Biblio
Export 21441 results:
Homeland / Societal Vulnerability and Security." Information & Security: An International Journal 17 (2005): 5-6.
"Homeland/Societal Vulnerability and Security, Information Security: An International Journal." Information Security: An International Journal 17 (2005).
"Households, forests, and fire hazard vulnerability in the American West: A case study of a California community." Global Environmental Change Part B: Environmental Hazards 6, no. 1 (2005): 23-37.
"How Chechnya Became a Breeding Ground for Terror." The Middle East Quarterly 12, no. 3 (2005): 57-66.
"How Smugglers, Traffickers and Copycats Are Hijacking the Global Economy. New York: Doubleday, 2005.
How the Andijan Killings Unfolded. BBC News, 2005.
How The Army Runs: A Senior Leader Reference Handbook. 25th ed. Carlisle Barracks, PA: U.S. Army War College, 2005.
The Human Rights Case Against Attacking Iran." New York Times (2005).
"Human Security and Security Sector Reform: Contrasts and Commonalities. Sicherheit und Frieden, 2005.
Human Trafficking: Breaking the Military Link." Connections: The Quarterly Journal 4, no. 4 (2005): 63-72.
"Human Trafficking in South Eastern Europe." Connections: The Quarterly Journal 4, no. 4 (2005): 49-62.
"Humanitarian Law and Direct Participation in Hostilities by Private Contractors or Civilian Employees." Chicago Journal of International Law 5 (2005): 511-46.
"Hyogo Framework for Action 2005-2015: Building the Resilience of Nations and Communities to Disasters In United Nations International Strategy for Disaster Reduction., 2005.
I Must Preach Holy War, Says Teacher." The Age (Australia) (2005).
"Identifying Lessons in United Nations International Policing Missions In DCAF Policy Paper. Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2005.
The Ideological War on Terror: Worldwide Strategies for Counter-Terrorism. London: Routledge, 2005.
If Hamas Participates, Sharon Says Israel Won’t Aid Palestinian Elections." Washington Post (2005).
"Image synthesis and face recognition based on 3d face model and illumination model In Proceedings of the First international conference on Advances in Natural Computation. Vol. Part II (ICNC’05). Springer-Verlag, 2005.
Impersonation Attack on a Dynamic ID-Based Remote User Authentication Scheme Using Smart Cards." IEICE Transactions on communications E88, no. B(5) (2005).
"An Implementation of the AKS Primality Test." IEEE (2005).
"Implementing the Defence Programs of the Ministry of Defence for the 2006-2011 Period – Risk Assessment." Military Journal (2005).
"Improved RS Method for Detection of LSB Steganography." Computational Science and Its Applications – ICCSA 2005 (2005): Part II.
"Improving Civil-Military Cooperation the Danish Way." NATO Review (2005).
"In Good Company? The Role of Business in Security Sector Reform. London: Demos, 2005.