Biblio

Export 21404 results:
2005
Polyakov, Leonid. "An Analytical Overview of Democratic Oversight and Governance of the Defence and Security Sector in Ukraine." In DCAF Working Papers., 2005.
Abadi, Martin, and Bruno Blanchet. "Analyzing Security Protocols with Secrecy Types and Logic Programs." Journal of the ACM 52, no. 1 (2005): 102-146.
The ancient Corps of the Royal Carabinieri., 2005.
Putin, Vladimir. Annual Address to the Federal Assembly of the Russian Federation. Moscow: The Kremlin, 2005.
Dormann, Knut. "Applicability of the Additional Protocols to Computer Network Attack." In International Experts Conference on Computer Network Attack and the Applicability of International Humanitarian Law. Stockholm, 2005.
Laslau, Andi. "Arabs in Romania, A Complete Radiography." Evenimentul Zilei (2005).
Shalamanov, Velizar, and Stoyan Avramov. Architecture for the integration of field and stationary information systems for emergency management In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2005.
Kirov, Georgi, and Valentin Stoyanov. "Architectures in the Analysis of Requirements and Design of Simulation Systems." Information & Security: An International Journal 16 (2005): 104-114.
Juthe, A.. "Argument by Analogy." Argumentation 19, no. 1 (2005).
Armenia’s Commitments under Individual Partnership Action Plan with NATO, 2005., 2005.
Armenia’s commitments under Individual Partnership Action Plan with NATO., 2005.
Francis, David. "Arms Expert Calls for START Verification Extension." Global Security Newswire (2005).
Martin, Jeremy. The Art of Casual WiFi hacking., 2005.
Peter, Szor. The Art of Computer Virus Research and Defense . Addison Wesley Professional, 2005.
M. Rahmat, Imadudin. Arus Baru Islam Radikal; Transmisi Revivalisme Islam Timur Tengah ke Indonesia. Jakarta: Erlangga, 2005.
Domin, Igor, and Aleksandr Savinkin. "Asimmetrichnoe voevanie." Otechestvennye zapiski 5 (2005).
Tashkov, Dimitar. "Assessing and Managing Risk in Operations Planning." Military Journal (2005).
Affairs, Liese Prokop Aus. "Austria–A Base of Re-organization for Terrorists." Curentul (2005).
Armando, Alessandro, D.A. Basin, and Y. Boichut. "The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications." In International Conference on Computer Aided Verification CAV 2005. Heidelberg: Springer, 2005.
Starr, Frederick, and Svante E. Cornell. The Baku-Tbilisi-Ceyhan Pipeline: Oil Window to the West. Washington DC: Central Asia-Caucasus Institute and Silk Road Studies Program, 2005.
Gallagher, Tom. The Balkans in the New Millennium: In the Shadow of War and Peace. London: Routledge, 2005.
Mendelson, Sarah. Barracks and Brothels: Peacekeeping and Human Trafficking in the Balkans. Washington, D.C.: CSIS, 2005.
Junqueira, Luis Carlos, and Jose Carneiro. Basic Histology Text & Atlas. McGraw-Hill Professional, 2005.
R., Dhamijaр, and Tygar J.D.. The Battle Against Phishing: Dynamic Security Skins. Symposium on Usable Privacy and Security (SOUPS), 2005.
Gadeyne, K., T. Lefebvre, and H. Bruyninckx. "Bayesian Hybrid Model-State Estimation Applied to Simultaneous Contact Formation Recognition and Geometrical Parameter Estimation ." The International Journal of Robotics Research (2005).

Pages