Biblio

Export 21393 results:
2000
Project Management – Part 3: Guide to the Management of Business Related Project Risk. British Standards Institution, 2000.
Rubin, James P.. "The Promise of Freedom." Financial Times (2000).
Promotion of Transparency and Democratic Decision Making in the Formation of SEE States Military Budgets, Stability Pact for South Eastern Europe Seminar . Sofia, Bulgaria, 2000.
Marik, V., J. Lazansky, O. Stepankova, and M. Pechoucek. "Proplant: Multi-agent system for production planning." International Journal of Applied Artificial Intelligence (2000).
Sofaer, Abraham D., and Seymour D. Goodman. A Proposal for an International Convention on Cyber-Crime and Terrorism . Stanford: Center for International Security and Cooperation, Stanford University, 2000.
Gibson, Rachel, and Stephen Ward. "A Proposed Methodology for Studying the Function and Effectiveness of Party and Candidate Web Sites." Social Science Computer Review 18, no. 3 (2000): 305-306.
Du, Wenliang, and Mikhail J. Atallah. "Protocols for Secure Remote Database Access with Approximate Matching." In 7th ACM Conference on Computer and Communications Security, the 1st Workshop on Security and Privacy in E-Commerce. Athens, 2000.
M., Olcott. "Provisions for Succession in the Caspian Region." In Succession and Long-term Stability in the Caspian Region . Cambridge, MA: BCSIA, 2000.
Swets, John A., John Monahan, and Robyn M. Dawes. "Psychological Science Can Improve Diagnostic Decisions." Psychological Science in the Public Interest 1, no. 1 (2000): 1-26.
Zimbardo, Philip G.. "The Psychology of Evil." Eye on Psi Chi 5 (2000).
Crenshaw, Martha. "The Psychology of Terrorism: An Agenda for the 21st Century." Political Psychology (2000).
Pharr, Susan J., Robert D. Putnam, and Russel J. Dalton. "A Quarter Century of Declining Confidence: Trouble in Advanced Democracies?" Journal of Democracy 11 (2000): 5-25.
Donnelly, Jack. Realism and International Relations. Cambridge: Cambridge University Press, 2000.
Robertson, Lord George. Rebalancing NATO for a Strong Future In Defence Week Conference. Brussels, Belgium, 2000.
Kirk, Gwyn, and Carolyn Bowen Francis. "Redefining Security: Women Challenge U.S. Military Policy and Practice in East Asia." Berkeley Women’s Law Journal 15 (2000): 229-271.
"Reengineering Defence: the Role of C4." Information & Security: An International Journal 5 (2000): 5-8.
Planzer, Neil. "Regional Airspace Initiatives in Eastern Europe." ATC Quarterly 2 (2000): 11-16.
Regional Security Issues in Central Asia In meeting report, Carnegie Endowment for International Peace, Vol. 2, No. 8., 2000.
Zhorobekov, Zh.. Regionalnaya politika Kyrgyzstana v tranzitnyi period (Kyrgyzstan Religious Politics in Transition). Bishkek, 2000.
"Regulating the Internet." The Economist (2000).
Regulation on managing the Registry of Public Tenders. State Gazette 89 (31 October 2000), 2000.
Regulations for the Life Cycle Management of the Command, Control, Communications, Computers, and Intelligence Systems (C4I) in the Ministry of Defense and the Bulgarian Armed Forces. Sofia: Military Publishing House, 2000.
Maerli, Morten Bremer. "Relearning the ABCs: Terrorists and “Weapons of Mass Destruction"." Nonproliferation Review 110 (2000).
Sanasarian, Eliz. Religious Minorities in Iran . Cambridge: Cambridge University Press, 2000.
Hansen, Marc, and Robert F. Nesbit. Report of the Defense Science Board Task Force on Defense Software. Washington, D.C.: Defense Science Board, 2000.

Pages