Biblio

Export 8450 results:
2002
Capability Based Planning for the Department of National Defence and the Canadian Forces . Canada: Department of National Defence, 2002.
Fisk, Mike. "Causes and Remedies for Social Acceptance of Network Insecurity." In Workshop on Economics and Internet Security. Berkeley: University of California, Berkeley, 2002.
Central Asia: Border Disputes and Conflict Potential In ICG Asia Report., 2002.
Garamone, Jim. “Central Asia Crucial to War on Terror. DefenseLink, 2002.
Najimova, Adolat. “Central Asian Leaders Turn to Cult of Personality. Center for Security Studies and Conict Research, 2002.
Hill, Christopher. "CFSP: Conventions, Constitutions and Consequentiality." International Spectator 32, no. 4 (2002): 75-8.
Tibi, Bassam. The Challenge of Fundamentalism. Berkeley: University of California Press, 2002.
Forster, Anthony, Timothy Edmunds, and Andrew Cottey. The Challenge of Military Reform in Post Communist Europe, Building Professional Armed Forces . Basingstoke: Palgrave MacMillan, 2002.
Hadley, Stephen. Challenges and Change for NATO. NATO, 2002.
Urbelis, V., and T. Urbonas. "The Challenges of Civil-Military Relations and Democratic Control of Armed Forces: the Case of Lithuania." In Democratic Control of the Military in Postcommunist Europe: Guarding the Guards., 2002.
Sakhuja, Vijay. Challenging Terrorism at Sea., 2002.
Milbank, Dana. "Cheney Says Iraqi Strike Is Justified; Hussein Poses Threat, He Declares." Washington Post (2002).
Economy, Elizabeth. China’s ‘Go West’ Campaign: Ecological Construction or Ecological Ex-ploitation? In Series 5. China Environment, 2002.
Bouganim, Luc, and Philippe Pucheral. "Chip-Secured Data Access: Confidential Data on Untrusted Servers." In 28th International Conference on Very Large Data Bases. Hong Kong, 2002.
Hamby, J.. "Civil-military operations: joint doctrine and the Malayan Emergency." Joint Force Quarterly 32 (2002): 54-61.
Hoffmann, Stanley. "Clash of Globalizations." Foreign Affairs 81:4 81, no. 4 (2002).
Sinnott, Richard. "Cleavages, Parties and Referendums: Relationships between Representative and Direct Democracy in the Republic of Ireland." European Journal of Political Research 41 (2002): 815.
Koulouri, Christina. Clio in the Balkans: The Politics of History Education. Thessaloniki: CDRSEE, 2002.
Lesser, Ian O.. "Coalition Dynamics in the War against Terrorism." The International Spectator 2 (2002): 43-50.
Frank, Thomas. "Coast Guard Faces New Security Role: Some Fear A Reduction of Boat-Safety Duties." Newsday (2002).
Chang, Chin-Chen, Ju Yuan Hsiao, and Jyh-Chiang Yeh. "A Colour Image Copyright Protection Scheme based on Visual Cryptography and Discrete Cosine Transform." The Imaging Science Journal (2002): 133-140.
K., Sentz, and Ferson S. Combination of evidence in Dempster-Shafer Theory In SANDIA Tech. Report, SAND2002-0835., 2002.
Moffat, James. Command and Control in the Information Age – Representing its Impact. London, UK: The Stationery Office, 2002.
Radeski, Alex, Shawn Parr, Russell Keith-Magee, and John Wharington. Component-Based Development Extensions to HLA In 2002 Spring Simulation Interoperability Workshop. Vol. Paper ID 02S-SIW-046. SISO, 2002.
Silver, Daniel. Computer Network Attack as a Use of Force under Article 2(4) In International Law Studies ., 2002.

Страницы