Biblio

Export 21393 results:
1998
Schmidl, Erwin. "Police Functions in Police Operations." In Policing the New World Disorder: Peace Operations and Public Security, 40. Washington, D.C.: National Defense University Press, 1998.
Oakley, Robert B., Michael Dziedzic, and Eliot M. Goldberg. Policing the New World Disorder: Peace Operations and Public Security. Washington D.C.: National Defense University Press, 1998.
McChesney, Robert. "The Political Economy of Global Media." Media and Development 45, no. 4 (1998).
Schmid, Alex P., and Albert J. Jongman. Political Terrorism: A New Guide to Actors, Concepts, Data Bases, Theories, and Literature. New Brunswick, NJ: Transaction Books, 1998.
Brooks, Risa. Political-Military Relations and the Stability of Arab Regimes In Adelphi Paper. International Institute for Strategic Studies, 1998.
Keohane, Robert O., and Joseph S. Nye. "Power and Interdependence in the Information Age." Foreign Affairs 77, no. 5 (1998).
Keohane, Robert O., and Joseph S. Nye. "Power and Interdependence in the Information Age." Foreign Affairs 77, no. 5 (1998): 81-94.
Keohane, Robert O., and Joseph S. Nye. "Power and Interdependence in the Information Age." Foreign Affairs 77, no. 5 (1998).
Tarrow, Sidney. Power in Movement: Social Movements and Contentious Politics. New York: Cambridge University Press, 1998.
Cramer, Ronald, and Victor Shoup. A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Cipher Attack In Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology Crypto’98. Santa Barbara, California, USA, 1998.
Presidential Decision Directive NSC-63., 1998.
Shearer, David. "Private Armies and Military Intervention." Adelphi Paper No. 316 IISS (1998): 76.
S., Ferson, and Donald S.. Probability bounds analysis In International Conference on Probabilistic Safety Assessment and Management (PSAM4). New York: Springer-Verlag, 1998.
Monitor, ISIJ. "Problems on the Way to the Information Society: French Laws“on Dossiers”." Information & Security: An International Journal 1, no. 1 (1998): 118-134.
Shalamanov, Velizar. "Process-oriented Model of Information Warfare." Information & Security: An International Journal 1, no. 2 (1998): 59-66.
Ilega, D. I.. "Proliferation of Religious Organizations and How it Adds to the Nigerian Society." In The Nigerian environment and socio-economic development, 265-278. Port Harcourt, Rivers State [Nigeria]: SIJ Publishers, 1998.
S., Parsons. "A proof theoretic approach to qualitative probabilistic reasoning ." Int.J. of Approx. Reas 19 (1998): 265-297.
Proposal for Government Service Network (GSN) of the Electronic/Networked Government Program. Data Communication Group of Chunghwa Telecom Co. Ltd., 1998.
Gertner, Yael, Yuval Ishai, Eyal Kushilevitz, and Tal Malkin. "Protecting Data Privacy in Private Information Retrieval Schemes." In 30th Annual ACM Symposium on Theory of Computing. Dallas, Texas, USA, 1998.
Burr, William E.. Public Key Infrastructure (PKI) Technical Specifications: Part A - Technical Concept of Operations In NIST FPKI, Working Draft., 1998.
Hampson, Fen Osler, and Dean F. Oliver. "Pulpit Diplomacy: A Critical Assessment of the Axworthy Doctrine." International Journal 53 (1998): 379-406.
Bryson, N, and AA Mobolurin. A qualitative discriminant approach for generating In IEEE Transactions on Knowledge and Data Engineering. 2nd ed. Vol. 10., 1998.
Reactor Safety Study – An Assessment of Accident Risk in U.S. Commercial Nuclear Power Plants, WASH-1400 (NUREG-75/014)., 1998.
Herbst, Susan. Reading the Public Opinion: How Political Actors View The Democratic Process. Chicago: University of Chicago Press, 1998.
Angell, Ian. "The Real Politik of the Information Age." Information Strategy (1998).

Pages