Biblio

Export 8062 results:
2002
Garamone, Jim. “Central Asia Crucial to War on Terror. DefenseLink, 2002.
Najimova, Adolat. “Central Asian Leaders Turn to Cult of Personality. Center for Security Studies and Conict Research, 2002.
Hill, Christopher. "CFSP: Conventions, Constitutions and Consequentiality." International Spectator 32, no. 4 (2002): 75-8.
Tibi, Bassam. The Challenge of Fundamentalism. Berkeley: University of California Press, 2002.
Forster, Anthony, Timothy Edmunds, and Andrew Cottey. The Challenge of Military Reform in Post Communist Europe, Building Professional Armed Forces . Basingstoke: Palgrave MacMillan, 2002.
Hadley, Stephen. Challenges and Change for NATO. NATO, 2002.
Urbelis, V., and T. Urbonas. "The Challenges of Civil-Military Relations and Democratic Control of Armed Forces: the Case of Lithuania." In Democratic Control of the Military in Postcommunist Europe: Guarding the Guards., 2002.
Sakhuja, Vijay. Challenging Terrorism at Sea., 2002.
Milbank, Dana. "Cheney Says Iraqi Strike Is Justified; Hussein Poses Threat, He Declares." Washington Post (2002).
Economy, Elizabeth. China’s ‘Go West’ Campaign: Ecological Construction or Ecological Ex-ploitation? In Series 5. China Environment, 2002.
Bouganim, Luc, and Philippe Pucheral. "Chip-Secured Data Access: Confidential Data on Untrusted Servers." In 28th International Conference on Very Large Data Bases. Hong Kong, 2002.
Hamby, J.. "Civil-military operations: joint doctrine and the Malayan Emergency." Joint Force Quarterly 32 (2002): 54-61.
Hoffmann, Stanley. "Clash of Globalizations." Foreign Affairs 81:4 81, no. 4 (2002).
Sinnott, Richard. "Cleavages, Parties and Referendums: Relationships between Representative and Direct Democracy in the Republic of Ireland." European Journal of Political Research 41 (2002): 815.
Koulouri, Christina. Clio in the Balkans: The Politics of History Education. Thessaloniki: CDRSEE, 2002.
Lesser, Ian O.. "Coalition Dynamics in the War against Terrorism." The International Spectator 2 (2002): 43-50.
Frank, Thomas. "Coast Guard Faces New Security Role: Some Fear A Reduction of Boat-Safety Duties." Newsday (2002).
Chang, Chin-Chen, Ju Yuan Hsiao, and Jyh-Chiang Yeh. "A Colour Image Copyright Protection Scheme based on Visual Cryptography and Discrete Cosine Transform." The Imaging Science Journal (2002): 133-140.
K., Sentz, and Ferson S. Combination of evidence in Dempster-Shafer Theory In SANDIA Tech. Report, SAND2002-0835., 2002.
Moffat, James. Command and Control in the Information Age – Representing its Impact. London, UK: The Stationery Office, 2002.
Radeski, Alex, Shawn Parr, Russell Keith-Magee, and John Wharington. Component-Based Development Extensions to HLA In 2002 Spring Simulation Interoperability Workshop. Vol. Paper ID 02S-SIW-046. SISO, 2002.
Silver, Daniel. Computer Network Attack as a Use of Force under Article 2(4) In International Law Studies ., 2002.
Preston, Ethan M., and John Lofton. "Computer Security Publications: Information Economics, Shifting Liability and the First Amendment." Whither Law Review 24, no. 71 (2002): 130.
"Concept for the Development of a Professional Army of the Czech Republic and Mobilization of Armed Forces." Vojenské rozhledy 3 (2002).
Hutchinson, Asa. Congressional Testimony before the Senate Judiciary Committee’s Subcom-mittee on Technology, Terrorism and Government Information about Narco-Terror: The World Connection Between Drugs and Terror., 2002.

Страници