Biblio

Export 21376 results:
2004
Gonzales, Katherina. Good Fences Make Good Neighbors: Ukrainian Border Security and Western Assistance In Problems of Post-Communism ., 2004.
Mamdani, Mahmood. Good Muslim, Bad Muslim. Johannesburg: Jacana Press, 2004.
Governance: The World Bank’s Experience . Washington, D.C.: The World Bank, 2004.
Goldsmith, Stephen, and William D. Eggers. Governing by Network: The New Shape of the Public Sector. Washington, D.C.: Brookings Institution Press, 2004.
OU, Chung-Ming, Chuan-Te HO, and Hwai-Ling Shan. "Government PKI Deployment and Usage in Taiwan." Information & Security: An International Journal 15, no. 1 (2004): 39-54.
O’Hara, Sarah. "Great Game or Grubby Game? The Struggle for Control of the Caspian." Geopolitics 9 (2004): 138-160.
Adams, Karen. "Great Power: What Will It Take?" In conference of the International Studies Association. Montreal, 2004.
Collier, Paul, and Anke Hoeffler. "Greed and Grievance in Civil War." Oxford Economic Papers 56, no. 4 (2004): 563-595.
Lindström, Gustav. "On the Ground: ESDP Operations." In EU Security and Defence Policies: The First Five Years (1999–2004), 111. Paris: EU Institute for Security Studies, 2004.
Guarding the Rusty Cartridges as Shield for Modern Military Technology. Journalistic Investigations Center, 2004.
Program, The Technical. Guide to Capability-Based Planning. Alexandria, VA: The Technical Cooperation Program, 2004.
Hankerson, Darrel, Alfred J. Menezes, and Scott Vanstone. "Guide to Elliptic Curve Cryptography." Springer Professional Computing (2004).
A Guide to the Project Management Body of Knowledge., 2004.
McLaughlin, Abraham. "Guns for Hire Thrive in Africa." Christian Science Monitor (2004).
Beck, Ulrich. "Half-blind." Forum (2004).
Lighty, Todd, and Laurie Cohen. "Hamas Probe Nearly Fell Apart." Chicago Tribune (2004).
Condé, H. V.. A Handbook of International Human Rights Terminology. Lincoln, NE: University of Nebraska Press, 2004.
Staab, Steffen, and Rudi Studer. Handbook on Ontologies. Berlin/ Heidelberg/ New York: Springer, 2004.
Lin, Ping, and Selçuk K. Candan. "Hiding Traversal of Tree Structured Data from Untrusted Data Stores." In 2nd International Workshop on Security in Information Systems-WOSIS04. Porto, Portugal, 2004.
Powell, Michael. "High-Profile N.Y. Suspect Goes on Trial." The Washington Post (2004).
Baran, Zeyno. Hizb ut-Tahrir. Islam’s Political Insurgency. Washington, D.C.: The Nixon Center, 2004.
Rotar, Igor. "Hizb ut-Tahrir Today." Terrorism Monitor 2, no. 5 (2004).
Dalgaard-Nielsen, Anja. "Homeland Security: American and European responses to September 11th." In The Politics of European Security, 159-178. Copenhagen: The Danish Institute for International Studies, 2004.
Rubin, James P.. "Honoring Nation-Building." Washington Post (2004).
Daugman, John. "How Iris Recognition Works." IEEE Transactions on Circuits and Systems for Video Technology 14, no. 1 (2004): 23-30.

Pages