Biblio

Export 8432 results:
1999
Green, Stephen. "Pentagon Giving Cyberwarfare High Priority." Copley News Service (1999).
Borger, Julian. "Pentagon kept the Lid on Cyberwar in Kosovo." The Guardian (1999).
Becker, Elizabeth. "Pentagon Sets Up New Center for Waging Cyberwarfare." New York Times (1999).
Akçapar, Burak. "PfP Training Centres: Improving training and education in the Partnership for Peace." NATO Review 47:3 (1999).
Sandler, Todd, and Keith Hartley. The Political Economy of NATO. Cambridge: Cambridge University Press, 1999.
Lee, Rensselaer W., and Francisco Thoumi. "The Political-Criminal Nexus in Colombia." Trends in Organized Crime 5 (1999): 60.
Khripunov, Igor. The Politics and Economics of Russia’s Conventional Arms Transfers In Dangerous Weapons, Desperate States. New York: Routledge, 1999.
Resnick, David. "Politics on the Internet: The Normalization of Cyberspace." The Politics of Cyberspace (1999): 55-56.
Thomas, Timothy L.. "Preventing Conflict Through Information Technology." Military Review 78, no. 6 (1999): 44-57.
Semerdzhiev, Atanas. Prezhivianoto ne podlezhi na obzhalvane. Sofia: Hristo Botev Publishing House, 1999.
Au, T.A.. A primer of CORBA: A framework for distribution applications in defence In Technical report. Salisbury, Australia: DSTO Electronics and Surveillance Research Lab, 1999.
Shalamanov, Velizar. "Priorities of Bulgarian Defense Policy and Planning." Security Policy 2 (1999): 3-21.
Singleton, Solveig. Privacy and Human Rights: Comparing the United States to Europe In Cato Institute White Paper., 1999.
Conference, Wilton Park. "The Privatisation of Security: Framing a Conflict Prevention and Peacebuilding Policy Agenda." International Alert (1999).
Pitt, Jeremy, and Fabio Bellifemine. A protocol-based semantics for FIPA’97 acl and its implementation in Jade In AI*IA ., 1999.
Provisional Assessment of Civilian Casualties and Destruction in the Territory of the FRY from 24 March to 8 June 1999. Ministry of Foreign Affairs, Yugoslavia, 1999.
Weller, Marc. "The Rambouillet Conference on Kosovo." International Affairs 75, no. 2 (1999): 216.
Caldor, Mary. "Razboaie noi si vechi (New and Old Wars)." Antet (1999): 117-127.
Card, Stuart K., Jock D. Mackinlay, and Ben Shneiderman. Readings in Information Visualization Using Vision to Think . San Francisco, CA: Morgan Kaufmann Publishers Inc., 1999)., 1999.
Jervis, Robert. "Realism, Neo-liberalism and Cooperation: Understanding the Debate." International Security 24, no. 1 (1999): 42-63.
Lipson, Michael. "The Reincarnation of COCOM: Explaining Post-Cold War Export Controls." The Non-Proliferation Review (1999): 33-51.
Smith, Gordon. "Reinventing Diplomacy: A Virtual Necessity." Virtual Diplomacy Series (1999).
Sun, Hung-Min, and B.-T. Hsieh. Remark on Two Nonrepudiable Proxy Signature Schemes In 9th National Conference on Information Security. Taiwan, 1999.
Remarks by the President at the Close of the Washington Summit. USIS Washington File, 1999.
Tan, Kaijun, and Hongwen Zhu. "Remote Password Authentication Scheme Based on Cross-Product." Computer Communications 22, no. 4 (1999): 390-393.

Страницы