Biblio

Export 21393 results:
2009
Giragosian, Richard. Weathering the Storm: A Commentary on Armenia and the Global Economic Crisis. ArmeniaNow.com, 2009.
Chakarov, Angel. "Welcoming Address." Information & Security: An International Journal 24 (2009): 9-10.
Haider, Abrar. What Happens After the Click? Role of Internet Information in Shaping Democratic Values In AMCIS 2009. Vol. Paper 377., 2009.
What is Transitional Justice?. International Center for Truth and Justice (ICTJ), 2009.
Yap, Gerald T.. When is a Hack an Attack? A Sovereign States Options if Attacked in Cyberspace: A Case Study of Estonia 2007 In Research Report. Alabama: Air Command And Staff College Air University Maxwell Air Force Base, 2009.
de Dardel, Jean-Jacques. Whither the Euro-Atlantic Partnership? Partnership and NATO’s New Strategic Concept In GCSP Geneva Papers. Vol. 10. Geneva: Geneva Centre for Security Policy, 2009.
Eriksson, Johan, Giampiero Giacomello, Hamoud Salhi, Myriam Dunn Cavelty, J. P. Singh, and M. I. Franklin. "Who Controls the Internet? Beyond the Obstinacy or Obsolescence of the State." International Studies Review 11, no. 1 (2009): 205-230 .
Byers, Michael. Who Owns the Arctic: Understanding Sovereignty Disputes in the North. Vancouver: Douglas & McIntyre, 2009.
Law, David. "Who’s Who Intergovernmentally in SSR." Developing a Security Sector Re¬form (SSR) Concept for the United Nations (2009): 23-25.
Piontkovsky, Andrei. Who’s Who on Putin’s Payroll?. Project Syndicate, 2009.
Haji-Yousefi, Amir M.. "Whose Agenda Is Served by the Idea of a Shia Crescent?" Alternatives: Turkish Journal of International Relations 8, no. 1 (2009): 114-35.
Ma, Maode, Yan Zhang, and Mieso K. Denko. Wireless Quality of Service : Techniques, Standards, and Applications. Boca Raton: Auerbach Publications, 2009.
Bergmans, H., M. Bökkerink, P. Van Erve, Van de Leu, D. Wijnmalen, V. Veldheer, E. Pruyt, L. Janssen, and Van der Horst. Working with Scenarios, Risk Assessment and Capabilities in the National Safety and Security Strategy of the Netherlands In The Hague: Landelijk Operationeel Coördinatiecentrum., 2009.
The World Factbook . Washington, D.C.: Central Intelligence Agency, 2009.
Brody, Reed. The World Needs Spain’s Universal Jurisdiction Law. Human Rights Watch, 2009.
Seigneurie, Ken. "The Wrench and the Ratchet: Cultural Mediation in a Contemporary Liberation Struggle." Public Culture 21, no. 2 (2009): 377-402.
Written Answers In Questions by Lord Patten on Cybersecurity. UK Parliament, 2009.
Wardin, Katarzyna. Współczesne piractwo morskie zagrożeniem dla międzynarodowego transportu morskiego. Zeszyty Naukowe Akademii Marynarki Wojennej, 2009.
Anderson, Benjamin R., Amy K. Joines, and Thomas E. Daniels. Xen Worlds: Leveraging Virtualization in Distance Education. ITiCSE'09, 2009.
McMillan, Ann. "Xinjiang and Central Asia: Interdependency, not Integration." In China, Xinji-ang and Central Asia: History, Transition and Crossborder Interaction into the 21st Century, 96. London: Routledge, 2009.
Abdelal, Rawi, and Adam Segal. "Yes, Globalization Passed Its Peak." Foreign Affairs (2009).
Kaim, Markus. "Zehn Jahre auf der NATO-Agenda – Terrorismusbekämpfung durch die Nordatlantische Allianz." Sicherheit und Frieden (S+F) / Security and Peace 27, no. 2 (2009).
Zetocha, Karel. Zpravodajské služby v nové demokracii . Česká republika, Brno: Společnost pro odbornou literaturu Barrister&Principal, 2009.
Janicki, Kamil. Źródła nienawiści. Konflikty etniczne w krajach postkomunistycznych. Kraków-Warsaw: Instytut Wydawniczy Erica, 2009.
Ziemer, Veronica. Zwischen Europa und Amerika: Polens Außen- und Sicherheitspolitik nach 1989. Springer-Verlag, 2009.

Pages