Biblio
Export 21400 results:
Computer Crimes." American Criminal Law Review 36, no. 397 (1999): 406.
"Computer Hacking and Cyber Terrorism: The Real Threats in the New Millennium." Computers and Security 18, no. 1 (1999): 30-32.
"Computer Network Attack and the Use of Force in International Law: Thought on a Normative Framework." Columbia Journal of International Law 37, no. 3 (1999): 893.
" Computers Change Rules of War, Civilians Still Get Hurt." The Washington Times (1999).
"Computers Change Rules of War, Civilians Still Get Hurt." The Washington Times (1999).
"Computing with Words in Information/Intelligent Systems – Part 1: Foundations. Berlin Heidelber: Springer, 1999.
"The Concept for the Development of the Defense Establishment until 2004 with Outlook to 2009." Vojenské rozhledy 4 (1999): 3-15.
Conceptualizing the European Union as an International Actor: Narrowing the Theoretical Capability–Expectations Gap." Journal of Common Market Studies 37, no. 3 (1999): 429-454.
"Conclusions of the Presidency. Tampere European Council, 1999.
Conflict Prevention in the Euro-Med Partnership: Challenges and Prospects." The International Spectator 24, no. 2 (1999): 17-31.
"Considerations and Issues for Distributed Mission Training Computer-Generated Actors In Eighth Conference on Computer Generated Forces and Behavioral Representation. Orlando FL, 1999.
Constitution of Nigeria., 1999.
Contemporary Islam: Reformation or Revolution?” in The Oxford History of Islam." New York: Oxford University Press, 1999.
"Cooperation between Organized Crime Groups around the World. Research Institute for the Study of Conflict and Terrorism, 1999.
Cornerstones of Decision Making: Profiles of Enterprise ABM . Greensboro, NC: Oakhill Press, 1999.
Corruption and Government: Causes, Consequences, and Reform. Cambridge: Cambridge University Press, 1999.
Cost-Benefit Analysis for Public Sector Decision Makers. Westport, Connecticut: Quorum Books, 1999.
Cost-Benefit Analysis for Public Sector Decision Makers . Westport, Connecticut: Quorum Books, 1999.
Cost-Risk Analysis Seminar – Its Role in Proposal Preparation, System Development, and Program Control. The Aerospace Corporation, 1999.
Crime Methods Utilizing Bank Cards." Information Technologies for Information Protection 3, no. 1 (1999): 50-67.
"Criminal pulp fiction with a horoscope (Кримінальна пульпа фантастика з гороскопом)." Stolichnie novosti (1999): 1,5.
"Crisis in the Balkans; Clinton’s Remarks in Defense of Military Intervention in the Balkans." New York Times (1999).
"Crisis in Yugoslavia – Battle Spilling Over Onto the Internet." Los Angelis Times (1999).
"Cryptanalysis of a Remote Login Authentication Scheme." Computer Communications 22 (1999): 742-744.
"