Biblio

Export 8062 results:
1999
Thomsen, D.J., Richard C. O’Brien, and C. Payne. Napoleon: Network Application Policy Environment In 4th ACM Workshop on Role-Based Access Control. Fairfax, Virginia, USA, 1999.
National Military Command Center Concept of Operations In Draft., 1999.
Sokolsky, Richard, and Tanya Charlick-Paley. “NATO and Caspian Security: A Mission Too Far?” In Project Air Force. Santa Monica, CA: RAND Corporation, 1999.
Yesson, Erik. "NATO and Russia in Kosovo." Perspectives 13 (1999): 15.
NATO Beefs up Forces, Moves to Block Yugoslav Oil. CNN.com, 1999.
Popov, Stefan. "NATO Expansion: From Collective Defence to Collective Security." Perspectives 13 (1999): 66.
Roberts, Adam. "NATO’s ‘Humanitarian War’ over Kosovo." Survival 41, no. 3 (1999): 104.
Wenger, Andreas, Kurt R. Spillman, and Hans W. Odenthal. Networking the Security Community in the Information Age. Third International Security Forum and First Conference of the PfP Consortium of Defense Academies and Security Studies Institutes, 1999.
Arquilla, John, David Ronfeldt, and Michele Zanini. "Networks, Netwar and Information-Age Terrorism." In Countering the New Terrorism, edited by Ian O. Lesser, David F. Ronfeldt, Michele Zanini, Brian Michael Jenkins, John Arquilla and Bruce Hoffman., 1999.
Kaldor, M.. New and Old Wars: Organised Violence in a Global Era. Cambridge: Polity Press, 1999.
Kaldor, Mary. New and Old Wars: Organized Violence in a Global Era. Stanford, CA: Stanford University Press, 1999.
Tagarev, Todor. The New Military Doctrine of The Republic of Bulgaria: Contribution of Communications and Information Technologies to Achieve National Security Objectives In C4/NCMC International Conference . Sofia, Bulgaria, 1999.
Simon, Jeffrey. "The New NATO Members: Will They Contribute?" In Strategic Forum 160 . Washington, D.C.: National Defense University, 1999.
Demchak, Chris C.. "New Security in Cyberspace: Emerging Intersection between Military and Civilian Contingencies." Journal of Contingencies and Crisis Management 7, no. 4 (1999): 181-198.
“Non-military instruments of crisis management In doc. 11044/99 REV1, 16/09/99. Council of the European Union, 1999.
Sun, Hung-Min, Tzonelih Hwang, and Narn-Yih Lee. Nonrepudiable Threshold Proxy Signatures In 9th National Conference on Information Security. Taiwan, 1999.
Perrow, Charles. Normal Accidents: Living with High-Risks. Princeton, NJ: Princeton University Press, 1999.
Goldgeier, James M.. Not Whether but When. Washington, D.C.: Brookings Institution Press, 1999.
Goldgeier, James M.. Not Whether But When: The U.S. Decision to Enlarge NATO. Washington, D.C.: Brookings Institute Press, 1999.
Lord, Christopher. "Now America Takes Over." Perspectives 13 (1999): 39-40.
Krzyżanowski, Leszek J.. O podstawach kierowania organizacjami inaczej: paradygmaty, modele, metafory, filozofia, metodologia, dylematy, trendy. Warsaw: PWN, 1999.
Oblivious Transfer and Polynomial Evaluation In 31st Annual ACM Symposium on Theory of Computing. Atlanta, Georgia, USA, 1999.
Naor, Moni, and Benny Pinkas. Oblivious Transfer with Adaptive Queries In Advances in Cryptology – CRYPTO’99: 19th Annual International Cryptology Conference, Edited by Michael J. Wiener. Vol. 1666. Computer Science 1666. Santa Barbara, California, USA, 1999.
Baron, B.J.M., and Voorst van Voorst. Openness and Transparency in Governance: Challenges and Opportunities In The Second NISPAcee Civil Service Forum. Maastricht, The Netherlands, 1999.
Aubin, Stephen P.. "Operation Allied Force: War or ‘Coercive Diplomacy’?" Strategic Review , no. 4 (1999).

Страници