Biblio

Export 21423 results:
Filters: Filter is   [Clear All Filters]
1995
Hwang, Min-Shiang, and Wei-Pang Yang. "A Two-Phase Encryption Scheme for Enhancing Database Security(link is external)." Journal of Systems and Software 31, no. 12 (1995): 257-265.
Chumak, V.. Ukraine and the Crimea: a phenomenon border of Europe and the Orient (Україна та Крим: феномен кордону Європи та Сходу). Kyiv, 1995.
UN Security Council Resolution 1010 In UN Document., 1995.
UN Security Council Resolution 975., 1995.
Ding, Yun, and Patrick Horster. "Undetectable On-Line Password Guessing Attacks." ACM Operating Systems Review 29, no. 4 (1995): 77-86.
The United Nations Manual on the Prevention and Control of Computer Related Crime(link is external). International Review of Criminal Policy, 1995.
UNMIH After Action Report. BCTP archives, 1995.
UNMIH Facilitator Training In Battle Command Training Program. Vol. unpublished manuscript. BCTP archives, 1995.
UNMIH Training Schedule In Battle Command Training Program. BCTP archives, 1995.
Kulik, Mikhail, and Vladimir Orlov. "Uranovaya Krazha: Istoriya Guby Andreeva, (Theft of Uranium: History of Guba Andreeva)." Moskovskiye Novosti (1995).
Sarkesian, Sam. US National Security: Policy Makers, Processes and Politics. London: Lynne Reinner Publishers, 1995.
Brecke, Peter. Using Neural Networks to Find Harbingers of Violent Conflicts(link is external) In Preprints of the IFAC Conference on Supplemental Ways for Improving International Stability . Vienna, Austria, 1995.
Saperstein, Alvin M.. "War and Chaos(link is external)." American Scientist 83 (1995): 548-555.
Biden, Joseph R., and John B. Ritch. "The War Powers at a Constitutional Impasse: a Joint Decision Solution(link is external)." Georgetown Law Journal 77, no. 2 (1995).
Armstrong, R., T. Mitchell, T. Joachims, and D. Freitag. "Webwatcher: A learning apprentice for the world wide web(link is external)." In Working Notes of the AAAI Spring Symposium: Information Gathering from Heterogeneous, Distributed Environments . Stanford University: AAAI Press, 1995.
Rotschild, Emma. "What is security?" Daedalus 124, no. 3 (1995): 61.
Rodman, Peter W.. "Will NATO Survive?(link is external)" National Review (1995).
Miller, George A.. "WordNet: A Lexical Database for English." Communications of the ACM 38, no. 11 (1995).
"Is Your Business Protected? ." Management Review 84, no. 8 (1995): 43-45.
Earl, Michael, and David Feeny. "Is Your CIO Adding Value." The McKinsey Quarterly 2 (1995): 144-161.
""България в НАТО": в очакване на несъстоялия се дебат(link is external)." Капитал (1995).

Pages