Biblio

Export 8060 results:
Filters: Filter is   [Clear All Filters]
1999
Player, Steve, and Carol Cobble. Cornerstones of Decision Making: Profiles of Enterprise ABM (link is external). Greensboro, NC: Oakhill Press, 1999.
Rose-Ackerman, Susan. Corruption and Government: Causes, Consequences, and Reform. Cambridge: Cambridge University Press, 1999.
Fuguitt, Diana, and Shanton J. Wilcox. Cost-Benefit Analysis for Public Sector Decision Makers (link is external). Westport, Connecticut: Quorum Books, 1999.
Fuguitt, Diana, and Shanton J. Wilcox. Cost-Benefit Analysis for Public Sector Decision Makers(link is external). Westport, Connecticut: Quorum Books, 1999.
Book, Stephen A.. Cost-Risk Analysis Seminar – Its Role in Proposal Preparation, System Development, and Program Control(link is external). The Aerospace Corporation, 1999.
Vertusaev, M.C., Ya.Yu. Kondrat’ev, S.E. Pugachev, and A.M. Yurchenko. "Crime Methods Utilizing Bank Cards(link is external)." Information Technologies for Information Protection 3, no. 1 (1999): 50-67.
Dunn, Ashley. "Crisis in Yugoslavia – Battle Spilling Over Onto the Internet(link is external)." Los Angelis Times (1999).
Hwang, Min-Shiang. "Cryptanalysis of a Remote Login Authentication Scheme." Computer Communications 22 (1999): 742-744.
Krulak, Gen. C. C.. "Cultivating Intuitive Decision-making(link is external)." Marine Corps Gazette (1999).
Gordy, Eric D.. The Culture of Power in Serbia: Nationalism and the Destruction of Alternatives(link is external). University Park, PA: Penn State University Press, 1999.
Brewin, Bob. "Cyberattacks Against NATO Traced to China(link is external)." Federal Computer Week (1999).
Sharp, Walter Gary. Cyberspace and the Use of Force (link is external). Falls Church, VA: Aegis Research Corporation, 1999.
le Nobel, Johan J. Ingles-. "Cyberterrorism Hype(link is external)." Jane’s Intelligence Review (1999).
Vistica, Gregory L.. "Cyberwar and Sabotage(link is external)." Newsweek (1999).
Lyotard, Jean-Francois. Das postmoderne Wissen. Passagen(link is external)., 1999.
Hieb, Michael R., and James Blalock. Data Alignment between Army C4I Databases and Army Simulations(link is external) In Spring Simulation Interoperability Workshop. Orlando, Florida, 1999.
Kurz, A.. Data Warehousing: Enabling Technology. Bonn: MITP-Verlag, 1999.
Mandel, Robert. Deadly Transfers and the Global Playground: Transnational Security Threats in a Disorderly World (link is external). London: Praeger Publishers, 1999.
Declaration of the Government of the Russian Federation pertaining to the situation in the Chechen Republic and to regulative measures., 1999.
O’Halpin, Eunan. Defending Ireland: The Irish State and Its Enemies since 1922. Oxford: Oxford University Press, 1999.
Calder, R. B., J. Drummey, and F. Chamberlain. Definition of a Military Intelligent Agent Architecture(link is external) In Eighth Conference on Computer Generated Forces and Behavioral Representation. Orlando FL, 1999.
Blackman, Samuel S., and Robert Populi. Design and Analysis of Modern Tracking Systems(link is external). Norwood, MA: Artech House, 1999.
Ćosić, Krešimir, Todor Kostic, Miroslav Slamić, Mario Volarevic, and Ivica Kopriva. "Design and Implementation of a Hardware-in-the-Loop Simulator for a Semi-Automatic Guided Missile System(link is external)." Journal Simulation Practice & Theory 7, no. 2 (1999): 107-123.
Courtemanche, Anthony J.. Design Patterns for Computer Generated Forces(link is external) In Eighth Conference on Computer Generated Forces and Behavioral Representation . Orlando FL, 1999.
Gordon, Judith. "Designing a Distance Education Program for English for Special Purposes (ESP)(link is external)." TESOL Matters 9, no. 2 (1999).

Страници