Biblio

Export 21404 results:
2006
Keefer, Sandra L.. Human Trafficking and The Impact on National Security for the United States. Vol. Master of Strategic Studies. Carlisle Barracks, Pennsylvania: U.S. Army War College, , 2006.
The IAONA Handbook for Network Security. Industrial Automation Open Networking Alliance In Version 1.5. Magdeburg, Germany, 2006.
"If Called to Lebanon, NATO ‘Could Go In‘." International Herald Tribune (2006).
Wong, Yung H.. Ignoring the Innocent: Non-combatants in Urban Operations and in Military Models and Simulations. Vol. Dissertation rept. Santa Monica, CA: Rand Graduate School Santa Monica CA, 2006.
Wong, Yung H.. Ignoring the Innocent: Non-combatants in Urban Operations and in Military Models and Simulations., 2006.
Polidori, Claudio Maria. Il Terrorismo Internazionale Negli Ordinamenti Giuridici dei Paesi Occidentali: E I Relativi Strumenti di Cooperazione Giudiziaria e di PoliziaStudi Strategici, 2006. Centro Militare di Studi Strategici, 2006.
Kephart, Janice L.. "Immigration and Terrorism: Moving Beyond the 9/11 Staff Report on Terrorist Travel." Connections: The Quarterly Journal 5, no. 2 (2006): 55-97.
Khawatreh, Saleh A., Omaima N. Al-Allaf, and Ghassan A. Al-Utaibi. "Impacts of Information Technology on Organizational Structures." In 2nd Jordanian International Conference on Computer Science and Engineering (JICCSE2006)., 2006.
Lambert, Alexandre. Implementation of Democratic Control of Armed Forces in the OSCE Region: Lessons Learned from the OSCE Code of Conduct on Politico-Military Aspects of Security In Occasional Paper – № 11. Geneva: Geneva Centre for the Democratic Control of Armed Forces (DCAF), 2006.
How, Khoo Boon, and Alex See Kok Bin. "Implementing Fuzzy logic in planar motion tracking Publication date 2006/1." Journal of Artificial Intelligence and Machine Learning 7 (2006): 1-10.
Implementing the PAP-DIB: The Education and Training for Defense Reform Initiative – Guidelines for Development. NATO, 2006.
Van Caelenberge, Maj.Gen. Gerard. "Improving Effectiveness and Capabilities." NATO’s Nations and Partners for Peace 50 (2006): 53-54.
Yoon, Eun-Jun, and Kee Young Yoo. Improving the Dynamic ID-Based Remote Mutual Authentication Scheme In On the Move to Meaningful Internet Systems 2006, OTM 2006 Workshops., 2006.
Tkacz, Scott R.. "In Katrina ‘s Wake: Rethinking the Military’s Role in Domestic Emergencies." William & Mary Bill of Rights Journal 15, no. 1 (2006): Article 11.
Bain, William. "In Praise of Folly: International Administration and Corruption of Humanity." International Affairs 82, no. 3 (2006): 525-38.
Smarandache, Florentin. "An in-depth look at quantitative information fusion rules." In Advances and Applications of DSmT for Information Fusion. American Research Press, Rehoboth, 2006.
Sachdeva, Gulshan. India’s North East: Rejuvenating a Conflict-Riven Economy. Manipur Online, 2006.
Tiutiunkov, Zhivko. "The Individual and His Self-Assessment [Chovekut i negovata samootsenka]." Psychology journal 30 (2006).
Parsi, Vittorio. The Inevitable Alliance: Europe and the United States Beyond Iraq. London: Palgrave Macmillan, 2006.
Information Operations In Joint Pub. Joint Chiefs Of Staff, 2006.
Eriksson, Johan, and Giampiero Giacomello. "The Information Revolution, Security, and International Relations: (IR) Relevant Theory?" International Political Science Review 27, no. 3 (2006): 221-244.
Lahoud, Hilmi A., and Xin Tang. Information Security Labs in IDS/IPS for Distance Education. SIGITE'06, 2006.
Johnson, Goran. "Information Technology and Terrorism: The Impact of Emerging Commercial Capabilities." Information & Security: An International Journal 19 (2006): 117-118.
Hoffman, Bruce. Inside Terrorism (Revised and expanded edition). New York: Colombia University Press, 2006.
Piliponytė, Jolanta. "Instruments and Challenges of Corruption Diagnostics Around the World and in Lithuania." Sociologija: Mintis ir Veiksmas [Sociology: Thought and Action] 1 (2006): 101.

Pages