Biblio

Export 8450 results:
1999
Wingfield, Thomas. "Taking Aim at Regime Elites: Assassination, Tyrannicide, and the Clancy Doctrine." Maryland Journal of International Law and Trade 22 (1999).
Schlag, Peter M., Thomas K. Moesta, Stefan Rakowsky, and Georgi Graschew. "Telemedicine – The New Must for Surgery." Archives of Surgery 134 (1999): 1216-1221.
Meyers, Reinhard. Temeljni pojmovi i teorijske perspektive meðunarodnih odnosa . Osijek- Zagreb-Split: Pan-Liber, 1999.
Kofos, Evangelos. "Textbooks: The Pendulum of ‘Loading’ and ‘Disarming’ History: The Southeastern European Test Case." In Disarming History. International Conference on Combating Stereotypes and Prejudice in History Textbooks of Southeast Europe, 23-27. Stockholm: Nykopia Tryck AB, 1999.
Sun, Hung-Min, Tzonelih Hwang, and Narn-Yih Lee. "Threshold Proxy Signatures." IEE Proceedings- Computers and Digital Techniques 146, no. 5 (1999): 259-263.
Sun, Hung-Min, and Biing-Jang Chen. Time-Stamp Proxy Signature with Traceable Receivers In 9th National Conference on Information Security. Taiwan, 1999.
Romanyuk, S.. "Totalitarian Sects in Russia." Observer 5 (1999).
Zagorski, Andrei V.. "Traditional Russian Security Interests in the Caucasus and Central Asia. Perceptions and Realities." In Russia, the Caucasus, and Central Asia. The 21st Century Security Environment, edited by Rajan Menon, Yuri E. Fedorov and Ghia Nodia. New York: M. E. Sharpe, East West Institute, 1999.
Dror, Yebezkel. Transparency and Openness of Quality Democracy, in Openness and Transparency in Governance: Challenges and Opportunities In The Second NISPAcee Civil Service Forum. Maastricht, The Netherlands, 1999.
Georgiev, Vladimir. "Turkmeno-afganskaya granitsa mozhet stat` bezkontrol`noi." Nezavisimaya Gazeta (1999).
Lewis, T.. "Ubinet: The ubiquitous Internet will be wireless." IEEE Computer 32 (1999): 10.
Taylor, Ros. "UK: Partisans Wage Virtual War." The Guardian (1999).
Stern, Jessica. "The Ultimate Terrorists." Cambridge, MA: Harvard University Press (1999).
Stern, Jessica. The Ultimate Terrorists. Cambridge, MA: Harvard University Press, 1999.
Preston, Thomas, and Paul ‘t Hart. "Understanding and Evaluating Bureaucratic Politics: The Nexus Between Political Leaders and Advisory Systems." Political Psychology 20, no. 1 (1999): 49-98.
Booch, Grady, James Rumbaugh, and Ivar Jacobson. The Unified Modeling Language User Guide. Addison Wesley, 1999.
Bland, Douglas L.. "A Unified Theory of Civil-Military Relations." Armed Forces & Society 26, no. 1 (1999).
Daalder, Ivo H., and Micheal O’Hanlon. "Unlearning the Lessons of Kosovo." Foreign Policy Online (1999).
Becker, Elizabeth. "U.S. and Russia Agree on Joint Defense Against Y2K Debacles." New York Times (1999).
U.S. National Security Strategy for a New Century. The White House, 1999.
Hoffmann, Lisa. "U.S. Opened Cyber-War During Kosovo Fight." Washington Times (1999).
Barr, Stephen. "U.S., Russia Agree to Establish Y2K Center." Washington Post (1999).
Shogren, Elizabeth. "U.S., Russia Cooperate on Y2K Concerns." Los Angeles Times (1999).
Bowman, Tom. "U.S., Russian Military Ally Against Y2K Bug." Baltimore Sun (1999).
US State Department Report., 1999.

Страницы