Biblio

Export 21400 results:
2002
Dalglish, Lucy A., Gregg P. Leslie, and Phillip Taylor. "Homefront Confidential: How the War on Terrorism Affects Access to Information and the Public’s Right to Know." The Reporters Committee for Freedom of the Press (2002).
Seiple, Chris. "Homeland Security Concepts and Strategy." Orbis 46, no. 2 (2002).
Spitzner, Lance. Honeypots: Tracking Hackers. Addison Wesley, 2002.
Hinkle, Gene. Hong Kong ID Project to Use Smart Card Management Software from ACI Worldwide. ACI Worldwide, 2002.
"Hopes Betrayed: Trafficking of Women and Girls to Post-Conflict Bosnia and Herzegovina for Forced Prostitution." Human Rights Watch Reports 14, no. 9 (2002).
DeVille, Duncan. "How to Split Up the Bipolar F.B.I." New York Times (2002).
Human Development Report 2002: Deepening Democracy in a Fragmented World . New, NY/Oxford: Oxford University Press, 2002.
Mandelbaum, Michael. The Ideas That Conquered the World: Peace, Democracy, and Free Markets in the Twenty-First Century. New York: Public Affairs, 2002.
De Brucq, D., A. Sombo, and O. Colot. Identical Foundation of Probability Theory and Fuzzy Set Theory In 5th Intern. Conf. on Inf. Fusion. Annapolis, 2002.
Smart, Nigel. "An Identity Based Authentication Key Agreement Protocol Based on Pairing." Electronics Letters 38 (2002).
Rahim, Taiba. "An Identity of Strength: Personal Thoughts on Women in Afghanistan." Interna-tional Review of the Red Cross 847 (2002): 638.
IJCAI-99 Workshop on Ontologies, Problem-Solving Methods: Lessons Learned, and Future Trends., 2002.
Borov, Zaur, and Stephen Bowers. Illegal Weapons Traffic in Eastern Europe. Harrisonburg, VA: Nelson Institute for International and Public Affairs, James Madison University, 2002.
IMF Fiscal Transparency Homepage., 2002.
Galbraith, Steven, Keith Harrison, and David Soldera. "Implementing the Tate pairing." Algorithmic Number Theory, Lecture Note in Computer Science 2369 (2002).
Bojilov, Ljudmil. "An Improved Version of a Multiple Target Tracking Algorithm." Information & Security: An International Journal 9 (2002): 130-140.
Hwang, Jing-Jang, and Tzu-Chang Yeh. "Improvement on Peyravian-Zunic’s Password Authentication Schemes." IEICE Transactions on Communications E85-B, no. 4 (2002): 823-825.
Kotangian, Hayk. "In Agenda: Multi-Polar and Complementary Defense Policy." Golos Armenii (2002).
Krastev, Ivan. The Inexibility Trap: Frustrated Societies, Weak States and Democracy. Bratislava: United Nations Development Programme, 2002.
Monitor, ISIJ. "In memoriam." Information & Security: An International Journal 9 (2002): 177-179.
Chalmers, Malcolm, and Owen Greene. In Need of Attention: The UN Register in its Seventh Year. Bradford Arms Register Studies, 2002.
Lindley-French, Julian. "In the Shade of Locarno. Why European Defence is Failing." International Affairs 78, no. 4 (2002).
Flin, Rhona H., and Kevin Arbuthnot. Incident Command: Tales from the Hot Seat . Aldershot: Ashgate Publishing Company, 2002.
Milly, P.C.D., T. L. Delworth, K.A. Dunne, and R.T. Wetherald. "Increasing risk of great floods in a changing climate." Nature 415 (2002): 514-517.
Langit, Rachel. "Indonesia’s Military Business as Usual." Asia Times Online (2002).

Pages