Biblio
Export 8062 results:
Conventional Arms Control in Europe: Overcoming the Impasse." Russia in Global Affairs (2010).
"The Council of Europe Convention on Cybercrime, Proceedings of the Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options. Washington, D.C.: National Academies Press, 2010.
Creating Situational Awareness: A Systems Approach." In Medical Surge Capacity: Workshop Summary. Washington, DC: National Academies Press, 2010.
"Creating Strategically Oriented Interagency Environment: Senior Defense-Security School Model. Eurasia Security Program at Harvard University, 2010.
Creating Strategically Oriented Interagency Environment: Senior Defense-Se¬curity School Model. Eurasia Security Program at Harvard University, 2010.
Critical Infrastructure Resilience Strategy. Canberra: Commonwealth of Australia, 2010.
Croatia’s Mesic slated for South Stream?. UPI, 2010.
Cross-Cultural Awareness: Analytical Concept. Granada: TRADOC Directorate for Research, Doctrine and Materiel, 2010.
Cultural Awareness in Implementing Integrity Building Programmes." In Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices, 331-342. Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2010.
"Culture and National Security Policy." In Strategy in the Contemporary World. Oxford: Oxford University Press, 2010.
"Cyber Deterrence: Tougher in Theory than in Practice?" Strategic Studies Quarterly 4, no. 3 (2010): 102-35.
"Cyber Power. Cambridge, MA: Belfer Center for Science and International Affairs, 2010.
Cyber Security and Defence from the Perspective of Articles 4 and 5 of the NATO Treaty." In International Cyber Security Legal & Policy Proceedings 2010, 104-5. Tallinn, Estonia: Cooperative Cyber Defence Center of Excellence, 2010.
"Cyber War and Cyber Power: Issues for NATO Doctrine In NATO Defense College Research. Rome: NATO Defense College, 2010.
Cyber War: The Next Threat to National Security and What to Do About It. New York: Harper Collins, 2010.
Cyber Warriors. The Atlantic, 2010.
Cyberwarfare: Surviving an Attack." Public Interest Report 63, no. 3 (2010).
"D-Cloud: Design of a Software Testing Environment for Reliable Distributed Systems Using Cloud Computing Technology In 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing (CCGRID'10). Melbourne, Australia, 2010.
Defence Budgeting and Financial Management." In Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices, 63-79. Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2010.
"The Defence Industry as an Ally in Reducing Corruption." In Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices, 266-276. Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2010.
"Defence Procurement." In Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices, 80-95. Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2010.
"Defending A New Domain: The Pentagon’s Cyberstrategy." Foreign Affairs (2010).
"Defending Against Cyber Attacks. NATO, 2010.
Defense Against Terrorist Program. NATO, 2010.
Defense Report 2009. Sofia, 2010.
Страници
- « първа
- ‹ предишна
- …
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- …
- следваща ›
- последна »