Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21423 results:
RTF
EndNote XML
1999
Taylor, Ros
.
"
UK: Partisans Wage Virtual War
."
The Guardian
(1999).
Google Scholar
RTF
EndNote XML
Stern, Jessica
.
"
The Ultimate Terrorists
."
Cambridge, MA: Harvard University Press
(1999).
Google Scholar
RTF
EndNote XML
Stern, Jessica
.
The Ultimate Terrorists
. Cambridge, MA: Harvard University Press, 1999.
Google Scholar
RTF
EndNote XML
Preston, Thomas
, and
Paul ‘t Hart
.
"
Understanding and Evaluating Bureaucratic Politics: The Nexus Between Political Leaders and Advisory Systems
."
Political Psychology
20, no. 1 (1999): 49-98.
Google Scholar
RTF
EndNote XML
Booch, Grady
,
James Rumbaugh
, and
Ivar Jacobson
.
The Unified Modeling Language User Guide
. Addison Wesley, 1999.
Google Scholar
RTF
EndNote XML
Bland, Douglas L.
.
"
A Unified Theory of Civil-Military Relations
."
Armed Forces & Society
26, no. 1 (1999).
Google Scholar
RTF
EndNote XML
Daalder, Ivo H.
, and
Micheal O’Hanlon
.
"
Unlearning the Lessons of Kosovo
."
Foreign Policy Online
(1999).
Google Scholar
RTF
EndNote XML
Liang, Qiao
, and
Wang Xiangsui
.
Unrestricted Warfare
. Beijing: PLA Literature and Arts Publishing House, 1999.
Google Scholar
RTF
EndNote XML
Becker, Elizabeth
.
"
U.S. and Russia Agree on Joint Defense Against Y2K Debacles
."
New York Times
(1999).
Google Scholar
RTF
EndNote XML
U.S. National Security Strategy for a New Century
. The White House, 1999.
Google Scholar
RTF
EndNote XML
Hoffmann, Lisa
.
"
U.S. Opened Cyber-War During Kosovo Fight
."
Washington Times
(1999).
Google Scholar
RTF
EndNote XML
Barr, Stephen
.
"
U.S., Russia Agree to Establish Y2K Center
."
Washington Post
(1999).
Google Scholar
RTF
EndNote XML
Shogren, Elizabeth
.
"
U.S., Russia Cooperate on Y2K Concerns
."
Los Angeles Times
(1999).
Google Scholar
RTF
EndNote XML
Bowman, Tom
.
"
U.S., Russian Military Ally Against Y2K Bug
."
Baltimore Sun
(1999).
Google Scholar
RTF
EndNote XML
US State Department Report
., 1999.
Google Scholar
RTF
EndNote XML
Guindi, Fadwa El
.
Veil: Modesty, Privacy and Resistance
. New York: Berg, 1999.
Google Scholar
RTF
EndNote XML
Vienna Document 1999 of the Negotiations on Confidence- and Security-Building Measures
. Istanbul, 1999.
Google Scholar
RTF
EndNote XML
"
Voyennaya Doktrina Rossiyskoy Federatsii” (Military Doctrine of the Russian Federation)
."
Krasnaya Zvezda
(1999).
Google Scholar
RTF
EndNote XML
Belote, Howard
.
"
Warden and the Air Corps Tactical School: What Goes Around Comes Around
."
Airpower Journal
(1999).
Google Scholar
RTF
EndNote XML
Cox, Ingemar
,
Matt Miller
, and
Andrew McKellips
.
"
Watermarking as Communication with Side Information
."
Proceedings of the IEEE
87, no. 7 (1999).
Google Scholar
RTF
EndNote XML
Kim, Young-Sik
,
O-Hyung Kwon
, and
Rae-Hong Park
.
"
Wavelet Based Watermarking Method for Digital Images using the Human Visual System
."
Electronics Letters
35 (1999).
Google Scholar
RTF
EndNote XML
Talbott, Strobe
.
"
We are concerned about certain problems in the current campaign (Ми стурбовані певними проблемами в поточній кампанії)
."
Zerkalo nedeli
(1999): 1.
Google Scholar
RTF
EndNote XML
Hullen, J.
,
F. Weberskirch
, and
Ralph Bergmann
.
Webplan: Dynamic planning for domain-specific search in the internet
In
Workshop Planen und Konfigurieren PuK-99
., 1999.
Google Scholar
RTF
EndNote XML
MacFarlane, Neil
.
Western Engagement in Central Asia and the South Caucasus
. Royal Institute of International Affairs, Chatham House paper, 1999.
Google Scholar
RTF
EndNote XML
Tesar, Filip
.
"
What has NATO Achieved in Kosovo?
"
Perspectives
13 (1999): 56.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
752
753
754
755
756
757
758
759
760
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance