Littérature scientifique sur le sujet « Security state »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Security state ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Articles de revues sur le sujet "Security state"

1

Hama, Hawre Hasan. "State Security, Societal Security, and Human Security." Jadavpur Journal of International Relations 21, no. 1 (2017): 1–19. http://dx.doi.org/10.1177/0973598417706591.

Texte intégral
Résumé :
Generally speaking, the traditional approach of security mainly regards states as a sole referent object of security and refutes any attempt to broaden the concept of security. This understanding is known as a realist approach. This approach, however, has been recently challenged by the Copenhagen School, the Welsh School, and the human security approach. The Copenhagen School assumes that there is now a duality of security: state security and societal security. However, both the Welsh School and the human security school look at individuals as a sole referent object of security. This article
Styles APA, Harvard, Vancouver, ISO, etc.
2

Wiśniewski, Bernard. "NATIONAL SECURITY AND STATE SECURITY (REMINISCENCES)." Bulletin of Lviv State University of Life Safetyі 27 (June 26, 2023): 144–49. http://dx.doi.org/10.32447/20784643.27.2023.16.

Texte intégral
Résumé :
State security and homeland security are concepts that frequently appear in academic studies and are permanently enshrined in law. They are sometimes even treated as synonyms, despite sharing only a single element, that of security. Are they really identical concepts? Do they have relations indicating interpretative differences? Is there something common to these expressions that link them in their content? These are the questions that determined the formulation of the statements presented in this article, which reviews the standpoints of recognised Polish scholars, being supplemented by the a
Styles APA, Harvard, Vancouver, ISO, etc.
3

Ievgeniia, Mishchuk. "DEVELOPMENT OF MODERN DIRECTIONS OF ESTIMATOLOGY IN THE ECONOMIC SECURITY OF THE ENTERPRISE." TECHNOLOGY AUDIT AND PRODUCTION RESERVES 6, no. 4(56) (2020): 22–28. https://doi.org/10.15587/2706-5448.2020.220332.

Texte intégral
Résumé :
<em>The object of research is the process of developing directions in estimatology of the economic security of an enterprise. Multiple objects are taken into account in the estimatology of economic security. It is revealed that the presence of many approaches to determining liminal (recommended, desired) values when assessing indicators of economic security is due to their multitasking. It is substantiated that the detected multitasking generates multilevel and multi-persistence of economic security. The property of variability of the degree of rigidity of the liminal (recommended and other) v
Styles APA, Harvard, Vancouver, ISO, etc.
4

Agwanwo, Destiny Eze, and Raphael Lawal. "Non-state Security Actors and Security Governance in Taraba State." Middle East Research Journal of Humanities and Social Sciences 5, no. 02 (2025): 41–48. https://doi.org/10.36348/merjhss.2025.v05i02.004.

Texte intégral
Résumé :
This study explores the role of non-state security actors in security governance in Taraba State, Nigeria. It adopted the descriptive research design and the community involvement approach theory to examine the role of non-state security actors in Taraba State. It looks at how private security firms, and neighborhood watch groups, vigilantes, and tribal militias—such as the Tiv and Jukun groups support official security measures. The study used a multistage sample approach to choose seven LGAs where these actors are most active: Ardo Kola, Bali, Donga, Gashaka, Gassol, Ibi, and Jalingo. Key pa
Styles APA, Harvard, Vancouver, ISO, etc.
5

Oghuvbu, Ejiroghene Augustine. "Security And The Challenges Of Securing Nigerian State." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (2021): 3924–30. http://dx.doi.org/10.17762/turcomat.v12i3.1681.

Texte intégral
Résumé :
Nigeria, like most developing States is still grappling with the task of nation – building, responsive democratic order and a just and secured polity. The task over the years has remained arduous and seemingly illusive. Presently, the menance of Boko Haram, the marauding herdsmen militancy, the new face of militancy in the Niger Delta, the spate of kidnappings, armed robberies, and ethno-regional intolerance, the vociferous separatist agitations in the South-East and South-South and the deteriorating living conditions have continued to create survival, stability and security challenges and thr
Styles APA, Harvard, Vancouver, ISO, etc.
6

Aziz, Sahar. "State Sponsored Radicalization." Michigan Journal of Race & Law, no. 27.1 (2021): 125. http://dx.doi.org/10.36643/mjrl.27.1.state.

Texte intégral
Résumé :
Where was the FBI in the months leading up to the violent siege on the U.S. Capitol in 2021? Among the many questions surrounding that historic day, this one reveals the extent to which double standards in law enforcement threaten our nation’s security. For weeks, Donald Trump’s far right-wing supporters had been publicly calling for and planning a protest in Washington, D.C. on January 6, the day Congress was to certify the 2021 presidential election results. Had they been following credible threats to domestic security, officials would have attempted to stop the Proud Boys and QAnon from bre
Styles APA, Harvard, Vancouver, ISO, etc.
7

Onyshchenko, Svitlana. "State Budgetary Security Determinants." ЕКОНОМІКА І РЕГІОН Науковий вісник, no. 4(75) (December 27, 2019): 14–19. http://dx.doi.org/10.26906/eir.2019.4(75).1807.

Texte intégral
Résumé :
Бюджетна безпека держави обумовлюється низкою детермінантів, які визначають зміст, структуру та рівень її забезпечення. Визначено, що визначальними фактами забезпечення державного бюджету є фактори, загрози як екзогенного, так і ендогенного походження, а також причинно-наслідкові зв’язки, які прямо чи опосередковано визначають його рівень та складність процесів його забезпечення.Запропоновано перелік основних детермінант, що впливають на забезпечення бюджетної безпеки держави з урахуванням процесів глобалізації, конструктивного / руйнівного впливу факторів та загроз. Зазначається, що системати
Styles APA, Harvard, Vancouver, ISO, etc.
8

Ganguly, Sumit. "The Troublesome Security State." Journal of Democracy 28, no. 3 (2017): 117–26. http://dx.doi.org/10.1353/jod.2017.0050.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Collins, Alan. "State-Induced Security Dilemma." Cooperation and Conflict 39, no. 1 (2004): 27–44. http://dx.doi.org/10.1177/0010836704040833.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Kudelia, Serhiy. "Ukraine's Emerging Security State." Current History 117, no. 801 (2018): 264–70. http://dx.doi.org/10.1525/curh.2018.117.801.264.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
Plus de sources

Thèses sur le sujet "Security state"

1

Frisk, Ulf, and Semir Drocic. "The State of Home Computer Security." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2584.

Texte intégral
Résumé :
<p>Hundreds of millions of people use their home computers every day for different purposes. Many of them are connected to the Internet. Most of them are unaware of the threats or do not know how to protect themselves. This unawareness is a major threat to global computer security. </p><p>This master thesis starts by explaining some security related terms that might be unknown to the reader. It then goes on by addressing security vulnerabilities and flaws in the most popular home computer operating systems. The most important threats to home computer security are reviewed in the following chap
Styles APA, Harvard, Vancouver, ISO, etc.
2

Majumdar, Ankur. "Security in power system state estimation." Thesis, Imperial College London, 2016. http://hdl.handle.net/10044/1/33744.

Texte intégral
Résumé :
With the power system evolving from passive to a more active system there is an incorporation of information and communication infrastructures in the system. The measurement data are more prone to tampering from attackers for mala fide intentions. Therefore, security and reliability of distribution have become major concerns. State estimation (SE), being the core function of the energy/distribution management system (EMS/DMS), has become necessary in order to operate the system efficiently and in a controlled manner. Although SE is a well-known task in transmission systems, it is usually not a
Styles APA, Harvard, Vancouver, ISO, etc.
3

Rockett, Jan P. "Internal security in a democratic state." Thesis, University of Bradford, 1991. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.287117.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Fitzgerald, Alan. "DATA SECURITY IN SOLID STATE DISKS." International Foundation for Telemetering, 2005. http://hdl.handle.net/10150/604786.

Texte intégral
Résumé :
ITC/USA 2005 Conference Proceedings / The Forty-First Annual International Telemetering Conference and Technical Exhibition / October 24-27, 2005 / Riviera Hotel & Convention Center, Las Vegas, Nevada<br>Solid state disk characteristics make them ideal for data collection in both harsh environments and secure telemetry application. In comparison to their magnetic counterparts, solid state disks are faster, more reliable, extremely durable and, with changing economies and geometries, more affordable and available in higher capacities than ever before. This paper will discuss solid state dis
Styles APA, Harvard, Vancouver, ISO, etc.
5

Gordon, Ellen M. "Multi-state initiatives: agriculture security preparedness." Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1584.

Texte intégral
Résumé :
CHDS State/Local<br>Approved for public release, distribution is unlimited<br>To defend American agriculture against foreign or domestic terrorism, it is essential that states build multi-state partnerships to provide for the collaborative plans, programs and operations needed to protect the nations food security. The National Homeland Security Strategy puts states on the front lines in the war against terrorism---including the struggle to secure the agriculture industry from potentially devastating attack. The issues surrounding agro-terrorism are vast and complex and the resources of the Fed
Styles APA, Harvard, Vancouver, ISO, etc.
6

Gordon, Ellen M. Homeland Security Advisor and Emergency Management Administrator author (civilian). "Multi-state initiatives--agriculture security preparedness /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FGordon.pdf.

Texte intégral
Résumé :
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, June 2004.<br>Thesis advisor(s): Paul Stockton. Includes bibliographical references (p. 41-42). Also available online.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Woodbury, Glen L. "Recommendations for Homeland Security Organizational approaches at the State Government level." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FWoodbury.pdf.

Texte intégral
Résumé :
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, June 2004.<br>Thesis advisor(s): Paul Stockton. Includes bibliographical references (p. 51-52). Also available online.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Shamkalo, K. Yu. "Stock market’s security in the context of strengthening the state financial security." Master's thesis, Сумський державний університет, 2020. https://essuir.sumdu.edu.ua/handle/123456789/81804.

Texte intégral
Résumé :
The paper substantiates the theoretical and methodological foundations for ensuring the financial security of the state through the system of investment and stock markets. The role of the stock market and the peculiarity of stock exchange indices in ensuring the financial security of the state are investigated. A comparative analysis of the volatility of the Ukrainian stock market relative to the European and American ones, taking into account the time horizon of investment, is carried out, and a correlation is established between the indices under consideration. Based on the study, conclusion
Styles APA, Harvard, Vancouver, ISO, etc.
9

Blackwood, Matthew J. "Homeland security within state departments of agriculture : components of an effective security program." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5128.

Texte intégral
Résumé :
CHDS State/Local<br>Approved for public release; distribution is unlimited<br>ttle understanding of the abilities and capabilities of state departments of agriculture related to homeland security initiatives. The challenge is that these programs tend to fall between agriculture and homeland security programs. This research involved interviewing representatives of 24 state departments of agriculture to identify success factors and barriers related to homeland security programs. Respondents reported multi-state agriculture groups, public-private partnerships, and organizational structure
Styles APA, Harvard, Vancouver, ISO, etc.
10

Fugere, Charles. "Muslims, National Security and the State in Uzbekistan." Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=108836.

Texte intégral
Résumé :
The idea of an "Islamic threat" to national security in Uzbekistan is widespread in the media and amongst several academics. The regime of Uzbek President Islam Karimov has repeatedly emphasized the seriousness of this threat and acted to contain it. In this thesis, l examine both the present ability of different Muslim political actors to challenge the Uzbek state's defense position and recent historical elements of the Uzbek security strategy related to Islam. l argue that the relationship between Muslims and national security in Uzbekistan is characterized by the two following observations:
Styles APA, Harvard, Vancouver, ISO, etc.
Plus de sources

Livres sur le sujet "Security state"

1

Hong, Yong-Pyo. State Security and Regime Security. Palgrave Macmillan UK, 2000. http://dx.doi.org/10.1057/9780230510777.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Omand, David. Securing the state: National security in contemporary times. S. Rajaratnam School of International Studies, 2012.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

S. Rajaratnam School of International Studies, ed. Securing the state: National security in contemporary times. S. Rajaratnam School of International Studies, Nanyang Technological University, 2012.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Baxter, John. State security, privacy and information. Harvester Wheatsheaf, 1990.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Baxter, John. State security, privacy and information. Harvester Wheatsheaf, 1990.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

D, Baxter John. State security, privacy, and information. St. Martin's Press, 1990.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

author, Kotwal Navaz, and Commonwealth Human Rights Initiative, eds. State security commissions: Reform derailed. Commonwealth Human Rights Initiative, 2011.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Anna, Yeatman, and Żółkoś Magdalena, eds. State, security, and subject formation. Continuum, 2009.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Cañas, Dick. HOMELAND SECURITY AT THE STATE LEVEL: A Primer on State Homeland Security Programs. authorHOUSE, 2012.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Meyerowitz, Steven A. State by state privacy and data security law. Sheshunoff, 2009.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
Plus de sources

Chapitres de livres sur le sujet "Security state"

1

Regilme, Salvador Santino F., and Beate Beller. "Security State." In The Palgrave Encyclopedia of Global Security Studies. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-74336-3_126-1.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Barnett, Hilaire. "State Security." In Constitutional and Administrative Law, 15th ed. Routledge, 2023. http://dx.doi.org/10.4324/9781003360438-27.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Regilme, Salvador Santino F., and Beate Beller. "Security State." In The Palgrave Encyclopedia of Global Security Studies. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-319-74319-6_126.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Paul, Erik. "Security State." In Australia as US Client State. Palgrave Macmillan UK, 2014. http://dx.doi.org/10.1057/9781137469359_4.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Barnett, Hilaire. "State Security." In Constitutional & Administrative Law. Routledge, 2017. http://dx.doi.org/10.4324/9781315458373-27.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Barnett, Hilaire. "State Security." In Constitutional & Administrative Law. Routledge, 2019. http://dx.doi.org/10.4324/9780429322686-22.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Barnett, Hilaire. "State Security." In Constitutional and Administrative Law, 16th ed. Routledge, 2025. https://doi.org/10.4324/9781003519027-27.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Romero, Vidal. "Security." In Rebuilding the State Institutions. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31314-2_6.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Kettunen, Pauli. "Welfare state, competition state, security state." In Remapping Security on Europe’s Northern Borders. Routledge, 2021. http://dx.doi.org/10.4324/9781003096412-14.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Fraser, Trudy. "Human Security as State Security." In Maintaining Peace and Security? Macmillan Education UK, 2015. http://dx.doi.org/10.1007/978-1-137-03215-7_8.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Actes de conférences sur le sujet "Security state"

1

Andreeva, Tatiana. "Information security of the state as one of the main components of state security." In Universitas Europaea: Towards a Knowledge Based Society Through Europeanisation and Globalisation. Free International University of Moldova, 2025. https://doi.org/10.54481/uekbs2024.v1.31.

Texte intégral
Résumé :
The problem of the existence of any state lies in the possibility of ensuring state security by public authorities. A state that is unable to ensure its state security for one reason or another is not viable, and, sooner or later, ceases to exist. Ensuring state security is one of the most urgent tasks facing public authorities. And the understanding by the authorities of the importance of this issue is the basis for further steps in this area. State security is the state of protection of the state from internal and external threats, in which sovereignty, independence, state and territorial in
Styles APA, Harvard, Vancouver, ISO, etc.
2

Bodden, Eric. "State of the systems security." In ICSE '18: 40th International Conference on Software Engineering. ACM, 2018. http://dx.doi.org/10.1145/3183440.3183462.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Lisovskyi, Volodymyr Mykolayovych. "State policy of national security." In MARITIME SECURITY OF THE BALTIC-BLACK SEA REGION: CHALLENGES AND THREATS. Baltija Publishing, 2023. http://dx.doi.org/10.30525/978-9934-26-392-7-1.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Frey, Michael R., and Jaclyn D. Szymonifka. "A Gaussian quantum state discriminator." In Defense and Security, edited by Eric J. Donkor, Andrew R. Pirich, and Howard E. Brandt. SPIE, 2005. http://dx.doi.org/10.1117/12.604340.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Simonaitis-Castillo, Vida K. "State of the art of crystal growth in the United States." In SPIE Defense, Security, and Sensing, edited by Mark Dubinskii and Stephen G. Post. SPIE, 2010. http://dx.doi.org/10.1117/12.849223.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Grunnan, Tonje, Monica Endregard, Ragnhild E. Siedler, and Ann-Kristin Elstad. "Norwegian Societal Security and State Security – Challenges and Dilemmas." In Proceedings of the 29th European Safety and Reliability Conference (ESREL). Research Publishing Services, 2020. http://dx.doi.org/10.3850/978-981-14-8593-0_4467-cd.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Heremans, Joseph P. "Introduction to cryogenic solid state cooling." In SPIE Defense + Security, edited by Richard I. Epstein, Bjørn F. Andresen, Markus P. Hehlen, Joseph P. Heremans, Ingo N. Rühlich, and Mansoor Sheik-Bahae. SPIE, 2016. http://dx.doi.org/10.1117/12.2228756.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Suh, DongHyok, and Young-Hwan Oh. "Crime Prevention Using Individual’s State Estimation." In Security Technology 2016. Science & Engineering Research Support soCiety, 2016. http://dx.doi.org/10.14257/astl.2016.139.73.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Sendobry, Alexander, Thorsten Graber, and Uwe Klingauf. "Purely optical navigation with model-based state prediction." In Security + Defence, edited by Edward M. Carapezza. SPIE, 2010. http://dx.doi.org/10.1117/12.864686.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Wagner, Matthias, Eugene Ma, John Heanue, and Shuyun Wu. "Solid state optical thermal imagers." In Defense and Security Symposium, edited by Bjørn F. Andresen, Gabor F. Fulop, and Paul R. Norton. SPIE, 2007. http://dx.doi.org/10.1117/12.730274.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Rapports d'organisations sur le sujet "Security state"

1

Jablonsky, David. The State of the National Security State. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada408224.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Jablonsky, David. The State of the National Security State. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada408437.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Cheeseman, Kathryn. Approaches to State Fragility and Climate Security. Institute of Development Studies, 2025. https://doi.org/10.19088/k4dd.2025.057.

Texte intégral
Résumé :
This rapid evidence review considers some illustrative examples of indices used to inform policymaking on fragile and conflict-affected states, namely the Bertelsmann Transformation Index, the Constellations of State Fragility, and the Fragile States Index. Metrics for determining a state’s fragility, and the underlying assumptions entailed, are compared to provide a snapshot of common approaches to defining and understanding the relationship between climate change, fragility, peace and security. It is notable that indicators of environmental change are not included as part of these metrics.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Feng, Shaw C., and Simon P. Frechette. The state of container security standards. National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.ir.7153.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Chow, William. Fixing the Broken State of Mobile Security. River Publishers, 2016. http://dx.doi.org/10.13052/popcas009.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Marcella, Gabriel. Affairs of State: The Interagency and National Security. Defense Technical Information Center, 2008. http://dx.doi.org/10.21236/ada491602.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Miller, Jack, and Rowena Bermingham. Regulation and state use of social media. Parliamentary Office of Science and Technology, 2021. http://dx.doi.org/10.58248/hs29.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Mikaelsen, Dallas P. U.S.-Brazil Security Cooperation and the State Partnership Program. Defense Technical Information Center, 2015. http://dx.doi.org/10.21236/ad1012803.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Busch, Oberst G. German-Israeli Relations: Security of Israel--Reason of State? Defense Technical Information Center, 2013. http://dx.doi.org/10.21236/ada589061.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Tulak, Arthur N., R. W. Kraft, and Don Silbaugh. State Defense Forces: Forces for NORTHCOM and Homeland Security? Defense Technical Information Center, 2003. http://dx.doi.org/10.21236/ada421654.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!