Biblio

Export 21387 results:
2010
Afghan War Order of Battle In Wikipedia., 2010.
Centlivres, Pierre, and Micheline Centlivres-Demont. Afghanistan on the Threshold of the 21st Century: Three Essays on Culture and Society. Princeton, NJ: Markus Wiener Publishers, 2010.
Graham-Harrison, Emma. Afghanistan Says Confident Can Secure TAPI Gas Pipeline. Reuters, 2010.
Ferris, John. "After the RMA: Contemporary Intelligence, Power and War." In The Ashgate Research Companion to Modern Warfare. London: Routledge, 2010.
Alberts, David S.. The Agility Imperative: Précis /pre-publication excerpt/ In DOD CCRP Information Age Transformation Series. Washington, D.C, 2010.
Wouters, BG Patrick. "Air Power in the Contemporary Environment." Information & Security: An International Journal 25 (2010): 23-36.
"Air Surveillance Expertise." In NC3A Service Catalogue, 14., 2010.
Galiyeva, Farida. "All Roads Lead to Kabul." Novoye Pokoleniye (2010).
Peters, John E., David Shlapak, and Timothy Liston. "Allied Power Projection Capabilities." Persian Gulf Security: Improving Allied Military Contribution (2010): 71-104.
"Al-Malahem Media." Inspire 1 (2010): 32.
Denton, John W. H.. "Ambitious China Need Not Be an Emerging Problem." The Australian (2010).
Sherewell, Philip, and William Lowther. "American Spy Chiefs Alarmed by Binyam Mohamed Ruling." Daily Telegraph (2010).
Del Pilar, Andrea, and Amaya Beltrán. Análisis de la Política Exterior y de Seguridad de Canadá en Afganistán en el período 2001-2009 In Monografía. Bogotá, D.C.: Universidad Colegio Mayor Nuestra Señora Del Rosario, Facultad De Relaciones Internacionales, 2010.
Analysis of Law in the EU and a Selection of Member States pertaining to Cross-Border Disaster Relief. Synthesis Report and Recommendations. International Federation of Red Cross and Red Crescent Societies, 2010.
Analysis of Law in the EU Pertaining to Cross-Border Disaster Relief (EU IDRL Study). German Red Cross, 2010.
Campbell, Alan. Analytic Implications of the NATO Defence Planning Process In Specialist Team Summary Report. NATO, 2010.
Lopez-Nicolas, Carolina, and Pedro Soto-Acosta. "Analyzing ICT adoption and use effects on knowledge creation: An empirical investigation in SMEs: SSIS." International Journal of Information Management 30, no. 6 (2010): 521.
Gonsalves, Antone. "Android Phones Steal Market Share." InformationWeek (2010).
Announced by Assistant Minister Nedeljkovic, Head of Ministry’s ICT Sector at the Public Hearing on Cyber Security in Serbian Parliament held ., 2010.
Annual Report 2009. Internal Security Agency, 2010.
Brunner, Martin, Hans Hofinger, Christopher Roblee, Peter Schoo, and Sascha Todt. "Anonymity and Privacy in Distributed Early Warning Systems." In CRITIS 2010: Critical Information Infrastructures Security., 2010.
O'Connor, Brendon, and Srdjan Vucetic. "Another Mars–Venus divide? Why Australia said ‘yes’ and Canada said ‘non’ to involvement in the 2003 Iraq War." Australian Journal of International Affairs, Volume 64, 2010 - Issue 5 64, no. 5 (2010): 526-548.
Bitter, Christian, David A. Elizondo, and Tim Watson. "Application of Artificial Neural Networks and Related Techniques to Intrusion Detection." In The 2010 International Joint Conference on Neural Networks (IJCNN)., 2010.
Procházková, Dana. Application of SWOT Analysis and of Selected Types of Case Studies at Selection of Model for Strategic Territory Safety Management., 2010.
Giacobe, Nicklaus A.. Application of the JDL Data Fusion Process Model for Cyber Security In Multisensor, Multisource Information Fusion: Architectures, Algorithms, and Applications. Vol. 7710. SPIE, 2010.

Pages