Biblio

Export 21387 results:
2008
Rudner, Martin. "Intelligence Studies in Higher Education: Capacity-Building to Meet Societal Demand." International Journal of Intelligence and Counter-Intelligence 22, no. 1 (2008).
Strom, Kevin, and Joe Eyerman. "Interagency Coordination: A Case Study of the 2005 London Train Bombings." National Institute of Justice Journal 260 (2008): 8-11.
Andonov, Filip. Interaktiven metod za grupovo vzemane na reshenia., 2008.
Colletta, Nat J.. Interim Stabilization: Balancing Security and Development in Post-Conflict Peacebuilding. Stockholm: SIPRI, 2008.
Zivanovic, Katarina. "International Cooperation of Intelligence Agencies against Transnational Terrorist Targets." Connections: The Quarterly Journal 8, no. 1 (2008): 115-141.
Internet of Things 2020 – Roadmap for the future In INFSO D.4 Networked Enterprise & RFID INFSO G.2 Micro & Nanosystems., 2008.
Walter, Gregor. Internetkriminalität: eine Schattenseite der Globalisierung In SWP-Studie. Berlin: Stiftung Wissenschaft und Politik -SWP- Deutsches Institut für Internationale Politik und Sicherheit, 2008.
Canary, Daniel J., Michael J. Cody, and Valerie L. Manusov. Interpersonal Communication: A Goals Based Approach. New York: Bedford/St. Martin’s, 2008.
Haig, Zsolt, and István Várhegyi. "Interpretation of Cyberspace and Cyber Warfare." Military Science (2008): 5-10.
Interview in Chinese mass media: Xinhua News Agency, People’s Daily newspaper and Central Television of China. official website of the President of Russia, 2008.
"Interview with Dmitry Medvedev." Financial Times (2008).
Interview with Sergey Kislyak, Russian Ambassador to the United States. Arms Control Association, 2008.
Edwards, Geoffrey, and Christoph O. Meyer. "Introduction: Charting a Contested Transformation." JCMS: Journal of Common Market Studies 46, no. 1 (2008): 1-25.
Smola, Alex, and S.V.N. Vishwanathan. Introduction to Machine Learning. Cambridge University Press, 2008.
Adler-Nissen, Rebecca, and Thomas Gammeltoft-Hansen. "An Introduction to Sovereignty Games." In Sovereignty Game: Instrumentalizing State Sovereignty in Europe and Beyond. New York: Palgrave Macmillan, 2008.
Tagarev, Todor, and Valeri Ratchev. "Introductory part." In Bulgaria's Defence Policy and Force Development 2018. Sofia: Military Publishing House, 2008.
O’Hanlon, Michael E., and Jason H. Campbell. Iraq Index – Tracking Variables of Reconstruction & Security in Post-Saddam Iraq In Brookings Institution Report., 2008.
ISO/IEC 15408-2:2008 Information technology — Security techniques — Evaluation criteria for IT security, Part 2: Security functional components., 2008.
ISO/IEC 15408-3:2008 Information technology — Security techniques — Evaluation criteria for IT security, Part 3: Security assurance components., 2008.
ISO/IEC 18045:2008 Information technology — Security techniques — Methodology for IT security evaluation., 2008.
Donadio, Rachel. Italy’s Attacks on Migrants Fuel Debate on Racism. The New York Times, , 2008.
Hahn, Gordon M.. "The Jihadi Insurgency and the Russian Counterinsurgency in the North Caucasus." Post-Soviet Affairs 24, no. 1 (2008): 1-39.
Salahub, Jennifer Erin, and Krista Nerland. "Just Add Gender? Challenges to Meaningful Integration of Gender in SSR Policy and Practice." In The Future of Security Sector Reform, 154., 2008.
Cizre, U¨mit. "The Justice and Development Party and the military: Recreating the past after reforming it?" In Secular and Islamic Politics in Turkey: The making of the Justice and Development Party, 132-172. Routledge Studies in Middle Eastern Politics, 2008.
Quast, Shelby. "Justice Reform and Gender." In Gender and Security Sector Reform Toolkit, 8. Geneva: DCAF, OSCE/ODIHR, UN-INSTRAW, 2008.

Pages