Biblio

Export 21393 results:
2009
Van Baarda, Th.A., and D.E.M. Verweij. The Moral Dimension of Asymmetrical Warfare: Counter-Terrorism, Democratic Values and Military Ethics. Leiden: Martinus Nijhoff Publisher, 2009.
Mileham, Patrick. Moral Dynamics In Culture Centric Warfare. Human Rights and Humanitarian Law E-Books Online, 2009.
Wang, Yan-Yan, Jia-Yong Liu, Feng-Xia Xiao, and Jing Dan. "A More Efficient and Secure Dynamic ID-Based Remote User Authentication Scheme." Computer Communication 32, no. 4 (2009).
Mundy, Jacob. "The Morocco-Polisario War for Western Sahara." In Conflict and Insurgency in the Contemporary Middle East, 220. London: Routledge, 2009.
Veser, Reinhard. "Moskau verliert gegen Korfu. Ein Dämpfer für Medwedjews Sicherheitsinitiative." Frankfurter Allgemeine Zeitung (2009): 5.
Iovane, G., G. Ingenito, and M. Leone. "Motion tracking using fuzzy logic and consistent labeling for multiple objects in multiple cameras vision." Journal of Discrete Mathematical Sciences and Cryptography 12, no. 1 (2009).
Schoenen, Rainer. "Multihop Extensions to Cellular Networks - the Benefit of Relaying for LTE." In Long Term Evolution: 3GPP LTE Radio and Cellular Technology, edited by Borko Furht and Syed A. Ahson, 266-303. Boca Raton: Auerbach Publications, 2009.
Ahmad, Ashraf M. A., and Ismail Khalil Ibrahim. Multimedia Transcoding in Mobile and Wireless Networks . Hershey: IGI Global, 2009.
Ganz, Aura, Zvi Ganz, and Kitti Wongthavarawat. Multimedia Wireless Networks: Tech¬nologies, Standards, and QoS. Indianapolis, IN: Prentice Hall, 2009.
Multinational Experiment 6 In Multimedia presentation. Oslo: Royal Norwegian Army, 2009.
Multiple Futures Project: Navigating Towards 2030 In Final Report. NATO, 2009.
Romm, Joseph. Must-read Obama Speech Warns of ‘Irreversible Catastrophe’ from Climate Change. Alternet.org, 2009.
NAFTA’s Winners and Losers. Investopedia, 2009.
"Najibullah Lafraie, NATO in Afghanistan: perilous mission, dire ramifications." International Politics 46, no. 5 (2009): 550-572.
Tagarev, Todor. National Crisis Management Systems In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2009.
Hansen, Holley E., and Vicki L. Hesli. "National Identity: Civic, Ethnic, Hybrid, and Atomised Individuals." Europe-Asia Studies 61, no. 1 (2009): 1-28.
Shatirishvili, Zaza. "National Narratives and New Politics of Memory in Georgia." Small Wars & Insurgencies 20, no. 2 (2009): 391-399.
National Programme for Disaster Protection 2009-2013., 2009.
Rademaker, Michel. "National Security Strategy of the Netherlands: An Innovative Approach." Information & Security: An International Journal 23, no. 1 (2009): 51-61.
National Security Strategy of the Republic of Serbia (in Serbian language)., 2009.
The National Security Strategy of the Russian Federation until 2020., 2009.
National Threat Assessment 2008. Organised Crime. Zoetermeer, The Netherlands: KLPD–IPOL Department, Netherlands Police Agency, 2009.
Thomas, Timothy. "Nation-State Cyber Strategies: Examples From China and Russia." In Cyberpower and National Security, 475-76. Washington, D.C.: National Defense University Press, 2009.
Thomas, Timothy L.. "Nation-State Cyber Strategies: Examples from China and Russia ." In Cyberpower and National Security, 477, 486. Franklin D. Kramer, Stuart H. Starr, and Larry K. Wentz ed. Dulles: Potomac Books, 2009.
Hughes, Rex B.. "NATO and CyberDefence- Mission Accomplished?" (2009).

Pages