Biblio

Export 21401 results:
2010
Nohrstedt, Daniel, and Dan Hansén. "Converging Under Pressure? Counterterrorism Policy Developments in the European Union Member States." Public Administration 88, no. 1 (2010): 190-210.
Dreher, A., and F. Schneider. "Corruption and the shadow economy: an empirical analysis." Public Choice 144, no. 1-2 (2010): 215-238.
Tagarev, Todor. "The Corruption Curse." In Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices, 2-13. Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2010.
Osipian, Ararat L.. "Corruption in the politicized university: lessons for Ukraine's 2010 presidential elections." Innovation: The European Journal of Social Science Research 23, no. 2 (2010): 101-114.
Tagarev, Todor. Costing in Capability-Based Planning In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2010.
Vatis, Michael. The Council of Europe Convention on Cybercrime, Proceedings of the Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options. Washington, D.C.: National Academies Press, 2010.
Magee, Aden C.. "Countering Nontraditional HUMINT Collection Threats." International Journal of Intelligence and CounterIntelligence 23, no. 3 (2010): 509-520.
Omelicheva, Mariya Y.. Counterterrorism Policies in Central Asia. London, U.K.: Routledge, 2010.
Counter-Terrorism White Paper: Securing Australia - Protecting Our Community. Australian Government, 2010.
Country analysis report for Zimbabwe. Government of Zimbabwe and the United Nations in Zimbabwe, 2010.
Kovach, Christopher M.. "Cowboys in the Middle East: Private Security Companies and the Imperfect Reach of the United States Criminal Justice System." Connections: The Quarterly Journal 9, no. 2 (2010): 17-34.
Toner, Eric S.. "Creating Situational Awareness: A Systems Approach." In Medical Surge Capacity: Workshop Summary. Washington, DC: National Academies Press, 2010.
Kotanjian, Hayk. Creating Strategically Oriented Interagency Environment: Senior Defense-Security School Model. Eurasia Security Program at Harvard University, 2010.
Kotanjian, Hayk. Creating Strategically Oriented Interagency Environment: Senior Defense-Se¬curity School Model. Eurasia Security Program at Harvard University, 2010.
Government, Australian. Critical Infrastructure Resilience Strategy. Canberra: Commonwealth of Australia, 2010.
Croatia’s Mesic slated for South Stream?. UPI, 2010.
Pamplos, Francesco, and Jacinto Pena. Cross-Cultural Awareness: Analytical Concept. Granada: TRADOC Directorate for Research, Doctrine and Materiel, 2010.
Jahandideh, Vahid, Amir S. Mortazavi, Yaser Baseri, and Javad Mohajeri. "Cryptanalysis and security enhancement on the generation of Mu-Varadharajan electronic voting protocol." International Journal of Electronic Governance 39, no. 1 (2010).
Yeh, Kuo-Hui, Nai Wei Lo, and Enrico Winata. "Cryptanalysis of an Efficient Remote User Authentication Scheme with Smart Cards." International Journal of Innovative Computing, Information and Control 6, no. 6 (2010).
Stallings, William. Cryptography and Network Security: Principles and Practice. USA.: Prentice Hall Press, 2010.
Slatinski, Nickolay. "Cultural Awareness in Implementing Integrity Building Programmes." In Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices, 331-342. Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2010.
Moua, Mai. Culturally Intelligent Leadership, Leading Through Intercultural Interactions . New York: Business Expert Press, 2010.
Lantis, Jeffrey S., and Darryl Howlett. "Culture and National Security Policy." In Strategy in the Contemporary World. Oxford: Oxford University Press, 2010.
Hofstede, Geert, and Michael Minkov. Cultures and Organisations: Software of the Mind. 3nd ed. New York: McGraw-Hill USA, 2010.
Hofstede, Geert, Gert Jan Hofstede, and Michael Minkov. Cultures and Organizations: Software of the Mind, Intercultural Cooperation and Its Importance for Survival. 3rd ed. New York: McGraw-Hill, 2010.

Pages