Singapore's security challenges : how does the RMA fits in?
Saved in:
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Commentary |
Published: |
2008
|
Online Access: | https://hdl.handle.net/10356/92009 http://hdl.handle.net/10220/4058 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
id |
sg-ntu-dr.10356-92009 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-920092020-11-01T07:12:18Z Singapore's security challenges : how does the RMA fits in? Ho, Joshua Singh, Manjeet Pardesi S. Rajaratnam School of International Studies 2008-11-13T02:53:51Z 2009-07-29T06:29:00Z 2019-12-06T18:15:43Z 2008-11-13T02:53:51Z 2009-07-29T06:29:00Z 2019-12-06T18:15:43Z 2004 2004 Commentary Ho, J., & Singh, M. P. (2004). Singapore's security challenges : how does the RMA fits in? (RSIS Commentaries, No. 028). RSIS Commentaries. Singapore: Nanyang Technological University. https://hdl.handle.net/10356/92009 http://hdl.handle.net/10220/4058 RSIS Commentaries ; 28/04 Nanyang Technological University 4 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
author2 |
S. Rajaratnam School of International Studies |
author_facet |
S. Rajaratnam School of International Studies Ho, Joshua Singh, Manjeet Pardesi |
format |
Commentary |
author |
Ho, Joshua Singh, Manjeet Pardesi |
spellingShingle |
Ho, Joshua Singh, Manjeet Pardesi Singapore's security challenges : how does the RMA fits in? |
author_sort |
Ho, Joshua |
title |
Singapore's security challenges : how does the RMA fits in? |
title_short |
Singapore's security challenges : how does the RMA fits in? |
title_full |
Singapore's security challenges : how does the RMA fits in? |
title_fullStr |
Singapore's security challenges : how does the RMA fits in? |
title_full_unstemmed |
Singapore's security challenges : how does the RMA fits in? |
title_sort |
singapore's security challenges : how does the rma fits in? |
publishDate |
2008 |
url |
https://hdl.handle.net/10356/92009 http://hdl.handle.net/10220/4058 |
_version_ |
1683493747239682048 |