Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21423 results:
RTF
EndNote XML
1999
Furnell, Steve
, and
Matthew Warren
.
"
Computer Hacking and Cyber Terrorism: The Real Threats in the New Millennium
(link is external)
."
Computers and Security
18, no. 1 (1999): 30-32.
Google Scholar
(link is external)
RTF
EndNote XML
Schmitt, Michael N.
.
"
Computer Network Attack and the Use of Force in International Law: Thought on a Normative Framework
."
Columbia Journal of International Law
37, no. 3 (1999): 893.
Google Scholar
(link is external)
RTF
EndNote XML
Carstensen, Peter
, and
Kjeld Schmidt
.
Computer supported cooperative work: new challenges to systems design
(link is external)
., 1999.
Google Scholar
(link is external)
RTF
EndNote XML
Hoffmann, Lisa
.
"
Computers Change Rules of War, Civilians Still Get Hurt
(link is external)
."
The Washington Times
(1999).
Google Scholar
(link is external)
RTF
EndNote XML
Hoffmann, Lisa
.
"
Computers Change Rules of War, Civilians Still Get Hurt
(link is external)
."
The Washington Times
(1999).
Google Scholar
(link is external)
RTF
EndNote XML
Zadeh, Lotfi A.
, and
Janusz Kacprzyk
.
Computing with Words in Information/Intelligent Systems – Part 1: Foundations
. Berlin Heidelber: Springer, 1999.
Google Scholar
(link is external)
RTF
EndNote XML
"
The Concept for the Development of the Defense Establishment until 2004 with Outlook to 2009
."
Vojenské rozhledy
4 (1999): 3-15.
Google Scholar
(link is external)
RTF
EndNote XML
Ginsberg, Roy H.
.
"
Conceptualizing the European Union as an International Actor: Narrowing the Theoretical Capability–Expectations Gap
."
Journal of Common Market Studies
37, no. 3 (1999): 429-454.
Google Scholar
(link is external)
RTF
EndNote XML
Conclusions of the Presidency
. Tampere European Council, 1999.
Google Scholar
(link is external)
RTF
EndNote XML
Biad, Abdelwahab
.
"
Conflict Prevention in the Euro-Med Partnership: Challenges and Prospects
."
The International Spectator
24, no. 2 (1999): 17-31.
Google Scholar
(link is external)
RTF
EndNote XML
Stytz, Martin R.
, and
Sheila B. Banks
.
Considerations and Issues for Distributed Mission Training Computer-Generated Actors
(link is external)
In
Eighth Conference on Computer Generated Forces and Behavioral Representation
. Orlando FL, 1999.
Google Scholar
(link is external)
RTF
EndNote XML
Constitution of Nigeria
., 1999.
Google Scholar
(link is external)
RTF
EndNote XML
Esposito, John L.
.
"
Contemporary Islam: Reformation or Revolution?” in The Oxford History of Islam
(link is external)
." New York: Oxford University Press, 1999.
Google Scholar
(link is external)
RTF
EndNote XML
Jamieson, Allison
.
Cooperation between Organized Crime Groups around the World
(link is external)
. Research Institute for the Study of Conflict and Terrorism, 1999.
Google Scholar
(link is external)
RTF
EndNote XML
Player, Steve
, and
Carol Cobble
.
Cornerstones of Decision Making: Profiles of Enterprise ABM
(link is external)
. Greensboro, NC: Oakhill Press, 1999.
Google Scholar
(link is external)
RTF
EndNote XML
Rose-Ackerman, Susan
.
Corruption and Government: Causes, Consequences, and Reform
. Cambridge: Cambridge University Press, 1999.
Google Scholar
(link is external)
RTF
EndNote XML
Fuguitt, Diana
, and
Shanton J. Wilcox
.
Cost-Benefit Analysis for Public Sector Decision Makers
(link is external)
. Westport, Connecticut: Quorum Books, 1999.
Google Scholar
(link is external)
RTF
EndNote XML
Fuguitt, Diana
, and
Shanton J. Wilcox
.
Cost-Benefit Analysis for Public Sector Decision Makers
(link is external)
. Westport, Connecticut: Quorum Books, 1999.
Google Scholar
(link is external)
RTF
EndNote XML
Book, Stephen A.
.
Cost-Risk Analysis Seminar – Its Role in Proposal Preparation, System Development, and Program Control
(link is external)
. The Aerospace Corporation, 1999.
Google Scholar
(link is external)
RTF
EndNote XML
Vertusaev, M.C.
,
Ya.Yu. Kondrat’ev
,
S.E. Pugachev
, and
A.M. Yurchenko
.
"
Crime Methods Utilizing Bank Cards
(link is external)
."
Information Technologies for Information Protection
3, no. 1 (1999): 50-67.
Google Scholar
(link is external)
RTF
EndNote XML
Budzhurova, L.
.
"
Criminal pulp fiction with a horoscope (Кримінальна пульпа фантастика з гороскопом)
."
Stolichnie novosti
(1999): 1,5.
Google Scholar
(link is external)
RTF
EndNote XML
Clinton, William
.
"
Crisis in the Balkans; Clinton’s Remarks in Defense of Military Intervention in the Balkans
(link is external)
."
New York Times
(1999).
Google Scholar
(link is external)
RTF
EndNote XML
Dunn, Ashley
.
"
Crisis in Yugoslavia – Battle Spilling Over Onto the Internet
(link is external)
."
Los Angelis Times
(1999).
Google Scholar
(link is external)
RTF
EndNote XML
Hwang, Min-Shiang
.
"
Cryptanalysis of a Remote Login Authentication Scheme
."
Computer Communications
22 (1999): 742-744.
Google Scholar
(link is external)
RTF
EndNote XML
Krulak, Gen. C. C.
.
"
Cultivating Intuitive Decision-making
(link is external)
."
Marine Corps Gazette
(1999).
Google Scholar
(link is external)
RTF
EndNote XML
Pages
« first
‹ previous
…
739
740
741
742
743
744
745
746
747
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance
Back to top