Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21386 results:
RTF
EndNote XML
2000
Personal Data Protection Law, in force since 2000
., 2000.
Google Scholar
RTF
EndNote XML
"
Peru Tops List of EDC Basket Cases
."
Ottawa Citizen
(2000): A4.
Google Scholar
RTF
EndNote XML
Machowski, Jacek
.
Piractwo w świetle historii i prawa
. Warsaw, 2000.
Google Scholar
RTF
EndNote XML
Bratnicki, Mariusz
.
Podstawy współczesnego myślenia o zarządzaniu
. Wyższa Szkoła Biznesu w Dąbrowie Górniczej, 2000.
Google Scholar
RTF
EndNote XML
Ong, Kelvin
.
Policing the Peace: Towards a Workable Paradigm
In
conference report from the International Peace Academy
. New York, 2000.
Google Scholar
RTF
EndNote XML
Wallace, Helen
, and
William Wallace
.
Policy Making in the EU
. 4th ed. Oxford: Oxford University Press, 2000.
Google Scholar
RTF
EndNote XML
Cizre, Umit
.
Politics and Military in Turkey into the 21st century
In
EUI Working Paper
., 2000.
Google Scholar
RTF
EndNote XML
Gladkevich, Yury
.
"
Poshel v Gory (Into the Mountains)
."
Profil
(2000).
Google Scholar
RTF
EndNote XML
Daqing, Wei
.
"
On the Positive and Negative Aspects of Military Websites
."
Zhongguo Guofang Bao
(2000).
Google Scholar
RTF
EndNote XML
Nelson, Daniel
.
"
Post Communist Insecurity
." In
Problems of Post-Communism
., 2000.
Google Scholar
RTF
EndNote XML
Moskos, Charles
,
John Allen Williams
, and
David Segal
.
Post Modern Militaries
., 2000.
Google Scholar
RTF
EndNote XML
Vukadinovic, Radovan
.
Post-Cold War Trends in International Relations
. Zagreb: Faculty of Political Science, 2000.
Google Scholar
RTF
EndNote XML
Lawford, Mark
,
Jeff McDougall
,
Peter Froebel
, and
Greg Moum
.
Practical Application of Functional and Relational Methods for the Specification and Verification of Safety Critical Software
In
Algebraic Methodology and Software Technology
., 2000.
Google Scholar
RTF
EndNote XML
Song, Dawn Xiaodong
,
David Wagner
, and
Adrian Perrig
.
"
Practical Techniques for Searches on Encrypted Data
." In
IEEE Symposium on Security and Privacy
. Berkeley, CA, USA, 2000.
Google Scholar
RTF
EndNote XML
"
Priming the Pump
."
Economist
(2000).
Google Scholar
RTF
EndNote XML
Kharchenko, Vyacheslav
.
The Probabilistic Assessment of Survivability and Safety of an Unmanned Control Systems with Multistage Degradation by Use of QD-diagrams
In
5th International Conference on Probabilistic Safety Assessment and Management
. Osaka, Japan, 2000.
Google Scholar
RTF
EndNote XML
Mosleh, A.
.
Procedures for treating Common Cause Failures in Safety and Reliability Studies. Analytical Background and Techniques
. NUREG/CR-4780 ERPI NP-5613, 2000.
Google Scholar
RTF
EndNote XML
Roeckle, Haio
,
Gerhard Schimpf
, and
Rupert Weidinger
.
Process-Oriented Approach for Role-Finding to Implement Role-Based Security Administration in a Large Industrial Organization
In
5th ACM Workshop on Role-Based Access Control (RBAC’00)
. Berlin, Germany, 2000.
Google Scholar
RTF
EndNote XML
Project Management – Part 3: Guide to the Management of Business Related Project Risk
. British Standards Institution, 2000.
Google Scholar
RTF
EndNote XML
Rubin, James P.
.
"
The Promise of Freedom
."
Financial Times
(2000).
Google Scholar
RTF
EndNote XML
Promotion of Transparency and Democratic Decision Making in the Formation of SEE States Military Budgets, Stability Pact for South Eastern Europe Seminar
. Sofia, Bulgaria, 2000.
Google Scholar
RTF
EndNote XML
Marik, V.
,
J. Lazansky
,
O. Stepankova
, and
M. Pechoucek
.
"
Proplant: Multi-agent system for production planning
."
International Journal of Applied Artificial Intelligence
(2000).
Google Scholar
RTF
EndNote XML
Sofaer, Abraham D.
, and
Seymour D. Goodman
.
A Proposal for an International Convention on Cyber-Crime and Terrorism
. Stanford: Center for International Security and Cooperation, Stanford University, 2000.
Google Scholar
RTF
EndNote XML
Gibson, Rachel
, and
Stephen Ward
.
"
A Proposed Methodology for Studying the Function and Effectiveness of Party and Candidate Web Sites
."
Social Science Computer Review
18, no. 3 (2000): 305-306.
Google Scholar
RTF
EndNote XML
Du, Wenliang
, and
Mikhail J. Atallah
.
"
Protocols for Secure Remote Database Access with Approximate Matching
." In
7th ACM Conference on Computer and Communications Security, the 1st Workshop on Security and Privacy in E-Commerce
. Athens, 2000.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
729
730
731
732
733
734
735
736
737
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance