Biblio

Export 8450 results:
2011
Aliev, Huseyn. "Neo-Realism and Humanitarian Action: From Cold War to Our Days." The Journal of Humanitarian Assistance (2011): 6.
"New Strategy Outlines Denmark’s Arctic Engagement." People’s Daily Online (2011).
Charlemagne. "No Time for Doubters." The Economist (2011).
Non-leader of the Free World. New York Post, 2011.
Leahy, Kevin Daniel. North Caucasian Rebels’ Economic Policy Defined by Conventionality and Wishful Thinking. The Central Asia-Caucasus Institute Analyst, 2011.
Subotic, Milos. Northern Kosovo: The Underestimated Conflict at the Heart of the Balkan Powder Keg., 2011.
Norton Study Calculates Cost of Global Cybercrime: $114 Billion Annually. Mountain View, CA: Symantec Corp., 2011.
"Not Sending Troops to Afghanistan the Right Decision–Senators." Interfax-Kazakhstan (2011).
S., Nye Joseph. "Nuclear Lessons for Cyber Security?" Strategic Studies Quarterly (2011): 31.
Dorf, Michael C.. The ‘Obama Doctrine’: The Wisdom and Lawfulness of the President’s Take-No-Prisoners Approach. Justia.com, 2011.
Boyle, Michael. "Obama: ‘Leading from Behind’ on Libya." The Guardian (2011).
Risen, Clay. "Obama’s Non-doctrine Doctrine." The New York Times (2011).
Thibodeau, Patrick. "Obama Seeks Big Boost in Cybersecurity Spending." Computer- world (2011).
Cohen, Tom. Obama Tells Families of 9/11 Victims that ‘Justice has been done’. CNN Politics , 2011.
Yergin, Daniel. "Opinion: America’s New Energy Security." Wall Street Journal (2011).
Garcia, Miguel, Illir Gashi, Nuno Neves, Rafael Obelheiro, and Alysson Bessani. OS Diversity for Intrusion Tolerance: Myth or Reality In Performance and De¬pendability Symposium, the International Conference on Dependable Systems and Networks., 2011.
Panetta: U.S. Military Can’t Make up NATO Shortfalls. msnbc.com , 2011.
Bucur, Stefan, Cristian Zamfir, George Cande, and Vlad Ureche. Parallel Symbolic Execution for Automated Real-World Software Testing In 6th ACM SIGOPS/EuroSys Conference on Computer Systems., 2011.
Wills, Aidan, and Mathias Vermeulen. Parliamentary Oversight of Security and Intelligence Agencies in the European Union. European Parliament Study, 2011.
Wills, Aidan, Mathias Vermeulen, Hans Born, Martin Scheinin, and Micha Wiebusch. Parliamentary Oversight of Security and Intelligence Agencies in the European Union . Brussels: European Parliament, Directorate General for Internal Policies, 2011.
Berry, John. PfP Consortium of Defense Academies and Security Studies Institutes Annual Report 2011., 2011.
Phishing Filter, Microsoft Phishing Filter FAQ., 2011.
Hornea, Ionel. Planning Based on Capabilities, the Key Tool Both Business Planning and Defence of NATO and the Armies of the Members States In Proceedings of the 6th International Scientific Conference “Defense Resources Management in the 21st Century,” 2-3 December 2011. Romania: Braşov , 2011.
Tsvetkov, Kiril. Pod syankata na promenite i pagona. Sofia: Media Nikolova, 2011.
Hintsa, Juha. Post-2001 Supply Chain Security – Impacts on the Private Sector. Lausanne, Switzerland: Université de Lausanne, 2011.

Страницы