Biblio

Export 21372 results:
2003
Kelly, Timothy. Managing Complex Safety Cases In 11th Safety Critical System Symposium ., 2003.
Tagarev, Todor, Tilcho Ivanov, and Dobromir Totev. "Managing Resources for Defence and Security." In Programme of Integration of the Republic of Bulgaria into NATO, edited by Konstantin Dimitrov and Velizar Shalamanov. Sofia: Institute for Euroatlantic Security, 2003.
Marjanovic, Olivera. Managing the Normative Context of Composite e-Services In International Conference on Web Services (ICWS-Europe’2003). Erfurt, Germany, 2003.
Wang, W. H.. Map building by mobile robots in unknown environment In Shanghai Jiao Tong University. Vol. Ph. D. Thesis., 2003.
Mosseau, Michael. "Market Civilization and Its Clash with Terror." International Security 27, no. 3 (2003): 5-29.
Georgiev, George, and Valentine Penev. "Mathematical Model of Fuzzy Control System for Autonomous Guided Vehicle in 3D Space." Information & Security: An International Journal 12, no. 2 (2003): 195-207.
Masek, Libor, and Peter Koves. MATLAB Source Code for a Biometric Identification System Based on Iris Patterns. School of Computer Science and Software Engineering, University of Western Australia, 2003.
Armitage, Grenville J.. Maximising Student Exposure to Unix Networking using FreeBSD Virtual Hosts In Technical Report. CAIA, 2003.
Kleppe, Anneke, Jos Warmer, and Wim Bast. MDA Explained: The Model Driven Architecture Practice and Promise. Addison Wesley, 2003.
Tagarev, Todor. "A Means of Comparing Military Budgeting Processes in South East Europe." Information & Security: An International Journal 11 (2003): 95-135.
Georgieva, Stoyana, and Avgustina Tzvetkova. "Media, Civil Society and Public Policy." In Defence and Security Sector Governance and Reform in South Easter Europe: Insights and Perspectives, edited by Jan A. Trapans and Philipp H. Fluri, 269-280. Vol. 1. Geneva/Belgrade: Geneva Centre for the Democratic Control of Armed Forces, 2003.
Klymov, Sergey. "Methodology for Assessing Possible Damage from the Security Violation of the Information of the Automated System." Yzvestyia TRTU 4, no. 33 (2003): 27-31.
Hochhut, Martin. "Militärische Bundesintervention bei inländischem Terrorakt." Neue Zeitschrift für Wehrrecht (2003): 154-67.
Schmidinger, Franz, and Werner Suez. "Militärkommando Niederösterreich: Das Katastro-pheneinsatzkonzept [Provincial Military Command/Lower Austria: Disaster Relief Concept]." Truppendienst 2 (2003).
Szpyra, Ryszard. Militarne operacje informacyjne. Warsaw: AON, 2003.
Brömmelhörster, Jörn, and Wolf-Christian Paes. The Military as an Economic Actor: Soldiers in Business. New York: Palgrave Macmillan, 2003.
The Military Balance 2002-2003. London: The Institute for Strategic Studies, 2003.
Annati, Massimo. "Military Technology." Mine Hunting & Mine Clearing Revisited (2003): 48.
Sloan, Stanley R., and Heiko Borchert. "Mind the Three Transatlantic Power Gaps: How a New Framework Can Help Reinvent the Transatlantic Relationship." Connections: The Quarterly Journal 2, no. 3 (2003): 35-49.
Chouvy, Pierre-Arnaud, Michel Koutouzis, and Alain Labrousse. "Ministerial Conference on the Drug Routes from Central Asia to Europe." In Ministerial Conference on the Drug Routes from Central Asia to Europe. Paris , 2003.
Ben van der Merwe, Pieter. Mobile commerce over GSM: A banking perspective on security In Faculty of Engineering. Vol. Master of Science (Electronics). University of Pretoria, 2003.
Cohen, Marc. "Mobile Lunar and Planetary Bases." In Space 2003 Conference . San Diego, CA, 2003.
Model Driven Architecture. Object Management Group, 2003.
Niemeyer, Klaus. "Modeling and Simulation in Defense." Information & Security: An International Journal 12, no. 1 (2003): 19-42.
Monitor, ISIJ. "Modeling and Simulation Internet Sources." Information & Security: An International Journal 12, no. 2 (2003): 261-275.

Pages