Biblio

Export 21393 results:
2003
Armstrong, Helen L., and Patrick J. Forde. "Internet Anonymity Practices in Computer Crime." Information Management and Computer Security 11, no. 5 (2003): 209-215.
Costigan, Sean. "Introduction." Connections: The Quarterly Journal 2, no. 3 (2003): 1-3.
Keohane, Robert. Introduction in Humanitarian Intervention: Ethical, Legal and Political Dilemmas. Cambridge: Cambridge University Press, 2003.
Papazoglou, Mike P., and Dimitrios Georgakopoulos. "Introduction to the Special Issue on Service-Oriented Computing." Communications of the ACM 46, no. 10 (2003): 24-28.
Guyon, Isabelle, and André Elisseeff. An Introduction to Variable and Feature Selection., 2003.
Dodge, Toby. Inventing Iraq: The Failure of Nation Building and a History Denied. New York: Columbia University Press, 2003.
Born, Hans. IPU-DCAF Handbook on Parliamentary Oversight of the Security Sector: Principles, Mechanisms and Practices. Geneva: DCAF, 2003.
Cordesman, Anthony H.. Iraq: Too uncertain to call. Centre for Strategic and International Studies, 2003.
Yahya, Harun, Ron Evans, and Carl Rossini. Islam denounces terrorism. ResearchGate, 2003.
Kourouche, Hind. "Islam in Australia and the US." Sydney Papers 15, no. 2 (2003).
Munson, Henry. "Islam, Nationalism and Resentment of Foreign Domination." Middle East Policy 10, no. 2 (2003): 40-53.
Khamidov, Alisher. "Islamic Radical Group Intensifies Underground Activity in Kyrgyzstan." Eurasia Insight (2003).
Jackson, Paul. Jane’s All the World’s Aircraft 2003-2004. Alexandria, VA: Jane’s Information Group, 2003.
Hill, Peter B. E.. The Japanese Mafia: Yakuza, Law, and the State. Oxford: Oxford University Press, 2003.
Thorp, Howard W., and Gregory F. Knapp. The Joint National Training Capability ‘The Centerpiece of Training Transformation’ In Interservice/ Industry Training, Simulation, and Education Conference (I/ITSEC)., 2003.
Foot, Peter. "Journal Style Guide." Connections: The Quarterly Journal 2, no. 1 (2003): 125-126.
Huizenga, D.. Key United States Programmes for the Security of Radioactive Sources, in Security of Radioactive Sources. Vienna, Austria, 2003.
Choi, Lee H.. "Knowledge management enablers, process, and organizational performance: an integrative view and empirical examination." Journal of Management Information Systems 20, no. 1 (2003): 179-228.
Smirnov, Alexander, Nikolai Chilov, Tatiana Levashova, F. Haritatos, and Mikhail Pashkin. "Knowledge Source Network Configuration Approach to Knowledge Logistics." International Journal of General Systems 32, no. 3 (2003): 251-269.
Gjurgjela, Jehona. Kosovo: Murders Expose Divided Community In IWPR’s Balkan Crisis Report., 2003.
Qirezi, Arben. Kosovo: Witness Protection Fears Grow In Institute for War and Peace Reporting, Balkan Crisis Report . Vol. 426., 2003.
Rybakowski, Marek. "Kultura bezpieczeństwa na tle stanu bezpieczeństwa dzieci i młodzieży w ruchu drogowym." In Edukacyjne zagrożenia początku XXI wieku, 100. Warsaw: Dom Wydawniczy Elipsa, 2003.
Özcan, Nihat Ali. Küreselleşme Bağlamında Terörizmle Mücadele (Counter-Terrorism within the Context of Globalization) In Birinci Uluslararası Sempozyum Bildirileri: Küreselleşme ve Uluslararası Güvenlik (The Proceedings of the First International Symposium on Globalization and International Security), SAREM. Ankara, 2003.
Davila, J.. "La Nueva Plaga del Spam." Newsletter SIC 57 (2003).
Gardner, Hall. "Labors of the New American Hercules: Transatlantic Relations in the Wake of the War with Iraq." Connections: The Quarterly Journal 2, no. 3 (2003): 27-34.

Pages