Biblio

Export 21393 results:
2004
Armed Forces Modernization Plan 2002 – 2015 . Sofia: Ministry of Defense, 2004.
Kotanjian, Hayk. "Armenian Security and U.S. Foreign Policy in the South Caucasus." Connections: The Quarterly Journal 3, no. 2 (2004): 15-32.
Bartlett, Henry, Paul Holman, and Timothy E. Somes. "The Art of Strategy and Force Planning." Strategy and Force Planning (2004): 17-33.
V.M., Kravchenko. As concerned the publications on 18.02.2004 in the media of data on the employee of Ukrainian Embassy in Germany. Press-center of the Security Service of Ukraine, 2004.
Tellis, Ashley J.. "Assessing America’s War on Terror: Confronting Insurgency, Cementing Primacy." NBR Analysis 15, no. 4 (2004).
Carmon, Yigal. Assessing the Credibility of the Aub Hafs al-Masri Brigades’ Threats. Inquiry & Analysis: The Middle East Media Research Institute, 2004.
Bowles, J.B.. "An assessment of PRN prioritization in a failure modes effects and criticality analysis." Journal of the IEST 47 (2004): 51-56.
Yermukanov, Marat. "Astana Offers Clumsy Explanations for Banning ‘Terrorist Organizations'." Eurasia Daily Monitor 1, no. 108 (2004).
Sunnafrank, Michael, and Artemio Ramirez. "At First Sight: Persistent Relational Effects of Get-Acquainted Conversations." Journal of Social and Personal Relationships 21, no. 3 (2004): 361-379.
Coessens, Philippe. "At Least in Fighting Terrorism, Transatlantic Cooperation Is Working." Connections: The Quarterly Journal 3, no. 1 (2004): 15-17.
Mykletun, Einar, Maithili Narasimha, and Gene Tsudik. "Authentication and Integrity in Outsourced Databases." In 11th Annual Network and Distributed System Security Symposium –NDSS04. California, USA, 2004.
Hager, Mark A., and Jeffrey L. Brudney. Balancing Act, The Challenges and Benefits of Volunteers. The Urban Institute, 2004.
Ionescu, Mihail E.. "The Balkans after the 2004 Enlargement of NATO and the European Union:What Next?" Connections: The Quarterly Journal 3, no. 2 (2004): 115-121.
Avizienis, Algirdas, Jean-Claude Laprie, Brian Randell, and Carl E. Landwehr. "Basic Concepts and Taxonomy of Dependable and Secure Computing." IEEE Transactions on Dependable and Secure Computin 1, no. 1 (2004): 11-33.
Avizienis, Algirdas, Jean-Claude Laprie, Brian Randell, and Carl Landwehr. "Basic Concepts and Taxonomy of Dependable and Secure Computing." IEEE Transactions on Dependable and Secure Computing 1, no. 1 (2004): 11-33.
Gennaro, Rosario, Darren Leigh, Ravi Sundaram, and William Yerazunis. "Batching Schnorr Identification Scheme with Applications to Privacy- Preserving Authorization and Low-Band width Communication Devices." Advances in Cryptology – ASIACRYPT 2004, Lecture Notes in Computer Sciences 3329 (2004).
Satloff, Robert. The Battle of Ideas in the War on Terror: Essays on US Public Diplomacy in the Middle East. Washington, DC: Washington Institute for Near East Policy, 2004.
Cronin, Audrey Kurth. "Behind the Curve: Globalization and International Terrorism." In Defeating Terrorism–Shaping the New Security Environment . New York: McGraw-Hill/Dushkin, 2004.
Beirut Wants ‘Terrorism’ Defined. AlJazeera, 2004.
Ristic, B., and P. Smets. Belief function theory on the continuous space with an application to model based classification. Italy: IPMU 2004, 2004.
Tavlas, George S.. "Benefits and Costs of Entering the Eurozone." Cato Journal 24 (2004): 89-106.
Lutterbeck, Derek. "Between Police and Military: The New Security Agenda and the Rise of Gendarmeries." Cooperation and Conflict 39, no. 1 (2004): 45-68.
Lutterbeck, Derek. "Between the Police and Military: The New Security Agenda and the Rise of the Gendarmeries." Cooperation and Conflict 39, no. 1 (2004): 45-68.
Ortega, Martin. "Beyond Petersberg: Missions for the EU Military Forces." In EU Security and Defence Policy: The First Five Years (1999-2004), 82. Paris: EU Institute for Security Studies, 2004.
Jain, A. K., S. Pankanti, S. Prabhakar, L. Hong, and A. Ross. "Biometrics: A Grand Challenge." In Proceedings of the International Conference on Pattern Recognition, 935-942. Vol. 2., 2004.

Pages