Biblio

Export 21386 results:
2005
Marsh, David. Project D3 – CLIL Matrix In Central Workshop. Graz: European Centre for Modern Languages, 2005.
Heldman, Kim. Project Manager’s Spotlight on Risk Management. Alameda, CA: SYBEX, 2005.
Edmunds, Bryan D.. Project Portfolio Management: An Investigation of One Air Force Product Center. Air Force Institute of Technology, 2005.
Winner, Andrew C.. "The Proliferation Security Initiative: The New Face of Interdiction." The Washington Quarterly 28, no. 2 (2005): 130.
Umarov, Adiljon, and Dmitry Pashkun. "The Prospects for Chinese Influence in Central Asia." CEF Quarterly–The Journal of the China-Eurasia Forum (2005).
Wen, H. A., Tian-Fu Lee, and Tzonelih Hwang. "Provably Secure Three-party Password-based Authenticated Key Exchange Protocol Using Weil Pairing." IEE Proceedings Communication 152, no. 2 (2005).
Villanueva, Benjamin, and Brett Cook. Providing Students 24/7 Virtual Access and Hands-On Training Using VMWare GSX Server. SIGUCCS'05, 2005.
Chang, Ming-Hsin. On Proxy Signatures with Forward-Secure and One-time Properties and their Applications in PKI In Department of Computer Science and Information Engineering, College of Electrical Engineering and Computer Science. Vol. Doctor of Philosophy in Computer Science and Information Engineering. Hsinchu, Taiwan, Republic of China: National Chiao Tung University, 2005.
PSI Frequently Asked Questions. U.S. Department of State, 2005.
Hidayat, Komaruddin. "Psikologi Terorisme." Kompas (2005).
Post, Jerrold M.. "Psychological Operations and Counterterrorism." Joint Force Quarterly 37 (2005).
Horgan, John. The Psychology of Terrorism. Oxon: Routledge, 2005.
Kilroy, Jr., Richard J.. "Public Diplomacy: Government, Universities, and the War on Terrorism." Journal of Public Affairs 132 (2005).
Wictorowicz, Quintan. Radical Islam Rising: Muslim Extremism in the West. Lanham: Rowman and Littlefield, 2005.
Caltagirone, Sergio, Paul Ortman, Sean Melton, David Manz, Kyle King, and Paul Oman. RADICL: A Reconfigurable Attack-Defend Instructional Computing Laboratory. SAM'05, 2005.
Thomas, Brian Johnson, and Mark Franchetti. "Radioactive Rockets ‘For Sale’ in Breakaway Soviet Republic." Times (2005).
Segesser, Daniel Marc, and Myriam Gessler. "Raphael Lemkin and the international debate on the punishment of war crimes (1919–1948)." Journal of Genocide Research 7, no. 4 (2005): 453-468.
M.L, Gagnon. Rapport Fusion de Donn´ees In Technical Report, D´epartement de G´enie Electrique et de G´enie informatique, Universit´e de Laval, Canada., 2005.
Mishra, Pankaj. "The Real Afghanistan." New York Review of Books (2005): 44-48.
Bacevich, Andrew J.. "The Realist Persuasion." The Boston Globe (2005).
Red Brigades. Stanford University, 2005.
Umpleby, Stuart A.. "Reflexivity in Social Systems: The Theories of George Soros." In Annual meeting of the American Society for Cybernetics. Washington, DC: The George Washington University, 2005.
Surtees, Rebecca. Regional Clearing Point’s Second Annual Report on Victims of Trafficking in South Eastern Europe. Geneva: IOM, 2005.
Regulation of 12 May 2005 concerning the management of emergencies arising from floods, hazardous weather, hydro construction accidents and pollution incidents., 2005.
Walt, Stephen M.. "The Relationship Between Theory and Policy in International Relations." Annual Review of Political Science 8 (2005): 23-48.

Pages