Biblio

Export 21362 results:
2001
Jackson, Brian. "Technology Acquisition by Terrorist Groups: Threat Assessment Informed by Lessons from Private Sector Technology Adoption." Studies in Conflict and Terrorism 24, no. 3 (2001): 183-213.
Delio, Michelle. "Technology: U.S., Chinese hackers vow to wage online war." Agence France-Presse (2001).
Brake, Jeffrey D.. Terrorism and the Military’s Role in Domestic Crisis Management: Background and Issues for Congress In CRS Report for Congress. Washington, D.C.: Congressional Research Service, 2001.
Dishman, Chris. "Terrorism, Crime and Transformation." Studies in Conflict and Terrorism 24, no. 1 (2001): 53-54.
Ganor, Boaz. Terrorism: No Prohibition Without Definition., 2001.
Wilkinson, Paul. Terrorism Versus Democracy: The Liberal State’s Response. London: Frank Cass, 2001.
Nachev, Atanas. "Testbed for implementation of advanced IT Participation." Information & Security: An International Journal 6 (2001): 132-137.
Hill, Fiona. Testimony before the Subcommittee on Central Asia and South Caucasus of the Committee on Foreign Relations of the U.S. Senate., 2001.
Asch, Beth J., and John T. Warner. "A Theory of Compensation and Personnel Policy in Hierarchical Organizations with Application to the United States Military." Journal of Labor Economics 19 (2001): 523-562.
Romaniuk, A.. "There are more and more of those wishing to become “cannon fodder” (Все більше і більше тих, хто бажає стати "гарматним кормом")." Segodnia (Today) (2001): 2.
Thermionics Quo Vadis? An Assessment of the DTRA’s Advanced Thermionics Research and Development Program. Washington, D.C.: National Academies Press, 2001.
Sharavin, A.. A third threat. Vol. 28 September 2001. site of Institute for Political and Military Analysis, 2001.
Goldstone, Jack A., and Charles Tilly. "Threat (and Opportunity): Popular Action and State Response in the Dynamics of Contentious Action." In Silence and Voice in the Study of Contentious Politics. New York: Cambridge University, 2001.
Kitfield, James. "Threat Assessment: Could Terrorism Go Nuclear?" National Journal (2001).
Three Evils: Terrorism, Separatism and Extremism In Convention on Combating Terrorism, Separatism and Extremism. Shanghai: SCO Website, SCO Joint Statement, 2001.
"Three-Party Encrypted Key Exchange without Server Public-Keys." IEEE Communications Letters 5, no. 12 (2001): 497-499.
I. Zartman, William. "The Timing of Peace Initiatives: Hurting Stalemates and Ripe Moments." Global Review of Ethnopolitics 1, no. 1 (2001): 8-12.
Timothy McVeigh. CNN, 2001.
Matser, Willem. "Towards a New Strategic Partnership." NATO Review 49, no. 4 (2001): 19-21.
Niles, Ian, and Adam Pease. Towards a Standard Upper Ontology In 2nd International Conference on Formal Ontology in Information Systems (FOIS-2001) . Ogunquit, Maine, 2001.
Petrov, Peter. "Towards Creation of a Unified Information System of the Navies of the Black Sea Countries." Information & Security: An International Journal 6 (2001): 94-101.
Powell, Colin. Town Hall Meeting., 2001.
Mihaylova, L., J. De Schutter, E. Staffetti, and H. Bruyninckx. Tracking contact transitions during force-controlled compliant motion using an Interacting Multiple Model Estimator In 10th International Conf. on Advanced Robotics. Budapest, Hungary, 2001.
Shelley, L.. Trafficking and Smuggling in Human Beings In Corruption Within Security Forces: A Threat To National Security. Garmisch-Partenkirchen, Germany: George C. Marshall European Center for Security Studies, 2001.
Glonti, Georgi. "Trafficking in Human Beings in Georgia and the CIS." Demokratizatsiya 9, no. 3 (2001): 382-98.

Pages