Премини към основното съдържание
ИТ в сигурността
Екип
Изследователи
Сътрудници
Специалисти
Докторанти
Проекти
Текущи
Предстоящи
Завършени
Курсове
Отбранителна политика
Изследвания на сигурността
Киберсигурност
Администрация
Мениджмънт
Икономика
Иновации
Теми
виж всички
Ресурси
Публикации
Доклади
Позиции на ЦМСО
Презентации
Книги
Събития
Партньори
Контакти
Biblio
Export 8060 results:
RTF
EndNote XML
2000
Nelson, Daniel
.
"
Post Communist Insecurity
(link is external)
." In
Problems of Post-Communism
., 2000.
Google Scholar
(link is external)
RTF
EndNote XML
Moskos, Charles
,
John Allen Williams
, and
David Segal
.
Post Modern Militaries
(link is external)
., 2000.
Google Scholar
(link is external)
RTF
EndNote XML
Vukadinovic, Radovan
.
Post-Cold War Trends in International Relations
(link is external)
. Zagreb: Faculty of Political Science, 2000.
Google Scholar
(link is external)
RTF
EndNote XML
Lawford, Mark
,
Jeff McDougall
,
Peter Froebel
, and
Greg Moum
.
Practical Application of Functional and Relational Methods for the Specification and Verification of Safety Critical Software
(link is external)
In
Algebraic Methodology and Software Technology
., 2000.
Google Scholar
(link is external)
RTF
EndNote XML
Song, Dawn Xiaodong
,
David Wagner
, and
Adrian Perrig
.
"
Practical Techniques for Searches on Encrypted Data
." In
IEEE Symposium on Security and Privacy
. Berkeley, CA, USA, 2000.
Google Scholar
(link is external)
RTF
EndNote XML
"
Priming the Pump
."
Economist
(2000).
Google Scholar
(link is external)
RTF
EndNote XML
Kharchenko, Vyacheslav
.
The Probabilistic Assessment of Survivability and Safety of an Unmanned Control Systems with Multistage Degradation by Use of QD-diagrams
(link is external)
In
5th International Conference on Probabilistic Safety Assessment and Management
. Osaka, Japan, 2000.
Google Scholar
(link is external)
RTF
EndNote XML
Mosleh, A.
.
Procedures for treating Common Cause Failures in Safety and Reliability Studies. Analytical Background and Techniques
(link is external)
. NUREG/CR-4780 ERPI NP-5613, 2000.
Google Scholar
(link is external)
RTF
EndNote XML
Roeckle, Haio
,
Gerhard Schimpf
, and
Rupert Weidinger
.
Process-Oriented Approach for Role-Finding to Implement Role-Based Security Administration in a Large Industrial Organization
(link is external)
In
5th ACM Workshop on Role-Based Access Control (RBAC’00)
. Berlin, Germany, 2000.
Google Scholar
(link is external)
RTF
EndNote XML
Project Management – Part 3: Guide to the Management of Business Related Project Risk
(link is external)
. British Standards Institution, 2000.
Google Scholar
(link is external)
RTF
EndNote XML
Promotion of Transparency and Democratic Decision Making in the Formation of SEE States Military Budgets, Stability Pact for South Eastern Europe Seminar
(link is external)
. Sofia, Bulgaria, 2000.
Google Scholar
(link is external)
RTF
EndNote XML
Marik, V.
,
J. Lazansky
,
O. Stepankova
, and
M. Pechoucek
.
"
Proplant: Multi-agent system for production planning
(link is external)
."
International Journal of Applied Artificial Intelligence
(2000).
Google Scholar
(link is external)
RTF
EndNote XML
Sofaer, Abraham D.
, and
Seymour D. Goodman
.
A Proposal for an International Convention on Cyber-Crime and Terrorism
(link is external)
. Stanford: Center for International Security and Cooperation, Stanford University, 2000.
Google Scholar
(link is external)
RTF
EndNote XML
Gibson, Rachel
, and
Stephen Ward
.
"
A Proposed Methodology for Studying the Function and Effectiveness of Party and Candidate Web Sites
(link is external)
."
Social Science Computer Review
18, no. 3 (2000): 305-306.
Google Scholar
(link is external)
RTF
EndNote XML
Du, Wenliang
, and
Mikhail J. Atallah
.
"
Protocols for Secure Remote Database Access with Approximate Matching
." In
7th ACM Conference on Computer and Communications Security, the 1st Workshop on Security and Privacy in E-Commerce
. Athens, 2000.
Google Scholar
(link is external)
RTF
EndNote XML
M., Olcott
.
"
Provisions for Succession in the Caspian Region
(link is external)
." In
Succession and Long-term Stability in the Caspian Region
. Cambridge, MA: BCSIA, 2000.
Google Scholar
(link is external)
RTF
EndNote XML
Swets, John A.
,
John Monahan
, and
Robyn M. Dawes
.
"
Psychological Science Can Improve Diagnostic Decisions
(link is external)
."
Psychological Science in the Public Interest
1, no. 1 (2000): 1-26.
Google Scholar
(link is external)
RTF
EndNote XML
Crenshaw, Martha
.
"
The Psychology of Terrorism: An Agenda for the 21st Century
(link is external)
."
Political Psychology
(2000).
Google Scholar
(link is external)
RTF
EndNote XML
Pharr, Susan J.
,
Robert D. Putnam
, and
Russel J. Dalton
.
"
A Quarter Century of Declining Confidence: Trouble in Advanced Democracies?
"
Journal of Democracy
11 (2000): 5-25.
Google Scholar
(link is external)
RTF
EndNote XML
Robertson, Lord George
.
Rebalancing NATO for a Strong Future
(link is external)
In
Defence Week Conference
. Brussels, Belgium, 2000.
Google Scholar
(link is external)
RTF
EndNote XML
Kirk, Gwyn
, and
Carolyn Bowen Francis
.
"
Redefining Security: Women Challenge U.S. Military Policy and Practice in East Asia
(link is external)
."
Berkeley Women’s Law Journal
15 (2000): 229-271.
Google Scholar
(link is external)
RTF
EndNote XML
Planzer, Neil
.
"
Regional Airspace Initiatives in Eastern Europe
(link is external)
."
ATC Quarterly
2 (2000): 11-16.
Google Scholar
(link is external)
RTF
EndNote XML
Regional Security Issues in Central Asia
In
meeting report, Carnegie Endowment for International Peace, Vol. 2, No. 8
., 2000.
Google Scholar
(link is external)
RTF
EndNote XML
Zhorobekov, Zh.
.
Regionalnaya politika Kyrgyzstana v tranzitnyi period (Kyrgyzstan Religious Politics in Transition)
. Bishkek, 2000.
Google Scholar
(link is external)
RTF
EndNote XML
"
Regulating the Internet
(link is external)
."
The Economist
(2000).
Google Scholar
(link is external)
RTF
EndNote XML
Страници
« първа
‹ предишна
…
233
234
235
236
237
238
239
240
241
…
следваща ›
последна »
English
Български
Форма за търсене
Търси
Resources
Политика за сигурност
Киберсигурност
Разузнаване
Вътрешен ред и сигурност
Terrorism
Операции
Технологии и индустрия
Управление на човешките ресурси
Управление на аквизицията
Стратегия
Концепции и доктрини
Мениджмънт
Икономика на отбраната
Финансов мениджмънт
Мениджмът на информация и знание
Симулации и подготовка
Управление на промяната
Взимане на решение
Добро управление
Back to top