Biblio

Export 21377 results:
2008
Laumulin, M.. "Strategicheskie Aspekty Otnosheniy Kazakhstana s Zapadom: SSha, NATO." In Kazakhsta v Sovremennom Mire: Realii I Perspektivy. Almaty: KISI, 2008.
Yarger, Harry R.. Strategy and the National Security Professional:Strategic Thinking and Strategy Formulation in the 21st Century. Westport, Connecticut: Praeger Security International, 2008.
Serbia, Republic of. Strategy for Development of the Information Society in the Republic of Serbia till 2020 (in Serbian language)., 2008.
Aggour, Lora S.. "The Strategy of Containment." Fightingр Terrorism; Strategic 7, no. 4 (2008).
Strengthening the Hydrometeorological Services in South Eastern Europe: South Eastern Europe Disaster Risk Mitigation and Adaptation Programme. ISDR, WMO, WB, 2008.
Arsenault, Amelia H., and Manuel Castells. "The Structure and Dynamics of Global Multi-Media Business Networks." International Journal of Communication 2 (2008): 707-48.
Office, U.S. Department. Structure of the U.S. Education System: Master’s Degrees., 2008.
The Structure, Role and Mandate of Civil Protection in Disaster Risk Reduction for South Eastern Europe. ISDR, WB, 2008.
The Structure, Role and Mandate of Civil Protection in Disaster Risk Reduction for South Eastern Europe. UNISDIR, World Bank and others, 2008.
Munir, Muhammad. "Suicide Attacks and Islamic Law." International Review of the Red Cross (2008): 39:869 .
Jakštaitė, Gerda. Sulaikymo Ir Įtraukimo Strategijos Šiuolaikinėje Jav Politikoje In Politikos Mokslų Ir Diplomatijos Institutas, Politologijos Katedra. Vol. Magistro baigiamasis darbas. Kaunas: Vytauto didžiojo universitetas, 2008.
Carneiro, G., N. Vasconcelos, P.J. Moreno, and A.B. Chan. "Supervised Learning of Semantic Classes for Image Annotation and Retrieval." IEEE Transactions on Pattern Analysis and Machine Intelligence 29, no. 3 (2008).
Williams, Zachary, Jason E. Lueg, and Stephen A. LeMay. "Supply Chain Security: An Overview and Research Agenda." The International Journal of Logistics Management 19, no. 2 (2008): 254-81.
Odierno, Raymond T.. The Surge in Iraq: One Year Later In Lecture #1068 on National Security and Defense. Heritage Foundation, 2008.
Mehsud, Hakeem Ullah. Taliban Vows to Take over Pakistan. ZeeNews.com, 2008.
Benbow, Tim. "Talking ‘Bout Our Generation? Assessing the Concept of Fourth-Generation Warfare." Comparative Strategy 27, no. 2 (2008): 148-163.
Hu, Dong, and YuYan Wang. Teaching Computer Security using Xen in a Virtual Environment. ISA, 2008.
Graesser, Arthur, and Brandon King. "Technology-based training." In Human Behavior in Military Contexts. National Academies Press, 2008.
Lubis, Fetty Fitiyanti. Teknik Video Digital Watermarking sebagai Proteksi Hak Cipta pada Distribusi Konten Multimedia In Desain Komunikasi Visual, Fakultas Industri Kreatif. Universitas Telkom, 2008.
Telelogic System Architect., 2008.
Smith, James M., and Brent J. Talbot. "Terrorism and Deterrence by Denial." In Terrorism and Homeland Security – Thinking Strategically about Policy. London: CRC Press, 2008.
Kayaoglu, Mustafa. Terrorism and strain: An exploratory analysis of the impact that individual strain and negative affect have on violent behavior among trained Turkish Hezbollah members. Vol. Doctor of Philosophy. University of North Texas, 2008.
Stepanova, Ekaterina. Terrorism in Asymmetrical Conflict: Ideological and Structural Aspects In SIPRI Research Report. Stockholm/Oxford: SIPRI/Oxford University Press, 2008.
Chen, Hsinchun, Edna Reid, Joshua Sinai, Andrew Silke, and Boaz Ganor. Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security. New York: Springer, 2008.
Delgado, Isabel Lirola. "Terrorismo Y Cooperación Penal: ¿Un Contexto Más Favorable Para Los Derechos Humanos En Las Relaciones Transatlánticas?" (2008).

Pages