Biblio

Export 21403 results:
2001
Camacho, David, César Hernández, and José M. Molina. "Information classification using fuzzy knowledge based agents." In IEEE International Conference on Systems, Man and Cybernetics. e-Systems and e-Man for Cybernetics in Cyberspace. Tucson, AZ, USA, USA , 2001.
Lugachev, M.I.. Information Security: Semeiotic and Economic Aspects In 4th Annual Conference of the PfP Consortium of Defense Academies and Security., 2001.
Lakov, Dimitar, and Georgi Kirov. Information Soft Computing Agents in Network Management In International Conference on Automatics and Informatics. Sofia, Bulgaria, 2001.
Totev, Dobromir, and Bisserka Boudinova. "Information Support for Effective Resource Management." Information & Security: An International Journal 6 (2001): 138-150.
Ivashchenko, Andrij, and Kateryna Sinitsa. Information Technology for Training Forces of Peacekeeping Operations In Telematics and Life-Long Learning. Proceeding of the International Workshop TLLL-2001 . Kyiv, Ukraine, 2001.
Erbscholoe, Michael, and John R. Vacca. Information Warfare: Combat Hackers and Cyber Attackers. Berkeley, California: : Osborne McGraw-Hill, 2001.
Peerenboom, James. Infrastructure Interdependencies: Overview of Concepts and Terminology In Infrastructure Assurance Center, Argonne National Laboratory. Argonne: Wiley Interscience, 2001.
Hills, Alice. "The Inherent Limits of Military Forces in Policing Peace Operations." Interna-tional Peacekeeping 8, no. 3 (2001).
"Insurance medicine: for and against (Страхова медицина: за і проти)." Uriadovyi kur’er (Government courier) (2001): 7.
Integrated Risk Management Framework., 2001.
Danilov, A.D., N.V. Ivanova, Е.I Kultishev, and V.M. Kosmachev. Integration of Open Education to Information Society In Internet and Modern Society., 2001.
Best, Richard A.. Intelligence and Law Enforcement: Countering Transnational Threats to the U.S In Report for Congress. Congressional Research Service, 2001.
Herman, Michael. "Intelligence Services in the Information Age: Theory and Practice ." In Ethics in International Relations: The Role of Intelligence Services after September 11. CSRC, RMA Sandhurst, M24, 2001.
Niemeyer, Klaus. Interaktive Simulationen zum Krisenmanagement In Krisenproblematik., 2001.
Plouffe, Cristopher R., Mark Vandenbosch, and John Hulland. "Intermediating Technologies and Multi-Group Adoption: A Comparison of Consumer and Merchant Adoption Intentions toward a New Electronic Payment System." The Journal of Product Innovation Management 18, no. 2 (2001): 65-71.
International Crisis Group, “Bin Laden and the Balkans: The Politics of Anti-terrorism., 2001.
Robertson, Lord George. “International Security and Law Enforcement–A Look Ahead In speech at the Law Enforcement and National Security Global Forum. Edinburgh, 2001.
Kalathil, Shanthi, and Taylor C. Boas. "The Internet and State Control in Authoritarian Regimes: China, Cuba, and the Counterrevolution." Carnegie Endowment Working Papers (2001).
Zinnbauer, Dieter. "Internet, Civil Society and Global Governance: The Neglected Political Dimension of the Digital Divide." Information & Security: An International Journal 7 (2001): 45-64.
Thomas, Timothy. "The Internet in China: Civilian and Military Uses." Information & Security: An International Journal 7 (2001): 159-173.
Neumann, Peter G.. "Internet security experts of SRI International." New Yorker 28 (2001).
Santesson, Stefan, Tim Polk, Petra Barzin, and Magnus Nystrom. Internet X.509 Public Key Infrastructure Qualified Certificates Profile In The Internet Engineering Task Force (IETF)., 2001.
Farazmand, A. "Introduction – Crisis and Emergency Management." In Handbook of Crisis and Emergency Management.. New York/ Basel: Marcel Dekker, 2001.
Mattox, Gale A., and Arthur R. Rachwald. "Introduction: European Security and the Enlargement of NATO." In Enlarging NATO: The National Debates, 6. Boulder, CO: Lynne Rienner Publishers, 2001.
Buchmann, Johannes. Introduction to Cryptography. Berlin: Springer-Verlag, 2001.

Pages