Biblio

Export 21392 results:
1995
Sawyer, N., and C. Monckton. "‘Shoe-fit’ - A Computerised Shoe Print Database." In European Convention on Security and Detection, 86-89. Brighton, UK, 1995.
Bracken, Paul. "The Significance of DBK." In Dominant Battlespace Awareness, edited by Stuart Johnson and Martin Libicki. Washington, DC: NDU Press, 1995.
Haller, N.. The S/KEY One-Time Password System. Bellcore, 1995.
Senesen, Gulay Gunluk. "Some Economic Aspects of Turkish Armaments Spending." New Perspectives on Turkey 13 (1995): 75-91.
Weiss, Thomas G., and Jarat Choppa. "Sovereignty under Siege: From Intervention to Humanitarian Space." In Beyond Westphalia? State Sovereignty and International Intervention. Baltimore: Johns Hopkins University Press, 1995.
de Secondat, Charles, and Baron de Montesquieu. The Spirit of Laws. Cambridge University Press, 1995.
Donaldson, Thomas, and Lee E. Preston. "Stakeholder Theory of the Corporation: Concepts, Evidence and Implications." The Academy of Management Review 20, no. 1 (1995): 65-91.
Chilcoat, Richard. Strategic Art: The New Discipline for 21st Century Leaders. Carlisle, PA: U.S. Army War College, 1995.
Study on Enlargement. Brussels: NATO Office of Information and Press, 1995.
Mankins, John C.. Technology Readiness Levels: A White Paper. NASA, Office of Space Access and Technology, 1995.
Szafranski, Richard. "A Theory of Information Warfare. Preparing for 2020." Airpower Journal 9, no. 1 (1995): 56-65.
Johnston, Alistair Iain. "Thinking about Strategic Culture." International Security 19, no. 4 (1995): 37-39.
Merton, Robert. "The Thomas Theorem and the Matthew Effect?" Social Forces 74, no. 2 (1995): 380.
Geifman, Anna. Thou Shalt Kill: Revolutionary Terrorism in Russia, 1894–1917. Princeton, NJ: Princeton University Press, 1995.
Cline, Lydia Sloan. Today’s Military Wife: Meeting the Challenges of Service Life. Mechanicsburg, PA: Stackpole Books, 1995.
TOPAZ International Program: Lessons Learned in Technology Cooperation with Russia. Springfield, VA: Stephenson Printing, 1995.
Endsley, Mica R.. "Toward a Theory of Situation Awareness in Dynamic Systems." Human Factors (1995).
Jaggers, Keith, and Ted Robert Gurr. "Tracking Democracy’s Third Wave with the Polity III Data." Journal of Peace Research 31, no. 4 (1995).
Shelley, L.. "Transnational Organized Crime: An Imminent Threat to the Nation-State?" Journal of International Affairs 48, no. 2 (1995): 463.
Hwang, Min-Shiang, and Wei-Pang Yang. "A Two-Phase Encryption Scheme for Enhancing Database Security." Journal of Systems and Software 31, no. 12 (1995): 257-265.
Chumak, V.. Ukraine and the Crimea: a phenomenon border of Europe and the Orient (Україна та Крим: феномен кордону Європи та Сходу). Kyiv, 1995.
UN Security Council Resolution 1010 In UN Document., 1995.
UN Security Council Resolution 975., 1995.
Ding, Yun, and Patrick Horster. "Undetectable On-Line Password Guessing Attacks." ACM Operating Systems Review 29, no. 4 (1995): 77-86.
The United Nations Manual on the Prevention and Control of Computer Related Crime. International Review of Criminal Policy, 1995.

Pages