Biblio

Export 8450 results:
2003
Asmani, Ma’mur. "Salafi Radikal, Pesantren, dan Terorisme." Jaringan Islam Liberal (2003).
Lindgren, Mats, and Hans Banhold. Scenario Planning: The Link between Future and Strategy. Palgrave MacMillan Press, 2003.
Lindgren, Mats, and Hans Bandhold. "Scenario Planning: The Link between Future and Strategy ." Palgrave Macmillan (2003).
R. Smith, Jeffrey, and Amy DePaul. "Scout’ Had Low Profile." The Washington Post (2003).
Rumsfeld, Donald H.. Secretary of Defense, Annual Report to the President and the Congress. Washington, D.C.: Government Printing Office, 2003.
A Secure Europe in a Better World., 2003.
A Secure Europe in a Better World – European Security Strategy. Brussels: European Union, 2003.
A Secure Europe in a Better World. European Security Strategy. Brussels: European Union, 2003.
A Secure Europe in a Better World – European Security Strategy (ESS). Brussels: European Council, 2003.
A Secure Europe in a Better World - The European Security Strategy. Brussels: European Council, 2003.
A Secure Europe in a Better World – The European Security Strategy. Brussels: European Council, 2003.
A Secure Europe in a Better World - The European Security Strategy In European Council. Brussels, 2003.
Clarke, John L.. "Securing the European Homeland." Journal of Homeland Security 1 (2003).
Grizold, Anton. Security and Cooperation in Southeastern Europe. Ljubljana: Security Studies Collection, Faculty of Social Sciences, 2003.
Security and Defence in South-Eastern Europe In Centre for European Secxurity Studies. Vol. 16. Groningen,The Netherlands: Harmonie Papers, 2003.
Security Council Resolution 1474 In U.N. SCOR, 4737th mtg., 2003.
Lin, Iuon-Chang, Min-Shiang Hwang, and Chin-Chen Chang. "Security Enhancement for Anonymous Secure e-Voting over a Network." Computer Standards & Interfaces 25, no. 2 (2003): 131-139.
Co, Marianne Swanson &. Security Metrics Guide for Information Technology Systems. Gaithersburg: National Institute of Standards and Technology, 2003.
Lambrinoudakis, Costas, Stefanos Gritzalis, Fredj Dridi, and Günther Pernul. "Security Requirements for E-Government Services: A Methodological Approach for Developing a Common PKI-based Security Policy." Computer Communications 26, no. 16 (2003): 1873-1883.
Law, David, and Philipp Fluri. Security Sector Expert Formation-Achievements and Needs in South East Europe In Vienna: National Defence Academy,Geneva Centre for the Democratic Control of Armed Forces and the PfP-Consortium of Defence Academies and Security Studies Institutes., 2003.
Fluri, Philipp H., and Velizar Shalamanov. Security Sector Reform – Does It Work?: Problems of Civil-Military and Interagency Cooperation in the Security Sector. Geneva/Sofia: DCAF and GCMA, 2003.
Fluri, Philipp H., and Velizar Shalamanov. Security Sector Reform – Does It Work? Problems of Civil-Military and Interagency Cooperation in the Security Sector . Geneva/Sofia: DCAF and GCMA, 2003.
Fluri, Philipp H., and Eden Cole. "Security Sector Reform in South East Europe: A Study in Norms Transfer." In Challenges of Security Sector Governance, 119-146. Münster: LIT, 2003.
Benatallah, Boualem, Quan Z. Sheng, and Marlon Dumas. "The Self-Serv Environment for Web Services Composition." IEEE Internet Computing 7, no. 1 (2003): 40-48.
Dang, Tran Khanh. Semantic Based Similarity Searches in Database Systems (Multidimensional Access Methods, Similarity Search Algorithms) In FAW-Institute. Vol. PhD Thesis. Austria: University of Linz, 2003.

Страницы