Biblio

Export 21313 results:
2004
"Decreto." Diario Oficial de la Federacion (2004).
Defence and Security Sector Governance and Reform in South East Europe Self-Assessment Studies: Regional Perspectives. Baden-Baden: Nomos, 2004.
Norton-Taylor, Richard. "Defence Chief Warns Forces are Overstretched." The Guardian (2004).
Zervakis, Peter A.. "Defense Academy Excellence Cyprus in Europe: Solving the Cyprus Problem by Europeanizing it?" Connections: The Quarterly Journal 3, no. 1 (2004): 107-132.
On Defense and Hungarian Defense Forces. Law of the National Assembly, CV/2004 , 2004.
Abazi, Enika. "Defense Reform of the Albanian Armed Forces: Democratization and Transformation." Connections: The Quarterly Journal 3, no. 3 (2004): 29-38.
Dyer, Gwynne. "Defining Iraq war image conveys ugly symbolism." Bangor Daily News (2004).
Delivering Security in a Changing World. Vol. 1. Defence White Paper 1., 2004.
Jensen, Benjamin. "Demilitarising Demographics: US Policy Options for Strengthening Georgian Internal Security." Low Intensity Conflict & Law Enforcement 12, no. 1 (2004): 51-90.
Rotar, Igor. "Demographics, Borders Complicate Anti-Terrorism Efforts in Central Asia." Eurasia Daily Monitor (2004).
Steinkamm, Armin A.. "Der “Irak-Krieg:” Eine Herausforderung an das Völkerrecht." Wissenschaft & Sicherheit (2004).
Beck, Ulrich. Der kosmopolitische Blick, oder Krieg ist Frieden. Frankfurt am Main: Suhrkamp, 2004.
Vasudevan, Sudarshan, Jim Kurose, and Don Towsley. Design and Analysis of a Leader Election Algorithm for Mobile Ad Hoc Networks In Proceedings of the 12th IEEE International Conference on Network Protocols, ICNP 2004. IEEE Computer Society, 2004.
CHEN, Yi-Hui, and Eric Jui- Lin LU. "Design of a Secure Fine-Grained Official Document Exchange Model for E-Government." Information & Security: An International Journal 15 (2004): 55-71.
Wagner, Paul J., and Jason M. Wudi. Designing and Implementing a Cyberwar Laboratory Exercise for a Computer Security Course. SIGCSE'04, 2004.
González-Lloret, Marta. "Designing Task-Based Call to Promote Interaction: En Busca de Esmeraldas." Language Learning and Technology 7, no. 1 (2004): 86-104.
Zeidan, Sami. "Desperately Seeking Definition: The International Community’s Quest for Identifying the Specter of Terrorism." Cornell International Law Journal 36, no. 3 (2004): 491.
Bowen, Wyn Q.. "Deterrence and Asymmetry: Non-state Actors and Mass Casualty Terrorism." Contemporary Security Policy 25, no. 1 (2004): 54-70.
Gorbenko, Anatoly, Peter Popov, Alexander Romanovsky, Artem Boyarchuk, and Vyacheslav Kharchenko. "Development of Dependable Web Services out of Undependable Web Components." Technical Report CS-TR (Newcastle: School of Computing Science (2004).
Cenys, Antanas, Darius Rainys, Lukas Radvilavicius, and Andrej Bielko. "Development of Honeypot System Emulating Functions of Database Server." In RTO IST Symposium on “Adaptive Defence in Unclassified Networks”. Toulouse, France, 2004.
Smith, John. The Development of Response Forces in NATO and the EU and the Evolving NATO-EU Relationship. NATO Parliamentary Assembly, Committee Reports, 2004 Annual Session , 2004.
Strohm, Chris. "DHS Scraps Computer Pre-Screening System, Starts Over." Government Executive Online (2004).
Sheehan, Michael. "Diplomacy." In Attacking Terrorism: Elements of a Grand Strategy, 97-114. Washington, D.C.: Georgetown University Press, 2004.
King, Gilbert. Dirty Bomb: Weapons of Mass Disruption. New York: Chamberlain Bros, 2004.
Doyle, T., E. Dugan, B. Humphries, and R. U. Newton. "Discriminating between elderly and young using a fractal dimension analysis of centre of pressure." Int J Med Sci 1, no. 1 (2004): 11-20.

Pages