Biblio

Export 21337 results:
2005
Spilimbergo, Antonio. Measuring the Performance of Fiscal Policy in Russia In IMF Working Paper. Washington, D.C.: International Monetary Fund, 2005.
Rood, J.. "Medical Catastrophe – No One’s in Charge, the Plan’s Incomplete and Resources Aren’t Sufficient if We Suffer Mass Casualties in an Overwhelming Disaster." Government Executive (2005).
Sucipto, Hery. Membongkar Jama’ah Islamiyah. Jakarta: Grafindo Khazanah Ilmu, 2005.
Çetinkaya, Deniz. A Metamodel for The High Level Architecture Object Model In The graduate school of natural and applied sciences. Vol. Master of science in computer engineering. Middle east technical university, 2005.
Shelley, Louise I.. Methods and Motives: Exploring Links between Transnational Organized Crime and International Terrorism. Rockville, MD: National Criminal Justice Reference Service [NCJRS], 2005.
Mukhachev, V.A., and V.A. Khoroshko. Methods of practical cryptography. Kyiv, Ukraine: OOO Poligraf-Consulting, 2005.
Migration, Employment and Poverty Reduction. Moldovan Ministry of Health and Social Protection, 2005.
Migration in an Interconnected World: New Directions for Action. Global Commission on International Migration, 2005.
Demir, Fırat. "Militarization of the Market and Rent‐Seeking Coalitions in Turkey." Development and Change 36, no. 4 (2005): 667-690.
Tsyganok, A.. Military threats for Russia. Vol. 2 February 2005. site of Institute for Political and Military Analysis, 2005.
McFate, Montgomery. "The Military Utility of Understanding Adversary Culture." Joint Forces Quarterly 38 (2005).
McCullagh, Declan. "Military Worried about Web Leaks." C|Net News (2005).
Liskov, Moses. "Miller–Rabin Probabilistic Primality Test." In Encyclopedia of Cryptography and Security. Boston, MA: Springer, 2005.
Labarre, Frederic. "Is Missile Defence Moral?" CIIA International Journal 60, no. 2 (2005): 553-73.
R. Ting, Yu-Liang. Mobile Learning: Current Trend and Future Challenges. Fifth IEEE International Conference on Advanced Learning Technologies (ICALT’05), 2005.
Ezingeard, Jean-Noël, Elspeth McFadzean, and David Birchall. "A Model of Information Assurance Benefits." Information Systems Management 22, no. 2 (2005): 22-29.
Iliev, Rosen. Modeling of Decision Making Process on the River Water Quality Analysing by Using Generalized Nets In Proceedings of the Sixth International Workshop on Generalized Nets. Sofia, 2005.
Born, Hans, and Ian Leigh. "More Closely Watching the Spies: Three Decades of Experiences." In Who’s watching the Spies? Establishing Intelligence Service Accountability . Dulles, V.A.: Potomac Books, INC, 2005.
Annan, Kofi. A More Secure World: Our Shared Responsibility. Report of the High-level Panel on Threats, Challenges and Change, 2005.
Pozen, David E.. "The Mosaic Theory, National Security, and the Freedom of Information Act." The Yale Law Journal 115, no. 3 (2005): 630.
How, Khoo Boon, and Alex See Kok Bin. "Motion tracking and prediction system utilizing image processing and Artificial Intelligence technique." In ASEAN Virtual Instrumentation., 2005.
Page, Jeremy. "Mugging of boys leads to new diplomatic cold war." The Times (2005).
Garcia-Morena, Claudia. Multi-Country Study on Women’s Health and Domestic Violence Against Women. Geneva: World Health Organization, 2005.
Sullivan, John P., and Robert Bunker. "Multilateral Counter-Insurgency Networks." In Networks, Terrorism and Global Insurgency, 184. London: Routledge, 2005.
Sookhdeo, Patrick. "The Myth of Moderate Islam." The Spectator (2005).

Pages