Biblio

Export 21393 results:
2007
Lia, Brynjar. Architect of Global Jihad. The Life of al-Qaida Strategist Abu Musab al-Suri. London: Hurst and Oxford University Press, 2007.
Fuller, Liz. Armenia: Election Campaign Gets Off to Uneasy Start. Radio Free Europe/Radio Liberty, 2007.
Yost, David S.. Armenian Perceptions of International Security in the South Caucasus In Research Paper. NATO Defence College, 2007.
Mirzoyan, Alla. Armenia's Foreign Policy, 1991-2004: Between History and Geopolitics In FIU Electronic Theses an Dissertations., 2007.
Boese, Wade. "Arms Issues Divide U.S. and Russia." Arms Control Today (2007).
Crouch, Harold. The Army and Politics in Indonesia . Jakarta & Kuala Lumpur: Equinox Publishing, 2007.
Vester, Frederic. The Art of Interconnected Thinking – Ideas and Tools for Dealing with Complexity. München: MCB-Verlag, 2007.
Lobachova, K.I., and Vyacheslav S. Kharchenko. "Assessing Software Vulnerabilities and Recovery Time: Elements of Technique and Results." Radioelectronic and Computer Systems 8 (2007).
Koehler, Jan, and Christoph Zürcher. Assessing the Contribution of International Actors in Afghanistan In SFB Working Papers Series. Berlin : Free University Berlin/SFB 700, 2007.
Assistant Secretary of State for East Asian and Pacific Affairs and Head of the U.S. Delegation to the Six-Party Talks Christopher R. Hill on Six-Party Talks Held in Beijin. U.S. Department of State Special Briefing, 2007.
Schmitt, Michael N.. "Asymmetrical Warfare and International Humanitarian Law." In International Humanitarian Law Facing New Challenges. Berlin: Springer Verlag, 2007.
Bugajski, Janusz, and Ilona Teleki. Atlantic Bridges: America's New European Allies. Rowman & Littlefield, 2007.
P Reddy, Vasudeva, and Mokkala Padmavathamma. "An authenticated key exchange protocol in elliptic curve cryptography." Journal of Discrete Mathematical Sciences and Cryptography 10, no. 5 (2007): 697-705.
Mayo, Michael, and Anna T. Watson. "Automatic Species Identification of Live Moths." Knowledge-Based Systems 20, no. 2 (2007): 195-202.
Carbo, Javier, José M. Molina, and Jorge Davila. "Avoiding Malicious Agents in E-Commerce Using Fuzzy Recommendations." Journal of Organizational Computing and Electronic Commerce 17, no. 2 (2007): 101-117.
Ruys, Tom. Background Paper on EU Crisis Management Operations In Working Paper. Leuven: Institute of International Law, Katholieke Universiteit Leuven, 2007.
Gati, Charles. "Backsliding in Central and Eastern Europe." Connections: The Quarterly Journal 6, no. 3 (2007): 107-120.
Tzenov, Liudmil. "Basics of Earthquake Engineering." (2007).
Savenko, Oleg, and Sergiy Lysenko. "Behavioral Trojans Model." In Computer Sciences and Information Technologies Conference. Lviv, 2007.
"Belarus, Russian Firm Sign 5-Year Deal for Gas." The Washington Post (2007): A10.
Cullison, Alan. "Belarus Yields to Russia." The Wall Street Journal (2007): A4.
Baykal, Nazife. "Bilgi Teknolojisinin, Ulusal Güvenlik ve Ulusal Güvenlik Startejisi ile İlgili Boyutu” (Information Technology in relation to National Security and the National Security Strategy)." In International Conference on “New Dimensions of Security and International Organizations”. Istanbul: organised by the Turkish Armed Forces, 2007.
Cavoukian, Ann, and Alex Stoianov. Biometric Encryption: A Positive-sum Technology that Achieves Strong Authentication, Security and Privacy In White Paper (Information and Privacy Commissioner of Ontario)., 2007.
Burnett, Andrew, Adam Duffy, and Tom Dowling. "A Biometric Identity Based Signature Scheme." International Journal of Network Security 5, no. 3 (2007): 317-326.
"Biznes-zhurnal, 2007/08: Nizhegorodskaya oblast." Biznes-zhurnal. Obiedinennaya mezhregionalnaya redaktsiya 08 (2007): 84.

Pages