Biblio

Export 21401 results:
2009
Bousquet, Antoine. The Scientific Way of Warfare. New York: Columbia University Press, 2009.
van Buuren, Jelle. Secret Truth: The EU Joint Situation Centre. Amsterdam: Eurowatch, 2009.
Scheffer, Jaap de Hoop. Secretary-General of NATO speech at Institute for National Security Studies and Atlantic Forum of Israel, Tel Aviv., 2009.
"Section 9: Integrating Gender Awareness and Equality." In OECD DAC Handbook on Security System Reform . Paris: OECD DAC, 2009.
Moustakis, Fotios, and Tracey German. Securing Europe: Western Interventions Towards a New Security Community. London-New York: Tauris Academic Studies, 2009.
Hathaway, Melissa. Securing Our Digital Future., 2009.
McDaniel, Patrick, and Stephen McLaughlin. "Security and Privacy Challenges in the Smart Grid." IEEE Security & Privacy 7, no. 3 (2009): 75-77.
Memon, Mukhtiar, Michael Hafner, and Ruth Breu. Security as a Service - A Reference Architecture for SOA Security In 7th International Workshop on Security in Information Systems, WOSIS 2009. Milan, 2009.
Anderson, Ross J., Rainer Böhme, Richard Clayton, and Tyler Moore. "Security Economics and European Policy." In Managing Information Risk and the Economics of Security, 55-80. New York, NY: Springer, 2009.
Security Forum Discusses Key Challenges in Central Asia. NATO, 2009.
Nguyen, Kien C., Tansu Alpcan, and Tamer Basar. Security Games with Incomplete Information In 2009 IEEE International Conference on Communications. Dresden: Germany, 2009.
Dang, Tran Khanh. "Security Issues in Outsourced XML Databases." In Open and Novel Issues in XML Database Applications: Future Directions and Advanced Technologies, 231-261. IGI Global, 2009.
Grajvoronskij, M.V., and O.M. Novikov. Security of Information and Computing Systems. Kiev: VNV, 2009.
Procházková, Dana. Security Planning: Land-use, Emergency and Crisis Planning. České Budějovice: VŠERS o.p.s., 2009.
AID, US, US DoD, and Department of State. "Security Sector Reform." Connections: The Quarterly Journal 9, no. 1 (2009): 113-129.
Security Sector Reform in Post-Conflict Peacebuilding . The Geneva Centre for the Democratic Control of Armed Forces (DCAF), 2009.
Tanner, Fred, Nayef R. F. Al-Rodhan, and Sunjay Chandiramani. Security Strategies Today: Trends and Perspectives. GCSP Geneva , 2009.
Williams, Paul D.. Security Studies: An Introduction. New York: Routledge, 2009.
Wither, James K.. "Selective Engagement with Islamist Terrorists: Exploring the Prospects." Studies in Conflict & Terrorism 32, no. 1 (2009): 25-26.
"Senado, LX Legislatura." Gaceta del Senado (2009).
Jančić, Davor. Serbia amidst competing sovereignty claims : balancing the Westphalian legacy with the political pragmatism of European integration In The 11th Kokkalis Graduate Student Workshop. John F. Kennedy School of Government, Harvard University, 2009.
Liu, Baolong, Joan Lu, and Jim Yip. "A Series-parallel XML Multisignature Scheme for XML Data Authentication." IJCSNS International Journal of Computer Science and Network Security 9, no. 2 (2009).
Chen, Ja-Shen, Hung Tai Tsou, and Astrid Ya- Hui Huang. "Service Delivery Innovation: Antecedents and Impact on Firm Performance." Journal of Service Research 12, no. 1 (2009): 36-55.
Servicemen of Pacific Fleet Found an Effective Method of Fighting Pirates. RIA Prima Media, 2009.
Isenberg, David. Shadow Force: Private Security Contractors in Iraq. ABC-CLIO, 2009.

Pages