Biblio

Export 21359 results:
2005
Visa COI In Bundestag print., 2005.
Adelsbach, A., S. Gajek, and J. Schwenk. "Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures." Information Security Practice and Experience Springer-Verlag, LNCS, vol. 3469 (2005): 204-216.
Gilbert, John K.. Visualization in Science Education. The Netherlands: Springer, 2005.
Solana, Javier. "Vorwort." In Die Sicherheits- und Verteidigungspolitik der EU, 5-12, quote on p. 12. Paris: EU ISS, 2005.
Karapetyan, Asthig, and Gohar Poghosyan. Vow to Ararat. Abovyan City.com , 2005.
VTsIOM press release No. 268., 2005.
Lieber, Keir A., and Gerard Alexander. "Waiting for Balancing Why the World Is Not Pushing Back." International Security 30, no. 1 (2005): 111-12.
Roberts, Adam. "The War on Terror in Historical Perspective." Survival 47, no. 2 (2005): 101-30.
Pressman, Jeremy. Warring Friends: Alliance Restraint in International Politics. Ithaca, NY: CUP, 2005.
Stroganov, Yuri. "We Haven't Lost Ukraine Yet, But We Must Learn From Our Mistakes." Trud 2 (2005).
Laouris, Yiannis, and Nikleia Eteokleous. We need an educationally relevant definition of mobile learning In 4th World Conference on Mobile Learning. Cape Town, South Africa, 2005.
Klose, Gerhard J.. "The Weight of History: Germany’s Military and Domestic Security." Connections: The Quarterly Journal 4, no. 3 (2005): 37-57.
Elezi, Mehmet. "The Western Balkans Between Statehood and Integration." Connections: The Quarterly Journal 4, no. 2 (2005): 5-8.
Maamar, Zakaria, Djamal Benslimane, and N. C. Narendra. What Can Context do for Web Services. Dubai, United Arab Emirates: Zayed University, Dubai, 2005.
Hymans, Jacques E. C.. "What Counts as History and How Much Does History Count? The Case of French Secondary Education." In The Nation, Europe and the World: Textbooks and Curricula in Transition, 61. New York and Oxford: Berghahn Books, , 2005.
What Exactly Does a Chief Information Officer Do? In interview with Paul Burfitt. Computer Weekly, 2005.
O’Reilly, Tim. What Is Web 2.0: Design Patterns and Business Models for the Next Generation of Software., 2005.
Post, Jerrold. "When Hatred is Bred in the Bone: Psycho-cultural Foundations of Contemporary Terrorism." Political Psychology 26, no. 4 (2005): 616.
Cyrulnik, Boris. The Whispering of Ghosts: Trauma and Resilience. New York: Other Press, 2005.
Monitor, ISIJ. "The White Paper of Civil Protection of the Republic of Bulgaria." Information & Security: An International Journal 16 (2005): 133-134.
Pantev, Plamen. "Why Is Post-Conflict Rehabilitation Important for Preserving and Developing Transatlantic Relations." Connections: The Quarterly Journal 4, no. 2 (2005): 81-83.
Turner, Michael A.. Why Secret Intelligence Fails. Dulles, VA: Potomac Books, 2005.
Yang, Ang, Hussein A. Abbass, and Ruhul Sarker. "WISDOM-II: A Network Centric Model for Warfare." In Knowledge-Based Intelligent Information and Engineering Systems, 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part III. Lecture Notes in Computer Science. Berlin : Springer Berlin Heidelberg, 2005.
Cook, David. "Women Fighting in Jihad." Studies in Conflict and Terrorism 28 (2005): 375-84.
Kakabadse, A., J. Bank, and S. Vinnicombe. Working in Organisations, The Essential Guide for Managers in Today’s Workplace. London: Penguin, 2005.

Pages