Biblio

Export 8062 results:
2004
Thomas, T.. Comparing U.S., Russian and Chinese Information Operations Concepts. Fort Leavenworth, KS: Foreign Military Studies Office, 2004.
Hänggi, Heiner. "Conceptualising Security Sector Reform and Reconstruction." Reform and Reconstruction of the Security Sector (2004): 3-18.
Hänggi, Heiner. "Conceptualising Security Sector Reform and Reconstruction." In Reform and Reconstruction of the Security Sector, edited by Alan Bryden and Heiner Hänggi, 3-18. Münster, Germany: Lit Verlag, 2004.
Zilmer-Johns, Lisbet. "The Convention, the IGC and the Great Powers. The ESDP and the New Security Threats." In The Politics of European Security, 55-82. Copenhagen: Danish Institute of Inter¬national Affairs, 2004.
Archibugi, Daniele. "Cosmopolitan Democracy and its Critics: A Review." European Journal of International Relations 10 (2004): 437-473.
"Council Directive 2004/67/EC concerning measures to safeguard security of natural gas supply." Official Journal L 127 (2004): 0092-0096.
Jenkins, Brian Michael. "Countering Al Qaeda." In Defeating Terrorism: Shaping the New Security Environment. Guilford, CT: McGraw-Hill, 2004.
Jenkins, Brian Michael. "Countering Al Qaeda." In Defeating Terrorism: Shaping the New Security Environment. Guilford: CT: McGraw-Hill, 2004.
Country Factsheets Eurasian Narcotics: Ukraine 2004., 2004.
Solovei, Valery. "Crisis For Export." Rodnaya Gazeta 48 (2004).
Lewis, Bernard. The Crisis of Islam . New York: Random House, 2004.
Yalowitz, Kenneth, and Svante E. Cornell. "The Critical but Perilous Caucasus." Orbis 48, no. 1 (2004): 105-16.
Cryptographic Randomized Response Techniques In Public Key Cryptography – PKC 2004: 7th International Workshop on Theory and Practice in Public Key Cryptography. Singapore: Computer Science 2947, 2004.
Ambainis, Andris, Markus Jakobsson, and Helger Lipmaa. Cryptographic Randomized Response Techniques In Public Key Cryptography – PKC 2004: 7th International Workshop on Theory and Practice in Public Key Cryptography, Edited by Feng Bao, Robert H. Deng and Jianying Zhou. Singapore: Computer Science 2947, 2004.
Ratner, Carl. "A Cultural Critique of Psychological Explanations of Terrorism." Cross-Cultural Psychology Bulletin 38 (2004).
Milanovic, Nikola, and Miroslaw Malek. "Current Solutions for Web Service Composition." IEEE Internet Computing 8, no. 6 (2004): 51-59.
San Wang, Wen-. Current Status & Future Perspective of PKI Development in Taiwan In paper presented at the International Conference of Collaboration of e-Commerce Applications and Security. Taipei, Taiwan, 2004.
Hinnen, Todd M.. "The Cyber-Front in the War on Terrorism: Curbing Terrorist Use of the Internet." Columbia Science and Technology Law Review 5 (2004).
Hébert, Jean-Paul. "D’Une Production Commune à Une Production Unique? La coopération Européenne en Matière de Production d’Armement Comme Moyen de Renforcement de l’Autonomie Stratégique Européenne." In Historie de la Coopération Européenne dans L’Armement, 200-17. Paris: CNRS Éditions, 2004.
Seifert, Jeffrey W.. Data Mining: An Overview. Washington, DC: Congressional Research Service, 2004.
Lieshout, Robert, Mathieu Segers, and Anna Vleuten. "De Gaulle, Moravcsik, and The Choice for Europe: Soft Sources, Weak Evidence." Journal of Cold War Studies 6, no. 4 (2004): 89-139.
Levi, Jean-Daniel, and Hughes Verdier. De L’Arsenal à L’Entreprise. Paris: Albin Michel, 2004.
Ulvila, Jacob W., and John E. Gaffney, Jr. "A Decision Analysis Method for Evaluating Computer Intrusion Detection Systems." Decision Analysis 1, no. 1 (2004): 35-50.
Defence and Security Sector Governance and Reform in South East Europe Self-Assessment Studies: Regional Perspectives. Baden-Baden: Nomos, 2004.
Norton-Taylor, Richard. "Defence Chief Warns Forces are Overstretched." The Guardian (2004).

Страници