Biblio

Export 21337 results:
2005
Strong passwords. Microsoft Technet Library, 2005.
Chen, I-Te. Studies on Proxy Signatures with/without Proactive Property In Department of Computer Science, College of Computer Science . Vol. Doctor of Philosophy in Computer Science. HsinChu, Taiwan, Republic of China: National Chiao Tung University, 2005.
Simmhan, Yogesh L., Beth Plale, and Dennis Gannon. "A Survey of Data Provenance in e-Science." ACM SIGMOD 34, no. 3 (2005): 31-36.
Haddad, Simon. "A Survey of Lebanese Shi’i attitudes towards Hezbollah." Small Wars and Insurgencies 16, no. 3 (2005): 317-333.
Brady, Arlo Kristjan O.. The Sustainability Effect: Rethinking Corporate Reputation in the 21st Century. New York: Palgrave Macmillan, 2005.
Kolesnykov, Aleksandr A.. Synergetycheskoe metodы upravlenyja slozhnыmy systemamy: teoryja systemnogo synteza. Moscow: Edytoral URSS, 2005.
Salloukh, Bassel F.. Syria and Lebanon: A Brotherhood Transformed In Middle East Research and Information Project., 2005.
Karklins, Rasma. The System Made Me Do It: Corruption in Post-Communist Societies. Armonk, NY: M. E. Sharpe, 2005.
Makarenko, Tamara. "Takfiri Presence Grows in Europe." Jane’s Intelligence Review (2005).
Speckhard, Anne, and Khapta Akhmedova. "Talking to Terrorists." Journal of Psychohistory (2005): 125-56.
Walt, Stephen. Taming American Power: The Global Response to U.S. Primacy. New York: W. W. Norton, 2005.
Cilinskas, Kestutis. 'Teisės viršenybės principo įgyvendinimo problemos’; renginys tarptautinei žmogaus teisių dienai paminėti., 2005.
Pollard, Craig. "Telecom Fraud: The Cost of Doing Nothing Just Went Up." Network Security 2005, no. 2 (2005): 17-19.
Graschew, Georgi, Peter M. Schlag, Theo A. Roelofs, Stefan Rakowsky, Wolfgang Düsel, Uwe Müller, and Andreas Lieber. "Telemedical Services for Disaster Emergencies." Information & Security: An International Journal 16 (2005): 62-76.
Elden, Stuart. "Territorial Integrity and the War on Terror." Environment and Planning 37, no. 12 (2005).
Arasly, Jangir. "Terrorism and Civil Aviation Security: Problems and Trends." Connections: The Quarterly Journal 4, no. 1 (2005): 75-89.
"Terrorism and the Emergence of New Threats." In NATO Handbook., 2005.
Simon, Steven, and Jeff Martini. "Terrorism: Denying Al Qaeda Its Popular Support." The Washington Quarterly 28, no. 1 (2005).
Serafim, Ana. "Terrorism—A Cultural Phenomenon?" Connections: The Quarterly Journal 4, no. 1 (2005): 61-74.
Weiss, Martin A.. Terrorist Financing: The 9/11 Commission Recommendation In CRS Report for Congress. Washington, D.C.: Congressional Research Service, 2005.
Bell, Stewart. Terrorist Returns: Tory Urges Ottawa to Consider Revoking Citizenship. National Post, 2005.
The Terrorist’s Handbook., 2005.
Katz, Gregory. "Terrorists said to be getting aid in the Balkans: Crime gangs that control the smuggling routes are making their infiltration easier." Houston Chronicle (2005).
WESSELS, WOLFGANG. Theoretical Perspectives. CFSP beyond the Supranational and Intergovernmental Dichotomy., 2005.
Kanter, Ido, and Wolfgang Kinzel. "The Theory of Neural Networks and Cryptography." Quantum Computers and Computing 5, no. 1 (2005): 130-140.

Pages