Biblio

Export 21377 results:
2002
Huber, Thomas M.. Compound Warfare: That Fatal Knot. Fort Leavenworth, Kansas: U.S. Army Command and General Staff College Press, 2002.
Silver, Daniel. Computer Network Attack as a Use of Force under Article 2(4) In International Law Studies ., 2002.
Preston, Ethan M., and John Lofton. "Computer Security Publications: Information Economics, Shifting Liability and the First Amendment." Whither Law Review 24, no. 71 (2002): 130.
"Concept for the Development of a Professional Army of the Czech Republic and Mobilization of Armed Forces." Vojenské rozhledy 3 (2002).
Faupin, Alain. "Conclusion." Connections: The Quarterly Journal 1, no. 3 (2002): 77-79.
Hutchinson, Asa. Congressional Testimony before the Senate Judiciary Committee’s Subcom-mittee on Technology, Terrorism and Government Information about Narco-Terror: The World Connection Between Drugs and Terror., 2002.
Mihaylova, Lyudmila, Tine Lefebvre, Ernesto Staffetti, Herman Bruyninckx, and Joris De Schutter. "Contact Transitions Tracking During Force-Controlled Compliant Motion Using an Interacting Multiple Model Estimator." Information & Security: An International Journal 9 (2002): 114-129.
Marsh, David. Content and Language Integrated Learning: The European Dimension—Actions, Trends and Foresight Potential. DG Education & Culture, European Commission, 2002.
CORBA Component Model Tutorial. OMG CCM Implementation Group, 2002.
Zhdanov, Igor. "Corruption in Ukraine: Essence, Scale, and Influence." Connections: The Quarterly Journal 1, no. 2 (2002): 33-49.
Beck, Ulrich. "The Cosmopolitan Society and its Enemies." Theory, Culture and Society 19, no. 1-2 (2002): 17-44.
Council Directive 2002/58/EC Concerning the Processing of Personal Data and the Protection of Privacy in the Electronic Communications Sector (Directive on Privacy and Electronic Communications)., 2002.
“Council Joint Action on the European Union Police Mission In doc. 6823/02, 11/03/02. Council of the European Union, 2002.
Council of Ministers Decree No. 103 dated March 31, 2002 on “Monitoring of environment in Republic of Albania”., 2002.
Jenkins, Brian M.. Countering Al Qaeda. Santa Monica, CA: Rand Corporation, 2002.
Chikin, K., and I. Shlyik. "Countering Illegal Transactions in Internet Purchasing Systems." World of Cards 7 (2002): 15-21.
"Countering the Terrorist Threat." In Terrorism and Counterterrorism: Un-derstanding the New Security Environment: Readings & Interpretations. Guilford, CT: McGraw- Hill, 2002.
Gunaratna, Rohan, and Peter Chalk. Counter-Terrorism. Coulsdon: Jane’s Information Group, 2002.
Kaplan, Robert. "Cowboy on the Tiger,Kowboj na tygrysie." Tygodnik Forum (2002).
Loukis, Euripidis, and Niki Tsouma. "Critical Issues of Information Systems Management in the Greek Public Sector." The International Journal of Government and Democracy in the Information Age 17, no. 1 (2002): 65-83.
Barlow, Michael, and Adam Easton. "CROCADILE - An Open, Extensible Agent-Based Distillation Engine." Information & Security: An International Journal 8, no. 1 (2002): 17-51.
Dupree, Nancy Hatch. "Cultural Heritage and National Identity in Afghanistan." Third World Quarterly 23, no. 5 (2002): 977.
Cyber security research and development act., 2002.
Soustelle, Jacques. Daily Life of the Aztecs. London: Phoenix Press, 2002.
"The Danube Smugglers Change their Direction: Women Instead of Petrol." Evenimentul Zilei (Romania) (2002).

Pages