Biblio

Export 8062 results:
Filters: Filter is   [Clear All Filters]
2010
Chun, Soon Ae, Stuart Shulman, Rodrigo Sandoval, and Eduard Hovy. "Government 2.0: Making Connections Between Citizens, Data and Government." Information Polity 15, no. 1&2 (2010): 1-9.
Barnett, Thomas P. M.. Great Powers, America and the World After Bush. New York, NY: Berkley Books, 2010.
Herd, Graeme P.. Great Powers and Strategic Stability in the 21st Century. London: Routledge, 2010.
Beckman, Karel. "The Great Security of Gas Supply Struggle." European Energy Review (2010).
Green Paper on Forest Protection and Information in the EU: Preparing forests for climate change. Brussels: European Commission, 2010.
Gates, Robert M.. "Helping Others Defend Themselves: The Future of U.S. Security Assistance." Foreign Affairs (2010).
Baharan, Bijan. The Hidden Side of Iran: Discrimination Against Ethnic and Religious Minorities In Paris: International Federation for Human Rights., 2010.
History of Czech Military Participation in Operations Abroad (1990-2011). Ministry of Defence & Armed Forces of the Czech Republic, 2010.
How to express EU citizen's solidarity through volunteering: First reflections on a European Voluntary Humanitarian Aid Corps. Brussels: European Commission, 2010.
Greene, James. "The Human in the Loop." In Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices, 208-220. Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2010.
Human Security Report 2009/2010. Human Security Report Project, 2010.
Caprile, A., and P. Hakala. Humanitarian Aid., 2010.
Georgieva, Kristalina. The Humanitarian and the Military: Different Mandates and Potential Synergies In Brussels Defence Debate, Royal Military Academy., 2010.
Missiroli, Antonio. Implementing the Lisbon Treaty: The External Policy Dimension In Bruges Political Research Papers No. 14 ., 2010.
Wegener, Anne-Christine, and Mark Pyman. "The Importance of Integrity Building." In Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices, 178-185. Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2010.
Markoff, John, and David E. Sanger. "In a Computer Worm, a Possible Biblical Clue." The New York Times (2010).
Krastev, Nikola. In U.S. Cybercrime Case, Track Record Indicates Russia Willing to Cooperate. Radio Free Europe/Radio Liberty, 2010.
Information on Defence Expenditures In NATO Topics., 2010.
Savenko, Oleg, and Sergyi Lysenko. "Information Technology of Intelligent Trojan Detection in Computer Systems." Radioelectronic and Computer Systems 5 (2010): 120-126.
Frinking, Erik J., and J.G.M. Rademaker. "Inlichtingen en Veiligheidsdiensten." In Nationale Veiligheid en inlichtingen, 189-204. Alphen aan den Rijn: Kluwer, 2010.
Carr, Jeffrey. Inside Cyber Warfare. Sebastopol, CA: O’Reilly Media, 2010.
"Integrated Command and Control System Support." In NC3A Service Catalogue, 24., 2010.
Lucas, George. "Integrity Issues Related to Military Operations." In Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices, 149-162. Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2010.
Internal Security Strategy for the European Union: Towards a European Security Model. European Union’s report , 2010.
Tikk, Eneken, Kadri Kaska, and Liis Vihul. International Cyber Incidents: Legal Considerations. Tallinn, Estonia: Cooperative Cyber Defence Center of Excellence, 2010.

Страници