Biblio

Export 21382 results:
2005
Pantev, Plamen, Todor Tagarev, Valeri Ratchev, and Viara Zaprianova. Civil-Military Relations and Democratic Control of the Security Sector. Sofia: Procon, 2005.
Szlafsztein, Claudio F.. "Climate Change, Sea-level Rise and Coastal Natural Hazards: A GIS-based Vulnerability Assessment, State of Para, Brazil." In Interna¬tional Workshop on Human Security and Climate Change. Oslo, 2005.
Diamond, Jared. Collapse: How Societies Choose to Fail or Succeed. New York: Penguin Books, 2005.
Markov, Sergey. A colored revolution is a new type of political technology that aims to change political power (in Russian)., 2005.
Krawchuk, Fred. Combating Terrorism: A Joint/Interagency Approach . Washington, D.C.: AUSA, January, 2005.
Schreier, Fred R.. "Combating Terrorism and Its Implications for Intelligence." In Combating Terrorism and Its Implications for the Security Sector, 129-166. Stockholm: Swedish National Defence College, 2005.
Perl, Raphael. Combating Terrorism: The Challenge of Measuring Effectiveness. Washington, D.C.: Congressional Research Service, 2005.
Ayissi, Anatole, and Ibahima Sall. Combating the Proliferation of Small Arms and Light Weapons in West Africa: Handbook for the Training of Armed and Security Forces. United Nations Institute for Disarmament Research, 2005.
Jones, Gen.. Comments by Gen. Jones at NATO Parliamentary Assembly meetings. Copenhagen, 2005.
Zaslavsky, Volodymyr, Eduard Nenakhov, and Anna Strizhak. "Commercial Bank’s Credit Risk Optimization." Teoriya optimalnykh reshenij 4 (2005): 120-126.
Shalamanov, Velizar, Goran Johnson, and Georgi Kirov. "Commercial Information Technology for Military Operations: Information Sharing and Communication Security in Ad-Hoc Coalitions." Information & Security: An International Journal 16 (2005): 119-127.
Committee’s website., 2005.
Yavagal, Deepak S., Seok Won Lee, Gail-Joon Ahn, and Robin A. Gandhi. Common Criteria Requirements Modeling and its Uses for Quality of Information Assurance (QoIA) In 43rd Annual ACM Southeast Conference ACMSE ’05 . Vol. 2. Kennesaw, Georgia, 2005, 2005.
Communication and Information Services for National Security and Public Safety, White Paper., 2005.
Dunn, Myriam. "A Comparative Analysis of Cybersecurity Initiatives Worldwide." In WSIS Thematic Meeting on Cybersecurity. Geneva, 2005.
Martin, Alvin. Comparative study of information fusion methods for sonar images classification In The Eighth International Conference on Information Fusion. Philadelphia, USA, 2005.
Ghedira, Chirine, Zakaria Maamar, and Djamal Benslimane. "On Composing Web Services for Coalition Operations." Information & Security: An International Journal 16 (2005): 79-92.
The Comprehensive Approach: Joint Discussion Note 4/05. British Ministry of Defence, 2005.
A Comprehensive Strategy to Eliminate Future Sexual Exploitation and Abuse in United Nations Peacekeeping Operations. UN General Assembly, 2005.
Comprehensive strategy to eliminate future sexual exploitation and abuse in United Nations peacekeeping operations. United Nations General Assembly, 2005.
Fosnock, Craig. Computer Worms: Past, Present, and Future CISSP. Carolina University, 2005.
Shalamanov, Velizar. Concept Development and Experimentation: Academic Support to Security Sector Transformation In SMi NATO Enlargement Conference. Sofia, Bulgaria, 2005.
Garstka, John J.. The Concept of Transformation, Its Reflection to the Political and Military NATO Structures and Some Aspects of the Reform., 2005.
Chernykh, Irina, and Rustam Burnashev. "Conditions for Securitization of International Terrorism in Central Asia." Connections: The Quarterly Journal 4, no. 1 (2005): 131-142.
van Ooyen, E, and R Schukking. Conflicten in de voormalige Sovjetunie In Opleiding Europese Studies. Amsterdam: Universiteit van Amsterdam, 2005.

Pages