Biblio

Export 21373 results:
1998
The Strategic Defence Review–1998. London: Ministry of Defence, 1998.
Bailey, Norman A.. The Strategic Plan That Won the Cold War: National Security Decision Directive 75. MacLean, VA: The Potomac Foundation, 1998.
Ryan, Julie J. C. H.. "Student Plagiarism in an On-line World." ASEE Prism Magazine (1998).
Wing, Jeannette M.. A Symbiotic Relationship Between Formal Methods and Security In Computer Security, Dependability and Assurance: From Needs to Solutions, Proceedings. IEEE, 1998.
Mepham, Simon. Synthetic Environments – Delivering Real Benefits to UK Defence In SimTecT. Adelaide, Australia, 1998.
Breu, R., R. Grosu, F. Huber, B. Rumpe, and W. Schwerin. "Systems, Views and Models of UML." In The Unified Modeling Language, Technical Aspects and Applications, 3-8. Heidelberg: Physica Verlag, 1998.
Semerdjiev, Tzvetan, Vesselin Jilkov, and Donka Angelova. Target Tracking Using Monte Carlo Simulation In IMACS Seminar on Monte Carlo Methods. Universite Libre de Bruxelle: Mathematics and Computers in Simulation , 1998.
Kuchma, Leonid. "This can’t go on (Це не може продовжуватись)." Uriadovyi kur’er (1998): 4.
Tagarev, Todor. "Timothy Thomas on the Key Elements of the Russian Approach to IW." Information & Security: An International Journal 1, no. 2 (1998): 75-92.
Sidor, David J.. "TMN Standards: Satisfying Today's Needs While Preparing for Tomorrow." IEEE Communications Magazine (1998): 54-64.
Holbrooke, Richard. To end a War. New York, NY: Modern Library, Random House, 1998.
Bass, Bernard M.. Transformational Leadership: Industrial, Military, and Educational Impact. Mahwah, New Jersey: Erlbaum, 1998.
Gunaratna, Rohan. "Trends in Maritime Terrorism: The Sri Lankan Case ." Lanka Outlook (1998).
Boese, Wade. UN Security Council Approves Arms Embargo on Yugoslavia., 1998.
O’Leary, Daniel E.. "Using AI in Knowledge Management: Knowledge Bases and Ontologies." IEEE Intelligent Systems 13, no. 3 (1998): 34-39.
McElroy, Debbie, and Efraim Turban. "Using Smart Cards in Electronic Commerce." International Journal of Information Management 18, no. 1 (1998): 61-72.
Soloway, Elliot, and Cathleen A. Norris. "Using Technology to Address Old Problems in New Ways." Communications of the ACM 41, no. 8 (1998): 11-18.
Karimov, Islam. Uzbekistan on the Threshold of the Twenty-first Century. New York: St. Martin’s Press, 1998.
Clary, Gil, Mark Snyder, and Arthur A. Stukas. "Volunteer motivations, Findings from a national survey." Nonprofit and Voluntary Sector Quarterly 25, no. 4 (1998): 485-505.
Shalamanov, Velizar. "The war for control of information." Information & Security: An International Journal 1, no. 2 (1998): 105-108.
Ignatieff, Michael. The Warrior’s Honor: Ethnic War and the Modern Conscience. New York: Metropolitan Books, 1998.
Gladman, Brian. Wassenaar Controls, Cyber-Crime and Information Terrorism, Cyber Rights and Cyber Liberties (UK)., 1998.
Ohbuchi, Ryutarou, Hiroshi Masuda, and Masaki Aono. "Watermarking Three-Dimensional Polygonal Models through Geometric and Topological Modifications." IEEE Journal on Selected Areas in Communications 16 (1998): 551-560.
J. Thompson, Patrick. "Web-Based Enterprize Management Architecture." EEE Communications Magazine (1998): 80-86.
Quarantelli, E.L.. "What Is A Disaster? Perspectives on the Question." Routledge: London and New York (1998): 228.

Pages