Biblio

Export 21393 results:
2008
Powers, Rod. The Cost of War. USMilitary.com, 2008.
"Council Directive 2008/114/EC of 8 December 2008 on the identification and designation of European critical infrastructures and the assessment of the need to improve their protection." Official Journal L 345 (2008): 75-82.
"Council Directive 2008/114/EC of 8 December 2008 on the Identification and Designation of European Critical Infrastructures and the Assessment of the Need to Improve Their Protection." Official Journal L 345 (2008): 75-82.
Council Directive on the Identification and Designation of European Critical infrastructures and the Assessment of the Need to Improve their Protection. Council of the EU, 2008.
Countering Piracy off the Horn of Africa: Partnership and Action Plan. Washington D.C.: National Security Council, 2008.
J.Thomas, Biersteker, and Sue E. Eckert. Countering the Financing of Terrorism. New York: Routledge, 2008.
Jones, Seth G.. Counterinsurgency in Afghanistan . Santa Monica: CA: RAND Corporation , 2008.
Pirnie, Bruce R., and Edward O’Connel. Counterinsurgency in Iraq (2003–2006). Santa Monica, CA: Rand Corporation, 2008.
Philipp, Fluri, and Viorel Cibotaru. "Country Study – Armenia." In Defence Institution Building: Country Profiles and Needs Assessments for Armenia, Azerbaijan, Georgia and Moldova – Background Materials, 26. Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2008.
Cavelty, Myriam Dunn. Critical Information Infrastructure Protection, Overview. ETH Zurich, Switzerland.: Center for Security Studies (CSS), 2008.
Yoon, Eun-Jun, Ein-Jung Lee, and Kee-Young Yoo. Cryptanalysis of Wang et al.’s Remote User Authentication Scheme Using Smart Cards In 5th International Conference on Information Technology: New Generations., 2008.
Shih, Hsi-Chang. Cryptanalysis on Two Password Authentication Schemes In Laboratory of Cryptography and Information Security. Vol. Master's Thesis. Taiwan: National Central University, 2008.
Tikk, Eneken. Cyber Attacks Against Georgia: Legal Lessons Identified. Tallinn, Estonia : Cooperative Cyber Defense Center of Excellence, 2008.
Cyber Security Strategy 2008. Ministry of Defence, 2008.
Geers, Kenneth. "Cyberspace and the Changing Nature of Warfare." SC Magazine (2008).
Frydrych, Eunika Katarzyna. "The Debate on NATO Expansion." Connections: The Quarterly Journal 7, no. 4 (2008): 1-42.
Decision no. 548/2008, for approval of the National Strategy for Communication and Public Information for Emergency Situations., 2008.
Demant, Froukje. Decline and Disengagement: An Analysis of Processes of Deradicalisation. Amsterdam: Institute for Migration and Ethnic Studies, 2008.
Fluri, Philipp H., and Viorel Cibotaru. Defence Institution Building: Country Profiles and Needs Assessments for Armenia, Azerbaijan, Georgia and Moldova. Geneva: DCAF, 2008.
Tagarev, Todor. Defence Programmes as a Language for Effective Communication In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2008.
Hendricks, Cheryl, and Lauren Hutton. "Defence Reform and Gender." In Gender and Security Sector Reform Toolkit, 13., 2008.
Lugar, Richard. Defense against Weapons of Mass Destruction In speech at conference. Chantilly, VA, 2008.
Polyakov, Leonid I.. "Defense Institution Building in Ukraine." Connections: The Quarterly Journal 7, no. 2 (2008): 15-20.
Tagarev, Todor, and Valeri Ratchev. Defense policy and development of the Armed Forces of the Republic of Bulgaria 2018. Sofia: Military Publishing House, 2008.
The Defense Strategy of Montenegro. Official Gazette of Montenegro, no. 79/08, 2008.

Pages