Biblio

Export 21404 results:
2000
Morris, Stephen. "Contagion." The Review of Economic Studies 67, no. 1 (2000): 57-78.
Nickolov, Eugene. "Contemporary Trends in the Development of Information Security and Computer Virology." Information & Security: An International Journal 4 (2000): 60-72.
Korneev, V.V., and S.V. Sajin. "Control System for Computers Functionality and Network on Basis of Using Neural Nets." Neural Computers: Development and Application 1 (2000).
Cohen, Richard. Cooperative Security: Framework for a Better Future? In World Defense Systems 2000. Royal United Services Institution, 2000.
Chwistecka-Dudek, Halina, and Włodzimierz Sroka. "Core competencies – koncepcja strategiczna." Przegląd Organizacji 16, no. 3 (2000): 15-20.
Greene, David L., and Nataliya I. Tishchishyna. Costs of Oil Dependence: A 2000 Update. Oak Ridge, TN: Oak Ridge National Laboratory, 2000.
Rubin, James P.. "Countdown to a Very Personal War." Financial Times (2000).
Caraccilo, Dominic J., and John L. Pothin. "Coup d’oeil: The Commander’s Intuition in Clausewitzian Terms." Air & Space Power Journal (2000).
Maksimichev, I.. "Crisis of Confidence: NATO’s Balkan Adventure Brought Europe to the Threshold of a New Cold War." In European Union, Russia and the Baltic Situation. Moscow: Interdiktat, 2000.
Chan, Chi-Kwong, and L.M. Cheng. "Cryptanalysis of a Remote User Authentication Scheme Using Smart Cards." IEEE Transactions on Consumer Electronics 46, no. 4 (2000): 992-993.
Tselkov, Veselin. "Cryptographic Software Solution for Information Protection in a Corporate Intranet." Information & Security: An International Journal 4 (2000): 97-104.
Miller, William L., Åse B. Grødeland, and Tatyana Y. Koshechkina. A Culture of Corruption? Coping with Government in Post-Communist Europe. Budapest: Central European University Press, 2000.
Bruner, Jerome. The Culture of Education. Zagreb: Educa, 2000.
Warren, Matthew, and William Hutchinson. "Cyber Attacks Against Supply Chain Management Systems: A Short Note." International Journal of Physical Distribution & Logistics Management 30, no. 7-8 (2000): 710-16.
Boonruang, Sasiwimon, and Karnjana Karnjanatawe. "Cyber Laws Pass – but Confusion Reigns." Bangkok Post (2000).
Bristow, Damon. "Cyber-warfare rages across Taiwan Strait." Jane’s Intelligence Review (2000).
Galvin, John. Cyberwars Bring real-world Conflict to the Web., 2000.
Smets, Ph.. Data Fusion in the Transferable Belief Model In Proc. of Fusion 2000. Paris: Intern. Conf. on Information Fusion, 2000.
Mason, Colin R., and James Moffat. Decision Making Support: Representing the C2 Process in Simulations: Modelling the Human Decision-Maker In 2000 Winter Simulation Conference. Orlando, FL, USA, 2000.
Saunders, P.J., and G. Ward. "Decontamination of Chemically Contaminated Casualties: Implications for the Health Service and a Regional Strategy." Pre-hospital Immediate Care 4, no. 3 (2000): 122-125.
Starkey, Kate, and Andri van Mens. "Defence Budget Transparency on the Internet." Information & Security: An International Journal 5 (2000): 94-114.
Defence, United Kingdom Mi. Defence Diplomacy, Policy Paper 1. MoD , 2000.
Defending America’s Cyberspace: National Plan for Information Systems Protection, Version 1.0: An Invitation to a Dialogue. Washington, D.C.: The White House, 2000.
Hirst, Paul. "Democracy and Governance." In Debating Governance: Authority, Steering, and Democracy, edited by Jon Pierre, 13-35. Oxford: Oxford University Press, 2000.
Martin, Lisa L.. Democratic Commitments: Legislatures and International Cooperation. Princeton, NJ: Princeton University Press, 2000.

Pages