Biblio

Export 8462 results:
2010
Time for a Human Approach. Zurich: ISN, 2010.
Rego, Francisco, Cristina Montiel, and Jorge Agudo. "Towards integrated fire management: The need for a European Framework Directive on Fire." In Conference on Protection of Forests, Spanish Presidency of the European Union. La Granja–Valsaín, 2010.
Meyer, Oliver. "Towards quality CLIL: successful planning and teaching strategies." Puls 10 (2010): 11-29.
Ekström, Thomas. The Transformation from Defence Procurement to Defence Acquisition -Opportunities for New Forms of Analytical Support In SAS-081 Symposium, Sofia., 2010.
Transparency International Corruption Perception Index 2010., 2010.
Hughes, Rex. "A Treaty for Cyberspace." International Affairs 86, no. 2 (2010): 533.
Mihalka, Michael D., and Mark R. Wilcox. "Unintended Strategic Consequences of Security Assistance in the South Caucasus." Joint Force Quarterly (2010): 24-28.
The United States’ National Security Strategy 2010., 2010.
"United States Nuclear Regulatory Commission, Cyber Security Programs For Nuclear Fa-cilities, Regulatory Guide ." (2010).
Uprising Worsens Kyrgyzstan Economic Woes. BBC News, 2010.
"Urgent Problems and the Logic of Military Reform." Russian Politics and Law 48, no. 3 (2010): 59.
Alexander, Keith. U.S. Cybersecurity Policy and the Role of U.S. CYBERCOM In CSIS Cybersecurity Policy Debate Series., 2010.
U.S. Department of Defense Quadrennial Defense Review. Washington, D.C.: U.S. Department of Defense, 2010.
Fairclough, Gordon. "U.S., Poland Amend Missile-Defense Plan." Wall Street Journal (2010).
Conley, Heather, and Jamie Kraut. "U.S. Strategic Interests in the Arctic." Center for Strategic & International Studies (2010).
Tagarev, Todor. "Utilisation of Surplus Equipment and Infrastructure." In Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices, 124-136. Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2010.
Dionysiou, Theodoras, Vasilios A. Siris, and George Stamatakis. "Utility-based channel assignment and topology control in wireless mesh networks." In 2010 IEEE International Symposium on A World of Wireless, Mobile and Multimedia Net¬works (WoWMoM). Montreal, 2010.
Haralampiev, K., and G. Naidenov. "Waves of the Change and Change of the Waves." Sociological Problems Special Issue (2010).
Biscop, Sven, Teija Tiilikainen, Stefano Silvestri, Nicole Gnesotto, Daniel Keohane, and Jolyon Howorth. What do Europeans Want from NATO?. Brussels: European Union Institute for Security Studies, 2010.
Parveen, Tauhida, and Scott Tilley. When to Migrate Software Testing to the Cloud? In Third International Conference on Software Testing, Verification, and Vali¬dation Workshops (ICSTW). Paris, France, 2010.
White House Strategic Communications Report to Congress. White House, 2010.
Byers, Michael. Who Owns the Arctic? Understanding Sovereignty Disputes in the North . Vancouver, BC: Douglas & McIntyre, 2010.
Clarke, Richard A., and Robert K. Knake. "Why Cyber Warfare is Important." In Cyber Warfare: The Next Threat to National Security and What to Do About It, 18-21. New York: HarperCollins, 2010.
Wife of Virginia Man who Threatened South Park Pleads Guilty. Anti-Defamation League, 2010.
Ki-Moon, UN Secretary. The World’s Women 2010: Trends and Statistics. Geneva: United Nations, 2010.

Страницы