Biblio
Export 8450 results:
Capability Based Planning for the Department of National Defence and the Canadian Forces . Canada: Department of National Defence, 2002.
Causes and Remedies for Social Acceptance of Network Insecurity." In Workshop on Economics and Internet Security. Berkeley: University of California, Berkeley, 2002.
"Central Asia: Border Disputes and Conflict Potential In ICG Asia Report., 2002.
Central Asia Crucial to War on Terror. DefenseLink, 2002.
Central Asian Leaders Turn to Cult of Personality. Center for Security Studies and Conict Research, 2002.
CFSP: Conventions, Constitutions and Consequentiality." International Spectator 32, no. 4 (2002): 75-8.
"The Challenge of Fundamentalism. Berkeley: University of California Press, 2002.
The Challenge of Military Reform in Post Communist Europe, Building Professional Armed Forces . Basingstoke: Palgrave MacMillan, 2002.
Challenges and Change for NATO. NATO, 2002.
The Challenges of Civil-Military Relations and Democratic Control of Armed Forces: the Case of Lithuania." In Democratic Control of the Military in Postcommunist Europe: Guarding the Guards., 2002.
"Challenging Terrorism at Sea., 2002.
Cheney Says Iraqi Strike Is Justified; Hussein Poses Threat, He Declares." Washington Post (2002).
"China’s ‘Go West’ Campaign: Ecological Construction or Ecological Ex-ploitation? In Series 5. China Environment, 2002.
Chip-Secured Data Access: Confidential Data on Untrusted Servers." In 28th International Conference on Very Large Data Bases. Hong Kong, 2002.
"Civil-military operations: joint doctrine and the Malayan Emergency." Joint Force Quarterly 32 (2002): 54-61.
"Clash of Globalizations." Foreign Affairs 81:4 81, no. 4 (2002).
"Cleavages, Parties and Referendums: Relationships between Representative and Direct Democracy in the Republic of Ireland." European Journal of Political Research 41 (2002): 815.
"Clio in the Balkans: The Politics of History Education. Thessaloniki: CDRSEE, 2002.
Coalition Dynamics in the War against Terrorism." The International Spectator 2 (2002): 43-50.
" "A Colour Image Copyright Protection Scheme based on Visual Cryptography and Discrete Cosine Transform." The Imaging Science Journal (2002): 133-140.
"Combination of evidence in Dempster-Shafer Theory In SANDIA Tech. Report, SAND2002-0835., 2002.
Command and Control in the Information Age – Representing its Impact. London, UK: The Stationery Office, 2002.
Component-Based Development Extensions to HLA In 2002 Spring Simulation Interoperability Workshop. Vol. Paper ID 02S-SIW-046. SISO, 2002.
Computer Network Attack as a Use of Force under Article 2(4) In International Law Studies ., 2002.
Страницы
- « первая
- ‹ предыдущая
- …
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- …
- следующая ›
- последняя »