

Author: Mozaffari Mehdi
Publisher: Routledge Ltd
ISSN: 1469-0764
Source: Totalitarian Movements and Political Religions, Vol.8, Iss.1, 2007-03, pp. : 17-33
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content


Review of Politics, Vol. 20, Iss. 4, 1958-10 ,pp. :


A Review of: “Atlantic History: Concept and Contours”
American Foreign Policy Interests, Vol. 28, Iss. 1, 2006-02 ,pp. :


What's the Use of Cryptologic History?
Intelligence and National Security, Vol. 25, Iss. 6, 2010-12 ,pp. :


Islamism in Azerbaijan: How Potent?
Studies in Conflict and Terrorism, Vol. 32, Iss. 8, 2009-08 ,pp. :