Biblio
Export 21403 results:
Information classification using fuzzy knowledge based agents." In IEEE International Conference on Systems, Man and Cybernetics. e-Systems and e-Man for Cybernetics in Cyberspace. Tucson, AZ, USA, USA , 2001.
"Information Security: Semeiotic and Economic Aspects In 4th Annual Conference of the PfP Consortium of Defense Academies and Security., 2001.
Information Soft Computing Agents in Network Management In International Conference on Automatics and Informatics. Sofia, Bulgaria, 2001.
Information Support for Effective Resource Management." Information & Security: An International Journal 6 (2001): 138-150.
"Information Technology for Training Forces of Peacekeeping Operations In Telematics and Life-Long Learning. Proceeding of the International Workshop TLLL-2001 . Kyiv, Ukraine, 2001.
Information Warfare: Combat Hackers and Cyber Attackers. Berkeley, California: : Osborne McGraw-Hill, 2001.
Infrastructure Interdependencies: Overview of Concepts and Terminology In Infrastructure Assurance Center, Argonne National Laboratory. Argonne: Wiley Interscience, 2001.
The Inherent Limits of Military Forces in Policing Peace Operations." Interna-tional Peacekeeping 8, no. 3 (2001).
""Insurance medicine: for and against (Страхова медицина: за і проти)." Uriadovyi kur’er (Government courier) (2001): 7.
Integration of Open Education to Information Society In Internet and Modern Society., 2001.
Intelligence and Law Enforcement: Countering Transnational Threats to the U.S In Report for Congress. Congressional Research Service, 2001.
Intelligence Services in the Information Age: Theory and Practice ." In Ethics in International Relations: The Role of Intelligence Services after September 11. CSRC, RMA Sandhurst, M24, 2001.
"Interaktive Simulationen zum Krisenmanagement In Krisenproblematik., 2001.
Intermediating Technologies and Multi-Group Adoption: A Comparison of Consumer and Merchant Adoption Intentions toward a New Electronic Payment System." The Journal of Product Innovation Management 18, no. 2 (2001): 65-71.
"International Security and Law EnforcementA Look Ahead In speech at the Law Enforcement and National Security Global Forum. Edinburgh, 2001.
The Internet and State Control in Authoritarian Regimes: China, Cuba, and the Counterrevolution." Carnegie Endowment Working Papers (2001).
"Internet, Civil Society and Global Governance: The Neglected Political Dimension of the Digital Divide." Information & Security: An International Journal 7 (2001): 45-64.
"The Internet in China: Civilian and Military Uses." Information & Security: An International Journal 7 (2001): 159-173.
"Internet security experts of SRI International." New Yorker 28 (2001).
"Internet X.509 Public Key Infrastructure Qualified Certificates Profile In The Internet Engineering Task Force (IETF)., 2001.
Introduction – Crisis and Emergency Management." In Handbook of Crisis and Emergency Management.. New York/ Basel: Marcel Dekker, 2001.
"Introduction: European Security and the Enlargement of NATO." In Enlarging NATO: The National Debates, 6. Boulder, CO: Lynne Rienner Publishers, 2001.
"Introduction to Cryptography. Berlin: Springer-Verlag, 2001.