Biblio
Export 21401 results:
Improved Block Truncation Coding Based on the Void-and-Cluster Dithering Approach." IEEE Transactions on Image Processing 8, no. 1 (2009).
"Improving Governance in the Management of Resources in the Security and Defence Sector In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2009.
Incoming Foreign Assistance In Assistance Manual Volume 3., 2009.
Independent International Fact-Finding Mission on the Conflict in Georgia In Brussels: The Council of the European Union., 2009.
Indicatory innovatsionnoy deyatelnosty. Statisticheskiy sbornik. Moscow: GU-VShE, 2009.
Individual Disengagement: A Psychological Analysis." In Leaving Terrorism Behind, 17-29. Oxon and New York: Routledge, 2009.
"Individual Partnership Action Plan 2009: Armenia. North Atlantic Treaty Alliance, 2009.
Individual Partnership Program between Switzerland and NATO for 2010, NATO/EAPC/PfP Unclassified Switzerland only. Bern: Directorate for Security Policy (DSP), 2009.
The Influence of the Neoconservative Movement on U.S. Foreign Policy." Connections: The Quarterly Journal 8, no. 2 (2009): 91-103.
"Informacijni operacii ta bezpeka suspilstva: zagrozy, protydija, modeljuvannja. Kyiv: Intertehnologija, 2009.
Information Exchange Gateways: Reference Architecture In A Nexor White Paper. Nexor, 2009.
Infosõda – Eesti ekspertide visioon ja kogemus In Sotsiaalteaduskond, Ajakirjanduse ja kommunikatsiooni instituut. Vol. Magistritöö. Tartu: Tartu Ülikool, 2009.
Inside the Ivory Tower." Foreign Policy (2009).
"Instruments for Measuring Accountability, Transparency and Control of Expenditures in the Security and Defence Sector In NATO-RACVIAC conference on Better Management of Defence Resources Including Building Integrity in the Armed Forces. Zagreb, Croatia , 2009.
Insufficient Situational Awareness about Critical Infrastructures by Emergency Management In C3I for Crisis, Emergency and Consequence Management, paper # 10. Paris: RTO, 2009.
Integrating reasoning with personality effects in simulated operators." In IEEE Symposium on Computational Intelligence for Security and Defense Applications., 2009.
"Interactive Simulations in Support of Decision Making on Defence Resource Allocation." Information & Security: An International Journal 23, no. 1 (2009): 129-140.
"Internal audit capability model (IA-CM) for the public sector: overview and application guide. Altamonte Springs, 2009.
The International Campaign Against Anarchist Terrorism, 1880-1930s." Terrorism and Political Violence 21, no. 1 (2009): 89-109.
"The International Campaign Against Anarchist Terrorism, 1880–1930s." Terrorism and Political Violence 21, no. 1 (2009): 89-109.
"International Relations in a New System of Coordinates." Rossijskaya gazeta (2009).
"International Technology Polices and Multipolarity: A Case of Russian ‘Technology Alliances’ Strategy In paper presented at the annual meeting of the ISA–ABRI Joint International Meeting. Rio de Janeiro, Brazil: Pontifical Catholic University, 2009.
International Terror and the Use of Force Against Non-State Actors." ISPI Policy Brief 150 (2009).
"The Internet as a Terrorist Tool to Recruit Youth. Arlington: Youth Recruitment & Radicalization Roundtable, 2009.
The Interpolar World: A New Scenario In Occasional Papers. Vol. 79. EU Institute for Security Studies, 2009.