Biblio

Export 21404 results:
2014
Bomba, Alina. "Piractwo morskie." In Organizacje międzynarodowe w działaniu, 5, 7. Wrocław: OTO Agencja Reklamowa, 2014.
Redžić, Nebojša. Podgorica odgovara na kritiku Moskve [Podgorica responds to the Critique by Moscow]. Voice of America, 2014.
Radkovec, Juriy, Oleksandr Levchenko, and Oleksiy Kosogov. "Pogljady na stvorennja systemy informacijnoi bezpeky Ukrainy ta ii Zbrojnyh Syl." Nauka i oborona 1 (2014): 38-42.
Campbell, Donald, and Kathleen Campbell. "Police/military convergence in the USA as organisational mimicry." Policing and Society (2014).
Ivanova, Yoana. Policies for the Protection of Critical Infrastructure from Cyber Attacks In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2014.
Brazova, Vera-Karin. "Polish Civil Security in Regional Context." Przegląd Strategiczny 7 (2014).
Kristensen, Hans. Polish F-16s in NATO Nuclear Exercise in Italy. Federation of American Scientists (FAS), 2014.
Cisleanu, Radu Constantin. Political and Military Challenges of the Republic of Moldova int Context of Security in the Black Sea Basin. Monterey, California: Naval Postgraduate School, 2014.
Poroshenko: There Are No Separatists, Only Terrorists. The Wire, 2014.
McCanlies, Erin C., Anna Mnatsakanova, Michael E. Andrew, Cecil M. Burchfiel, and John M. Violanti. "Positive Psychological Factors are Associated with Lower PTSD Symptoms among Police Officers: Post Hurricane Katrina." Stress and Health 30, no. 5 (2014): 405-415.
Post-Maidan contours of Eurasian integration: transformation of constraints and prospects In Analytical report. Ufa, Bashkortostan, Russia: Center for Geopolitical Research, 2014.
Nidiffer, Kenneth, Suzanne Miller, and David J. Carney. Potential Use of Agile Methods in Selected DoD Acquisitions: Requirements Development and Management. Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, 2014.
Herold, R., and K. Beaver. The Practical Guide to HIPAA Privacy and Security Compliance. 2nd ed. CRC Press, 2014.
Gerasimov, Valery. Presentation at the Russian Ministry of Defense’s Third Moscow Conference on International Security., 2014.
The President of Kasakhstan Spoke against the Politization of the Eurasian Union (President Kazakhstana vystupil protiv politizatsii Evraziiskogo Soyuza)., 2014.
Watson, Callum. Preventing and Responding to Sexual and Domestic Violence against Men: A Guidance Note for Security Sector Institutions. Geneva: DCAF, 2014.
Gajin, Sasa, and Goran Matic. Primena zakona o tajnosti podataka. OSCE Mission to Serbia, 2014.
Lister, Charles. Profiling the Islamic State. Brookings Doha Center, 2014.
Carroll, John. Project Program and Portfolio Management in Easy Steps. Warwickshire, UK: Easy Steps Limited, 2014.
Petukhov, Vladimir. Project to create conservative man for today’s Russia; social realities and prospects In Verbatim record of the Statement at the Round Table. The International Foundation for Socio-Economic and Political Studies (The Gorbachev Foundation), 2014.
Projected Global Resettlement Needs Report 2015. UNHCR, 2014.
Aradau, Claudia. "The Promise of Security: Resilience, Surprise and Epistemic Politics." Resilience 2, no. 2 (2014): 73-87.
Musarurwa, Alfred, and Husin Jazri. "A Proposed Framework to Measure Growth of Critical Information Infrastructure Protection in Africa." In Conference: International Conference on Emerging Trends in Network and Computer Communication. Namibia, 2014.
Verkhovtsev, Valentin, Georgy V. Lysychenko, and Yuri L. Zabulonov. Prospects for the development of uranium resource base for nuclear power in Ukraine (in Ukrainian). Kiev: Naukova Dumka, 2014.
Hadji-Janev, Metodi. "Protecting Critical Information Infrastructure from Terrorist Attacks in South East Europe: How Real is the Threat." In Comprehensive Approach as "Sine Qua Non" for Critical Infrastructure Protection. IOS Press, 2014.

Pages