Biblio

Export 21382 results:
1999
Report of the Secretary-General pursuant to General Assembly Resolution 53/35. New York: United Nations, Office of United Nations Secretary-General, 1999.
Resolution 1244 (1999). Security Council , 1999.
Franke, Volker C.. "Resolving Identity Tensions: The Case of the Peacekeeper." Journal of Conflict Studies (1999).
Franke, Volker C.. "Resolving Identity Tensions: The Case of the Peacekeeper." Journal of Conflict Studies 19 (1999).
Sapolsky, Harvey, and Eugene Gholz. "Restructuring the U.S. Defense Industry." International Security 24, no. 3 (1999): 5.
Tyshchenko, Iu., and V. Pikhovshek. Return of the Crimean Tartars: a Chronicle of Events (Повернення кримських татар: хроніка подій). Kyiv, 1999.
Van Creveld, Martin. The Rise and Decline of the State. Cambridge: Cambridge University Press, 1999.
Dyson, Kenneth, and Kevin Featherstone. The Road to Maastricht: Negotiating Economic and Monetary Union. Oxford: Oxford University Press, 1999.
Lakov, Dimitar, and Georgi Kirov. Routing of Computer Nets via Fuzzy Logic In Youth Science Session, Sofia, Bulgaria., 1999.
Russia 2000 Part 2: The Face of Russia to Come. Stratfor Global Intelligence, 1999.
Russian/ Kidnapping. GlobalSecurity.org, 1999.
Pavliatenko, Viktor N.. "Russian Security in the Pacific Asian Region. The Dangers of Isolation." In Russia and East Asia. The 21st Century Security Environment, edited by Gilbert Rozman, Mikhail G. Nosov and Koji Watanabe, 20. New York: M. E. Sharpe, East West Institute, 1999.
Belokrenitsky, Vyacheslav. "Russian–Afghan Relations." In Russia and Asia: The Emerging Security Agenda, 205. Stockholm: Stockholm International Peace Research Institute, 1999.
Bertrand, Gilles, Anna Michalski, and Lucio R. Pench. Scenarios Europe 2010 . EU Commission, 1999.
Scenarios Europe 2010 – Five Possible Futures For Europe. Brussels: European Commission, Forward Studies Unit, 1999.
Zhou, Jianying, and Kwok-Yan Lam. "Securing Digital Signatures for Non-Repudiation." Computer Communications 22, no. 8 (1999): 710-716.
Vukadinovic, Radovan. Security in the southeast of Europe [Sigurnost na jugoistoku Europe]. Zagreb: HUMS, 1999.
Jorge, P., J.G. Silva, and L.M. Silva. "Security mechanisms for using mobile agents in electronic commerce." 18th IEEE symposium on Reliable Distributed Systems (1999): 378-383.
Lee, Narn-Yih, and Tzonelih Hwang. "On the Security of Fair Blind Signature Scheme Using Oblivious Transfer." Computer Communications 22, no. 3 (1999): 287-290.
Terriff, Terry, Stuart Croft, Lucy James, and Partick Morgan. Security Studies Today. Cambridge: Polity Press, 1999.
Barnett, Thomas P. M.. The Seven Deadly Sins of Network-Centric Warfare. U.S. Naval Institute , 1999.
Tursunov, Bakhrom, and Marina Pikulina. Severe Lessons of Batken In Conflict Studies Research Centre. Defence Academy of the United Kingdom, 1999.
Gigerenzer, Gerd, and Peter M. Todd. Simple Heuristics that Make Us Smart. New York: Oxford University Press, 1999.
Coakley, John. "Society and Political Culture." In Politics in the Republic of Ireland, 63. London: Routledge, 1999.
Maamar, Z., B. Moulin, and Y. Bédard. "Software agent-oriented frameworks for the interoperability of georeferenced digital libraries on the World Wide Web: The SIGAL project." In Interoperating Geographic Information Systems, 335-354. Boston: Kluwer Academic Publishers, 1999.

Pages