Biblio

Export 8062 results:
2005
Nesser, Petter. "Post-millennium Patterns of Jihadist Terrorism in Western Europe–Part 1." Jane’s Terrorism and Security Monitor (2005).
Prevention, preparedness and response to terrorist attacks In Official Journal C 14., 2005.
Dang, Tran Khanh. "Privacy-Preserving Basic Operations on Outsourced Search Trees." In International Workshop on Privacy Data Management – PDM05, in conjunction with ICDE05, IEEE Computer Society. Tokyo, Japan, 2005.
Holmqvist, Caroline. Private Security Companies: The Case for Regulation In SIPRI Policy Paper. Stockholm: SIPRI, 2005.
Moller, Bjorn. Privatisation of Conflict, Security and War In DIIS Working Paper. Copenhagen: Danish Institute For International Studies, 2005.
Schreier, Fred, and Marina Caparini. Privatising Security: Law, Practice and Governance of Private Military and Security Companies. Geneva: DCAF, 2005.
Marsh, David. Project D3 – CLIL Matrix In Central Workshop. Graz: European Centre for Modern Languages, 2005.
Heldman, Kim. Project Manager’s Spotlight on Risk Management. Alameda, CA: SYBEX, 2005.
Edmunds, Bryan D.. Project Portfolio Management: An Investigation of One Air Force Product Center. Air Force Institute of Technology, 2005.
Winner, Andrew C.. "The Proliferation Security Initiative: The New Face of Interdiction." The Washington Quarterly 28, no. 2 (2005): 130.
Umarov, Adiljon, and Dmitry Pashkun. "The Prospects for Chinese Influence in Central Asia." CEF Quarterly–The Journal of the China-Eurasia Forum (2005).
PSI Frequently Asked Questions. U.S. Department of State, 2005.
Hidayat, Komaruddin. "Psikologi Terorisme." Kompas (2005).
Post, Jerrold M.. "Psychological Operations and Counterterrorism." Joint Force Quarterly 37 (2005).
Kilroy, Jr., Richard J.. "Public Diplomacy: Government, Universities, and the War on Terrorism." Journal of Public Affairs 132 (2005).
Thomas, Brian Johnson, and Mark Franchetti. "Radioactive Rockets ‘For Sale’ in Breakaway Soviet Republic." Times (2005).
M.L, Gagnon. Rapport Fusion de Donn´ees In Technical Report, D´epartement de G´enie Electrique et de G´enie informatique, Universit´e de Laval, Canada., 2005.
Mishra, Pankaj. "The Real Afghanistan." New York Review of Books (2005): 44-48.
Bacevich, Andrew J.. "The Realist Persuasion." The Boston Globe (2005).
Umpleby, Stuart A.. "Reflexivity in Social Systems: The Theories of George Soros." In Annual meeting of the American Society for Cybernetics. Washington, DC: The George Washington University, 2005.
Surtees, Rebecca. Regional Clearing Point’s Second Annual Report on Victims of Trafficking in South Eastern Europe. Geneva: IOM, 2005.
Walt, Stephen M.. "The Relationship Between Theory and Policy in International Relations." Annual Review of Political Science 8 (2005): 23-48.
Joseph, Robert G.. Remarks before the Senate Foreign Relations Committee, Hearing on U.S.-India Civil Nuclear Cooperation Initiative . U.S. Under Secretary for Arms Control and International Security, , 2005.
R. Burns, Nicholas. Remarks to the Thirteenth Ministerial Council of the Organization for Security and Cooperation in Europe In Under Secretary of State for Political Affairs. Ljubljana, Slovenia, 2005.
Report on Money Laundering and Terrorist Financing Typologies 2004-2005, FATF-XV . Financial Action Task Force on Money Laundering (FATF), 2005.

Страници