Biblio

Export 21337 results:
1981
O’Brien, William V.. The Conduct of War and Limited War . New York: Praeger, 1981.
Dougherty, James F., and Robert L. Pfaltzgraff. Contending Theories of International Relations. New York: Harper and Row, 1981.
Volkov, L.I.. Control of Air Complexes Operation ., 1981.
Davida, George I., John B. Kam, and David L. Wells. "A Database Encryption System with Subkeys." ACM Transactions on Database Systems 6, no. 2 (1981): 312-328.
O’Neil, William F.. Educational Ideologies: Contemporary Expressions of Educational Philosophies . Santa Monica, CA: Goodyear Publishing Company, 1981.
Chaum, David L.. "Electronic Mail, Return Address, and Digital Pseudonyms." Communication of the ACM 24 (1981): 84-88.
Belevtsev, Yakov, and Rudolf Belevtsev. Geological structure and iron ores of the Kryvorozhsky basin (in Russian). Kiev: Naukova Dumka, 1981.
D., North. Growth and structural change. New York: Norton, 1981.
Rabin, Michael O.. How to Exchange Secrets by Oblivious Transfer. Harvard University: Aiken Computation Laboratory, 1981.
Hydrologic Reference Book of the Rivers in the Republic of Bulgaria. Vol. I. Hydrology and Meteorology, BAS, 1981.
Synnott, William R., and William H. Gruber. Information Resource Management: Opportunities and Strategies for the 1980s . New York: Wiley Interscience, 1981.
Dubin, G. N., and V. G. Suzdal. "Introduction to Applied Game Theory (in Russian)." In Game Theory. Moscow: Science, 1981.
Johnson, James Turner. Just War Tradition and the Restraint of War: A Moral and Historical Inquiry. Princeton: Princeton University Press, 1981.
Shariati, Ali. Martyrdom: Arise and Bear Witness, trans. Ali Ghassemy. Tehran: Ministry of Islamic Guidance, 1981.
Auten, James H.. The Paramilitary Model of Police and Police Professionalism In Police Studies 4., 1981.
L., Lamport. "Password Authentication with Insecure Communication." Communications of the ACM 24, no. 11 (1981): 770-772.
Davis, Roger. "Social Network Analysis: An Aid in Conspiracy Investigations." FBI Law Enforcement Bulletin (1981): 50, 12, 11-19.
Kay, S.M., and S. L. Marple. "Spectrum Analysis. A Modern Perspective." IEEE 69, no. 11 (1981): 1380-1419.
Sterling, Claire. The Terror Network: The Secret War of International Terrorism . New York: Henry Holt & Co , 1981.
Ouchi, William G.. Theory Z, How American Business Can Meet the Japanese Challenge. New York: Avon Books, 1981.
Sacco, Dorothy E. Denning. "Timestamps in Key Distribution System." Communications of the ACM 24, no. 8 (1981).
Chaum, David L.. "Untraceable Electronic Mail, Return Address and Digital Pseudonyms." Communictions of the ACM 24, no. 2 (1981): 84-88.
Timmerman, Peter. Vulnerability, resilience and the collapse of society: a review of models and possible climatic applications In Environmental Monograph. Toronto: Institute for Environmental Studies, University of Toronto, 1981.
Neff, Donald. Warriors at Suez: Eisenhower Takes America into the Middle East. New York: Simon and Schuster, 1981.

Pages