Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21404 results:
RTF
EndNote XML
2004
Kimmel, Michael
, and
Amy Aronson
.
Men and Masculinities: A Social, Cultural and Historical Encyclopedia
. Santa Barbara, CA: ABC-CLIO, 2004.
Google Scholar
RTF
EndNote XML
Catan, Thomas
.
"
Mercenaries Seek a Change of Image
."
Financial Times Special Report: Defence Industry
(2004).
Google Scholar
RTF
EndNote XML
Pelton, Robert Young
.
"
Mercenary Hits It Big, Thanks to Iraq
."
Los Angeles Times
(2004).
Google Scholar
RTF
EndNote XML
Huyck, Charles K.
,
Beverley J. Adams
,
Sungbin Cho
,
Ronald T. Eguchi
,
Babak Mansouri
, and
Bijan Houshmand
.
Methodologies for Post-Earthquake Building Damage Detection Using SAR and Optical Remote Sensing
. Marmara, Turkey : Earthquake, 2004.
Google Scholar
RTF
EndNote XML
Kovacevic, Živorad
.
Međunarodno pregovaranje (International Negotiations)
. Belgrade: Filip Viśnjic´ Diplomatska akademija MSP , 2004.
Google Scholar
RTF
EndNote XML
The Microsoft® Operations Framework (MOF) Risk Management Discipline for Operations
., 2004.
Google Scholar
RTF
EndNote XML
Verkaaik, Oskar
.
Migrants and Militants: Fun and Urban Violence in Pakistan
. Princeton: Princeton University Press, 2004.
Google Scholar
RTF
EndNote XML
Phister, Paul W.
, and
Igor G. Plonish
.
"
Military applications of information technologies
."
Air and Space Power Journal
18, no. 1 (2004): 77-90.
Google Scholar
RTF
EndNote XML
Military Division, Operation Artemis: The Lessons of the Interim Emergency Multinational Force
In
Peacekeeping Best Practices Unit
. United Nations, 2004.
Google Scholar
RTF
EndNote XML
Hoyt, Timothy D.
.
"
Military Force
." In
Attacking Terrorism: Elements of a Grand Strategy
, 162-85. Washington, D.C.: Georgetown University Press, 2004.
Google Scholar
RTF
EndNote XML
Military Studies in the Jihad Against the Tyrants: The Al-Qaeda Training Manual
. Maxwell Air Force Base, AL: USAF Counterproliferation Center, 2004.
Google Scholar
RTF
EndNote XML
Military Transformation: Fielding of Army’s Stryker Vehicles Is Well Under Way, but Expectations for Their Transportability by C-130 Aircraft Need to Be Clarified
In
Report GAO-04-925
. Washington D.C.: GAO, United States Government Accounting Office, 2004.
Google Scholar
RTF
EndNote XML
Waquet, Philippe
.
"
Mine Hunting with Drones
."
Information & Security: An International Journal
13 (2004): 98-111.
DOI
Google Scholar
RTF
EndNote XML
Czerny, Inga
.
"
Ministrowie spraw wewnetrznych krajow UE o walce z terroryzmem (Ministers of internal affairs of EU states on battle against terrorism)
."
Gazeta Wyborcza
(2004).
Google Scholar
RTF
EndNote XML
"
Mission Reports – Visit to Moldova by the Subcommittee on Democratic Governance [Civil Dimension of Security]
." In
NATO Parliamentary Assembly
., 2004.
Google Scholar
RTF
EndNote XML
Cohen, Marc
.
Mobile Lunar Base Concepts
In
AIP Conference Proceedings
. Vol. 699., 2004.
Google Scholar
RTF
EndNote XML
Iagnemma, Karl
, and
Steven Dubowsky
.
Mobile Robots in Rough Terrain: Estimation, Motion Planning, and Control with Application to Planetary Rovers
. Springer Science & Business Media, 2004.
Google Scholar
RTF
EndNote XML
Zaharieva, Maia
, and
Wolfgang Klas
.
"
MobiLearn: An Open Approach for Structuring Content for Mobile Learning Environments
." In
Web Information Systems
, 114-24. Berlin, Heidelberg: Springer Verlag, 2004.
Google Scholar
RTF
EndNote XML
Podgayetskaya, Tatyana
, and
Wolffried Stucky
.
A Model of Business Process Support System for e-Government
In
15th International Workshop on Database and Expert Systems Applications (DEXA’04)
. Zaragoza, Spain, 2004.
Google Scholar
RTF
EndNote XML
R., Gori
,
Chen P.
, and
Pozgay A.
.
Model-Based Military Scenario Management for Defence Capability
. Australia: Defence Science and Technology Organisation; DoD, 2004.
Google Scholar
RTF
EndNote XML
Galligan, David P.
.
"
Modelling shared situational awareness using the MANA model
."
Journal of Battlefield Technology
7, no. 3 (2004).
Google Scholar
RTF
EndNote XML
Modern Methods and Means of Analysing and Controlling the Risks of the CRAMM Company’s System Security, RiskWatch in HRYF
., 2004.
Google Scholar
RTF
EndNote XML
Delplanque, Sylvain
,
Marc E. Lavoie
,
Pascal Hot
,
Laetitia Silvert
, and
Henrique Sequeira
.
"
Modulation of cognitive processing by emotional valence studied through event-related potentials in humans
."
Neuroscience Letters
(2004).
Google Scholar
RTF
EndNote XML
Herd, Graeme P.
.
"
Moldovan Security Politics: A Tale of Three Cities?
"
Connections: The Quarterly Journal
3, no. 4 (2004): 13-20.
DOI
Google Scholar
RTF
EndNote XML
Napoleoni, Loretta
.
"
Money and Terrorism
."
Strategic Insights
3, no. 4 (2004).
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
622
623
624
625
626
627
628
629
630
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance