Search

Your search keyword '"Dahl Erik"' showing total 985 results

Search Constraints

Start Over You searched for: Author "Dahl Erik" Remove constraint Author: "Dahl Erik"
985 results on '"Dahl Erik"'

Search Results

1. The conceptual design of the 50-meter Atacama Large Aperture Submillimeter Telescope (AtLAST)

2. Experimental Investigation of Heat Transfer Rates and Pressure Drops through Compact Heat Exchangers

3. Progress in the Design of the Atacama Large Aperture Submillimeter Telescope

4. LARGE LANGUAGE MODEL FUNDAMENTALS.

6. 'Predictive intelligence for tomorrow's threats': is predictive intelligence possible?

7. Design of the 50-meter Atacama Large Aperture Submm Telescope

10. Progress in the Design of the Atacama Large Aperture Submillimeter Telescope

12. IMPACT OF THE CHINA COAST GUARD AND THE PEOPLE’S ARMED FORCES MARITIME MILITIA ON THE (IN)STABILITY OF THE SOUTH CHINA SEA

13. LEARNING TO COMPETE WHEN THE GAME CHANGES: COVERT ACTION IN AMERICAN COLD WAR GRAND STRATEGY 1947-1960

14. VULNERABILITY ANALYSIS OF GUAM’S DEFENSE POSTURE

15. BUILDING CAPACITY AGAINST EXTREMIST THREATS: A FRAMEWORK FOR IMPROVED CORRECTIONAL INTELLIGENCE

16. INSIDER THREAT: A CONSTANT PROBLEM WITH A CONTINUOUS APPROACH

17. FRAMING THREATS TO HOMELAND SECURITY

18. PANDEMICS: A THREAT AGAINST U.S. MILITARY FORCES

19. CRYPTOCURRENCY: CHANGING THE GAME FOR STATE AND LOCAL LAW ENFORCEMENT

20. THE PEN, THE SHIELD, OR THE SWORD? HOW THE UNITED STATES WINS THE HYPERSONIC ARMS RACE

21. Håller det? : Studie av hållbar utveckling i läroböcker och läroplaner

22. THE ROLE OF INTELLIGENCE FUSION CENTERS IN FIGHTING DOMESTIC VIOLENT EXTREMISM

23. AUTONOMOUS WEAPON SYSTEMS: HOW THE HUMAN OPERATOR STAYS INVOLVED

24. CHINA COAST GUARD REFORMS FROM 2013 TO PRESENT

25. The Electromagnetic Threat to the US: Resilience Strategy Recommendations

26. IOT IN CRISIS MANAGEMENT

27. Should Homeland Security Studies Survive?

30. The Electromagnetic Threat to the US: Resilience Strategy Recommendations

34. MISSING AN OPPORTUNITY: NON-TRADITIONAL RESPONDERS AND ACTIVE SHOOTER RESPONSE

35. READY FOR THE HOME GAME? THE SURFACE NAVY AND HOMELAND DEFENSE

36. UNITED STATES NATIONAL SECURITY POLICY TOWARDS THE PANAMA CANAL IN AN ERA OF GREAT POWER CONFLICT

37. REEXAMINING THE LENGTH OF LAW ENFORCEMENT CAREERS

38. CONNECTING THE DOTS OF AN OPAQUE CRIME: ANALYZING THE INFORMATION-SHARING FRAMEWORK AND PRACTICES OF CALIFORNIA’S HUMAN-TRAFFICKING TASK FORCES

39. THE BOMBER WILL ALWAYS GET THROUGH: THE ORIGIN OF THE B-21 STEALTH BOMBER

40. OPENING THE APERTURE: HOLISTIC MITIGATION OPTIONS IN RESPONSE TO UAS THREATS

41. 2035 AND U.S. NAVY INTELLIGENCE: COMMUNITY MANNING FOR SUCCESS IN THE INDO-PACIFIC

42. U.S. HOSTAGE POLICY: THE EFFECTIVENESS OF RANSOM PAYMENTS ON THE DURATION IN CAPTIVITY FOR AMERICAN HOSTAGES

43. SAFEGUARDING THE SCHOOL COMMUNITY: A STANDARDIZED APPROACH TO STATEWIDE BEHAVIORAL THREAT ASSESSMENT PROGRAMS

44. THE ELECTROMAGNETIC THREAT TO THE UNITED STATES: RECOMMENDATIONS FOR CONSEQUENCE MANAGEMENT

45. FINDING SAFETY IN NUMBERS: EXPLORING THE POSSIBILITIES OF TERRORISM CONSEQUENCE MODELS AS PUBLIC SAFETY PLANNING TOOLS

46. TO DETAIN OR NOT TO DETAIN: THE LEGAL, FINANCIAL, AND HUMANITARIAN RAMIFICATIONS OF DETAINING ALL MIGRANTS WITHOUT A LAWFUL STATUS

47. VULNERABILITY ANALYSIS OF GUAM’S DEFENSE POSTURE

48. CHINA COAST GUARD REFORMS FROM 2013 TO PRESENT

50. SECURING AMERICA’S HUMANITARIAN MISSION: HOW MOBILE TECHNOLOGY CAN ENHANCE REFUGEE VETTING

Catalog

Books, media, physical & digital resources