Biblio

Export 21400 results:
2000
A Clean Break: New Strategy for Securing the Realm In Study Group on a New Israeli Strategy Toward . Institute for Advanced Strategic and Political Studies, 2000.
Andreeva, Plamena, N. Tchingov, and R. Michel. Cluster Analysis for Fuzzy Control Systems In IFAC Conference CSD’2000 . Bratislava, Slovak Republic, 2000.
Popov, Metodi. Coding in the Cellular Communications. Sofia: ProCon, 2000.
Diedrichsen, Loren. "Command and Control: Operational Requirements and System Implementation." Information & Security: An International Journal 5 (2000): 23-40.
Common Strategies In Report by the Secretary-General/High Representative., 2000.
Common Strategy of the European Union on the Mediterranean Region In Presidency Conclusions, European Council, Feira., 2000.
Checkel, Jeffrey T.. Compliance and Conditionality In ARENA Working Papers., 2000.
Kaster, Joegen, and Annette Kaster. Componentware Approaches in Management Information Systems In HFM Workshop . The Hague, 2000.
Marvel, Lisa, George Hartwig, and Charles Boncelet. "Compression-compatible Fragile and Semi-Fragile Tamper Detection." In SPIE EI Photonics West 2000., 2000.
Vraikov, Nikolay, and Alexi Naidenov. "The Computer- Aided Exercise – An Alternative of the Conventional Exercises in the Armed Forces." Information & Security: An International Journal 3 (2000): 119-131.
Naidenov, Alexi, and Nikolay Vraikov. Computer assisted Exercises. Sofia: Military Publishing House, 2000.
Groot, Peter J. M.. "Computer Assisted Second Language Vocabulary Acquisition." Language Learning and Technology 4, no. 1 (2000): 60-81.
Ewen, D., T Flynn, D Miller, and D Dion. Computer Generated Forces Applications to a Simulation Based Acquisition Smart Product Model for SC-21 In Ninth Conference on Computer Generated Forces and Behavioral Representation. Orlando FL, 2000.
Mel’nik, N.. "The concept of corruption (Поняття корупції)." In Korruptsiia i bor’ba s nei (Corruption and the battle with it), 218-19. Moscow, 2000.
Brzoska, Michael. The Concept of Security Sector Reform In Brief 15: Security Sector Reform . Bonn, Germany: Bonn International Center for Conversion, 2000.
Garay, Juan A., and Philip D. MacKenzie. Concurrent Oblivious Transfer In 41st Annual IEEE Symposium on Foundations of Computer Science FOCS 2000 . Redondo Beach, California, USA: IEEE Computer Society Press, 2000.
Tanner, Fred. Conflict Prevention and Conflict Resolution: The Limits to Multilateralism In International Review of the Red Cross., 2000.
Pope, Jeremy. "Confronting Corruption: The Elements of a National Integrity System." In TI Source Book . Berlin: Transparency International, 2000.
Pope, Jeremy. Confronting Corruption: The Elements of a National Integrity System. Vol. 1. Berlin: Transparency International, 2000.
Rho-Ng, Elizabeth. "The Conscription of Asian Sex Slaves: Causes and Effects of U.S. Military Sex Colonialism in Thailand and the Call to Expand U.S. Asylum Law." Asian Law Journal 7 (2000): 103-150.
Luthar, Suniya, Dante Cicchetti, and Bronwyn Becker. "The Construct of Resilience: A Critical Evaluation and Guidelines for Future Work." Child Development 71, no. 3 (2000): 543-562.
Morris, Stephen. "Contagion." The Review of Economic Studies 67, no. 1 (2000): 57-78.
Nickolov, Eugene. "Contemporary Trends in the Development of Information Security and Computer Virology." Information & Security: An International Journal 4 (2000): 60-72.
Korneev, V.V., and S.V. Sajin. "Control System for Computers Functionality and Network on Basis of Using Neural Nets." Neural Computers: Development and Application 1 (2000).
Cohen, Richard. Cooperative Security: Framework for a Better Future? In World Defense Systems 2000. Royal United Services Institution, 2000.

Pages