Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21423 results:
RTF
EndNote XML
Filters:
Www.state.gov
is
secretary
and
Rm
is
2011
and
11
is
176999.htm
[Clear All Filters]
1981
Auten, James H.
.
The Paramilitary Model of Police and Police Professionalism
In
Police Studies 4
., 1981.
Google Scholar
RTF
EndNote XML
L., Lamport
.
"
Password Authentication with Insecure Communication
."
Communications of the ACM
24, no. 11 (1981): 770-772.
Google Scholar
RTF
EndNote XML
Davis, Roger
.
"
Social Network Analysis: An Aid in Conspiracy Investigations
."
FBI Law Enforcement Bulletin
(1981): 50, 12, 11-19.
Google Scholar
RTF
EndNote XML
Kay, S.M.
, and
S. L. Marple
.
"
Spectrum Analysis. A Modern Perspective
."
IEEE
69, no. 11 (1981): 1380-1419.
Google Scholar
RTF
EndNote XML
Sterling, Claire
.
The Terror Network: The Secret War of International Terrorism
. New York: Henry Holt & Co , 1981.
Google Scholar
RTF
EndNote XML
Ouchi, William G.
.
Theory Z, How American Business Can Meet the Japanese Challenge
. New York: Avon Books, 1981.
Google Scholar
RTF
EndNote XML
Sacco, Dorothy E. Denning
.
"
Timestamps in Key Distribution System
."
Communications of the ACM
24, no. 8 (1981).
DOI
Google Scholar
RTF
EndNote XML
Chaum, David L.
.
"
Untraceable Electronic Mail, Return Address and Digital Pseudonyms
."
Communictions of the ACM
24, no. 2 (1981): 84-88.
Google Scholar
RTF
EndNote XML
Timmerman, Peter
.
Vulnerability, resilience and the collapse of society: a review of models and possible climatic applications
In
Environmental Monograph
. Toronto: Institute for Environmental Studies, University of Toronto, 1981.
Google Scholar
RTF
EndNote XML
Neff, Donald
.
Warriors at Suez: Eisenhower Takes America into the Middle East
. New York: Simon and Schuster, 1981.
Google Scholar
RTF
EndNote XML
1980
Saati, Thomas L.
.
The Analytic Hierarchy Process for Decision in a Complex World
. Pittsburgh, PA: RWS Publications, 1980.
Google Scholar
RTF
EndNote XML
Hofstede, Geert
.
Culture's Consequences: International Differences in Work-Related Values
. Newbury Park, CA: Sage, 1980.
Google Scholar
RTF
EndNote XML
O’Neill, Robert
.
"
Defense Policy
." In
Australia in World Affairs, 1971–1975
, 24-25. Sydney: George Allen and Unwin, 1980.
Google Scholar
RTF
EndNote XML
R., Yager R.
.
"
On the Dempster-Shafer Framework and New Combination Rules
."
Informations Sciences
41 (1980): 93-137.
Google Scholar
RTF
EndNote XML
Smith, Gerard C.
.
Doubletalk: The Story of the First Strategic Arms Limitation Talks
. Garden City, NY: Doubleday, 1980.
Google Scholar
RTF
EndNote XML
Fortescue, John A. C.
.
Environmental Geochemistry: A Holistic Approach
. New York: Springer-Verlag, 1980.
Google Scholar
RTF
EndNote XML
Packard, Norman
,
J. Crutchfield
,
J. Farmer
, and
R. Shaw
.
"
Geometry from a Time Series
."
Physical Review Letters
45, no. 9 (1980): 712-716.
Google Scholar
RTF
EndNote XML
Fromkin, David
.
"
The Great Game in Asia
."
Foreign Affairs
58 (1980): 936-951, quote on p. 950.
Google Scholar
RTF
EndNote XML
Vujaklija, Milan
.
Leksikon Stranih Reci i Izraza
. Belgrade, Serbia: Prosveta, 1980.
Google Scholar
RTF
EndNote XML
Lippert, Ekkehard
, and
Tjarck Rössler
.
Mädchen unter Waffen? Gesellschafts- und sozialpolitische Aspekte weiblicher Soldaten
In
SOWI-Report
. Munich: SOWI, 1980.
Google Scholar
RTF
EndNote XML
Ermarcora, Felix
.
Österreichische Verfassungslehre, (Austrian Constitutional Law)
. Vol. 2. Vienna: Braumüller Verlag, 1980.
Google Scholar
RTF
EndNote XML
Rubin, Barry
.
Paved with Good Intentions: The American Experience and Iran
. New York: Oxford University Press, 1980.
Google Scholar
RTF
EndNote XML
Rizvi, Sayyid Athar Abba
.
Shah Wali-Allah and His Times
. Canberra: Ma’rifat Publishing House, 1980.
Google Scholar
RTF
EndNote XML
Heninger, Karen L.
.
"
Specifying Software Requirements for Complex Systems: New Tech-niques and Their Applications
."
IEEE Transactions on Software Engineering
6, no. 1 (1980): 2-13.
DOI
Google Scholar
RTF
EndNote XML
Lupsha, Peter
.
"
Steps Toward a Strategic Analysis of Organized Crime
."
The Police Chief
(1980): 36-38.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
832
833
834
835
836
837
838
839
840
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance