Biblio

Export 21373 results:
1996
Risse-Kappen, Thomas. "Collective Identity in a Democratic Community: The Case of NATO." In The Culture of National Security: Norms and Identity in World Politics, 357-399. New York: Columbia University Press, 1996.
Mahler, R.. "Combining Ambiguous Evidence with Respect to Ambiguous a priori Knowledge, I: Boolean Logic." IEEE Trans. on SMC, Part 1: Systems and Humans 26, no. 1 (1996): 27-41.
Czerwinski, Thomas J.. "Command and Control at the Crossroads." Parameters (1996).
Allard, Kenneth. Command, Control, and the Common Defense. Washington, DC: National Defense University, 1996.
Jarratt, Denise G.. "A Comparison of Two Alternative Interviewing Techniques Used within an Integrated Research Design: A Case Study in Outshopping Using Semistructured and Nondirected Interviewing Techniques." Marketing Intelligence and Planning 14, no. 6 (1996): 6-15.
Hamel, Gary, and C. K. Prahalad. Competing for the Future. Boston: Harvard Business School Press, 1996.
Hamel, Gary, and C.K. Prahaland. Competing for the Future . Boston, MA: Harvard Business School Press, 1996.
Alberts, David, and Tomas Czerwinski. Complexity, Global Politics, and National Security. Washington, D.C.: NDU Press, 1996.
Alexandre, Girod. "Computerized Classification of the Shoeprints of Burglar’s Soles." Forensic Science International 82, no. 1 (1996): 59-65.
Ivanov, Tilcho. Confidence and Security in the Balkans: The Role of Transparency in Defence Budgeting. Institute for Security and International Studies, 1996.
The Constitution of Ukraine., 1996.
Finnemore, Martha. "Constructing Norms of Humanitarian Intervention ." In The Culture of National Security: Norms and Identity in World Politics, 183. New York: Columbia University Press, 1996.
Duffy, Thomas M., and Donald J. Cunningham. "Constructivism: Implications for the Design and Delivery of Instruction." In Handbook of Research for Educational Communications and Technology, 171. New York: Simon & Schuster, 1996.
Slim, Hugo. "The Continuing Metamorphosis of the Humanitarian Practitioner: Some New Colours for an Endangered Chameleon." Disasters 192, no. 2 (1996).
Jennings, Nicholas R.. Coordination Techniques for Distributed Artificial Intelligence . O'Hare, 1996.
Holahan, Charles J., Rudolf H. Moos, and Jeanne A. Schaefer. "Coping, Stress Resistance, and Growth: Conceptualizing Adaptve Functioning." In Handbook of Coping: Theory, Research, Applications, 24-43, quote on p. 25. New York: John Wiley, 1996.
Nikolaidis, Nikos, and Ioannis Pitas. Copyright Protection of Images using Robust Digital Signatures In IEEE International Conference on Acoustics, Speech and Signal Processing(ICASSP-96). Vol. 4. Atlanta, Georgia, 1996.
Council Directive 96/82/EC of 9 December 1996 on the control of major-accident hazards involving dangerous substances In to be repealed and replaced in 2015 by Directive 2012/18/EU., 1996.
Council of Ministers communiqué. Tunis, 1996.
Council Regulation (EC) No 1257/96 of 20 June 1996 concerning humanitarian aid. Official Journal of the European Communities L163, 1996.
Tselkov, Veselin, Dragomir Pargov, and Rusin Petrov. Criteria of Computer System Security Assessment and Evaluation In nformation Aspects of Security and Development of Modern Societies, Edited by Velizar Shalamanov and Todor Tagarev. Sofia: AFCEA-Sofia, 1996.
Schneier, Bruce. Cryptography: Protocols, Algorithms, and Source Code in C. 2nd ed. New York, NY: John Wiley & Sons, 1996.
Council, National Research. "Cryptography’s Role in Securing the Information Society ." National Academy Press (1996).
Katzenstein, Peter J.. The Culture of National Security: Norms and Identity in World Politics. New York: Columbia University Press, 1996.
Childre, Doc Lew. Cut-thru: Achieve Total Security and Maximum Energy: A Scientifically Proven Insight on How to Care Without Becoming a Victim. Boulder Creek, Calif.: Planetary Publications, 1996.

Pages