Biblio

Export 21377 results:
2008
Fenster, Mark. Conspiracy Theories: Secrecy and Power in American Culture. Minneapolis, MN: University of Minnesota Press, 2008.
Constitution of the Italian Republic. Senato della Repubblica, 2008.
Constitutional Court of Saxony., 2008.
Reid-Martinez, Kathaleen, Linda Grooms, and Mihai Bocarnea. "Constructivism in Online Distance Education." In Encyclopedia of Information Science and Technology. Second ed. Hersey: IGI Global Publishing, 2008.
Salem, Arab, Edna Reid, and Hsinchun Chen. "Content Analysis of Jihadi Extremist Groups’ Videos." In Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security, 267-284. New York: Springer, 2008.
Daniel, Milan. Contribution of DSm Approach to the Belief Function Theory In IPMU 2008 : 12th International Conference Information Processing and Management of Uncertainty for Knowledge-Based Systems. Malaga, Spain, 2008.
Hennin, Simon. Control System Cyber Incident Reporting Protocol In IEEE International Conference on Technologies for Homeland Security. Waltham, MA, 2008.
Hemming, Jon. Corruption Holds Back Afghan Army Expansion. Reuters, 2008.
Osipian, Ararat. "Corruption of the Politicized University: Lessons from the Orange Revolution in Ukraine." In 100th Annual Meeting of the American Sociological Association (ASA). Philadelphia, PA, 2008.
Powers, Rod. The Cost of War. USMilitary.com, 2008.
"Council Directive 2008/114/EC of 8 December 2008 on the Identification and Designation of European Critical Infrastructures and the Assessment of the Need to Improve Their Protection." Official Journal L 345 (2008): 75-82.
"Council Directive 2008/114/EC of 8 December 2008 on the identification and designation of European critical infrastructures and the assessment of the need to improve their protection." Official Journal L 345 (2008): 75-82.
Council Directive on the Identification and Designation of European Critical infrastructures and the Assessment of the Need to Improve their Protection. Council of the EU, 2008.
Countering Piracy off the Horn of Africa: Partnership and Action Plan. Washington D.C.: National Security Council, 2008.
J.Thomas, Biersteker, and Sue E. Eckert. Countering the Financing of Terrorism. New York: Routledge, 2008.
Jones, Seth G.. Counterinsurgency in Afghanistan . Santa Monica: CA: RAND Corporation , 2008.
Pirnie, Bruce R., and Edward O’Connel. Counterinsurgency in Iraq (2003–2006). Santa Monica, CA: Rand Corporation, 2008.
Philipp, Fluri, and Viorel Cibotaru. "Country Study – Armenia." In Defence Institution Building: Country Profiles and Needs Assessments for Armenia, Azerbaijan, Georgia and Moldova – Background Materials, 26. Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2008.
Cavelty, Myriam Dunn. Critical Information Infrastructure Protection, Overview. ETH Zurich, Switzerland.: Center for Security Studies (CSS), 2008.
Yoon, Eun-Jun, Ein-Jung Lee, and Kee-Young Yoo. Cryptanalysis of Wang et al.’s Remote User Authentication Scheme Using Smart Cards In 5th International Conference on Information Technology: New Generations., 2008.
Shih, Hsi-Chang. Cryptanalysis on Two Password Authentication Schemes In Laboratory of Cryptography and Information Security. Vol. Master's Thesis. Taiwan: National Central University, 2008.
Tikk, Eneken. Cyber Attacks Against Georgia: Legal Lessons Identified. Tallinn, Estonia : Cooperative Cyber Defense Center of Excellence, 2008.
Cyber Security Strategy 2008. Ministry of Defence, 2008.
Geers, Kenneth. "Cyberspace and the Changing Nature of Warfare." SC Magazine (2008).
Frydrych, Eunika Katarzyna. "The Debate on NATO Expansion." Connections: The Quarterly Journal 7, no. 4 (2008): 1-42.

Pages