Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21423 results:
RTF
EndNote XML
1992
Esposito, John L.
.
The Islamic Threat: Myth or Reality?
. Oxford: Oxford University Press, 1992, 1992.
Google Scholar
RTF
EndNote XML
Just War Theory
. Oxford: Blackwell, 1992.
Google Scholar
RTF
EndNote XML
Law 543 on the Abolition of the Federal Security Information Service
., 1992.
Google Scholar
RTF
EndNote XML
Law No. 7623, dated October 13, 1992 on “Forests and Forestry Police Services”
., 1992.
Google Scholar
RTF
EndNote XML
Schaffer, Hanne Isabell
.
Lebenskonzepte und Zeiterfahrungen junger Männer. Zur Bedeutung gewandelter Lebensvorstellungen für die Bundeswehr
. Munich: SOWI, 1992.
Google Scholar
RTF
EndNote XML
Gow, James
.
Legitimacy and the Military: The Yugoslav Crisis
. London: Pitter Publishers, 1992.
Google Scholar
RTF
EndNote XML
Lēmums Par Latvijas Republikas Augstākās Padomes apsardzes dienesta pārdēvē-šanu
., 1992.
Google Scholar
RTF
EndNote XML
Likums Par Latvijas Republikas Drošības dienesta nolikuma apstiprināšanu
. Likumi.lv, 1992.
Google Scholar
RTF
EndNote XML
Gills, Barry
, and
Joel Rocamora
.
"
Low Intensity Democracy
."
Third World Quarterly
13, no. 3 (1992): 501-23.
Google Scholar
RTF
EndNote XML
Maastricht Treaty
., 1992.
Google Scholar
RTF
EndNote XML
Hall, David
.
Mathematical Techniques in Multisensor Data Fusion
. Boston: Artech House, 1992, 1992.
Google Scholar
RTF
EndNote XML
Falcone, Giovanni
, and
Marcelle Padovani
.
Men of Honour: The Truth about the Mafia
. London: Fourth Estate, 1992.
Google Scholar
RTF
EndNote XML
Xu, L.
,
Adam Krzyzak
, and
C.Y Suen
.
"
Methods of CombiningMultiple Classifiers and Their Application to Handwriting Recognition
."
IEEE Transactions on Systems, Man Cybernetics
22, no. 3 (1992): 418-435.
Google Scholar
RTF
EndNote XML
Jones, L.R.
, and
Bixler G.
.
Mission Financing to Realign National Defense
. Greenwich, Connecticut: JAI Press, 1992.
Google Scholar
RTF
EndNote XML
Bar-Shalom, Y.
.
"
Multitarget-Multisensor Tracking: Applications and Advances
."
Artech House
2 (1992).
Google Scholar
RTF
EndNote XML
Greenwood, Ted
, and
Stuart Johnson
.
"
NATO Force Planning without the Soviet Threat
."
Parameters
22, no. 1 (1992): 27-37.
Google Scholar
RTF
EndNote XML
Dunbar, R. I. M.
.
"
Neocortex Size as a Constraint on Group Size in Primate
."
Journal of Human Evolution
22, no. 6 (1992): 469-493.
DOI
Google Scholar
RTF
EndNote XML
Kosko, Bart
.
Neural Networks and Fuzzy Systems
. Prentice-Hall, 1992.
Google Scholar
RTF
EndNote XML
Miller, Benjamin
.
"
A ‘New World Order’: From Balancing to Hegemony, Concert or Collective Security?
"
International Interactions
18, no. 3 (1992): 9.
Google Scholar
RTF
EndNote XML
Official Journal of the European Communities
., 1992.
Google Scholar
RTF
EndNote XML
Robinson, Patrick
.
One Hundred Days; The Memoirs of the Falklands Battle Group Commander
. Annapolis, MD: Naval Institute Press, 1992.
Google Scholar
RTF
EndNote XML
Ricoeur, Paul
.
Oneself as another
. Chicago: Chicago University Press, 1992.
Google Scholar
RTF
EndNote XML
Papazoglou, M.P.
,
S.C. Laufmann
, and
T.K. Sellis
.
"
An organizational framework for cooperating intelligent information systems
."
International Journal of Intelligent and Cooperative Information Systems
1, no. 1 (1992): 169-202.
Google Scholar
RTF
EndNote XML
Gasser, Les
.
"
An Overview of Distributed Artificial Intelligence
."
Distributed Artificial Intelligence: Theory and Praxis
(1992): 9-30.
Google Scholar
RTF
EndNote XML
Johnson, Phillip W.
, and
Theodore B. Feldmann
.
"
Personality types and terrorism: Self-psychology perspectives
."
Forensic Reports
5, no. 4 (1992): 293-303.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
806
807
808
809
810
811
812
813
814
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance