Biblio

Export 8458 results:
Filters: Filter is   [Clear All Filters]
2005
Comprehensive strategy to eliminate future sexual exploitation and abuse in United Nations peacekeeping operations. United Nations General Assembly, 2005.
Shalamanov, Velizar. Concept Development and Experimentation: Academic Support to Security Sector Transformation In SMi NATO Enlargement Conference. Sofia, Bulgaria, 2005.
Garstka, John J.. The Concept of Transformation, Its Reflection to the Political and Military NATO Structures and Some Aspects of the Reform., 2005.
Siemens, George. "Connectivism: A Learning Theory for the Digital Age." International Journal of Instructional Technology and Distance Learning 2, no. 1 (2005).
Martorella, M.. "A Contrast Maximization Based Technique for 2D ISAR Autofocusing." IEE Proceeding on Radar Sonar and Navigation 152, no. 4 (2005): 253-262.
J.A., Halderman, Waters B., and Felten E.W.. A Convenient Method for Securely Managing Passwords In Proc. of 14th ACM International World Wide Web Conference. Chiba, Japan, 2005.
Karklins, R.. Corruption and Composition of Government Expenditure In The System Made Me Do It: Corruption in Post-Communist Societies . Vol. 69. New York: M. E. Sharpe, 2005.
Porta, Donatella Della, and Alberto Vannucci. "Corruption as a Normative System." In Corruption Control in Political Life and the Quality of Democracy: A Comparative Perspective, Europe–Latin America., 2005.
"Council meeting on the basis of the Kok Report." In Council meeting., 2005.
Council of Europe Convention on Action against Trafficking in Human Beings In Council of Europe., 2005.
Ganor, Boaz. The Counter-Terrorism Puzzle In The Interdisciplinary Center, Herzliya, The International Policy Institute for Counter-Terrorism. New Brunswick, NJ: Transaction Publishers, 2005.
Country Reports on Terrorism - Chapter 5A. U.S. Department of State, Office of the Coordinator for Counterterrorism, 2005.
Crescono gli interessi di Pechino nell’Asia Centrale., 2005.
Criminal Jurisdiction Over Civilians Employed By or Accompanying the Armed Forces Outside the United States, Certain Service Members and Former Service Members In Instr. U.S. Department of Defense, 2005.
Boanas, Edward. "Crossing the Fault Line: Coordinating Multilateral Security Sector Reform Engagements in Post-Conflict Countries." Journal of Security Sector Management 3, no. 3 (2005).
Thomas, Timothy L.. Cyber Silhouettes: Shadows over the Information Operations. Fort Leavenworth: KS: Foreign Military Studies Office, 2005.
Kowalik, Janusz S., Janusz Gorski, and Anatoly Sachenko. Cyberspace Security and Defense: Research Issues. Berlin: Springer, 2005.
Sedivy, Jeri. "Czech Military Transformation." NATO Review (2005).
Máša, Pavel. "The Czech Republic will profit from legalization of the Ukrainians." Lidové noviny (2005).
Katyal, Neal Kumar. The Dark Side of Private Ordering for Cybersecurity, Edited by Mark F. Grady and Francesco Parisi. Cambridge University Press, 2005.
Byman, Daniel. Deadly Connections: States that Sponsor Terrorism. Cambridge: Cambridge University Press, 2005.
Decision by the 2nd COI (Visa CoI) In Bundestag print., 2005.
Turban, Efraim, Jay A. Aronson, and Ting-Peng Liang. Decision Support Systems and Intelligent Systems. Upper Saddle River, NJ: Pearson Prentice Hall, 2005.
Declaration by the Heads of the Member States of the SCO In SCO Annual Summit, Astana, Kazakhstan. Shanghai Cooperation Organization, 2005.
The Declaration on Accession to the European Union. Official Gazette of Montenegro, no. 36/05, 2005.

Страницы