Biblio

Export 21387 results:
2009
AID, US, US DoD, and Department of State. "Security Sector Reform." Connections: The Quarterly Journal 9, no. 1 (2009): 113-129.
Security Sector Reform in Post-Conflict Peacebuilding . The Geneva Centre for the Democratic Control of Armed Forces (DCAF), 2009.
Tanner, Fred, Nayef R. F. Al-Rodhan, and Sunjay Chandiramani. Security Strategies Today: Trends and Perspectives. GCSP Geneva , 2009.
Williams, Paul D.. Security Studies: An Introduction. New York: Routledge, 2009.
Wither, James K.. "Selective Engagement with Islamist Terrorists: Exploring the Prospects." Studies in Conflict & Terrorism 32, no. 1 (2009): 25-26.
"Senado, LX Legislatura." Gaceta del Senado (2009).
Jančić, Davor. Serbia amidst competing sovereignty claims : balancing the Westphalian legacy with the political pragmatism of European integration In The 11th Kokkalis Graduate Student Workshop. John F. Kennedy School of Government, Harvard University, 2009.
Liu, Baolong, Joan Lu, and Jim Yip. "A Series-parallel XML Multisignature Scheme for XML Data Authentication." IJCSNS International Journal of Computer Science and Network Security 9, no. 2 (2009).
Chen, Ja-Shen, Hung Tai Tsou, and Astrid Ya- Hui Huang. "Service Delivery Innovation: Antecedents and Impact on Firm Performance." Journal of Service Research 12, no. 1 (2009): 36-55.
Servicemen of Pacific Fleet Found an Effective Method of Fighting Pirates. RIA Prima Media, 2009.
Isenberg, David. Shadow Force: Private Security Contractors in Iraq. ABC-CLIO, 2009.
Ruiz, Moses T.. Sharpening the Spear: The United States’ Provincial Reconstruction Teams in Afghanistan In Department of Political Science. Vol. Master of Public Administration. Texas State University, 2009.
Shipment of First Two Soyuz to French Guiana Readies Arianespace for the Growth of its Launch Vehicle Family., 2009.
Ships of Russian Navy Will Maintain a Permanent Presense Off the Coast of Somalia. Fontanka.ru, 2009.
Ships of the People’s Liberation Navy Escorted 1,100 Vessels in the Gulf of Aden. Xinhua News Agency, 2009.
Bethge, Philip, Dinah Deckstein, Wladimir Pyljow, and Matthias Schepp. "Siemens Eyes Russian Nuclear Revival." Business Week (2009).
Illarionov, Andrei. "The Siloviki in Charge." Journal of Democracy 20, no. 2 (2009): 70-71.
"Social Engineering: People Hacking." In Control Essentials. Enterprise Risk Management, 2009.
Budolak, M.. "Social Media Concepts." In Petersburg School of PR: From Theory to Practice. Saint Petersburg: Roza Mira, 2009.
Drapeau, Mark, and Linton Wells, II. Social Software and National Security: An Initial Net Assessment. Washington, D.C.: Center for Technology and National Security Policy Defense & Technology Paper, National Defense University, 2009.
Marszałek, Maciej. Sojusznicza Operacja “Allied Force.” Przebieg-ocena-wnioski. Warsaw: Wydawnictwo Adam Marszałek, 2009.
Somali Pirates Will be Tried in Russia. Nakanune.ru, 2009.
Stojanov, Nikolai, Angel Genchev, and Rosen Iliev. Some Aspects of Risk Analysis in Security and Defense Information Systems In Bishop Konstantin Preslavski Scientific Conference of the University of Shumen, Collection of Papers., 2009.
Nguyen, Minh-Tuan, and Madeleine Dunn. Some Methods for Scenario Analysis in Defence Strategic Planning. Canberra: Defence Science and Technology Organisation, 2009.
Bahar, Halil İbrahim. Sosyoloji. Ankara: USAK Yayinlari, 2009.

Pages