Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21406 results:
RTF
EndNote XML
1999
Fuguitt, Diana
, and
Shanton J. Wilcox
.
Cost-Benefit Analysis for Public Sector Decision Makers
. Westport, Connecticut: Quorum Books, 1999.
Google Scholar
RTF
EndNote XML
Book, Stephen A.
.
Cost-Risk Analysis Seminar – Its Role in Proposal Preparation, System Development, and Program Control
. The Aerospace Corporation, 1999.
Google Scholar
RTF
EndNote XML
Vertusaev, M.C.
,
Ya.Yu. Kondrat’ev
,
S.E. Pugachev
, and
A.M. Yurchenko
.
"
Crime Methods Utilizing Bank Cards
."
Information Technologies for Information Protection
3, no. 1 (1999): 50-67.
Google Scholar
RTF
EndNote XML
Budzhurova, L.
.
"
Criminal pulp fiction with a horoscope (Кримінальна пульпа фантастика з гороскопом)
."
Stolichnie novosti
(1999): 1,5.
Google Scholar
RTF
EndNote XML
Clinton, William
.
"
Crisis in the Balkans; Clinton’s Remarks in Defense of Military Intervention in the Balkans
."
New York Times
(1999).
Google Scholar
RTF
EndNote XML
Dunn, Ashley
.
"
Crisis in Yugoslavia – Battle Spilling Over Onto the Internet
."
Los Angelis Times
(1999).
Google Scholar
RTF
EndNote XML
Hwang, Min-Shiang
.
"
Cryptanalysis of a Remote Login Authentication Scheme
."
Computer Communications
22 (1999): 742-744.
Google Scholar
RTF
EndNote XML
Krulak, Gen. C. C.
.
"
Cultivating Intuitive Decision-making
."
Marine Corps Gazette
(1999).
Google Scholar
RTF
EndNote XML
Gordy, Eric D.
.
The Culture of Power in Serbia: Nationalism and the Destruction of Alternatives
. University Park, PA: Penn State University Press, 1999.
Google Scholar
RTF
EndNote XML
Brewin, Bob
.
"
Cyberattacks Against NATO Traced to China
."
Federal Computer Week
(1999).
Google Scholar
RTF
EndNote XML
Sharp, Walter Gary
.
Cyberspace and the Use of Force
. Falls Church, VA: Aegis Research Corporation, 1999.
Google Scholar
RTF
EndNote XML
le Nobel, Johan J. Ingles-
.
"
Cyberterrorism Hype
."
Jane’s Intelligence Review
(1999).
Google Scholar
RTF
EndNote XML
Vistica, Gregory L.
.
"
Cyberwar and Sabotage
."
Newsweek
(1999).
Google Scholar
RTF
EndNote XML
Lyotard, Jean-Francois
.
Das postmoderne Wissen. Passagen
., 1999.
Google Scholar
RTF
EndNote XML
Hieb, Michael R.
, and
James Blalock
.
Data Alignment between Army C4I Databases and Army Simulations
In
Spring Simulation Interoperability Workshop
. Orlando, Florida, 1999.
Google Scholar
RTF
EndNote XML
Kurz, A.
.
Data Warehousing: Enabling Technology
. Bonn: MITP-Verlag, 1999.
Google Scholar
RTF
EndNote XML
Mandel, Robert
.
Deadly Transfers and the Global Playground: Transnational Security Threats in a Disorderly World
. London: Praeger Publishers, 1999.
Google Scholar
RTF
EndNote XML
Declaration of the Government of the Russian Federation pertaining to the situation in the Chechen Republic and to regulative measures
., 1999.
Google Scholar
RTF
EndNote XML
O’Halpin, Eunan
.
Defending Ireland: The Irish State and Its Enemies since 1922
. Oxford: Oxford University Press, 1999.
Google Scholar
RTF
EndNote XML
Calder, R. B.
,
J. Drummey
, and
F. Chamberlain
.
Definition of a Military Intelligent Agent Architecture
In
Eighth Conference on Computer Generated Forces and Behavioral Representation
. Orlando FL, 1999.
Google Scholar
RTF
EndNote XML
Connell, Robert W.
.
Der gemachte Mann. Konstruktion und Krise von Männlichkeiten
. Opladen: Leske & Budrich, 1999.
Google Scholar
RTF
EndNote XML
Blackman, Samuel S.
, and
Robert Populi
.
Design and Analysis of Modern Tracking Systems
. Norwood, MA: Artech House, 1999.
Google Scholar
RTF
EndNote XML
Ćosić, Krešimir
,
Todor Kostic
,
Miroslav Slamić
,
Mario Volarevic
, and
Ivica Kopriva
.
"
Design and Implementation of a Hardware-in-the-Loop Simulator for a Semi-Automatic Guided Missile System
."
Journal Simulation Practice & Theory
7, no. 2 (1999): 107-123.
Google Scholar
RTF
EndNote XML
Courtemanche, Anthony J.
.
Design Patterns for Computer Generated Forces
In
Eighth Conference on Computer Generated Forces and Behavioral Representation
. Orlando FL, 1999.
Google Scholar
RTF
EndNote XML
Gordon, Judith
.
"
Designing a Distance Education Program for English for Special Purposes (ESP)
."
TESOL Matters
9, no. 2 (1999).
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
739
740
741
742
743
744
745
746
747
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance