Biblio

Export 21344 results:
2005
Remic, Lea. Primerjava obrambnih sistemov Republike Bolgarije in Republike Romunije In Fakulteta za družbene vede. Vol. diplomsko delo. Ljubljana: Univerza v Ljubljani, 2005.
Waltermire, Bradley J.. Princes, Priests, and People is Saudi Arabia the Next Iran. Monterey, California: Naval Postgraduate School, 2005.
Dang, Tran Khanh. "Privacy-Preserving Basic Operations on Outsourced Search Trees." In International Workshop on Privacy Data Management – PDM05, in conjunction with ICDE05, IEEE Computer Society. Tokyo, Japan, 2005.
Günther, Philipp. Private Military Companies als neuer internationaler Akteur. Vol. Diploma Thesis. University of Cologne, 2005.
Holmqvist, Caroline. Private Security Companies: The Case for Regulation In SIPRI Policy Paper. Stockholm: SIPRI, 2005.
Moller, Bjorn. Privatisation of Conflict, Security and War In DIIS Working Paper. Copenhagen: Danish Institute For International Studies, 2005.
Schreier, Fred, and Marina Caparini. Privatising Security: Law, Practice and Governance of Private Military and Security Companies. Geneva: DCAF, 2005.
Vlachová, Marie. "The problem. Trafficking in Humans: The Slavery of Our Age." Connections: The Quarterly Journal 4, no. 4 (2005): 1-16.
Marsh, David. Project D3 – CLIL Matrix In Central Workshop. Graz: European Centre for Modern Languages, 2005.
Heldman, Kim. Project Manager’s Spotlight on Risk Management. Alameda, CA: SYBEX, 2005.
Edmunds, Bryan D.. Project Portfolio Management: An Investigation of One Air Force Product Center. Air Force Institute of Technology, 2005.
Winner, Andrew C.. "The Proliferation Security Initiative: The New Face of Interdiction." The Washington Quarterly 28, no. 2 (2005): 130.
Umarov, Adiljon, and Dmitry Pashkun. "The Prospects for Chinese Influence in Central Asia." CEF Quarterly–The Journal of the China-Eurasia Forum (2005).
Wen, H. A., Tian-Fu Lee, and Tzonelih Hwang. "Provably Secure Three-party Password-based Authenticated Key Exchange Protocol Using Weil Pairing." IEE Proceedings Communication 152, no. 2 (2005).
Villanueva, Benjamin, and Brett Cook. Providing Students 24/7 Virtual Access and Hands-On Training Using VMWare GSX Server. SIGUCCS'05, 2005.
Chang, Ming-Hsin. On Proxy Signatures with Forward-Secure and One-time Properties and their Applications in PKI In Department of Computer Science and Information Engineering, College of Electrical Engineering and Computer Science. Vol. Doctor of Philosophy in Computer Science and Information Engineering. Hsinchu, Taiwan, Republic of China: National Chiao Tung University, 2005.
PSI Frequently Asked Questions. U.S. Department of State, 2005.
Hidayat, Komaruddin. "Psikologi Terorisme." Kompas (2005).
Post, Jerrold M.. "Psychological Operations and Counterterrorism." Joint Force Quarterly 37 (2005).
Horgan, John. The Psychology of Terrorism. Oxon: Routledge, 2005.
Kilroy, Jr., Richard J.. "Public Diplomacy: Government, Universities, and the War on Terrorism." Journal of Public Affairs 132 (2005).
Wictorowicz, Quintan. Radical Islam Rising: Muslim Extremism in the West. Lanham: Rowman and Littlefield, 2005.
Caltagirone, Sergio, Paul Ortman, Sean Melton, David Manz, Kyle King, and Paul Oman. RADICL: A Reconfigurable Attack-Defend Instructional Computing Laboratory. SAM'05, 2005.
Thomas, Brian Johnson, and Mark Franchetti. "Radioactive Rockets ‘For Sale’ in Breakaway Soviet Republic." Times (2005).
Segesser, Daniel Marc, and Myriam Gessler. "Raphael Lemkin and the international debate on the punishment of war crimes (1919–1948)." Journal of Genocide Research 7, no. 4 (2005): 453-468.

Pages