and defence ...
Negotiating with the Devil
Pierre Hazan
Oracle Database Programming with Java
Ying Bai
The Oxford Handbook of Behavioral Political Science
Alex Mintz & Lesley G. Terris
Persuasive technologies in China: implications for the future ...
ASPI & Daria Impiombato & Dr Nathan Attrill & Albert Zhang & Fergus Ryan & Bethany Allen
Proceedings
Kristijan Krkač & Borna Jalšenjak and Boris Debić
Psychology of Intelligence Analysis (3G Editorial Board)
Python For Effect: Master Data Visualization and Analysis: Learn ...
Tomasz Trebacz
Religious Parties and the Politics of Civil Liberties
Vineeta Yadav
Research Methods in Critical Security Studies: An Introduction; ...
Edited by Mark B. Salter & Can E. Mutlu and Philippe M. Frowd
Rural Violence in Contemporary Nigeria
Usman A. Tar & Bashir Bala
Russian Information Warfare
Bilyana Lilly
Secret History
Simon Ball
Securing Borders, Securing Power
Mike Slaven
Security in Nigeria
Caroline Varin & Freedom Onuoha