Biblio

Export 8450 results:
2000
Gerrard, M.. Organising for E-Business: Getting it right. Gartner Advisory, 2000.
Willis, Larry, Lashon B. Booker, Gary N. Bundy, and Paul G. Foley. Overview of the Advanced Simulation Technology Thrust (ASTT) Program In Ninth Conference on Computer Generated Forces and Behavioral Representation. Orlando FL, 2000.
Blake, V.. PABX Security, Information Security Technical Report., 2000.
Livingstone, Robert Gerald. "The Party’s Over: Kohl's Disservice to German Democracy." Foreign Affairs 79 (2000): 13-17.
Suroi, Veton. "Past as Prologue?" The International Spectator 35, no. 1 (2000): 27-33.
Lowe, Steven Wallace. Peacekeeping, Peace building, Human security and Self-interest: Why Canada Remains the Foremost Peacekeeper. 3rd Annual Graduate Studies Symposium of the Canadian Defense Associations Institute, 2000.
"Peru Tops List of EDC Basket Cases." Ottawa Citizen (2000): A4.
Ong, Kelvin. “Policing the Peace: Towards a Workable Paradigm In conference report from the International Peace Academy. New York, 2000.
Wallace, Helen, and William Wallace. Policy Making in the EU. 4th ed. Oxford: Oxford University Press, 2000.
Gladkevich, Yury. "Poshel v Gory (Into the Mountains)." Profil (2000).
Daqing, Wei. "On the Positive and Negative Aspects of Military Websites." Zhongguo Guofang Bao (2000).
Nelson, Daniel. "Post Communist Insecurity." In Problems of Post-Communism., 2000.
Moskos, Charles, John Allen Williams, and David Segal. Post Modern Militaries., 2000.
Vukadinovic, Radovan. Post-Cold War Trends in International Relations. Zagreb: Faculty of Political Science, 2000.
Lawford, Mark, Jeff McDougall, Peter Froebel, and Greg Moum. Practical Application of Functional and Relational Methods for the Specification and Verification of Safety Critical Software In Algebraic Methodology and Software Technology., 2000.
Song, Dawn Xiaodong, David Wagner, and Adrian Perrig. "Practical Techniques for Searches on Encrypted Data." In IEEE Symposium on Security and Privacy. Berkeley, CA, USA, 2000.
"Priming the Pump." Economist (2000).
Kharchenko, Vyacheslav. The Probabilistic Assessment of Survivability and Safety of an Unmanned Control Systems with Multistage Degradation by Use of QD-diagrams In 5th International Conference on Probabilistic Safety Assessment and Management. Osaka, Japan, 2000.
Mosleh, A.. Procedures for treating Common Cause Failures in Safety and Reliability Studies. Analytical Background and Techniques. NUREG/CR-4780 ERPI NP-5613, 2000.
Roeckle, Haio, Gerhard Schimpf, and Rupert Weidinger. Process-Oriented Approach for Role-Finding to Implement Role-Based Security Administration in a Large Industrial Organization In 5th ACM Workshop on Role-Based Access Control (RBAC’00). Berlin, Germany, 2000.
Project Management – Part 3: Guide to the Management of Business Related Project Risk. British Standards Institution, 2000.
Promotion of Transparency and Democratic Decision Making in the Formation of SEE States Military Budgets, Stability Pact for South Eastern Europe Seminar . Sofia, Bulgaria, 2000.
Marik, V., J. Lazansky, O. Stepankova, and M. Pechoucek. "Proplant: Multi-agent system for production planning." International Journal of Applied Artificial Intelligence (2000).
Sofaer, Abraham D., and Seymour D. Goodman. A Proposal for an International Convention on Cyber-Crime and Terrorism . Stanford: Center for International Security and Cooperation, Stanford University, 2000.
Gibson, Rachel, and Stephen Ward. "A Proposed Methodology for Studying the Function and Effectiveness of Party and Candidate Web Sites." Social Science Computer Review 18, no. 3 (2000): 305-306.

Страницы