Biblio
Export 21419 results:
The View from Kosovo: Challenges to Peace-building and State-building." Connections: The Quarterly Journal 9, no. 3 (2010): 89-94.
"Virtual attacks and the problem of responsibility: the case of China and Russia." Carta Internacional 5, no. 2 (2010).
"Virtual Lab for Information Assurance Education. CISSE, 2010.
Virtual Regionalism and Protective Integration in Central Asia." In Eurasian Per-spectives: In Search of Alternatives, 29-48. Kolkata: Shipra Publications, 2010.
"Visualisation et Analyse de Risque Dynamique pour la Cyber- Défense." In Symposium sur la Sécurité des Technologies de l’Information et de la Communication (SSTIC). Rennes, 2010.
"Volunteering in the European Union In final report to the Educational. GHK, Audiovisual & Culture Executive Agency and Directorate General Education and Culture, 2010.
Vpliv informacijskega sistema poveljevanja in kontrole na uspešnost procesa poveljevanja in kontrole v SV In Fakulteta za management. Vol. Magistrska naloga. Koper: Univerza na Primorskem, 2010.
Vulnerability assessment of urban buried gas pipeline. Capital University of Economics and Trade, 2010.
Vulnerability, Capacity and Resilience: Perspectives for Climate and Development Policy." Journal of International Development 22, no. 2 (2010): 218-232.
"Water Crisis in Central Asia: Key Challenges and Opportunities. New York: New School University, 2010.
Waves of the Change and Change of the Waves." Sociological Problems Special Issue (2010).
"Western Sahara: The Refugee Nation. Cardiff: University of Wales Press, 2010.
Western Sahara: War, Nationalism and Conflict Irresolution. New York, NY: Syracuse University Press, 2010.
What do Europeans Want from NATO?. Brussels: European Union Institute for Security Studies, 2010.
What publication of myths about the Chinese threat will lead to." Central Asia and the Caucasus 13, no. 2 (2010): 118-129.
"When Corrections Fail: The Persistence of Political Misperceptions." Political Behavior 32, no. 2 (2010): 303-330.
"When in Rome…." CBRNe World (2010).
"When to Migrate Software Testing to the Cloud? In Third International Conference on Software Testing, Verification, and Vali¬dation Workshops (ICSTW). Paris, France, 2010.
White Book on Defence and Armed Forces of Bulgaria. Ministry of Defence of the Republic of Bulgaria, 2010.
White House Strategic Communications Report to Congress. White House, 2010.
Who Owns the Arctic? Understanding Sovereignty Disputes in the North . Vancouver, BC: Douglas & McIntyre, 2010.
Why Cyber Warfare is Important." In Cyber Warfare: The Next Threat to National Security and What to Do About It, 18-21. New York: HarperCollins, 2010.
"Why Do Ethnic Groups Rebel? New Data and Analysis." World Politics 62, no. 1 (2010): 87-119.
"