Biblio

Export 21404 results:
2004
Bogaturov, Aleksei D., and Tatyana A. Shakleyyina. "The Russian Realist School of International Relations." Communist and Post-Communist Studies 37, no. 1 (2004): 37.
Malek, Martin. "Russlands Kriege in Tschetschenien: ‘Wiederherstellung der verfassungsmäßigen Ordnung,’ ‘Antiterror-Operationen’ oder Völkermord?" Zeitschrift für Genozidforschung 5, no. 1 (2004): 102-29.
Tarasyuk, Olga M., Vyacheslav S. Kharchenko, and Vladimir V. Sklyar. "Safety of Airspace Technique and Reliability of Computer Systems." Aviation and Space Technique and Technology (2004).
The SARS Commission Interim Report – SARS and Public Health in Ontario. Ministry of Health and Long-Term Care, 2004.
SAS-028 “Cost Structure and Life Cycle Costs for Military Systems"., 2004.
SAS-054 “Methods and Models for Life Cycle Costing"., 2004.
S.C. Res. 1566., 2004.
McGeary, Johanna. "The Scandal’s Growing Stain." Time (2004).
Sherstyuk, Vladimir P.. Scientific and Methodological Problems of Information Security . Moscow: Information Security Institute of Moscow State University, 2004.
Liaw, Horng-Twu. "A Secure Electronic Voting Protocol for General Elections." Computers and Security 23, no. 2 (2004): 107-119.
Surendro, Kridanto, and Setiyo Cahyono. "Secure e-Mail Application Software for Government in Indonesia." Information & Security: An International Journal 15, no. 2 (2004): 135-150.
Tahir, Muhammad Nabeel. "A Secure Online Medical Information System in Distributed and Heterogeneous Computing Environment." Information & Security: An International Journal 15 (2004): 211-215.
Canada, Government of. Securing an Open Society: Canada’s National Security Strategy., 2004.
Awasthi, Amit Kumar, and Sunder Lal. Security Analysis of a Dynamic I-Based Remote User Authentication Scheme., 2004.
Forsberg, Tuomas. "Security and Defense Policy in the New European Constitution: A Critical Assessment." Connections: The Quarterly Journal 3, no. 3 (2004): 13-27.
Aradau, Claudia. "Security and the democratic scene: desecuritization and emancipation." Journal of International Relations and Development 7, no. 4 (2004): 388-413.
Huasheng, Zhao. Security Building in Central Asia and the Shanghai Cooperation Organization. Slavic Research Center, 2004.
Barstow, David. "Security Firm Says Its Workers Were Lured Into Iraqi Ambush." New York Times (2004).
Chandler, Jennifer A.. "Security in Cyberspace: Combating Distributed Denial of Service Attacks." University of Ottawa Law & Technology Journal (2004): 231-261.
Donnelly, Christopher. "Security in the 21st Century: New Challenges and New Responses." In NATO and New International Relations, 24-26. Zagreb: Atlantic Council of Croatia & Political Culture Publishing and Research Institute, 2004.
Hsu, Chien-Lung. "Security of Chien et al.’s Remote User Authentication Scheme Using Smart Cards." Computer Standards and Interfaces 26, no. 3 (2004): 167-169.
Luciani, Giacomo. "Security of Supply for Natural Gas Markets." In NDES Working Paper No. 2. Center for European Policy Studies, 2004.
Caparini, Marina. "Security Sector Reconstruction: Western Balkans." In Reform and Reconstruction of the Security Sector, 167-68. Münster: LIT Verlag/DCAF, 2004.
Edmunds, Timothy. "Security Sector Reform: Concepts and Implementation." In Sourcebook on Security Sector Reform, 50. Belgrade: Goragraf, Geneva Centre for the Democratic Control of Armed Forces, Centre for Civil-Military Relations, Belgrade, 2004.
"Selected Non-State Armed Groups." The Military Balance 104, no. 1 (2004): 363-64.

Pages