Biblio

Export 21377 results:
2008
Cannavo, Peter F.. "In the Wake of Katrina." In Political Theory and Global Climate Change, 178. Cambridge, MA: MIT Press, 2008.
McIntosh, G. C., and M. K. Lauren. " Incorporating Fractal Concepts into Equations of Attrition for Military Conflicts." The Journal of the Operational Research Society 59, no. 5 (2008): 703-713 .
Maloney, Sean M.. "Incursion at Howz-e Madad: An Afghanistan Vignette." Canadian Military History 17, no. 1 (2008).
Independent Panel on Canada’s Future Role in Afghanistan” (Manley Report)., 2008.
Yadav, Surya N.. India, China and Africa. New Partnership in Energy Security. New Delhi: Jnanada Prakashan (P&D), 2008.
Vohra, Ravi, and V. Srivatsan. India-Sri Lanka Maritime Cooperation: Opportunities and Challenges. National Maritime Foundation, 2008.
Information technology – Security techniques – Information Security Risk Management., 2008.
Faynzilberg, Leonid. Informatsionnyie tehnologii obrabotki signalov slozhnoy formyi. Teoriya i praktika. Kyiv, Ukraine: Naukova dumka, 2008.
Lester, Cynthia Y., Hira Narang, and Chung-Han Chen. Infusing Information Assurance into an Undergraduate CS Curriculum In Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies SECUR¬WARE'08. Cap Esterel, France, 2008.
Cohen, William. "Initiation of the Consortium by US Secretary of Defense William Cohen during an intervention at the meeting of the Euro-Atlantic Partnership Council Defence Ministers (EAPC-D) in Brussels, Belgium, on June 12, 1998." Connections: The Quarterly Journal 7, no. 3 (2008): 77-80.
Sherwell, Philip. "Inside the FARC Camps in Ecuador." Daily Telegraph (2008).
WESSELS, WOLFGANG, and FRANZISKA BOPP. The Institutional Architecture of CFSP after the Lisbon Treaty – Constitutional Breakthrough or Challenges Ahead?. Brussels: Centre for European Policy Studies, 2008.
Bucur-Marcu, Hari. "The Institutionalization of Security Risk Assessment." Connections: The Quarterly Journal 7, no. 2 (2008): 118-124.
Niemeyer, Klaus, Velizar Shalamanov, and Todor Tagarev. "Institutionalizing Operations Analysis for Security and Defense in Bulgaria." Connections: The Quarterly Journal 7, no. 2 (2008): 45-53.
Bastick, Megan. "Integrating Gender in post-conflict security sector reform." In Gender and Security Sector Reform Toolkit, 163., 2008.
Rudner, Martin. "Intelligence Studies in Higher Education: Capacity-Building to Meet Societal Demand." International Journal of Intelligence and Counter-Intelligence 22, no. 1 (2008).
Strom, Kevin, and Joe Eyerman. "Interagency Coordination: A Case Study of the 2005 London Train Bombings." National Institute of Justice Journal 260 (2008): 8-11.
Andonov, Filip. Interaktiven metod za grupovo vzemane na reshenia., 2008.
Colletta, Nat J.. Interim Stabilization: Balancing Security and Development in Post-Conflict Peacebuilding. Stockholm: SIPRI, 2008.
Zivanovic, Katarina. "International Cooperation of Intelligence Agencies against Transnational Terrorist Targets." Connections: The Quarterly Journal 8, no. 1 (2008): 115-141.
Internet of Things 2020 – Roadmap for the future In INFSO D.4 Networked Enterprise & RFID INFSO G.2 Micro & Nanosystems., 2008.
Walter, Gregor. Internetkriminalität: eine Schattenseite der Globalisierung In SWP-Studie. Berlin: Stiftung Wissenschaft und Politik -SWP- Deutsches Institut für Internationale Politik und Sicherheit, 2008.
Canary, Daniel J., Michael J. Cody, and Valerie L. Manusov. Interpersonal Communication: A Goals Based Approach. New York: Bedford/St. Martin’s, 2008.
Haig, Zsolt, and István Várhegyi. "Interpretation of Cyberspace and Cyber Warfare." Military Science (2008): 5-10.
Interview in Chinese mass media: Xinhua News Agency, People’s Daily newspaper and Central Television of China. official website of the President of Russia, 2008.

Pages