10 PRINT CHR$(205.5+RND(1)); : GOTO 10
|
2013
|
The 2008 Battle of Sadr City: Reimagining Urban Combat
|
2013
|
21st Century Chinese Cyberwarfare
|
2012
|
50 Top IT Project Management Challenges
|
2012
|
9 to 5: Do You Know If Your Boss Knows Where You Are? Case Studies of Radio Frequency Identification Usage in the Workplace
|
2005
|
Above the Clouds: Managing Risk in the World of Cloud Computing
|
2010
|
Access Contested: Security, Identity, and Resistance in Asian Cyberspace
|
2012
|
Achieving Higher-Fidelity Conjunction Analyses Using Cryptography to Improve Information Sharing
|
2014
|
Adapting to a Changing Colorado River: Making Future Water Deliveries More Reliable Through Robust Management Strategies
|
2013
|
Addiction by Design: Machine Gambling in Las Vegas
|
2012
|
Aepinus's Essay on the Theory of Electricity and Magnetism
|
1979
|
After Saddam: Prewar Planning and the Occupation of Iraq
|
2008
|
After the War: Nation-Building from FDR to George W. Bush
|
2008
|
The Age of Smoke: Environmental Policy in Germany and the United States, 1880-1970
|
2009
|
Agent_Zero: Toward Neurocognitive Foundations for Generative Social Science
|
2013
|
Agile: An Executive Guide: Real results from IT budgets
|
2011
|
Agile Governance and Audit: An overview for auditors and agile teams
|
2014
|
Agile Principles Unleashed: Proven approaches for achieving real productivity gains in any organisation
|
2010
|
Agile Productivity Unleashed: Proven approaches for achieving productivity gains in any organisation
|
2014
|
Agile Productivity Unleashed: Proven approaches for achieving real productivity gains in any organization
|
2010
|
Agile SAP: Introducing flexibility, transparency and speed to SAP implementations
|
2013
|
Agrarian Dreams: The Paradox of Organic Farming in California
|
2004
|
Agrarian Dreams: The Paradox of Organic Farming in California
|
2014
|
Agrarianism and the Good Society: Land, Culture, Conflict, and Hope
|
2007
|
Agricultural Cooperation: Selected Readings
|
1963
|
Air Attack Against Wildfires: Understanding U.S. Forest Service Requirements for Large Aircraft
|
2012
|
Air Force Major Defense Acquisition Program Cost Growth Is Driven by Three Space Programs and the F-35A: Fiscal Year 2013 President's Budget Selected Acquisition Reports
|
2014
|
Aircraft Dynamics and Automatic Control
|
1973
|
Allocating Marine Expeditionary Unit Equipment and Personnel to Minimize Shortfalls: Second Edition
|
2013
|
An Alternative Internet: Radical Media, Politics and Creativity
|
2004
|
American Biodefense: How Dangerous Ideas about Biological Weapons Shape National Security
|
2014
|
American Carrier Air Power at the Dawn of a New Century
|
2005
|
American Georgics: Writings on Farming, Culture, and the Land
|
2011
|
America's Food: What You Don't Know About What You Eat
|
2008
|
Analyses of the Department of Defense Acquisition Workforce: Update to Methods and Results through FY 2011
|
2013
|
Annotated Bibliography of Films in Automation, Data Processing, and Computer Science
|
1967
|
The App Generation: How Today's Youth Navigate Identity, Intimacy, and Imagination in a Digital World
|
2013
|
Application security in the ISO27001 Environment
|
2008
|
Archaeology in the Digital Era: Papers from the 40th Annual Conference of Computer Applications and Quantitative Methods in Archaeology (CAA), Southampton, 26-29 March 2012
|
2013
|
The Archaeology of Class War: The Colorado Coalfield Strike of 1913-1914
|
2009
|
Archaeometallurgy in Mesoamerica: Current Approaches and New Perspectives
|
2013
|
Are U.S. Military Interventions Contagious over Time?: Intervention Timing and Its Implications for Force Planning
|
2013
|
Armed and Dangerous?: UAVs and U.S. Security
|
2014
|
Arms and Influence
|
1966
|
Arms Transfers under Nixon: A Policy Analysis
|
1983
|
The Army's Role in Overcoming Anti-Access and Area Denial Challenges
|
2013
|
The Art of Insight in Science and Engineering: Mastering Complexity
|
2014
|
The Art of Managing Longleaf: A Personal History of the Stoddard-Neel Approach
|
2010
|
The Artificial Ear: Cochlear Implants and the Culture of Deafness
|
2010
|
Asbestos and Fire: Technological Tradeoffs and the Body at Risk
|
2005
|
Asia's Space Race: National Motivations, Regional Rivalries, and International Risks
|
2012
|
Assessing Aegis Program Transition to an Open-Architecture Model
|
2013
|
Assessing Freedom of Movement for Counterinsurgency Campaigns
|
2012
|
Assessing Information Security: Strategies, Tactics, Logic and Framework
|
2010
|
Assessing Information Security: Strategies, Tactics, Logic and Framewortk
|
2014
|
Assessing Irregular Warfare: A Framework for Intelligence Analysis
|
2008
|
Assessing IT Projects to Ensure Successful Outcomes
|
2015
|
Assessing Locally Focused Stability Operations
|
2014
|
Assessing the Tradecraft of Intelligence Analysis
|
2008
|
Assessment of Beddown Alternatives for the F-35: Executive Summary
|
2013
|
Assessment of Beddown Alternatives for the F-35
|
2013
|
Assessment of Joint Improvised Explosive Device Defeat Organization (JIEDDO) Training Activity
|
2013
|
An Assessment of Program Sustainability in Three Bureau of Justice Assistance Criminal Justice Domains
|
2014
|
An Assessment of the Ability of the U.S. Department of Defense and the Services to Measure and Track Language and Culture Training and Capabilities Among General Purpose Forces
|
2012
|
Assessment of the AHRQ Patient Safety Initiative: Focus on Implementation and Dissemination Evaluation Report III (2004–2005)
|
2007
|
An Assessment of the Assignments and Arrangements of the Executive Agent for DoD Biometrics and Status Report on the DoD Biometrics Enterprise
|
2012
|
Atlantic Automobilism: Emergence and Persistence of the Car, 1895-1940
|
2015
|
Authority to Issue Interoperability Policy
|
2014
|
Auto Mania: Cars, Consumers, and the Environment
|
2007
|
Autoaffection: Unconscious Thought in the Age of_x000B_Technology
|
2000
|
Autonomous Vehicle Technology: A Guide for Policymakers
|
2014
|
Availability and Capacity Management in the Cloud: An ITSM Narrative Account
|
2014
|
Balancing Agile Combat Support Manpower to Better Meet the Future Security Environment
|
2014
|
Balancing on a Planet: The Future of Food and Agriculture
|
2014
|
Balsam Fir: A Monographic Review
|
1965
|
Barriers to Bioweapons: The Challenges of Expertise and Organization for Weapons Development
|
2014
|
Becoming MIT: Moments of Decision
|
2010
|
Bees in America: How the Honey Bee Shaped a Nation
|
2005
|
Before Silent Spring: Pesticides and Public Health in Pre-DDT America
|
1974
|
Being Nuclear: Africans and the Global Uranium Trade
|
2012
|
The Best Technology Writing 2009
|
2009
|
A Better Way to Build: A History of the Pankow Companies
|
2013
|
Beyond Imported Magic: Essays on Science, Technology, and Society in Latin America
|
2014
|
Beyond the Big Ditch: Politics, Ecology, and Infrastructure at the Panama Canal
|
2014
|
Big Coal: Australia's Dirtiest Habit
|
2013
|
BIOBAZAAR
|
2008
|
Biomolecular Feedback Systems
|
2015
|
Bioterrorism Preparedness Training and Assessment Exercises for Local Public Health Agencies
|
2005
|
Blue Skies: A History of Cable Television
|
2008
|
Blue-Collar Stratification: Autoworkers in Four Countries
|
1976
|
Bodies of Tomorrow: Technology, Subjectivity, Science Fiction
|
2007
|
Brandishing Cyberattack Capabilities
|
2013
|
Breaking the Addiction to Process: An Introduction to Agile Project Management
|
2011
|
Breathing Race into the Machine: The Surprising Career of the Spirometer from Plantation to Genetics
|
2014
|
Bridging the Gap: Prototype Tools to Support Local Disaster Preparedness Planning and Collaboration
|
2012
|
British Rearmament in the Thirties: Politics and Profits
|
1977
|
The Broadband Problem: Anatomy of a Market Failure and a Policy Dilemma
|
2004
|
Build a Security Culture
|
2015
|
Building Better Homes: Government Strategies for Promoting Innovation in Housing
|
2003
|
Building Security in the Persian Gulf
|
2010
|
Building Toward an Unmanned Aircraft System Training Strategy
|
2014
|
Burdens of Proof: Cryptographic Culture and Evidence Law in the Age of Electronic Documents
|
2012
|
Business Continuity Management: Choosing to Survive
|
2012
|
Byting BackA-Regaining Information Superiority Against 21st-Century Insurgents: RAND Counterinsurgency StudyA-Volume 1
|
2007
|
C. Francis Jenkins, Pioneer of Film and Television
|
2014
|
California Cuisine and Just Food
|
2012
|
Camp Colt to Desert Storm: The History of U.S. Armored Forces
|
1999
|
Canada's Forests: A History
|
2003
|
Canadian Woods: Their Properties and Uses
|
1981
|
Capabilities-Based Planning for Energy Security at Department of Defense Installations
|
2013
|
Car Crashes without Cars: Lessons about Simulation Technology and Organizational Change from Automotive Design
|
2012
|
The Case for ISO27001:2013
|
2013
|
Case Studies of Existing Human Tissue Repositories: "Best Practices" for a Biospecimen Resource for the Genomic and Proteomic Era
|
2003
|
Cash For Your Trash: Scrap Recycling in America
|
2005
|
The Cassava Transformation: Africa's Best-Kept Secret
|
2002
|
Catalogs, Services and Portfolios: An ITSM success story
|
2014
|
Centrality of Agriculture: Between Humankind and the Rest of Nature
|
1996
|
Challenge of Arctic Shipping: Science, Environmental Assessment, and Human Values
|
1990
|
The Challenge of Domestic Intelligence in a Free Society: A Multidisciplinary Look at the Creation of a U.S. Domestic Counterterrorism Intelligence Agency
|
2009
|
The Challenge of Violent Drug-Trafficking Organizations: An Assessment of Mexican Security Based on Existing RAND Research on Urban Unrest, Insurgency, and Defense-Sector Reform
|
2011
|
Challenges and Choices for Crime-Fighting Technology Federal Support of State and Local Law Enforcement
|
2001
|
Challenges in Virtual Collaboration: Videoconferencing, Audioconferencing, and Computer-Mediated Communications
|
2004
|
Changing the Army's Weapon Training Strategies to Meet Operational Requirements More Efficiently and Effectively
|
2014
|
Changing the IT Leader's Mindset: Time for revolution rather than evolution
|
2010
|
Characterization of the Electrical Environment
|
1976
|
Charting the Course for a New Air Force Inspection System
|
2013
|
Cheap Wage Labour: Race and Gender in the Fisheries of British Columbia
|
1996
|
Chicago River Bridges
|
2013
|
Chicken: The Dangerous Transformation of America’s Favorite Food
|
2005
|
The Chief Information Security Officer: Insights, tools and survival skills
|
2011
|
China in 2020: A New Type of Superpower
|
2011
|
Cinematic Appeals: The Experience of New Movie Technologies
|
2013
|
Citizenship and Participation in the Information Age
|
2002
|
The Civic Web: Young People, the Internet, and Civic Participation
|
2013
|
Clio Wired: The Future of the Past in the Digital Age
|
2011
|
Cloning: A Biologist Reports
|
1979
|
Cloud Computing: Assessing the risks
|
2012
|
Cloud Security and Governance: Who's on your cloud?
|
2010
|
The Cloud: Understanding the Security, Privacy and Trust Challenges
|
2011
|
Code/Space: Software and Everyday Life
|
2011
|
Coding Freedom: The Ethics and Aesthetics of Hacking
|
2013
|
The Color Revolution
|
2012
|
The Columbia Guide to Online Style: Second Edition
|
2006
|
Commercial Intratheater Airlift: Cost-Effectiveness Analysis of Use in U.S. Central Command
|
2013
|
A Common Operating Picture for Air Force Materiel Sustainment: First Steps
|
2008
|
Competition and Chaos: U.S. Telecommunications since the 1996 Telecom Act
|
2005
|
Competition and Innovation in the U.S. Fixed-Wing Military Aircraft Industry
|
2003
|
Compliance by Design: IT controls that work
|
2011
|
The Computer and the Brain
|
1986
|
The Computer Boys Take Over: Computers, Programmers, and the Politics of Technical Expertise
|
2010
|
Computer Forensics: A Pocket Guide
|
2010
|
The Concise PRINCE2®: A Pocket Guide
|
2013
|
CONFLUENCE
|
2011
|
Confronting Space Debris: Strategies and Warnings from Comparable Examples Including Deepwater Horizon
|
2010
|
Connected Code: Why Children Need to Learn Programming
|
2014
|
Connected, or What It Means to Live in the Network Society
|
2003
|
Connecting Democracy: Online Consultation and the Flow of Political Communication
|
2012
|
Conserving Southern Longleaf: Herbert Stoddard and the Rise of Ecological Land Management
|
2011
|
Constructing Green: The Social Structures of Sustainability
|
2013
|
Contested Water: The Struggle Against Water Privatization in the United States and Canada
|
2013
|
Continentalizing Canadian Telecommunications: The Politics of Regulatory Reform
|
2003
|
Contrast-Enhanced Clinical Magnetic Resonance Imaging
|
1997
|
Controles estratégicos y operacionales de la TI
|
2013
|
Cosmopolitan Commons: Sharing Resources and Risks across Borders
|
2013
|
Costs of Flying Units in Air Force Active and Reserve Components
|
2013
|
Cotton Fields No More: Southern Agriculture, 1865-1980
|
1984
|
Count Not the Dead: The Popular Image of the German Submarine
|
1995
|
Counterinsurgency in Afghanistan: RAND Counterinsurgency Study--Volume 4
|
2008
|
Counterinsurgency Scorecard: Afghanistan in Early 2011 Relative to the Insurgencies of the Past 30 Years
|
2011
|
Counterinsurgency Scorecard: Afghanistan in Early 2013 Relative to Insurgencies Since World War II
|
2013
|
Cream of the Crop: Canadian Aircrew, 1939-1945
|
1996
|
Creating Wine: The Emergence of a World Industry, 1840-1914
|
2011
|
Crisis and Escalation in Cyberspace
|
2012
|
THE CRISIS IN ENERGY POLICY
|
2011
|
Crisis Stability and Long-Range Strike: A Comparative Analysis of Fighters, Bombers, and Missiles
|
2013
|
Crowded Orbits: Conflict and Cooperation in Space
|
2014
|
Crowdsourcing
|
2013
|
Cruise Missile Penaid Nonproliferation: Hindering the Spread of Countermeasures Against Cruise Missile Defenses
|
2014
|
Cuba After Castro: Legacies, Challenges, and Impediments
|
2004
|
Cuba's Energy Future: Strategic Approaches to Cooperation
|
2010
|
THE CULTURAL LOGIC OF COMPUTATION
|
2009
|
The Culture of Print: Power and the Uses of Print in Early Modern Europe
|
1989
|
The Cutting Edge: A Half Century of U.S. Fighter Aircraft R&D
|
1998
|
Cyber Essentials: A Pocket Guide
|
2014
|
Cyber Risks for Business Professionals: A Management Guide
|
2010
|
Cyberdeterrence and Cyberwar
|
2009
|
Cybering Democracy: Public Space and the Internet
|
2002
|
Cyberliteracy: Navigating the Internet with Awareness
|
2001
|
Cybernetic Revolutionaries: Technology and Politics in Allende's Chile
|
2011
|
Cyberpolitics in International Relations
|
2012
|
Cyberspaces of Everyday Life
|
2006
|
CyberWar, CyberTerror, CyberCrime: A Guide to the Role of Standards in an Environment of Change and Danger
|
2008
|
Cyberwar, Cyberterror, Cybercrime & Cyberactivism (2nd Edition): An in-depth guide to the role of standards in the cybersecurity environment
|
2014
|
A Cyberworm that Knows No Boundaries
|
2011
|
Dancing with the River: People and Life on the Chars of South Asia
|
2013
|
Dark Writing: Geography, Performance, Design
|
2009
|
Darwinian Agriculture: How Understanding Evolution Can Improve Agriculture
|
2012
|
The Data Governance Imperative
|
2009
|
Data Protection and the Cloud: Are the risks too great?
|
2015
|
Data Protection Compliance in the UK: A Pocket Guide
|
2010
|
Data Protection vs. Freedom of Information: Access and Personal Data
|
2008
|
The Defender’s Dilemma: Charting a Course Toward Cybersecurity
|
2015
|
The Definitive Guide to IT Service Metrics
|
2012
|
The Definitive Guide to the C&A Transformation Process: The First Publication of a Comprehensive View of the C&A Transformation
|
2009
|
Delete: The Virtue of Forgetting in the Digital Age
|
2009
|
A Delicate Balance: Portfolio Analysis and Management for Intelligence Information Dissemination Programs
|
2009
|
Deployment Experiences of Guard and Reserve Families: Implications for Support and Retention
|
2008
|
The Deployment Life Study: Methodological Overview and Baseline Sample Description
|
2014
|
Designing a System for Collecting Policy-Relevant Data for the Kurdistan Region—Iraq
|
2014
|
Deterrence—From Cold War to Long War: Lessons from Six Decades of RAND Research
|
2008
|
Developing Navy Capability to Recover Forces in Chemical, Biological, and Radiological Hazard Environments
|
2013
|
Developing Robust Strategies for Climate Change and Other Risks: A Water Utility Framework
|
2014
|
Developing Senior Navy Leaders: Requirements for Flag Officer Expertise Today and in the Future
|
2008
|
Development of a Model for the Validation of Work Relative Value Units for the Medicare Physician Fee Schedule
|
2015
|
The Diffusion and Value of Healthcare Information Technology
|
2005
|
The Diffusion of Military Power: Causes and Consequences for International Politics
|
2010
|
Digital Apollo: Human and Machine in Spaceflight
|
2008
|
Digital Critical Editions
|
2014
|
Digital Dead End: Fighting for Social Justice in the Information Age
|
2011
|
Digital Depression: Information Technology and Economic Crisis
|
2014
|
Digital Dice: Computational Solutions to Practical Probability Problems
|
2008
|
Digital Dice: Computational Solutions to Practical Probability Problems
|
2008
|
Digital Ethnography: Anthropology, Narrative, and New Media
|
2013
|
Digital Evidence and the U.S. Criminal Justice System: Identifying Technology and Other Needs to More Effectively Acquire and Utilize Digital Evidence
|
2015
|
Digital Formations: IT and New Architectures in the Global Realm
|
2005
|
Digital Government: Technology and Public Sector Performance
|
2005
|
Digital Humanities Pedagogy: Practices, Principles and Politics
|
2012
|
Digital Medicine: Health Care in the Internet Era
|
2009
|
Digital Methods
|
2013
|
Digital Play: The Interaction of Technology, Culture, and Marketing
|
2003
|
The Digital Public Domain: Foundations for an Open Culture
|
2012
|
The Digital Rights Movement: The Role of Technology in Subverting Digital Copyright
|
2012
|
Digital Schools: How Technology Can Transform Education
|
2012
|
Digital Sensations: Space, Identity, and Embodiment in Virtual Reality
|
1999
|
Digital State: The Story of Minnesota's Computing Industry
|
2013
|
Digitally Enabled Social Change: Activism in the Internet Age
|
2011
|
Disaster Recovery and Business Continuity 3rd edition: A Quick Guide for Small Organizations and Busy Executives
|
2014
|
Disaster Recovery and Business Continuity: A Quick Guide for Small Organizations and Busy Executives
|
2008
|
Disaster Recovery Project Management: Bringing Order from Chaos
|
2011
|
The Discipline of Organizing
|
2013
|
Disconnected: Youth, New Media, and the Ethics Gap
|
2014
|
Discourses on Social Software
|
2009
|
Disrupting Science: Social Movements, American Scientists, and the Politics of the Military, 1945-1975
|
2008
|
Distributed Algorithms on Graphs
|
1986
|
Distributed Control of Robotic Networks: A Mathematical Approach to Motion Coordination Algorithms
|
2009
|
Do Joint Fighter Programs Save Money?
|
2013
|
Do Joint Fighter Programs Save Money?: Technical Appendixes on Methodology
|
2013
|
DoD and Commercial Advanced Waveform Developments and Programs with Multiple Nunn-McCurdy Breaches, Volume 5
|
2014
|
Down to Earth: Satellite Technologies, Industries, and Cultures
|
2012
|
The Dynamic Terrorist Threat: An Assessment of Group Motivations and Capabilities in a Changing World
|
2004
|
Early American Technology: Making and Doing Things From the Colonial Era to 1850
|
1994
|
E-Discovery and the Federal Rules of Civil Procedures
|
2007
|
The Effectiveness of Remotely Piloted Aircraft in a Permissive Hunter-Killer Scenario
|
2014
|
Effects of Military Service on Earnings and Education Revisited: Variation by Service Duration, Occupation, and Civilian Unemployment
|
2014
|
eGirls, eCitizens: Putting Technology, Theory and Policy into Dialogue with Girls’ and Young Women’s Voices
|
2015
|
El poder de la carne
|
2008
|
Electric Sounds: Technological Change and the Rise of Corporate Mass Media
|
2007
|
Electricity Requirements for a Digital Society
|
2002
|
Electronic Elections: The Perils and Promises of Digital Democracy
|
2008
|
The Electronic Eye: The Rise of Surveillance Society
|
1994
|
The Electronic Silk Road: How the Web Binds the World Together in Commerce
|
2013
|
Electronic Tribes
|
2008
|
Email Security: A Pocket Guide
|
2010
|
Embracing the Fog of War: Assessment and Metrics in Counterinsurgency
|
2012
|
Emerging Trends in China's Development of Unmanned Systems
|
2015
|
The Empire of Mind: Digital Piracy and the Anti-Capitalist Movement
|
2005
|
Empire of the Air
|
2013
|
Employer Partnership Program Analysis of Alternatives
|
2012
|
Employing Land-Based Anti-Ship Missiles in the Western Pacific
|
2013
|
Enabling Early Sustainment Decisions: Application to F-35 Depot-Level Maintenance
|
2013
|
The Enchantments of Technology
|
2005
|
The End of the Soul: Scientific Modernity, Atheism, and Anthropology in France
|
2003
|
Ending the U.S. War in Iraq: The Final Transition, Operational Maneuver, and Disestablishment of United States Forces-Iraq
|
2013
|
Energy and Security in the Industrializing World
|
1990
|
Energy and the National Defense
|
1981
|
Energy Capitals: Local Impact, Global Influence
|
2014
|
Energy Services Analysis: An Alternative Approach for Identifying Opportunities to Reduce Emissions of Greenhouse Gases
|
2012
|
The Engine of Complexity: Evolution as Computation
|
2013
|
Engineering and Social Justice: In the University and Beyond
|
2012
|
Engineering in American Society: 1850--1875
|
1969
|
Engineering in Pre-College Settings: Synthesizing Research, Policy, and Practices
|
2014
|
Engineering Nature: Water, Development, and the Global Spread of American Environmental Expertise
|
2011
|
Engineering Philadelphia: The Sellers Family and the Industrial Metropolis
|
2013
|
Enhanced Army Airborne Forces: A New Joint Operational Capability
|
2014
|
The Enlightenment Cyborg: A History of Communications and Control in the Human Machine, 1660-1830
|
2007
|
Entangled Geographies: Empire and Technopolitics in the Global Cold War
|
2011
|
Enterprise Architecture: A Pocket Guide
|
2009
|
Environmental Pollution Studies
|
1999
|
Environmental Safety of Genetically Engineered Crops
|
2011
|
Essays on the Early History of Plant Pathology and Mycology in Canada
|
1994
|
The Essential Agrarian Reader: The Future of Culture, Community, and the Land
|
2003
|
Estimating the Value of Water-Use Efficiency in the Intermountain West
|
2008
|
Europe's Role in Nation-Building: From the Balkans to the Congo
|
2008
|
Evaluating Novel Threats to the Homeland: Unmanned Aerial Vehicles and Cruise Missiles
|
2008
|
Evaluation of National Institute of Justice–Funded Geospatial Software Tools: Technical and Utility Assessments to Improve Tool Development, Dissemination, and Usage
|
2014
|
Every Twelve Seconds: Industrialized Slaughter and the Politics of Sight
|
2011
|
Everyday Information: The Evolution of Information Seeking in America
|
2011
|
Everyone a Leader: A Guide to Leading High-Performance Organizations for Engineers and Scientists
|
2013
|
Everything you want to know about Agile: How to get Agile results in a less-than-agile organization
|
2012
|
Everything you want to know about Business Continuity
|
2012
|
Evocative Objects: Things We Think With
|
2007
|
Evolution: What the Fossils Say and Why It Matters
|
2007
|
An Evolutionary Model of Industry Transformation and the Political Sustainability of Emission Control Policies
|
2013
|
An Excel Tool to Assess Acquisition Program Risk
|
2013
|
An Executive Perspective on Workforce Planning
|
2004
|
Expanding the Envelope: Flight Research at NACA and NASA
|
2001
|
Expendable Missiles vs. Reusable Platform Costs and Historical Data
|
2012
|
Exploding the Myths Surrounding ISO9000: A practical implementation guide
|
2013
|
Exploring Agrodiversity
|
2001
|
Exploring Information Superiority: A Methodology for Measuring the Quality of Information and Its Impact on Shared Awareness
|
2004
|
Fabricating History: English Writers on the French Revolution
|
1988
|
Facilitating Information Sharing Across the International Space Community: Lessons from Behavioral Science
|
2013
|
Factories in the Field: The Story of Migratory Farm Labor in California
|
1999
|
Falling Behind?: Boom, Bust, and the Global Race for Scientific Talent
|
2014
|
Federal Financial Incentives to Induce Early Experience Producing Unconventional Liquid Fuels
|
2008
|
Feeding the World: An Economic History of Agriculture, 1800-2000
|
2005
|
Fighting Traffic: The Dawn of the Motor Age in the American City
|
2008
|
Finding Candidate Options for Investment: From Building Blocks to Composite Options and Preliminary Screening
|
2008
|
First Steps Toward Improving DoD STEM Workforce Diversity: Response to the 2012 Department of Defense STEM Diversity Summit
|
2013
|
Fishing Places, Fishing People: Traditions and Issues in Canadian Small-Scale Fisheries
|
1999
|
Five Days in August: How World War II Became a Nuclear War
|
2007
|
Fixing the Sky: The Checkered History of Weather and Climate Control
|
2010
|
Flash: Building the Interactive Web
|
2014
|
Folklore and the Internet: Vernacular Expression in a Digital World
|
2009
|
Food and Drug Legislation in the New Deal
|
1970
|
Food and Everyday Life on Kentucky Family Farms, 1920-1950
|
2006
|
Forecast for Japan: Security in the 1970's
|
1972
|
Fortifying China: The Struggle to Build a Modern Defense Economy
|
2009
|
Fostering Innovation in Community and Institutional Corrections: Identifying High-Priority Technology and Other Needs for the U.S. Corrections Sector
|
2015
|
Fostering Innovation in the U.S. Court System: Identifying High-Priority Technology and Other Needs for Improving Court Operations and Outcomes
|
2016
|
Foundation for Integrating Employee Health Activities for Active Duty Personnel in the Department of Defense
|
2009
|
Foundations of Machine Learning
|
2012
|
France's War in Mali: Lessons for an Expeditionary Army
|
2014
|
Freedom and Information: Assessing Publicly Available Data Regarding U.S. Transportation Infrastructure Security
|
2006
|
French Inventions of the Eighteenth Century
|
1952
|
From A to: Keywords of Markup
|
2010
|
From Betamax to Blockbuster: Video Stores and the Invention of Movies on Video
|
2008
|
From Flood Control to Integrated Water Resource Management: Lessons for the Gulf Coast from Flooding in Other Places in the Last Sixty Years
|
2006
|
From Insurgency to Stability: Volume I: Key Capabilities and Practices
|
2011
|
From Insurgency to Stability: Volume II: Insights from Selected Case Studies
|
2011
|
From Outpost to Outport: A Structural Analysis of the Jersey-Gaspé Cod Fishery, 1767-1886
|
1991
|
From 'Stone-Age' to 'Real-Time': Exploring Papuan Temporalities, Mobilities and Religiosities
|
2015
|
From the Cradle to the Coalmine: The Story of Children in Welsh Mines
|
2014
|
From the Farm to the Table: What All Americans Need to Know about Agriculture
|
2006
|
The Future of Driving in Developing Countries
|
2014
|
The Future of Fossil Fuels: From "Hubbert's Peak"
|
2001
|
The Future of Genetically Modified Crops: Lessons from the Green Revolution
|
2004
|
The Future of Mobility: Scenarios for the United States in 2030
|
2013
|
The Future of Mobility: Scenarios for the United States in 2030, Appendixes C–G
|
2013
|
The Future of the Citizen-Soldier Force: Issues and Answers
|
1994
|
Future U.S. Security Relationships with Iraq and Afghanistan: U.S. Air Force Roles
|
2008
|
Gambling on Ore: The Nature of Metal Mining in the United States, 1860–1910
|
2013
|
The Gameful World: Approaches, Issues, Applications
|
2014
|
Gameworld Interfaces
|
2013
|
Gaming the System: Designing with Gamestar Mechanic
|
2014
|
Gene Banks and the World's Food
|
1987
|
General Military Training: Standardization and Reduction Options
|
2012
|
Genetic Improvement of Crops: Emergent Techniques
|
1980
|
The Geopolitics Of Super Power
|
1988
|
German Rearmament and the West, 1932-1933
|
1979
|
Getting on the Same Page: Identifying Goals for Technology Use in Early Childhood Education
|
2014
|
Global Analysis: Papers in Honor of K. Kodaira (PMS-29)
|
1969
|
Global "Body Shopping": An Indian Labor System in the Information Technology Industry
|
2007
|
The Global Course of the Information Revolution: Recurring Themes and Regional Variations
|
2003
|
Global Population: History, Geopolitics, and Life on Earth
|
2014
|
The Global Technology Revolution 2020, In-Depth Analyses: Bio/Nano/Materials/Information Trends, Drivers, Barriers, and Social Implications
|
2006
|
The Global Technology Revolution: Bio/Nano/Materials Trends and Their Synergies with Information Technology by 2015
|
2001
|
Going Global?: U.S. Government Policy and the Defense Aerospace Industry
|
2002
|
Going Mobile: How Wireless Technology is Reshaping Our Lives
|
2015
|
Gold Rush Diary: Being the Journal of Elisha Douglas Perkins on the Overland Trail in the Spring and Summer of 1849
|
1967
|
The Golden Ticket: P, NP, and the Search for the Impossible
|
2013
|
Good Faith Collaboration: The Culture of Wikipedia
|
2010
|
Google's PageRank and Beyond: The Science of Search Engine Rankings
|
2006
|
Governance and Internal Controls for Cutting Edge IT
|
2013
|
Governance of Enterprise IT based on COBIT®5: A Management Guide
|
2013
|
The Governance of Green IT: The Role of Processes in Reducing Data Center Energy Requirements
|
2008
|
Grace Hopper and the Invention of the Information Age
|
2009
|
Grain Storage: The Role of Fungi in Quality Loss
|
1969
|
The Great Indian Phone Book
|
2013
|
The Great Kanawha Navigation
|
2000
|
Great Lakes Fisheries Policy and Management: A Binational Perspective
|
2013
|
The Green Agenda: A Business Guide
|
2009
|
Green Cities: Urban Growth and the Environment
|
2006
|
Green Innovation in China: China's Wind Power Industry and the Global Transition to a Low-Carbon Economy
|
2013
|
The Green Office: A Business Guide
|
2009
|
Greening the Data Center: A Pocket Guide
|
2009
|
Growing American Rubber: Strategic Plants and the Politics of National Security
|
2009
|
Guesstimation 2.0: Solving Today's Problems on the Back of a Napkin
|
2012
|
A Guide to Effective Internal Management System Audits: Implementing internal audits as a risk management tool
|
2014
|
Hacker Culture
|
2002
|
Hackers Wanted: An Examination of the Cybersecurity Labor Market
|
2014
|
Handbook of Animal Radio-Tracking
|
1983
|
Handling Digital Brains: A Laboratory Study of Multimodal Semiotic Interaction in the Age of Computers
|
2011
|
Hard Fighting: Israel in Lebanon and Gaza
|
2011
|
Healing Appalachia: Sustainable Living through Appropriate Technology
|
2007
|
Healthcare Coverage and Disability Evaluation for Reserve Component Personnel: Research for the 11th Quadrennial Review of Military Compensation
|
2012
|
Hello, Central?: Gender, Technology, and Culture in the Formation of Telephone Systems
|
1991
|
Henri Poincare: A Scientific Biography
|
2013
|
The Herbalist in the Kitchen
|
2007
|
Hidden Hunger: Gender and the Politics of Smarter Foods
|
2013
|
High-Priority Information Technology Needs for Law Enforcement
|
2015
|
Highway Infrastructure and the Economy: Implications for Federal Policy
|
2011
|
Hiram Martin Chittenden: His Public Career
|
1973
|
Historic Maps of Kentucky
|
1979
|
Hollywood Lighting from the Silent Era to Film Noir
|
2010
|
Hollywood Science: Movies, Science, and the End of the World
|
2007
|
Honey, I'm Homemade: Sweet Treats from the Beehive across the Centuries and around the World
|
2010
|
The Horse, the Wheel, and Language: How Bronze-Age Riders from the Eurasian Steppes Shaped the Modern World
|
2007
|
The Horsemen of Athens
|
1988
|
How Do We Know What Information Sharing Is Really Worth? Exploring Methodologies to Measure the Value of Information Sharing and Fusion Efforts
|
2014
|
How Insurgencies End
|
2010
|
How Much Is Enough?: Shaping the Defense Program, 1961-1969
|
1971
|
How Round Is Your Circle?: Where Engineering and Mathematics Meet
|
2008
|
How Terrorist Groups End: Lessons for Countering al Qa'ida
|
2008
|
How to Survive a Data Breach: A Pocket Guide
|
2009
|
Hubbert's Peak: The Impending World Oil Shortage (New Edition)
|
2001
|
Human Information Interaction: An Ecological Approach to Information Behavior
|
2012
|
Hybrid Nature: Sewage Treatment and the Contradictions of the Industrial Ecosystem
|
2011
|
Identification and Analysis of Technology Emergence Using Patent Classification
|
2014
|
Identity Theft and Fraud: Evaluating and Managing Risk
|
2012
|
The Impact of Adopting Time-of-Day Tolling: Case Study of 183A in Austin, Texas
|
2015
|
The impact of migration on transport and congestion
|
2011
|
Impacts on U.S. Energy Expenditures and Greenhouse-Gas Emissions of Increasing Renewable-Energy Use
|
2008
|
Imperial Technoscience: Transnational Histories of MRI in the United States, Britain, and India
|
2014
|
Implementación de Calidad de Servicio basado en ISO/IEC 20000: Una Guía de Gestión
|
2012
|
Implementation Actions for Improving Air Force Command and Control Through Enhanced Agile Combat Support Planning, Execution, Monitoring, and Control Processes
|
2014
|
Implementierung von Service-Qualita basierend auf ISO/IEC 20000: Ein Management-Leitfaden
|
2012
|
Implementing Service Quality based on ISO/IEC 20000: A Management Guide
|
2012
|
Implications of an Air Force Budget Downturn on the Aircraft Industrial Base: An Exploratory Analysis
|
2013
|
Implications of Modern Decision Science for Military Decision-Support Systems
|
2005
|
Improving Air Force Command and Control Through Enhanced Agile Combat Support Planning, Execution, Monitoring, and Control Processes
|
2012
|
Improving Air Force Depot Programming by Linking Resources to Capabilities
|
2012
|
Improving Air Force Enterprise Resource Planning-Enabled Business Transformation
|
2013
|
Improving Federal and Department of Defense Use of Service-Disabled Veteran-Owned Businesses
|
2013
|
Improving Interagency Information Sharing Using Technology Demonstrations: The Legal Basis for Using New Sensor Technologies for Counterdrug Operations Along the U.S. Border
|
2014
|
Improving Inventory Management of Organizational and Individual Equipment at Central Issue Facilities
|
2013
|
Improving Strategic Competence: Lessons from 13 Years of War
|
2014
|
Impulsive and Hybrid Dynamical Systems: Stability, Dissipativity, and Control
|
2006
|
In Athena's Camp: Preparing for Conflict in the Information Age
|
1997
|
In Hindsight: A compendium of Business Continuity case studies
|
2014
|
Increasing Aircraft Carrier Forward Presence: Changing the Length of the Maintenance Cycle
|
2008
|
Increasing Flexibility and Agility at the National Reconnaissance Office: Lessons from Modular Design, Occupational Surprise, and Commercial Research and Development Processes
|
2013
|
Indian Security Policy: Foreword by Joseph S. Nye
|
1986
|
Individual Preparedness and Response to Chemical, Radiological, Nuclear, and Biological Terrorist Attacks: The Reference Guide
|
2003
|
Individual-based Modeling and Ecology:
|
2005
|
The Information Revolution in Asia
|
2003
|
Information Security A Practical Guide: Bridging the gap between IT and management
|
2015
|
Information Security Breaches: Avoidance and Treatment based on ISO27001
|
2014
|
Information Security Breaches: Avoidance and Treatment based on ISO27001
|
2009
|
Information Security Risk Management for ISO27001/ISO27002
|
2010
|
The Information Systems Academic Discipline in Australia
|
2008
|
Information Systems Foundations: Constructing and Criticising
|
2005
|
Information Systems Foundations: The Role of Design Science
|
2010
|
Information Systems Foundations: Theory Building in Information Systems
|
2012
|
Information Systems Foundations: Theory, Representation and Reality
|
2007
|
Innovation, Dual Use, and Security: Managing the Risks of Emerging Biological and Chemical Technologies
|
2012
|
The Insider Threat: Combatting the Enemy Within
|
2009
|
Instabilities and Fronts in Extended Systems
|
1990
|
Instrumental Community: Probe Microscopy and the Path to Nanotechnology
|
2011
|
Insurgency Online: Web Activism and Global Conflict
|
2006
|
Integrated Measurement - KPIs and Metrics for ITSM: A narrative account
|
2013
|
Integrating Civilian Agencies in Stability Operations
|
2009
|
Integrating Information into the Engineering Design Process
|
2014
|
Integrating the Department of Defense Supply Chain
|
2012
|
The Intellective Space: Thinking beyond Cognition
|
2015
|
Interactive Realism: The Poetics of Cyberspace
|
2005
|
Interface
|
2014
|
Interfaces of the Word: Studies in the Evolution of Consciousness and Culture
|
1997
|
Interfaces on Trial 2.0
|
2011
|
Internet Alley: High Technology in Tysons Corner, 1945-2005
|
2008
|
The Internet and American Business
|
2008
|
Internet Architecture and Innovation
|
2010
|
Internet Literature in China
|
2015
|
The Internet of Elsewhere: The Emergent Effects of a Wired World
|
2011
|
Internet Success: A Study of Open-Source Software Commons
|
2012
|
Introducción a la mecánica de fluidos
|
2013
|
An Introduction to Anti-Bribery Management Systems (BS 10500): Doing right things
|
2015
|
An Introduction to Hacking and Crimeware: A Pocket Guide
|
2012
|
An Introduction to Information Security and ISO27001:2013: A Pocket Guide
|
2013
|
Introduction to Modeling Convection in Planets and Stars: Magnetic Field, Density Stratification, Rotation
|
2014
|
Inventing the PC: The MCM/70 Story
|
2011
|
Invisible Users: Youth in the Internet Cafés of Urban Ghana
|
2012
|
Iran's Political, Demographic, and Economic Vulnerabilities
|
2008
|
Is American Science in Decline?
|
2012
|
ISO14001 Step by Step: A practical guide
|
2011
|
ISO19770-1:2012 SAM Process Guidance: A kick-start to your SAM programme
|
2012
|
ISO22301: A Pocket Guide
|
2013
|
ISO27001 in a Windows ® Environment: The best practice handbook for a Microsoft® Windows® environment
|
2010
|
ISO27001 / ISO27002: A Pocket Guide
|
2013
|
ISO27001:2013 Assessments Without Tears
|
2013
|
ISO/IEC 20000: An Introduction to the global standard for service management
|
2011
|
ISO/IEC 38500: The IT Governance Standard
|
2008
|
IT Asset Management: A Pocket Survival Guide
|
2011
|
IT Governance: A Pocket Guide
|
2007
|
IT Governance: Guidelines for Directors
|
2005
|
IT Governance: Implementing Frameworks and Standards for the Corporate Governance of IT
|
2009
|
IT Governance to Drive High Performance: Lessons from Accenture
|
2010
|
IT Governance Today: A Practitioners Handbook
|
2005
|
IT Induction and Information Security Awareness: A Pocket Guide
|
2010
|
IT Regulatory Compliance in North America
|
2007
|
IT Regulatory Compliance in the UK
|
2007
|
IT Strategic and Operational Controls
|
2010
|
ITIL and Organizational Change
|
2013
|
ITIL Foundation Essentials: The exam facts you need
|
2012
|
ITIL Lifecycle Essentials: Your essential guide for the ITIL Foundation exam and beyond
|
2013
|
It's All About Relationships: What ITIL® doesn't tell you
|
2013
|
The ITSM Iron Triangle: Incidents, changes and problems
|
2012
|
Junkware
|
2011
|
Just War Tradition and the Restraint of War: A Moral and Historical Inquiry
|
1981
|
Keeping Law Enforcement Connected: Information Technology Needs from State and Local Agencies
|
2012
|
The Kefaya Movement: A Case Study of a Grassroots Reform Initiative
|
2008
|
Kicking the Carbon Habit: Global Warming and the Case for Renewable and Nuclear Energy
|
2006
|
Knowledge-Based Economies and Basing Economies on Knowledge: Skills a Missing Link in GCC Countries
|
2013
|
Labor and the Locavore: The Making of a Comprehensive Food Ethic
|
2014
|
The Labyrinth of Technology: A Preventive Technology and Economic Strategy as a Way Out
|
2000
|
Land Between the Lakes
|
1971
|
Law, Privacy and Surveillance in Canada in the Post-Snowden Era
|
2015
|
Leading Change in a Web 2.1 World: How ChangeCasting Builds Trust, Creates Understanding, and Accelerates Organizational Change
|
2010
|
Learning from Experience: Volume I: Lessons from the Submarine Programs of the United States, United Kingdom, and Australia
|
2011
|
Learning from Experience: Volume II: Lessons from the U.S. Navy's Ohio, Seawolf, and Virginia Submarine Programs
|
2011
|
Learning from Experience: Volume III: Lessons from the United Kingdom's Astute Submarine Program
|
2011
|
Learning from Experience: Volume IV: Lessons from Australia's Collins Submarine Program
|
2011
|
Learning Large Lessons: The Evolving Roles of Ground Power and Air Power in the Post-Cold War Era
|
2007
|
Learning Native Wisdom: What Traditional Cultures Teach Us about Subsistence, Sustainability, and Spirituality
|
2008
|
Lessons from the Army’s Future Combat Systems Program
|
2012
|
Letterboxed: The Evolution of Widescreen Cinema
|
2011
|
A Lever Long Enough: A History of Columbia's School of Engineering and Applied Science Since 1864
|
2014
|
Leveraging Observations of Security Force Assistance in Afghanistan for Global Operations
|
2013
|
License Plate Readers for Law Enforcement: Opportunities and Obstacles
|
2014
|
Linkography: Unfolding the Design Process
|
2014
|
Livestock/Deadstock: Working with Farm Animals from Birth to Slaughter
|
2010
|
Living in the Labyrinth of Technology
|
2005
|
Living with Complexity
|
2011
|
Local Environmental Movements
|
2008
|
Locomotive to Aeromotive: Octave Chanute and the Transportation Revolution
|
2011
|
Logic and Automata: History and Perspectives
|
2008
|
The Logician and the Engineer: How George Boole and Claude Shannon Created the Information Age
|
2013
|
London: Water and the Making of the Modern City
|
2013
|
The Long Shadow of 9/11: America's Response to Terrorism
|
2011
|
Loosening the Bonds: Mid-Atlantic Farm Women, 1750-1850
|
1986
|
Low Power to the People: Pirates, Protest, and Politics in FM Radio Activism
|
2014
|
Machine Learning in Non-Stationary Environments: Introduction to Covariate Shift Adaptation
|
2012
|
The Machine Question: Critical Perspectives on AI, Robots, and Ethics
|
2012
|
Macroanalysis: Digital Methods and Literary History
|
2013
|
Making a Green Machine: The Infrastructure of Beverage Container Recycling
|
2011
|
Making Futures: Marginal Notes on Innovation, Design, and Democracy
|
2014
|
Man and Water: The Social Sciences in Management of Water Resources
|
1974
|
Management Perspectives Pertaining to Root Cause Analyses of Nunn-McCurdy Breaches, Volume 4: Program Manager Tenure, Oversight of Acquisition Category II Programs, and Framing Assumptions
|
2013
|
Management Perspectives Pertaining to Root Cause Analyses of Nunn-McCurdy Breaches, Volume 6: Contractor Motivations and Anticipating Breaches
|
2014
|
A Manager's Guide to ISO22301: A practical guide to developing and implementing a business continuity management system
|
2013
|
Managing Information Risk: A Director's Guide
|
2009
|
Managing Information Security Breaches: Studies from Real Life
|
2010
|
Managing Information Security Breaches: Studies from real life
|
2014
|
Managing IT in a Downturn: A Pocket Guide
|
2008
|
Managing the Infosphere: Governance, Technology, and Cultural Practice in Motion
|
2008
|
Mankind Beyond Earth: The History, Science, and Future of Human Space Exploration
|
2012
|
Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar
|
2014
|
Mass Destruction: The Men and Giant Mines That Wired America and Scarred the Planet
|
2009
|
Mastering the Ultimate High Ground: Next Steps in the Military Uses of Space
|
2003
|
Math Bytes: Google Bombs, Chocolate-Covered Pi, and Other Cool Bits in Computing
|
2014
|
Math You Can't Use: Patents, Copyright, and Software
|
2006
|
Matrices, Moments and Quadrature with Applications
|
2010
|
Measuring your IT: Identifying the metrics that matter
|
2012
|
Medical Professionalism in the New Information Age
|
2010
|
Mercury and the Making of California: Mining, Landscape, and Race, 1840–1890
|
2013
|
Metabolism of the Anthroposphere: Analysis, Evaluation, Design
|
2012
|
Metallurgy: Understanding How, Learning Why: Studies in Honor of James D. Muhly
|
2011
|
The Microsoft Antitrust Cases: Competition Policy for the Twenty-first Century
|
2014
|
Mileage-Based User Fees for Transportation Funding: A Primer for State and Local Decisionmakers
|
2012
|
Military Enlistment of Hispanic Youth: Obstacles and Opportunities
|
2009
|
Milk: A Local and Global History
|
2011
|
Mining the Biomedical Literature
|
2012
|
Mississippi Harvest: Lumbering in the Longleaf Pine Belt, 1840-1915
|
1962
|
Mobile Screens: The Visual Regime of Navigation
|
2012
|
Mobile Security: A Pocket Guide
|
2009
|
Modeling Business Processes: A Petri Net-Oriented Approach
|
2011
|
Modeling, Simulation, and Operations Analysis in Afghanistan and Iraq: Operational Vignettes, Lessons Learned, and a Survey of Selected Efforts
|
2014
|
Modeling with Data: Tools and Techniques for Scientific Computing
|
2009
|
Modern Anti-windup Synthesis: Control Augmentation for Actuator Saturation
|
2011
|
Modernization and the Japanese Factory
|
1976
|
Monitoring Movements in Development Aid: Recursive Partnerships and Infrastructures
|
2013
|
More than a game: The computer game as fictional form
|
2003
|
Moving Data: The iPhone and the Future of Media
|
2012
|
Moving Innovation: A History of Computer Animation
|
2013
|
My Country, Mine Country: Indigenous People, mining and development contestation in remote Australia
|
2013
|
My Fair Ladies: Female Robots, Androids, and Other Artificial Eves
|
2015
|
The Myth of Digital Democracy
|
2009
|
National Guard Special Forces: Enhancing the Contributions of Reserve Component Army Special Operations Forces
|
2012
|
National Insecurity: U.S. Intelligence After the Cold War
|
2000
|
National Security and United States Policy Toward Latin America
|
1987
|
Naval Strategy and National Security: An "International Security" Reader
|
1988
|
The Need for Speed: A New Framework for Telecommunications Policy for the 21st Century
|
2013
|
The Net Effect: Romanticism, Capitalism, and the Internet
|
2011
|
Net Smart: How to Thrive Online
|
2012
|
Networked Forces in Stability Operations: 101st Airborne Division, 3/2 and 1/25 Stryker Brigades in Northern Iraq
|
2007
|
Networked: The New Social Operating System
|
2012
|
Networks and States: The Global Politics of Internet Governance
|
2010
|
Neural Networks and Animal Behavior:
|
2005
|
New Approaches to Defense Inflation and Discounting
|
2013
|
A New Idea Each Morning: How food and agriculture came together in one international organisation
|
2013
|
The New Invisible College: Science for Development
|
2008
|
New Natures: Joining Environmental History with Science and Technology Studies
|
2013
|
A New Tool for Assessing Workforce Management Policies Over Time: Extending the Dynamic Retention Model
|
2013
|
The Next Catastrophe: Reducing Our Vulnerabilities to Natural, Industrial, and Terrorist Disasters
|
2007
|
The Next Wave: Using Digital Technology to Further Social and Political Innovation
|
2011
|
Nightwork: A History of Hacks and Pranks at MIT
|
2011
|
Nine Steps to Success: An ISO27001:2013 Implementation Overview
|
2013
|
No One of Us is as Strong as All of Us: Services, catalogs and portfolios
|
2012
|
Nobody’s Business: Twenty-First Century Avant-Garde Poetics
|
2013
|
Nonnegative and Compartmental Dynamical Systems
|
2010
|
Normal Accidents: Living with High Risk Technologies (Updated)
|
1999
|
Note-by-Note Cooking: The Future of Food
|
2014
|
Nothing Less than Victory: Decisive Wars and the Lessons of History
|
2010
|
The NSA Report: Liberty and Security in a Changing World
|
2014
|
Nuclear Politics: Energy and the State in the United States, Sweden, and France
|
1990
|
Number-Crunching: Taming Unruly Computational Problems from Mathematical Physics to Science Fiction
|
2011
|
Numerical Algorithms for Personalized Search in Self-organizing Information Networks
|
2010
|
Nutritionism: The Science and Politics of Dietary Advice
|
2013
|
Of Time and the Enterprise: North American Family Farm Management in a Context of Resource Marginality
|
1982
|
Off the Network: Disrupting the Digital World
|
2013
|
OHSAS 18001 Step by Step: A Practical Guide
|
2012
|
Oil Titans: National Oil Companies in the Middle East
|
2006
|
On the Edge of Earth: The Future of American Space Power
|
2001
|
Once more unto the Breach: Managing information security in an uncertain world
|
2015
|
Once more unto the Breach: Managing information security in an uncertain world
|
2012
|
Ontario Hydro at the Millennium: Has Monopoly's Moment Passed?
|
1996
|
Open Networks, Closed Regimes: The Impact of the Internet on Authoritarian Rule
|
2003
|
An Operational Architecture for Improving Air Force Command and Control Through Enhanced Agile Combat Support Planning, Execution, Monitoring, and Control Processes
|
2014
|
An Operational Process for Workforce Planning
|
2004
|
Optimization: A Theory of Necessary Conditions
|
1976
|
Optimization Algorithms on Matrix Manifolds
|
2008
|
Optimization for Machine Learning
|
2012
|
Options for Meeting the Maintenance Demands of Active Associate Flying Units
|
2008
|
Oral Tradition and the Internet: Pathways of the Mind
|
2012
|
The Other Quiet Professionals: Lessons for Future Cyber Forces from the Evolution of Special Forces
|
2014
|
An Outline of Strategies for Building an Innovation System for Knowledge City
|
2012
|
Outsourcing IT: A governance guide
|
2009
|
Overpotential: Fuel Cells, Futurism, and the Making of a Power Panacea
|
2012
|
Overseas Basing of U.S. Military Forces: An Assessment of Relative Costs and Strategic Benefits
|
2013
|
Paper Machines: About Cards & Catalogs, 1548-1929
|
2011
|
Participatory Politics: Next-Generation Tactics to Remake Public Spheres
|
2014
|
PCI DSS: A Pocket Guide
|
2011
|
PCI DSS: A Pocket Guide - 3rd edition
|
2013
|
PCI DSS: A Practical Guide to Implementing and Maintaining Compliance
|
2011
|
Penaid Nonproliferation: Hindering the Spread of Countermeasures Against Ballistic Missile Defenses
|
2014
|
Penetration Testing: Protecting Networks and Systems
|
2012
|
Penetration Testing Services Procurement Guide
|
2014
|
Pesticide Drift and the Pursuit of Environmental Justice
|
2011
|
Philosophical Perspectives on Bioethics
|
1996
|
The Pion-Nucleon System
|
1973
|
Pirate Politics: The New Information Policy Contests
|
2014
|
The Piri Reis Map of 1513
|
2000
|
Plastic Reality: Special Effects, Technology, and the Emergence of 1970s Blockbuster Aesthetics
|
2015
|
Poison in the Well: Radioactive Waste in the Oceans at the Dawn of the Nuclear Age
|
2008
|
Police Department Investments in Information Technology Systems: Challenges Assessing Their Payoff
|
2014
|
A Policy Analysis of Reserve Retirement Reform
|
2013
|
Politics and Nuclear Power: Energy Policy in Western Europe
|
1986
|
Politics of Urban Runoff: Nature, Technology, and the Sustainable City
|
2011
|
Portfolio Optimization by Means of Multiple Tandem Certainty-Uncertainty Searches: A Technical Description
|
2013
|
Portfolio-Analysis Methods for Assessing Capability Options
|
2008
|
Post-Traumatic Stress Disorder and the Earnings of Military Reservists
|
2013
|
Post-TV: Piracy, Cord-Cutting, and the Future of Television
|
2015
|
The Potential of Blind Collaborative Justice: Testing the Impact of Expert Blinding and Consensus Building on the Validity of Forensic Testimony
|
2015
|
Power at Cost: Ontario Hydro and Rural Electrification, 1911-1958
|
1992
|
The Power of Knowledge: How Information and Technology Made the Modern World
|
2014
|
The Power of the Agile Business Analyst: 30 surprising ways a business analyst can add value to your Agile development team
|
2013
|
The Power of the Internet in China: Citizen Activism Online
|
2009
|
Power over Peoples: Technology, Environments, and Western Imperialism, 1400 to the Present
|
2010
|
Power, Speed, and Form: Engineers and the Making of the Twentieth Century
|
2006
|
Power Struggles: Scientific Authority and the Creation of Practical Electricity Before Edison
|
2008
|
Practical IT Service Management: A concise guide for busy executives
|
2014
|
Practical IT Service Management: A Concise Guide for Busy Executives
|
2008
|
Pragmatic Application of Service Management: The Five Anchor Approach
|
2014
|
Pre-Deployment Stress, Mental Health, and Help-Seeking Behaviors Among Marines
|
2014
|
Predictive Policing: The Role of Crime Forecasting in Law Enforcement Operations
|
2013
|
Preparing and Training for the Full Spectrum of Military Challenges: Insights from the Experiences of China, France, the United Kingdom, India, and Israel
|
2009
|
Prime Movers of Globalization: The History and Impact of Diesel Engines and Gas Turbines
|
2010
|
The Privacy Advocates: Resisting the Spread of Surveillance
|
2008
|
Processing: A Programming Handbook for Visual Designers and Artists
|
2014
|
Procuring Penetration Testing Services
|
2014
|
Professionalism in the Information and Communication Technology Industry
|
2013
|
Programming as if People Mattered: Friendly Programs, Software Engineering, and Other Noble Delusions
|
1991
|
Project Retrosight: Understanding the returns from cardiovascular and stroke research: The Policy Report
|
2011
|
Prolonged Cycle Times and Schedule Growth in Defense Acquisition: A Literature Review
|
2014
|
Promoting Online Voices for Countering Violent Extremism
|
2013
|
Protecting Emergency Responders Volume 2: Community Views of Safety and Health Risks and Personal Protection Needs
|
2003
|
Protecting Emergency Responders, Volume 4: Personal Protective Equipment Guidelines for Structural Collapse Events
|
2006
|
Protocol Politics: The Globalization of Internet Governance
|
2009
|
The Public Eye: Television and the Politics of Canadian Broadcasting, 1952-1968
|
1979
|
Public Service Liberalism: Telecommunications and Transitions in Public Policy
|
1991
|
Qatar's School Transportation System: Supporting Safety, Efficiency, and Service Quality
|
2012
|
Quantitative Techniques for Decision Making in Construction
|
2004
|
The Quantum Age of IT: Why everything you know about IT is about to change
|
2012
|
Radical Islam in East Africa
|
2009
|
Radio Utopia: Postwar Audio Documentary in the Public Interest
|
2011
|
Raise: What 4-H Teaches Seven Million Kids and How Its Lessons Could Change Food and Farming Forever
|
2014
|
RAND and the Information Evolution: A History in Essays and Vignettes
|
2008
|
The RAND Security Cooperation Prioritization and Propensity Matching Tool
|
2013
|
Rapid Acquisition and Fielding for Information Assurance and Cyber Security in the Navy
|
2012
|
Readiness Reporting for an Adaptive Army
|
2013
|
Reading Machines: Toward an Algorithmic Criticism
|
2011
|
Reading Writing Interfaces: From the Digital to the Bookbound
|
2014
|
Reality Mining: Using Big Data to Engineer a Better World
|
2014
|
Rebuilding the News: Metropolitan Journalism in the Digital Age
|
2013
|
Recoding Gender: Women's Changing Participation in Computing
|
2012
|
Récoltes des forêts publiques au Québec et en Ontario, 1840-1900
|
1999
|
Reconceptualizing the Industrial Revolution
|
2010
|
Reconstruction Under Fire: Case Studies and Further Analysis of Civil Requirements
|
2010
|
Redefining Information Warfare Boundaries for an Army in a Wireless World
|
2013
|
Reducing Long-Term Costs While Preserving a Robust Strategic Airlift Fleet: Options for the Current Fleet and Next-Generation Aircraft
|
2013
|
Reducing the Cultivation of Opium Poppies in Southern Afghanistan
|
2015
|
Reference and Referring
|
2012
|
Reinventing Discovery: The New Era of Networked Science
|
2012
|
The Reputation Society: How Online Opinions Are Reshaping the Offline World
|
2011
|
Resilient Thinking: Protecting Organisations in the 21st Century
|
2012
|
Resource Allocation in Agricultural Research
|
1971
|
Rethinking Counterinsurgency: RAND Counterinsurgency Study--Volume 5
|
2008
|
Reverse Engineering Social Media: Software, Culture, and Political Economy in New Media Capitalism
|
2014
|
A Review of Research on Problematic Internet Use and Well-Being: With Recommendations for the U.S. Air Force
|
2015
|
Reviewing IT in Due Diligence: Are you buying an IT asset or liability
|
2015
|
A Revolution Down on the Farm: The Transformation of American Agriculture since 1929
|
2008
|
The Ringtone Dialectic: Economy and Cultural Form
|
2013
|
Risk Assessment for Asset Owners
|
2007
|
A Risk Assessment Methodology and Excel Tool for Acquisition Programs
|
2013
|
Risks, Dangers, and Rewards in the Nova Scotia Offshore Fishery
|
1995
|
River Republic: The Fall and Rise of America's Rivers
|
2012
|
ROADS TO POWER
|
2012
|
Running IT Like a Business: A Step-by-Step Guide to Accenture's Internal IT
|
2012
|
Rushed to Judgment: Talk Radio, Persuasion, and American Political Behavior
|
2002
|
Russia and the Information Revolution
|
2005
|
Samuel de Champlain before 1604: Des Sauvages and other Documents Related to the Period
|
2010
|
The Sanitary City: Environmental Services in Urban America from Colonial Times to the Present
|
2008
|
Satellite Anomalies: Benefits of a Centralized Anomaly Database and Methods for Securely Sharing Information Among Satellite Operators
|
2014
|
Saving Global Fisheries: Reducing Fishing Capacity to Promote Sustainability
|
2013
|
Saving Seeds, Preserving Taste: Heirloom Seed Savers in Appalachia
|
2013
|
Scene Vision: Making Sense of What We See
|
2014
|
Scenes of Projection: Recasting the Enlightenment Subject
|
2015
|
Scholarship in the Digital Age: Information, Infrastructure, and the Internet
|
2007
|
Science and Technology in the Global Cold War
|
2014
|
Science and Technology Policy in the United States: Open Systems in Action
|
2006
|
Science and the Navy: The History of the Office of Naval Research
|
1990
|
The Science of War: Defense Budgeting, Military Technology, Logistics, and Combat Outcomes
|
2009
|
Scientific Management in Action: Taylorism at Watertown Arsenal, 1908-1915
|
1985
|
Script Changers: Digital Storytelling with Scratch
|
2014
|
Scripting Reading Motions: The Codex and the Computer as Self-Reflexive Machines
|
2013
|
Securing America's Passenger-Rail Systems
|
2007
|
Securing Cloud Services: A pragmatic approach to security architecture in the Cloud
|
2012
|
Security and Profit in China's Energy Policy: Hedging Against Risk
|
2013
|
Security Testing Handbook for Banking Applications
|
2009
|
Security: The Human Factor
|
2010
|
Seed Testing: Principles and Practices
|
2012
|
Seeds, Science, and Struggle: The Global Politics of Transgenic Crops
|
2012
|
Selection Management: For Systems and Services
|
2012
|
Selling Information Security to the Board: A Primer
|
2010
|
Service Level Agreements: A legal and practical guide
|
2010
|
Shaping the Next One Hundred Years: New Methods for Quantitative, Long-Term Policy Analysis
|
2003
|
Shivers Down Your Spine: Cinema, Museums, and the Immersive View
|
2008
|
Short Circuits: Crafting e-Puppets with DIY Electronics
|
2014
|
Signal Traffic: Critical Studies of Media Infrastructures
|
2015
|
Silence, Screen, and Spectacle: Rethinking Social Memory in the Age of Information
|
2014
|
Silent Film Sound
|
2004
|
The Silicon Jungle: A Novel of Deception, Power, and Internet Intrigue
|
2011
|
A Single Sky: How an International Community Forged the Science of Radio Astronomy
|
2013
|
A Sixty-Year Timeline of the Air Force Maui Optical and Supercomputing Site
|
2013
|
Slow Food: The Case for Taste
|
2001
|
Small Tech: The Culture of Digital Tools
|
2008
|
Small Unmanned Aircraft: Theory and Practice
|
2012
|
Smart Machines: IBM's Watson and the Era of Cognitive Computing
|
2013
|
SMART TRASH: Study on RFID tags and the recycling industry
|
2012
|
Social and Environmental Impacts of the James Bay Hydroelectric Project
|
1999
|
The Social Construction of Technological Systems: New Directions in the Sociology and History of Technology
|
2012
|
A Social Strategy: How We Profit from Social Media
|
2014
|
Soft Circuits: Crafting e-Fashion with DIY Electronics
|
2014
|
Software Life Cycle Management Standards: Real-world Scenarios and Solutions for Savings
|
2011
|
The Soil and Health: A Study of Organic Agriculture
|
1947
|
Soldier-Portable Battery Supply: Foreign Dependence and Policy Options
|
2014
|
Sonic Persuasion: Reading Sound in the Recorded Age
|
2011
|
The Souls of Cyberfolk: Posthumanism as Vernacular Theory
|
2005
|
Sound Technology and the American Cinema: Perception, Representation, Modernity
|
2000
|
Sound Wormy: Memoir of Andrew Gennett, Lumberman
|
2002
|
Sources of Weapon System Cost Growth: Analysis of 35 Major Defense Acquisition Programs
|
2008
|
Sourcing and Global Distribution of Medical Supplies
|
2014
|
Space as a Strategic Asset
|
2007
|
Space Weapons Earth Wars
|
2002
|
Spam: A Shadow History of the Internet
|
2013
|
Special Effects: Still in Search of Wonder
|
2002
|
Specialty Payment Model Opportunities and Assessment: Oncology Simulation Report
|
2015
|
Squeezed: What You Don't Know About Orange Juice
|
2009
|
The Star as Icon: Celebrity in the Age of Mass Consumption
|
2008
|
The Star Wars Controversy: An "International Security" Reader
|
1986
|
State-Level Changes in Energy Intensity and Their National Implications
|
2003
|
Statistics, Data Mining, and Machine Learning in Astronomy: A Practical Python Guide for the Analysis of Survey Data
|
2014
|
Status Update: Celebrity, Publicity, and Branding in the Social Media Age
|
2013
|
Steel, Ships and Men: Cammell Laird and Company 1824-1993
|
1998
|
Stereoscopic Cinema and the Origins of 3-D Film, 1838-1952
|
2007
|
Strategic Defenses: Two Reports by the Office of Technology Assessment
|
1986
|
Strategic Information Warfare: A New Face of War
|
1996
|
Strategically Aligned Family Research: Supporting Soldier and Family Quality of Life Research for Policy Decisonmaking
|
2013
|
Strategy-Policy Mismatch: How the U.S. Army Can Help Close Gaps in Countering Weapons of Mass Destruction
|
2014
|
Street Smart: Intelligence Preparation of the Battlefield for Urban Operations
|
2002
|
Subversion, Conversion, Development: Cross-Cultural Knowledge Exchange and the Politics of Design
|
2014
|
Success through Failure: The Paradox of Design
|
2006
|
Sugar Water: Hawaii's Plantation Ditches
|
1996
|
Suitability of Missions for the Air Force Reserve Components
|
2014
|
Summa Technologiae
|
2013
|
Support for the 21st-Century Reserve Force: Insights to Facilitate Successful Reintegration for Citizen Warriors and Their Families
|
2013
|
Supporting Employers in the Reserve Operational Forces Era: Appendixes
|
2013
|
Supporting Employers in the Reserve Operational Forces Era: Are Changes Needed to Reservists’ Employment Rights Legislation, Policies, or Programs?
|
2013
|
Surveillance or Security?: The Risks Posed by New Wiretapping Technologies
|
2010
|
A Survey of Agricultural Economics Literature V4: Agriculture in Economic Development 1940s to 1990s
|
1992
|
Sustainable Urban Metabolism
|
2013
|
Sustaining Key Skills in the UK Military Aircraft Industry
|
2010
|
Sustaining U.S. Nuclear Submarine Design Capabilities
|
2007
|
SWANSON on Internal Auditing: Raising the Bar
|
2010
|
Syntony and Spark: The Origins of Radio
|
1985
|
Syria as an Arena of Strategic Competition
|
2013
|
Tantalisingly Close: An Archaeology of Communication Desires in Discourses of Mobile Wireless Media
|
2012
|
The Tao of Open Source Intelligence
|
2015
|
The Techno-Human Condition
|
2011
|
Technological Nature: Adaptation and the Future of Human Life
|
2011
|
Technological Turf Wars: A Case Study of the Computer Antivirus Industry
|
2009
|
Technologies of Choice?: ICTs, Development, and the Capabilities Approach
|
2013
|
Technology in Early America: Needs and Opportunities for Study
|
1966
|
Technology in Postwar America: A History
|
2007
|
The Technology of Nonviolence: Social Media and Violence Prevention
|
2012
|
Telecommunications Development in Asia
|
2008
|
Telecommunications Liberalization on Two Sides of the Atlantic
|
2001
|
The Television Will Be Revolutionized, 2nd edition
|
2014
|
Ten Steps to ITSM Success: A Practitioner’s Guide to Enterprise IT Transformation
|
2013
|
Terra Nostra: The Stories Behind Canada’s Maps
|
2006
|
Texture: Human Expression in the Age of Communications Overload
|
2010
|
Theaters of Time and Space: American Planetaria, 1930-1970
|
2005
|
Thieves of Virtue: When Bioethics Stole Medicine
|
2012
|
Thinking About America's Defense: An Analytical Memoir
|
2008
|
Three Views of Logic: Mathematics, Philosophy, and Computer Science
|
2014
|
Through Mobility We Conquer: The Mechanization of U.S. Cavalry
|
2006
|
To Forgive Design: Understanding Failure
|
2012
|
To Reach the High Frontier: A History of U.S. Launch Vehicles
|
2002
|
Tobacco Culture: Farming Kentucky's Burley Belt
|
1998
|
The Tone of Our Times: Sound, Sense, Economy, and Ecology
|
2014
|
The Tools of Owatatsumi: Japan’s Ocean Surveillance and Coastal Defence Capabilities
|
2015
|
Topics in Quaternion Linear Algebra
|
2014
|
Toward an Evolutionary Regime for Spectrum Governance: Licensing or Unrestricted Entry?
|
2006
|
Toward Integrated DoD Biosurveillance: Assessment and Opportunities
|
2013
|
Towards a competitive European Internet industry: A socio-economic analysis of the European Internet industry and the Future Internet Public-Private Partnership
|
2012
|
Toxic Airs: Body, Place, Planet in Historical Perspective
|
2014
|
The Transformation of the World: A Global History of the Nineteenth Century
|
2014
|
Transforming Global Information and Communication Markets: The Political Economy of Innovation
|
2009
|
Transient Images: Personal Media in Public Frameworks
|
2011
|
Trapped in the Net: The Unanticipated Consequences of Computerization
|
1997
|
The True Cost of Information Security Breaches and Cyber Crime
|
2013
|
Turing's Man: Western Culture in the Computer Age
|
1984
|
The Turkey: An American Story
|
2006
|
Turning Heads and Changing Minds: Transcending IT Auditor Archetypes
|
2013
|
Twentieth-Century Shore-Station Whaling in Newfoundland and Labrador
|
2005
|
Two-Factor Authentication
|
2015
|
The Ultimate Book of Saturday Science: The Very Best Backyard Science Experiments You Can Do Yourself
|
2012
|
Umami: Unlocking the Secrets of the Fifth Taste
|
2014
|
Unconventional Fossil-Based Fuels: Economic and Environmental Trade-Offs
|
2008
|
Underkill: Scalable Capabilities for Military Operations amid Populations
|
2009
|
Understanding and Managing the Complexity of Healthcare
|
2014
|
Understanding Beliefs
|
2014
|
Understanding Commanders' Information Needs for Influence Operations
|
2009
|
Understanding Forfeitures: An Analysis of the Relationship Between Case Details and Forfeiture Among TEOAF High-Forfeiture and Major Cases
|
2009
|
Understanding Iran
|
2009
|
Understanding the Cost and Quality of Military-Related Education Benefit Programs
|
2013
|
Understanding the Global Energy Crisis
|
2014
|
Understanding Why a Ground Combat Vehicle That Carries Nine Dismounts Is Important to the Army
|
2013
|
Unfolding the Future of the Long War: Motivations, Prospects, and Implications for the U.S. Army
|
2008
|
Uranium Frenzy: Saga of the Nuclear West
|
2002
|
The U.S. Combat Aircraft Industry, 1909-2000: Structure, Competition, Innovation
|
2003
|
U.S. Competitiveness in Science and Technology
|
2008
|
U.S. Military Information Operations in Afghanistan: Effectiveness of Psychological Operations 2001-2010
|
2012
|
U.S. Navy Employment Options for Unmanned Surface Vehicles (USVs)
|
2013
|
Using Behavioral Indicators to Help Detect Potential Violent Acts: A Review of the Science Base
|
2013
|
Using EPIC to Find Conflicts, Inconsistencies, and Gaps in Department of Defense Policies
|
2013
|
Using Pattern Analysis and Systematic Randomness to Allocate U.S. Border Security Resources
|
2012
|
Using Social Media to Gauge Iranian Public Opinion and Mood After the 2009 Election
|
2012
|
Using the Steel-Vessel Material-Cost Index to Mitigate Shipbuilder Risk
|
2008
|
The Vandana Shiva Reader
|
2014
|
A Vast Machine: Computer Models, Climate Data, and the Politics of Global Warming
|
2010
|
Venture Capital and Strategic Investment for Developing Government Mission Capabilities
|
2014
|
Virtual Collaboration for a Distributed Enterprise
|
2013
|
Virtual Knowledge: Experimenting in the Humanities and the Social Sciences
|
2013
|
The Virtues of Ignorance: Complexity, Sustainability, and the Limits of Knowledge
|
2008
|
Visions of Law Enforcement Technology in the Period 2024-2034: Report of the Law Enforcement Futuring Workshop
|
2015
|
Visual Insights: A Practical Guide to Making Sense of Data
|
2014
|
War Games: A History of War on Paper
|
2012
|
Warhogs: A History of War Profits in America
|
1997
|
Wave Propagation: From Electrons to Photonic Crystals and Left-Handed Materials
|
2008
|
Web Application Security is a Stack: How to CYA (Cover Your Apps) Completely
|
2015
|
Weighting Evidence in Language and Literature
|
1974
|
When Computers Were Human
|
2005
|
When the Lights Went Out: A History of Blackouts in America
|
2010
|
Where the Money Goes: Understanding Litigant Expenditures for Producing Electronic Discovery
|
2012
|
Who's #1?: The Science of Rating and Ranking
|
2012
|
Why Air Forces Fail: The Anatomy of Defeat
|
2006
|
A Widening Sphere: Evolving Cultures at MIT
|
2011
|
Wind Wizard: Alan G. Davenport and the Art of Wind Engineering
|
2013
|
Wing Theory
|
1990
|
Wingless Flight: The Lifting Body Story
|
2002
|
Wirelessness: Radical Empiricism in Network Cultures
|
2010
|
Women in Nineteenth-Century Russia: Lives and Culture
|
2012
|
Working on Mars: Voyages of Scientific Discovery with the Mars Exploration Rovers
|
2012
|
Workplace Wellness Programs: Services Offered, Participation, and Incentives
|
2014
|
Worlds Without End: The Many Lives of the Multiverse
|
2014
|
Worse Than a Monolith: Alliance Politics and Problems of Coercive Diplomacy in Asia
|
2011
|
The Wright Company: From Invention to Industry
|
2013
|
You've Got Dissent! Chinese Dissident Use of the Internet and Beijing's Counter-Strategies
|
2002
|
Zapotec Science
|
2001
|