Biblio

Export 21337 results:
2001
Arguments for NATO Expansion & Rebuttals. Council for a Livable World Education Fund, 2001.
Barzilai, Amnon, Daniel Sobelman, and Amira Hass. "Arms Boat Made Three Visits to Gaza." Ha’aretz (2001).
Jean, Carlo. "Arms Control in Transition: Building a New Security Order." In The Future of Arms Control Agenda, 120. Oxford: Oxford University Press, 2001.
Colton, Trevor. "The Army Synthetic Environment." In SimTecT. Canberra, Australia, 2001.
Trubachev, A.P.. Assessment Security of Information Technology . Moscow: SIP RIA, 2001.
Worley, Robert. "Asymmetry and Adaptive Command." Military Review 81, no. 4 (2001): 38-44.
Helliar, Christine, Alasdair Lonie, David Power, and Donald Sinclair. Attitudes of UK Managers to Risk and Uncertainty. Edinburgh: The Institute of Chartered Accountants of Scotland, 2001.
Smith, Richard E.. Authentication: From Passwords to Public Keys. Addison-Wesley, 2001.
Authorization for Use of Military Force., 2001.
Authorization to Use Military Force (AUMF)., 2001.
Kim, Dong-Su, and Sung-I. Chien. Automatic Car License Plate Extraction Using Modified Generalized Symmetry Transform and Image Warping In IEEE International Symposium on Industrial Electronics ISIE 2001. Pusan, Korea, 2001.
V., Socor. "Back to Bad Old Soviet Habits." The Wall Street Journal Europe (2001).
Bélanger, Yves, and Jean-Paul Hébert. "BAe Systems au Coeur du Processus de Globalisation de l’Industrie de Défense." Arès 19, no. 47 (2001): 41-54.
Murtha, Paul, and Jim Campbell. Basics of Modeling and Simulation in DoD In Interservice/Industry, Simulation and Education Conference (I/ITSEC). Orlando, Florida, 2001.
Whitson, Thurman L., and Lynn Davis. "Best Practices in Electronic Government: Comprehensive Electronic Information Dissemination for Science and Technology." Government Information Quarterly 18, no. 2 (2001): 79-91.
Keohane, Robert, and Joseph S. Nye. "Between Centralization and Fragmentation: The Club Model of Multilateral Cooperation and Problems of Democratic Legitimacy." Kennedy School of Government, Harvard University, 2001.
Horne, Gary. "Beyond Point Estimates: Operational Synthesis and Data Farming." Maneuver Warfare Science (2001).
Helmreich, Jeffrey S.. Beyond Political Terrorism: The New Challenge of Transcendent Terror. Heshvan, 2001.
Golden, Tim, and Judith Miller. "Bin Laden Operative Is Linked to Suspects." The New York Times (2001).
van der Putte, Ton, and Jeroen Keuning. Biometrical Fingerprint Recognition: Don’t Get Your Fingers Burned In Proceedings of the Fourth Working Conference on Smart Card Research and Advanced Applications. Vol. 14. Norwell, MA: Kluwer , 2001.
Felshitinsk, ii, Yuri, and Alexander Litvinenko. Blowing Up Russia: Terror From Within. New York: Liberty Publishing House, 2001.
Schneider, Steve. The B-Method: An Introduction. Basingstoke, UK: Palgrave, 2001.
Tavernise, Sabrina. "Boeing’s Russian Edge." New York Times (2001).
Gigerenzer, Gerd, and Reinhard Selten. Bounded Rationality: The Adaptive Toolbox ., 2001.
Tolk, Andreas. Bridging the Data Gap – Recommendations for Short, Medium, and Long Term Solutions In Spring Simulation Interoperability Workshop 2001. Orlando, Florida, 2001.

Pages