Biblio

Export 21404 results:
2006
Neumann, Peter R.. "Europe’s Jihadist Dilemma." Survival 48, no. 2 (2006).
Frank, Umbach. "Europe’s Next Cold War." Internazionale Politik 62 (2006).
Casey, Terence. "Europe, Soft Power and Gentle Stagnation." Comparative European Politics Review 4, no. 402 (2006).
Archick, Kristin, Paul Gallis, Francis T. Miko, Steven Woehrel, and Carl Ek. European Approaches to Homeland Security and Counterterrorism. Washington, D.C.: Congressional Research Service, 2006.
Terry, Bruce W.. "European Balance of Power: Will the European Union Upset Russia as it Balances the United States?" In Conference of the International Studies Association. San Diego, CA, 2006.
Biscop, Sven, and Edith Drieskens. "The European Security Strategy: Confirming the Choice for Collective and Comprehensive Security." In The United Nations and the European Union: An Even Stronger Partnership, 267. The Hague: TMC Asser Press, 2006.
Smith, M.. European Union. Power and Policy Making. Abingdon: Routledge, 2006.
Archick, Kristin. The European Union: Questions and Answers. Washington, D.C.: Congressional Research Service, 2006.
Marshall, George H.. Evaluating Management Standards: Empirical Research into the Scottish Quality Management. University of Stirling, 2006.
Greenfield, Adam. Everyware: the Dawning Age of Ubiquitous Computing. Berkley, CA: New Riders, 2006.
Palazov, Atanas, and Hristo Stanchev. "Evolution of Human Population Pressure along the Bulgarian Black Sea Coast." In Black Sea Ecosystem 2005 and Beyond. Ystanbul, Turkey, 2006.
Nance, Kara L., and Brian Hay. Evolution of the ASSERT Computer Security Lab. Adelphi: CISSE, 2006.
Malešič, Marjan. "Executive Decisions and Divisions: Disputing Competencies in Civil-Military Relations in Slovenia." In Civil-Military Relations in Europe: Learning from Crisis and Institutional Change, 131. London and New York: Routledge, 2006.
Passing, Martin, and Falko Dressler. Experimental Performance Evaluation of Cryptographic Algorithms on Sensor Nodes In 3rd International Conference on Mobile Adhoc and Sensor Systems., 2006.
Niemann, Arne. Explaining Decisions in the European Union. Cambridge: Cambridge University Press, 2006.
Ambroci, Mr. Ion. Extracted from the report presented at the PfP Counter-Terrorism Working Group (CTWG) meeting in Moldova., 2006.
de Haan, Laurens, and Ana Ferreira. Extreme Value Theory: An Introduction. New York, Springer, 2006.
Ricks, Thomas E.. Fiasco: The American Military Adventure in Iraq. New York: Penguin, 2006.
Gorbenko, Anatoliy, Vyacheslav Kharchenko, Olga Tarasyuk, and Alexey Furmanov. "F(I)MEA-technique of Web Services Analysis and Dependability Ensuring." In Rigorous Development of Complex Fault-Tolerant Systems, Lecture Notes in Computer Science, 153-167. Vol. 4157., 2006.
Gorbenko, Anatoly, Vyacheslav Kharchenko, Olga Tarasyuk, and Alexey Furmanov. "F(I)MEA-Technique of Web-services Analysis and Dependability Ensuring." Rigorous Development of Complex Fault-Tolerant Systems (2006).
Bendiek, Annegret, and Hannah Whitney Steele. "The Financing of the EU’s Common Foreign and Security Policy." Stiftung Wissenschaft und Politik 16 (2006): 1-7.
Finland’s Strategy for Securing the Functions Vital to Society., 2006.
Friedman, Thomas. "The First Law of Petropolitics." Foreign Policy 154 (2006): 28-39.
Saidazimova, Gulnoza. Five Years After 9/11: Crackdowns Loom Behind Central Asia’s War On Terror. RFE/RL, 2006.
Madeira, Pedro Miguel dos. Formal Methods for the Analysis of Security Protocols. Vol. PhD Dissertation. Lisbon: Instituto Superior Tėcnico, Universidade Tecnica de Lisboa, 2006.

Pages