Премини към основното съдържание
ИТ в сигурността
Екип
Изследователи
Сътрудници
Специалисти
Докторанти
Проекти
Текущи
Предстоящи
Завършени
Курсове
Отбранителна политика
Изследвания на сигурността
Киберсигурност
Администрация
Мениджмънт
Икономика
Иновации
Теми
виж всички
Ресурси
Публикации
Доклади
Позиции на ЦМСО
Презентации
Книги
Събития
Партньори
Контакти
Biblio
Export 8060 results:
RTF
EndNote XML
Filters:
Filter
is
[Clear All Filters]
2002
Najimova, Adolat
.
Central Asian Leaders Turn to Cult of Personality
(link is external)
. Center for Security Studies and Conict Research, 2002.
Google Scholar
(link is external)
RTF
EndNote XML
Hill, Christopher
.
"
CFSP: Conventions, Constitutions and Consequentiality
(link is external)
."
International Spectator
32, no. 4 (2002): 75-8.
Google Scholar
(link is external)
RTF
EndNote XML
Tibi, Bassam
.
The Challenge of Fundamentalism
(link is external)
. Berkeley: University of California Press, 2002.
Google Scholar
(link is external)
RTF
EndNote XML
Forster, Anthony
,
Timothy Edmunds
, and
Andrew Cottey
.
The Challenge of Military Reform in Post Communist Europe, Building Professional Armed Forces
(link is external)
. Basingstoke: Palgrave MacMillan, 2002.
Google Scholar
(link is external)
RTF
EndNote XML
Hadley, Stephen
.
Challenges and Change for NATO
(link is external)
. NATO, 2002.
Google Scholar
(link is external)
RTF
EndNote XML
Urbelis, V.
, and
T. Urbonas
.
"
The Challenges of Civil-Military Relations and Democratic Control of Armed Forces: the Case of Lithuania
(link is external)
." In
Democratic Control of the Military in Postcommunist Europe: Guarding the Guards
., 2002.
Google Scholar
(link is external)
RTF
EndNote XML
Sakhuja, Vijay
.
Challenging Terrorism at Sea
(link is external)
., 2002.
Google Scholar
(link is external)
RTF
EndNote XML
Milbank, Dana
.
"
Cheney Says Iraqi Strike Is Justified; Hussein Poses Threat, He Declares
(link is external)
."
Washington Post
(2002).
Google Scholar
(link is external)
RTF
EndNote XML
Economy, Elizabeth
.
China’s ‘Go West’ Campaign: Ecological Construction or Ecological Ex-ploitation?
In
Series 5
. China Environment, 2002.
Google Scholar
(link is external)
RTF
EndNote XML
Bouganim, Luc
, and
Philippe Pucheral
.
"
Chip-Secured Data Access: Confidential Data on Untrusted Servers
." In
28th International Conference on Very Large Data Bases
. Hong Kong, 2002.
Google Scholar
(link is external)
RTF
EndNote XML
Hamby, J.
.
"
Civil-military operations: joint doctrine and the Malayan Emergency
."
Joint Force Quarterly
32 (2002): 54-61.
Google Scholar
(link is external)
RTF
EndNote XML
Hoffmann, Stanley
.
"
Clash of Globalizations
(link is external)
."
Foreign Affairs 81:4
81, no. 4 (2002).
Google Scholar
(link is external)
RTF
EndNote XML
Sinnott, Richard
.
"
Cleavages, Parties and Referendums: Relationships between Representative and Direct Democracy in the Republic of Ireland
."
European Journal of Political Research
41 (2002): 815.
Google Scholar
(link is external)
RTF
EndNote XML
Koulouri, Christina
.
Clio in the Balkans: The Politics of History Education
(link is external)
. Thessaloniki: CDRSEE, 2002.
Google Scholar
(link is external)
RTF
EndNote XML
Lesser, Ian O.
.
"
Coalition Dynamics in the War against Terrorism
(link is external)
."
The International Spectator
2 (2002): 43-50.
Google Scholar
(link is external)
RTF
EndNote XML
Frank, Thomas
.
"
Coast Guard Faces New Security Role: Some Fear A Reduction of Boat-Safety Duties
(link is external)
."
Newsday
(2002).
Google Scholar
(link is external)
RTF
EndNote XML
Chang, Chin-Chen
,
Ju Yuan Hsiao
, and
Jyh-Chiang Yeh
.
"
A Colour Image Copyright Protection Scheme based on Visual Cryptography and Discrete Cosine Transform
(link is external)
."
The Imaging Science Journal
(2002): 133-140.
Google Scholar
(link is external)
RTF
EndNote XML
K., Sentz
, and
Ferson S
.
Combination of evidence in Dempster-Shafer Theory
(link is external)
In
SANDIA Tech. Report, SAND2002-0835
., 2002.
Google Scholar
(link is external)
RTF
EndNote XML
Moffat, James
.
Command and Control in the Information Age – Representing its Impact
(link is external)
. London, UK: The Stationery Office, 2002.
Google Scholar
(link is external)
RTF
EndNote XML
Radeski, Alex
,
Shawn Parr
,
Russell Keith-Magee
, and
John Wharington
.
Component-Based Development Extensions to HLA
In
2002 Spring Simulation Interoperability Workshop
. Vol. Paper ID 02S-SIW-046. SISO, 2002.
Google Scholar
(link is external)
RTF
EndNote XML
Silver, Daniel
.
Computer Network Attack as a Use of Force under Article 2(4)
In
International Law Studies
., 2002.
Google Scholar
(link is external)
RTF
EndNote XML
Preston, Ethan M.
, and
John Lofton
.
"
Computer Security Publications: Information Economics, Shifting Liability and the First Amendment
(link is external)
."
Whither Law Review
24, no. 71 (2002): 130.
Google Scholar
(link is external)
RTF
EndNote XML
"
Concept for the Development of a Professional Army of the Czech Republic and Mobilization of Armed Forces
."
Vojenské rozhledy
3 (2002).
Google Scholar
(link is external)
RTF
EndNote XML
Hutchinson, Asa
.
Congressional Testimony before the Senate Judiciary Committee’s Subcom-mittee on Technology, Terrorism and Government Information about Narco-Terror: The World Connection Between Drugs and Terror
(link is external)
., 2002.
Google Scholar
(link is external)
RTF
EndNote XML
Marsh, David
.
Content and Language Integrated Learning: The European Dimension—Actions, Trends and Foresight Potential
. DG Education & Culture, European Commission, 2002.
Google Scholar
(link is external)
RTF
EndNote XML
Страници
« първа
‹ предишна
…
189
190
191
192
193
194
195
196
197
…
следваща ›
последна »
English
Български
Форма за търсене
Търси
Resources
Политика за сигурност
Киберсигурност
Разузнаване
Вътрешен ред и сигурност
Terrorism
Операции
Технологии и индустрия
Управление на човешките ресурси
Управление на аквизицията
Стратегия
Концепции и доктрини
Мениджмънт
Икономика на отбраната
Финансов мениджмънт
Мениджмът на информация и знание
Симулации и подготовка
Управление на промяната
Взимане на решение
Добро управление
Back to top