Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21414 results:
RTF
EndNote XML
2006
Greenberg, Steve
,
Evan Mills
, and
Bill Tschudi
.
"
Best Practices for Data Centers: Lessons Learned from Benchmarking 22 Data Centers
." In
ACEEE Summer Study on Energy Efficiency in Buildings
., 2006.
Google Scholar
RTF
EndNote XML
Born, Hans
, and
Ingrid Beutler
.
"
Between legitimacy and efficiency
." In
Social Sciences and the Military: An Interdisciplinary Overview
. Routledge, 2006.
Google Scholar
RTF
EndNote XML
Zine, Jasmin
.
"
Between Orientalism and Fundamentalism: The Politics of Muslim Women’s Feminist Engagement
."
Muslim World Journal of Human Rights
3, no. 1 (2006).
Google Scholar
RTF
EndNote XML
Thym, Daniel
.
"
Beyond Parliament’s Reach? The Role of the European Parliament in the CFSP
."
European Foreign Affairs Review
11, no. 1 (2006): 113.
Google Scholar
RTF
EndNote XML
Bezpieczeństwo Narodowe Polski w XXI wieku
. Warsaw: Bellona, 2006.
Google Scholar
RTF
EndNote XML
Bezpieczeństwo narodowe Polski w XXI wieku. Wyzwania i strategie
. Warsaw: Bellona, 2006.
Google Scholar
RTF
EndNote XML
Vogel, Kathleen
.
"
Bioweapons Proliferation: Where Science Studies and Public Policy Collide
."
Social Studies of Science
36, no. 5 (2006): 676.
Google Scholar
RTF
EndNote XML
McCann, Eamonn
.
The Bloody Sunday Enquiry – The Families Speak Out
. London: Pluto Press, 2006.
Google Scholar
RTF
EndNote XML
BND-Ausschuss
. Die Zeit online, 2006.
Google Scholar
RTF
EndNote XML
Holmes, Stanley
.
"
Boeing’s Global Strategy Takes Off
."
Business Week
(2006).
Google Scholar
RTF
EndNote XML
Blazakis, Jason
.
"
Border Security and Unmanned Aerial Vehicles
."
Connections: The Quarterly Journal
5, no. 2 (2006): 154-159.
DOI
Google Scholar
RTF
EndNote XML
Nuñez-Neto, Blas
.
"
Border Security: Key Agencies and Their Missions
."
Connections: The Quarterly Journal
5, no. 2 (2006): 47-53.
DOI
Google Scholar
RTF
EndNote XML
Caparini, Marina
, and
Otwin Marenin
.
Borders and Security Governance: Managing Security in a Globalised World
. Münster: LIT, 2006.
Google Scholar
RTF
EndNote XML
Duke, Simon
, and
Hanna Ojanen
.
"
Bridging Internal and External Security: Lessons from the European Security and Defence Policy
."
Journal of European Defence Policy
28, no. 5 (2006): 477-94; quoted at 493.
Google Scholar
RTF
EndNote XML
Briefing entitled “Provincial Development Committees – Need for Strengthening”
. FOB Salerno: meetings with UNAMA representatives, 2006.
Google Scholar
RTF
EndNote XML
Handy, George
,
John Kimball
, and
Jeffrey Winbourne
.
"
Building a Sound and Flexible Emergency Response System Hard Won Lessons in Disaster Management
."
Information & Security: An International Journal
19 (2006): 31-38.
DOI
Google Scholar
RTF
EndNote XML
Lee, Seok-Won
,
Divya Muthurajan
,
Robin A. Gandhi
,
Deepak Yavagal
, and
Gail-Joon Ahn
.
"
Building Decision Support Problem Domain Ontology from Natural Language Requirements for Software Assurance
."
International Journal of Software Engineering and Knowledge Engineering
16, no. 6 (2006).
DOI
Google Scholar
RTF
EndNote XML
Simeonov, Simeon
.
"
Bulgarian Air Force - Challenges and Prospects
."
Information & Security: An International Journal
21 (2006): 9-18.
DOI
Google Scholar
RTF
EndNote XML
Moore, James F.
.
"
Business ecosystems and the view from the firm
."
The Antitrust Bulletin
51, no. 1 (2006): 31-75.
DOI
Google Scholar
RTF
EndNote XML
C4ISR for Future Naval Strike Group
. US Naval Studies Board, 2006.
Google Scholar
RTF
EndNote XML
Juels, A.
,
M. Jakobsson
, and
T.N. Jagatic
.
Cache Cookies For Browser Authentication
. IEEE Symposium on Security and Privacy, 2006.
Google Scholar
RTF
EndNote XML
Monaghan, Andrew
.
"
‘Calmly critical’: Evolving Russian views of US hegemony
."
Journal of Strategic Studies
29, no. 6 (2006): 987-1013.
DOI
Google Scholar
RTF
EndNote XML
Stein, Jeff
.
"
Can You Tell a Sunni from a Shiite?
"
New York Times
(2006).
Google Scholar
RTF
EndNote XML
Canada in Kandahar: A Mission Assessment
. Brussels: The Senlis Council, Security and Development Policy Group, 2006.
Google Scholar
RTF
EndNote XML
"
Canada Votes to Extend Mission in Afghanistan
."
Washington Post
(2006).
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
546
547
548
549
550
551
552
553
554
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance