Премини към основното съдържание
ИТ в сигурността
Екип
Изследователи
Сътрудници
Специалисти
Докторанти
Проекти
Текущи
Предстоящи
Завършени
Курсове
Отбранителна политика
Изследвания на сигурността
Киберсигурност
Администрация
Мениджмънт
Икономика
Иновации
Теми
виж всички
Ресурси
Публикации
Доклади
Позиции на ЦМСО
Презентации
Книги
Събития
Партньори
Контакти
Biblio
Export 8062 results:
RTF
EndNote XML
1999
Esposito, John L.
.
"
Contemporary Islam: Reformation or Revolution?” in The Oxford History of Islam
." New York: Oxford University Press, 1999.
Google Scholar
RTF
EndNote XML
Player, Steve
, and
Carol Cobble
.
Cornerstones of Decision Making: Profiles of Enterprise ABM
. Greensboro, NC: Oakhill Press, 1999.
Google Scholar
RTF
EndNote XML
Rose-Ackerman, Susan
.
Corruption and Government: Causes, Consequences, and Reform
. Cambridge: Cambridge University Press, 1999.
Google Scholar
RTF
EndNote XML
Fuguitt, Diana
, and
Shanton J. Wilcox
.
Cost-Benefit Analysis for Public Sector Decision Makers
. Westport, Connecticut: Quorum Books, 1999.
Google Scholar
RTF
EndNote XML
Fuguitt, Diana
, and
Shanton J. Wilcox
.
Cost-Benefit Analysis for Public Sector Decision Makers
. Westport, Connecticut: Quorum Books, 1999.
Google Scholar
RTF
EndNote XML
Book, Stephen A.
.
Cost-Risk Analysis Seminar – Its Role in Proposal Preparation, System Development, and Program Control
. The Aerospace Corporation, 1999.
Google Scholar
RTF
EndNote XML
Vertusaev, M.C.
,
Ya.Yu. Kondrat’ev
,
S.E. Pugachev
, and
A.M. Yurchenko
.
"
Crime Methods Utilizing Bank Cards
."
Information Technologies for Information Protection
3, no. 1 (1999): 50-67.
Google Scholar
RTF
EndNote XML
Dunn, Ashley
.
"
Crisis in Yugoslavia – Battle Spilling Over Onto the Internet
."
Los Angelis Times
(1999).
Google Scholar
RTF
EndNote XML
Hwang, Min-Shiang
.
"
Cryptanalysis of a Remote Login Authentication Scheme
."
Computer Communications
22 (1999): 742-744.
Google Scholar
RTF
EndNote XML
Krulak, Gen. C. C.
.
"
Cultivating Intuitive Decision-making
."
Marine Corps Gazette
(1999).
Google Scholar
RTF
EndNote XML
Gordy, Eric D.
.
The Culture of Power in Serbia: Nationalism and the Destruction of Alternatives
. University Park, PA: Penn State University Press, 1999.
Google Scholar
RTF
EndNote XML
Brewin, Bob
.
"
Cyberattacks Against NATO Traced to China
."
Federal Computer Week
(1999).
Google Scholar
RTF
EndNote XML
Sharp, Walter Gary
.
Cyberspace and the Use of Force
. Falls Church, VA: Aegis Research Corporation, 1999.
Google Scholar
RTF
EndNote XML
le Nobel, Johan J. Ingles-
.
"
Cyberterrorism Hype
."
Jane’s Intelligence Review
(1999).
Google Scholar
RTF
EndNote XML
Vistica, Gregory L.
.
"
Cyberwar and Sabotage
."
Newsweek
(1999).
Google Scholar
RTF
EndNote XML
Lyotard, Jean-Francois
.
Das postmoderne Wissen. Passagen
., 1999.
Google Scholar
RTF
EndNote XML
Hieb, Michael R.
, and
James Blalock
.
Data Alignment between Army C4I Databases and Army Simulations
In
Spring Simulation Interoperability Workshop
. Orlando, Florida, 1999.
Google Scholar
RTF
EndNote XML
Kurz, A.
.
Data Warehousing: Enabling Technology
. Bonn: MITP-Verlag, 1999.
Google Scholar
RTF
EndNote XML
Mandel, Robert
.
Deadly Transfers and the Global Playground: Transnational Security Threats in a Disorderly World
. London: Praeger Publishers, 1999.
Google Scholar
RTF
EndNote XML
Declaration of the Government of the Russian Federation pertaining to the situation in the Chechen Republic and to regulative measures
., 1999.
Google Scholar
RTF
EndNote XML
O’Halpin, Eunan
.
Defending Ireland: The Irish State and Its Enemies since 1922
. Oxford: Oxford University Press, 1999.
Google Scholar
RTF
EndNote XML
Calder, R. B.
,
J. Drummey
, and
F. Chamberlain
.
Definition of a Military Intelligent Agent Architecture
In
Eighth Conference on Computer Generated Forces and Behavioral Representation
. Orlando FL, 1999.
Google Scholar
RTF
EndNote XML
Blackman, Samuel S.
, and
Robert Populi
.
Design and Analysis of Modern Tracking Systems
. Norwood, MA: Artech House, 1999.
Google Scholar
RTF
EndNote XML
Ćosić, Krešimir
,
Todor Kostic
,
Miroslav Slamić
,
Mario Volarevic
, and
Ivica Kopriva
.
"
Design and Implementation of a Hardware-in-the-Loop Simulator for a Semi-Automatic Guided Missile System
."
Journal Simulation Practice & Theory
7, no. 2 (1999): 107-123.
Google Scholar
RTF
EndNote XML
Courtemanche, Anthony J.
.
Design Patterns for Computer Generated Forces
In
Eighth Conference on Computer Generated Forces and Behavioral Representation
. Orlando FL, 1999.
Google Scholar
RTF
EndNote XML
Страници
« първа
‹ предишна
…
240
241
242
243
244
245
246
247
248
…
следваща ›
последна »
English
Български
Форма за търсене
Търси
Resources
Политика за сигурност
Киберсигурност
Разузнаване
Вътрешен ред и сигурност
Terrorism
Операции
Технологии и индустрия
Управление на човешките ресурси
Управление на аквизицията
Стратегия
Концепции и доктрини
Мениджмънт
Икономика на отбраната
Финансов мениджмънт
Мениджмът на информация и знание
Симулации и подготовка
Управление на промяната
Взимане на решение
Добро управление