Biblio

Export 21377 results:
2010
Denton, John W. H.. "Ambitious China Need Not Be an Emerging Problem." The Australian (2010).
Sherewell, Philip, and William Lowther. "American Spy Chiefs Alarmed by Binyam Mohamed Ruling." Daily Telegraph (2010).
Del Pilar, Andrea, and Amaya Beltrán. Análisis de la Política Exterior y de Seguridad de Canadá en Afganistán en el período 2001-2009 In Monografía. Bogotá, D.C.: Universidad Colegio Mayor Nuestra Señora Del Rosario, Facultad De Relaciones Internacionales, 2010.
Analysis of Law in the EU and a Selection of Member States pertaining to Cross-Border Disaster Relief. Synthesis Report and Recommendations. International Federation of Red Cross and Red Crescent Societies, 2010.
Analysis of Law in the EU Pertaining to Cross-Border Disaster Relief (EU IDRL Study). German Red Cross, 2010.
Campbell, Alan. Analytic Implications of the NATO Defence Planning Process In Specialist Team Summary Report. NATO, 2010.
Lopez-Nicolas, Carolina, and Pedro Soto-Acosta. "Analyzing ICT adoption and use effects on knowledge creation: An empirical investigation in SMEs: SSIS." International Journal of Information Management 30, no. 6 (2010): 521.
Gonsalves, Antone. "Android Phones Steal Market Share." InformationWeek (2010).
Announced by Assistant Minister Nedeljkovic, Head of Ministry’s ICT Sector at the Public Hearing on Cyber Security in Serbian Parliament held ., 2010.
Annual Report 2009. Internal Security Agency, 2010.
Brunner, Martin, Hans Hofinger, Christopher Roblee, Peter Schoo, and Sascha Todt. "Anonymity and Privacy in Distributed Early Warning Systems." In CRITIS 2010: Critical Information Infrastructures Security., 2010.
O'Connor, Brendon, and Srdjan Vucetic. "Another Mars–Venus divide? Why Australia said ‘yes’ and Canada said ‘non’ to involvement in the 2003 Iraq War." Australian Journal of International Affairs, Volume 64, 2010 - Issue 5 64, no. 5 (2010): 526-548.
Bitter, Christian, David A. Elizondo, and Tim Watson. "Application of Artificial Neural Networks and Related Techniques to Intrusion Detection." In The 2010 International Joint Conference on Neural Networks (IJCNN)., 2010.
Procházková, Dana. Application of SWOT Analysis and of Selected Types of Case Studies at Selection of Model for Strategic Territory Safety Management., 2010.
Giacobe, Nicklaus A.. Application of the JDL Data Fusion Process Model for Cyber Security In Multisensor, Multisource Information Fusion: Architectures, Algorithms, and Applications. Vol. 7710. SPIE, 2010.
Ikenson, Daniel. Appreciate This: Chinese Currency Rise Will Have a Negligible Effect on the Trade Deficit. Washington, D.C.: CATO Institute, 2010.
On the approval of the Updated Individual Partnership Action Plan the Republic of Moldova – NATO In Government Decision of the Republic of Moldova., 2010.
Johnson, Gregory D.. "AQAP in Yemen and the Christmas Day Terrorist Attacks." CTC Sentinel Special Issue (2010): 1-4.
Coates, Kenneth, Whitney Lackenbauer, William Morrison, and Greg Poelzer. Arctic Front: Defending Canada in the Far North. Toronto: Thomas Allen , 2010.
Bloomfield, Lincoln P.. " The Arctic: Last Unmanaged Frontier." Foreign Affairs 60, no. 1 (2010).
Zajas, Stanisław. "The Armed Forces’ Development at the Beginning of the Twenty-First Century from the Polish Perspective." Connections: The Quarterly Journal 9, no. 4 (2010): 97-105.
Nichol, Jim. Armenia, Azerbaijan, and Georgia: Security Issues and Implications for U.S. Interests In CRS Report for Congress. Washington, D.C.: Congressional Research Service, 2010.
Mirzoyan, Alla. Armenia, the Regional Powers, and the West: Between History and Geopolitics. Palgrave Macmillan, 2010.
Tsakiris, George, Harris Vangelis, and Dimitris Tigkas. "Assessing Water System Vulnerability to Drought to Multi-year Droughts." European Water 29 29 (2010): 21-29.
Assessments Summary Report: Common Industrial Control System Cyber Security Weaknesses. Idaho Falls, ID: Idaho National Laboratory, 2010.

Pages