Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21407 results:
RTF
EndNote XML
2004
Thomas, Timothy L.
.
"
Russia’s Reflexive Control Theory and the Military
."
Journal of Slavic Military Studies
17 (2004): 237-256.
Google Scholar
RTF
EndNote XML
Bendersky, Yevgeny
.
Russia-China Relationship Favors Beijing
. Asia Times Online, 2004.
Google Scholar
RTF
EndNote XML
McDermott, Roger
.
"
Russian Interior Troops Expand Security Role
."
Eurasia Daily Monitor
1, no. 146 (2004).
Google Scholar
RTF
EndNote XML
Beasly, Kris D.
.
Russian Military Reform from Perestroika to Putin: Implications for U.S. Policy
. Maxwell AFB Alabama: Air University, 2004.
Google Scholar
RTF
EndNote XML
Bogaturov, Aleksei D.
, and
Tatyana A. Shakleyyina
.
"
The Russian Realist School of International Relations
."
Communist and Post-Communist Studies
37, no. 1 (2004): 37.
Google Scholar
RTF
EndNote XML
Malek, Martin
.
"
Russlands Kriege in Tschetschenien: ‘Wiederherstellung der verfassungsmäßigen Ordnung,’ ‘Antiterror-Operationen’ oder Völkermord?
"
Zeitschrift für Genozidforschung
5, no. 1 (2004): 102-29.
Google Scholar
RTF
EndNote XML
Tarasyuk, Olga M.
,
Vyacheslav S. Kharchenko
, and
Vladimir V. Sklyar
.
"
Safety of Airspace Technique and Reliability of Computer Systems
."
Aviation and Space Technique and Technology
(2004).
Google Scholar
RTF
EndNote XML
The SARS Commission Interim Report – SARS and Public Health in Ontario
. Ministry of Health and Long-Term Care, 2004.
Google Scholar
RTF
EndNote XML
SAS-028 “Cost Structure and Life Cycle Costs for Military Systems"
., 2004.
Google Scholar
RTF
EndNote XML
SAS-054 “Methods and Models for Life Cycle Costing"
., 2004.
Google Scholar
RTF
EndNote XML
S.C. Res. 1566
., 2004.
Google Scholar
RTF
EndNote XML
McGeary, Johanna
.
"
The Scandal’s Growing Stain
."
Time
(2004).
Google Scholar
RTF
EndNote XML
Sherstyuk, Vladimir P.
.
Scientific and Methodological Problems of Information Security
. Moscow: Information Security Institute of Moscow State University, 2004.
Google Scholar
RTF
EndNote XML
Liaw, Horng-Twu
.
"
A Secure Electronic Voting Protocol for General Elections
."
Computers and Security
23, no. 2 (2004): 107-119.
Google Scholar
RTF
EndNote XML
Surendro, Kridanto
, and
Setiyo Cahyono
.
"
Secure e-Mail Application Software for Government in Indonesia
."
Information & Security: An International Journal
15, no. 2 (2004): 135-150.
DOI
Google Scholar
RTF
EndNote XML
Tahir, Muhammad Nabeel
.
"
A Secure Online Medical Information System in Distributed and Heterogeneous Computing Environment
."
Information & Security: An International Journal
15 (2004): 211-215.
DOI
Google Scholar
RTF
EndNote XML
Canada, Government of
.
Securing an Open Society: Canada’s National Security Strategy
., 2004.
Google Scholar
RTF
EndNote XML
Awasthi, Amit Kumar
, and
Sunder Lal
.
Security Analysis of a Dynamic I-Based Remote User Authentication Scheme
., 2004.
Google Scholar
RTF
EndNote XML
Forsberg, Tuomas
.
"
Security and Defense Policy in the New European Constitution: A Critical Assessment
."
Connections: The Quarterly Journal
3, no. 3 (2004): 13-27.
DOI
Google Scholar
RTF
EndNote XML
Aradau, Claudia
.
"
Security and the democratic scene: desecuritization and emancipation
."
Journal of International Relations and Development
7, no. 4 (2004): 388-413.
DOI
Google Scholar
RTF
EndNote XML
Huasheng, Zhao
.
Security Building in Central Asia and the Shanghai Cooperation Organization
. Slavic Research Center, 2004.
Google Scholar
RTF
EndNote XML
Barstow, David
.
"
Security Firm Says Its Workers Were Lured Into Iraqi Ambush
."
New York Times
(2004).
Google Scholar
RTF
EndNote XML
Chandler, Jennifer A.
.
"
Security in Cyberspace: Combating Distributed Denial of Service Attacks
."
University of Ottawa Law & Technology Journal
(2004): 231-261.
Google Scholar
RTF
EndNote XML
Donnelly, Christopher
.
"
Security in the 21st Century: New Challenges and New Responses
." In
NATO and New International Relations
, 24-26. Zagreb: Atlantic Council of Croatia & Political Culture Publishing and Research Institute, 2004.
Google Scholar
RTF
EndNote XML
Hsu, Chien-Lung
.
"
Security of Chien et al.’s Remote User Authentication Scheme Using Smart Cards
."
Computer Standards and Interfaces
26, no. 3 (2004): 167-169.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
630
631
632
633
634
635
636
637
638
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance