Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21404 results:
RTF
EndNote XML
1996
Mileham, Patrick
, and
Keith Spacie
.
Transforming Corporate Leadership
. London: Financial, 1996.
Google Scholar
RTF
EndNote XML
Stańczyk, Jerzy
.
Understanding Contemporary Security
., 1996.
Google Scholar
RTF
EndNote XML
Alberts, David
.
The Unintended Consequences of Information Age Technologies
. Washington D.C.: NDU Press, 1996.
Google Scholar
RTF
EndNote XML
Ruggie, John Gerard
.
The United Nations and the Collective Use of Force: Whither? Or Whether?
. New York: United Nations Association of the USA, 1996.
Google Scholar
RTF
EndNote XML
Williams, Phil
, and
Ernesto Savona
.
United Nations and Transnational Organized Crime
. London: Frank Cass, 1996.
Google Scholar
RTF
EndNote XML
Woods, Ngaire
.
"
The Uses of Theory in the Study of International Relations
." In
Woods, Ngaire. ed. Explaining International Relations since 1945
. Oxford: Oxford University Press, 1996.
Google Scholar
RTF
EndNote XML
Schrodt, Philip
, and
Deborah Gerner
.
Using Cluster Analysis to Derive Early Warning Indicators for Political Change in the Middle East, 1979-1996
In
1996 Annual Conference of the American Political Science Association
. San Francisco, CA, 1996.
Google Scholar
RTF
EndNote XML
Kaplan, Robert
, and
David Norton
.
"
Using the Balanced Scorecard as a Strategic Management System
."
Harvard Business Review
(1996): 75-85.
Google Scholar
RTF
EndNote XML
Ashley, Wayne
.
"
What Shoe Was That? The use of Computerised Image Database to Assist in Identification
."
Forensic Science International
82, no. 1 (1996): 7-20.
Google Scholar
RTF
EndNote XML
"
"Авиационно въоръжение."
."
5
8, no. 11 (1996): 45.
Google Scholar
RTF
EndNote XML
Т.Д, Тагарев
, and
П.И. Иванова
.
"
Развитие на методите за прогнозиране на времеви редове
." In
Сборник научни трудове "Автоматика и информатика’96"
., 1996.
Google Scholar
RTF
EndNote XML
1995
Hobsbawm, Eric
.
Age of Extremes: The Short Twentieth Century 1914-1991
. London: Abacus, 1995.
Google Scholar
RTF
EndNote XML
Warden, John
.
"
Air Theory for the Twenty-First Century
."
Airpower Journal
(1995).
Google Scholar
RTF
EndNote XML
Holbrooke, Richard
.
"
America, a European Power
."
Foreign Affairs
(1995): 38-51.
Google Scholar
RTF
EndNote XML
Lúc, Andrej
.
"
Analysis of Spread Spectrum System Parameters for Design of Hidden Transmission
."
Radioengineering
4, no. 2 (1995).
Google Scholar
RTF
EndNote XML
Schneier, Bruce
.
Applied Cryptography: Protocols, Algorithms, and Source Code in C
. John Wiley & Sons, 1995.
Google Scholar
RTF
EndNote XML
On Approval of the Conceptual Design of Information Society in the Republic of Moldova and the Mechanism for Its Implementation
In
Government Decision of the Republic of Moldova
., 1995.
Google Scholar
RTF
EndNote XML
Migdalowitz, Carol
.
Armenia-Azerbaijan Conflict
In
CRS Issue Brief
. Washington, DC: The Library of Congress, Foreign Affairs and National Defense Division, 1995.
Google Scholar
RTF
EndNote XML
Stake, Robert E.
.
The Art of Case Study Research
., 1995.
Google Scholar
RTF
EndNote XML
Owen, David
.
Balkan Odyssey
. New York: Harcourt Brace, 1995.
Google Scholar
RTF
EndNote XML
Beijing Declaration and Platform for Action
., 1995.
Google Scholar
RTF
EndNote XML
Negroponte, Nicolas
.
Being Digital
. New York: Knopf, 1995.
Google Scholar
RTF
EndNote XML
Blair, W.
,
G. Watson
,
S. Hoffman
, and
G. Gentry
.
Benchmark problem for beam pointing control of phased array radar against maneuvering targets in the presence of false alarms and ECM
In
American Control Conference
., 1995.
Google Scholar
RTF
EndNote XML
Goodwyn, Craufurd
, and
Michael Nacht
.
Beyond Government
. Boulder: Westview Press, 1995.
Google Scholar
RTF
EndNote XML
Echevarria, II, Antulio J.
.
"
On the Brink of the Abyss: The Warrior Identity and German Military Thought before the Great War
."
War & Society
13, no. 2 (1995).
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
784
785
786
787
788
789
790
791
792
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance