Biblio

Export 21401 results:
2007
Osipian, Ararat L.. "Corruption in Higher Education: conceptual approaches and measurement techniques." Research in Comparative and International Education 2, no. 4 (2007).
Council Decision of 8 November 2007 Establishing a Community Civil Protection Mechanism., 2007.
Posner, Richard A.. Countering Terrorism: Blurred Focus, Halting Steps. Plymouth, UK: Rowman and Littlefield, 2007.
Yusuf, Moeed, and Anit Mukherjee. Counterinsurgency in Pakistan: Learning from India In National Security Outlook. American Enterprise Institute for Public Policy Research, 2007.
Omelicheva, Mariya Y.. Counterterrorism and human rights: Explaining differences in the scope and brutality of states' responses to terrorism In Graduate School. Vol. PhD. West Lafayette, IN: Purdue University, 2007.
Country Analysis Briefs, Russia. Energy Information Administration (EIA), 2007.
Cumming, Alfred. Covert Action: Legislative Background and Possible Policy Questions In CRS Report for Congress. Washington, D.C.: Congressional Research Service, 2007.
Tahir, Muhammad Nabeel. " C-RBAC: Contextual role-based access control model." Ubiquitous Computing and Communication Journal 2, no. 3 (2007).
Bogush, G.I., and N.F. Kuznetsova. Criminology: Tutorial. Moscow, 2007.
Cavelty, Myriam Dunn. Critical information infrastructure: vulnerabilities, threats and responses In Disarmament Forum., 2007.
Hellstrom, Thomas. "Critical Infrastructure and Systemic Vulnerability: Towards a Planning Framework." Safety Science 45, no. 3 (2007): 415-30.
LaPorte, T. R.. "Critical Infrastructure in the Face of a Predatory Future—Preparing for Untoward Surprise." Journal of Contingencies and Crisis Management 15, no. 1 (2007): 60-64.
Murray, Alan T., and Tony Grubesic. Critical infrastructure: reliability and vulnerability In Advances in Spatial Science. Berlin: Springer-Verlag, 2007.
Moteff, John D.. Critical Infrastructures: Background, Policy, and Implementation. Washington, DC: Congressional Research Service and Library of Congress, 2007.
Criticizing Investigations Against Journalists. Stern.de, 2007.
Cavelty, Myriam Dunn. Cyber-security and threat politics: US efforts to secure the information age. London: Routledge, 2007.
Cavelty, Myriam Dunn. "Cyber-Terror– Looming Threat or Phantom Menace? The Framing of the US Cyber-Threat Debate." Journal of Information Technology & Politics 4, no. 1 (2007).
Tüzünkan, Murat. The Cyprus Question: Continuity, Transformation And Tendencies, Graduate School Of Social Sciences. Vol. Doctor Of Philosophy. Middle East Technical University, 2007.
D: Information and Communication Security 12 In NATO Science for Peace Security Series. Amsterdam: IOS Press, 2007.
Danish fighter jets v. Russian bombers: 18-minute chase ., 2007.
Luft, Gal, and Christophe Paillard. "Debate: Should NATO play a major role in energy security?" NATO Review (2007).
Billyard, Andrew, Debbie Blakeney, and R. Parker. "A Decision Aid Toolset for Strategic Planning." In DRDC CORA TR ., 2007.
Decree on the Organisation and Functioning of the Monitoring, Notification and Alarm System. Official Gazette of the Republic of Slovenia No 105/07, 2007.
Cole, Eden, and Philipp Fluri. Defence and Security Sector Institution Building in the Post-Soviet Central Asian States . Geneva: DCAF, 2007.
Tagarev, Todor. "Defence Policy: Scope, Main Components, and Relationships." International Relations /Mejdunarodni otnoshenia/, no. 1-2 (2007): 141-156.

Pages