Biblio

Export 8450 results:
1999
Rathmell, Andrew. "A Coalition Force Scenario ‘Binni – Gateway to the Golden Bowl of Africa." In International Workshop on Knowledge-Based Planning for Coalition Forces. Edinburgh, Scotland, 1999.
Lyons, Denise, and Harold Hawkins. Cognitive and Behavioral Modeling Techniques for CGFs: A New Initiative In Eighth Conference on Computer Generated Forces and Behavioral Representation . Orlando FL, 1999.
White, Robert W.. "Comparing State Repression of Pro-State Vigilantes and Anti-State Insurgents: Northern Ireland." Mobilization 4, no. 2 (1999).
Roycroft, Robert W., and Don E. Kash. The Complexity Challenge: Technological Innovation in the 21st Century. London: Pinter, 1999.
Hatcher, Michael, Jay McDannel, and Stacy Ostfeld. "Computer Crimes." American Criminal Law Review 36, no. 397 (1999): 406.
Furnell, Steve, and Matthew Warren. "Computer Hacking and Cyber Terrorism: The Real Threats in the New Millennium." Computers and Security 18, no. 1 (1999): 30-32.
Schmitt, Michael N.. "Computer Network Attack and the Use of Force in International Law: Thought on a Normative Framework." Columbia Journal of International Law 37, no. 3 (1999): 893.
Hoffmann, Lisa. "Computers Change Rules of War, Civilians Still Get Hurt." The Washington Times (1999).
Hoffmann, Lisa. "Computers Change Rules of War, Civilians Still Get Hurt." The Washington Times (1999).
"The Concept for the Development of the Defense Establishment until 2004 with Outlook to 2009." Vojenské rozhledy 4 (1999): 3-15.
Ginsberg, Roy H.. "Conceptualizing the European Union as an International Actor: Narrowing the Theoretical Capability–Expectations Gap." Journal of Common Market Studies 37, no. 3 (1999): 429-454.
Conclusions of the Presidency. Tampere European Council, 1999.
Biad, Abdelwahab. "Conflict Prevention in the Euro-Med Partnership: Challenges and Prospects." The International Spectator 24, no. 2 (1999): 17-31.
Stytz, Martin R., and Sheila B. Banks. Considerations and Issues for Distributed Mission Training Computer-Generated Actors In Eighth Conference on Computer Generated Forces and Behavioral Representation. Orlando FL, 1999.
Esposito, John L.. "Contemporary Islam: Reformation or Revolution?” in The Oxford History of Islam." New York: Oxford University Press, 1999.
Player, Steve, and Carol Cobble. Cornerstones of Decision Making: Profiles of Enterprise ABM . Greensboro, NC: Oakhill Press, 1999.
Rose-Ackerman, Susan. Corruption and Government: Causes, Consequences, and Reform. Cambridge: Cambridge University Press, 1999.
Fuguitt, Diana, and Shanton J. Wilcox. Cost-Benefit Analysis for Public Sector Decision Makers . Westport, Connecticut: Quorum Books, 1999.
Fuguitt, Diana, and Shanton J. Wilcox. Cost-Benefit Analysis for Public Sector Decision Makers. Westport, Connecticut: Quorum Books, 1999.
Book, Stephen A.. Cost-Risk Analysis Seminar – Its Role in Proposal Preparation, System Development, and Program Control. The Aerospace Corporation, 1999.
Vertusaev, M.C., Ya.Yu. Kondrat’ev, S.E. Pugachev, and A.M. Yurchenko. "Crime Methods Utilizing Bank Cards." Information Technologies for Information Protection 3, no. 1 (1999): 50-67.
Dunn, Ashley. "Crisis in Yugoslavia – Battle Spilling Over Onto the Internet." Los Angelis Times (1999).
Hwang, Min-Shiang. "Cryptanalysis of a Remote Login Authentication Scheme." Computer Communications 22 (1999): 742-744.
Krulak, Gen. C. C.. "Cultivating Intuitive Decision-making." Marine Corps Gazette (1999).
Gordy, Eric D.. The Culture of Power in Serbia: Nationalism and the Destruction of Alternatives. University Park, PA: Penn State University Press, 1999.

Страницы