Biblio
Export 21463 results:
How Chechnya Became a Breeding Ground for Terror." The Middle East Quarterly 12, no. 3 (2005): 57-66.
"How Smugglers, Traffickers and Copycats Are Hijacking the Global Economy. New York: Doubleday, 2005.
How the Andijan Killings Unfolded. BBC News, 2005.
How The Army Runs: A Senior Leader Reference Handbook. 25th ed. Carlisle Barracks, PA: U.S. Army War College, 2005.
The Human Rights Case Against Attacking Iran." New York Times (2005).
"Human Security and Security Sector Reform: Contrasts and Commonalities. Sicherheit und Frieden, 2005.
Human Trafficking: Breaking the Military Link." Connections: The Quarterly Journal 4, no. 4 (2005): 63-72.
"Human Trafficking in South Eastern Europe." Connections: The Quarterly Journal 4, no. 4 (2005): 49-62.
"Humanitarian Law and Direct Participation in Hostilities by Private Contractors or Civilian Employees." Chicago Journal of International Law 5 (2005): 511-46.
"Hyogo Framework for Action 2005-2015: Building the Resilience of Nations and Communities to Disasters In United Nations International Strategy for Disaster Reduction., 2005.
I Must Preach Holy War, Says Teacher." The Age (Australia) (2005).
"Identifying Lessons in United Nations International Policing Missions In DCAF Policy Paper. Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2005.
The Ideological War on Terror: Worldwide Strategies for Counter-Terrorism. London: Routledge, 2005.
If Hamas Participates, Sharon Says Israel Won’t Aid Palestinian Elections." Washington Post (2005).
"Image synthesis and face recognition based on 3d face model and illumination model In Proceedings of the First international conference on Advances in Natural Computation. Vol. Part II (ICNC’05). Springer-Verlag, 2005.
Impersonation Attack on a Dynamic ID-Based Remote User Authentication Scheme Using Smart Cards." IEICE Transactions on communications E88, no. B(5) (2005).
"An Implementation of the AKS Primality Test." IEEE (2005).
"Implementing the Defence Programs of the Ministry of Defence for the 2006-2011 Period – Risk Assessment." Military Journal (2005).
"Improved RS Method for Detection of LSB Steganography." Computational Science and Its Applications – ICCSA 2005 (2005): Part II.
"Improving Civil-Military Cooperation the Danish Way." NATO Review (2005).
"In Good Company? The Role of Business in Security Sector Reform. London: Demos, 2005.
In Search of Harmony: Repairing Infrastructure and Social Relations in the Ferghana Valley,." Central Asian Survey 24, no. 1 (2005): 53-66.
"In the Shadow of Terror: Changes in World Assumptions in Israeli Youth." Journal of Aggression, Maltreatment & Trauma 9, no. 3-4 (2005): 353-364.
"Increasing Absorptive Capacity through Strategic use of Network Organizations." In 11th Americas Conference on Information Systems AMCIS. Omaha, Nebraska, USA, 2005.
"