Better to exist: A reply to Benatar

Search for the full text: Google | DOI

Baum S.D. (2008) Better to exist: A reply to Benatar, in Journal of Medical Ethics 34, 875-876.

Modeling of geochemical cycles: Phosphorus as an example

Search for the full text: Google | DOI

Lerman A., Mackenzie F.T., Garrels R.M. (1975) Modeling of geochemical cycles: Phosphorus as an example, in Memoir of the Geological Society of America 142, 205-218.

Doomsday Religious Movements: Canadian security intelligence service

Search for the full text: Google

[authors not available] (2002) Doomsday Religious Movements: Canadian security intelligence service, in Terrorism and Political Violence 14, 53-60.

An infrared divergence in the cosmological measure theory and the anthropic reasoning

Search for the full text: Google | DOI

Yurov A.V., Yurov V.A., Astashenok A.V., Shpilevoi A.A. (2011) An infrared divergence in the cosmological measure theory and the anthropic reasoning, in European Physical Journal C 71, 1-10.

Drugs as an existential threat: An analysis of the international securitization of drugs

Search for the full text: Google | DOI

Crick E. (2012) Drugs as an existential threat: An analysis of the international securitization of drugs, in International Journal of Drug Policy 23, 407-414.

The millennium and narrative closure

Search for the full text: Google

Gutierrez C. (2005) The millennium and narrative closure, in War in Heaven/Heaven on Earth: Theories of the Apocalyptic [volume not available], 47-60.

Freud's civilization revisited in the nuclear age

Search for the full text: Google

O'Brien J.C. (2001) Freud's civilization revisited in the nuclear age, in International Journal of Social Economics 28, 409-425.

Science and doom [3]

Search for the full text: Google

Laucks I.F. (1961) Science and doom [3], in Chemical and Engineering News 39, [pages not available].

Crouching tiger or phantom dragon Examining the discourse on global cyber-terror

Search for the full text: Google | DOI

Helms R., Costanza S.E., Johnson N. (2012) Crouching tiger or phantom dragon Examining the discourse on global cyber-terror, in Security Journal 25, 57-75.

US environmental history: Inviting doomsday

Search for the full text: Google

Wills J. (2012) US environmental history: Inviting doomsday, in US Environmental History: Inviting Doomsday [volume not available], 1-233.

Previous page Next page

Page number: 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81, 82, 83, 84, 85, 86, 87, 88, 89, 90, 91, 92, 93, 94, 95, 96, 97, 98, 99, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 117, 118, 119, 120, 121, 122, 123, 124, 125, 126, 127, 128, 129, 130, 131, 132, 133, 134, 135, 136, 137, 138, 139, 140, 141, 142, 143, 144, 145, 146, 147, 148, 149, 150, 151, 152, 153, 154, 155, 156, 157, 158, 159, 160, 161, 162, 163, 164, 165, 166, 167, 168, 169, 170, 171, 172, 173, 174, 175, 176, 177, 178, 179, 180, 181, 182, 183, 184, 185, 186, 187, 188, 189, 190, 191, 192, 193, 194, 195, 196, 197, 198, 199, 200, 201, 202, 203, 204, 205, 206, 207, 208, 209, 210, 211, 212, 213, 214, 215, 216, 217, 218, 219, 220, 221, 222, 223, 224, 225, 226, 227, 228, 229, 230, 231, 232, 233, 234, 235, 236, 237, 238, 239, 240, 241, 242, 243, 244, 245, 246, 247, 248, 249, 250, 251, 252, 253, 254, 255, 256, 257, 258, 259, 260, 261, 262