Biblio

Export 21400 results:
1998
Simon, Jeffrey. "Bulgaria and NATO: 7 Lost Years." Information & Security: An International Journal 1, no. 2 (1998): 93-104.
Bonner, Raymond. "Bulgaria Becomes a Weapons Bazaar." The New York Times (1998).
Mihov, General Miho. "The Bulgarian Armed Forces in the Information Society." Information & Security: An International Journal 1, no. 1 (1998): 15-25.
Bundesverfassung der Schweizerischen Eidgenossenschaft. Bern: Die Bundesbehörden der Schweizerischen Eidgenossenschaft, 1998.
C4ISR Architecture Working Group (AWG): Final Report. Washington D.C.: Department of Defense, 1998.
Ward, Elizabeth. "Call Out the Troops: An Examination of the Legal Basis for Australian Defence Force Involvement in ‘Non-defence’ Matters." Research Paper 1997-98 8 (1998).
A Call to Civil Society. New York: Institute for American Values, 1998.
Conger, Jay A., and Rabindra N. Kanungo. Charismatic Leadership in Organizations. Thousand Oaks, CA: SAGE Publications, 1998.
Civil Protection Law of Lithuania., 1998.
Hill, Christopher. "“Closing the capabilities-expectations gap?”." In A Common Foreign Policy for Europe. London: Routledge, 1998.
Gal, Reuven. "Colleagues in Distress: ‘Helping the Helpers'." International Review of Psychiatry 10, no. 3 (1998): 234-238.
Lave, Jean, and Etienne Wenger. Communities of practice: Learning, meaning and identity . Cambridge: Cambridge University Press, 1998.
Wenger, Etienne. Communities of practice: Learning, meaning, identity . New York: Cambridge University Press, 1998.
Tagarev, Todor. "The Comparative Analysis of Russian and US Views on Information Warfare in the Works of Timothy Thomas." Information & Security: An International Journal 1, no. 1 (1998): 105-115.
On the Concept of the Struggle with Corruption for 1998-2005 (Про Концепцію боротьби з корупцією на 1998-2005 роки) In Decree of the President of Ukraine., 1998.
Wolf, Aaron T.. "Conflict and Cooperation along International Waterways." Water Policy 1, no. 2 (1998): 251-65.
Troebst, Stefan. Conflict in Kosovo: Failure of Prevention? Analytical Documentation, 1992–1998. Flensburg: European Centre for Minority Issues, 1998.
Monitor, ISIJ. "Coordinating Council on the Problems of Information Society." Information & Security: An International Journal 1, no. 1 (1998): 116-117.
Czerwinski, Thomas. Coping With The Bounds: Speculations on Nonlinearity in Military Affairs. Washington, D.C.: NDU Press, 1998.
Mauro, Paolo. "Corruption and Composition of Government Expenditure." Journal of Public Economics 69, no. 2 (1998): 263-79.
M., Robinson. "Corruption and Development: An Introduction." In Corruption and Development, 1-14. London: Frank Cass, 1998.
Heath, Robert. Crisis Management for Managers and Executives. London/San Francisco: Financial Times Pitman Publishing, 1998.
Reiter, Michael K., and Aviel D. Rubin. "Crowds: Anonymity for Web Transactions." ACM Transactions on Information and System Security 1, no. 1 (1998): 66-92.
Hinchcliffe, Lisa. Cut-and-Paste Plagiarism: Preventing, Detecting and Tracking Online Plagiarism., 1998.
McKay, Niall. "Cyber Terror Arsenal Grows." Wired News (1998).

Pages