Biblio

Export 8450 results:
2008
Thornton, John. "Long Time Coming: The Prospects for Democracy in China." Foreign Affairs 87, no. 15 (2008).
Longman’s Dictionary of Contemporary English. New York: Longman, 2008.
Long-Term Vision of the Czech Republic Ministry of Defense. Prague: Ministry of Defense, 2008.
Karajkov, Risto. "Macedonia’s 2001 Ethnic War: Offsetting Conflict – What Should Have Been Done That Was Not?" Conflict Security and Development 6, no. 4 (2008): 451.
Stedman, Stephen J., Bruce Jones, and Carlos Pascual. Managing Global Insecurity: A Plan for Action.. Washington, D.C.: The Brookings Ins, 2008.
Stiglitz, J.. "Markets Can't Rule Themselves." Newsweek (2008).
Kharchenko, Vyacheslav, Chris Phillips, and Popov Peter. MASTAC: New Curriculum for Master and Doctoral Studies in Critical Software and Computing In International Conference on Software Engineering SEESE Workshop. Leipzig, 2008.
"The Media Activities of the Taliban Islamic Movement." Al-Samood Magazine (2008).
Media Note: Acting Under Secretary for Arms Control and International Security John C. Rood to Travel to Moscow for Bilateral Strategic Security Dialogue Talks. U.S. Department of State, Office of the Spokesman, 2008.
McBride, Janet. Medvedev Condemns Georgia NATO Membership Promise. Reuters.com, 2008.
Van Herpen, Marcel H.. Medvedev’s Proposal for a Pan-European Security Pact In Cicero Working Paper. Paris/Maastricht, 2008.
Medvedev, Dmitry. Medvedev, Speech at the World Policy Conference. Evian, 2008.
Meeting of The North Atlantic Council at the Level of Foreign Ministers Held at NATO Headquarters, Brussels, 2–3 December 2008 In Final Communiqué., 2008.
Duro, Kol. Foto. "Menaxhimi i burimeve të mbrojtjes." Çështje të sigurisë (Security Issues) (Instituti për Demokraci dhe Ndërmjetësim) vol. 8 (2008): 65-84.
Satoh, Fumiko, Nirmal K. Mukhi, Michiaki Tatsubori, Kouichi Ono, and Yuichi Nakamura. Methodology and Tools for End-to-End SOA Security Configurations In SERVICES ’08. Honolulu, HI, 2008.
Klein, Margarete. "Militärische Implikationen des Georgienkrieges – Zustand und Reformbe-darf der russischen Streitkräfte." SWP-Aktuell 74 (2008): 7.
Moran, Daniel, and James A. Russell. "The Militarization of Energy Security." Strategic Insights 7, no. 1 (2008): 2.
Friesendorf, Cornelius, and Susan E. Penksa. "Militarized Law Enforcement in Peace Operations: EUFOR in Bosnia & Herzegovina." International Peacekeeping 15, no. 5 (2008): 677-94.
Military Corruption Costs Russia Almost $80 million in 2008. RIA Novosti, 2008.
Hansen, Victor. Military Jurisdiction Over Civilians: Opening a Can of Worms?. Jurist, 2008.
Blomgren, Ebbe. "Is Military Praxis in International Missions Reforming the Profession?" In The Heritage and the Present: From Invasion Defence to Mission Oriented Organisation, 233-42. Karlstad: Swedish National Defence College, 2008.
W.U., Yongdong, Yao H., and Bao F.. Minimizing SSO Effort in Verifying SSL Antiphishing Indicators In Proc. of 23rd International Information Security Conference IFIP TC 11., 2008.
Bruneau, Thomas C., and Richard B. Goetze, Jr. "Ministries of Defense and Democratic Control." In Who Guards the Guardians and How: Democratic Civil-Military Relations, edited by Thomas C. Bruneau and Scott D. Tollefson, 71-98. Austin, TX: University of Texas Press, 2008.
"Misje, zadania i właściwości użycia sił zbrojnych w przyszłych operacjach (Missions, Tasks and Features of Armed Forces’ Use in Future Operations) ." In Współczesne i przyszłe zagrożenia bezpieczeństwa a rozwój sił zbrojnych (Contemporary and Future Security Threats vs. Armed Forces’ Development), 174-75. Warsaw: National Defense University, 2008.
Savenko, Oleg, and Sergyi Lysenko. "Model Search Process Trojans in Personal Computers." Radioelectronic and Computer Systems 7 (2008).

Страницы