熱門搜尋
分類(單選) |
顯示所有篩選
|
---|---|
配送方式(可複選) | |
其他(可複選) |
搜尋結果共 23 筆, 頁數 1 / 1
呈現:
Engaging China: Rebuilding Sino-American Relations
In Engaging China, Gurtov identifies and details the many facets of China that worry critics. But he also argues for a...... more |
|||
Engaging China: Rebuilding Sino-American Relations
In Engaging China, Gurtov identifies and details the many facets of China that worry critics. But he also argues for a...... more |
|||
The Transformation of Socialism: Perestroika and Reform in the Soviet Union and China
|
|||
America in Retreat: Foreign Policy Under Donald Trump
Trump’s foreign policy. Mel Gurtov provides detailed case studies of policy toward key countries and regions, including...... more |
|||
America in Retreat: Foreign Policy Under Donald Trump
Trump’s foreign policy. Mel Gurtov provides detailed case studies of policy toward key countries and regions, including...... more |
|||
A Comprehensive Guide to 5G Security
The first comprehensive guide to the design and implementation of security in 5G wireless networks a... more |
|||
Engaging Adversaries: Peacemaking and Diplomacy in the Human Interest
start on the path to peaceful, mutually productive relations. Writing with authority and clarity, Mel Gurtov defines the...... more |
|||
Engaging Adversaries: Peacemaking and Diplomacy in the Human Interest
start on the path to peaceful, mutually productive relations. Writing with authority and clarity, Mel Gurtov defines the...... more |
|||
Software Defined Mobile Networks (Sdmn): Beyond Lte Network Architecture
This book describes the concept of a Software Defined Mobile Network (SDMN), which will impact the n... more |
|||
Structured Peer-To-Peer Systems: Fundamentals of Hierarchical Organization, Routing, Scaling, and Security
The field of structured P2P systems has seen fast growth upon the introduction of Distributed Hash T... more |
|||
Structured Peer-To-Peer Systems: Fundamentals of Hierarchical Organization, Routing, Scaling, and Security
The field of structured P2P systems has seen fast growth upon the introduction of Distributed Hash T... more |
|||
Confronting The Bush Doctrine: Critical Views From The Asia-Pacific
There is no doubt that President George W. Bush and his administration have transformed US foreign p... more |
|||
Pacific Asia?: Prospects for Security and Cooperation in East Asia
Emphasizing human and environmental security over traditional power politics, Mel Gurtov offers a provocative...... more |
|||
The First Vietnam Crisis: Chinese Communist Strategy and United States Involvement, 1953-1954
|
|||
Roots of Failure: United States Policy in the Third World
|
|||
The Transformation of Socialism: Perestroika and Reform in the Soviet Union and China
|
|||
Learning from Fukushima: Nuclear power in East Asia
Learning from Fukushima began as a project to respond in a helpful way to the March 2011 triple disa... more |
|||
Will This Be China’s Century?: A Skeptic’s View
|
|||
Will This Be China’s Century?: A Skeptic’s View
|
|||
Host Identity Protocol (HIP): Towards the Secure Mobile Internet
Within the set of many identifier-locator separation designs for the Internet, HIP has progressed fu... more |
|||
Superpower on Crusade: The Bush Doctrine in US Foreign Policy
|
|||
Superpower on Crusade: The Bush Doctrine in US Foreign Policy
|
|||
Confronting The Bush Doctrine: Critical Views From The Asia-Pacific
|