Biblio

Export 21393 results:
2004
Summary of the Basic Projects for Modernization of the Bulgarian Armed Forces . Sofia: Ministry of Defense, 2004.
Summary of the Organized Crime Situation Report 2004. Focus on the Threat of Cyber-crime, Provisional Report. Strasbourg: Council of Europe, Octopus Program, 2004.
Chang, MuChiu. "Sun Tzu and sustainable competitive advantage." In 2004 IEEE International Engineering Management Conference (IEEE Cat. No.04CH37574) . Singapore, Singapore: IEEE, 2004.
Motwani, Mukesh, Mukesh C. Gadiya, Rakhi Motwani, and Frederick Harris. Survey of Image Denoising Techniques In Proceedings of GSPX., 2004.
Petit-Roze, Christelle, Abdouroihamane Anli, Emmanuelle Grislin- Le Strugeon, Mourad Abed, Guillaume Uster, and Christophe Kolski. "Système d'information transport personnalisée à base d'agents logiciels." Revue Génie Logiciel 70 (2004): 29-38.
Tzu, Sun. Sztuka wojny. Gliwice, 2004.
Picco, Giandomenico. Tactical and Strategic Terrorism . New York, NY: GDP Associates, 2004.
Tchamova, A., J. Dezert, Tz. Semerdjiev, and P. Konstanttinova. Target Tracking with Generalized Data Association based on the General DSm Rule of Combination In Conference Fusion. Sweden, 2004.
Kharchenko, Vyacheslav, Michael Yastrebenetsky, and Vladimir Sklyar. The Technique and the Experience of Expertise of Software for NPP Instrumentation and Control Systems In 7th International Conference on Probabilistic Safety Assessment and Management. Berlin, 2004.
Cilinskas, Kestutis. Teisės viršenybės principo įgyvendinimo problemos. International Human Rights Day, 2004.
Welch, Matt. "Temporary Doves." Reason Magazine (2004).
Weimann, Gabriel. "Terror on the Internet: The New Arena, The New Challenges." In International Studies Association (ISA) Annual Conference. Montreal, Quebec, Canada, 2004.
Busuncian, Tatiana. Terrorism and Organized Crime” report presented within the “NATO Defense against Terrorism Course. Oberammergau, Germany: the NATO School, 2004.
Zimmermann, Doron. "Terrorism Transformed: The “New Terrorism,” Impact Scalability, and the Dynamic of Reciprocal Threat Perception." Connections: The Quarterly Journal 3, no. 1 (2004): 19-39.
Gunaratna, Rohan. "The Terrorist Threat to the Continent." In Meeting of the Special Committee of NATO, Ministry of Foreign Affairs. Copenhagen, 2004.
Emery, N.E., R. S. Earl, and R. Buettner. "Terrorist Use of Information Operations." Journal of Information Warfare 3, no. 2 (2004).
Libbenga, Jan. "Terrorists Grow Fat on E-Mail Scams." The Register (2004).
Shevtsova, Liliya. "A test with Ukraine. Will Putin and the regime created by him pass it?" Novaya Gazeta (2004).
Smith, Greg B.. "They Eyed Subway Stations." New York Daily News (2004).
Gold, David. "Thinking Through Terrorism Some Economic Considerations in the U.S. War on Terrorism." Connections: The Quarterly Journal 3, no. 1 (2004): 1-14.
Berberich, Klaus, Michalis Vazirgiannis, and Gerhard Weikum. "Time-Aware Authority Ranking." Internet Mathematics 2, no. 3 (2004): 301-332.
Danner, Mark. Torture and Truth: America, Abu Ghraib, and the War on Terror. New York: Review of Books, 2004.
de la Roche, Roberta Senechal. "Toward a Scientific Theory of Terrorism." Sociological Theory 22, no. 1 (2004): 1.
Noran, O., and L.M. Camarinha-Matos. "Towards a Meta-Methodology for Collaborative Networked Organisations. In Virtual Enterprises and Collaborative Networks." In IFIP International Federation for Information Processing. Vol. 149. Boston, MA: Springer, 2004.
Maillard, Thierry, and Teddy Furon. "Towards Digital Rights and Exemptions Management Systems." Computer Law and Security Report 20, no. 4 (2004): 281-87.

Pages