Biblio

Export 21401 results:
2007
Y., Zhang, Egelman S., Cranor L., and Hong J.. Phinding Phish: Evaluating Anti-Phishing Tools In Proc. of 14th Annual Network & Distributed System Security Symposium (NDSS). California, USA, 2007.
PKI Cross-Certification Between CCEB Nations. Combined Communications-Electronics Board, 2007.
Tagarev, Todor, and Nickolay Pavlov. "Planning Measures and Capabilities for Protection of Critical Infrastructures." Information & Security: An International Journal 22 (2007): 38-48.
Aqacan, Hasan. "Please Clap, Misters." Express (2007).
Georgiev, Venelin. "Policies and Outlooks for the MOD activities on the field of Public-Private Partnerships ." Military Journal 14 (2007): 120-130.
Michnik, Adam. "The Polish Witch-Hunt." The New York Review of Books 54, no. 11 (2007).
Osipian, Ararat L.. Political Graft and Education Corruption in Ukraine: Compliance, Collusion, and Control. Nashville, TN: Vanderbilt University, 2007.
Subramanian, K.S.. Political Violence and the Police in India. New Delhi: Sage Publications, 2007.
Krastev, Ivan. "The Populist Moment." Critique & Humanism 23 (2007).
Cliteur, Paul. "The Postmodern Interpretation of Religious Terrorism." Free Inquiry 27, no. 2 (2007).
Leonard, Mark, and Nicu Popescu. A Power Audit of EU-Russia Relations. London: European Council on Foreign Relations, 2007.
Cetinkaya, Orhan, and Ali Doganaksoy. A Practical Verifiable e-Voting Protocol for Large Scale Elections over a Network In The Second International Conference on Availability, Reliability and Security (ARES'07). Vienna, Austria , 2007.
Nalbantov, Ilia. "Preface." In Methodology and scenarios for defense planning. Sofia: Ministry of Defence, Directorate "Defence Policy", Military Publishing House, 2007.
Boin, Arjen, and Allan McConnell. "Preparing for Critical Infrastructure Breakdowns – The Limits of Crisis Management and the Need for Resilience." Journal of Contingencies and Crisis Management 15, no. 1 (2007): 173-80.
Bassford, Christopher. "The Primacy of Policy and the ‘Trinity’ in Clausewitz’s Mature Thought ." In Clausewitz in the Twenty-First Century, 74-90. Hew Strachan and Andreas Herberg-Rothe ed. New York: Oxford University Press, 2007.
Berman, Sheri. The Primacy of Politics: Social Democracy and the Making of Europe’s Twentieth Century . Cambridge: Cambridge University Press, 2007.
Dhillon, Gurpreet. Principles of Information Systems Security: Text and Cases. New York: John Willey and Sons, 2007.
Prior Notification of a Concentration (Case COMP/M.4191 – État Français-Thalès/DCN). European Commission (ECom), 2007.
Privacy and Human Rights Report 2006: An International Survey of Privacy Laws and Developments . Washington, D.C.: Electronic Privacy Information Center (EPIC), 2007.
Rowland, Robin. Private Military Contractors Subject to the Rule of Law: Second World War Gonzoku Provide Precedent. CBC News, 2007.
Raghavan, Sudarsan, and Thomas E. Ricks. "Private Security Puts Diplomats, Military at Odds." Washington Post (2007): A1.
Löberbauer, H. The Privatized Military Industry from a postinternational perspective In Seminar Paper., 2007.
Problems of the Far East., 2007.
Bocheński, Szymon. "Proliferation Security Initiative: A New Formula for WMD Counter-Proliferation Efforts?" Connections: The Quarterly Journal 6, no. 4 (2007): 64-83.
National Science Advisory Board for Biosecurity. Proposed Framework for the Oversight of Dual-Use Life Sciences Research. Washington: NSABB, 2007.

Pages