Biblio

Export 21393 results:
2009
For a Euro-Atlantic Partnership (EAP) Looking to the Future: Proposals for NATO’s New Strategic Concept. Government of Austria, Ireland and Switzerland, 2009.
"For Irish, E.U. May Stand for Economic Unity." The New York Times (2009).
Tarasyuk, O.M., and A.V. Gorbenko. "For Methods for Development of Critical Software." In Lecture Materials. Kharkiv: National Aerospace University Institute “KhAI”, 2009.
Giegerich, B., and V. Comolli. FORESEC Deliverable D 4.5 Report on European Security: Trends, Drivers, Threats., 2009.
Mansour, Riham Hassan Abd. Formal Analysis and Design for Engineering Security (FADES). Vol. PhD Dissertation. Blacksburg, VA: Virginia Polytechnic Institute and State University, 2009.
Tagarev, Todor, Tsvetomir Tsachev, and Nikolay Zhivkov. "Formalizing the Optimization Problem in Long-Term Capability Planning." Information & Security: An International Journal 23, no. 1 (2009): 99-114.
Former Bulgarian Defence Minister Facing Contract Fraud Charges. Agence France-Presse, 2009.
Tiffou, Jean-Pierre. Former French Military Representative to the EU In Vice Admiral Jean-Pierre Tiffou, interview by Bjoern H. Seibert., 2009.
Baylouny, Anne Marie. "Fragmented Space and Violence in Palestine." International Journal on World Peace XXVI, no. 3 (2009).
Vatsa, Mayank, Richa Singh, and Afzel Noore. "Framework for biometric match score fusion using statistical and belief models." In Advances and Applications of DSmT for Information Fusion. Vol. III. Rehoboth: American Research Press (ARP), 2009.
Borissova, Daniela, and Ivan Mustakerov. "A Framework of multimedia e-learning design for engineering training." In Advances in Web Based Learning, LNCS, 88-9. Vol. 5686., 2009.
France’s GDF Suez to join Nord Stream pipeline. EurActive.com, 2009.
Crumley, Bruce. "French Terror Conviction: Lesson for the US?" Time (2009).
Dagher, Sam. "Fresh Paint and Flowers at Iraqi House of Horrors." New York Times (2009).
Kühn, Ulrich. From Capitol Hill to Istanbul: The Origins of the Current CFE Deadlock In CORE Working Paper., 2009.
Kuehl, Daniel T.. "From Cyberspace to Cyberpower: Defining the Problem." In Cyberpower and National Security. Washington, D.C.: National Defense University Press, 2009.
Ajzen, Icek, Cornelia Czasch, and Michael Flood. "From Intentions to Behavior: Implementation Intention, Commitment, and Conscientiousness." Journal of Applied Social Psychology 39, no. 6 (2009): 1356-7.
Patterson, Malcolm Hugh. "From Mercenary to UN Contractor?" In Privatising Peace: A Corporate Adjunct to United Nations Peacekeeping and Humanitarian Operations, 39-87. London: Palgrave Macmillan, 2009.
Shackelford, Scott J.. "From Nuclear War to Net War: Analogizing Cyber Attacks in International Law." Berkeley Journal of International Law 27 (2009): 196-97.
Crawford, K., H.M. Hasan, L. Warne, and H. Linger. "From Traditional Knowledge Management in Hierarchical Organizations to a Network Centric Paradigm for a Changing World." Emergence: Complexity & Organization 11, no. 1 (2009): 1-8.
Donnelly, Thomas, Phillip Dur, and Andrew F. Krepinevich, Jr.. "The Future of U.S. Military Power: Debating How to Address China, Iran, and Others." Foreign Affairs (2009).
Ricks, Thomas E.. The Gamble: General Petraeus and the Untold Story of the American Surge in Iraq 2006-2008. London: Allen Lane, 2009.
Tagarev, Todor, and Gueorgui Stankov. "A Gaming Approach to Enhancing Defense Resource Allocation." Connections: The Quarterly Journal 8, no. 2 (2009): 7-16.
Christoff, Joseph A.. "GAO Report on NATO Enlargement: Albania and Croatia." Connections: The Quarterly Journal 8, no. 2 (2009): 75-91.
"Gasping for Gas." The Economist (2009): 53.

Pages