Biblio
Export 21441 results:
Policy Making and Process: A Guide to Case Analysis." In Case Studies in Policy Making. 11th ed. Newport, RI: Naval War College Press, 2008.
"Political Dialogue and Security in the European Neighbourhood: The Virtues and Limits of ‘New Partnership Perspectives’." European Foreign Affairs Review 13, no. 1 (2008): 73-95.
"Political Warfare: Means for achieving political ends." In Strategic Influence: Public Diplomacy, Counterpropaganda, and Political Warfare, editor J. Michael Waller, 206-223. Institute of World Politics Press, 2008.
"The Politics-Administration Dichotomy: An Empirical Search for Correspondence between Theory and Practice." Public Administration Review 68 (2008).
"The Post-American World. New York: W. W. Norton, 2008.
"A Practical Guide to Analyses of Alternatives." In Analysis of Alternatives (AoA) Handbook., 2008.
Practices and lessons learned in coping with climatic hazards at the river-basin scale: floods and drought." Ecology and Society 13, no. 2 (2008): 32.
"Precaution against terrorism." In Managing Strategic Surprise: Lessons from Risk Management and Risk Assessment, 110-83. Cambridge: Cambridge University Press, 2008.
"Predicting Iran’s Nuclear Status: A Kaleidoscope of Futures. Vol. Master of Arts in National Security Studies. Charles Town, West Virginia: American Public University System, 2008.
Prepared Remarks by H.E. Kanat Saudabayev, Secretary of State of the Republic of Kazakhstan, at the NATO PA Plenary Session." In NATO PA Plenary Session in Valencia, Spain., 2008.
"Press Point. NATO.int, 2008.
Preventing War in Macedonia: Pre-Emptive Diplomacy for the 21st Century. London: RUSI/Routledge, 2008.
The Principle of Distinction and Weapon Systems on the Contemporary Battlefield." Connections: The Quarterly Journal 7, no. 1 (2008): 46-56.
"Principles and Guidelines (Capstone Doctrine). New York: United Nations, 2008.
Privacy-Preserving Collaborative E-Voting In International Conference on Intelligence and Security Informatics ISI 2008: Intelligence and Security Informatics. Berlin, Heidelberg: Springer, 2008.
Private Security Contractors in Iraq: Background, Legal Status, and Other Issues In Congressional Research Service Report. Washington, D.C.: Congressional Research Service, 2008.
Production model of the armed forces In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2008.
Programiranje funkcionisanja i razvoja sistema odbrane (Programming the defence system's functioning and development)." Vojno delo vol. 60, no. 2 (2008): 93-107.
"Proposal for a Council Decision of 27 October 2008 on a Critical Infrastructure Warning Information Network (CIWIN). COM(2008) 676 final, 2008.
Prospects for Islamic Radicalism and Violent Extremism in the North Caucasus and Central Asia In PONARS Eurasia Memo., 2008.
Protecting Individual Privacy in the Struggle against Terrorists: A Framework for Program Assessment. Washington, DC: National Academies Press, National Research Council, 2008.
Providing Query Assurance for Outsourced Tree-Indexed Data." In Modeling, Simulation and Optimization of Complex Processes. Berlin, Heidelberg: Springer, 2008.
"PRT Models in Afghanistan. Approaches to Civil-Military Integration. Kuopio: Crisis Management Center Finland, 2008.
Public Diplomacy’s Next Challenge." Connections 7, no. 1 (2008): 141-153.
"