Biblio

Export 21402 results:
2006
Hope, Kerin. Russia to Discuss Gazprom Role in Aegean Pipeline. FT.com, 2006.
"Russia Turns up the Gas." Guardian Weekly (2006): 41.
Smedley, Mark, and Mitchell Ritchie. "Russia, Ukraine Settle Gas Pricing Dispute." Oil Daily (2006): 1.
Monaghan, Andrew. "Russia-EU Relations: An Emerging Energy Security Dilemma." Pro et Contra 10, no. 2 (2006).
Dagestan, press officer of. Russian Federation., 2006.
Reed, Ed. "Russian Gas Prices to Rise." FSU Oil & Gas Monitor (2006): 2.
Mufson, Steven. "Russian Oil Firm IPO Ends Early." The Washington Post (2006): D5.
Buck, Tobias, and Neil Buckley. "Russian Parliament Vote Backs Gazprom Export Monopoly." Financial Times (2006): 8.
Ermarth, Fritz W.. Russian Strategic Culture: Past, Present, and… in Transition?. Advanced Systems and Concepts Office of the Defense Threat Reduction Agency, 2006.
Ferguson, Joseph P.. "Russian Strategic Thinking Towards Central, South, and Southeast Asia." In Russian Strategic Thought Towards Asia, 207. New York: Palgrave Macmillan, 2006.
Schmitt, Michael N., Charles H. B. Garraway, and Yoram Dinstein. The San Remo Manual on the Law of Non-International Armed Conflict: With Commentary . San Remo: International Institute of Humanitarian Law, 2006.
Anand, S.. Sarbanes-Oxley Guide for Finance and Information Technology Professionals. Wiley, 2006.
A., Horne. A Savage War of Peace: Algeria 1954-1962. NYRB, 2006.
Bot, Bernard. Saving Democracy in a World of Change. Washington, D.C: Georgetown University, 2006.
Wilson, Ian, and Bill Ralston. Scenario Planning Handbook: Developing Strategies in Uncertain Times. Mason, OH: Thomson South-Western, 2006.
SCO Needs Military to Fight Regional Terrorist Threat–Official., 2006.
Scheffer, Jaap de Hoop. Secretary-General of NATO, speech at the 42nd Munich Security Conference., 2006.
Chen, Tzung-Her, Du-Shiau Tsai, and Gwoboa Horng. "Secure User-Friendly Remote Authentication Schemes." Information & Security: An International Journal 18 (2006): 111-121.
Ivanova, Petya. "Securing Cyberspace." Information & Security: An International Journal 18 (2006): 5-10.
Karacasulu, Nilufer. "Security and Globalization in the Context of International Terrorism." Review of International Law and Politics 2, no. 5 (2006): 1-17.
Dowd, Mark, and John McDonald. "Security Assessment: Identifying and Preventing Software Vulnerabilities." (2006).
Duan, Xiaoyi, JianWei Liu, and Qishan Zhang. "Security Improvement on Chien Et al.’s Remote User Authentication Scheme Using Smart Cards." In The 2006 IEEE International Conference on Computational Intelligence and Security (CIS 2006) 2., 2006.
Coaffee, Jon, and David Murakami Wood. "Security is Coming Home: Rethinking Scale and Constructing Resilience in the Global Urban Response to Terrorist Risk." International Relations 20, no. 4 (2006): 503-517.
Dang, Tran Khanh. "Security Protocols for Outsourcing Database Services." Information & Security: An International Journal 18 (2006): 85-108.
Tagarev, Todor. Security sector budgeting: main issues and good practices In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2006.

Pages