Biblio

Export 21402 results:
2006
Tucker, Jonathan B., and Raymond A. Zilinskas. "The Promise and Perils of Synthetic Biology." The New Atlantis 25 (2006): 38.
Smarandache, Florentin, and Jean Dezert. "Proportional Conflict Redistribution Rules for Information." Advances and Applications of DSmT for Information (2006).
Smarandache, F., and J. Dezert. "Proportional Conflict Redistribution Rules for Information Fusion." In Advances and Applications of DSmT for Information Fusion. Vol. 2. American Research Press, 2006.
Proposal for a Directive of the Council on the Identification and Designation of European Critical Infrastructures. Council of the EU, 2006.
Mkrtchyan, Tigran. The Prospects of 'Physical'Border-Spanning at the Neighbours of Europe (the Case of South Caucasus) and the Role of NATO in that Process In Robežu Paplašināšana: Identitātes Un Kopienas, Proceedings of International Conference. Riga: Latvijas Universitāte, 2006.
Kirda, E., and Kruegel C.. "Protecting Users Against Phishing Attacks." Computer Journal 49, no. 5 (2006): 554-561.
Kruger, Hennie, and Wayne Kearney. "A Prototype for Assessing Information Security Awareness." Computers and Security 25, no. 4 (2006): 289-96.
Provincial Reconstruction Teams in Afghanistan–An Interagency Assessment. Washington, D.C.: Department of Defense, 2006.
Schulman, Mark R.. The PSI as a New Paradigm for Peace and Security. Carlisle, PA: Strategic Studies Institute of the U.S. Army War College, 2006.
PSI: Combating Illicit WMD Trafficking, 2006., 2006.
PSI HLPM Chairman’s Statement . Warsaw, 2006.
"Putin: Private Oil Companies to Remain Private." FSU Oil & Gas Monitor (2006).
Quadrennial Defense Review Report. US Departament of Defense, 2006.
Quadrennial Defense Review—Execution Roadmap for Strategic Communication 2006. Washington, D.C.: U.S. Department of Defense, 2006.
Preacher, Kristopher. "Quantifying Parsimony in Structural Equation Modeling." Multivariate Behavioural Research 41, no. 3 (2006).
Van Assche, Gilles. Quantum Cryptography and Secret-Key Distillation . Cambridge: Cambridge University Press, 2006.
Montero, David. "Rape Law Reform Roils Pakistan’s Islamists." Christian Science Monitor (2006).
Boubakeur, Dalil. "Reaching Out to Muslim Clerics: Can We Build Bridges and Strengthen Moderate Voices in Islam?" Connections: The Quarterly Journal 5, no. 3 (2006): 51-55.
Tadda, George, John J. Salerno, Douglas Boulware, Michael Hinman, and Samuel Gorton. Realizing Situation Awareness within a Cyber Environment In Defense and Security Symposium. Vol. 6242. Orlando (Kissimmee), Florida, United States, 2006.
Sebastian, Leonard C.. Realpolitik Ideology: Indonesia’s use of Military Force. Singapore: ISEAS, 2006, 2006.
Villani, Domenico. "Recruitment in a Period of Transformation: the Italian Experience." In Service to Country: Personnel Policy and the Transformation of Western Militaries, 381-396. Cambridge, Mass.: MIT Press, 2006.
Pyman, Mark, and Maciej Wnuk. Reducing Corruption, Building Integrity in Defense and Security Institutions Guatemala City In International Anti-Corruption Conference. Guatemala, 2006.
Baev, Pavel K.. "Reevaluating the Risks of Terrorist Attacks Against Energy Infrastructure in Eurasia." China and Eurasia Forum Quarterly 4, no. 2 (2006).
A Reference Model for Open Standards-Based ITSM Solutions, An IBM White Paper In IT Service Management Standards., 2006.
Conley, Richard S.. "Reform, Reorganization, and the Renaissance of the Managerial Presidency: The Impact of 9/11 on the Executive Establishment." Politics & Policy 34, no. 2 (2006): 324.

Pages