Biblio

Export 21402 results:
1996
P., Valin, J. Couture, and M.-A. Simard. Position and Attribute Fusion of Radar, ESM, IFF and Data Link for AAW missions of the Canadian Patrol Frigate In Multisensor Fusion and Integration for Intelligent Systems (MFI'96). Washington, D.C., 1996.
Cooper, Robert. The Post-modern State and the World Order. London: Demos, 1996.
Laqueur, Walter. "Postmodern Terrorism: New Rules for an Old Game." Foreign Affairs (1996).
Primakov, Yevgeny. Primakov, Speech to the OSCE Permanent Council., 1996.
Jaynes, E.T.. Probability Theory: The Logic of Science. Cambridge, MA: Cambridge Univ. Press, 1996.
Linz, Juan J., and Alfred Stepan. Problems of Democratic Transition and Consolidation: Southern Europe, South America and Post-Communist Europe. Baltimore & London, The Johns Hopkins University Press, 1996.
Shalamanov, Velizar. Problems of Information Security and Life Cycle Support of the Information Environment In 1996 AFCEA Sofia Seminar. Sofia: AFCEA-Sofia, 1996.
Shalamanov, Velizar. "Problems of security and maintenance of life cycle of information systems." Military Journal 58, no. 6 (1996): 83-90.
Jackson, Janet, and Janet Herbrink. Profiling Organised Crime: The Current State of the Art In Report NSCR. Leiden: Netherlands Institute for the Study of Criminality and Law Enforcement (NISCALE), 1996.
Program statement of the Government of the Czech Republic., 1996.
Braudaway, Gordon W., Karen A. Magerlein, and Frederick C. Mintzer. Protecting Publicly-Available Images with a Visible Image Watermark In SPIE International Conference on Electronic Imaging, Science and Technology: Optical Security and Counterfeit Deterrence Techniques. San Jose, CA, 1996.
Mambo, Masahiro, Eiji Okamoto, and Keisuke Usuda. "Proxy Signatures: Delegation of the Power to Sign Messages." IEICE Transactions on Fundamentals (1996): 1338-1354.
Mambo, Masahiro, Eiji Okamoto, and Keisuke Usuda. Proxy Signatures for Delegating Signing Operation In 3rd ACM Conference on Computer and Communications Security. New Delhi, India: ACM Press New York, 1996.
Shanahan, William O.. Prussian Military Reforms 1786-1813 . New York: AMS Press, Inc, 1996.
van Rensburg, A., and Sebastiaan H. von Solms. A Reference Framework for Certification Authorities/Trusted Third Parties In 13th IFIP International Information Security Conference., 1996.
Resolution 1077 (1996). Strasbourg: Council of Europe, 1996.
Walt, Stephen. Revolution and War. Ithaca, NY: Cornell University Press, 1996.
Mazen, Abu. The Road to Oslo. Institute Blizhneva Vostoka, 1996.
Smith, Martin. On Rocky Foundations: NATO, the UN and Peace Operations in the Post Cold War Era. Bradford, Bradford University, 1996.
Barenblatt, G.I.. Scaling, Self Similarity and Intermediate Asymptotics In Cambridge Texts in Applied Mathematics. Cambridge University Press, 1996.
Smith, Sean W.. Secure Coprocessing Applications and Research Issues In Los Alamos Unclassified Release. Los Alamos: National Laboratory, 1996.
Pargov, Dragomir, Veselin Tselkov, Rusin Petrov, and Iliya Kraytchev. Security in Computer Systems In Information Aspects of Security and Development of Modern Societies, Edited by Velizar Shalamanov and Todor Tagarev. Sofia, Bulgaria: AFSEA-Sofia, 1996.
Pargov, Dragomir, Veselin Tselkov, Rusin Petrov, and Iliya Kraytchev. Security in Computer Systems In AFSEA-Sofia Information Aspects of Security and Development of Modern Societies, Edited by Velizar Shalamanov and Todor Tagarev. Sofia:, 1996.
Wiberg, Hakan. "Security Problems of Small Nations." In Small States and the Security in the New Europe. London: Brassey’s, 1996.
Farmer, Dan. "Shall We Dust Moscow." Security Survey of Key Internet Hosts & Various Semi-Relevant Reflections (1996).

Pages