Biblio

Export 21404 results:
2005
Boin, A., P Hart, E. Stern, and B. Sundelius. The Politics of Crisis Management: Public Leadership Under Pressure. . Cambridge, UK: Cambridge University Press, 2005.
Frittelli, John. Port and Maritime Security: Background and Issues for Congress. Washington, D.C.: Congressional Research Service, Library of Congress, 2005.
Clark, Mark Edmond. "A Possible Path to Change in U.S.–Iran Relations." Connections: The Quarterly Journal 4, no. 1 (2005): 103-110.
Stanicic, Mladen. "Post-Conflict Rehabilitation: From Aid to Development." Connections: The Quarterly Journal 4, no. 2 (2005): 99-105.
Nesser, Petter. "Post-millennium Patterns of Jihadist Terrorism in Western Europe–Part 1." Jane’s Terrorism and Security Monitor (2005).
Froltsov, Vladislav V.. "The Post-Soviet Puzzle and Western Democracies." Connections: The Quarterly Journal 4, no. 4 (2005): 91-111.
Judt, Tony. Postwar: A History of Europe Since 1945 . London: Heinemann, 2005.
Collier, Michael W.. "A Pragmatic Approach to Developing Intelligence Analysts." Defense Intelligence Journal, Joint Military Intelligence College Foundation 14, no. 2 (2005).
Press conference on results of U.S.-Russian talks. Vol. 25 March 2005. Official website of the President of Russia, 2005.
Prevention, preparedness and response to terrorist attacks In Official Journal C 14., 2005.
Remic, Lea. Primerjava obrambnih sistemov Republike Bolgarije in Republike Romunije In Fakulteta za družbene vede. Vol. diplomsko delo. Ljubljana: Univerza v Ljubljani, 2005.
Waltermire, Bradley J.. Princes, Priests, and People is Saudi Arabia the Next Iran. Monterey, California: Naval Postgraduate School, 2005.
Dang, Tran Khanh. "Privacy-Preserving Basic Operations on Outsourced Search Trees." In International Workshop on Privacy Data Management – PDM05, in conjunction with ICDE05, IEEE Computer Society. Tokyo, Japan, 2005.
Günther, Philipp. Private Military Companies als neuer internationaler Akteur. Vol. Diploma Thesis. University of Cologne, 2005.
Holmqvist, Caroline. Private Security Companies: The Case for Regulation In SIPRI Policy Paper. Stockholm: SIPRI, 2005.
Moller, Bjorn. Privatisation of Conflict, Security and War In DIIS Working Paper. Copenhagen: Danish Institute For International Studies, 2005.
Schreier, Fred, and Marina Caparini. Privatising Security: Law, Practice and Governance of Private Military and Security Companies. Geneva: DCAF, 2005.
Vlachová, Marie. "The problem. Trafficking in Humans: The Slavery of Our Age." Connections: The Quarterly Journal 4, no. 4 (2005): 1-16.
Marsh, David. Project D3 – CLIL Matrix In Central Workshop. Graz: European Centre for Modern Languages, 2005.
Heldman, Kim. Project Manager’s Spotlight on Risk Management. Alameda, CA: SYBEX, 2005.
Edmunds, Bryan D.. Project Portfolio Management: An Investigation of One Air Force Product Center. Air Force Institute of Technology, 2005.
Winner, Andrew C.. "The Proliferation Security Initiative: The New Face of Interdiction." The Washington Quarterly 28, no. 2 (2005): 130.
Umarov, Adiljon, and Dmitry Pashkun. "The Prospects for Chinese Influence in Central Asia." CEF Quarterly–The Journal of the China-Eurasia Forum (2005).
Wen, H. A., Tian-Fu Lee, and Tzonelih Hwang. "Provably Secure Three-party Password-based Authenticated Key Exchange Protocol Using Weil Pairing." IEE Proceedings Communication 152, no. 2 (2005).
Villanueva, Benjamin, and Brett Cook. Providing Students 24/7 Virtual Access and Hands-On Training Using VMWare GSX Server. SIGUCCS'05, 2005.

Pages