Biblio

Export 21423 results:
2005
van der Plaetse, Bart, Gordon Hlatiwayo, Luk van Eygen, Bruno Meessen, and Bart Criel. "Costs and revenue of health care in rural Zimbabwe." Health Policy and Planning 20, no. 4 (2005): 243-251.
"Council meeting on the basis of the Kok Report(link is external)." In Council meeting., 2005.
Council of Europe Convention on Action against Trafficking in Human Beings In Council of Europe., 2005.
Lukov, Vladimir. "Counter-Terrorism Capability: Preventing Radiological Threats." Connections: The Quarterly Journal 4, no. 2 (2005): 47-66.
Ganor, Boaz. The Counter-Terrorism Puzzle In The Interdisciplinary Center, Herzliya, The International Policy Institute for Counter-Terrorism. New Brunswick, NJ: Transaction Publishers, 2005.
Country Reports on Terrorism - Chapter 5A(link is external). U.S. Department of State, Office of the Coordinator for Counterterrorism, 2005.
Micewski, Edwin R.. "Creativity and Military Leadership In Postmodern Times." In Conferinţa Internaţională Interdisciplinară Creativitatea în Ştiinţă şi Tehnică. Bucureşti, 2005.
Crescono gli interessi di Pechino nell’Asia Centrale(link is external)., 2005.
Criminal Jurisdiction Over Civilians Employed By or Accompanying the Armed Forces Outside the United States, Certain Service Members and Former Service Members(link is external) In Instr. U.S. Department of Defense, 2005.
Nykodym, Nick, Robert Taylor, and Julia Vilela. "Criminal Profiling and Insider Cyber Crime." Digital Investigation 2, no. 4 (2005): 261-267.
Dolgovaya, A.I.. Criminology: University Textbook. 3rd ed. Moscow: Norma, 2005.
Crisis Management Law. State Gazette 19 (2005), cancelled in 2009 through amendments to the Law on Defence and Armed Forces, 2005.
Karkoszka, Andrzej. "Crisis Management: The Transformation of National and International Systems of Response." Connections: The Quarterly Journal 4, no. 2 (2005): 33-42.
Nickolov, Eugene. "Critical Information Infrastructure Protection." Information & Security: An International Journal 17 (2005): 105-119.
Croatian National Information Security Programme (in Croatian)(link is external)., 2005.
Boanas, Edward. "Crossing the Fault Line: Coordinating Multilateral Security Sector Reform Engagements in Post-Conflict Countries(link is external)." Journal of Security Sector Management 3, no. 3 (2005).
Thomas, Timothy L.. Cyber Silhouettes: Shadows over the Information Operations. Fort Leavenworth: KS: Foreign Military Studies Office, 2005.
Irvine, Cynthia E., Michael Thompson, and Ken Allen. "CyberCIEGE: Gaming for Information Assurance." IEEE Security and Privacy 3 (2005): 61-64.
Kowalik, Janusz S., Janusz Gorski, and Anatoly Sachenko. Cyberspace Security and Defense: Research Issues. Berlin: Springer, 2005.
Weimann, Gabriel. "Cyberterrorism: The Sum of All Fears?" Studies in Conflict & Terrorism 28, no. 2 (2005): 129-149 28, no. 2 (2005): 129-149.
Sedivy, Jeri. "Czech Military Transformation(link is external)." NATO Review (2005).
Máša, Pavel. "The Czech Republic will profit from legalization of the Ukrainians(link is external)." Lidové noviny (2005).
DAC Guidelines and Reference Series: Security System Reform and Governance. Paris: OECD, 2005.
Katyal, Neal Kumar. The Dark Side of Private Ordering for Cybersecurity(link is external), Edited by Mark F. Grady and Francesco Parisi. Cambridge University Press, 2005.
Byman, Daniel. Deadly Connections: States that Sponsor Terrorism. Cambridge: Cambridge University Press, 2005.

Pages