Biblio

Export 21402 results:
2000
Moskos, Charles C., John Allen Williams, and David R. Segal. "Armed Forces after the Cold War." In The Postmodern Military: Armed Forces after the Cold War, 1-13. New York: Oxford University Press, 2000.
Friedberg, Aaron L.. "Arming China Against Ourselves." In American Foreign Policy, 66-73. 6th ed. Guildford, CT: Dushkin/McGraw-Hill, 2000.
Bertholdt, Johannes. Arms Control in Cyberspace. Department of Arms Control, Federal Ministry of Foreign Affairs, 2000.
Lemieux, C.. "“Articulating the Vision of the Canadian Ofcer Corps of 2020: Understanding the Leadership and Ethical Challenges." Canadian Military Journal (2000): 32.
Arena, A.. "Asian Internet start-ups invests heavily in dot.coms." Australian communications (2000): 15-18.
Assessment Mission In Cyanide Spill at Baia Mare Romania. UNEP/OCHA, , 2000.
Roberts, Brad. Asymmetric Conflict 2010. Alexandria, VA: Institute for Defense Analysis, 2000.
Whittaker, Gregory M.. Asymmetric Wargaming: Toward a Game Theoretic Perspective. The MITRE Corporation, 2000.
Hou, Young-Chang, and Pei-Min Chen. An Asymmetric Watermarking Scheme Based on Visual Cryptography In Fifth Signal Processing Conference. Beijing, China, 2000.
Westfeld, Andreas, and Andreas Pfitzmann. "Attacks on Steganographic Systems." In Lecture Notes in Computer Science., 2000.
Atabaki, Touraj. Azerbaijan: ethnicity and the struggle for power in Iran . London: I.B. Tauris, 2000.
Atabaki, Touraj. Azerbaijan: Ethnicity and the Struggle for Power in Iran . London: I. B. Tauris, 2000.
Balkan – Albania – Kosovo – Heroin – Jihad, Research Analysis. Toronto: The Center for Peace in the Balkans, 2000.
Balkan-Albania-Kosovo-Heroin-Jihad, Research Analysis. Toronto: The Center for Peace in the Balkans, 2000.
Koller, L.. "Banks flirting with wireless billing." Bank Technology News (2000): 25.
Gorban, S.. "The battle with corruption: autumnal exacerbation (Боротьба з корупцією: осіннє загострення)." Novyi vek (2000).
Kuczyński, Maciej, and Marian Ray-Ciemięga. Bałkański syndrom. Warsaw: Ministerstwo Obrony Narodowej, 2000.
Kawamura, Takahira, Yasuyuki Tahara, Tetsuo Hasegawa, and Shinichi Honiden. "Bee-gent: Bonding and Encapsulation Enhancement Agent Framework for Development of Distributed Systems." Systems and Computers in Japan 31, no. 13 (2000): 42-56.
Ceranowicz, A., P. E. Nielsen, and F. V. Koss. Behavioral Representation in JSAF In Ninth Conference on Computer Generated Forces and Behavioral Representation. Orlando FL, 2000.
Stelzenmüller, Constanze. "Berufsverbot vor Gericht. Zwingen Europas Richter die Bundeswehr, Frauen an die Waffen zu lassen?" Die Zeit (2000): 6.
Heikka, Henrikki. Beyond the Cult of the Offensive. The Evolution of Soviet/Russian Strategic Culture and its Implications for the Nordic-Baltic Region . Helsinki: The Finnish Institute of International Affairs, 2000.
Hayward, S.. Beyond the Internet: The Supranet. Gartner Advisory, 2000.
Seidman, Gay W.. "Blurred Lines: Nonviolence in South Africa." PS: Political Science & Politics 33, no. 2 (2000).
Tomes, Robert R.. "Boon or Threat? The Information Revolution and U.S. National Security." Naval War College Review 53, no. 3 (2000): 39-59.
Western, Jon. Bosnia’s Next Five Years: Dayton and Beyond. Washington, D.C.: USIP, 2000.

Pages