Biblio

Export 21404 results:
2007
Law, David M.. "Cooperation among SSR-relevant IGOs." In Intergovernmental Organisa-tions and Security Sector Reform, 43-62. Berlin: Literal, 2007.
Mathieu, Fabien, and Nick Dearden. "Corporate Mercenaries: The Threat of Private Military & Security Companies." Review of African Political Economy 34, no. 114 (2007): 744-755.
Osipian, Ararat L.. Corruption Hierarchies in Education in Developing and Transition Societies In UCEA Conference Proceedings for Convention., 2007.
Osipian, Ararat L.. "Corruption in Higher Education: conceptual approaches and measurement techniques." Research in Comparative and International Education 2, no. 4 (2007).
Council Decision of 8 November 2007 Establishing a Community Civil Protection Mechanism., 2007.
Posner, Richard A.. Countering Terrorism: Blurred Focus, Halting Steps. Plymouth, UK: Rowman and Littlefield, 2007.
Yusuf, Moeed, and Anit Mukherjee. Counterinsurgency in Pakistan: Learning from India In National Security Outlook. American Enterprise Institute for Public Policy Research, 2007.
Omelicheva, Mariya Y.. Counterterrorism and human rights: Explaining differences in the scope and brutality of states' responses to terrorism In Graduate School. Vol. PhD. West Lafayette, IN: Purdue University, 2007.
Country Analysis Briefs, Russia. Energy Information Administration (EIA), 2007.
Cumming, Alfred. Covert Action: Legislative Background and Possible Policy Questions In CRS Report for Congress. Washington, D.C.: Congressional Research Service, 2007.
Tahir, Muhammad Nabeel. " C-RBAC: Contextual role-based access control model." Ubiquitous Computing and Communication Journal 2, no. 3 (2007).
Bogush, G.I., and N.F. Kuznetsova. Criminology: Tutorial. Moscow, 2007.
Cavelty, Myriam Dunn. Critical information infrastructure: vulnerabilities, threats and responses In Disarmament Forum., 2007.
Hellstrom, Thomas. "Critical Infrastructure and Systemic Vulnerability: Towards a Planning Framework." Safety Science 45, no. 3 (2007): 415-30.
LaPorte, T. R.. "Critical Infrastructure in the Face of a Predatory Future—Preparing for Untoward Surprise." Journal of Contingencies and Crisis Management 15, no. 1 (2007): 60-64.
Murray, Alan T., and Tony Grubesic. Critical infrastructure: reliability and vulnerability In Advances in Spatial Science. Berlin: Springer-Verlag, 2007.
Moteff, John D.. Critical Infrastructures: Background, Policy, and Implementation. Washington, DC: Congressional Research Service and Library of Congress, 2007.
Criticizing Investigations Against Journalists. Stern.de, 2007.
Cavelty, Myriam Dunn. Cyber-security and threat politics: US efforts to secure the information age. London: Routledge, 2007.
Cavelty, Myriam Dunn. "Cyber-Terror– Looming Threat or Phantom Menace? The Framing of the US Cyber-Threat Debate." Journal of Information Technology & Politics 4, no. 1 (2007).
Tüzünkan, Murat. The Cyprus Question: Continuity, Transformation And Tendencies, Graduate School Of Social Sciences. Vol. Doctor Of Philosophy. Middle East Technical University, 2007.
D: Information and Communication Security 12 In NATO Science for Peace Security Series. Amsterdam: IOS Press, 2007.
Danish fighter jets v. Russian bombers: 18-minute chase ., 2007.
Luft, Gal, and Christophe Paillard. "Debate: Should NATO play a major role in energy security?" NATO Review (2007).
Billyard, Andrew, Debbie Blakeney, and R. Parker. "A Decision Aid Toolset for Strategic Planning." In DRDC CORA TR ., 2007.

Pages