Biblio

Export 21363 results:
1997
Soeters, Joseph L.. "Value Orientations in Military Academies: A Thirteen Country Study." Armed Forces & Society 24, no. 1 (1997): 24.
Hall, Charles W., and Robert O’Harrow, Jr. "Virginia Man Suspected of Terrorism Known for Anonymity." The Washington Post (1997).
Boullé, Philippe, Luc Vrolijks, and Elina Palm. "Vulnerability Reduction for Sustainable Urban Development." Journal of Contingencies & Crisis Management 5, no. 3 (1997): 179-188.
Ignatieff, Michael. The Warrior’s Honor. Ethnic War and the Modern Conscience . New York: Henry Holt and Company, 1997.
Litz, Brett, Lynda King, Daniel King, Susan Orsillo, and Matthew Friedman. "Warriors as peacekeepers: Features of the Somalia experience and PTSD." Journal of Consulting and Clinical Psychology 65, no. 6 (1997): 1001-1010.
White, Stephen K.. "Weak Ontology and Liberal Political Reflection." Political Theory 25, no. 4 (1997): 502-523, quote on p. 503.
Boer, Monica Den. "“Wearing the Inside Out: European Police Cooperation between Internal and External Security." European Foreign Affairs Review 2 (1997): 491-508.
Garfinkel, Simson, and Gene Spafford. Web Security & Commerce. Cambridge: O’Reilly, 1997.
Bhatia, D., G. Fox, W. Furmanski, G. Premchandran, M. Camuseva, and V. Burzevski. "WebFlow - a visual programming paradigm for Web/Java based coarse grain distributed computing." Concurrency: Practice and Experience (1997).
Walt, Stephen M.. "Why Alliances Endure or Collapse." Survival 39, no. 1 (1997): 157.
Goodman, Marc D.. "Why the Police Don’t Care about Computer Crime." Harvard Journal of Law and Technology 10, no. 3 (1997): 465-494.
D., Majers. Социалная психология., 1997.
1996
Semerdjiev, Emil. "About the Application of the Hough Transform for Radar Track Detection." Comptes rendus de l'Academie Bulgare des Sciences 49, no. 9 (1996): 49-52.
Act XXXI of 1996 on fire control and technical rescue and fire., 1996.
Weathery, Richard M., Bradford S. Canova, Ernest H. Page, Anita A. Zabek, and Annete L. Wilson. Advanced Distributed Simulation through the Aggregate Level Simulation Protocol In 29th International Conference on System Sciences. Vol. 1. Wailea, Hawaii , 1996.
Bobbio, Norberto. The Age of Rights. Cambridge: Polity Press, 1996.
Petrie, Charles. "Agent-based engineering, the web, and intelligence." IEEE Expert 11 (1996): 24-29.
al-Mawardi, Abu al- Hasan. Al-Ahkam as-Sultaniyyah In Qur’an sura 47, verse 4. London: Ta-Ha Publishers, 1996.
Jr., John Witte, and Christian M. Green. "The American Constitutional Experiment in Religious Human Rights: The Perennial Search for Principles." In Religious Human Rights in Global Perspective. The Hague: Martinus Nijhoff Publishers, 1996.
Lipset, Seymour Martin. American Exceptionalism: A Double-edged Sword. New York, NY: W. W. Norton, 1996.
Kiountouzis, Evangelos A., and Spyros A. Kokolakis. "An Analyst's View of Information Systems Security." In Information Systems Security: Facing the Information Society of the 21st Century. London: Chapman & Hall, 1996.
Wu, Tzong-Chen, and Hung-Sung Sung. "Authenticating Passwords over an Insecure Channel." Computers & Security 15, no. 5 (1996): 431-439.
Doehler, H.-U., P. Hecker, and E. Groll. Automatic Recognition of Aircraft Registration Marks In DLR-Mitteilung 96-02. Köln, 1996.
Paczuski, Maya, Sergei Maslov, and Per Bak. "Avalanche Dynamics in Evolution, Growth, and Depinning Models." Physics Review 53, no. 1 (1996): 414-443.
Azerbaijan Human Development Report 1996 In Publication of the United Nations Development Programme/UND. Baku: Office of the United Nations, 1996.

Pages