Biblio

Export 21377 results:
2009
Cullen, Stephen P.. "Out of Reach: Improving the System to Deter and Address Criminal Acts Committed by Contractor Employees Accompanying Armed Forces Overseas." Public Contract Law Journal 38 (2009): 509, 514.
Hofmann, Stephanie C.. "Overlapping Institutions in the Realm of International Security: The Case of NATO and ESDP." Perspectives on Politics 7, no. 1 (2009): 45-52.
Pacific Fleet Servicemen Implemented the Entire Program of Combat Training in 2009. RIA Vesti, 2009.
Kazi, Reshmi. "Pakistan’s HEU-based Nuclear Weapons Programme and Nuclear Terrorism: A Reality Check." Strategic Analyses 33, no. 6 (2009): 863-865.
Travis, Cited in Alan, and Owen Bowcott. Papers Released under the 30 Year Rule Reveal the Full Force of Thatcher’s Fury. Vol. May 22, 2015. The Guardian, 2009.
Mullins, Sam. "Parallels Between Crime and Terrorism: A Social-Psychological Perspective." Studies in Conflict and Terrorism 32, no. 9 (2009): 811-30.
Dezhu, Dai. "On the particularity of privacy and legislative issues in e-government (论电子政务中的特殊性隐私及其立法问题)." Theoretical Monthly 7 (2009): 103-106.
Herley, Cormac, P.C. van Oorschot, and Andrew Patrick. "Passwords: If We’re So Smart, Why Are We Still Using Them?" In Financial Cryptography and Data Security, 230-237. Berlin/Heidelberg: Springer, 2009.
, and & Co.. Pathways to a Low-Carbon Economy: Version 2 of the Global Greenhouse Gas Abatement Cost Curve. New York: McKinsey, 2009.
Szigeti, Janos, Ricardo Romeral, Tibor Cinkler, and David Larrabeiti. "p-Cycle Protection in Multi-Domain Optical Networks." In Photonic Network Communications., 2009.
Hammond, Martin. The Peloponnesian War. Oxford: Oxford University Press, 2009.
"Pentagon Letter Complicates Blackwater Case." Washington Post (2009).
Verpoorten, Dominique, Christian Glahn, and Milos Kravcik. "Personalisation of Learning in Virtual Learning Environments." In Learning in the Synergy of Multiple Disciplines, 52-66. Berlin, Heidelberg: Springer Verlag, 2009.
"Pervyi Boi Admirala." Rossiiskaya Gazeta (2009).
Philp, Wayne R., and Christopher P. Martin. "A philosophical approach to time in military knowledge management." Journal of Knowledge Management 13, no. 1 (2009): 171-183.
"Piracy Fighters Were Robbed Right on Shore." Ryba (2009).
Costa, Antonio Maria. "Piracy Must be Defeated in Courts, Ports and Banks, not Just at Sea." Lloyd’s List (2009).
"Pirate Attack in Gulf of Aden Foiled by Russian Warship." St. Petersburg Times (2009).
Point Carbon Forecasts U.S. Carbon Allowances at $13.70 in 2012. PointCarbon.com, 2009.
Sierra, Oscar Pardo. "A Point of No Return? Georgia and the EU One Year after the August War." Central Asia Caucasus Analyst 11, no. 15 (2009): 3.
Abushov, Kavus. "Policing the Near Abroad: Russian Foreign Policy in the South Caucasus." Australian Journal of International Affairs 63, no. 2 (2009): 187-212.
Gleason, Gregory. "Political Dimensions of the Northern Afghanistan Resupply Routes." Connections: The Quarterly Journal 8, no. 4 (2009): 39-62.
Nazario, Jose. "Politically Motivated Denial of Service Attacks." In The Virtual Battlefield: Perspectives on Cyber Warfare., 2009.
Dzhuvelykyan, Hachik, Dmitriy Shcheglov, and Nadezhda Gorbunova. Pollution of Soils with Нeavy Metals. Methods of Soil Pollution Monitoring and Regulation (in Russian). Voronezh: Voronezh University Press, 2009.
Stewart, Scott. Portfolio Management. Project Management Institute, 2009.

Pages