Biblio

Export 21404 results:
2009
North, Douglass C., John Joseph Wallis, and Barry R. Weingast. Violence and Social Orders: A Conceptual Framework for Interpreting Recorded Human History . Cambridge: Cambridge University Press, 2009.
.Tanislav, D, A. Costache, and G. Muratereanu. Vulnerability to Natural Hazards in Romania In Geografical Forum, University of Criova., 2009.
Horgan, John. Walking Away from Terrorism: Accounts of Disengagement from Radical and Extremist Movements. Oxon and New York: Routledge, 2009.
Clarke, Richard A.. War from Cyberspace In The National Interest., 2009.
Cutts, Andrew. "Warfare and the Continuum of Cyber Risks: A Policy Perspective." In The Virtual Battlefield: Perspectives on Cyber Warfare, 69. Amsterdam: IOS Press, 2009.
Dean, Cornelia. "Water: A Change in Tone." New York Times (2009).
Water resources across Europe – confronting water scarcity and drought In Technical report. European Environment Agency (EEA, 2009), 2009.
Guo, Jing-Ming, Min-Feng Wu, and Yong-Chuen Kang. "Watermarking in conjugate ordered dither block truncation coding images." In IEEE International Symposium on Circuits and Systems. Taipei, Taiwan , 2009.
Hoffman, Maj. Randall S.. The Way Ahead: Reclaiming the Pashtun Tribes through Joint Tribal Engagement in Applications in Operational Culture. Quantico, VA: Marine Corps University Press, 2009.
Kamp, Karl-Heinz. The Way to NATO’s New Strategic Concept In NATO Defense College Research. Rome: NATO Defense College, 2009.
Giragosian, Richard. Weathering the Storm: A Commentary on Armenia and the Economics of Power. ArmeniaNow.com, 2009.
Giragosian, Richard. Weathering the Storm: A Commentary on Armenia and the Global Economic Crisis. ArmeniaNow.com, 2009.
Chakarov, Angel. "Welcoming Address." Information & Security: An International Journal 24 (2009): 9-10.
Haider, Abrar. What Happens After the Click? Role of Internet Information in Shaping Democratic Values In AMCIS 2009. Vol. Paper 377., 2009.
What is Transitional Justice?. International Center for Truth and Justice (ICTJ), 2009.
Yap, Gerald T.. When is a Hack an Attack? A Sovereign States Options if Attacked in Cyberspace: A Case Study of Estonia 2007 In Research Report. Alabama: Air Command And Staff College Air University Maxwell Air Force Base, 2009.
de Dardel, Jean-Jacques. Whither the Euro-Atlantic Partnership? Partnership and NATO’s New Strategic Concept In GCSP Geneva Papers. Vol. 10. Geneva: Geneva Centre for Security Policy, 2009.
Eriksson, Johan, Giampiero Giacomello, Hamoud Salhi, Myriam Dunn Cavelty, J. P. Singh, and M. I. Franklin. "Who Controls the Internet? Beyond the Obstinacy or Obsolescence of the State." International Studies Review 11, no. 1 (2009): 205-230 .
Byers, Michael. Who Owns the Arctic: Understanding Sovereignty Disputes in the North. Vancouver: Douglas & McIntyre, 2009.
Law, David. "Who’s Who Intergovernmentally in SSR." Developing a Security Sector Re¬form (SSR) Concept for the United Nations (2009): 23-25.
Piontkovsky, Andrei. Who’s Who on Putin’s Payroll?. Project Syndicate, 2009.
Haji-Yousefi, Amir M.. "Whose Agenda Is Served by the Idea of a Shia Crescent?" Alternatives: Turkish Journal of International Relations 8, no. 1 (2009): 114-35.
Ma, Maode, Yan Zhang, and Mieso K. Denko. Wireless Quality of Service : Techniques, Standards, and Applications. Boca Raton: Auerbach Publications, 2009.
Bergmans, H., M. Bökkerink, P. Van Erve, Van de Leu, D. Wijnmalen, V. Veldheer, E. Pruyt, L. Janssen, and Van der Horst. Working with Scenarios, Risk Assessment and Capabilities in the National Safety and Security Strategy of the Netherlands In The Hague: Landelijk Operationeel Coördinatiecentrum., 2009.
The World Factbook . Washington, D.C.: Central Intelligence Agency, 2009.

Pages