Biblio

Export 21359 results:
2002
Müller, Dr. Klaus. Grundgesetz - Taschenkommentar für Studium und Praxis. 11th ed. Cologne: Heymanns Taschenkommentare, Carl Heymanns Verlag, 2002.
Etter, Andrew. A Guide to Wardriving and Detecting Wardrivers. SANS Institute, 2002.
Knapp, Mark L., and John A. Daly. Handbook of Interpersonal Communication. 3rd ed. Thousand Oaks, CA: Sage, 2002.
Anderson, Sean K., and Stephen Sloan. Historical Dictionary of Terrorism. Lanham, MD and London: The Scarecrow Press , 2002.
Schuwirth, Rainer. Hitting the Helsinki Goal. NATO Review 3 , 2002.
Wimmer, Maria, and Bianca von Bredow. A Holistic Approach for Providing Security Solutions in e-Government In 35th Hawaii International Conference on System Sciences (HICSS-35). IEEE Computer Society. Big Island of Hawaii, 2002.
Greene, Roberta R.. "Holocaust Survivors: A Study in Resilience." Journal of Geronto¬logi¬cal Social Work 37, no. 1 (2002): 3-18.
Koeva, Mila. Holography - principles and applications in photogrammetry., 2002.
Blunkett, David. "Home Secretary, Speech at “Defeating Organized Crime in South Eastern Europe." In Lancaster House Ministerial Conference. London, 2002.
Dalglish, Lucy A., Gregg P. Leslie, and Phillip Taylor. "Homefront Confidential: How the War on Terrorism Affects Access to Information and the Public’s Right to Know." The Reporters Committee for Freedom of the Press (2002).
Seiple, Chris. "Homeland Security Concepts and Strategy." Orbis 46, no. 2 (2002).
Spitzner, Lance. Honeypots: Tracking Hackers. Addison Wesley, 2002.
Hinkle, Gene. Hong Kong ID Project to Use Smart Card Management Software from ACI Worldwide. ACI Worldwide, 2002.
"Hopes Betrayed: Trafficking of Women and Girls to Post-Conflict Bosnia and Herzegovina for Forced Prostitution." Human Rights Watch Reports 14, no. 9 (2002).
DeVille, Duncan. "How to Split Up the Bipolar F.B.I." New York Times (2002).
Human Development Report 2002: Deepening Democracy in a Fragmented World . New, NY/Oxford: Oxford University Press, 2002.
Mandelbaum, Michael. The Ideas That Conquered the World: Peace, Democracy, and Free Markets in the Twenty-First Century. New York: Public Affairs, 2002.
De Brucq, D., A. Sombo, and O. Colot. Identical Foundation of Probability Theory and Fuzzy Set Theory In 5th Intern. Conf. on Inf. Fusion. Annapolis, 2002.
Smart, Nigel. "An Identity Based Authentication Key Agreement Protocol Based on Pairing." Electronics Letters 38 (2002).
Rahim, Taiba. "An Identity of Strength: Personal Thoughts on Women in Afghanistan." Interna-tional Review of the Red Cross 847 (2002): 638.
IJCAI-99 Workshop on Ontologies, Problem-Solving Methods: Lessons Learned, and Future Trends., 2002.
Borov, Zaur, and Stephen Bowers. Illegal Weapons Traffic in Eastern Europe. Harrisonburg, VA: Nelson Institute for International and Public Affairs, James Madison University, 2002.
IMF Fiscal Transparency Homepage., 2002.
Galbraith, Steven, Keith Harrison, and David Soldera. "Implementing the Tate pairing." Algorithmic Number Theory, Lecture Note in Computer Science 2369 (2002).
Bojilov, Ljudmil. "An Improved Version of a Multiple Target Tracking Algorithm." Information & Security: An International Journal 9 (2002): 130-140.

Pages