Biblio

Export 21401 results:
2005
Stanicic, Mladen. "Post-Conflict Rehabilitation: From Aid to Development." Connections: The Quarterly Journal 4, no. 2 (2005): 99-105.
Nesser, Petter. "Post-millennium Patterns of Jihadist Terrorism in Western Europe–Part 1." Jane’s Terrorism and Security Monitor (2005).
Froltsov, Vladislav V.. "The Post-Soviet Puzzle and Western Democracies." Connections: The Quarterly Journal 4, no. 4 (2005): 91-111.
Judt, Tony. Postwar: A History of Europe Since 1945 . London: Heinemann, 2005.
Collier, Michael W.. "A Pragmatic Approach to Developing Intelligence Analysts." Defense Intelligence Journal, Joint Military Intelligence College Foundation 14, no. 2 (2005).
Press conference on results of U.S.-Russian talks. Vol. 25 March 2005. Official website of the President of Russia, 2005.
Prevention, preparedness and response to terrorist attacks In Official Journal C 14., 2005.
Remic, Lea. Primerjava obrambnih sistemov Republike Bolgarije in Republike Romunije In Fakulteta za družbene vede. Vol. diplomsko delo. Ljubljana: Univerza v Ljubljani, 2005.
Waltermire, Bradley J.. Princes, Priests, and People is Saudi Arabia the Next Iran. Monterey, California: Naval Postgraduate School, 2005.
Dang, Tran Khanh. "Privacy-Preserving Basic Operations on Outsourced Search Trees." In International Workshop on Privacy Data Management – PDM05, in conjunction with ICDE05, IEEE Computer Society. Tokyo, Japan, 2005.
Günther, Philipp. Private Military Companies als neuer internationaler Akteur. Vol. Diploma Thesis. University of Cologne, 2005.
Holmqvist, Caroline. Private Security Companies: The Case for Regulation In SIPRI Policy Paper. Stockholm: SIPRI, 2005.
Moller, Bjorn. Privatisation of Conflict, Security and War In DIIS Working Paper. Copenhagen: Danish Institute For International Studies, 2005.
Schreier, Fred, and Marina Caparini. Privatising Security: Law, Practice and Governance of Private Military and Security Companies. Geneva: DCAF, 2005.
Vlachová, Marie. "The problem. Trafficking in Humans: The Slavery of Our Age." Connections: The Quarterly Journal 4, no. 4 (2005): 1-16.
Marsh, David. Project D3 – CLIL Matrix In Central Workshop. Graz: European Centre for Modern Languages, 2005.
Heldman, Kim. Project Manager’s Spotlight on Risk Management. Alameda, CA: SYBEX, 2005.
Edmunds, Bryan D.. Project Portfolio Management: An Investigation of One Air Force Product Center. Air Force Institute of Technology, 2005.
Winner, Andrew C.. "The Proliferation Security Initiative: The New Face of Interdiction." The Washington Quarterly 28, no. 2 (2005): 130.
Umarov, Adiljon, and Dmitry Pashkun. "The Prospects for Chinese Influence in Central Asia." CEF Quarterly–The Journal of the China-Eurasia Forum (2005).
Wen, H. A., Tian-Fu Lee, and Tzonelih Hwang. "Provably Secure Three-party Password-based Authenticated Key Exchange Protocol Using Weil Pairing." IEE Proceedings Communication 152, no. 2 (2005).
Villanueva, Benjamin, and Brett Cook. Providing Students 24/7 Virtual Access and Hands-On Training Using VMWare GSX Server. SIGUCCS'05, 2005.
Chang, Ming-Hsin. On Proxy Signatures with Forward-Secure and One-time Properties and their Applications in PKI In Department of Computer Science and Information Engineering, College of Electrical Engineering and Computer Science. Vol. Doctor of Philosophy in Computer Science and Information Engineering. Hsinchu, Taiwan, Republic of China: National Chiao Tung University, 2005.
PSI Frequently Asked Questions. U.S. Department of State, 2005.
Hidayat, Komaruddin. "Psikologi Terorisme." Kompas (2005).

Pages