Biblio

Export 8458 results:
Filters: Filter is   [Clear All Filters]
2010
Transparency International Corruption Perception Index 2010., 2010.
Hughes, Rex. "A Treaty for Cyberspace." International Affairs 86, no. 2 (2010): 533.
Mihalka, Michael D., and Mark R. Wilcox. "Unintended Strategic Consequences of Security Assistance in the South Caucasus." Joint Force Quarterly (2010): 24-28.
The United States’ National Security Strategy 2010., 2010.
"United States Nuclear Regulatory Commission, Cyber Security Programs For Nuclear Fa-cilities, Regulatory Guide ." (2010).
Uprising Worsens Kyrgyzstan Economic Woes. BBC News, 2010.
"Urgent Problems and the Logic of Military Reform." Russian Politics and Law 48, no. 3 (2010): 59.
Alexander, Keith. U.S. Cybersecurity Policy and the Role of U.S. CYBERCOM In CSIS Cybersecurity Policy Debate Series., 2010.
U.S. Department of Defense Quadrennial Defense Review. Washington, D.C.: U.S. Department of Defense, 2010.
Fairclough, Gordon. "U.S., Poland Amend Missile-Defense Plan." Wall Street Journal (2010).
Conley, Heather, and Jamie Kraut. "U.S. Strategic Interests in the Arctic." Center for Strategic & International Studies (2010).
Tagarev, Todor. "Utilisation of Surplus Equipment and Infrastructure." In Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices, 124-136. Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2010.
Dionysiou, Theodoras, Vasilios A. Siris, and George Stamatakis. "Utility-based channel assignment and topology control in wireless mesh networks." In 2010 IEEE International Symposium on A World of Wireless, Mobile and Multimedia Net¬works (WoWMoM). Montreal, 2010.
Haralampiev, K., and G. Naidenov. "Waves of the Change and Change of the Waves." Sociological Problems Special Issue (2010).
Biscop, Sven, Teija Tiilikainen, Stefano Silvestri, Nicole Gnesotto, Daniel Keohane, and Jolyon Howorth. What do Europeans Want from NATO?. Brussels: European Union Institute for Security Studies, 2010.
Parveen, Tauhida, and Scott Tilley. When to Migrate Software Testing to the Cloud? In Third International Conference on Software Testing, Verification, and Vali¬dation Workshops (ICSTW). Paris, France, 2010.
White House Strategic Communications Report to Congress. White House, 2010.
Byers, Michael. Who Owns the Arctic? Understanding Sovereignty Disputes in the North . Vancouver, BC: Douglas & McIntyre, 2010.
Clarke, Richard A., and Robert K. Knake. "Why Cyber Warfare is Important." In Cyber Warfare: The Next Threat to National Security and What to Do About It, 18-21. New York: HarperCollins, 2010.
Wife of Virginia Man who Threatened South Park Pleads Guilty. Anti-Defamation League, 2010.
Ki-Moon, UN Secretary. The World’s Women 2010: Trends and Statistics. Geneva: United Nations, 2010.
Oriol, Manuel, and Faheem Ullah. YETI on the Cloud In Third Interna¬tional Conference on Software Testing, Verification, and Validation Workshops (ICSTW. Paris, 2010.
Anzalone, Christopher. "Zachary Chesser: An American, Grassroots Jihadist Strategist on Raising the Next Generation of Al Qaeda Supporters." Perspectives on Terrorism 4, no. 5 (2010): 22.
Белая книга по обороне и вооруженным силам In одобренная Национальным собранием 28 октября 2010., 2010.
Гаджиев, К.С.. Большая игра на Кавказе: вчера, сегодня, завтра. Москва: Международные отношения, 2010.

Страницы