57. BL,BL
Author: / Marshall G.S. Hodgson. ,20090530 0
Library: Library of Islamic Parliament (Tehran)
Subject:

58. Cold war history
Author: edited by Frédéric Bozo ... [ et al.].
Library: Library of Islamic Parliament (Tehran)
Subject:

59. Cyber-security and global information assurance :
Author: Kenneth J. Knapp [editor].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Management.,Cyberspace-- Security measures.,Data protection.,Information technology-- Security measures.,Computer networks-- Security measures.,Computer security-- Management.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Data protection.,Information technology-- Security measures.
Classification :
QA76
.
9
.
A25
C918
2009eb


60. How do rogue nations threaten human rights? -- North Korea represses freedom / Kay Seok -- Iran violates women's rights / Sam Brownback -- Sudanese government engages in genocide / Human Rights Watch -- United States violates human rights worldwide / Vernon Coleman -- Rogue nations undermine the United Nations' mission to promote human rights / Joseph Loconte -- U.S. invasions have not spread democracy in the Middle East / Phyllis Bennis -- How should the global community respond to rogue nations? -- Preemptive force is sometimes necessary to contain rogue nations / National Review -- Preemptive force threatens efforts to contain rogue states / Ivan Eland -- Missile defense system is necessary to protect against rogue nations / Dennis Ross -- Missile defense system is unnecessary / Gwynne Dyer -- Promoting globalization will reduce the threat posed by rogue states / Banning N. Garrett, Dennis M. Sherman -- Globalization
Author: Louise Gerdes, book editor.
Library: Library of Islamic Parliament (Tehran)
Subject:
