Biblio

Export 21423 results:
Filters: Www.state.gov is secretary and Rm is 2011 and 11 is 176999.htm  [Clear All Filters]
2006
Gordon, Sarah, and Richard Ford. "On the definition and classification of cyber crime." Journal in Computer Virology 2, no. 1 (2006): 13-20.
Aydin, Mustafa. "De-legitimizing Religion as a Source of Identity-Based Security Threats in a Global World." Connections: The Quarterly Journal 5, no. 3 (2006): 7-18.
White, Gregory L., and Alistair MacDonald. "Demand Allows Rosneft to Price IPO at High End." The Wall Street Journal (2006).
Stevenson, Jonathan. "Demilitarising the ‘War on Terror’." Global Politics and Strategy 48, no. 2 (2006): 37-54.
The Democratic Control of Inter-governmental Intelligence Cooperation In Working Paper. Geneva: Centre for the Democratic Control of Armed Forces, 2006.
Kharchenko, Vyachelsav. "Dependability and Dependable Systems: Elements of Methodology." Radioelectronics and Computer Systems 5 (2006).
Mehtiev, Colonel Ilham. "Deputy Head of State Border Protection Service of Azerbaijan." Echo 147 (2006).
Münkler, Herfried. Der Wandel des Krieges: Von der Symmetrie zur Asymmetrie. Weilerswist: Velbrück, 2006.
Münkler, Herfried. Der Wandel des Krieges: Von der Symmetrie zur Asymmetrie (The Change of War: From Symmetry to Asymmetry). Weilerswist: Velbrück, 2006.
Kenyon, Ian R., and John Simpson. "Deterrence and Deterrability." Deterrence and the New Global Security Environment (2006).
Deterrence and the New Global Security Environment. Abingdon: Routledge, 2006.
Agency), FEMA(Federal E.. Developing and Managing Volunteers Independent Study. USA, 2006.
Disaster Protection Law. State Gazette 112 (19 December 2006), last amendment State Gazette 53 (27 June 2014), 2006.
Mudyarabikwa, Oliver, and Angelbrecht Mbengwa. Distribution of public sector health workers in Zimbabwe: A challenge for equity in health In Equinet discussion paper., 2006.
Wu, M., R.C. Miller, and S. Garfinkel. "Do Security Toolbars Actually Prevent Phishing Attacks." ACM Computer/Human Interaction (2006): 601-610.
Doctrine for Sub-Conventional Operations. New Delhi: Integrated Headquarters of Ministry of Defense (Army), 2006.
Kuzmanov, Krassimir. "Does NATO Have a Role in the Fight Against International Terrorism Analysis of NATO's Response to September 11." Information & Security: An International Journal 19 (2006): 61-84.
Dezert, Jean, and Florentin Smarandache. DSmT: A new paradigm shift for information fusion In Cogis’06 conference. Paris France, 2006.
HUANG, Xinhan, Xinde LI, and Min WANG. "A DSmT-based Fusion Machine for Robot's Map Reconstruction." In Advances and Applications of DSmT for Information Fusion. Vol. 2: Collected Works. American Research Press, Rehoboth, 2006.
Foot, Peter, and Sean Costigan. "Editors’ Foreword." Connections: The Quarterly Journal 5, no. 2 (2006): 1-2.
Fuertes, W, J E. Lopez de Vergara, and F Meneses. Educational Platform using Virtualization Technologies: Teaching-Learning Applications and Research Use Cases. ACE II, 2006.
Billiet, Jaak, and Hans Waege. Een samenleving onderzocht. Methoden van sociaal-wetenschappelijk onderzoek. Antwerpen: De Boeck, 2006.
Chang, Chin-Chen, and Jung- San Lee. "An Efficient and Secure Remote Authentication Scheme Using Smart Cards." Information & Security: An International Journal 18 (2006): 122-133.
Sharif, Naubahar. "Emergence and Development of the National Innovation Systems Concept." Research Policy 35, no. 5 (2006): 745-66.
Canton, L.G.. Emergency Management: Concepts and Strategies for Effective Programs. Wiley: Hoboken, NJ, 2006.

Pages