Biblio

Export 21401 results:
2009
Guo, Jing-Ming, and Ming-Feng Wu. "Improved Block Truncation Coding Based on the Void-and-Cluster Dithering Approach." IEEE Transactions on Image Processing 8, no. 1 (2009).
Tagarev, Todor. Improving Governance in the Management of Resources in the Security and Defence Sector In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2009.
Incoming Foreign Assistance In Assistance Manual Volume 3., 2009.
Tagliavini, Heidi. Independent International Fact-Finding Mission on the Conflict in Georgia In Brussels: The Council of the European Union., 2009.
Indicatory innovatsionnoy deyatelnosty. Statisticheskiy sbornik. Moscow: GU-VShE, 2009.
Horgan, John. "Individual Disengagement: A Psychological Analysis." In Leaving Terrorism Behind, 17-29. Oxon and New York: Routledge, 2009.
Individual Partnership Action Plan 2009: Armenia. North Atlantic Treaty Alliance, 2009.
Individual Partnership Program between Switzerland and NATO for 2010, NATO/EAPC/PfP Unclassified Switzerland only. Bern: Directorate for Security Policy (DSP), 2009.
Dusanic, Arsenije, and Plamen P. Penev. "The Influence of the Neoconservative Movement on U.S. Foreign Policy." Connections: The Quarterly Journal 8, no. 2 (2009): 91-103.
Horbulin, Volodymyr P., Oleksandr H. Dodonov, and Dmytro V. Lande. Informacijni operacii ta bezpeka suspilstva: zagrozy, protydija, modeljuvannja. Kyiv: Intertehnologija, 2009.
Information Exchange Gateways: Reference Architecture In A Nexor White Paper. Nexor, 2009.
Põldaru, Kadri. Infosõda – Eesti ekspertide visioon ja kogemus In Sotsiaalteaduskond, Ajakirjanduse ja kommunikatsiooni instituut. Vol. Magistritöö. Tartu: Tartu Ülikool, 2009.
Maliniak, Daniel, Amy Oakes, Susan Peterson, and Michael J. Tierney. "Inside the Ivory Tower." Foreign Policy (2009).
Melese, Francois. Instruments for Measuring Accountability, Transparency and Control of Expenditures in the Security and Defence Sector In NATO-RACVIAC conference on Better Management of Defence Resources Including Building Integrity in the Armed Forces. Zagreb, Croatia , 2009.
Luiijf, Eric, and Marieke Klaver. Insufficient Situational Awareness about Critical Infrastructures by Emergency Management In C3I for Crisis, Emergency and Consequence Management, paper # 10. Paris: RTO, 2009.
Guo, Ruibiao J., and Brad Cain. "Integrating reasoning with personality effects in simulated operators." In IEEE Symposium on Computational Intelligence for Security and Defense Applications., 2009.
Tagarev, Todor, Gueorgui Stankov, and Lozan Bizov. "Interactive Simulations in Support of Decision Making on Defence Resource Allocation." Information & Security: An International Journal 23, no. 1 (2009): 129-140.
Institute of Internal Auditors. Internal audit capability model (IA-CM) for the public sector: overview and application guide. Altamonte Springs, 2009.
Jensen, Richard Bach. "The International Campaign Against Anarchist Terrorism, 1880-1930s." Terrorism and Political Violence 21, no. 1 (2009): 89-109.
Jensen, Richard Bach. "The International Campaign Against Anarchist Terrorism, 1880–1930s." Terrorism and Political Violence 21, no. 1 (2009): 89-109.
Lavrov, S.V.. "International Relations in a New System of Coordinates." Rossijskaya gazeta (2009).
Danilin, Ivan V.. International Technology Polices and Multipolarity: A Case of Russian ‘Technology Alliances’ Strategy In paper presented at the annual meeting of the ISA–ABRI Joint International Meeting. Rio de Janeiro, Brazil: Pontifical Catholic University, 2009.
Nigro, Raffaella. "International Terror and the Use of Force Against Non-State Actors." ISPI Policy Brief 150 (2009).
G., Weimann. The Internet as a Terrorist Tool to Recruit Youth. Arlington: Youth Recruitment & Radicalization Roundtable, 2009.
Grevi, Giovanni. The Interpolar World: A New Scenario In Occasional Papers. Vol. 79. EU Institute for Security Studies, 2009.

Pages