Biblio

Export 21376 results:
2000
National Security Law into force 1 January 2002., 2000.
National Security Law of Latvia. Likumi.lv, 2000.
NATO C3 Technical Architecture In NATO Open Systems Working Group. Brussels, Belgium: NATO Open Systems Working Group: Allied Data Publication (ADat-P), 2000.
Kozaryn, Linda D.. "NATO Chief Says More Police Vital in Kosovo." American Forces Information Service (2000).
Anderson, Ewan. "NATO Expansion and Implications for Southern Tier Stability." In Crossroads and Conflict: Security and Foreign Policy in the Caucasus and Central Asia, 130. New York: Routledge, 2000.
Robertson, George. NATO Needs New Forces for New Challenges. The Independent (U.K.), 2000.
Hendrickson, Ryan C.. "NATO’s Open Door Policy and the Next Round of Enlargement." Parameters 30 (2000): 53-66.
Hunter, Keith O., William E. Har, and Chris Forsythe. A Naturalistic Decision Making Model for Simulated Human Combatants In Ninth Conference on Computer Generated Forces and Behavioral Representation. Orlando FL, 2000.
Alberts, David, John Garstka, and Frederick Stein. Network Centric Warfare. Washington, D.C.: Department of Defense, C4ISR Cooperative Research Program, 2000.
Alberts, David S., John J. Garstka, and Frederick P. Stein. Network Centric Warfare; Developing and Leveraging Information Superiority. Washington DC: CCRP, DoD, USA, 2000, 2000.
Monitor, ISIJ. "Network Intrusion Detection: An Analyst’s Handbook." Information & Security: An International Journal 4 (2000): 125-146.
Monitor, ISIJ. "Network Security Fundamentals." Information & Security: An International Journal 4 (2000): 121-122.
Monitor, ISIJ. "New AFCEA Chapter in South-East Europe." Information & Security: An International Journal 5 (2000): 129-130.
Hoffman, Bruce. "New Forms of Terrorism and The Threat of Terrorist Use of Chemical, Biological, Nuclear and Radiological Weapons." In Terrorismus als Weltweites Phänomen. Berlin: Berliner Wissenschaftsverlag, 2000.
Ayd, Mustafa. New Geopolitics of Central Asia and the Caucasus; Causes � of Instability and Predicament. Ankara: Center for Strategic Research, 2000.
Tracy, Jen. New KGB Takes Internet by SORM. Mother Jones, 2000.
Hwang, Min-Shiang, and Li-Hua Li. "A New Remote User Authentication Scheme Using Smart Cards." IEEE Transactions on Consumer Electronics 46, no. 1 (2000): 28-30.
von Bredow, Wilfried, and Gerhard Kümmel. "New Roles for the Armed Forces and the Concept of Democratic Control." In Civil-Military Relations in an Age of Turbulence: Armed Forces and the Problem of Democratic Control., 2000.
Blank, Stephen. "The new Russo-Chinese ‘Partnership’ and Central Asia." Central Asia and Caucasus Analyst 16 (2000).
Simon, Jeffery. The Next Round of NATO Enlargement In Strategic Forum. INSS, National Defense University, 2000.
Metz, Steven. "The Next Twist of the RMA." Parameters 30, no. 3 (2000).
Bunn, Matthew. The Next Wave: Urgently Needed New Steps to Control Warheads and Fissile Material. Washington, D.C.: Carnegie Endowment for International Peace, 2000.
Martin, Alvin, George Doddington, Douglas Reynolds, and Mark Przybocky. "The NIST Speaker Recognition Evaluation– Overview, Methodology, Systems, Results, Perspectives." Speech Communications 31 (2000): 225-254.
Ojanen, Hanna, Gunilla Herolf, and Rutger Lindahl. Non-Alignment and European Security Policy: Ambiguity at Work. Helsinki and Bonn: Ulkopoliittinen instituutti and Institut für Europäische Politik, 2000.
Latawski, Paul. A Normative Framework for Democratic Control of Armed Forces In One Europe or Several? Working Paper , 2000.

Pages