Reducing Threats at the Source: A European Perspective on Cooperative Threat Reduction by Ian AnthonyReducing Threats at the Source: A European Perspective on Cooperative Threat Reduction by Ian Anthony

Reducing Threats at the Source: A European Perspective on Cooperative Threat Reduction

byIan Anthony

Paperback | April 22, 2004

not yet rated|write a review

Pricing and Purchase Info

$59.21 online 
$66.50 list price save 10%
Earn 296 plum® points

Ships within 1-3 weeks

Ships free on orders over $25

Not available in stores

about

This report reviews the current cooperative threat reduction activities with a particular focus on projects and approaches engaging European partners. It examines the organizing principles for cooperative threat reduction and the lessons learned from past project implementation. Finally, itexamines how European countries might organize their cooperative threat reduction activities to increase their coherence and effectiveness.

About The Author

Ian Anthony is a SIPRI Project Leader.
The Book Of Lenity
The Book Of Lenity

by Ian-Anthony Finnimore

$4.99

Available for download

Not available in stores

The Ancient Murrelet: A Natural History in the Queen Charlotte Islands
The Ancient Murrelet: A Natural History in the Queen Charlotte Islands

by Anthony J. Gaston

$19.19$23.99

Available for download

Not available in stores

Shop this author

Details & Specs

Title:Reducing Threats at the Source: A European Perspective on Cooperative Threat ReductionFormat:PaperbackDimensions:130 pages, 8.5 × 5.43 × 0.33 inPublished:April 22, 2004Publisher:Oxford University PressLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:019927178X

ISBN - 13:9780199271788

Look for similar items by category:

Customer Reviews of Reducing Threats at the Source: A European Perspective on Cooperative Threat Reduction

Reviews

Extra Content

Table of Contents

1. Introduction2. The Framework for Cooperative Threat Reduction3. Cooperative Threat Reduction Project Management and Implementation4. Conclusions