Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21414 results:
RTF
EndNote XML
2001
Baker, Peter
.
"
West Sees Putin’s Shield Plan as Dud
."
The International Herald Tribune
(2001).
Google Scholar
RTF
EndNote XML
Foster, Anthony
, and
William Wallace
.
"
What is NATO for
."
Survival
43, no. 4 (2001): 107-122.
Google Scholar
RTF
EndNote XML
Blazak, Randy
.
"
White Boys to Terrorist Men: Target Recruitment of Nazi Skinheads
."
American Behavioral Scientist
44, no. 6 (2001): 982-1000.
Google Scholar
RTF
EndNote XML
Watts, Larry L.
.
Whose Professionalism?: Separating the Institutional Roles of the Military and Police
. Camberley: Conflict Studies Research Centre, 2001.
Google Scholar
RTF
EndNote XML
Zubok, Vladislav M.
.
"
Why did the Cold War End in 1989? Explanation of ‘The Turn"
." In
Reviewing the Cold War. Approaches, Interpretation, Theory
. London: Frank Cass, 2001.
Google Scholar
RTF
EndNote XML
Brooks, Doug
.
"
Why Mercenaries Matter in Africa
."
Africa Analysis
(2001).
Google Scholar
RTF
EndNote XML
Gleason, Gregory
.
Why Russia is in Tajikistan
In
Comparative Strategy 20
., 2001.
Google Scholar
RTF
EndNote XML
Conger, Jay A.
.
"
Winning ‘Em Over: A New Model for Management in the Age of Persuasion
." (2001).
Google Scholar
RTF
EndNote XML
Nussbaum, Martha C.
.
Women and Human Development. The Capabilities Approach
. Cambridge: Cambridge University Press, 2001.
Google Scholar
RTF
EndNote XML
The World Fact Book: Afghanistan
. U.S. Central Intelligence Agency, 2001.
Google Scholar
RTF
EndNote XML
O’Neill, Mark
.
"
XML and Security
."
The XML Journal
2, no. 12 (2001): 10-15.
Google Scholar
RTF
EndNote XML
Bertino, Elisa
,
Barbara Carminati
, and
Elena Ferrari
.
"
XML Security
."
Information Security Technical Report
6, no. 2 (2001): 44-58.
Google Scholar
RTF
EndNote XML
Loughlin, Catherine
, and
Julian Barling
.
"
Young Workers’ Work Values, Attitudes, and Behaviors
."
Journal of Occupational and Organizational Psychology
74, no. 4 (2001).
Google Scholar
RTF
EndNote XML
Tropkina, Olga
.
"
Zakon o formirovanii SF prinyat, teper’ delo za prezidentom” (Law on forming the Federation Council is adopted, now it’s up to the President
."
Nezavisimaya gazeta
(2001).
Google Scholar
RTF
EndNote XML
Gołębiowski, T.
.
Zarządzanie strategiczne. Planowanie i kontrola
. Warsaw: Difin, 2001.
Google Scholar
RTF
EndNote XML
Вебер, М.
.
Генезис на западния рационализъм (антология)
. София: Критика и хуманизъм, 2001.
Google Scholar
RTF
EndNote XML
Концепция за планиране, програмиране и бюджетиране в Министерството на отбраната и въоръжените сили
. Военно издателство, 2001.
Google Scholar
RTF
EndNote XML
К. Клаузевиц, фон
.
Теория на голямата война
. Софи-Р, 2001.
Google Scholar
RTF
EndNote XML
2000
Power, Richard
.
"
2000 CSI/FBI Computer Crime and Security Survey
."
Computer Security Issues & Trends
(2000).
Google Scholar
RTF
EndNote XML
Greene, Robert
, and
Jost Elfers
.
The 48 Laws of Power
. London: Profile Books, 2000.
Google Scholar
RTF
EndNote XML
Miller, Gary
.
"
Above Politics: Credible Commitment and Efficiency in the Design of Public Agencies
."
Journal of Public Administration Research and Theory
10, no. 2 (2000): 289-328.
Google Scholar
RTF
EndNote XML
Lamberti, Fabrizion
,
Andrea Sanna
,
Antonio Fiume
,
Marco Maniezzo
, and
Claudio Zunino
.
An Accelerated Remote Graphics Architecture for PDAs
In
Web3D 2003 Symposium
. Saint Malo, France, 2000.
Google Scholar
RTF
EndNote XML
Achterberg/Schulte Kommentar zum Grundgesetz [Commentary on the German Basic Law]
. 4th ed. Vol. 2. Munich: Vahlen, 2000.
Google Scholar
RTF
EndNote XML
Gigerenzer, Gerd
.
Adaptive Thinking: Rationality in the Real World
. New York: Oxford University Press, 2000.
Google Scholar
RTF
EndNote XML
Daemen, Joan
, and
Vinvent Rijmen
.
Advance Encryption Standard
. Computer Security Division of the Information Technology Laboratory at the National Institute of Standards and Technology, U.S. Department of Commerce’s Technology Administration, 2000.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
715
716
717
718
719
720
721
722
723
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance