Biblio

Export 21393 results:
2002
Mandelbaum, Michael. The Ideas That Conquered the World: Peace, Democracy, and Free Markets in the Twenty-First Century. New York: Public Affairs, 2002.
De Brucq, D., A. Sombo, and O. Colot. Identical Foundation of Probability Theory and Fuzzy Set Theory In 5th Intern. Conf. on Inf. Fusion. Annapolis, 2002.
Smart, Nigel. "An Identity Based Authentication Key Agreement Protocol Based on Pairing." Electronics Letters 38 (2002).
Rahim, Taiba. "An Identity of Strength: Personal Thoughts on Women in Afghanistan." Interna-tional Review of the Red Cross 847 (2002): 638.
IJCAI-99 Workshop on Ontologies, Problem-Solving Methods: Lessons Learned, and Future Trends., 2002.
Borov, Zaur, and Stephen Bowers. Illegal Weapons Traffic in Eastern Europe. Harrisonburg, VA: Nelson Institute for International and Public Affairs, James Madison University, 2002.
IMF Fiscal Transparency Homepage., 2002.
Galbraith, Steven, Keith Harrison, and David Soldera. "Implementing the Tate pairing." Algorithmic Number Theory, Lecture Note in Computer Science 2369 (2002).
Bojilov, Ljudmil. "An Improved Version of a Multiple Target Tracking Algorithm." Information & Security: An International Journal 9 (2002): 130-140.
Hwang, Jing-Jang, and Tzu-Chang Yeh. "Improvement on Peyravian-Zunic’s Password Authentication Schemes." IEICE Transactions on Communications E85-B, no. 4 (2002): 823-825.
Kotangian, Hayk. "In Agenda: Multi-Polar and Complementary Defense Policy." Golos Armenii (2002).
Krastev, Ivan. The Inexibility Trap: Frustrated Societies, Weak States and Democracy. Bratislava: United Nations Development Programme, 2002.
Monitor, ISIJ. "In memoriam." Information & Security: An International Journal 9 (2002): 177-179.
Chalmers, Malcolm, and Owen Greene. In Need of Attention: The UN Register in its Seventh Year. Bradford Arms Register Studies, 2002.
Lindley-French, Julian. "In the Shade of Locarno. Why European Defence is Failing." International Affairs 78, no. 4 (2002).
Flin, Rhona H., and Kevin Arbuthnot. Incident Command: Tales from the Hot Seat . Aldershot: Ashgate Publishing Company, 2002.
Milly, P.C.D., T. L. Delworth, K.A. Dunne, and R.T. Wetherald. "Increasing risk of great floods in a changing climate." Nature 415 (2002): 514-517.
Langit, Rachel. "Indonesia’s Military Business as Usual." Asia Times Online (2002).
Krastev, Ivan. The Inflexibility Trap: Frustrated Societies, Weak States, and Democracy. Bratislava: UNDP, 2002.
Alberts, David. Information age transformation, getting to a 21st century military. DOD Command and Control Research Program., 2002.
O’Brien, Kevin, and zhar Lev. "Information Operations and Counterterrorism." Jane’s Intelligence Review 14, no. 9 (2002).
Plessis, Lindie Du, and Rossouw von Solms. "Information Security Awareness: Baseline Education and Certification." Information Technology on the Move 8, no. 8 (2002): 1-12.
Peltier, Thomas R.. Information Security Policies, Procedure and Standards Guidelines for Effective Information Security Management. Bosca Raton, Florida: Auerbach publication, 2002.
Lee, B.S., M.E. Alexander, B.C. Hawkes, T.J. Lynham, B.J. Stocks, and P. Englefield. "Information systems in support of wildland fire management decision making in Canada." Computers and Electronics in Agriculture 37:1, no. 3 (2002): 185-198.
Stenmark, Dick. Information vs. knowledge: The role of intranets in knowledge management In Thirty-Fifth Annual Hawaii International Conference on System Sciences. IEEE Computer Society Press, 2002.

Pages