Biblio
Export 8062 results:
"Regulating the Internet." The Economist (2000).
Relearning the ABCs: Terrorists and “Weapons of Mass Destruction"." Nonproliferation Review 110 (2000).
"Religious Minorities in Iran . Cambridge: Cambridge University Press, 2000.
Report of the Defense Science Board Task Force on Defense Software. Washington, D.C.: Defense Science Board, 2000.
Report of the First Committee In Resolution adopted by the UN General Assembly., 2000.
Report of the Panel on United Nations Peace Operations (Brahimi Report). United Nations, 2000.
Report of the Secretary-General on the Implementation of the Report of the Panel on United Nations Peace Operations. United Nations, 2000.
Report Out of the C4I Study Group. Orlando, Florida: Fall Simulation Interoperability Workshop , 2000.
Resolution 1325 on Women, Peace and Security. United Nations Security Council , 2000.
Restoring Normalcy’: The Evolution of the Indian Army's Counterinsurgency Doctrine." Small Wars & Insurgencies 11, no. 1 (2000): 44.
"Rewolucja nadziei. Ku uczłowieczonej technologii. Poznań: Rebis, 2000.
The RMA – Europe Can Keep in Step In Occasional Paper. Paris: ISS-WEU, 2000.
The Road to Monetary Union in Europe: The Emperor, the Kings, and the Genies . Oxford: Oxford University Press, 2000.
Rossiya (SSSR) v lokalnykh voynakh i voennych konfliktakh vtoroy poloviny XX veka. Moscow: Kuchkovo Pole, 2000.
The Rule of Law in Kosovo: Problems and Prospects." Criminal Law Forum 11, no. 2 (2000): 132.
"Russia, NATO and European Security after Kosovo." Survival 41, no. 4 (2000): 124-44.
"Russian Strategy in the Chechnya Wars In Parameter bewaffneter Konflikte. Studien und Berichte zur Sicherheitspolitik. Vienna: Schriftenreihe der Landesverteidi-gungsakademie, 2000.
"Russia's National Security Concept." Arms Control Today (2000).
Scientific Research and Development in NATO." Military Journal 107, no. 4 (2000): 81-90.
"The Second Generation Problematic: Rethinking Democratic Control of Armed Forces in Central and Eastern Europe. Transformation of Civil-Military Relations Paper 1.7, December, 2000.
Secrets & Lies—Digital Security in a Networked World. New York: John Wiley & Sons, 2000.
A secure nonrepudiable threshold proxy signature scheme with known signers." International Journal of Informatica 11, no. 2 (2000).
"Securing the Electronic Market: the KEYSTONE Public Key Infrastructure Architecture." Computers and Security Journal 19, no. 8 (2000): 731-746.
"Security Sector Reform in Central and Eastern Europe: The Work of Civilians and the Military. Groningen: Centre for European Security Studies, 2000.
Страници
- « първа
- ‹ предишна
- …
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- …
- следваща ›
- последна »