Biblio

Export 8432 results:
2000
Timian, Donald H., Chris Wertman, Michael R. Hieb, Kevin Brandt, and Joseph Lacetera. Report Out of the C4I Study Group. Orlando, Florida: Fall Simulation Interoperability Workshop , 2000.
Resolution 1325 on Women, Peace and Security. United Nations Security Council , 2000.
Rajagopalan, Rajesh. "Restoring Normalcy’: The Evolution of the Indian Army's Counterinsurgency Doctrine." Small Wars & Insurgencies 11, no. 1 (2000): 44.
Fromm, Erich. Rewolucja nadziei. Ku uczłowieczonej technologii. Poznań: Rebis, 2000.
Grant, Robert. The RMA – Europe Can Keep in Step In Occasional Paper. Paris: ISS-WEU, 2000.
Padoa-Schioppa, Tomasso. The Road to Monetary Union in Europe: The Emperor, the Kings, and the Genies . Oxford: Oxford University Press, 2000.
Zolotarev, Vladimir A.. Rossiya (SSSR) v lokalnykh voynakh i voennych konfliktakh vtoroy poloviny XX veka. Moscow: Kuchkovo Pole, 2000.
Lorenz, Roger F. M.. "The Rule of Law in Kosovo: Problems and Prospects." Criminal Law Forum 11, no. 2 (2000): 132.
Antonenko, Oksana. "Russia, NATO and European Security after Kosovo." Survival 41, no. 4 (2000): 124-44.
Felgenhauer, Pavel. Russian Strategy in the Chechnya Wars In Parameter bewaffneter Konflikte. Studien und Berichte zur Sicherheitspolitik. Vienna: Schriftenreihe der Landesverteidi-gungsakademie, 2000.
"Russia's National Security Concept." Arms Control Today (2000).
Hadjitodorov, Stefan, and Todor Tagarev. "Scientific Research and Development in NATO." Military Journal 107, no. 4 (2000): 81-90.
Cottey, Andrew, Tim Edmunds, and Anthony Forster. The Second Generation Problematic: Rethinking Democratic Control of Armed Forces in Central and Eastern Europe. Transformation of Civil-Military Relations Paper 1.7, December, 2000.
Schneier, Bruce. Secrets & Lies—Digital Security in a Networked World. New York: John Wiley & Sons, 2000.
Hwang, M.S., Eric J. L. Lu, and I.C. Lin. "A secure nonrepudiable threshold proxy signature scheme with known signers." International Journal of Informatica 11, no. 2 (2000).
Gritzalis, Stefanos, Dimitrios Lekkas, Konstantinos Moulinos, Eleni Polydorou, and Sokratis K. Katsikas. "Securing the Electronic Market: the KEYSTONE Public Key Infrastructure Architecture." Computers and Security Journal 19, no. 8 (2000): 731-746.
Trapans, Dr. Jan Arveds. Security Sector Reform in Central and Eastern Europe: The Work of Civilians and the Military. Groningen: Centre for European Security Studies, 2000.
Security Strategy of the Republic of Albania., 2000.
Hellman, Joel S., Geraint Jones, and Daniel Kaufmann. Seize the State, Seize the Day: State Capture, Corruption and Influence in Transition . World Bank Policy Research Working Paper No. 2444 , 2000.
"Selling America to the Highest Bidder." Economist (2000): 79.
Wohl, Jonah Schulhofer. "Should We Privatize the Peacekeeping." Washington Post (2000).
M. Haque, Shamsul. "Significance of Accountability under the New Approach to Public Governance." International Review of Administrative Sciences 66, no. 4 (2000): 599-618.
Watts, Duncan J.. A simple model of fads and cascading failures., 2000.
Di Crescenzo, Giovanni, Tal Malkin, and Rafail Ostrovsky. Single Database Private Information Retrieval Implies Oblivious Transfer In Advances in Cryptology: EUROCRYPT’00: International Conference on the Theory and Application of Cryptographic Techniques . Vol. 1807. Bruges, Belgium, 2000.
Lee, A.. "Small firms must take Internet plunge or risk being sidelined." The Engineer 10 (2000): 10.

Страницы