Biblio
Export 21401 results:
Converging Under Pressure? Counterterrorism Policy Developments in the European Union Member States." Public Administration 88, no. 1 (2010): 190-210.
"Corruption and the shadow economy: an empirical analysis." Public Choice 144, no. 1-2 (2010): 215-238.
"The Corruption Curse." In Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices, 2-13. Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2010.
"Corruption in the politicized university: lessons for Ukraine's 2010 presidential elections." Innovation: The European Journal of Social Science Research 23, no. 2 (2010): 101-114.
"Costing in Capability-Based Planning In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2010.
The Council of Europe Convention on Cybercrime, Proceedings of the Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options. Washington, D.C.: National Academies Press, 2010.
Countering Nontraditional HUMINT Collection Threats." International Journal of Intelligence and CounterIntelligence 23, no. 3 (2010): 509-520.
"Counterterrorism Policies in Central Asia. London, U.K.: Routledge, 2010.
Counter-Terrorism White Paper: Securing Australia - Protecting Our Community. Australian Government, 2010.
Country analysis report for Zimbabwe. Government of Zimbabwe and the United Nations in Zimbabwe, 2010.
Cowboys in the Middle East: Private Security Companies and the Imperfect Reach of the United States Criminal Justice System." Connections: The Quarterly Journal 9, no. 2 (2010): 17-34.
"Creating Situational Awareness: A Systems Approach." In Medical Surge Capacity: Workshop Summary. Washington, DC: National Academies Press, 2010.
"Creating Strategically Oriented Interagency Environment: Senior Defense-Security School Model. Eurasia Security Program at Harvard University, 2010.
Creating Strategically Oriented Interagency Environment: Senior Defense-Se¬curity School Model. Eurasia Security Program at Harvard University, 2010.
Critical Infrastructure Resilience Strategy. Canberra: Commonwealth of Australia, 2010.
Croatia’s Mesic slated for South Stream?. UPI, 2010.
Cross-Cultural Awareness: Analytical Concept. Granada: TRADOC Directorate for Research, Doctrine and Materiel, 2010.
Cryptanalysis and security enhancement on the generation of Mu-Varadharajan electronic voting protocol." International Journal of Electronic Governance 39, no. 1 (2010).
"Cryptanalysis of an Efficient Remote User Authentication Scheme with Smart Cards." International Journal of Innovative Computing, Information and Control 6, no. 6 (2010).
"Cryptography and Network Security: Principles and Practice. USA.: Prentice Hall Press, 2010.
Cultural Awareness in Implementing Integrity Building Programmes." In Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices, 331-342. Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2010.
"Culturally Intelligent Leadership, Leading Through Intercultural Interactions . New York: Business Expert Press, 2010.
Culture and National Security Policy." In Strategy in the Contemporary World. Oxford: Oxford University Press, 2010.
"Cultures and Organisations: Software of the Mind. 3nd ed. New York: McGraw-Hill USA, 2010.
Cultures and Organizations: Software of the Mind, Intercultural Cooperation and Its Importance for Survival. 3rd ed. New York: McGraw-Hill, 2010.