Biblio
Export 21441 results:
Under Cover of Ineptitude." The New York Times (2010).
"Understanding and Managing Threats to the Environment in South Eastern Europe. Dordrecht: Springer, 2010.
Understanding Peacekeeping. Cambridge: Polity Press, 2010.
Unintended Strategic Consequences of Security Assistance in the South Caucasus." Joint Force Quarterly (2010): 24-28.
"United Nations Under-Secretary General for Peacekeeping Operations. Tokyo: United Nations University Press, 2010.
Unlocking the Performance of the Chief Information Officer (CIO)." California Management Review 52, no. 4 (2010): 5.
"An update research on credit card on-line transactions." International Journal of Economic Development Research and Investment 1, no. 2 & 3 (2010).
"Uprising Worsens Kyrgyzstan Economic Woes. BBC News, 2010.
"Urgent Problems and the Logic of Military Reform." Russian Politics and Law 48, no. 3 (2010): 59.
U.S. Cybersecurity Policy and the Role of U.S. CYBERCOM In CSIS Cybersecurity Policy Debate Series., 2010.
U.S. Department of Defense Quadrennial Defense Review. Washington, D.C.: U.S. Department of Defense, 2010.
U.S., Poland Amend Missile-Defense Plan." Wall Street Journal (2010).
"U.S. Strategic Interests in the Arctic." Center for Strategic & International Studies (2010).
"The Use of Undercover Military Units in Counter-Terrorist Operations: A Historical Analysis with Reference to Contemporary Anti-terrorism." Small Wars and Insurgencies 21, no. 4 (2010): 561-90.
"Using Small Models for Big Issues: Exploratory System Dynamics Modelling and Analysis for Insightful Crisis Management In 18th International Conference of the System Dynamics Society. Seoul, Korea, 2010.
Using Strategic Planning in Support of Defense Acquisitions." Information & Security: An International Journal 25 (2010): 57-77.
" Utilisation of Surplus Equipment and Infrastructure." In Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices, 124-136. Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2010.
"Utility-based channel assignment and topology control in wireless mesh networks." In 2010 IEEE International Symposium on A World of Wireless, Mobile and Multimedia Net¬works (WoWMoM). Montreal, 2010.
"Verification and Validation Strategy for Precisely Drag Estimation of ERCOFTAC Test Body In Black Sea’2010. Varna: University publishing house, Technical University, 2010.
The View from Kosovo: Challenges to Peace-building and State-building." Connections: The Quarterly Journal 9, no. 3 (2010): 89-94.
"Virtual attacks and the problem of responsibility: the case of China and Russia." Carta Internacional 5, no. 2 (2010).
"Virtual Lab for Information Assurance Education. CISSE, 2010.