Biblio

Export 18555 results:
1995
Weiss, Thomas G., and Jarat Choppa. "Sovereignty under Siege: From Intervention to Humanitarian Space." In Beyond Westphalia? State Sovereignty and International Intervention. Baltimore: Johns Hopkins University Press, 1995.
de Secondat, Charles, and Baron de Montesquieu. The Spirit of Laws. Cambridge University Press, 1995.
Donaldson, Thomas, and Lee E. Preston. "Stakeholder Theory of the Corporation: Concepts, Evidence and Implications." The Academy of Management Review 20, no. 1 (1995): 65-91.
Chilcoat, Richard. Strategic Art: The New Discipline for 21st Century Leaders. Carlisle, PA: U.S. Army War College, 1995.
Study on Enlargement. Brussels: NATO Office of Information and Press, 1995.
Mankins, John C.. Technology Readiness Levels: A White Paper. NASA, Office of Space Access and Technology, 1995.
Szafranski, Richard. "A Theory of Information Warfare. Preparing for 2020." Airpower Journal 9, no. 1 (1995): 56-65.
Johnston, Alistair Iain. "Thinking about Strategic Culture." International Security 19, no. 4 (1995): 37-39.
Merton, Robert. "The Thomas Theorem and the Matthew Effect?" Social Forces 74, no. 2 (1995): 380.
Geifman, Anna. Thou Shalt Kill: Revolutionary Terrorism in Russia, 1894–1917. Princeton, NJ: Princeton University Press, 1995.
Cline, Lydia Sloan. Today’s Military Wife: Meeting the Challenges of Service Life. Mechanicsburg, PA: Stackpole Books, 1995.
TOPAZ International Program: Lessons Learned in Technology Cooperation with Russia. Springfield, VA: Stephenson Printing, 1995.
Endsley, Mica R.. "Toward a Theory of Situation Awareness in Dynamic Systems." Human Factors (1995).
Jaggers, Keith, and Ted Robert Gurr. "Tracking Democracy’s Third Wave with the Polity III Data." Journal of Peace Research 31, no. 4 (1995).
Shelley, L.. "Transnational Organized Crime: An Imminent Threat to the Nation-State?" Journal of International Affairs 48, no. 2 (1995): 463.
Hwang, Min-Shiang, and Wei-Pang Yang. "A Two-Phase Encryption Scheme for Enhancing Database Security." Journal of Systems and Software 31, no. 12 (1995): 257-265.
Chumak, V.. Ukraine and the Crimea: a phenomenon border of Europe and the Orient (Україна та Крим: феномен кордону Європи та Сходу). Kyiv, 1995.
UN Security Council Resolution 1010 In UN Document., 1995.
UN Security Council Resolution 975., 1995.
Ding, Yun, and Patrick Horster. "Undetectable On-Line Password Guessing Attacks." ACM Operating Systems Review 29, no. 4 (1995): 77-86.
The United Nations Manual on the Prevention and Control of Computer Related Crime. International Review of Criminal Policy, 1995.
UNMIH After Action Report. BCTP archives, 1995.
UNMIH Facilitator Training In Battle Command Training Program. Vol. unpublished manuscript. BCTP archives, 1995.
UNMIH Training Schedule In Battle Command Training Program. BCTP archives, 1995.
Kulik, Mikhail, and Vladimir Orlov. "Uranovaya Krazha: Istoriya Guby Andreeva, (Theft of Uranium: History of Guba Andreeva)." Moskovskiye Novosti (1995).

Pages