Biblio

Export 21387 results:
2010
Tennoe, Mariam T., and Susan F. Henssonow. Padding (Cryptography) Paperback., 2010.
Guo, Jing-Ming, and Chih-Yu Lin. "Parallel and element-reduced error-diffused block truncation coding." IEEE Transactions on Communications 58, no. 6 (2010).
Brummer, Ville. Participatory Approaches to Foresight and Priority-Setting in Innovation Networks. Espoo, Finland: Aalto University School of Science and Technology, 2010.
Partnership Action Plan for Defence Institution Building. NATO, 2010.
Kokkola, Tom. The Payment System: Payments, Securities and Derivatives, and the Role of the Eurosystem . Frankfurt: European Central Bank, 2010, 2010.
Shoemaker, Julie. Peacekeeping Brigade Training Center Opens in Kazakhstan., 2010.
liang, Jing Pei, Xu Shi you, Li Xian, and Chen Zeng-ping. Performance Evaluation of Multiple Target Tracking: A Survey (多目标跟踪性能评估方法综述). Changsha, Hunan: National University of Defense Technology, 2010.
Lounibos, Tom. "Performance Testing from the Cloud ." Open Source Business Resource (2010).
Carver, Charles S., and Jennifer Connor-Smith. "Personality and coping." The Annual Review of Psychology 61 (2010): 679-704.
Greene, James. "Personnel policies." In Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices, 47-62. Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2010.
Hunt, Steven. Physical security information management (PSIM): The basics. CSO Online, 2010.
"Piracy in Year 2010: Marines Are the Only Hope." Sea Bulletin-Sovfreight (2010).
"Piracy in Year 2010: Pirates Are the Only Hope." Sea Bulletin-Sovfreight (2010).
Christie-Miller, Alexander. "The PKK and the Closure of Turkey's Kurdish Opening." Middle East Report (2010).
Popovic, Nicola. Planning for Action on Women and Peace and Security: National-Level Implementation of Resolution 1325 (2000). New York: United Nations, 2010.
Tagarev, Todor, and Boyan Mednikarov. "Planning of Security Sector Capabilities for Protection of Maritime Sovereignty." In Scientific Support for the Decision Making in the Security Sector., 2010.
Tulkoff, Milton L., Vance C. Gordon, Rachel D. Dubin, and Wade P. Hinkle. Planning, Programming, and Budgeting System (PPBS)/Multi-year Programming Reading Guide In IDA Document D-4057. Alexandria, VA: Institute for Defense Analysis, 2010.
Robles, Rikki Ruperto N.. Plate Number Recognition System for Beating the Red Light Violators In Department of Physical Sciences and Mathematics. Vol. Bachelor of Science in Computer Science. Manila: University of the Philippines, 2010.
Gillespie, Paul. "‘Polarities’ Old Hat in Newest of World Orders." The Irish Times (2010).
Baker, Al, and William K. Rashbaum. "Police Find Car Bomb in Times Square." New York Times (2010).
Bayley, David H., and Robert M. Perito. The Police in War: Fighting Insurgency, Terrorism, and Violent Crime. Boulder, CO: Lynne Rienner, 2010.
Le Grand, Gwendal, Franck Springinsfeld, and Michel Riguidel. Policy Based Management for Critical Infrastructure Protection In ACIP Project funded by the European Commission., 2010.
Tagarev, Todor. Policy for security and development of the unified Electronic Communications Network and the National Network of the State Administration In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2010.
Szymanski, Adam, and Marcin Terlikowski. The Policy of Turkey towards EU-NATO Cooperation. Warsaw: The Polish Institute of International Affairs, 2010.
Navarro, Aaron. Political Intelligence and the Creation of Modern Mexico, 1938-1954. Pennsylvania: The Pennsylvania State University Press, 2010.

Pages