Biblio
Export 8450 results:
The Rule of Law in Kosovo: Problems and Prospects." Criminal Law Forum 11, no. 2 (2000): 132.
"Russia, NATO and European Security after Kosovo." Survival 41, no. 4 (2000): 124-44.
"Russian Strategy in the Chechnya Wars In Parameter bewaffneter Konflikte. Studien und Berichte zur Sicherheitspolitik. Vienna: Schriftenreihe der Landesverteidi-gungsakademie, 2000.
"Russia's National Security Concept." Arms Control Today (2000).
Scientific Research and Development in NATO." Military Journal 107, no. 4 (2000): 81-90.
"The Second Generation Problematic: Rethinking Democratic Control of Armed Forces in Central and Eastern Europe. Transformation of Civil-Military Relations Paper 1.7, December, 2000.
Secrets & Lies—Digital Security in a Networked World. New York: John Wiley & Sons, 2000.
A secure nonrepudiable threshold proxy signature scheme with known signers." International Journal of Informatica 11, no. 2 (2000).
"Securing the Electronic Market: the KEYSTONE Public Key Infrastructure Architecture." Computers and Security Journal 19, no. 8 (2000): 731-746.
"Security Sector Reform in Central and Eastern Europe: The Work of Civilians and the Military. Groningen: Centre for European Security Studies, 2000.
Seize the State, Seize the Day: State Capture, Corruption and Influence in Transition . World Bank Policy Research Working Paper No. 2444 , 2000.
"Selling America to the Highest Bidder." Economist (2000): 79.
Should We Privatize the Peacekeeping." Washington Post (2000).
"Significance of Accountability under the New Approach to Public Governance." International Review of Administrative Sciences 66, no. 4 (2000): 599-618.
" Single Database Private Information Retrieval Implies Oblivious Transfer In Advances in Cryptology: EUROCRYPT’00: International Conference on the Theory and Application of Cryptographic Techniques . Vol. 1807. Bruges, Belgium, 2000.
Small firms must take Internet plunge or risk being sidelined." The Engineer 10 (2000): 10.
"Software Engineering: A Programming Approach. Vol. 3. Addison-Wesley, 2000.
Standing Before the Portals. Non-Profit Content Online in the Age of Commercial Gatekeepers In Shaping the Network Society: The Future of the Public Sphere in Cyberspace (DIAC2000). Seattle, U.S., 2000.
Statement for the Record before the Joint Economic Committee on Cyber Threats and the U.S. Economy ., 2000.
Strategia sukcesu firmy. Warsaw: PWE, 2000.
Strengthening Transatlantic Security: A U.S. Strategy for the 21st Century. Washington, DC: Department of Defense, 2000.
Structural Realism after the Cold War." International Security 25 (2000): 37.
"Страницы
- « первая
- ‹ предыдущая
- …
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- …
- следующая ›
- последняя »