Nanotechnology: The Need for the Implementation of the Precautionary Approach beyond the EU.
Samo za registrovane korisnike
2011
Konferencijski prilog (Objavljena verzija)
Metapodaci
Prikaz svih podataka o dokumentuIzvor:
Understanding and Managing Threats to the Environment in South Eastern Europe. NATO Science for Peace and Security Series C: Environmental Security, 2011, 205-224Izdavač:
- Springer, Dordrecht
Kolekcije
Institucija/grupa
FBTY - CONF AU - Dimitrijević, D. PY - 2011 UR - https://rhinosec.fb.bg.ac.rs/handle/123456789/146 PB - Springer, Dordrecht C3 - Understanding and Managing Threats to the Environment in South Eastern Europe. NATO Science for Peace and Security Series C: Environmental Security T1 - Nanotechnology: The Need for the Implementation of the Precautionary Approach beyond the EU. SP - 205 EP - 224 ER -
@conference{ author = "Dimitrijević, D.", year = "2011", publisher = "Springer, Dordrecht", journal = "Understanding and Managing Threats to the Environment in South Eastern Europe. NATO Science for Peace and Security Series C: Environmental Security", title = "Nanotechnology: The Need for the Implementation of the Precautionary Approach beyond the EU.", pages = "205-224" }
Dimitrijević, D.. (2011). Nanotechnology: The Need for the Implementation of the Precautionary Approach beyond the EU.. in Understanding and Managing Threats to the Environment in South Eastern Europe. NATO Science for Peace and Security Series C: Environmental Security Springer, Dordrecht., 205-224.
Dimitrijević D. Nanotechnology: The Need for the Implementation of the Precautionary Approach beyond the EU.. in Understanding and Managing Threats to the Environment in South Eastern Europe. NATO Science for Peace and Security Series C: Environmental Security. 2011;:205-224..
Dimitrijević, D., "Nanotechnology: The Need for the Implementation of the Precautionary Approach beyond the EU." in Understanding and Managing Threats to the Environment in South Eastern Europe. NATO Science for Peace and Security Series C: Environmental Security (2011):205-224.