Biblio
Export 21402 results:
Advanced Technologies for Defense Information System Support." Information & Security: An International Journal 6 (2001): 122-131.
" "After the Terrorist Attacks." International Affairs 47, no. 5 (2001).
"After Victory: Institutions, Strategic Restraint, and the Rebuilding of Order After Major Wars. Princeton, NJ: Princeton University Press, 2001.
Air Force is Problematic Part of Czech Army. Prague: Czech News Agency CTK National News Wire, 2001.
Al Qaeda´s Balkan Links." Wall Street Journal Europe (2001).
" American Hazardscapes: The Regionalization of Hazards & Disasters in the United States." Joseph Henry Press: Washington, D.C. (2001).
"American Terrorist: Timothy McVeigh and the Oklahoma Bombing. New York: HarperCollins, 2001.
Amnesty and UN staff accuse Kosovo war crimes tribunal of ethnic bias." The Guardian (2001).
"Analysis: Weapons Were Meant for Many Fighters." Ha’aretz (2001).
"The Anarchist Cookbook FAQ., 2001.
The Anthropology of Aviation and Flight Safety." Human Or-ganization 60, no. 3 (2001): 201-211.
"Applying of correlation-regression analysis for tasks planning in rocket-space industry." Problems of Control and Informatics 4 (2001).
"An Architecture for High Performance Network Analysis In 6th IEEE Symposium on Computers and Communications. Hammamet, Tunisia, 2001.
Are Ukrainians healthy? (Чи здорові українці?)." Politika i kul’tura (2001): 33.
"Arguments for NATO Expansion & Rebuttals. Council for a Livable World Education Fund, 2001.
Arms Boat Made Three Visits to Gaza." Ha’aretz (2001).
"Arms Control in Transition: Building a New Security Order." In The Future of Arms Control Agenda, 120. Oxford: Oxford University Press, 2001.
"The Army Synthetic Environment." In SimTecT. Canberra, Australia, 2001.
"Assessment Security of Information Technology . Moscow: SIP RIA, 2001.
Asymmetry and Adaptive Command." Military Review 81, no. 4 (2001): 38-44.
"Attitudes of UK Managers to Risk and Uncertainty. Edinburgh: The Institute of Chartered Accountants of Scotland, 2001.
Authentication: From Passwords to Public Keys. Addison-Wesley, 2001.