Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21386 results:
RTF
EndNote XML
1999
Jamieson, Allison
.
Cooperation between Organized Crime Groups around the World
. Research Institute for the Study of Conflict and Terrorism, 1999.
Google Scholar
RTF
EndNote XML
Player, Steve
, and
Carol Cobble
.
Cornerstones of Decision Making: Profiles of Enterprise ABM
. Greensboro, NC: Oakhill Press, 1999.
Google Scholar
RTF
EndNote XML
Rose-Ackerman, Susan
.
Corruption and Government: Causes, Consequences, and Reform
. Cambridge: Cambridge University Press, 1999.
Google Scholar
RTF
EndNote XML
Fuguitt, Diana
, and
Shanton J. Wilcox
.
Cost-Benefit Analysis for Public Sector Decision Makers
. Westport, Connecticut: Quorum Books, 1999.
Google Scholar
RTF
EndNote XML
Fuguitt, Diana
, and
Shanton J. Wilcox
.
Cost-Benefit Analysis for Public Sector Decision Makers
. Westport, Connecticut: Quorum Books, 1999.
Google Scholar
RTF
EndNote XML
Book, Stephen A.
.
Cost-Risk Analysis Seminar – Its Role in Proposal Preparation, System Development, and Program Control
. The Aerospace Corporation, 1999.
Google Scholar
RTF
EndNote XML
Vertusaev, M.C.
,
Ya.Yu. Kondrat’ev
,
S.E. Pugachev
, and
A.M. Yurchenko
.
"
Crime Methods Utilizing Bank Cards
."
Information Technologies for Information Protection
3, no. 1 (1999): 50-67.
Google Scholar
RTF
EndNote XML
Budzhurova, L.
.
"
Criminal pulp fiction with a horoscope (Кримінальна пульпа фантастика з гороскопом)
."
Stolichnie novosti
(1999): 1,5.
Google Scholar
RTF
EndNote XML
Clinton, William
.
"
Crisis in the Balkans; Clinton’s Remarks in Defense of Military Intervention in the Balkans
."
New York Times
(1999).
Google Scholar
RTF
EndNote XML
Dunn, Ashley
.
"
Crisis in Yugoslavia – Battle Spilling Over Onto the Internet
."
Los Angelis Times
(1999).
Google Scholar
RTF
EndNote XML
Hwang, Min-Shiang
.
"
Cryptanalysis of a Remote Login Authentication Scheme
."
Computer Communications
22 (1999): 742-744.
Google Scholar
RTF
EndNote XML
Krulak, Gen. C. C.
.
"
Cultivating Intuitive Decision-making
."
Marine Corps Gazette
(1999).
Google Scholar
RTF
EndNote XML
Gordy, Eric D.
.
The Culture of Power in Serbia: Nationalism and the Destruction of Alternatives
. University Park, PA: Penn State University Press, 1999.
Google Scholar
RTF
EndNote XML
Brewin, Bob
.
"
Cyberattacks Against NATO Traced to China
."
Federal Computer Week
(1999).
Google Scholar
RTF
EndNote XML
Sharp, Walter Gary
.
Cyberspace and the Use of Force
. Falls Church, VA: Aegis Research Corporation, 1999.
Google Scholar
RTF
EndNote XML
le Nobel, Johan J. Ingles-
.
"
Cyberterrorism Hype
."
Jane’s Intelligence Review
(1999).
Google Scholar
RTF
EndNote XML
Vistica, Gregory L.
.
"
Cyberwar and Sabotage
."
Newsweek
(1999).
Google Scholar
RTF
EndNote XML
Lyotard, Jean-Francois
.
Das postmoderne Wissen. Passagen
., 1999.
Google Scholar
RTF
EndNote XML
Hieb, Michael R.
, and
James Blalock
.
Data Alignment between Army C4I Databases and Army Simulations
In
Spring Simulation Interoperability Workshop
. Orlando, Florida, 1999.
Google Scholar
RTF
EndNote XML
Kurz, A.
.
Data Warehousing: Enabling Technology
. Bonn: MITP-Verlag, 1999.
Google Scholar
RTF
EndNote XML
Mandel, Robert
.
Deadly Transfers and the Global Playground: Transnational Security Threats in a Disorderly World
. London: Praeger Publishers, 1999.
Google Scholar
RTF
EndNote XML
Declaration of the Government of the Russian Federation pertaining to the situation in the Chechen Republic and to regulative measures
., 1999.
Google Scholar
RTF
EndNote XML
O’Halpin, Eunan
.
Defending Ireland: The Irish State and Its Enemies since 1922
. Oxford: Oxford University Press, 1999.
Google Scholar
RTF
EndNote XML
Calder, R. B.
,
J. Drummey
, and
F. Chamberlain
.
Definition of a Military Intelligent Agent Architecture
In
Eighth Conference on Computer Generated Forces and Behavioral Representation
. Orlando FL, 1999.
Google Scholar
RTF
EndNote XML
Connell, Robert W.
.
Der gemachte Mann. Konstruktion und Krise von Männlichkeiten
. Opladen: Leske & Budrich, 1999.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
738
739
740
741
742
743
744
745
746
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance