Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21404 results:
RTF
EndNote XML
2002
Najimova, Adolat
.
Central Asian Leaders Turn to Cult of Personality
. Center for Security Studies and Conict Research, 2002.
Google Scholar
RTF
EndNote XML
Gazdag, Ferenc
.
"
CESDP and the Group of Six
."
Connections: The Quarterly Journal
1, no. 1 (2002): 39-42.
DOI
Google Scholar
RTF
EndNote XML
Hill, Christopher
.
"
CFSP: Conventions, Constitutions and Consequentiality
."
International Spectator
32, no. 4 (2002): 75-8.
Google Scholar
RTF
EndNote XML
Tibi, Bassam
.
The Challenge of Fundamentalism
. Berkeley: University of California Press, 2002.
Google Scholar
RTF
EndNote XML
Forster, Anthony
,
Timothy Edmunds
, and
Andrew Cottey
.
The Challenge of Military Reform in Post Communist Europe, Building Professional Armed Forces
. Basingstoke: Palgrave MacMillan, 2002.
Google Scholar
RTF
EndNote XML
Hadley, Stephen
.
Challenges and Change for NATO
. NATO, 2002.
Google Scholar
RTF
EndNote XML
Urbelis, V.
, and
T. Urbonas
.
"
The Challenges of Civil-Military Relations and Democratic Control of Armed Forces: the Case of Lithuania
." In
Democratic Control of the Military in Postcommunist Europe: Guarding the Guards
., 2002.
Google Scholar
RTF
EndNote XML
Sakhuja, Vijay
.
Challenging Terrorism at Sea
., 2002.
Google Scholar
RTF
EndNote XML
Milbank, Dana
.
"
Cheney Says Iraqi Strike Is Justified; Hussein Poses Threat, He Declares
."
Washington Post
(2002).
Google Scholar
RTF
EndNote XML
Economy, Elizabeth
.
China’s ‘Go West’ Campaign: Ecological Construction or Ecological Ex-ploitation?
In
Series 5
. China Environment, 2002.
Google Scholar
RTF
EndNote XML
Bouganim, Luc
, and
Philippe Pucheral
.
"
Chip-Secured Data Access: Confidential Data on Untrusted Servers
." In
28th International Conference on Very Large Data Bases
. Hong Kong, 2002.
Google Scholar
RTF
EndNote XML
Hamby, J.
.
"
Civil-military operations: joint doctrine and the Malayan Emergency
."
Joint Force Quarterly
32 (2002): 54-61.
Google Scholar
RTF
EndNote XML
Ratchev, Valeri
, and
Velichka Milina
.
"
Civil-Military Relations and the Construction of Consolidated Democracy: The Case of Bulgaria
."
Connections: The Quarterly Journal
1, no. 2 (2002): 89-99.
DOI
Google Scholar
RTF
EndNote XML
Jermalavicius, Tomas
.
"
Civil-Military Relations in the Baltic States Introduction / Editor’s Note
."
Connections: The Quarterly Journal
1, no. 4 (2002): 1-4.
DOI
Google Scholar
RTF
EndNote XML
Hoffmann, Stanley
.
"
Clash of Globalizations
."
Foreign Affairs 81:4
81, no. 4 (2002).
Google Scholar
RTF
EndNote XML
Classified Information Protection Act
. State Gazette 45 (30 April 2002), last amendment State Gazette 53 (28 June 2014), 2002.
Google Scholar
RTF
EndNote XML
Sinnott, Richard
.
"
Cleavages, Parties and Referendums: Relationships between Representative and Direct Democracy in the Republic of Ireland
."
European Journal of Political Research
41 (2002): 815.
Google Scholar
RTF
EndNote XML
Koulouri, Christina
.
Clio in the Balkans: The Politics of History Education
. Thessaloniki: CDRSEE, 2002.
Google Scholar
RTF
EndNote XML
Lesser, Ian O.
.
"
Coalition Dynamics in the War against Terrorism
."
The International Spectator
2 (2002): 43-50.
Google Scholar
RTF
EndNote XML
Frank, Thomas
.
"
Coast Guard Faces New Security Role: Some Fear A Reduction of Boat-Safety Duties
."
Newsday
(2002).
Google Scholar
RTF
EndNote XML
Callahan, Philip D.
.
The Code of the Warrior, The Kinder, Gentler Military and Marksmanship: Changing a Culture
In
USAWC Strategy Research Project
. Carlisle Barracks, PA: U.S. Army War College, 2002.
Google Scholar
RTF
EndNote XML
Chang, Chin-Chen
,
Ju Yuan Hsiao
, and
Jyh-Chiang Yeh
.
"
A Colour Image Copyright Protection Scheme based on Visual Cryptography and Discrete Cosine Transform
."
The Imaging Science Journal
(2002): 133-140.
Google Scholar
RTF
EndNote XML
K., Sentz
, and
Ferson S
.
Combination of evidence in Dempster-Shafer Theory
In
SANDIA Tech. Report, SAND2002-0835
., 2002.
Google Scholar
RTF
EndNote XML
Moffat, James
.
Command and Control in the Information Age – Representing its Impact
. London, UK: The Stationery Office, 2002.
Google Scholar
RTF
EndNote XML
Baranovsky, V.G.
.
"
Common European Security and Defence Policy: Horizons of the Russian Perception
."
Connections: The Quarterly Journal
1, no. 1 (2002): 22-28.
DOI
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
668
669
670
671
672
673
674
675
676
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance