Biblio

Export 21362 results:
2000
Niemeyer, Klaus. Modell Ausgewählter Branchen zur Simulation von kritischen Störungen., 2000.
Lauren, Michael K.. "Modelling Combat using Fractals and the Statistics of Scaling Systems." Military Operations Research 5, no. 3 (2000): 47-58.
Tolksdorf, R.. Models of coordination In International Workshop on Engineering Societies in the Agents’ World ESAW’00 . Italy, 2000.
Kozhushko, E.. Modern Terrorism: An Analysis of Modern Trends . Moscow: Harvest, 2000.
King, Charles. The Moldovans: Romania, Russia, and the Politics of Culture . Stanford, CA: Hoover Institution Press, 2000.
Ceniceros, Roberto. "More Consultants Offering Technical Help to Ensure Security." Business Insurance (2000).
Camacho, David, Daniel Borrajo, and José M. Molina. A multiagent approach for electronic travel planning In Second International Bi-Conference Workshop on Agent-Oriented Information Systems AOIS-2000. Austin, TX, USA, 2000.
Bar-Shalom, Yaakov, and William Blair. Multitarget-Multisensor Tracking: Applications and Advances. Vol. 3. Norwood, MA: Artech House, 2000.
National Military Command Center Technical Architecture Description. Hanscom AFB, MA: USAF Electronic Systems Center, 2000.
Cameron, Iain. National Security and the European Convention of Human Rights. Dordrecht: Kluwer Law International, 2000.
"National Security Concept of the Russian Federation." Rossiiskaya Gazeta (2000).
National Security Law into force 1 January 2002., 2000.
National Security Law of Latvia. Likumi.lv, 2000.
NATO C3 Technical Architecture In NATO Open Systems Working Group. Brussels, Belgium: NATO Open Systems Working Group: Allied Data Publication (ADat-P), 2000.
Kozaryn, Linda D.. "NATO Chief Says More Police Vital in Kosovo." American Forces Information Service (2000).
Anderson, Ewan. "NATO Expansion and Implications for Southern Tier Stability." In Crossroads and Conflict: Security and Foreign Policy in the Caucasus and Central Asia, 130. New York: Routledge, 2000.
Robertson, George. NATO Needs New Forces for New Challenges. The Independent (U.K.), 2000.
Hendrickson, Ryan C.. "NATO’s Open Door Policy and the Next Round of Enlargement." Parameters 30 (2000): 53-66.
Hunter, Keith O., William E. Har, and Chris Forsythe. A Naturalistic Decision Making Model for Simulated Human Combatants In Ninth Conference on Computer Generated Forces and Behavioral Representation. Orlando FL, 2000.
Alberts, David, John Garstka, and Frederick Stein. Network Centric Warfare. Washington, D.C.: Department of Defense, C4ISR Cooperative Research Program, 2000.
Alberts, David S., John J. Garstka, and Frederick P. Stein. Network Centric Warfare; Developing and Leveraging Information Superiority. Washington DC: CCRP, DoD, USA, 2000, 2000.
Monitor, ISIJ. "Network Intrusion Detection: An Analyst’s Handbook." Information & Security: An International Journal 4 (2000): 125-146.
Monitor, ISIJ. "Network Security Fundamentals." Information & Security: An International Journal 4 (2000): 121-122.
Monitor, ISIJ. "New AFCEA Chapter in South-East Europe." Information & Security: An International Journal 5 (2000): 129-130.
Hoffman, Bruce. "New Forms of Terrorism and The Threat of Terrorist Use of Chemical, Biological, Nuclear and Radiological Weapons." In Terrorismus als Weltweites Phänomen. Berlin: Berliner Wissenschaftsverlag, 2000.

Pages