Biblio

Export 21401 results:
2009
Clarke, Richard A.. War from Cyberspace In The National Interest., 2009.
Cutts, Andrew. "Warfare and the Continuum of Cyber Risks: A Policy Perspective." In The Virtual Battlefield: Perspectives on Cyber Warfare, 69. Amsterdam: IOS Press, 2009.
Dean, Cornelia. "Water: A Change in Tone." New York Times (2009).
Water resources across Europe – confronting water scarcity and drought In Technical report. European Environment Agency (EEA, 2009), 2009.
Guo, Jing-Ming, Min-Feng Wu, and Yong-Chuen Kang. "Watermarking in conjugate ordered dither block truncation coding images." In IEEE International Symposium on Circuits and Systems. Taipei, Taiwan , 2009.
Hoffman, Maj. Randall S.. The Way Ahead: Reclaiming the Pashtun Tribes through Joint Tribal Engagement in Applications in Operational Culture. Quantico, VA: Marine Corps University Press, 2009.
Kamp, Karl-Heinz. The Way to NATO’s New Strategic Concept In NATO Defense College Research. Rome: NATO Defense College, 2009.
Giragosian, Richard. Weathering the Storm: A Commentary on Armenia and the Economics of Power. ArmeniaNow.com, 2009.
Giragosian, Richard. Weathering the Storm: A Commentary on Armenia and the Global Economic Crisis. ArmeniaNow.com, 2009.
Chakarov, Angel. "Welcoming Address." Information & Security: An International Journal 24 (2009): 9-10.
Haider, Abrar. What Happens After the Click? Role of Internet Information in Shaping Democratic Values In AMCIS 2009. Vol. Paper 377., 2009.
What is Transitional Justice?. International Center for Truth and Justice (ICTJ), 2009.
Yap, Gerald T.. When is a Hack an Attack? A Sovereign States Options if Attacked in Cyberspace: A Case Study of Estonia 2007 In Research Report. Alabama: Air Command And Staff College Air University Maxwell Air Force Base, 2009.
de Dardel, Jean-Jacques. Whither the Euro-Atlantic Partnership? Partnership and NATO’s New Strategic Concept In GCSP Geneva Papers. Vol. 10. Geneva: Geneva Centre for Security Policy, 2009.
Eriksson, Johan, Giampiero Giacomello, Hamoud Salhi, Myriam Dunn Cavelty, J. P. Singh, and M. I. Franklin. "Who Controls the Internet? Beyond the Obstinacy or Obsolescence of the State." International Studies Review 11, no. 1 (2009): 205-230 .
Byers, Michael. Who Owns the Arctic: Understanding Sovereignty Disputes in the North. Vancouver: Douglas & McIntyre, 2009.
Law, David. "Who’s Who Intergovernmentally in SSR." Developing a Security Sector Re¬form (SSR) Concept for the United Nations (2009): 23-25.
Piontkovsky, Andrei. Who’s Who on Putin’s Payroll?. Project Syndicate, 2009.
Haji-Yousefi, Amir M.. "Whose Agenda Is Served by the Idea of a Shia Crescent?" Alternatives: Turkish Journal of International Relations 8, no. 1 (2009): 114-35.
Ma, Maode, Yan Zhang, and Mieso K. Denko. Wireless Quality of Service : Techniques, Standards, and Applications. Boca Raton: Auerbach Publications, 2009.
Bergmans, H., M. Bökkerink, P. Van Erve, Van de Leu, D. Wijnmalen, V. Veldheer, E. Pruyt, L. Janssen, and Van der Horst. Working with Scenarios, Risk Assessment and Capabilities in the National Safety and Security Strategy of the Netherlands In The Hague: Landelijk Operationeel Coördinatiecentrum., 2009.
The World Factbook . Washington, D.C.: Central Intelligence Agency, 2009.
Brody, Reed. The World Needs Spain’s Universal Jurisdiction Law. Human Rights Watch, 2009.
Seigneurie, Ken. "The Wrench and the Ratchet: Cultural Mediation in a Contemporary Liberation Struggle." Public Culture 21, no. 2 (2009): 377-402.
Written Answers In Questions by Lord Patten on Cybersecurity. UK Parliament, 2009.

Pages