Biblio

Export 21363 results:
2000
Resolution 1325 on Women, Peace and Security. United Nations Security Council , 2000.
Rajagopalan, Rajesh. "Restoring Normalcy’: The Evolution of the Indian Army's Counterinsurgency Doctrine." Small Wars & Insurgencies 11, no. 1 (2000): 44.
Fromm, Erich. Rewolucja nadziei. Ku uczłowieczonej technologii. Poznań: Rebis, 2000.
Grant, Robert. The RMA – Europe Can Keep in Step In Occasional Paper. Paris: ISS-WEU, 2000.
Padoa-Schioppa, Tomasso. The Road to Monetary Union in Europe: The Emperor, the Kings, and the Genies . Oxford: Oxford University Press, 2000.
Zolotarev, Vladimir A.. Rossiya (SSSR) v lokalnykh voynakh i voennych konfliktakh vtoroy poloviny XX veka. Moscow: Kuchkovo Pole, 2000.
Lorenz, Roger F. M.. "The Rule of Law in Kosovo: Problems and Prospects." Criminal Law Forum 11, no. 2 (2000): 132.
Antonenko, Oksana. "Russia, NATO and European Security after Kosovo." Survival 41, no. 4 (2000): 124-44.
Putin, Vladimir. Russia: New Eastern Perspectives. in Russian ed. official site of the President of Russia, 2000.
Felgenhauer, Pavel. Russian Strategy in the Chechnya Wars In Parameter bewaffneter Konflikte. Studien und Berichte zur Sicherheitspolitik. Vienna: Schriftenreihe der Landesverteidi-gungsakademie, 2000.
"Russia's National Security Concept." Arms Control Today (2000).
Hadjitodorov, Stefan, and Todor Tagarev. "Scientific Research and Development in NATO." Military Journal 107, no. 4 (2000): 81-90.
Cottey, Andrew, Tim Edmunds, and Anthony Forster. The Second Generation Problematic: Rethinking Democratic Control of Armed Forces in Central and Eastern Europe. Transformation of Civil-Military Relations Paper 1.7, December, 2000.
Schneier, Bruce. Secrets & Lies—Digital Security in a Networked World. New York: John Wiley & Sons, 2000.
Chen, Yu-Yuan, Hsiang-Kuang Pan, and Yu-Chee Tseng. "A Secure Data Hiding Scheme for Two-Color Images." In IEEE Symposium on Computers and Communications., 2000.
Hwang, M.S., Eric J. L. Lu, and I.C. Lin. "A secure nonrepudiable threshold proxy signature scheme with known signers." International Journal of Informatica 11, no. 2 (2000).
Gritzalis, Stefanos, Dimitrios Lekkas, Konstantinos Moulinos, Eleni Polydorou, and Sokratis K. Katsikas. "Securing the Electronic Market: the KEYSTONE Public Key Infrastructure Architecture." Computers and Security Journal 19, no. 8 (2000): 731-746.
Popov, Metodi. "Security Aspects of the Cellular Communications." Information & Security: An International Journal 4 (2000): 73-94.
Trapans, Dr. Jan Arveds. Security Sector Reform in Central and Eastern Europe: The Work of Civilians and the Military. Groningen: Centre for European Security Studies, 2000.
Security Strategy of the Republic of Albania., 2000.
Hellman, Joel S., Geraint Jones, and Daniel Kaufmann. Seize the State, Seize the Day: State Capture, Corruption and Influence in Transition . World Bank Policy Research Working Paper No. 2444 , 2000.
"Selling America to the Highest Bidder." Economist (2000): 79.
Schneier, Bruce. "Semantic Attacks: The Third Wave of Network Attacks." Crypto-Gram (2000).
Toset, Hans P. W., Nils P. Gleditsch, and Håvard Hegre. "Shared Rivers and Interstate Conflict." Political Geography 19, no. 8 (2000): 971-96.
Wohl, Jonah Schulhofer. "Should We Privatize the Peacekeeping." Washington Post (2000).

Pages