G., Weimann. The Internet as a Terrorist Tool to Recruit Youth. Arlington: Youth Recruitment & Radicalization Roundtable, 2009.
Grevi, Giovanni. The Interpolar World: A New Scenario In
Occasional Papers. Vol. 79. EU Institute for Security Studies, 2009.
Blank, Stephen J.. "
Introduction." In
Prospects for U.S.-Russian Security Cooperation, 1. Carlisle Barracks, PA: Strategic Studies Institute, U.S. Army War College, 2009.
Bjørgo, Tore, and John Horgan. "
Introduction." In
Leaving Terrorism Behind: Individual and Collective Disengagement, 1-14. Oxon and New York: Routledge, 2009.
Bucur-Marcu, Hari. "
Introduction." In
Defence Management: An Introduction, 3-13. Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2009.
Tagarev, Todor. "
Introduction to Programme-based Force Development." In
Defence Management: An Introduction, 75-92. Security and Defence Management Series. Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2009.
Krichen, Emine, Bernadette Dorizzi, Zhenan Sun, and Sonia Garcia-Salicetti. "
Iris Recognition." In
Guide to Biometric Reference Systems and Performance Evaluation, 25-49. London: Springer, 2009.
Asal, Victor H., and Karl R. Rethemeyer. "
Islamist Use and Pursuit of CBRN Terrorism." In
Jihadists and Weapons of Mass Destruction. Boca Raton, FL: CRC Press, 2009.
Minchev, Zlatogor. Joint Training Simulation and Analysis Center (JTSAC) Technical Report In
IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2009.