Biblio

Export 21338 results:
2005
Comprehensive strategy to eliminate future sexual exploitation and abuse in United Nations peacekeeping operations. United Nations General Assembly, 2005.
Fosnock, Craig. Computer Worms: Past, Present, and Future CISSP. Carolina University, 2005.
Shalamanov, Velizar. Concept Development and Experimentation: Academic Support to Security Sector Transformation In SMi NATO Enlargement Conference. Sofia, Bulgaria, 2005.
Garstka, John J.. The Concept of Transformation, Its Reflection to the Political and Military NATO Structures and Some Aspects of the Reform., 2005.
Chernykh, Irina, and Rustam Burnashev. "Conditions for Securitization of International Terrorism in Central Asia." Connections: The Quarterly Journal 4, no. 1 (2005): 131-142.
van Ooyen, E, and R Schukking. Conflicten in de voormalige Sovjetunie In Opleiding Europese Studies. Amsterdam: Universiteit van Amsterdam, 2005.
van Ooyen, Erik, and Rick Schukking. Conflicten in de voormalige Sovjetunie: Een vergelijking tussen Transdnestrië en Abchazië In Opleiding Europese Studies. Universiteit van Amsterdam, 2005.
Siemens, George. "Connectivism: A Learning Theory for the Digital Age." International Journal of Instructional Technology and Distance Learning 2, no. 1 (2005).
Martorella, M.. "A Contrast Maximization Based Technique for 2D ISAR Autofocusing." IEE Proceeding on Radar Sonar and Navigation 152, no. 4 (2005): 253-262.
J.A., Halderman, Waters B., and Felten E.W.. A Convenient Method for Securely Managing Passwords In Proc. of 14th ACM International World Wide Web Conference. Chiba, Japan, 2005.
Carbo, Javier, Jesús García, and José M. Molina. "Convergence of agent reputation with Alpha-Beta filtering vs. a fuzzy system." In Computational Intelligence for Modelling, Control and Automation, International Conference on (2005). Vienna, Austria, 2005.
Mihalka, Michael. "Cooperative Security in the 21st Century." Connections: The Quarterly Journal 4, no. 4 (2005): 113-122.
Karklins, R.. Corruption and Composition of Government Expenditure In The System Made Me Do It: Corruption in Post-Communist Societies . Vol. 69. New York: M. E. Sharpe, 2005.
Porta, Donatella Della, and Alberto Vannucci. "Corruption as a Normative System." In Corruption Control in Political Life and the Quality of Democracy: A Comparative Perspective, Europe–Latin America., 2005.
van der Plaetse, Bart, Gordon Hlatiwayo, Luk van Eygen, Bruno Meessen, and Bart Criel. "Costs and revenue of health care in rural Zimbabwe." Health Policy and Planning 20, no. 4 (2005): 243-251.
"Council meeting on the basis of the Kok Report." In Council meeting., 2005.
Council of Europe Convention on Action against Trafficking in Human Beings In Council of Europe., 2005.
Lukov, Vladimir. "Counter-Terrorism Capability: Preventing Radiological Threats." Connections: The Quarterly Journal 4, no. 2 (2005): 47-66.
Ganor, Boaz. The Counter-Terrorism Puzzle In The Interdisciplinary Center, Herzliya, The International Policy Institute for Counter-Terrorism. New Brunswick, NJ: Transaction Publishers, 2005.
Country Reports on Terrorism - Chapter 5A. U.S. Department of State, Office of the Coordinator for Counterterrorism, 2005.
Micewski, Edwin R.. "Creativity and Military Leadership In Postmodern Times." In Conferinţa Internaţională Interdisciplinară Creativitatea în Ştiinţă şi Tehnică. Bucureşti, 2005.
Crescono gli interessi di Pechino nell’Asia Centrale., 2005.
Criminal Jurisdiction Over Civilians Employed By or Accompanying the Armed Forces Outside the United States, Certain Service Members and Former Service Members In Instr. U.S. Department of Defense, 2005.
Nykodym, Nick, Robert Taylor, and Julia Vilela. "Criminal Profiling and Insider Cyber Crime." Digital Investigation 2, no. 4 (2005): 261-267.
Dolgovaya, A.I.. Criminology: University Textbook. 3rd ed. Moscow: Norma, 2005.

Pages