Biblio

Export 21423 results:
Filters: Filter is   [Clear All Filters]
2009
Agordzo, Benjamin Kwasi. "Filling the ‘Security Gap’ in Post-conflict Situations: Could Formed Police Units Make a Difference?" International Peacekeeping 16, no. 2 (2009): 287-94.
Paget, François. Financial Fraud and Internet Banking: Threats and Countermeasures In McAfee report. Santa Clara: CA: McAfee, 2009.
Chen, Hua, and Yi Guo. "Fine-grained Security Model of Multi-agent Communication with XML Specifications." Journal of Xi'an Technological University 29, no. 1 (2009).
Böck, Benjamin. Firewire-based Physical Security Attacks on Windows 7, EFS and BitLocker. Security Research Lab Secure Business Austria, 2009.
First COI of the Sixteenth Election Period In Bundestag print., 2009.
Dorronsoro, Gilles. Focus and Exit: An Alternative Strategy for the Afghan War. Washington, D.C.: Carnegie Endowment for International Peace, 2009.
For a Euro-Atlantic Partnership (EAP) Looking to the Future: Proposals for NATO’s New Strategic Concept. Government of Austria, Ireland and Switzerland, 2009.
"For Irish, E.U. May Stand for Economic Unity." The New York Times (2009).
Tarasyuk, O.M., and A.V. Gorbenko. "For Methods for Development of Critical Software." In Lecture Materials. Kharkiv: National Aerospace University Institute “KhAI”, 2009.
Giegerich, B., and V. Comolli. FORESEC Deliverable D 4.5 Report on European Security: Trends, Drivers, Threats., 2009.
Mansour, Riham Hassan Abd. Formal Analysis and Design for Engineering Security (FADES). Vol. PhD Dissertation. Blacksburg, VA: Virginia Polytechnic Institute and State University, 2009.
Tagarev, Todor, Tsvetomir Tsachev, and Nikolay Zhivkov. "Formalizing the Optimization Problem in Long-Term Capability Planning." Information & Security: An International Journal 23, no. 1 (2009): 99-114.
Former Bulgarian Defence Minister Facing Contract Fraud Charges. Agence France-Presse, 2009.
Tiffou, Jean-Pierre. Former French Military Representative to the EU In Vice Admiral Jean-Pierre Tiffou, interview by Bjoern H. Seibert., 2009.
Baylouny, Anne Marie. "Fragmented Space and Violence in Palestine." International Journal on World Peace XXVI, no. 3 (2009).
Vatsa, Mayank, Richa Singh, and Afzel Noore. "Framework for biometric match score fusion using statistical and belief models." In Advances and Applications of DSmT for Information Fusion. Vol. III. Rehoboth: American Research Press (ARP), 2009.
Borissova, Daniela, and Ivan Mustakerov. "A Framework of multimedia e-learning design for engineering training." In Advances in Web Based Learning, LNCS, 88-9. Vol. 5686., 2009.
France’s GDF Suez to join Nord Stream pipeline. EurActive.com, 2009.
Crumley, Bruce. "French Terror Conviction: Lesson for the US?" Time (2009).
Dagher, Sam. "Fresh Paint and Flowers at Iraqi House of Horrors." New York Times (2009).
Kühn, Ulrich. From Capitol Hill to Istanbul: The Origins of the Current CFE Deadlock In CORE Working Paper., 2009.
Kuehl, Daniel T.. "From Cyberspace to Cyberpower: Defining the Problem." In Cyberpower and National Security. Washington, D.C.: National Defense University Press, 2009.
Ajzen, Icek, Cornelia Czasch, and Michael Flood. "From Intentions to Behavior: Implementation Intention, Commitment, and Conscientiousness." Journal of Applied Social Psychology 39, no. 6 (2009): 1356-7.
Patterson, Malcolm Hugh. "From Mercenary to UN Contractor?" In Privatising Peace: A Corporate Adjunct to United Nations Peacekeeping and Humanitarian Operations, 39-87. London: Palgrave Macmillan, 2009.
Shackelford, Scott J.. "From Nuclear War to Net War: Analogizing Cyber Attacks in International Law." Berkeley Journal of International Law 27 (2009): 196-97.

Pages