Biblio

Export 21393 results:
2009
Tagarev, Todor. Competencies of the EU-12 defence-related supplier base, EDA study In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2009.
Haimes, Yacov Y.. "On the Complex Definition of Risk: A Systems-Based Approach." Risk Analysis 29, no. 12 (2009): 1647-54.
Matwiczak, Kenneth. A Comprehensive Database of Provincial Reconstruction Teams in Afghanistan. Austin, TX: Lyndon B. Johnson School of Public Affairs, The University of Texas at Austin, 2009.
Comprehensive National Cybersecurity Initiative. Washington, D.C.: The White House, 2009.
Henry, Matthew H., and Yacov Y. Haimes. "A Comprehensive Network Security Risk Model for Process Control Networks." Risk Analysis 29, no. 2 (2009): 223-248.
Cayirci, Erdal, and Dusan Marincic. Computer Assisted Exercises and Training: A Reference Guide. Chichester, UK: John Wiley, 2009.
Cayirci, Erdal, and Dusan Marincic. Computer Assisted Exercises and Training. A Reference Guide . Hoboken, NJ: John Wiley, 2009.
Earley, Pete. Comrade J: The Untold Secrets of Russia's Master Spy in America After the End of the Cold War. New York: Penguin Books, 2009.
Chen, Ching-Pu. "The Concepts and Design of ROC Defense Reorganization." Information & Security: An International Journal 23, no. 2 (2009): 149-162.
The Conclusion of the Government of Montenegro., 2009.
Peimani, Hooman. Conflict and Security in Central Asia and the Caucasus. Santa Barbara, CA: ABC-Clio, 2009.
Bichsel, Christine. Conflict Transformation in Central Asia: Irrigation Disputes in the Ferghana Valley. Abingdon, Oxon & New York: Routledge, 2009.
Rosenbach, Eric, and Aki J. Peritz. Confrontation or Collaboration? Congress and the Intelligence Community. Background Memos on the Intelligence Community Report. Belfer Center for Science and International Affairs, Harvard Kennedy School, 2009.
Popper, Karl. Conjectures and Refutations: The Growth of Scientific Knowledge. London: Routledge Classics, 2009.
Svendsen, Adam D. M.. "Connecting Intelligence and Theory: Intelligence Liaison and International Relations." Intelligence and National Security 24, no. 5 (2009): 700-729.
de Zarobe, Yolanda Ruiz, and Rosa María Jim Catalan. Content and Language Integrated Learning: Evidence from research in Europe. Bristol: Multilingual matters, 2009.
Ratchev, Valeri. "Context Scenarios in Long-Term Defense Planning." Information & Security: An International Journal 23, no. 1 (2009): 62-72.
Continuation of the National Emergency with Respect to Iran In Presidential Documents., 2009.
Iorsh, V.I., I.E. Kryukov, and I.N. Antonenko. "Control of Infrastructure and Safety of Production Systems." Management Methods and Tools (2009).
Tapia, R.S.. "Converging on Business-IT Alignment Best Practices: Lessons Learned from a Dutch Cross-Governmental Partnership." In 2009 IEEE International Technology Management Conference (ICE). Leiden, Netherlands, 2009.
Dimitrov, Vladimir. Conversion of Process Flow Diagrams to Activity Diagrams In Thirty Eighth Spring Conference of the Union of Bulgarian Mathematicians. Borovetz, 2009.
Ho, Joshua. "Cooperative Mechanisms in the Malacca Straits." In International Maritime Security Conference. Singapore: International Maritime Security Conference, 2009.
Lynch, Dov. "The Corfu Process." In The Indivisibility of Security: Russia and Euro-Atlantic Security, 35 ff. Rome: NATO Defense College, 2009.
Henninger, A.J.. Corruption: 15 Afghan Ministers under Investigation; Bribes, Perks, Skimming., 2009.
Urbonas, Raimundas. "Corruption in Lithuania." Connections: The Quarterly Journal 9, no. 1 (2009): 67-92.

Pages