Biblio
Export 21441 results:
Report of the Panel on United Nations Peace Operations (Brahimi Report). United Nations, 2000.
Report of the Secretary-General on the Implementation of the Report of the Panel on United Nations Peace Operations. United Nations, 2000.
Report Out of the C4I Study Group. Orlando, Florida: Fall Simulation Interoperability Workshop , 2000.
Resolution 1325 on Women, Peace and Security. United Nations Security Council , 2000.
Restoring Normalcy’: The Evolution of the Indian Army's Counterinsurgency Doctrine." Small Wars & Insurgencies 11, no. 1 (2000): 44.
"Rewolucja nadziei. Ku uczłowieczonej technologii. Poznań: Rebis, 2000.
The RMA – Europe Can Keep in Step In Occasional Paper. Paris: ISS-WEU, 2000.
The Road to Monetary Union in Europe: The Emperor, the Kings, and the Genies . Oxford: Oxford University Press, 2000.
Rossiya (SSSR) v lokalnykh voynakh i voennych konfliktakh vtoroy poloviny XX veka. Moscow: Kuchkovo Pole, 2000.
The Rule of Law in Kosovo: Problems and Prospects." Criminal Law Forum 11, no. 2 (2000): 132.
"Russia, NATO and European Security after Kosovo." Survival 41, no. 4 (2000): 124-44.
"Russia: New Eastern Perspectives. in Russian ed. official site of the President of Russia, 2000.
Russian Strategy in the Chechnya Wars In Parameter bewaffneter Konflikte. Studien und Berichte zur Sicherheitspolitik. Vienna: Schriftenreihe der Landesverteidi-gungsakademie, 2000.
"Russia's National Security Concept." Arms Control Today (2000).
Scientific Research and Development in NATO." Military Journal 107, no. 4 (2000): 81-90.
"The Second Generation Problematic: Rethinking Democratic Control of Armed Forces in Central and Eastern Europe. Transformation of Civil-Military Relations Paper 1.7, December, 2000.
Secrets & Lies—Digital Security in a Networked World. New York: John Wiley & Sons, 2000.
A Secure Data Hiding Scheme for Two-Color Images." In IEEE Symposium on Computers and Communications., 2000.
"A secure nonrepudiable threshold proxy signature scheme with known signers." International Journal of Informatica 11, no. 2 (2000).
"Securing the Electronic Market: the KEYSTONE Public Key Infrastructure Architecture." Computers and Security Journal 19, no. 8 (2000): 731-746.
"Security Aspects of the Cellular Communications." Information & Security: An International Journal 4 (2000): 73-94.
"Security Sector Reform in Central and Eastern Europe: The Work of Civilians and the Military. Groningen: Centre for European Security Studies, 2000.
Seize the State, Seize the Day: State Capture, Corruption and Influence in Transition . World Bank Policy Research Working Paper No. 2444 , 2000.