Премини към основното съдържание
ИТ в сигурността
Екип
Изследователи
Сътрудници
Специалисти
Докторанти
Проекти
Текущи
Предстоящи
Завършени
Курсове
Отбранителна политика
Изследвания на сигурността
Киберсигурност
Администрация
Мениджмънт
Икономика
Иновации
Теми
виж всички
Ресурси
Публикации
Доклади
Позиции на ЦМСО
Презентации
Книги
Събития
Партньори
Контакти
Biblio
Export 8060 results:
RTF
EndNote XML
Filters:
Filter
is
[Clear All Filters]
1999
Player, Steve
, and
Carol Cobble
.
Cornerstones of Decision Making: Profiles of Enterprise ABM
(link is external)
. Greensboro, NC: Oakhill Press, 1999.
Google Scholar
(link is external)
RTF
EndNote XML
Rose-Ackerman, Susan
.
Corruption and Government: Causes, Consequences, and Reform
. Cambridge: Cambridge University Press, 1999.
Google Scholar
(link is external)
RTF
EndNote XML
Fuguitt, Diana
, and
Shanton J. Wilcox
.
Cost-Benefit Analysis for Public Sector Decision Makers
(link is external)
. Westport, Connecticut: Quorum Books, 1999.
Google Scholar
(link is external)
RTF
EndNote XML
Fuguitt, Diana
, and
Shanton J. Wilcox
.
Cost-Benefit Analysis for Public Sector Decision Makers
(link is external)
. Westport, Connecticut: Quorum Books, 1999.
Google Scholar
(link is external)
RTF
EndNote XML
Book, Stephen A.
.
Cost-Risk Analysis Seminar – Its Role in Proposal Preparation, System Development, and Program Control
(link is external)
. The Aerospace Corporation, 1999.
Google Scholar
(link is external)
RTF
EndNote XML
Vertusaev, M.C.
,
Ya.Yu. Kondrat’ev
,
S.E. Pugachev
, and
A.M. Yurchenko
.
"
Crime Methods Utilizing Bank Cards
(link is external)
."
Information Technologies for Information Protection
3, no. 1 (1999): 50-67.
Google Scholar
(link is external)
RTF
EndNote XML
Dunn, Ashley
.
"
Crisis in Yugoslavia – Battle Spilling Over Onto the Internet
(link is external)
."
Los Angelis Times
(1999).
Google Scholar
(link is external)
RTF
EndNote XML
Hwang, Min-Shiang
.
"
Cryptanalysis of a Remote Login Authentication Scheme
."
Computer Communications
22 (1999): 742-744.
Google Scholar
(link is external)
RTF
EndNote XML
Krulak, Gen. C. C.
.
"
Cultivating Intuitive Decision-making
(link is external)
."
Marine Corps Gazette
(1999).
Google Scholar
(link is external)
RTF
EndNote XML
Gordy, Eric D.
.
The Culture of Power in Serbia: Nationalism and the Destruction of Alternatives
(link is external)
. University Park, PA: Penn State University Press, 1999.
Google Scholar
(link is external)
RTF
EndNote XML
Brewin, Bob
.
"
Cyberattacks Against NATO Traced to China
(link is external)
."
Federal Computer Week
(1999).
Google Scholar
(link is external)
RTF
EndNote XML
Sharp, Walter Gary
.
Cyberspace and the Use of Force
(link is external)
. Falls Church, VA: Aegis Research Corporation, 1999.
Google Scholar
(link is external)
RTF
EndNote XML
le Nobel, Johan J. Ingles-
.
"
Cyberterrorism Hype
(link is external)
."
Jane’s Intelligence Review
(1999).
Google Scholar
(link is external)
RTF
EndNote XML
Vistica, Gregory L.
.
"
Cyberwar and Sabotage
(link is external)
."
Newsweek
(1999).
Google Scholar
(link is external)
RTF
EndNote XML
Lyotard, Jean-Francois
.
Das postmoderne Wissen. Passagen
(link is external)
., 1999.
Google Scholar
(link is external)
RTF
EndNote XML
Hieb, Michael R.
, and
James Blalock
.
Data Alignment between Army C4I Databases and Army Simulations
(link is external)
In
Spring Simulation Interoperability Workshop
. Orlando, Florida, 1999.
Google Scholar
(link is external)
RTF
EndNote XML
Kurz, A.
.
Data Warehousing: Enabling Technology
. Bonn: MITP-Verlag, 1999.
Google Scholar
(link is external)
RTF
EndNote XML
Mandel, Robert
.
Deadly Transfers and the Global Playground: Transnational Security Threats in a Disorderly World
(link is external)
. London: Praeger Publishers, 1999.
Google Scholar
(link is external)
RTF
EndNote XML
Declaration of the Government of the Russian Federation pertaining to the situation in the Chechen Republic and to regulative measures
., 1999.
Google Scholar
(link is external)
RTF
EndNote XML
O’Halpin, Eunan
.
Defending Ireland: The Irish State and Its Enemies since 1922
. Oxford: Oxford University Press, 1999.
Google Scholar
(link is external)
RTF
EndNote XML
Calder, R. B.
,
J. Drummey
, and
F. Chamberlain
.
Definition of a Military Intelligent Agent Architecture
(link is external)
In
Eighth Conference on Computer Generated Forces and Behavioral Representation
. Orlando FL, 1999.
Google Scholar
(link is external)
RTF
EndNote XML
Blackman, Samuel S.
, and
Robert Populi
.
Design and Analysis of Modern Tracking Systems
(link is external)
. Norwood, MA: Artech House, 1999.
Google Scholar
(link is external)
RTF
EndNote XML
Ćosić, Krešimir
,
Todor Kostic
,
Miroslav Slamić
,
Mario Volarevic
, and
Ivica Kopriva
.
"
Design and Implementation of a Hardware-in-the-Loop Simulator for a Semi-Automatic Guided Missile System
(link is external)
."
Journal Simulation Practice & Theory
7, no. 2 (1999): 107-123.
Google Scholar
(link is external)
RTF
EndNote XML
Courtemanche, Anthony J.
.
Design Patterns for Computer Generated Forces
(link is external)
In
Eighth Conference on Computer Generated Forces and Behavioral Representation
. Orlando FL, 1999.
Google Scholar
(link is external)
RTF
EndNote XML
Gordon, Judith
.
"
Designing a Distance Education Program for English for Special Purposes (ESP)
(link is external)
."
TESOL Matters
9, no. 2 (1999).
Google Scholar
(link is external)
RTF
EndNote XML
Страници
« първа
‹ предишна
…
240
241
242
243
244
245
246
247
248
…
следваща ›
последна »
English
Български
Форма за търсене
Търси
Resources
Политика за сигурност
Киберсигурност
Разузнаване
Вътрешен ред и сигурност
Terrorism
Операции
Технологии и индустрия
Управление на човешките ресурси
Управление на аквизицията
Стратегия
Концепции и доктрини
Мениджмънт
Икономика на отбраната
Финансов мениджмънт
Мениджмът на информация и знание
Симулации и подготовка
Управление на промяната
Взимане на решение
Добро управление
Back to top