Biblio

Export 21402 results:
2007
The United Nations Approach to Security Sector/ System Reform (SSR) in Post-Conflict Peacebuilding: Review of Recent Experience of UN Integrated Missions in SSR Activities. Geneva: Geneva Centre for the Democratic Control of Armed Forces (DCAF), 2007.
Grozdev, Dobromir. "Unusual Water Level Decrease of Black Sea along the Bulgarian Black Sea Coastline." In Journal of National Oceanographic Commission., 2007.
The U.S. Army/Marine Corps Counterinsurgency Field Manual. Chicago: University of Chicago Press, 2007.
Kole, William. "U.S.: Defense Shield No Threat to Russia." Associated Press (2007).
Brown, Todd. "U.S. Provincial Reconstruction Teams in Afghanistan: Best Practices and Recommended Improvements." Connections: The Quarterly Journal 6, no. 4 (2007): 1-12.
Bilefsky, Dan, and Brian Knowlton. "U.S. Reaches out to a Europe that Has Yet to Emerge." International Herald Tribune (2007).
Boese, Wade. "U.S., Russia Exploring Post-START Options." Arms Control Today (2007).
Giacomo, Carol. U.S. to Let START Nuclear Treaty Expire. Reuters, 2007.
Koboseva, Alla, and Vitaliy Khoroshko. "The use of a weighted graph in modeling a terrorist network." Information Technology and Computer Engineering 3, no. 10 (2007): 61-67.
Rupert, Smith. The Utility of force: The Art of war in modern world. New York, 2007.
Leonard, Barbara, and Jerry Biberman. "Utilizing Multi‐dimensionality in the Workplace: A Meta‐study." Managerial Finance 33, no. 12 (2007): 935-946.
Polyakov, Leonid. "Various contributions." In Pro suverennuyu demokratiyu. Moscow: Evropa, 2007.
Tu, Shu-Fen, and Ching-Sheng Hsu. A VC-Based Copyright Protection Scheme for Digital Images of Multi-Authorship In World Congress on Engineering, WCE 2007. Vol. I. London, U.K., 2007.
Çetġnkaya, Orhan. Verifiability and Receipt-Freeness in Cryptographic Voting Systems In Graduate School Of Applied Mathematics. Vol. Doctor Of Philosophy In Cryptography. Middle east technical university, 2007.
Miessen, Markus. "The Violence of Participation: Spatial Practices beyond Models of Consensus." Springerin 1 (2007).
G., Weimann. "Virtual Terrorism: How Modern Terrorism Uses the Internet." Journal of International Security Affairs (2007).
Arsenov, Anton. Virtualnoto boino pole s kliuchova rolia v razlichni aspekti na voennoto obuchenie., 2007.
Powell, Valerie J. H., Christopher T. Davis, Randall S. Johnson, Peter Y. Wu, John C. Turchek, and Ian W. Parker. VLabNet: The Integrated Design of Hands-on Learning in Information Security and Networking. InfoSecCD, 2007.
"Voennaya Doktrina." Kazakhstanskaya Pravda (2007).
VTsIOM press release No. 674., 2007.
Waiting for al-Qaeda’s Next Bomb. The Economist, 2007.
Kanner, Michael D.. "War and Peace: Simulating Security Decision Making in the Classroom." PS: Political Science & Politics 40, no. 4 (2007): 795-800.
Stuttard, Dafydd, and Marcus Pinto. The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws., 2007.
Locatelli, Catherine, and Jean-Pierre Angelier. What Development for Gas in China. Laboratoire d’économie de la production et de l’intégration internationale, 2007.
Koppelman, Alex, and Mark Benjamin. What Happens to Private Contractors Who Kill Iraqis? Maybe Nothing. Salon.com, 2007.

Pages