Biblio

Export 8450 results:
2009
Henry, Matthew H., and Yacov Y. Haimes. "A Comprehensive Network Security Risk Model for Process Control Networks." Risk Analysis 29, no. 2 (2009): 223-248.
Cayirci, Erdal, and Dusan Marincic. Computer Assisted Exercises and Training. A Reference Guide . Hoboken, NJ: John Wiley, 2009.
The Conclusion of the Government of Montenegro., 2009.
Peimani, Hooman. Conflict and Security in Central Asia and the Caucasus. Santa Barbara, CA: ABC-Clio, 2009.
de Zarobe, Yolanda Ruiz, and Rosa María Jim Catalan. Content and Language Integrated Learning: Evidence from research in Europe. Bristol: Multilingual matters, 2009.
Continuation of the National Emergency with Respect to Iran In Presidential Documents., 2009.
Iorsh, V.I., I.E. Kryukov, and I.N. Antonenko. "Control of Infrastructure and Safety of Production Systems." Management Methods and Tools (2009).
Ho, Joshua. "Cooperative Mechanisms in the Malacca Straits." In International Maritime Security Conference. Singapore: International Maritime Security Conference, 2009.
Lynch, Dov. "The Corfu Process." In The Indivisibility of Security: Russia and Euro-Atlantic Security, 35 ff. Rome: NATO Defense College, 2009.
Henninger, A.J.. Corruption: 15 Afghan Ministers under Investigation; Bribes, Perks, Skimming., 2009.
Corruption Perceptions Index results for 2008. Transparency International, 2009.
Country Analysis Brief: China. U.S. Energy Information Administration, 2009.
Country Reports on Terrorism 2008. State Department, Office of the Coordinator for Counterterrorism, 2009.
Wilson, Clay. "Cyber Crime." In Cyberpower and National Security, 415. Washington, D.C.: National Defense University Press, 2009.
Libicki, Martin C.. Cyberdeterrence and Cyberwar . Santa Monica, CA: RAND, 2009.
Libicki, Martin. Cyberdeterrence and Cyberwarfare. Santa Monica, CA: RAND, 2009.
Kramer, Franklin D.. "Cyberpower and National Security: Policy Recommendations for a Strategic Framework." In Cyberpower and National Security, 12. Washington, D.C.: National Defense University Press, 2009.
Harris, Shane. "The Cyberwar Plan." National Journal (2009).
de Groot, Bert, and Philip Hans Franses. "Cycles in basic innovations." Technological Forecasting & Social Change 76 (2009): 1021-1025.
"A Danger to Public Health and Welfare." New York Times (2009).
Bruckner, Till. "Decision-Making and Georgia’s Perpetual Revolution: The Case of IDP Housing." Caucasian Review of International Affairs 3, no. 2 (2009): 172-180.
Tagarev, Todor. "Defence Decision-making and Corruption Risks." In Integrity in Defence: Effective, Transparent and Accountable Management, 189-214. Sofia: EuroAtlantic Education Initiative, 2009.
The Defence Ministry in a Financial and Morale Collapse. Mediapool.bg, 2009.
Sullivan, Michael J.. "Defense Acquisitions: DoD Must Prioritize its Weapon System Acquisitions and Balance Them with Available Resources." (2009).
Oğuz, Mustafa. Defense Policy Making Process and Its Effects on Weapons Procurement In Department of International Relations. Vol. Master of Science. Middle East Technical University, 2009.

Страницы