Biblio

Export 21393 results:
2010
Human Security Report 2009/2010. Human Security Report Project, 2010.
J. Burgess, Peter, and Shahrbanou Tadjbakhsh. "The Human Security Tale of Two Europes." Global Society 24, no. 4 (2010).
Caprile, A., and P. Hakala. Humanitarian Aid., 2010.
Georgieva, Kristalina. The Humanitarian and the Military: Different Mandates and Potential Synergies In Brussels Defence Debate, Royal Military Academy., 2010.
Mbohwa, Charles. "Humanitarian logistics: Review and case study of Zimbabwean experiences." Journal of Transport and Supply Management 4, no. 1 (2010): 176-197.
Hybrid Threat. Washington, DC: Department of the Army, 2010.
D’Agostino, Davi M.. Hybrid warfare (Report GAO-10-1036R Hybrid Warfare). Washington DC: US Government Accountability office, 2010.
Harmon, Christopher C.. "Illustrations of Discrete Uses of Force." In Toward a Grand Strategy Against Terrorism, 114-115. New York: McGraw-Hill, 2010.
Tudoroiu, Nicolae, Mohammed Zaheeruddin, Vladimir Cretu, and Elena-Roxana Tudoroiu. "IMM-UKF Versus Frequency Analysis [Past and Present]." IEEE Industrial Electronics Magazine 4, no. 3 (2010): 7-18.
Missiroli, Antonio. Implementing the Lisbon Treaty: The External Policy Dimension In Bruges Political Research Papers No. 14 ., 2010.
Cobb, Scott E.. The Importance of a U.S. Security Strategy in the Caspian Black Sea N/A Region In USMC Command and Staff College. Vol. Master of Military Studies . Quantico, VA: Marine Corps University, 2010.
Wegener, Anne-Christine, and Mark Pyman. "The Importance of Integrity Building." In Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices, 178-185. Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2010.
Markoff, John, and David E. Sanger. "In a Computer Worm, a Possible Biblical Clue." The New York Times (2010).
Krastev, Nikola. In U.S. Cybercrime Case, Track Record Indicates Russia Willing to Cooperate. Radio Free Europe/Radio Liberty, 2010.
Yau, Hon Keung, and Alison Lai Fong Cheng. "Influence of Organizational Defensive Actions on the Learning of Information and Communication Technology: An Attitude Study in Hong Kong." International Journal of Management 27, no. 3 (2010): 459-469,579.
Information on Defence Expenditures In NATO Topics., 2010.
Minchev, Zlatogor. Information Processes and Threats in Social Networks: A Case Study In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2010.
Peltier, Thomas R.. Information Security Risk Analysis. 3rd ed. Boca Raton, FL: CRC Press, Taylor & Francis Group, 2010.
Savenko, Oleg, and Sergyi Lysenko. "Information Technology of Intelligent Trojan Detection in Computer Systems." Radioelectronic and Computer Systems 5 (2010): 120-126.
Initial National Communication on Climate Change of Montenegro to the United Nations Framework Convention on Climate Change. Podgorica: Ministry of Spatial Planning and Environment, 2010.
Frinking, Erik J., and J.G.M. Rademaker. "Inlichtingen en Veiligheidsdiensten." In Nationale Veiligheid en inlichtingen, 189-204. Alphen aan den Rijn: Kluwer, 2010.
Carr, Jeffrey. Inside Cyber Warfare. Sebastopol, CA: O’Reilly Media, 2010.
"Integrated Command and Control System Support." In NC3A Service Catalogue, 24., 2010.
Park, Sang-Gun, Tag-Gong Lee, NamKyu Lim, and Hyun-Sik Son. "Integrated Framework and Methodology for Capability Priority Decisions." Information & Security: An International Journal 25 (2010): 78-98.
Rajkovcevski, Rade. "Integration of Euro-Atlantic Norms and Values: Changes in the Military Culture of the Balkans." Connections: The Quarterly Journal 10, no. 1 (2010): 121-137.

Pages