Biblio

Export 21337 results:
2005
How the Andijan Killings Unfolded. BBC News, 2005.
How The Army Runs: A Senior Leader Reference Handbook. 25th ed. Carlisle Barracks, PA: U.S. Army War College, 2005.
Ebadi, Shirin, and Hadi Ghaemi. "The Human Rights Case Against Attacking Iran." New York Times (2005).
Law, David M.. Human Security and Security Sector Reform: Contrasts and Commonalities. Sicherheit und Frieden, 2005.
Allred, Keith J.. "Human Trafficking: Breaking the Military Link." Connections: The Quarterly Journal 4, no. 4 (2005): 63-72.
Vreja, Lucia Ovidia. "Human Trafficking in South Eastern Europe." Connections: The Quarterly Journal 4, no. 4 (2005): 49-62.
Schmitt, Michael N.. "Humanitarian Law and Direct Participation in Hostilities by Private Contractors or Civilian Employees." Chicago Journal of International Law 5 (2005): 511-46.
Hyogo Framework for Action 2005-2015: Building the Resilience of Nations and Communities to Disasters In United Nations International Strategy for Disaster Reduction., 2005.
Grattan, Michelle. "I Must Preach Holy War, Says Teacher." The Age (Australia) (2005).
Mobekk, Eirin. Identifying Lessons in United Nations International Policing Missions In DCAF Policy Paper. Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2005.
Aldis, Anne, and Graeme P. Herd. The Ideological War on Terror: Worldwide Strategies for Counter-Terrorism. London: Routledge, 2005.
Kessler, Glenn. "If Hamas Participates, Sharon Says Israel Won’t Aid Palestinian Elections." Washington Post (2005).
Liu, Dang-hui, Lan-sun Shen, and Kin-man Lam. Image synthesis and face recognition based on 3d face model and illumination model In Proceedings of the First international conference on Advances in Natural Computation. Vol. Part II (ICNC’05). Springer-Verlag, 2005.
Ku, Wei-Chi, and Shen-Tien Chang. "Impersonation Attack on a Dynamic ID-Based Remote User Authentication Scheme Using Smart Cards." IEICE Transactions on communications E88, no. B(5) (2005).
Salembier, Robert G., and Paul Southerington. "An Implementation of the AKS Primality Test." IEEE (2005).
Georgiev, Venelin. "Implementing the Defence Programs of the Ministry of Defence for the 2006-2011 Period – Risk Assessment." Military Journal (2005).
Luo, Xiangyang, Bin Liu, and Fenlin Liu. "Improved RS Method for Detection of LSB Steganography." Computational Science and Its Applications – ICCSA 2005 (2005): Part II.
Fischer, Kristian, and Jan Top Christensen. "Improving Civil-Military Cooperation the Danish Way." NATO Review (2005).
Mancini, Francesco. In Good Company? The Role of Business in Security Sector Reform. London: Demos, 2005.
Annan, Secretary-General Kofi. In Larger Freedom: Towards Development, Security and Human Rights for All., 2005.
Bichsel, Christine. "In Search of Harmony: Repairing Infrastructure and Social Relations in the Ferghana Valley,." Central Asian Survey 24, no. 1 (2005): 53-66.
Solomon, Zehava, and Avital Laufer. "In the Shadow of Terror: Changes in World Assumptions in Israeli Youth." Journal of Aggression, Maltreatment & Trauma 9, no. 3-4 (2005): 353-364.
Hovorka, D.S., and K.R. Larsen. "Increasing Absorptive Capacity through Strategic use of Network Organizations." In 11th Americas Conference on Information Systems AMCIS. Omaha, Nebraska, USA, 2005.
Rinakit, Sukardi. The Indonesian Military After the New Order. Copenhagen: NIAS Press, 2005.
Ajzen, Icek, and Martin Fishbein. "The Influence of Attitudes on Behavior." In The Handbook of Attitudes, 173-221. Mahway: Lawrence Erlbaum Associates, 2005.

Pages