Biblio

Export 8062 results:
Filters: Filter is   [Clear All Filters]
2008
Medvedev, Dmitry. Medvedev, Speech at the World Policy Conference. Evian, 2008.
Meeting of The North Atlantic Council at the Level of Foreign Ministers Held at NATO Headquarters, Brussels, 2–3 December 2008 In Final Communiqué., 2008.
Duro, Kol. Foto. "Menaxhimi i burimeve të mbrojtjes." Çështje të sigurisë (Security Issues) (Instituti për Demokraci dhe Ndërmjetësim) vol. 8 (2008): 65-84.
Satoh, Fumiko, Nirmal K. Mukhi, Michiaki Tatsubori, Kouichi Ono, and Yuichi Nakamura. Methodology and Tools for End-to-End SOA Security Configurations In SERVICES ’08. Honolulu, HI, 2008.
Klein, Margarete. "Militärische Implikationen des Georgienkrieges – Zustand und Reformbe-darf der russischen Streitkräfte." SWP-Aktuell 74 (2008): 7.
Moran, Daniel, and James A. Russell. "The Militarization of Energy Security." Strategic Insights 7, no. 1 (2008): 2.
Friesendorf, Cornelius, and Susan E. Penksa. "Militarized Law Enforcement in Peace Operations: EUFOR in Bosnia & Herzegovina." International Peacekeeping 15, no. 5 (2008): 677-94.
Military Corruption Costs Russia Almost $80 million in 2008. RIA Novosti, 2008.
Hansen, Victor. Military Jurisdiction Over Civilians: Opening a Can of Worms?. Jurist, 2008.
Blomgren, Ebbe. "Is Military Praxis in International Missions Reforming the Profession?" In The Heritage and the Present: From Invasion Defence to Mission Oriented Organisation, 233-42. Karlstad: Swedish National Defence College, 2008.
W.U., Yongdong, Yao H., and Bao F.. Minimizing SSO Effort in Verifying SSL Antiphishing Indicators In Proc. of 23rd International Information Security Conference IFIP TC 11., 2008.
Bruneau, Thomas C., and Richard B. Goetze, Jr. "Ministries of Defense and Democratic Control." In Who Guards the Guardians and How: Democratic Civil-Military Relations, edited by Thomas C. Bruneau and Scott D. Tollefson, 71-98. Austin, TX: University of Texas Press, 2008.
"Misje, zadania i właściwości użycia sił zbrojnych w przyszłych operacjach (Missions, Tasks and Features of Armed Forces’ Use in Future Operations) ." In Współczesne i przyszłe zagrożenia bezpieczeństwa a rozwój sił zbrojnych (Contemporary and Future Security Threats vs. Armed Forces’ Development), 174-75. Warsaw: National Defense University, 2008.
Savenko, Oleg, and Sergyi Lysenko. "Model Search Process Trojans in Personal Computers." Radioelectronic and Computer Systems 7 (2008).
Kharchenko, Vyacheslav, and Oleg Odarushchenko. Modeling Dependable Systems and Networks. Kharkiv: National Aerospace University, 2008.
Vatseva, Rumyana, Stoyan Nedkov, Mariyana Nikolova, and Tsvetan Kotsev. Modeling land cover changes for flood hazard assessment using Remote Sensing data In Geospatial crossroads@ GI_Forum (2008): 262-267., 2008.
Levitt, Matthew, and Michael Jacobson. The Money Trail: Finding, Following, and Freezing Terrorist Finances In The Washington Institute for Near East Policy., 2008.
On a more effective EU policy for the South Caucasus: from promises to actions In European Parliament Resolution., 2008.
Ledyaeva, Marina. "Morskie Perevozki." Pravda Severa (2008).
Halpin, Otny. "Moscow Begins New Arms Race with Military Build-up." The Times (London) (2008).
Saakashvili, Mikheil. "Moscow’s Plan Is to Redraw the Map of Europe." Financial Times (2008).
Qoraboyev, Ikboljon. A Move away from Geopolitics in Central Asia: A Call for a Move to Institutions. Vol. 80. Brussels: Garnet Sixth Ph.D. School at the Institute for European Studies, 2008.
Mumbai Rocked by Deadly Attacks. BBC News Online, 2008.
Slatinsky, Nikolay. Na vnimanieto na gospodin Prezidenta. Sofia: Iztok/Zapad, 2008.
The National Defense Authorization Act for Fiscal 2009. Washington, D.C.: U.S. House of Representatives Armed Services Committee, 2008.

Страници