Biblio

Export 21402 results:
1999
Tagarev, Todor, and Petya Ivanova. "Computational Intelligence in Multi-Source Data and Information Fusion." Information & Security: An International Journal 2 (1999): 33-49.
Vraikov, Nikolay, and Alexi Naidenov. "The Computer Aided Exercise – An Alternative of the Conventional Exercises in the Armed Forces." Information & Security: An International Journal 3 (1999): 119-131.
Hatcher, Michael, Jay McDannel, and Stacy Ostfeld. "Computer Crimes." American Criminal Law Review 36, no. 397 (1999): 406.
Furnell, Steve, and Matthew Warren. "Computer Hacking and Cyber Terrorism: The Real Threats in the New Millennium." Computers and Security 18, no. 1 (1999): 30-32.
Schmitt, Michael N.. "Computer Network Attack and the Use of Force in International Law: Thought on a Normative Framework." Columbia Journal of International Law 37, no. 3 (1999): 893.
Carstensen, Peter, and Kjeld Schmidt. Computer supported cooperative work: new challenges to systems design., 1999.
Hoffmann, Lisa. "Computers Change Rules of War, Civilians Still Get Hurt." The Washington Times (1999).
Hoffmann, Lisa. "Computers Change Rules of War, Civilians Still Get Hurt." The Washington Times (1999).
Zadeh, Lotfi A., and Janusz Kacprzyk. Computing with Words in Information/Intelligent Systems – Part 1: Foundations. Berlin Heidelber: Springer, 1999.
"The Concept for the Development of the Defense Establishment until 2004 with Outlook to 2009." Vojenské rozhledy 4 (1999): 3-15.
Ginsberg, Roy H.. "Conceptualizing the European Union as an International Actor: Narrowing the Theoretical Capability–Expectations Gap." Journal of Common Market Studies 37, no. 3 (1999): 429-454.
Conclusions of the Presidency. Tampere European Council, 1999.
Biad, Abdelwahab. "Conflict Prevention in the Euro-Med Partnership: Challenges and Prospects." The International Spectator 24, no. 2 (1999): 17-31.
Stytz, Martin R., and Sheila B. Banks. Considerations and Issues for Distributed Mission Training Computer-Generated Actors In Eighth Conference on Computer Generated Forces and Behavioral Representation. Orlando FL, 1999.
Constitution of Nigeria., 1999.
Esposito, John L.. "Contemporary Islam: Reformation or Revolution?” in The Oxford History of Islam." New York: Oxford University Press, 1999.
Jamieson, Allison. Cooperation between Organized Crime Groups around the World. Research Institute for the Study of Conflict and Terrorism, 1999.
Player, Steve, and Carol Cobble. Cornerstones of Decision Making: Profiles of Enterprise ABM . Greensboro, NC: Oakhill Press, 1999.
Rose-Ackerman, Susan. Corruption and Government: Causes, Consequences, and Reform. Cambridge: Cambridge University Press, 1999.
Fuguitt, Diana, and Shanton J. Wilcox. Cost-Benefit Analysis for Public Sector Decision Makers. Westport, Connecticut: Quorum Books, 1999.
Fuguitt, Diana, and Shanton J. Wilcox. Cost-Benefit Analysis for Public Sector Decision Makers . Westport, Connecticut: Quorum Books, 1999.
Book, Stephen A.. Cost-Risk Analysis Seminar – Its Role in Proposal Preparation, System Development, and Program Control. The Aerospace Corporation, 1999.
Vertusaev, M.C., Ya.Yu. Kondrat’ev, S.E. Pugachev, and A.M. Yurchenko. "Crime Methods Utilizing Bank Cards." Information Technologies for Information Protection 3, no. 1 (1999): 50-67.
Budzhurova, L.. "Criminal pulp fiction with a horoscope (Кримінальна пульпа фантастика з гороскопом)." Stolichnie novosti (1999): 1,5.
Clinton, William. "Crisis in the Balkans; Clinton’s Remarks in Defense of Military Intervention in the Balkans." New York Times (1999).

Pages