Biblio

Export 21393 results:
2006
Ferguson, Joseph P.. "Russian Strategic Thinking Towards Central, South, and Southeast Asia." In Russian Strategic Thought Towards Asia, 207. New York: Palgrave Macmillan, 2006.
Schmitt, Michael N., Charles H. B. Garraway, and Yoram Dinstein. The San Remo Manual on the Law of Non-International Armed Conflict: With Commentary . San Remo: International Institute of Humanitarian Law, 2006.
Anand, S.. Sarbanes-Oxley Guide for Finance and Information Technology Professionals. Wiley, 2006.
A., Horne. A Savage War of Peace: Algeria 1954-1962. NYRB, 2006.
Bot, Bernard. Saving Democracy in a World of Change. Washington, D.C: Georgetown University, 2006.
Wilson, Ian, and Bill Ralston. Scenario Planning Handbook: Developing Strategies in Uncertain Times. Mason, OH: Thomson South-Western, 2006.
SCO Needs Military to Fight Regional Terrorist Threat–Official., 2006.
Scheffer, Jaap de Hoop. Secretary-General of NATO, speech at the 42nd Munich Security Conference., 2006.
Chen, Tzung-Her, Du-Shiau Tsai, and Gwoboa Horng. "Secure User-Friendly Remote Authentication Schemes." Information & Security: An International Journal 18 (2006): 111-121.
Ivanova, Petya. "Securing Cyberspace." Information & Security: An International Journal 18 (2006): 5-10.
Karacasulu, Nilufer. "Security and Globalization in the Context of International Terrorism." Review of International Law and Politics 2, no. 5 (2006): 1-17.
Dowd, Mark, and John McDonald. "Security Assessment: Identifying and Preventing Software Vulnerabilities." (2006).
Duan, Xiaoyi, JianWei Liu, and Qishan Zhang. "Security Improvement on Chien Et al.’s Remote User Authentication Scheme Using Smart Cards." In The 2006 IEEE International Conference on Computational Intelligence and Security (CIS 2006) 2., 2006.
Coaffee, Jon, and David Murakami Wood. "Security is Coming Home: Rethinking Scale and Constructing Resilience in the Global Urban Response to Terrorist Risk." International Relations 20, no. 4 (2006): 503-517.
Dang, Tran Khanh. "Security Protocols for Outsourcing Database Services." Information & Security: An International Journal 18 (2006): 85-108.
Tagarev, Todor. Security sector budgeting: main issues and good practices In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2006.
Balzacq, Thierry, and Sergio Carrera. Security versus Freedom? A Challenge for Europe’s Future. Farnham: Ashgate, 2006.
LI, Xinde, Jean Dezert, and Xinhan HUANG. "Selection of sources as a prerequesite for information fusion with application to SLAM." In 9th International Conference on Information Fusion. Florence, Italy , 2006.
Dawki, Richard. The Selfish Gene. Vol. 199 . Oxford University Press, 2006.
Gilroy, Curtis, and Cindy Williams. Service to Country: Personnel Policy and the Transformation of Western Militaries. Cambridge, Mass.: MIT Press, 2006.
"Shake-up of Afghan Police ‘Brought Back Corruption‘." Financial Times (2006).
Prados, Emmanuel, and Olivier Faugeras. "Shape From Shading." In Handbook of Mathematical Models in Computer Vision, 375-388. Boston, MA: USA: Springer, 2006.
Kortunov, Sergei. Should Russia Claim Great Power Status. RIA Novosti, 2006.
"Shtokmanovskoye: Door Opens." FSU Oil & Gas Monitor (2006): 8.
Reed, Ed. "Shtokmnanovskoye: the Wait Continues." NewsBase CIS Oil & Gas Special Report (2006).

Pages