Biblio

Export 21400 results:
1999
Gibbens, Mathias. Honeypots., 1999.
Alterman, Jonh, Teresita Schaffer, Paul Wilkinson, and Martha Crenshaw. How Terrorism Ends. United States Institute of Peace Special Report, 1999.
Elliott, Linda, and Andrew Borden. "Human Intuition and Decision-making Systems (II)." Information &Security : An International Journal 2 (1999): 50-54.
Elliott, Linda, and Andrew Borden. "Human Intuition and Decision-making Systems (II)." Information & Security: An International Journal 2 (1999): 50-54.
Suhrke, Astri. "Human Security and the Interests of States." Security Dialogue 30, no. 3 (1999): 265-76.
Laurence, Tim. Humanitarian Assistance and Peacekeeping: An Uneasy Alliance In Whitehall Paper Series. The Royal United Services Institute for Defence Studies (RUSI), 1999.
Knudsen, TB. Humanitarian Intervention and International Society: Contemporary Manifestations of an Explosive Doctrine In Aarhus, Denmark: University of Aarhus., 1999.
Shelton, Charlotte. "If Your Only Tool Is a Hammer." Perspectives 13, no. 1 (1999): 71-82.
Angelova, Donka, Emil Semerdjiev, Ludmila Mihaylova, and Rong X. Li. "An IMMPDAF Solution to Benchmark Problem for Tracking in Clutter and Stand-off Jammer." Information & Security: An International Journal 2 (1999): 55-68.
Markides, Constantinos C.. "“In Search of Strategy." MIT Sloan Management Review 40, no. 3 (1999).
Petitcolas, Fabien, Ross Anderson, and Markus Kuhn. "Information Hiding – A Survey." Proceedings of the IEEE 87, no. 7 (1999).
Editorial. "Information Security and Multisensor Data Processing." Information & Security: An International Journal 2 (1999): 5-11.
Eriksson, Anders E.. "Information Warfare: Hype Or Reality." The Non-Proliferation Review (1999).
Stein, Willi. Information Warfare in the Context of Security-related Issues In RMA Breda: NL ARMS – Netherlands Annual Review of Military Studies, Edited by J.M.J. Bosch, H.A.M. Luiijf and A.R. Mollema., 1999.
Monitor, ISIJ. "Information warfare principles and operations." Information & Security: An International Journal 2 (1999): 141-157.
Zięba, Ryszard. Instytucjonalizacja bezpieczeństwa europejskiego. Koncepcje – struktury – funkcjonowanie. Warsaw: Scholar, 1999.
Meier, Christoph. "Integrating Topographical and Topological Data in the Estimation of the Actual Traffic Situation on Airports." Information & Security: An International Journal 2 (1999): 23-32.
Fox, G.C., W. Furmanski, B. Natarajan, H.T. Ozdemir, Odcikin Z. Ozdemir, S. Pallickara, and T. Pulikal. "Integrating Web, Desktop, Enterprise and Military Simulation Technologies to Enable World-Wide Scalable Televirtual Environments." Information & Security: An International Journal 3 (1999): 149-160.
Mihaylova, Ludmila, and Emil Semerdjiev. "An Interacting Multiple Model Algorithm for Stochastic Systems Control." Information & Security: An International Journal 2 (1999): 102-112.
Semerdjiev, Emil, Ludmila Mihaylova, Tzvetan Semerdjiev, and Violeta Bogdanova. "Interacting Multiple Model Algorithms for Manoeuvring Ship Tracking Based On New Ship Models." Information & Security: An International Journal 2 (1999): 122-137.
Interim Agreement for Peace and Self-Government in Kosovo (Rambouillet Agreement)., 1999.
Woodhouse, Tom. "International Conflict Resolution: Some Critiques and a Response." In Centre for Conflict Resolution citing International Alert, Goodhand & Lewer, Goodhand & Hume., 1999.
Greenwood, Christopher. International Humanitarian Law and the Laws of War In Preliminary Report for the Centennial Commemoration of the First Hague Peace Conference 1899 ., 1999.
International legal acts and the legislation of individual countries on corruption (Міжнародні правові акти та законодавство окремих країн про корупцію). Kyiv, 1999.
Housley, Russell, Warwick Ford, W. Polk, and David Solo. Internet X.509 Public Key Infrastructure, Certificate and CRL Profile In Internet Draft, The Internet Engineering Task Force (IETF), PKIX Working Group., 1999.

Pages