Spelling suggestions: "subject:"[een] NATIONAL SECURITY"" "subject:"[enn] NATIONAL SECURITY""
121 |
China's development of asymmetric warfare and the security of Taiwan, Republic of China /Jinn, Guo-Woei. January 2004 (has links) (PDF)
Thesis (M.S. in Defense Analysis)--Naval Postgraduate School, Dec. 2004. / Thesis Advisor(s): Lyman Miller. Includes bibliographical references (p. 79-85). Also available online.
|
122 |
In search of an operational doctrine for maritime counterterrorismRodeman, Christopher A. January 1985 (has links)
Thesis (M.S.)--Naval War College, 2003. / Title from title screen (viewed Aug. 25, 2004). "3 February 2003." Includes bibliographical references (p. [21-22]).
|
123 |
Effectiveness of using red-teams to identify maritime security vulnerabilities to terrorist attack /Culpepper, Anna M. January 2004 (has links) (PDF)
Thesis (M.S. in Systems Engineering)--Naval Postgraduate School, Sept. 2004. / Thesis advisor(s): Raymond Buettner, Jr., Dorothy Denning. Includes bibliographical references (p. 65-69). Also available online.
|
124 |
Mussolini e la Conferenza di Locarno 1925 : il problema della sicurezza nella politica estera italiana /Napolitano, Matteo Luigi. January 1996 (has links)
Thesis. / Includes bibliographical references.
|
125 |
A surveillance society and the conflict state : leveraging ubiquitous surveillance and biometrics technology to improve homeland security /Makarski, Richard E. Marrero, Jose A. January 2002 (has links) (PDF)
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, September 2002. / Thesis advisor(s): Alex Bordetsky, Dale Courtney. Includes bibliographical references (p. 211-234). Also available online.
|
126 |
The great powers and the establishment of security regimes the formation of the Concert of Europe, 1792-1815.Akopian, Regina. January 2008 (has links)
Thesis (Ph. D.)--Rutgers University, 2008. / "Graduate Program in Political Science." Includes bibliographical references (p. 226-240).
|
127 |
Is Microsoft a threat to national security? : policy, products, penetrations, and honeypots /Watkins, Trevor U. January 2009 (has links)
Thesis (M.S.)--Youngstown State University, 2009. / Includes bibliographical references (leaves 90-94). Also available via the World Wide Web in PDF format.
|
128 |
Breaking the code for operational planners a comparative analysis of national security strategies since the end of the Cold War /Lewis, Harmon S. January 1900 (has links) (PDF)
Thesis (M.S. in Joint Campaign Planning and Strategy)--Joint Forces Staff College, Joint Advanced Warfighting School, 2008. / Title from PDF title page; viewed on Dec. 10, 2008. "4 April 2007 [i.e., 2008]." Electronic version of original print document. Includes bibliographical references (p. 75-76).
|
129 |
The evolution of ASEANNarine, Shaun, January 1998 (has links)
Thesis (Ph. D.)--University of Toronto, 1998. / Includes bibliographical references (leaves 433-447).
|
130 |
China and ASEAN strategic interests and policy prospects /Kao, Shaw-Fawn. January 1990 (has links)
Thesis (Ph. D.)--University of Virginia, 1990. / Includes bibliographical references (leaves 1,009-1,048).
|
Page generated in 0.0512 seconds