Biblio

Export 21337 results:
2002
Koulouri, Christina. Clio in the Balkans: The Politics of History Education. Thessaloniki: CDRSEE, 2002.
Lesser, Ian O.. "Coalition Dynamics in the War against Terrorism." The International Spectator 2 (2002): 43-50.
Frank, Thomas. "Coast Guard Faces New Security Role: Some Fear A Reduction of Boat-Safety Duties." Newsday (2002).
Callahan, Philip D.. The Code of the Warrior, The Kinder, Gentler Military and Marksmanship: Changing a Culture In USAWC Strategy Research Project. Carlisle Barracks, PA: U.S. Army War College, 2002.
Chang, Chin-Chen, Ju Yuan Hsiao, and Jyh-Chiang Yeh. "A Colour Image Copyright Protection Scheme based on Visual Cryptography and Discrete Cosine Transform." The Imaging Science Journal (2002): 133-140.
K., Sentz, and Ferson S. Combination of evidence in Dempster-Shafer Theory In SANDIA Tech. Report, SAND2002-0835., 2002.
Moffat, James. Command and Control in the Information Age – Representing its Impact. London, UK: The Stationery Office, 2002.
Baranovsky, V.G.. "Common European Security and Defence Policy: Horizons of the Russian Perception." Connections: The Quarterly Journal 1, no. 1 (2002): 22-28.
Eggers, Joachim, Robert Bäuml, and Bernd Girod. A Communications Approach to Image Steganography In Security and Watermarking of Multimedia Contents IV, Proceedings of SPIE., 2002.
Radeski, Alex, Shawn Parr, Russell Keith-Magee, and John Wharington. Component-Based Development Extensions to HLA In 2002 Spring Simulation Interoperability Workshop. Vol. Paper ID 02S-SIW-046. SISO, 2002.
Huber, Thomas M.. Compound Warfare: That Fatal Knot. Fort Leavenworth, Kansas: U.S. Army Command and General Staff College Press, 2002.
Silver, Daniel. Computer Network Attack as a Use of Force under Article 2(4) In International Law Studies ., 2002.
Preston, Ethan M., and John Lofton. "Computer Security Publications: Information Economics, Shifting Liability and the First Amendment." Whither Law Review 24, no. 71 (2002): 130.
"Concept for the Development of a Professional Army of the Czech Republic and Mobilization of Armed Forces." Vojenské rozhledy 3 (2002).
Faupin, Alain. "Conclusion." Connections: The Quarterly Journal 1, no. 3 (2002): 77-79.
Hutchinson, Asa. Congressional Testimony before the Senate Judiciary Committee’s Subcom-mittee on Technology, Terrorism and Government Information about Narco-Terror: The World Connection Between Drugs and Terror., 2002.
Mihaylova, Lyudmila, Tine Lefebvre, Ernesto Staffetti, Herman Bruyninckx, and Joris De Schutter. "Contact Transitions Tracking During Force-Controlled Compliant Motion Using an Interacting Multiple Model Estimator." Information & Security: An International Journal 9 (2002): 114-129.
Marsh, David. Content and Language Integrated Learning: The European Dimension—Actions, Trends and Foresight Potential. DG Education & Culture, European Commission, 2002.
CORBA Component Model Tutorial. OMG CCM Implementation Group, 2002.
Zhdanov, Igor. "Corruption in Ukraine: Essence, Scale, and Influence." Connections: The Quarterly Journal 1, no. 2 (2002): 33-49.
Beck, Ulrich. "The Cosmopolitan Society and its Enemies." Theory, Culture and Society 19, no. 1-2 (2002): 17-44.
Council Directive 2002/58/EC Concerning the Processing of Personal Data and the Protection of Privacy in the Electronic Communications Sector (Directive on Privacy and Electronic Communications)., 2002.
“Council Joint Action on the European Union Police Mission In doc. 6823/02, 11/03/02. Council of the European Union, 2002.
Council of Ministers Decree No. 103 dated March 31, 2002 on “Monitoring of environment in Republic of Albania”., 2002.
Jenkins, Brian M.. Countering Al Qaeda. Santa Monica, CA: Rand Corporation, 2002.

Pages