Biblio

Export 21402 results:
2005
Universal Task List. Vol. version 2.1. Washington, D.C.: U.S: Department of Homeland Security, 2005.
Noone, Michael. "The U.S. Approach to Combating Trafficking in Women: Prosecuting Military Customers. Could it Be Exported?" Connections: The Quarterly Journal 4, no. 4 (2005): 81-89.
Romero, Simon, and Erin E. Arvedlund. "U.S. Court to Hear Arguments for Dismissal of Yukos Case." New York Times (2005).
U.S. Experience with Provincial Reconstruction Teams in Afghanistan: Lessons Identified In Special Report. U.S. Institute of Peace, 2005.
Kristensen, Hans. U.S. Nuclear Weapons in Europe: A Review of Post-Cold War Policy, Force Levels and War Planning. Washington, DC: Natural Resources Defense Council, 2005.
US Realignment and NATO Transformation: Implication for Southeast Europe and Greater Black Sea Area . Bucharest, 2005.
Bell, Michael A.. "Use Best Practices to Design Data Center Facilities." Gartner Research (2005).
Summers, Wayne, C Bhagyavati, and Carlos Martin. Using a Virtual Lab to Teach an Online Information Assurance Program. InfoSecCD'05, 2005.
Tobin, Jr, Donald L., and Michael S. Ware. Using A Windows Attack intRusion Emulator (AWARE) to Teach Computer Security Awareness. ITiCSE'05, 2005.
Lauren, M. K., J. M. Smith, J. Moffat, and N. D. Perry. Using the Fractal Attrition Equation to Construct a Metamodel of the Mana Cellular Automaton Combat Model In The Technical Cooperation Program, Joint Systems and Analysis Group., 2005.
Smith, Rupert. The Utility of Force: The Art of War in the Modern World. London: Penguin Books Ltd., 2005.
Akbarzadeh, Shahram. Uzbekistan and the United States: Authoritarianism, Islamism and Washington’s Security Agenda. London: Zed Books, 2005.
Buus, Stephanie, Lindy M. Newlove, and Eric K. Stern. Value Complexity in Crisis Management: The Lithuanian Transition., 2005.
Svete, Uroš. Varnost v Informacijski Družbi In Varnostne Študije. Ljubljana: Fakulteta za Družbene Vede, 2005.
Verkhovna Rada of Ukraine. Верховна Рада України, Законодавство України, 2005.
Jafalian, Annie. Vers une militarisation de la mer Caspienne? Le projet de la CASFOR. Fondation pour la Recherche Stratégique, 2005.
"Video Apparently Shows Basayev Planning Attack." Associated Press (2005).
Leitner, Lee J., and John W. Cane. A Virtual Laboratory Environment for Online IT Education. SIGITE'05, 2005.
Visa COI In Bundestag print., 2005.
Adelsbach, A., S. Gajek, and J. Schwenk. "Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures." Information Security Practice and Experience Springer-Verlag, LNCS, vol. 3469 (2005): 204-216.
Gilbert, John K.. Visualization in Science Education. The Netherlands: Springer, 2005.
Solana, Javier. "Vorwort." In Die Sicherheits- und Verteidigungspolitik der EU, 5-12, quote on p. 12. Paris: EU ISS, 2005.
Karapetyan, Asthig, and Gohar Poghosyan. Vow to Ararat. Abovyan City.com , 2005.
VTsIOM press release No. 268., 2005.
Lieber, Keir A., and Gerard Alexander. "Waiting for Balancing Why the World Is Not Pushing Back." International Security 30, no. 1 (2005): 111-12.

Pages