Biblio

Export 21423 results:
Filters: Filter is   [Clear All Filters]
2010
Mednikarov, Boyan, Kalin Kalinov, and Nedko Dimitrov. Transforming Maritime Education: Local Decisions in Global Perspective In 11th Annual General Assembly of IAMU. Busan, Corea, 2010.
Transparency International Corruption Perception Index 2010., 2010.
Hughes, Rex. "A Treaty for Cyberspace." International Affairs 86, no. 2 (2010): 533.
Lorenzi, Fabiana, Gabriel Baldo, Rafael Costa, Mara Abel, Ana Bazzan, and Francesco Ricci. "A Trust Model for Multiagent Recommendations." Journal of Emerging Technologies in Web Intelligence 2, no. 4 (2010).
Yeh, Kuo-Hui, Chunhua Su, Nai Wei Lo, Yingjiu Li, and Yi-Xiang Hung. "Two Robust Remote User Authentication Protocols Using Smart Cards." The Journal of Systems and Software 83, no. 12 (2010).
Al-Hakkak, Nada M., and Nawal A. Ibrahim. "UML-XML for Discrete Event Simulation with Automatic Code Generation Ability." Iraq Academic Scientific Journal 25 (2010): 415-430 .
Kavalski, Emilian. "Uncovering the “New” Central Asia: The Dynamics of External Agency in a Turbulent Region." In The New Central Asia. The Regional Impact of International Actors. Western Sydney, Australia: World Scientific Publishing, University of Western Sydney, 2010.
McCarry, Charles. "Under Cover of Ineptitude." The New York Times (2010).
Mesko, Gorazd, Dejana Dimitrievic, and Charles Fields. Understanding and Managing Threats to the Environment in South Eastern Europe. Dordrecht: Springer, 2010.
Bellamy, Alex J., Paul D. Williams, and Stuart Griffin. Understanding Peacekeeping. Cambridge: Polity Press, 2010.
Mihalka, Michael D., and Mark R. Wilcox. "Unintended Strategic Consequences of Security Assistance in the South Caucasus." Joint Force Quarterly (2010): 24-28.
A. Dorn, Walter. United Nations Under-Secretary General for Peacekeeping Operations. Tokyo: United Nations University Press, 2010.
The United States’ National Security Strategy 2010., 2010.
"United States Nuclear Regulatory Commission, Cyber Security Programs For Nuclear Fa-cilities, Regulatory Guide ." (2010).
Peppard, Joe. "Unlocking the Performance of the Chief Information Officer (CIO)." California Management Review 52, no. 4 (2010): 5.
Falaki, S. O., B. K. Alese, and W. O. Ismaila. "An update research on credit card on-line transactions." International Journal of Economic Development Research and Investment 1, no. 2 & 3 (2010).
Uprising Worsens Kyrgyzstan Economic Woes. BBC News, 2010.
"Urgent Problems and the Logic of Military Reform." Russian Politics and Law 48, no. 3 (2010): 59.
Alexander, Keith. U.S. Cybersecurity Policy and the Role of U.S. CYBERCOM In CSIS Cybersecurity Policy Debate Series., 2010.
U.S. Department of Defense Quadrennial Defense Review. Washington, D.C.: U.S. Department of Defense, 2010.
Fairclough, Gordon. "U.S., Poland Amend Missile-Defense Plan." Wall Street Journal (2010).
Conley, Heather, and Jamie Kraut. "U.S. Strategic Interests in the Arctic." Center for Strategic & International Studies (2010).
Hughes, Geraint. "The Use of Undercover Military Units in Counter-Terrorist Operations: A Historical Analysis with Reference to Contemporary Anti-terrorism." Small Wars and Insurgencies 21, no. 4 (2010): 561-90.
Pruyt, Erik. Using Small Models for Big Issues: Exploratory System Dynamics Modelling and Analysis for Insightful Crisis Management In 18th International Conference of the System Dynamics Society. Seoul, Korea, 2010.
Murphy, Robert K., and Scott D. Beach. "Using Strategic Planning in Support of Defense Acquisitions." Information & Security: An International Journal 25 (2010): 57-77.

Pages