Biblio
Export 21402 results:
"Kuda Idyot Voyennyi Flot." Vlast (2008).
The Kurdish Issue: Can the AK Party Escape Securitization?" Insight Turkey 10, no. 3 (2008).
"Kyrgyzstan and Russia: Security, Cooperation and Development Perspectives in the Central Asian Region. Eurasian Home, 2008.
Kyrgyzstan and Russia: Security, Cooperation and Future Perspectives In Historical Perspectives Fund., 2008.
Large-Scale Fighting Erupts in South Ossetia. GlobalSecurity.org, Radio Free Europe/Radio Liberty, 2008.
Law No. 10023, dated 27.11.2008, “The Criminal Code of the Republic of Albania”. On some additions and amendments to the Law No.7895, dated 27.1.1995 ed., 2008.
Law No. 10054, dated 29.12.2008, “Criminal Procedure Code of the Republic of Albania”. On some additions and amendments to the Law No.7905, dated 21.3.1995 ed., 2008.
Law No. 9859, dated 21.1.2008 “The Criminal Code of the Republic of Albania”. On some additions and amendments to the Law No.7895, dated 27.1.1995 ed., 2008.
The Law of Georgia on Occupied Territories. Official site of the Office of the State Minister of Georgia for Reconciliation and Civic Equality, 2008.
The Law on Electronic Document of Republic of Srpska. Official Gazette of Republic of Srpska, 110/08, 2008.
The Law on Electronic Signature of Republic of Srpska. Official Gazette of Republic of Srpska, 59/08, 2008.
The Law on Protection of Classified Information. Official Gazette of Montenegro, no 14/08, 2008.
The Law on the Utilization of the Units of Armed Forces of Montenegro in International Forces and Participation of the Members of Civil Protection, Police and Other Employees in the State Authorities in Peace-keeping Missions and Other Activities Abroad. Official Gazette of Montenegro, no. 61, 2008.
Leaderless Jihad: Terror Networks in the Twenty-First Century. Philadelphia: University of Pennsylvania Press, 2008.
Learning as we go: the US army adapts to counterinsurgency in Iraq, July 2004–December 2006." Small Wars & Insurgencies 19, no. 3 (2008): 303-27.
"Legal Basis of the National Security and Defence Policy In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2008.
Les tendances de l’opinion suisse en matière de politique extérieure, de politique de sécurité et de défense, Principaux résultats. Zürich: ETH/VBS, 2008.
Lest We Remember: Cold Boot Attacks on Encryption Keys. 2008 USENIX Security Symposium, 2008.
Liberalizing Autocracies in the Gulf Region? Reform Strategies in the Face of a Cultural-Economic Syndrome." World Development 36, no. 12 (2008): 2586-2604.
"Like a Phoenix from the Ashes: The Reinvention of Critical Infrastructure Protection as Distributed Security." In Securing the homeland. London: Routledge, 2008.
"Long Time Coming: The Prospects for Democracy in China." Foreign Affairs 87, no. 15 (2008).
"Longman’s Dictionary of Contemporary English. New York: Longman, 2008.