Biblio

Export 21372 results:
2001
Bakken, B.E.. Handbook on Long Term Defence Planning.. Paris: NATO Research and Technology Agency, 2001.
Glenny, Misha. "Heading off Terrorism in the Balkans." New York Times (2001).
Judge, Clark S.. "Hegemony of the Heart." Policy Review 110 (2001).
Dai, Yan, Jilin Liu, Langang Li, and Hngqing Mao. A High Performance License Plate Recognition System based on the Web Technique In IEEE Intelligent Transportation Systems Conference. Oakland, CA, USA, 2001.
Wetter, D.C., C.D. Treser, and W.E. Daniell. "Hospital Preparedness for Victims of Chemical or Biological Terrorism." American Journal of Public Health 91, no. 5 (2001): 710-715.
Treat, Kimberly N., Janet M. Williams, Paul M. Furbee, William G. Manley, Floyd K. Russel, and Clarence D. Stamper. "Hospital Preparedness for Weapons of Mass Destruction Incidents: An Initial Assessment." Annals of Emergency Medicine 38, no. 5 (2001): 562-565.
Lockwood, Nick. "How the Soviet Union Transformed Terrorism." The Atlantic (2001).
Arreguín-Toft, Ivan. "How the Weak Win Wars: A Theory of Asymmetric Conflict." International Security 26, no. 1 (2001): 93-128.
Arreguín-Toft, Ivan. "How the Weak Win Wars: A Theory of Asymmetric Conflict." International Security 26, no. 1 (2001): 97-99.
Takács, Imre. The Hungarian Revolution of 1956. Monterey, CA: Naval Postgraduate School, 2001.
Schmid, Margrit, and Alice Schmid. I killed people. Wenn Kinder in den Krieg ziehen. Göttin-gen: Lamuv Verlag, 2001.
"I would have learned Russian (Я б вивчив російську)." Kievskii region (2001): 21.
Rinaldi, Steven, James Peerenboom, and Terrence Kelly. "Identifying, Understanding, and Analyzing Critical Infrastructure Interdependencies." IEEE Control Systems Magazine 21, no. 6 (2001): 11-25.
Edgar, Adrienne L.. Identities, Communities and Nations in Central Asia: A Historical Perspective In presentation given at a panel discussion entitled “Central Asia and Russia: Responses to the ‘War on Terrorism’”. Berkeley: University of California, 2001.
Boneh, Dan, and Matthew Franklin. Identity Based Encryption from the Weil Pairing In Lecture Notes in Computer Science ., 2001.
The Impact of Armed Conflict on Women and Girls: A Consultative Meeting on Mainstreaming Gender in Areas of Conflict and Reconstruction In United Nations Population Fund. Bratislava, Slovakia, 2001.
Dauber, Cory. "“The Impact of Mogadishu on U.S. Military Intervention." Armed Forces and Society (2001): 11.
Sonntag, Michael. "Improving Communication to Citizens and within Public Administration by Attribute Certificates." Knowledge Management in e-Government. KMGov-2001, Proceedings of the 2nd International Workshop on Knowledge Management and Electronic Government (2001).
Marsick, Victoria, and Karen Watkins. "Informal and Incidental Learning." In New Directions for Adult And Continuing Education. Vol. 89. Jossey-Bass, A Publishing Unit of John Wiley & Sons, 2001.
Camacho, David, César Hernández, and José M. Molina. "Information classification using fuzzy knowledge based agents." In IEEE International Conference on Systems, Man and Cybernetics. e-Systems and e-Man for Cybernetics in Cyberspace. Tucson, AZ, USA, USA , 2001.
Lugachev, M.I.. Information Security: Semeiotic and Economic Aspects In 4th Annual Conference of the PfP Consortium of Defense Academies and Security., 2001.
Lakov, Dimitar, and Georgi Kirov. Information Soft Computing Agents in Network Management In International Conference on Automatics and Informatics. Sofia, Bulgaria, 2001.
Totev, Dobromir, and Bisserka Boudinova. "Information Support for Effective Resource Management." Information & Security: An International Journal 6 (2001): 138-150.
Ivashchenko, Andrij, and Kateryna Sinitsa. Information Technology for Training Forces of Peacekeeping Operations In Telematics and Life-Long Learning. Proceeding of the International Workshop TLLL-2001 . Kyiv, Ukraine, 2001.
Erbscholoe, Michael, and John R. Vacca. Information Warfare: Combat Hackers and Cyber Attackers. Berkeley, California: : Osborne McGraw-Hill, 2001.

Pages