Biblio

Export 21404 results:
2015
Commission, European. Commission Staff Working Document: The Former Yugoslav Republic of Macedonia Report 2015. Brussels, 2015.
Commissioner for Fundamental Rights., 2015.
Committee on National Security Systems. Committee on National Security Systems (CNSS) Glossary. CNSSI, 2015.
Fiott, Daniel. The Common Security and Defense Policy: National Perspectives In EGMONT Paper. Brussels: The Royal Institute for the International Relations, 2015.
Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions, A European Agenda on Migration. European Commission, 2015.
Communication from the Council to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions, The European Agenda on Security. European Commission, 2015.
Finkin, Metthew W., and Guy Mundlak. Comparative Labor Law. Cheltenham, UK, Northampton, MA, USA, 2015.
Auers, Daunis. Comparative politics and government of the Baltic States: Estonia, Latvia and Lithuania in the 21st century. Palgrave Macmillan UK, 2015.
Wingeart, Jason M.. Comparing India's Counterinsurgency Approaches in Sri Lanka and Against the Naxalites In Technical Report. Fort Leavenworth United States: US Army School for Advanced Military Studies, 2015.
"Complex Crises Call for Adaptable and Durable Capabilities." The Military Balance 115, no. 1 (2015).
Prezelj, Iztok. "Comprehensive Security and Some Implemental Limits." Information & Security: An International Journal 33, no. 1 (2015): 13-34.
Computer Networks and Cybersecurity. New Man's Business Accelerator, 2015.
Yunis, Manal M., and Kai S. Koong. "A Conceptual Model for the Development of a National Cybersecurity Index: An Integrated Framework." In Twenty-first Americas Conference on Information Systems. Puerto Rico, 2015.
US Department of State. Confidence-Building Measure Return Covering 2014: Convention on the Prohibition of the Development, Production and Stockpiling of Bacteriological (Biological) and Toxin Weapons and on their Destruction., 2015.
Nowakowska-Krystman, Aneta, and Marzena Żakowska. "Conflict in Kosovo through the Conceptual Framework of Stakeholders." Connections: The Quarterly Journal 14, no. 4 (2015): 69-81.
Dumaine, Carol, and Irving Mintzer. "Confronting Climate Change and Reframing Security." SAIS Review of International Affairs 35, no. 1 (2015): 5-16, p. 6.
Martin, Arthur, and Richard Spillett. "Conned by Jihadi Cold Callers: Yard Reveals Pensioners are Being Fleeced out of Savings by ISIS Backers." Daily Mail (2015).
Yablokov, Ilya. "Conspiracy Theories as a Russian Public Diplomacy Tool: The Case of Russia Today (RT)." Politics 35, no. 3-4 (2015).
The Constitution of Bosnia and Herzegovina., 2015.
Xianghong, Zeng. "Construction of China's diplomacy in Central Asia and the Silk Road Economic Belt." Journal of Shanghai Jiaotong University: Philosophy and Social Sciences, no. 3 (2015).
Minxing, Huang. Contemporary Identification of Azerbaijani People in Iran (in Chinese). World Nation, 2015.
Government, HM. CONTEST: The United Kingdom’s Strategy for Countering Terrorism: Annual Report for 2014. London: The Stationery Office, 2015.
Davis, Jr, John R.. "Continued evolution of hybrid threats. The Russian Hybrid Threat Construct and the Need for Innovation." The Three Swords Magazine 28 (2015).
Convention on Cybercrime. Council of Europe, 2015.
Govan, Gregory G.. "Conventional Arms Control in Europe: Some Thoughts About an Uncertain Future." Deep Cuts, no. Brief #5 (2015).

Pages