Biblio

Export 21387 results:
2009
Boghardt, Thomas. "Operation INFEKTION: Soviet Bloc Intelligence and Its AIDS Disinformation Campaign." Studies in Intelligence 53, no. 4 (2009): 1-2.
Manev, Evgeni. "Operational Analysis in Support of Armed Forces Transformation: The Role of Organizational Culture." Information & Security: An International Journal 23, no. 2 (2009): 163-174.
Torp, Jan Erik. "Operational Analysis Support to Defence in Norway." Information & Security: An International Journal 23, no. 2 (2009): 263-265.
Olsson, Louise, and Johan Tejpar. Operational Effectiveness and UN Resolution 1325 – Practices and Lessons from Afghanistan. Stockholm: Swedish Defense Research Agency, 2009.
Blakeney, Debbie, Leonard Kerzne, Binyam Solomon, Paul Chouinard, and Andrew Billyard. "Operational Research Tools Supporting the Force Development Process for the Canadian Forces." Information & Security: An International Journal 23, no. 1 (2009): 81-98.
Rademaker, Michel. "Operations Analysis in the Netherlands: A Brief Overview." Information & Security: An International Journal 23, no. 2 (2009): 269-271.
"Ordinance on Service in the Armed forces of the Republic of Croatia." Official Gazette 91/09 (2009).
Ivanov, Andrey. "Organization and Immediate Challenges of Civil Protection in Bulgaria." Information & Security: An International Journal 24 (2009): 11-13.
Belova, Maria. "The Oriental Vector." Oil of Russia 2 (2009).
Cevasco, Cf. Francis M.. "Origins of a Four Decade Success Story. NATO SeaSparrow’s founders got it right." Common Defense Quarterly 4 4 (2009).
Cullen, Stephen P.. "Out of Reach: Improving the System to Deter and Address Criminal Acts Committed by Contractor Employees Accompanying Armed Forces Overseas." Public Contract Law Journal 38 (2009): 509, 514.
Hofmann, Stephanie C.. "Overlapping Institutions in the Realm of International Security: The Case of NATO and ESDP." Perspectives on Politics 7, no. 1 (2009): 45-52.
Pacific Fleet Servicemen Implemented the Entire Program of Combat Training in 2009. RIA Vesti, 2009.
Kazi, Reshmi. "Pakistan’s HEU-based Nuclear Weapons Programme and Nuclear Terrorism: A Reality Check." Strategic Analyses 33, no. 6 (2009): 863-865.
Travis, Cited in Alan, and Owen Bowcott. Papers Released under the 30 Year Rule Reveal the Full Force of Thatcher’s Fury. Vol. May 22, 2015. The Guardian, 2009.
Mullins, Sam. "Parallels Between Crime and Terrorism: A Social-Psychological Perspective." Studies in Conflict and Terrorism 32, no. 9 (2009): 811-30.
Dezhu, Dai. "On the particularity of privacy and legislative issues in e-government (论电子政务中的特殊性隐私及其立法问题)." Theoretical Monthly 7 (2009): 103-106.
Herley, Cormac, P.C. van Oorschot, and Andrew Patrick. "Passwords: If We’re So Smart, Why Are We Still Using Them?" In Financial Cryptography and Data Security, 230-237. Berlin/Heidelberg: Springer, 2009.
, and & Co.. Pathways to a Low-Carbon Economy: Version 2 of the Global Greenhouse Gas Abatement Cost Curve. New York: McKinsey, 2009.
Szigeti, Janos, Ricardo Romeral, Tibor Cinkler, and David Larrabeiti. "p-Cycle Protection in Multi-Domain Optical Networks." In Photonic Network Communications., 2009.
Hammond, Martin. The Peloponnesian War. Oxford: Oxford University Press, 2009.
"Pentagon Letter Complicates Blackwater Case." Washington Post (2009).
Verpoorten, Dominique, Christian Glahn, and Milos Kravcik. "Personalisation of Learning in Virtual Learning Environments." In Learning in the Synergy of Multiple Disciplines, 52-66. Berlin, Heidelberg: Springer Verlag, 2009.
"Pervyi Boi Admirala." Rossiiskaya Gazeta (2009).
Philp, Wayne R., and Christopher P. Martin. "A philosophical approach to time in military knowledge management." Journal of Knowledge Management 13, no. 1 (2009): 171-183.

Pages