Biblio

Export 21359 results:
2000
Hauser, Rita, Graham Allison, Dimitri Simes, and James Thompson. America’s National Interests In The Commission on America’s National Interests. Cambridge, MA: Belfer Center for Science and International Affairs, 2000.
Smith, Steve. "American Democracy Promotion." In US Democracy Promotion: Critical Questions. Oxford: Oxford University Press, 2000.
Appendix 3 to Annex I to the Conclusions of the President. Santa Maria de Feira, 2000.
Bonk, Curtis J., and Robert A. Wisher. Applying collaborative and e-learning tools to military distance learning: A research framework. Alexandria, VA: U.S. Army Research Institute for the Social and Behavioral Sciences, 2000.
Levitt, Steven D.. "Are We a Family or a Business?’ History and Disjuncture in the Urban American Street Gang." Theory and Society 29, no. 4 (2000): 427-62.
Metz, Dr. Steven. Armed Conflict in the 21st Century, The Information Revolution and Post Modern Warfare . Carlisle, PA: Strategic Studies Institute, U.S. Army War College, 2000.
Moskos, Charles C., John Allen Williams, and David R. Segal. "Armed Forces after the Cold War." In The Postmodern Military: Armed Forces after the Cold War, 1-13. New York: Oxford University Press, 2000.
Friedberg, Aaron L.. "Arming China Against Ourselves." In American Foreign Policy, 66-73. 6th ed. Guildford, CT: Dushkin/McGraw-Hill, 2000.
Bertholdt, Johannes. Arms Control in Cyberspace. Department of Arms Control, Federal Ministry of Foreign Affairs, 2000.
Lemieux, C.. "“Articulating the Vision of the Canadian Ofcer Corps of 2020: Understanding the Leadership and Ethical Challenges." Canadian Military Journal (2000): 32.
Arena, A.. "Asian Internet start-ups invests heavily in dot.coms." Australian communications (2000): 15-18.
Assessment Mission In Cyanide Spill at Baia Mare Romania. UNEP/OCHA, , 2000.
Roberts, Brad. Asymmetric Conflict 2010. Alexandria, VA: Institute for Defense Analysis, 2000.
Whittaker, Gregory M.. Asymmetric Wargaming: Toward a Game Theoretic Perspective. The MITRE Corporation, 2000.
Hou, Young-Chang, and Pei-Min Chen. An Asymmetric Watermarking Scheme Based on Visual Cryptography In Fifth Signal Processing Conference. Beijing, China, 2000.
Westfeld, Andreas, and Andreas Pfitzmann. "Attacks on Steganographic Systems." In Lecture Notes in Computer Science., 2000.
Atabaki, Touraj. Azerbaijan: ethnicity and the struggle for power in Iran . London: I.B. Tauris, 2000.
Atabaki, Touraj. Azerbaijan: Ethnicity and the Struggle for Power in Iran . London: I. B. Tauris, 2000.
Balkan – Albania – Kosovo – Heroin – Jihad, Research Analysis. Toronto: The Center for Peace in the Balkans, 2000.
Balkan-Albania-Kosovo-Heroin-Jihad, Research Analysis. Toronto: The Center for Peace in the Balkans, 2000.
Koller, L.. "Banks flirting with wireless billing." Bank Technology News (2000): 25.
Gorban, S.. "The battle with corruption: autumnal exacerbation (Боротьба з корупцією: осіннє загострення)." Novyi vek (2000).
Kuczyński, Maciej, and Marian Ray-Ciemięga. Bałkański syndrom. Warsaw: Ministerstwo Obrony Narodowej, 2000.
Kawamura, Takahira, Yasuyuki Tahara, Tetsuo Hasegawa, and Shinichi Honiden. "Bee-gent: Bonding and Encapsulation Enhancement Agent Framework for Development of Distributed Systems." Systems and Computers in Japan 31, no. 13 (2000): 42-56.
Ceranowicz, A., P. E. Nielsen, and F. V. Koss. Behavioral Representation in JSAF In Ninth Conference on Computer Generated Forces and Behavioral Representation. Orlando FL, 2000.

Pages