Biblio
Export 21400 results:
Management of the Information Systems Development Life Cycle." Trakia Journal of Sciences 1, no. 4 (2003): 8-12.
"Managing Change. The Reform and Democratic Control of the Security Sector and International Order." In Security Sector Reform: Institutions, Society and Good Governance. Baden-Baden: Nomos, 2003.
"Managing Complex Safety Cases In Safety Critical System Symposium Berlin: Springer., 2003.
Managing Complex Safety Cases In 11th Safety Critical System Symposium ., 2003.
Managing Resources for Defence and Security." In Programme of Integration of the Republic of Bulgaria into NATO, edited by Konstantin Dimitrov and Velizar Shalamanov. Sofia: Institute for Euroatlantic Security, 2003.
"Managing the Normative Context of Composite e-Services In International Conference on Web Services (ICWS-Europe’2003). Erfurt, Germany, 2003.
Map building by mobile robots in unknown environment In Shanghai Jiao Tong University. Vol. Ph. D. Thesis., 2003.
Market Civilization and Its Clash with Terror." International Security 27, no. 3 (2003): 5-29.
"Mathematical Model of Fuzzy Control System for Autonomous Guided Vehicle in 3D Space." Information & Security: An International Journal 12, no. 2 (2003): 195-207.
"MATLAB Source Code for a Biometric Identification System Based on Iris Patterns. School of Computer Science and Software Engineering, University of Western Australia, 2003.
Maximising Student Exposure to Unix Networking using FreeBSD Virtual Hosts In Technical Report. CAIA, 2003.
MDA Explained: The Model Driven Architecture Practice and Promise. Addison Wesley, 2003.
A Means of Comparing Military Budgeting Processes in South East Europe." Information & Security: An International Journal 11 (2003): 95-135.
"Media, Civil Society and Public Policy." In Defence and Security Sector Governance and Reform in South Easter Europe: Insights and Perspectives, edited by Jan A. Trapans and Philipp H. Fluri, 269-280. Vol. 1. Geneva/Belgrade: Geneva Centre for the Democratic Control of Armed Forces, 2003.
"Methodology for Assessing Possible Damage from the Security Violation of the Information of the Automated System." Yzvestyia TRTU 4, no. 33 (2003): 27-31.
"Militärische Bundesintervention bei inländischem Terrorakt." Neue Zeitschrift für Wehrrecht (2003): 154-67.
"Militärkommando Niederösterreich: Das Katastro-pheneinsatzkonzept [Provincial Military Command/Lower Austria: Disaster Relief Concept]." Truppendienst 2 (2003).
"Militarne operacje informacyjne. Warsaw: AON, 2003.
The Military as an Economic Actor: Soldiers in Business. New York: Palgrave Macmillan, 2003.
The Military Balance 2002-2003. London: The Institute for Strategic Studies, 2003.
Military Technology." Mine Hunting & Mine Clearing Revisited (2003): 48.
"Mind the Three Transatlantic Power Gaps: How a New Framework Can Help Reinvent the Transatlantic Relationship." Connections: The Quarterly Journal 2, no. 3 (2003): 35-49.
"Ministerial Conference on the Drug Routes from Central Asia to Europe." In Ministerial Conference on the Drug Routes from Central Asia to Europe. Paris , 2003.
"Mobile commerce over GSM: A banking perspective on security In Faculty of Engineering. Vol. Master of Science (Electronics). University of Pretoria, 2003.
Mobile Lunar and Planetary Bases." In Space 2003 Conference . San Diego, CA, 2003.
"