Biblio

Export 21372 results:
2015
Wingeart, Jason M.. Comparing India's Counterinsurgency Approaches in Sri Lanka and Against the Naxalites In Technical Report. Fort Leavenworth United States: US Army School for Advanced Military Studies, 2015.
"Complex Crises Call for Adaptable and Durable Capabilities." The Military Balance 115, no. 1 (2015).
Prezelj, Iztok. "Comprehensive Security and Some Implemental Limits." Information & Security: An International Journal 33, no. 1 (2015): 13-34.
Computer Networks and Cybersecurity. New Man's Business Accelerator, 2015.
Yunis, Manal M., and Kai S. Koong. "A Conceptual Model for the Development of a National Cybersecurity Index: An Integrated Framework." In Twenty-first Americas Conference on Information Systems. Puerto Rico, 2015.
US Department of State. Confidence-Building Measure Return Covering 2014: Convention on the Prohibition of the Development, Production and Stockpiling of Bacteriological (Biological) and Toxin Weapons and on their Destruction., 2015.
Nowakowska-Krystman, Aneta, and Marzena Żakowska. "Conflict in Kosovo through the Conceptual Framework of Stakeholders." Connections: The Quarterly Journal 14, no. 4 (2015): 69-81.
Dumaine, Carol, and Irving Mintzer. "Confronting Climate Change and Reframing Security." SAIS Review of International Affairs 35, no. 1 (2015): 5-16, p. 6.
Martin, Arthur, and Richard Spillett. "Conned by Jihadi Cold Callers: Yard Reveals Pensioners are Being Fleeced out of Savings by ISIS Backers." Daily Mail (2015).
Yablokov, Ilya. "Conspiracy Theories as a Russian Public Diplomacy Tool: The Case of Russia Today (RT)." Politics 35, no. 3-4 (2015).
The Constitution of Bosnia and Herzegovina., 2015.
Xianghong, Zeng. "Construction of China's diplomacy in Central Asia and the Silk Road Economic Belt." Journal of Shanghai Jiaotong University: Philosophy and Social Sciences, no. 3 (2015).
Minxing, Huang. Contemporary Identification of Azerbaijani People in Iran (in Chinese). World Nation, 2015.
Government, HM. CONTEST: The United Kingdom’s Strategy for Countering Terrorism: Annual Report for 2014. London: The Stationery Office, 2015.
Davis, Jr, John R.. "Continued evolution of hybrid threats. The Russian Hybrid Threat Construct and the Need for Innovation." The Three Swords Magazine 28 (2015).
Convention on Cybercrime. Council of Europe, 2015.
Govan, Gregory G.. "Conventional Arms Control in Europe: Some Thoughts About an Uncertain Future." Deep Cuts, no. Brief #5 (2015).
Ojedokun, Oluyinka, and Shyngle K. Balogun. "The Costs of Policing: Psychosocial Capital and Mental Health Outcomes in a Nigeria Police Sample." The Spanish Journal of Psychology 18 (2015).
Council Conclusions on Counter-terrorism In Press Release. Council of the EU, 2015.
Council Conclusions on Migration In Press Release. Council of the EU, 2015.
Council Decision (CFSP) 2015/1835 of 12 October 2015 defining the statute, seat and operational rules of the European Defence Agency. European Defence Agency, 2015.
Council Decision Establishing Provisional Measures in the Area of International Protection for the Benefit of Italy and Greece. Council of the European Union, 2015.
Sharland, Lisa. "Counter-IED Technology in UN Peacekeeping: Expanding Capability and Mitigating Risks." International Peacekeeping 22, no. 5 (2015): 587-602.
Countering Hybrid Threats, Food-for-thought paper In Council of the European Union. Brussels: European External Action Service (EEAS), 2015.
Boot, Max. "Countering Hybrid Warfare." Armed Conflict Survey 2015 (2015): 11-20.

Pages