Премини към основното съдържание
ИТ в сигурността
Екип
Изследователи
Сътрудници
Специалисти
Докторанти
Проекти
Текущи
Предстоящи
Завършени
Курсове
Отбранителна политика
Изследвания на сигурността
Киберсигурност
Администрация
Мениджмънт
Икономика
Иновации
Теми
виж всички
Ресурси
Публикации
Доклади
Позиции на ЦМСО
Презентации
Книги
Събития
Партньори
Контакти
Biblio
Export 8062 results:
RTF
EndNote XML
1982
McAdam, Doug
.
Political Process and the Development of Black Insurgency, 1930–1970
. Chicago: University of Chicago Press, 1982.
Google Scholar
RTF
EndNote XML
Bender, Bernice
, and
David M. Perkins
.
Seisrisk II: A Computer Program for Seismic Hazard Estimation
., 1982.
Google Scholar
RTF
EndNote XML
Hwang, J.
, and
D. Schutzer
.
Selected Analytical Concepts in Command and Control
. New York: Gordon and Breach Science Publishers, 1982.
Google Scholar
RTF
EndNote XML
Gaddis, John Lewis
.
Strategies of Containment: A Critical Appraisal of Postwar American National Security Policy
. New York: Oxford University Press, 1982.
Google Scholar
RTF
EndNote XML
Madarász, L.
.
Základné princípy situačného riadenia a formalizácie rozhodovacách procesov pri riadení zložitých hierarchických systémov
. Košice: EF VŠT Košice, 1982.
Google Scholar
RTF
EndNote XML
1981
Reid, D.B.
.
"
An Algorithm for Tracking Multiple Targets
."
IEEE Transactions on Aerospace and Electronic Systems AES-17
(1981): 122-130.
Google Scholar
RTF
EndNote XML
Smith, J.Q.
,
E.C. Zeeman
, and
P.J. Harrison
.
"
The Analysis of Some Discontinuous Decision Processes
."
European Journal of Operational Research
7 (1981): 30-43.
Google Scholar
RTF
EndNote XML
Clavell, J.
.
The Art of War By Sun Tzu
. London, England: Hodder and Stoughton, 1981.
Google Scholar
RTF
EndNote XML
Crenshaw, Martha
.
"
The Causes of Terrorism
."
Comparative Politics
13, no. 4 (1981): 383-84.
Google Scholar
RTF
EndNote XML
O’Brien, William V.
.
The Conduct of War and Limited War
. New York: Praeger, 1981.
Google Scholar
RTF
EndNote XML
Dougherty, James F.
, and
Robert L. Pfaltzgraff
.
Contending Theories of International Relations
. New York: Harper and Row, 1981.
Google Scholar
RTF
EndNote XML
Volkov, L.I.
.
Control of Air Complexes Operation
., 1981.
Google Scholar
RTF
EndNote XML
Davida, George I.
,
John B. Kam
, and
David L. Wells
.
"
A Database Encryption System with Subkeys
."
ACM Transactions on Database Systems
6, no. 2 (1981): 312-328.
Google Scholar
RTF
EndNote XML
O’Neil, William F.
.
Educational Ideologies: Contemporary Expressions of Educational Philosophies
. Santa Monica, CA: Goodyear Publishing Company, 1981.
Google Scholar
RTF
EndNote XML
Chaum, David L.
.
"
Electronic Mail, Return Address, and Digital Pseudonyms
."
Communication of the ACM
24 (1981): 84-88.
Google Scholar
RTF
EndNote XML
Rabin, Michael O.
.
How to Exchange Secrets by Oblivious Transfer
. Harvard University: Aiken Computation Laboratory, 1981.
Google Scholar
RTF
EndNote XML
Hydrologic Reference Book of the Rivers in the Republic of Bulgaria
. Vol. I. Hydrology and Meteorology, BAS, 1981.
Google Scholar
RTF
EndNote XML
Dubin, G. N.
, and
V. G. Suzdal
.
"
Introduction to Applied Game Theory (in Russian)
." In
Game Theory
. Moscow: Science, 1981.
Google Scholar
RTF
EndNote XML
Johnson, James Turner
.
Just War Tradition and the Restraint of War: A Moral and Historical Inquiry
. Princeton: Princeton University Press, 1981.
Google Scholar
RTF
EndNote XML
Shariati, Ali
.
Martyrdom: Arise and Bear Witness, trans. Ali Ghassemy
. Tehran: Ministry of Islamic Guidance, 1981.
Google Scholar
RTF
EndNote XML
Auten, James H.
.
The Paramilitary Model of Police and Police Professionalism
In
Police Studies 4
., 1981.
Google Scholar
RTF
EndNote XML
L., Lamport
.
"
Password Authentication with Insecure Communication
."
Communications of the ACM
24, no. 11 (1981): 770-772.
Google Scholar
RTF
EndNote XML
Kay, S.M.
, and
S. L. Marple
.
"
Spectrum Analysis. A Modern Perspective
."
IEEE
69, no. 11 (1981): 1380-1419.
Google Scholar
RTF
EndNote XML
Sterling, Claire
.
The Terror Network: The Secret War of International Terrorism
. New York: Henry Holt & Co , 1981.
Google Scholar
RTF
EndNote XML
Chaum, David L.
.
"
Untraceable Electronic Mail, Return Address and Digital Pseudonyms
."
Communictions of the ACM
24, no. 2 (1981): 84-88.
Google Scholar
RTF
EndNote XML
Страници
« първа
‹ предишна
…
306
307
308
309
310
311
312
313
314
…
следваща ›
последна »
English
Български
Форма за търсене
Търси
Resources
Политика за сигурност
Киберсигурност
Разузнаване
Вътрешен ред и сигурност
Terrorism
Операции
Технологии и индустрия
Управление на човешките ресурси
Управление на аквизицията
Стратегия
Концепции и доктрини
Мениджмънт
Икономика на отбраната
Финансов мениджмънт
Мениджмът на информация и знание
Симулации и подготовка
Управление на промяната
Взимане на решение
Добро управление