Biblio

Export 21423 results:
1999
Furnell, Steve, and Matthew Warren. "Computer Hacking and Cyber Terrorism: The Real Threats in the New Millennium(link is external)." Computers and Security 18, no. 1 (1999): 30-32.
Schmitt, Michael N.. "Computer Network Attack and the Use of Force in International Law: Thought on a Normative Framework." Columbia Journal of International Law 37, no. 3 (1999): 893.
Carstensen, Peter, and Kjeld Schmidt. Computer supported cooperative work: new challenges to systems design(link is external)., 1999.
Hoffmann, Lisa. "Computers Change Rules of War, Civilians Still Get Hurt(link is external)." The Washington Times (1999).
Hoffmann, Lisa. "Computers Change Rules of War, Civilians Still Get Hurt(link is external)." The Washington Times (1999).
Zadeh, Lotfi A., and Janusz Kacprzyk. Computing with Words in Information/Intelligent Systems – Part 1: Foundations. Berlin Heidelber: Springer, 1999.
"The Concept for the Development of the Defense Establishment until 2004 with Outlook to 2009." Vojenské rozhledy 4 (1999): 3-15.
Ginsberg, Roy H.. "Conceptualizing the European Union as an International Actor: Narrowing the Theoretical Capability–Expectations Gap." Journal of Common Market Studies 37, no. 3 (1999): 429-454.
Conclusions of the Presidency. Tampere European Council, 1999.
Biad, Abdelwahab. "Conflict Prevention in the Euro-Med Partnership: Challenges and Prospects." The International Spectator 24, no. 2 (1999): 17-31.
Stytz, Martin R., and Sheila B. Banks. Considerations and Issues for Distributed Mission Training Computer-Generated Actors(link is external) In Eighth Conference on Computer Generated Forces and Behavioral Representation. Orlando FL, 1999.
Constitution of Nigeria., 1999.
Esposito, John L.. "Contemporary Islam: Reformation or Revolution?” in The Oxford History of Islam(link is external)." New York: Oxford University Press, 1999.
Jamieson, Allison. Cooperation between Organized Crime Groups around the World(link is external). Research Institute for the Study of Conflict and Terrorism, 1999.
Player, Steve, and Carol Cobble. Cornerstones of Decision Making: Profiles of Enterprise ABM (link is external). Greensboro, NC: Oakhill Press, 1999.
Rose-Ackerman, Susan. Corruption and Government: Causes, Consequences, and Reform. Cambridge: Cambridge University Press, 1999.
Fuguitt, Diana, and Shanton J. Wilcox. Cost-Benefit Analysis for Public Sector Decision Makers (link is external). Westport, Connecticut: Quorum Books, 1999.
Fuguitt, Diana, and Shanton J. Wilcox. Cost-Benefit Analysis for Public Sector Decision Makers(link is external). Westport, Connecticut: Quorum Books, 1999.
Book, Stephen A.. Cost-Risk Analysis Seminar – Its Role in Proposal Preparation, System Development, and Program Control(link is external). The Aerospace Corporation, 1999.
Vertusaev, M.C., Ya.Yu. Kondrat’ev, S.E. Pugachev, and A.M. Yurchenko. "Crime Methods Utilizing Bank Cards(link is external)." Information Technologies for Information Protection 3, no. 1 (1999): 50-67.
Budzhurova, L.. "Criminal pulp fiction with a horoscope (Кримінальна пульпа фантастика з гороскопом)." Stolichnie novosti (1999): 1,5.
Clinton, William. "Crisis in the Balkans; Clinton’s Remarks in Defense of Military Intervention in the Balkans(link is external)." New York Times (1999).
Dunn, Ashley. "Crisis in Yugoslavia – Battle Spilling Over Onto the Internet(link is external)." Los Angelis Times (1999).
Hwang, Min-Shiang. "Cryptanalysis of a Remote Login Authentication Scheme." Computer Communications 22 (1999): 742-744.
Krulak, Gen. C. C.. "Cultivating Intuitive Decision-making(link is external)." Marine Corps Gazette (1999).

Pages