Biblio

Export 21353 results:
2005
Speckhard, Anne, and Khapta Akhmedova. "Talking to Terrorists." Journal of Psychohistory (2005): 125-56.
Walt, Stephen. Taming American Power: The Global Response to U.S. Primacy. New York: W. W. Norton, 2005.
Cilinskas, Kestutis. 'Teisės viršenybės principo įgyvendinimo problemos’; renginys tarptautinei žmogaus teisių dienai paminėti., 2005.
Pollard, Craig. "Telecom Fraud: The Cost of Doing Nothing Just Went Up." Network Security 2005, no. 2 (2005): 17-19.
Graschew, Georgi, Peter M. Schlag, Theo A. Roelofs, Stefan Rakowsky, Wolfgang Düsel, Uwe Müller, and Andreas Lieber. "Telemedical Services for Disaster Emergencies." Information & Security: An International Journal 16 (2005): 62-76.
Elden, Stuart. "Territorial Integrity and the War on Terror." Environment and Planning 37, no. 12 (2005).
Arasly, Jangir. "Terrorism and Civil Aviation Security: Problems and Trends." Connections: The Quarterly Journal 4, no. 1 (2005): 75-89.
"Terrorism and the Emergence of New Threats." In NATO Handbook., 2005.
Simon, Steven, and Jeff Martini. "Terrorism: Denying Al Qaeda Its Popular Support." The Washington Quarterly 28, no. 1 (2005).
Serafim, Ana. "Terrorism—A Cultural Phenomenon?" Connections: The Quarterly Journal 4, no. 1 (2005): 61-74.
Weiss, Martin A.. Terrorist Financing: The 9/11 Commission Recommendation In CRS Report for Congress. Washington, D.C.: Congressional Research Service, 2005.
Bell, Stewart. Terrorist Returns: Tory Urges Ottawa to Consider Revoking Citizenship. National Post, 2005.
The Terrorist’s Handbook., 2005.
Katz, Gregory. "Terrorists said to be getting aid in the Balkans: Crime gangs that control the smuggling routes are making their infiltration easier." Houston Chronicle (2005).
WESSELS, WOLFGANG. Theoretical Perspectives. CFSP beyond the Supranational and Intergovernmental Dichotomy., 2005.
Kanter, Ido, and Wolfgang Kinzel. "The Theory of Neural Networks and Cryptography." Quantum Computers and Computing 5, no. 1 (2005): 130-140.
Howard, Russell D.. "Thinking Creatively in the War on Terrorism – Leveraging NATO and the Partnership for Peace Consortium." Connections: The Quarterly Journal 4, no. 1 (2005): 1-8.
Adli, A., and Z. Nakao. Three steganography algorithms for midi files In 2005 International Conference on Machine Learning and Cybernetics. Vol. 4. Guangzhou, China, 2005.
Martorella, M.. "Time Windowing for highly focused ISAR Image Reconstruction." IEEE Trans. on Aerospace and Electronic System 41, no. 3 (2005): 992-1007.
Heitmeyer, Constance, Myla Archer, Ramesh Bharadwaj, and Ralph Jeffords. "Tools for Constructing Requirements Specifications: The SCR Toolset at the Age of Ten." Computer Systems Science & Engineering 20, no. 1 (2005): 19-35.
Faupin, Alain. "Towards a Trans-Mediterranean Partnership for Peace?" Connections: The Quarterly Journal 4, no. 2 (2005): 9-14.
von Laszewski, Gregor, Beulah Alunkal, and Ivana Veljkovic. "Towards reputable grids." Scalable Computing: Practice and Experience 6, no. 3 (2005).
Borelli, John. "Tracing the Contemporary Roots of Interreligious Dialogue." In Jesuit Interreligious Dialogue and Relations., 2005.
Kim, Yong-Shik, and Keum-Shik Hong. "A tracking algorithm for autonomous navigation of AGVs in an automated container terminal." Journal of Mechanical Science and Technology 19, no. 1 (2005).
Trafficking in Persons Report . U.S. Department of State, 2005.

Pages