Biblio

Export 21362 results:
2002
IMF Fiscal Transparency Homepage., 2002.
Galbraith, Steven, Keith Harrison, and David Soldera. "Implementing the Tate pairing." Algorithmic Number Theory, Lecture Note in Computer Science 2369 (2002).
Bojilov, Ljudmil. "An Improved Version of a Multiple Target Tracking Algorithm." Information & Security: An International Journal 9 (2002): 130-140.
Hwang, Jing-Jang, and Tzu-Chang Yeh. "Improvement on Peyravian-Zunic’s Password Authentication Schemes." IEICE Transactions on Communications E85-B, no. 4 (2002): 823-825.
Kotangian, Hayk. "In Agenda: Multi-Polar and Complementary Defense Policy." Golos Armenii (2002).
Krastev, Ivan. The Inexibility Trap: Frustrated Societies, Weak States and Democracy. Bratislava: United Nations Development Programme, 2002.
Monitor, ISIJ. "In memoriam." Information & Security: An International Journal 9 (2002): 177-179.
Chalmers, Malcolm, and Owen Greene. In Need of Attention: The UN Register in its Seventh Year. Bradford Arms Register Studies, 2002.
Lindley-French, Julian. "In the Shade of Locarno. Why European Defence is Failing." International Affairs 78, no. 4 (2002).
Flin, Rhona H., and Kevin Arbuthnot. Incident Command: Tales from the Hot Seat . Aldershot: Ashgate Publishing Company, 2002.
Milly, P.C.D., T. L. Delworth, K.A. Dunne, and R.T. Wetherald. "Increasing risk of great floods in a changing climate." Nature 415 (2002): 514-517.
Langit, Rachel. "Indonesia’s Military Business as Usual." Asia Times Online (2002).
Krastev, Ivan. The Inflexibility Trap: Frustrated Societies, Weak States, and Democracy. Bratislava: UNDP, 2002.
Alberts, David. Information age transformation, getting to a 21st century military. DOD Command and Control Research Program., 2002.
O’Brien, Kevin, and zhar Lev. "Information Operations and Counterterrorism." Jane’s Intelligence Review 14, no. 9 (2002).
Plessis, Lindie Du, and Rossouw von Solms. "Information Security Awareness: Baseline Education and Certification." Information Technology on the Move 8, no. 8 (2002): 1-12.
Peltier, Thomas R.. Information Security Policies, Procedure and Standards Guidelines for Effective Information Security Management. Bosca Raton, Florida: Auerbach publication, 2002.
Lee, B.S., M.E. Alexander, B.C. Hawkes, T.J. Lynham, B.J. Stocks, and P. Englefield. "Information systems in support of wildland fire management decision making in Canada." Computers and Electronics in Agriculture 37:1, no. 3 (2002): 185-198.
Stenmark, Dick. Information vs. knowledge: The role of intranets in knowledge management In Thirty-Fifth Annual Hawaii International Conference on System Sciences. IEEE Computer Society Press, 2002.
Samii, Ramina, Luk N. Van Wassenhove, and Shantanu Bhattacharya. "An Innovative Public-Private Partnership: New Approach to Development." World Development 30, no. 6 (2002): 991-1008.
Gunaratna, Rohan. Inside Al Qaeda: Global Network of Terror. New York: Columbia University Press, 2002.
Adams, Gordon. "Inside View – Aftermath of Prague. New Strategy Hinges on U.S. Trade Reform." Defense News (2002): 17.
Jean, Carlo. An Integrated Police Force for the European Union. Brussels: Centre for European Policy Studies, 2002.
Hwang, Min-Shiang, and Wei-Pang Yang. "Integrating Different Semantics of Classification Levels in Heterogeneous Distributed Database Systems." Pakistan Journal of Information and Technology 1, no. 1 (2002): 1-4.
Simpson, Marvin L.. "Integration and Interoperability of Information Systems within the Coalition Aerospace Operations Center." Information & Security: An International Journal 8, no. 2 (2002): 175-193.

Pages