Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21404 results:
RTF
EndNote XML
1999
White, Robert W.
.
"
Comparing State Repression of Pro-State Vigilantes and Anti-State Insurgents: Northern Ireland
."
Mobilization
4, no. 2 (1999).
Google Scholar
RTF
EndNote XML
Roycroft, Robert W.
, and
Don E. Kash
.
The Complexity Challenge: Technological Innovation in the 21st Century
. London: Pinter, 1999.
Google Scholar
RTF
EndNote XML
Tagarev, Todor
, and
Petya Ivanova
.
"
Computational Intelligence in Multi-Source Data and Information Fusion
."
Information & Security: An International Journal
2 (1999): 33-49.
DOI
Google Scholar
RTF
EndNote XML
Vraikov, Nikolay
, and
Alexi Naidenov
.
"
The Computer Aided Exercise – An Alternative of the Conventional Exercises in the Armed Forces
."
Information & Security: An International Journal
3 (1999): 119-131.
DOI
Google Scholar
RTF
EndNote XML
Hatcher, Michael
,
Jay McDannel
, and
Stacy Ostfeld
.
"
Computer Crimes
."
American Criminal Law Review
36, no. 397 (1999): 406.
Google Scholar
RTF
EndNote XML
Furnell, Steve
, and
Matthew Warren
.
"
Computer Hacking and Cyber Terrorism: The Real Threats in the New Millennium
."
Computers and Security
18, no. 1 (1999): 30-32.
Google Scholar
RTF
EndNote XML
Schmitt, Michael N.
.
"
Computer Network Attack and the Use of Force in International Law: Thought on a Normative Framework
."
Columbia Journal of International Law
37, no. 3 (1999): 893.
Google Scholar
RTF
EndNote XML
Carstensen, Peter
, and
Kjeld Schmidt
.
Computer supported cooperative work: new challenges to systems design
., 1999.
Google Scholar
RTF
EndNote XML
Hoffmann, Lisa
.
"
Computers Change Rules of War, Civilians Still Get Hurt
."
The Washington Times
(1999).
Google Scholar
RTF
EndNote XML
Hoffmann, Lisa
.
"
Computers Change Rules of War, Civilians Still Get Hurt
."
The Washington Times
(1999).
Google Scholar
RTF
EndNote XML
Zadeh, Lotfi A.
, and
Janusz Kacprzyk
.
Computing with Words in Information/Intelligent Systems – Part 1: Foundations
. Berlin Heidelber: Springer, 1999.
Google Scholar
RTF
EndNote XML
"
The Concept for the Development of the Defense Establishment until 2004 with Outlook to 2009
."
Vojenské rozhledy
4 (1999): 3-15.
Google Scholar
RTF
EndNote XML
Ginsberg, Roy H.
.
"
Conceptualizing the European Union as an International Actor: Narrowing the Theoretical Capability–Expectations Gap
."
Journal of Common Market Studies
37, no. 3 (1999): 429-454.
Google Scholar
RTF
EndNote XML
Conclusions of the Presidency
. Tampere European Council, 1999.
Google Scholar
RTF
EndNote XML
Biad, Abdelwahab
.
"
Conflict Prevention in the Euro-Med Partnership: Challenges and Prospects
."
The International Spectator
24, no. 2 (1999): 17-31.
Google Scholar
RTF
EndNote XML
Stytz, Martin R.
, and
Sheila B. Banks
.
Considerations and Issues for Distributed Mission Training Computer-Generated Actors
In
Eighth Conference on Computer Generated Forces and Behavioral Representation
. Orlando FL, 1999.
Google Scholar
RTF
EndNote XML
Constitution of Nigeria
., 1999.
Google Scholar
RTF
EndNote XML
Esposito, John L.
.
"
Contemporary Islam: Reformation or Revolution?” in The Oxford History of Islam
." New York: Oxford University Press, 1999.
Google Scholar
RTF
EndNote XML
Jamieson, Allison
.
Cooperation between Organized Crime Groups around the World
. Research Institute for the Study of Conflict and Terrorism, 1999.
Google Scholar
RTF
EndNote XML
Player, Steve
, and
Carol Cobble
.
Cornerstones of Decision Making: Profiles of Enterprise ABM
. Greensboro, NC: Oakhill Press, 1999.
Google Scholar
RTF
EndNote XML
Rose-Ackerman, Susan
.
Corruption and Government: Causes, Consequences, and Reform
. Cambridge: Cambridge University Press, 1999.
Google Scholar
RTF
EndNote XML
Fuguitt, Diana
, and
Shanton J. Wilcox
.
Cost-Benefit Analysis for Public Sector Decision Makers
. Westport, Connecticut: Quorum Books, 1999.
Google Scholar
RTF
EndNote XML
Fuguitt, Diana
, and
Shanton J. Wilcox
.
Cost-Benefit Analysis for Public Sector Decision Makers
. Westport, Connecticut: Quorum Books, 1999.
Google Scholar
RTF
EndNote XML
Book, Stephen A.
.
Cost-Risk Analysis Seminar – Its Role in Proposal Preparation, System Development, and Program Control
. The Aerospace Corporation, 1999.
Google Scholar
RTF
EndNote XML
Vertusaev, M.C.
,
Ya.Yu. Kondrat’ev
,
S.E. Pugachev
, and
A.M. Yurchenko
.
"
Crime Methods Utilizing Bank Cards
."
Information Technologies for Information Protection
3, no. 1 (1999): 50-67.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
738
739
740
741
742
743
744
745
746
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance