Biblio

Export 21393 results:
2006
Council Joint Action 2006., 2006.
Fulford, Carlton W.. "Countering Ideological Support for Extremism: Challenges and Implications." Connections: The Quarterly Journal 5, no. 3 (2006): 3-6.
Baran, Zeyno. "Countering Ideological Support for Terrorism in Europe: Muslim Brotherhood and Hizb ut-Tahrir – Allies or Enemies?" Connections: The Quarterly Journal 5, no. 3 (2006): 19-34.
Cross, Sharyl. "Countering Ideological Support for Terrorism: Introduction." Connections: The Quarterly Journal 5, no. 3 (2006): 1-2.
Azizian, Rouben. "Countering Islamic Radicalism in Central Asiа." Connections: The Quarterly Journal 5, no. 4 (2006): 93-106.
Katonah, Peter, Michael D. Intriligator, and John P. Sullivan. Countering Terrorism and WMD: Creating a Global Counter-terrorism Network. New York: Taylor & Francis Group, 2006.
Vasu, Norman, and Kumar Ramakrishna. "Countering Terrorism: Multiculturalism in Singapore." Connections: The Quarterly Journal 5, no. 4 (2006): 143-155.
Counterinsurgency Field Manual 3-24, Marine Corps Warfighting Publication . Washington, DC: Department of the Army, 2006.
Counterinsurgency: The U.S. Army Field Manual. Washington, D.C.: Department of the Army, 2006.
David, Galula. Counterinsurgency Warfare: Theory and Practice. Westport, CT: Praeger Security International, Classics of the Counterinsurgency Era, 2006.
Johnson, Goran. "Counterterrorism Related Internet Sources." Information & Security: An International Journal 19 (2006): 119-132.
Alexander, Yonah. Counterterrorism Strategies: Successes and Failures of Six Nations. Washington, DC: Potomac Books , 2006.
Country Reports on Terrorism, Chapter 5 – Country Reports: Europe and Eurasia Overview. U.S. Department of State, Office of the Coordinator for Counterterrorism, 2006.
Zaslavsky, Vladimir, and Anna Strizhak. "Credit Card Fraud Detection Using Self-Organizing Maps." Information & Security: An International Journal 18 (2006): 48-63.
Tagarev, Todor, and Nickolay Pavlov. "Critical Infrastructure Analysis and Protection – Key Issues and Relationships." Military Journal (2006).
Lewis, Ted. Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation. New Jersey: Wiley Interscience, 2006.
Weimer-Jehle, Wolfgang. "Cross-impact balances: A system-theoretical approach to cross-impact analysis." Technological Forecasting and Social Change 73, no. 4 (2006): 334-361.
Stinson, Douglas. Cryptography. Boca Raton: FL: CRC Press, 2006.
Li, Xingan. "Cybersecurity as a Relative Concept." Information & Security: An International Journal 18 (2006): 11-24.
Monitor, ISIJ. "Cybersecurity-Related Internet Sources." Information & Security: An International Journal 18 (2006): 148-149.
F. Larrabee, Stephen. "Danger and Opportunity in Eastern Europe." Foreign Affairs 85, no. 6 (2006).
Fluri, Philipp, and Eden Cole. "DCAF’s Activities in Support of Effective and Democratically Transparent Defense Planning." Connections: The Quarterly Journal 5, no. 1 (2006): 5-14.
de Weger, Michiel. De Binnenlandse Veiligheidstaken van de Nederlandse Krijgsmacht. Assen: Van Gorcum, 2006.
Dead on Time: Arms Transportation, Brokering, and the Threat to Human Rights. Amnesty International and TransArms, 2006.
Aris, Ben. "Death of Yukos." FSU Oil & Gas Monitor (2006): 4.

Pages