Biblio

Export 21387 results:
2008
"A Practical Guide to Analyses of Alternatives." In Analysis of Alternatives (AoA) Handbook., 2008.
Krysanova, Valentina, Hendrik Buiteveld, Dagmar Haase, Fred F. Hattermann, Kate van Niekerk, Koen Roest, Pedro Martínez-Santos, and Maja Schlüter. "Practices and lessons learned in coping with climatic hazards at the river-basin scale: floods and drought." Ecology and Society 13, no. 2 (2008): 32.
Stern, Jessica, and Jonathan Wiener. "Precaution against terrorism." In Managing Strategic Surprise: Lessons from Risk Management and Risk Assessment, 110-83. Cambridge: Cambridge University Press, 2008.
Willens, Jonathan. Predicting Iran’s Nuclear Status: A Kaleidoscope of Futures. Vol. Master of Arts in National Security Studies. Charles Town, West Virginia: American Public University System, 2008.
Saudabayev, Kanat. "Prepared Remarks by H.E. Kanat Saudabayev, Secretary of State of the Republic of Kazakhstan, at the NATO PA Plenary Session." In NATO PA Plenary Session in Valencia, Spain., 2008.
Scheffer, Jaap de Hoop. Press Point. NATO.int, 2008.
Laity, Mark. Preventing War in Macedonia: Pre-Emptive Diplomacy for the 21st Century. London: RUSI/Routledge, 2008.
Plöger, Steffi Marianne. The Prevention of Maritime Terrorism: Is todays maritime security sufficient?., 2008.
Schmitt, Michael N.. "The Principle of Distinction and Weapon Systems on the Contemporary Battlefield." Connections: The Quarterly Journal 7, no. 1 (2008): 46-56.
United Nations Peacekeeping. Principles and Guidelines (Capstone Doctrine). New York: United Nations, 2008.
Blosser, Gary, and Justin Zhan. Privacy-Preserving Collaborative E-Voting In International Conference on Intelligence and Security Informatics ISI 2008: Intelligence and Security Informatics. Berlin, Heidelberg: Springer, 2008.
Elsea, Jennifer K., Mosche Schwartz, and Kennon H. Nakamura. Private Security Contractors in Iraq: Background, Legal Status, and Other Issues In Congressional Research Service Report. Washington, D.C.: Congressional Research Service, 2008.
Shalamanov, Velizar. Production model of the armed forces In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2008.
Stojković, Dejan. "Programiranje funkcionisanja i razvoja sistema odbrane (Programming the defence system's functioning and development)." Vojno delo vol. 60, no. 2 (2008): 93-107.
Proposal for a Council Decision of 27 October 2008 on a Critical Infrastructure Warning Information Network (CIWIN). COM(2008) 676 final, 2008.
Kramer, Mark. Prospects for Islamic Radicalism and Violent Extremism in the North Caucasus and Central Asia In PONARS Eurasia Memo., 2008.
Protecting Individual Privacy in the Struggle against Terrorists: A Framework for Program Assessment. Washington, DC: National Academies Press, National Research Council, 2008.
Dang, Tran Khanh, and Nguyen Thanh Son. "Providing Query Assurance for Outsourced Tree-Indexed Data." In Modeling, Simulation and Optimization of Complex Processes. Berlin, Heidelberg: Springer, 2008.
Eronen, Oskari. PRT Models in Afghanistan. Approaches to Civil-Military Integration. Kuopio: Crisis Management Center Finland, 2008.
Harmon, Christopher. "Public Diplomacy’s Next Challenge." Connections 7, no. 1 (2008): 141-153.
Harmon, Christopher C.. "Public Diplomacy’s Next Challenge." Connections: The Quarterly Journal 7, no. 1 (2008): 141-153.
Scott, Dominic, and Mark Pyman. "Public Perceptions of Corruption in the Military in Europe and the Rest of the World." European Security 17, no. 4 (2008): 495-515.
Mearsheimer, John J.. "Pull Those Boots off the Ground." Newsweek (2008).
Lang, Jr, Anthony F.. "Punishment and peace: Critical reflections on countering terrorism." Millennium: Journal of International Studies 36, no. 3 (2008).
Putin ne zajavljal o tom, chto Ukraina ne javljaetsia gosudarstwom [Putin Did Not Claim that Ukraine Is not a State]. Segodnya.ua, 2008.

Pages