Biblio
Export 21404 results:
Humanitarianism with Borders? In paper for the ICVA Conference on “NGOs in a Changing World Order: Dilemmas and Challenges”. Geneva, 2003.
IBM Lotus Learning Management System. Textbook. IBM International Technical Support Organization, 2003.
On identifying a methodology for land C2 architecture development In Proceedings of the Land Warfare Conference 2003., 2003.
IEEE Standards Association, Standard 802.11 In 1999 Edition., 2003.
Igor Ivanov stated that the Georgian regime change was prepared with US support. Vol. 8 December 2003. Newsru.com, 2003.
Illegal Drugs in Colombia: From Illegal Economic Boom to Social Crisis." Annals of the American Academy of Political and Social Sciences (2003): 108.
"IMoViS: A System for Mobile Visualization of Intrusion Detection Data." Information & Security: An International Journal 12, no. 2 (2003): 235-249.
"Implied Recognition In Principles of Public International Law. 6th ed. New York: Oxford University Press, 2003.
Importance of a Knowledge-Based, Network-Centric Approach in Strengthening Transatlantic Links with New NATO Members in South Eastern Europe." Connections: The Quarterly Journal 2, no. 3 (2003): 65-75.
"The Importance of Being Random: Statistical Principles of Iris Recognition." Pattern Recognition 36, no. 2 (2003): 279-291.
"An Improved Identification Scheme In Progress in Computer Science and Applied Logic., 2003.
Improved Operational Testing and Evaluation: Better Measurement and Test Design for the Interim Brigade Combat Team with Stryker Vehicles In Phase I Report. Washington, DC: National Research Council, The National Academies Press, 2003.
In Massive Shift, U.S. is Planning to Cut Size of Military in Germany." Wall Street Journal (2003).
"In war’s wake, hostility and mistrust." International Herald Tribune (2003): 1, 6.
"Incoherent Empire. London: Verso, 2003.
India’s Internal Security Challenges." Strategic Analysis 27, no. 4 (2003): 503-515.
"Information and Communication Security Services for e-Government. National Information and Communication Security Taskforce (NICST), 2003.
Information Assurance in Sensor Networks In 2nd ACM International Conference on Wireless Sensor Networks and Applications WSNA’03 . San Diego, CA, 2003.
Information Fusion for Situational Awareness In 6th International Conference on Information Fusion. Queensland, Australia, 2003.
Information Security and Auditing in the Digital Age. A Practical and Managerial Perspective. NGE Solutions, 2003.
INFORMATION SECURITY POLICY OF THE FIRM BUSINESS TRANSACTIONS." Trakia Journal of Sciences 1, no. 4 (2003).
"Information-theoretic Analysis of Information Hiding." IEEE Transactions on Information Theory 49, no. 3 (2003).
"Informative note for the National Migration Department of the Republic of Moldova on “Trafficking in Human Beings. National Migration Department of the Republic of Moldova , 2003.
Infrastructure for e-Government Web Services." IEEE Internet Computing 7, no. 1 (2003): 58-65.
"Initiatives for Transparency-Building in Turkey: International, Regional and Domestic Factors." Information & Security: An International Journal 11 (2003): 34-54.
"