Biblio

Export 21386 results:
2003
Klymov, Sergey. "Methodology for Assessing Possible Damage from the Security Violation of the Information of the Automated System." Yzvestyia TRTU 4, no. 33 (2003): 27-31.
Hochhut, Martin. "Militärische Bundesintervention bei inländischem Terrorakt." Neue Zeitschrift für Wehrrecht (2003): 154-67.
Schmidinger, Franz, and Werner Suez. "Militärkommando Niederösterreich: Das Katastro-pheneinsatzkonzept [Provincial Military Command/Lower Austria: Disaster Relief Concept]." Truppendienst 2 (2003).
Szpyra, Ryszard. Militarne operacje informacyjne. Warsaw: AON, 2003.
Brömmelhörster, Jörn, and Wolf-Christian Paes. The Military as an Economic Actor: Soldiers in Business. New York: Palgrave Macmillan, 2003.
The Military Balance 2002-2003. London: The Institute for Strategic Studies, 2003.
Annati, Massimo. "Military Technology." Mine Hunting & Mine Clearing Revisited (2003): 48.
Sloan, Stanley R., and Heiko Borchert. "Mind the Three Transatlantic Power Gaps: How a New Framework Can Help Reinvent the Transatlantic Relationship." Connections: The Quarterly Journal 2, no. 3 (2003): 35-49.
Chouvy, Pierre-Arnaud, Michel Koutouzis, and Alain Labrousse. "Ministerial Conference on the Drug Routes from Central Asia to Europe." In Ministerial Conference on the Drug Routes from Central Asia to Europe. Paris , 2003.
Ben van der Merwe, Pieter. Mobile commerce over GSM: A banking perspective on security In Faculty of Engineering. Vol. Master of Science (Electronics). University of Pretoria, 2003.
Cohen, Marc. "Mobile Lunar and Planetary Bases." In Space 2003 Conference . San Diego, CA, 2003.
Model Driven Architecture. Object Management Group, 2003.
Niemeyer, Klaus. "Modeling and Simulation in Defense." Information & Security: An International Journal 12, no. 1 (2003): 19-42.
Monitor, ISIJ. "Modeling and Simulation Internet Sources." Information & Security: An International Journal 12, no. 2 (2003): 261-275.
Hristov, Hristo. "Modeling in Shaped Charge Design." Information & Security: An International Journal 12, no. 2 (2003): 225-231.
Taylor, Trevor K.. "Modelling Offset Policy in Government Procurement." Journal of Policy Modelling 25, no. 9 (2003): 985-98.
Mao, Wenbo. Modern Cryptography: Theory and Practice. Prentice Hall PTR, 2003.
Andonov, Svetoslav, Katerina Kostadinova, and Emil Simeonov. "Modern Information Technologies and General Public Protection in the Republic of Bulgaria." Information & Security: An International Journal 10 (2003): 43-55.
Shen, Jau-Ji, Chih-Wei Lin, and Min-Shiang Hwang. "A Modified Remote User Authentication Scheme Using Smart Cards." IEEE Transactions on Consumer Electronics 49, no. 2 (2003): 414-416.
Dolnik, Adam, and Richard Pilch. "The Moscow Theater Incident: Perpetrators, Tactics, and the Russian Response." International Negotiation 8, no. 3 (2003).
Moravcik, Andrew. "The Myth of a European ‘Leadership Crisis'." Challenge Europe 11 (2003).
Syroezhkin, K.L.. Myths and Realities of Ethnic Separatism in China and Security of Central Asia . Almaty: Daikh Press, 2003.
Rigby, William. Nation Building: An Essential Army Task In U.S. Army War College Strategy Research Project., 2003.
National Institute of Standards and Technology (NIST), Recommended Security Controls for Federal Information Systems and Organizations. NIST Special Publication , 2003.
National Security Council Law. Vol. 160-161 . Justice Ministry web site, 2003.

Pages