Biblio

Export 21404 results:
2010
Fairclough, Gordon. "U.S., Poland Amend Missile-Defense Plan." Wall Street Journal (2010).
Conley, Heather, and Jamie Kraut. "U.S. Strategic Interests in the Arctic." Center for Strategic & International Studies (2010).
Hughes, Geraint. "The Use of Undercover Military Units in Counter-Terrorist Operations: A Historical Analysis with Reference to Contemporary Anti-terrorism." Small Wars and Insurgencies 21, no. 4 (2010): 561-90.
Pruyt, Erik. Using Small Models for Big Issues: Exploratory System Dynamics Modelling and Analysis for Insightful Crisis Management In 18th International Conference of the System Dynamics Society. Seoul, Korea, 2010.
Murphy, Robert K., and Scott D. Beach. "Using Strategic Planning in Support of Defense Acquisitions." Information & Security: An International Journal 25 (2010): 57-77.
Andel, Todd R., Kyle E. Stewart, and Humphries W. Jeffrey. Using Virtualization for Cyber Security Education adn Experimentation. CISSE, 2010.
Tagarev, Todor. "Utilisation of Surplus Equipment and Infrastructure." In Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices, 124-136. Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2010.
Dionysiou, Theodoras, Vasilios A. Siris, and George Stamatakis. "Utility-based channel assignment and topology control in wireless mesh networks." In 2010 IEEE International Symposium on A World of Wireless, Mobile and Multimedia Net¬works (WoWMoM). Montreal, 2010.
Lefterova, Мilena. Verification and Validation Strategy for Precisely Drag Estimation of ERCOFTAC Test Body In Black Sea’2010. Varna: University publishing house, Technical University, 2010.
Deda, Ilir. "The View from Kosovo: Challenges to Peace-building and State-building." Connections: The Quarterly Journal 9, no. 3 (2010): 89-94.
Oppermann, Daniel. "Virtual attacks and the problem of responsibility: the case of China and Russia." Carta Internacional 5, no. 2 (2010).
Zenebe, Azene, and David Anyiwo. Virtual Lab for Information Assurance Education. CISSE, 2010.
Allison, Roy. "Virtual Regionalism and Protective Integration in Central Asia." In Eurasian Per-spectives: In Search of Alternatives, 29-48. Kolkata: Shipra Publications, 2010.
Lagadec, Philippe. "Visualisation et Analyse de Risque Dynamique pour la Cyber- Défense." In Symposium sur la Sécurité des Technologies de l’Information et de la Communication (SSTIC). Rennes, 2010.
Volunteering in the European Union In final report to the Educational. GHK, Audiovisual & Culture Executive Agency and Directorate General Education and Culture, 2010.
Šterbenc, Marko. Vpliv informacijskega sistema poveljevanja in kontrole na uspešnost procesa poveljevanja in kontrole v SV In Fakulteta za management. Vol. Magistrska naloga. Koper: Univerza na Primorskem, 2010.
Xiuwen, Zhao. Vulnerability assessment of urban buried gas pipeline. Capital University of Economics and Trade, 2010.
Gaillard, Jean-Christophe. "Vulnerability, Capacity and Resilience: Perspectives for Climate and Development Policy." Journal of International Development 22, no. 2 (2010): 218-232.
Izquierdo, Lisa Marie, Mari Stangerhaugen, Diana Castillo, Robert Nixon, and Gloria Jimenez. Water Crisis in Central Asia: Key Challenges and Opportunities. New York: New School University, 2010.
Haralampiev, K., and G. Naidenov. "Waves of the Change and Change of the Waves." Sociological Problems Special Issue (2010).
San Martín, Pablo. Western Sahara: The Refugee Nation. Cardiff: University of Wales Press, 2010.
Zunes, Stephen, and Jacob Mundy. Western Sahara: War, Nationalism and Conflict Irresolution. New York, NY: Syracuse University Press, 2010.
Biscop, Sven, Teija Tiilikainen, Stefano Silvestri, Nicole Gnesotto, Daniel Keohane, and Jolyon Howorth. What do Europeans Want from NATO?. Brussels: European Union Institute for Security Studies, 2010.
Morozov, Yuriy. "What publication of myths about the Chinese threat will lead to." Central Asia and the Caucasus 13, no. 2 (2010): 118-129.
Nyhan, Brendan, and Jason Reifler. "When Corrections Fail: The Persistence of Political Misperceptions." Political Behavior 32, no. 2 (2010): 303-330.

Pages