Biblio

Export 21372 results:
2002
Sakhuja, Vijay. Challenging Terrorism at Sea., 2002.
Milbank, Dana. "Cheney Says Iraqi Strike Is Justified; Hussein Poses Threat, He Declares." Washington Post (2002).
Economy, Elizabeth. China’s ‘Go West’ Campaign: Ecological Construction or Ecological Ex-ploitation? In Series 5. China Environment, 2002.
Bouganim, Luc, and Philippe Pucheral. "Chip-Secured Data Access: Confidential Data on Untrusted Servers." In 28th International Conference on Very Large Data Bases. Hong Kong, 2002.
Hamby, J.. "Civil-military operations: joint doctrine and the Malayan Emergency." Joint Force Quarterly 32 (2002): 54-61.
Ratchev, Valeri, and Velichka Milina. "Civil-Military Relations and the Construction of Consolidated Democracy: The Case of Bulgaria." Connections: The Quarterly Journal 1, no. 2 (2002): 89-99.
Jermalavicius, Tomas. "Civil-Military Relations in the Baltic States Introduction / Editor’s Note." Connections: The Quarterly Journal 1, no. 4 (2002): 1-4.
Hoffmann, Stanley. "Clash of Globalizations." Foreign Affairs 81:4 81, no. 4 (2002).
Classified Information Protection Act. State Gazette 45 (30 April 2002), last amendment State Gazette 53 (28 June 2014), 2002.
Sinnott, Richard. "Cleavages, Parties and Referendums: Relationships between Representative and Direct Democracy in the Republic of Ireland." European Journal of Political Research 41 (2002): 815.
Koulouri, Christina. Clio in the Balkans: The Politics of History Education. Thessaloniki: CDRSEE, 2002.
Lesser, Ian O.. "Coalition Dynamics in the War against Terrorism." The International Spectator 2 (2002): 43-50.
Frank, Thomas. "Coast Guard Faces New Security Role: Some Fear A Reduction of Boat-Safety Duties." Newsday (2002).
Callahan, Philip D.. The Code of the Warrior, The Kinder, Gentler Military and Marksmanship: Changing a Culture In USAWC Strategy Research Project. Carlisle Barracks, PA: U.S. Army War College, 2002.
Chang, Chin-Chen, Ju Yuan Hsiao, and Jyh-Chiang Yeh. "A Colour Image Copyright Protection Scheme based on Visual Cryptography and Discrete Cosine Transform." The Imaging Science Journal (2002): 133-140.
K., Sentz, and Ferson S. Combination of evidence in Dempster-Shafer Theory In SANDIA Tech. Report, SAND2002-0835., 2002.
Moffat, James. Command and Control in the Information Age – Representing its Impact. London, UK: The Stationery Office, 2002.
Baranovsky, V.G.. "Common European Security and Defence Policy: Horizons of the Russian Perception." Connections: The Quarterly Journal 1, no. 1 (2002): 22-28.
Eggers, Joachim, Robert Bäuml, and Bernd Girod. A Communications Approach to Image Steganography In Security and Watermarking of Multimedia Contents IV, Proceedings of SPIE., 2002.
Radeski, Alex, Shawn Parr, Russell Keith-Magee, and John Wharington. Component-Based Development Extensions to HLA In 2002 Spring Simulation Interoperability Workshop. Vol. Paper ID 02S-SIW-046. SISO, 2002.
Huber, Thomas M.. Compound Warfare: That Fatal Knot. Fort Leavenworth, Kansas: U.S. Army Command and General Staff College Press, 2002.
Silver, Daniel. Computer Network Attack as a Use of Force under Article 2(4) In International Law Studies ., 2002.
Preston, Ethan M., and John Lofton. "Computer Security Publications: Information Economics, Shifting Liability and the First Amendment." Whither Law Review 24, no. 71 (2002): 130.
"Concept for the Development of a Professional Army of the Czech Republic and Mobilization of Armed Forces." Vojenské rozhledy 3 (2002).
Faupin, Alain. "Conclusion." Connections: The Quarterly Journal 1, no. 3 (2002): 77-79.

Pages