Biblio

Export 8458 results:
Filters: Filter is   [Clear All Filters]
2008
Panizzo, Alexandre. "China’s Oil Thirst." Le Figaro (2008).
Norris, Robert S., and Hans Kristensen. "Chinese Nuclear Forces, 2008." Bulletin of the Atomic Scientists (2008).
"Chornaya Metka Ot Spetznaza." Rossiiskaya Gazeta (2008).
CIA Chief says Al Qaeda Still Greatest Threat, Bin Laden Isolated but Network Spreading Influence in Africa, Mideast. AP, 2008.
Shslamanov, V.. "Civil Security and Crisis Management." In The Fight Against Terrorism and Crisis Management in the Western Batkans. IOS Press, 2008.
Martorella, M.. "CLEAN Technique for Polarimetric ISAR." International Journal of Navigation and Observation (2008).
Scheffran, Jürgen. "Climate Change and Security." Bulletin of the Atomic Scientists 64, no. 2 (2008): 19-25, 55-60.
Foster, Ian, Ioan Raicu, Shiyong Lu, and Yong Zhao. Cloud Computing and Grid Computing 360-Degree Compared., 2008.
Code of Conduct on offsets. Brussels: European Defence Agency, 2008.
Stevens, Paul. The Coming Oil Supply Crunch In Chatham House Report. London: Chatham House, 2008.
Corman, Steven R., and Jill S. Schiefelbein. "Communication and Media Strategy in the Islamist War of Ideas." In Weapons of Mass Persuasion, Strategic Communication to Combat Violent Extremism, 73. New York: Peter Lang, 2008.
Communication from the Commission to the European Parliament and the Council on Reinforcing the Union's Disaster Response Capacity. Brussels, 2008.
Drewienkiewicz, John. A Concept paper on the shaping of Higher Military Education submitted to the working group group established by Decision of the Bosnia and Herzegovina MoD., 2008.
Constitutional Court of Saxony., 2008.
Reid-Martinez, Kathaleen, Linda Grooms, and Mihai Bocarnea. "Constructivism in Online Distance Education." In Encyclopedia of Information Science and Technology. Second ed. Hersey: IGI Global Publishing, 2008.
Salem, Arab, Edna Reid, and Hsinchun Chen. "Content Analysis of Jihadi Extremist Groups’ Videos." In Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security, 267-284. New York: Springer, 2008.
Hemming, Jon. Corruption Holds Back Afghan Army Expansion. Reuters, 2008.
Powers, Rod. The Cost of War. USMilitary.com, 2008.
"Council Directive 2008/114/EC of 8 December 2008 on the identification and designation of European critical infrastructures and the assessment of the need to improve their protection." Official Journal L 345 (2008): 75-82.
J.Thomas, Biersteker, and Sue E. Eckert. Countering the Financing of Terrorism. New York: Routledge, 2008.
Jones, Seth G.. Counterinsurgency in Afghanistan . Santa Monica: CA: RAND Corporation , 2008.
Tikk, Eneken. Cyber Attacks Against Georgia: Legal Lessons Identified. Tallinn, Estonia : Cooperative Cyber Defense Center of Excellence, 2008.
Geers, Kenneth. "Cyberspace and the Changing Nature of Warfare." SC Magazine (2008).
Fluri, Philipp H., and Viorel Cibotaru. Defence Institution Building: Country Profiles and Needs Assessments for Armenia, Azerbaijan, Georgia and Moldova. Geneva: DCAF, 2008.
Lugar, Richard. Defense against Weapons of Mass Destruction In speech at conference. Chantilly, VA, 2008.

Страницы