Biblio

Export 21387 results:
2008
Jones, Seth G.. Counterinsurgency in Afghanistan . Santa Monica: CA: RAND Corporation , 2008.
Pirnie, Bruce R., and Edward O’Connel. Counterinsurgency in Iraq (2003–2006). Santa Monica, CA: Rand Corporation, 2008.
Philipp, Fluri, and Viorel Cibotaru. "Country Study – Armenia." In Defence Institution Building: Country Profiles and Needs Assessments for Armenia, Azerbaijan, Georgia and Moldova – Background Materials, 26. Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2008.
Cavelty, Myriam Dunn. Critical Information Infrastructure Protection, Overview. ETH Zurich, Switzerland.: Center for Security Studies (CSS), 2008.
Yoon, Eun-Jun, Ein-Jung Lee, and Kee-Young Yoo. Cryptanalysis of Wang et al.’s Remote User Authentication Scheme Using Smart Cards In 5th International Conference on Information Technology: New Generations., 2008.
Shih, Hsi-Chang. Cryptanalysis on Two Password Authentication Schemes In Laboratory of Cryptography and Information Security. Vol. Master's Thesis. Taiwan: National Central University, 2008.
Tikk, Eneken. Cyber Attacks Against Georgia: Legal Lessons Identified. Tallinn, Estonia : Cooperative Cyber Defense Center of Excellence, 2008.
Cyber Security Strategy 2008. Ministry of Defence, 2008.
Geers, Kenneth. "Cyberspace and the Changing Nature of Warfare." SC Magazine (2008).
Frydrych, Eunika Katarzyna. "The Debate on NATO Expansion." Connections: The Quarterly Journal 7, no. 4 (2008): 1-42.
Decision no. 548/2008, for approval of the National Strategy for Communication and Public Information for Emergency Situations., 2008.
Demant, Froukje. Decline and Disengagement: An Analysis of Processes of Deradicalisation. Amsterdam: Institute for Migration and Ethnic Studies, 2008.
Fluri, Philipp H., and Viorel Cibotaru. Defence Institution Building: Country Profiles and Needs Assessments for Armenia, Azerbaijan, Georgia and Moldova. Geneva: DCAF, 2008.
Tagarev, Todor. Defence Programmes as a Language for Effective Communication In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2008.
Hendricks, Cheryl, and Lauren Hutton. "Defence Reform and Gender." In Gender and Security Sector Reform Toolkit, 13., 2008.
Lugar, Richard. Defense against Weapons of Mass Destruction In speech at conference. Chantilly, VA, 2008.
Polyakov, Leonid I.. "Defense Institution Building in Ukraine." Connections: The Quarterly Journal 7, no. 2 (2008): 15-20.
Tagarev, Todor, and Valeri Ratchev. Defense policy and development of the Armed Forces of the Republic of Bulgaria 2018. Sofia: Military Publishing House, 2008.
The Defense Strategy of Montenegro. Official Gazette of Montenegro, no. 79/08, 2008.
Tagarev, Todor. Democratic governance of the security sector: Defence Policy In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2008.
Diamond, Larry. "The Democratic Rollback. The Resurgence of the Predatory State." Foreign Affairs 87, no. 2 (2008): 36-48.
Tagaya, Kazuteru. Denki Tsushin Jigyou Hou Chikujyou Kaisetsu [Commentary on the Telecommunications Business Act in 1984]. Jyouhou Tsushin Shinko Kai , 2008.
Department of Defense Dictionary of Military and Associated Terms. Washington, D.C.: Department of Defense, 2008.
Siegert, Jens. "Der Umgang mit Russland nach Kaukasus-Krieg und Finanzkrise." Russland-Analysen 172 (2008): 13-15.
Rashidand, Ahmed. Descent Into Chaos: The United State and the Failure of Nation Building in Pakistan, Afghanistan and Central Asia. New York: Penguin,, 2008.

Pages