Biblio
Export 8432 results:
A High Performance License Plate Recognition System based on the Web Technique In IEEE Intelligent Transportation Systems Conference. Oakland, CA, USA, 2001.
Hospital Preparedness for Victims of Chemical or Biological Terrorism." American Journal of Public Health 91, no. 5 (2001): 710-715.
"Hospital Preparedness for Weapons of Mass Destruction Incidents: An Initial Assessment." Annals of Emergency Medicine 38, no. 5 (2001): 562-565.
"How the Weak Win Wars: A Theory of Asymmetric Conflict." International Security 26, no. 1 (2001): 93-128.
"How the Weak Win Wars: A Theory of Asymmetric Conflict." International Security 26, no. 1 (2001): 97-99.
"The Hungarian Revolution of 1956. Monterey, CA: Naval Postgraduate School, 2001.
I killed people. Wenn Kinder in den Krieg ziehen. Göttin-gen: Lamuv Verlag, 2001.
Identifying, Understanding, and Analyzing Critical Infrastructure Interdependencies." IEEE Control Systems Magazine 21, no. 6 (2001): 11-25.
"Identities, Communities and Nations in Central Asia: A Historical Perspective In presentation given at a panel discussion entitled “Central Asia and Russia: Responses to the ‘War on Terrorism’”. Berkeley: University of California, 2001.
The Impact of Mogadishu on U.S. Military Intervention." Armed Forces and Society (2001): 11.
"Improving Communication to Citizens and within Public Administration by Attribute Certificates." Knowledge Management in e-Government. KMGov-2001, Proceedings of the 2nd International Workshop on Knowledge Management and Electronic Government (2001).
"Information Security: Semeiotic and Economic Aspects In 4th Annual Conference of the PfP Consortium of Defense Academies and Security., 2001.
Information Soft Computing Agents in Network Management In International Conference on Automatics and Informatics. Sofia, Bulgaria, 2001.
Information Technology for Training Forces of Peacekeeping Operations In Telematics and Life-Long Learning. Proceeding of the International Workshop TLLL-2001 . Kyiv, Ukraine, 2001.
Information Warfare: Combat Hackers and Cyber Attackers. Berkeley, California: : Osborne McGraw-Hill, 2001.
The Inherent Limits of Military Forces in Policing Peace Operations." Interna-tional Peacekeeping 8, no. 3 (2001).
"Integration of Open Education to Information Society In Internet and Modern Society., 2001.
Intelligence Services in the Information Age: Theory and Practice ." In Ethics in International Relations: The Role of Intelligence Services after September 11. CSRC, RMA Sandhurst, M24, 2001.
"Interaktive Simulationen zum Krisenmanagement In Krisenproblematik., 2001.
Intermediating Technologies and Multi-Group Adoption: A Comparison of Consumer and Merchant Adoption Intentions toward a New Electronic Payment System." The Journal of Product Innovation Management 18, no. 2 (2001): 65-71.
"International Security and Law EnforcementA Look Ahead In speech at the Law Enforcement and National Security Global Forum. Edinburgh, 2001.
The Internet and State Control in Authoritarian Regimes: China, Cuba, and the Counterrevolution." Carnegie Endowment Working Papers (2001).
"Internet security experts of SRI International." New Yorker 28 (2001).
"Страницы
- « первая
- ‹ предыдущая
- …
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- …
- следующая ›
- последняя »