Biblio

Export 21402 results:
2004
Kay, Sean. "NATO, the Kosovo War and Neoliberal Theory." Contemporary Security Policy 25, no. 2 (2004): 252.
Werft, Lürssen. "Naval Craft, Weapon and Sensor Systems." Information & Security: An International Journal 13 (2004): 51-76.
Monitor, ISIJ. "Naval Internet Sources." Information & Security: An International Journal 13 (2004): 135-136.
Yeoman, See Barry. "Need An Army? Just Pick Up the Phone." New York Times (2004).
Fukuyama, Francis. "The Neoconservative Moment." The National Interest (2004).
Glenn, John, Darryl Howlett, and Stuart Poore. Neorealism Versus Strategic Culture. Aldershot, U.K.: Ashgate, 2004.
Thomas, Thomas M.. Network Security First-Step. Indiana: Cisco Press, 2004.
Sullivan, John P.. Networked All-Source Fusion for Intelligence and Law Enforcement Counter-terrorism Response In paper presented at the ISA Annual Convention in Montreal, Canada., 2004.
Shao, Jun, Rongxing Lu, and Zhenfu Cao. "A New Efficient Identification Scheme Based on the Strong Diffie-Hellman Assumption." In International Symposium on Future Software Technology., 2004.
O’Neill, Brendan. "A New Kind of Private War." Spiked-politics (2004).
Melese, Francois, James Blandin, and Sean O’Keefe. "A New Management Model for Government: Integrating Activity-Based Costing, the Balanced Scorecard and Total Quality Management." The International Public Management Review 5, no. 2 (2004): 103-130.
Klich, Bogdan. "The New National Security Strategy of Poland: Ready to Face the Challenges of the Twenty-First Century." Connections: The Quarterly Journal 3, no. 2 (2004): 9-13.
Brzoska, Michael. "‘New Wars’ Discourse in Germany." Journal of Peace Research 41, no. 1 (2004): 275-82.
Stewart, Keith G., P. Goillau, N. Verrall, M. Widdowson, and H. Clarke. Non-Technical Interoperability in Multinational Forces In 9th International Command and Control Research and Technology Symposium “The Power of Information Age Technologies. Copenhagen, 2004.
Giegerich, Bastain, and William Wallace. "Not Such a Soft Power: the External Deployment of European Forces." Survival 46, no. 2 (2004).
Kollár, Ján, Ladislav Samuelis, and Peter Rajchman. "Notes on the Experience of Transforming Distributed Learning Materials into SCORM Standard Specifications." Information & Security: An International Journal 14 (2004): 81-86.
Chan, Chao-Wen, and Chin-Chen Chang. "A Novel Lower Cost Crypto-Scheme Based on the Theory of Sharing Secrets." Information & Security: An International Journal 15, no. 1 (2004): 89-109.
Svete, Uroš. Novi izzivi za obramboslovje - obrambne in varnostne razsežnosti uporabe informacijske tehnologije., 2004.
Simpson, John. "The Nuclear Non-proliferation Regime: Back to the Future?" Disarmament Forum, no. 1 (2004).
Allison, Graham. Nuclear Terrorism: The Ultimate Preventable Catastrophe. New York: Times Books, 2004.
Garcia, Alessandro Fabricio. Objetos e Agentes: Uma Abordagem Orientada a Aspectos In Departamento de informática. Vol. Tese de doutorado. Rio de Janeiro: Pontifical Catholic University of Rio de Janeiro, 2004.
O’Sullivan, Christopher. "Observations on the Role of the United Nations in Iraq in the Coming Year." Connections: The Quarterly Journal 3, no. 4 (2004): 83-91.
OCB(2004)0054-REV2 120 17 May 2004: the approval document for the Financial Rules and Procedures approved by the NATO Budget Committee., 2004.
Simons, David. "Occupation for Hire: Private Military Companies and their Role in Iraq." RUSI Journal 149, no. 3 (2004): 71.
Brown, Michael E.. Offense, Defense, and War. Cambridge, MA: The MIT Press, 2004.

Pages