

Author: Ganor Boaz
Publisher: Routledge Ltd
ISSN: 1352-3260
Source: Contemporary Security Policy, Vol.34, Iss.1, 2013-04, pp. : 226-232
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content


US counter-terrorism: Change in approach, continuity in policy
By Badey Thomas
Contemporary Security Policy, Vol. 27, Iss. 2, 2006-08 ,pp. :




Legislative cohesion and presidential policy success
Journal of Legislative Studies, Vol. 9, Iss. 4, 2003-0 ,pp. :




Security and Human Rights Policy: Israel and the Interrogation Case of 1999
Contemporary Security Policy, Vol. 28, Iss. 3, 2007-12 ,pp. :