Biblio

Export 21363 results:
1999
Constitution of Nigeria., 1999.
Esposito, John L.. "Contemporary Islam: Reformation or Revolution?” in The Oxford History of Islam." New York: Oxford University Press, 1999.
Jamieson, Allison. Cooperation between Organized Crime Groups around the World. Research Institute for the Study of Conflict and Terrorism, 1999.
Player, Steve, and Carol Cobble. Cornerstones of Decision Making: Profiles of Enterprise ABM . Greensboro, NC: Oakhill Press, 1999.
Rose-Ackerman, Susan. Corruption and Government: Causes, Consequences, and Reform. Cambridge: Cambridge University Press, 1999.
Fuguitt, Diana, and Shanton J. Wilcox. Cost-Benefit Analysis for Public Sector Decision Makers . Westport, Connecticut: Quorum Books, 1999.
Fuguitt, Diana, and Shanton J. Wilcox. Cost-Benefit Analysis for Public Sector Decision Makers. Westport, Connecticut: Quorum Books, 1999.
Book, Stephen A.. Cost-Risk Analysis Seminar – Its Role in Proposal Preparation, System Development, and Program Control. The Aerospace Corporation, 1999.
Vertusaev, M.C., Ya.Yu. Kondrat’ev, S.E. Pugachev, and A.M. Yurchenko. "Crime Methods Utilizing Bank Cards." Information Technologies for Information Protection 3, no. 1 (1999): 50-67.
Budzhurova, L.. "Criminal pulp fiction with a horoscope (Кримінальна пульпа фантастика з гороскопом)." Stolichnie novosti (1999): 1,5.
Clinton, William. "Crisis in the Balkans; Clinton’s Remarks in Defense of Military Intervention in the Balkans." New York Times (1999).
Dunn, Ashley. "Crisis in Yugoslavia – Battle Spilling Over Onto the Internet." Los Angelis Times (1999).
Hwang, Min-Shiang. "Cryptanalysis of a Remote Login Authentication Scheme." Computer Communications 22 (1999): 742-744.
Krulak, Gen. C. C.. "Cultivating Intuitive Decision-making." Marine Corps Gazette (1999).
Gordy, Eric D.. The Culture of Power in Serbia: Nationalism and the Destruction of Alternatives. University Park, PA: Penn State University Press, 1999.
Brewin, Bob. "Cyberattacks Against NATO Traced to China." Federal Computer Week (1999).
Sharp, Walter Gary. Cyberspace and the Use of Force . Falls Church, VA: Aegis Research Corporation, 1999.
le Nobel, Johan J. Ingles-. "Cyberterrorism Hype." Jane’s Intelligence Review (1999).
Vistica, Gregory L.. "Cyberwar and Sabotage." Newsweek (1999).
Lyotard, Jean-Francois. Das postmoderne Wissen. Passagen., 1999.
Hieb, Michael R., and James Blalock. Data Alignment between Army C4I Databases and Army Simulations In Spring Simulation Interoperability Workshop. Orlando, Florida, 1999.
Kurz, A.. Data Warehousing: Enabling Technology. Bonn: MITP-Verlag, 1999.
Mandel, Robert. Deadly Transfers and the Global Playground: Transnational Security Threats in a Disorderly World . London: Praeger Publishers, 1999.
Declaration of the Government of the Russian Federation pertaining to the situation in the Chechen Republic and to regulative measures., 1999.
O’Halpin, Eunan. Defending Ireland: The Irish State and Its Enemies since 1922. Oxford: Oxford University Press, 1999.

Pages