Biblio

Export 21372 results:
2003
Thoms, Gavin A.. "Situation Awareness - a Commander’s View." In Proceedings of the Sixth International Symposium., 2003.
Derdzinski, Joseph L.. "Slovenia’s Contemporary Defense Framework: What Implications for Theory?" Slovene Studies 1, no. 2 (2003): 71-80.
Jelusic, Ljubica. "Slovenian Public Opinion on Security, Defence and Military Issues." In The Public Image of Security, Defence and the Military in Central and Eastern Europe. Belgrade: DCAF & CCMR, 2003.
Roland, Ronald. "A Small Step toward Interoperability." Information & Security: An International Journal 12, no. 2 (2003): 175-192.
Koval, Valeriy N., Volodymyr Turchenko, V. Kochan, George Markowsky, and Anatoly Sachenko. Smart License Plate Recognition System based on Image Processing Using Neural Network In Second IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing System: Technology and Applications., 2003.
Drake, Paul, and Steve Clark. A Social Perspective on Information Security: Theoretical Grounding Domain. London: University of Luton Press, 2003.
Kirov, Georgi. "Soft Computing Agents for Dynamic Routing." Information & Security: An International Journal 12, no. 1 (2003): 104-116.
Soldat, weiblich, Jahrgang 2001. Sozialwissenschaftliche Begleituntersuchungen zur Integration von Frauen in die Bundeswehr – Erste Befunde. Strausberg: SOWI, 2003.
Kümmel, Gerhard. "A Soldier Is a Soldier Is a Soldier!? The Military and Its Soldiers in an Era of Globalization." In Handbook of the Sociology of the Military, 417-43. New York: Kluwer Academic/Plenum Publishers, 2003.
Hasani, Enver. "The Solution of the Albanian Question as a Precondition for Fruitful Cooperation in the Balkans." Connections: The Quarterly Journal 2, no. 2 (2003): 45-49.
"The Solution to the ‘Democratic Deficit.’ A New Type of Governance for the European Union." Laurent PechJournal of European Integration 25:2 25, no. 2 (2003).
Chang, Chin-Chen, and Kuo-Feng Hwang. "Some Forgery Attacks on a Remote User Authentication Scheme Using Smart Cards." Informatica 14, no. 3 (2003): 289-294.
Greenwood, David. "A South-East European Defence Transparency Audit." Information & Security: An International Journal 11 (2003): 11-33.
Southeast European Security after the 2004 Dual Enlargement . Bucharest, 2003.
Lackey, Scott W.. "Spreading the Gospel of Lessons Learned: From the PfP Lessons Learned." Connections: The Quarterly Journal 2, no. 2 (2003): 79-90.
Statement of Interdiction Principles., 2003.
Shelley, Louise. Statement to the House Committee on International Relations, Subcommittee on International Terrorism, Nonproliferation and Human Rights., 2003.
Status of the Coalition, Foreign Liaison Missions, Their Personnel and Contractors In Coalition Provisional Authority (CPA) Order., 2003.
Strategia bezpieczeństwa narodowego Rzeczpospolitej Polskiej (National Security Strategy of the Republic of Poland). Warsaw: Ministry of National Defense, 2003.
Pape, Robert A.. "The Strategic Logic of Suicide Terrorism." American Political Science Review 97, no. 3 (2003): 343-61 .
Nazarbaev, Nursultan A.. A strategy for independence. Almaty: Atamura, 2003.
Benferhat, Salem, Rania El Bai, and Frédéric Cuppens. A Stratification-Based Approach for Handling Conflicts in Access Control In Eighth ACM symposium on Access Control Models and Technologies. Como, Italy, 2003.
von Hagen, Ulrich. "Stress and Stress Management in the Military." In Armed Forces and International Security, Global Trends and Issues. Vol. 258. Münster: LIT, 2003.
Moravcsik, Andrew. "Striking a New Transatlantic Bargain." Foreign Affairs 82, no. 4 (2003): 74-90, especially 81-88.
O’Sullivan, Christopher. Sumner Welles, Postwar Planning, and the Quest for a New World Order, 1937–1943 . New York: Columbia University Press, 2003.

Pages