Biblio

Export 21404 results:
2011
Hadji-Janev, Metodi. "Threats to the Critical Infrastructure in South-East Europe posed by Al Qaeda and its Associated Movements: the case of Macedonia." In Counterterrorism challenges regarding the Critical Infrastructure protection, 187-201. Monterey, USA, Ljubljana, Slovenia: Center for Civil - Military Relation, 2011.
Hadji-Janev, Metodi. "Threats to the Critical Infrastructure in South-East Europe posed by Al Qaeda and its Associated Movements: the case of Macedonia." In Counterterrorism challenges regarding the Critical Infrastructure protection. Center for Civil - Military Relation, Monterey, USA, Ljubljana, Slovenia , 2011.
Renfroe, Nancy A., and Joseph L. Smith. Threat/Vulnerability Assessments and Risk Analysis. Washington, DC: National Institute for Building Sciences, 2011.
Three Key Factors at Play for Russian Modernization. DefenceTalk, 2011.
Timeline: UK’s road to action in Libya. BBC News, 2011.
Shemella, Paul. "Tools and Strategies for Combating Terrorism." In Fighting Back: What Governments Can Do About Terrorism, 137-9. Stanford: Stanford University Press, 2011.
Priest, Dana, and William M. Arkin. "‘Top Secret America’: a look at the military’s JSOC." Washington Post (2011).
Burch, Allen, Bradford R. Hoggins, Christopher A. Jennings, Kirk A. Johnson, Karl-Heinz Kamp, Nadia Schadlow, and Christopher M. Schnaubelt. "Towards a Comprehensive Approach: Integrating Civilian and Military Concepts of Strategy." Rome: NATO Defence College, 2011.
Burch, Allen, Kirk A. Johnson, Christopher A. Jennings, Christopher M. Schn, Bradford R. Higgins, and Nadia Schadlow. "Towards a Comprehensive Approach: Integrating Civilian and Military Concepts of Strategy .", 2011.
Jordan, Frederic, and Geir Hallingstad. "Towards Multi-National Capability Development in Cyber Defence." Information & Security: An International Journal 27, no. 1 (2011): 81-89.
Ratchev, Valeri, Todor Tagarev, and Uwe Nerlich. Towards the exploration of future EU roles as a global security actor In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2011.
Ou, Helen H., Pasang Sherpa, and Lisa M. Zurk. "Tracking of Small Vessels with Passive Acoustic Sensors." The Journal of the Acoustical Society of America 130, no. 4 (2011): 2450.
Williams, Bryan Glyn. "On the Trail of the ‘Lions of Islam’: Foreign Fighters in Afghanistan and Pakistan, 1980–2010." Orbis 55, no. 2 (2011): 216-39.
Hrytsyuk, Y.I., and T.E. Rak. "The Training Problem of Information Security Specialists for the Ministry of Emergencies of Ukraine." In Intelligent Decision-making Systems and Problems of Computational Intelligence, 272-276. Yevpatoria: Kherson, 2011.
The Transparency of National Defence Budgets. London: Transparency International UK, 2011.
Tatalović, Siniša. "Treba li Hrvatskoj nova strategija nacionalne sigurnosti." Političke analize 2, no. 6 (2011).
Trends in Video Games and Gaming In ITU-T Technology Watch Report., 2011.
Logan, Dave, John King, and Halee Fischer-Wright. Tribal Leadership: Leveraging Natural Groups to Build a Thriving Organization. Reprint ed. New York: HarperBusiness, 2011.
Lukin, Aleksandr. "Tsena voprosa." Kommersant (2011).
Singh, Ajit Kumar. "Tuning the Indian Police." Geopolitics 2, no. 6 (2011): 54-55.
Cengiz, Firat, and Lars Hoffmann. Turkey and the European Union: Facing New Challenges and Opportunities. New York: Routledge, 2011.
Bilefsky, Dan. "Turkey Moves to Intensify Sanctions Against Syria." The New York Times (2011).
Cagaptay, Soner. "Turkey’s Future Role in the ‘Arab Spring’." Focus 5, no. 4 (2011).
Turkmenistan Beefs up Caspian Presence, Irritating Russia. Eurasia.net, 2011.
Independent Monitoring Commission. Twenty-Sixth and Final Report of the Independent Monitoring Commission. London: The Stationery Office, 2011.

Pages