Biblio

Export 21325 results:
2001
Kesic, Vesna. The Status of Rape as a War Crime in International Law: Changes introduced after the Wars in the Former Yugoslavia and Rwanda In New School University. Vol. MA Thesis. Subcommittee on International Terrorism, Nonproliferation and Human Rights, 2001.
Judge, James. Steganography: Past, present, future In Technical Report., 2001.
Metz, Steven. "Strategic Asymmetry." Military Review 81, no. 4 (2001): 23-31.
Norton, Robert S. Kaplan. Strategiczna karta wyników, Jak przełożyć strategię na działanie. Warsaw: PWN, 2001.
Rajzer, M.. Strategie dywersyfikacji przedsiębiorstw. Warsaw: PWE, 2001.
"Strategy and Next Steps." In Regional conference. Bucharest: Disaster Preparedness and Prevention Initiative (DPPI), 2001.
Kaplan, Robert, and David Norton. The Strategy Focused Organization . Boston: Harvard Business School Press, 2001.
Kaplan, Robert D.. The Strategy-Focused Organization: How Balanced Scorecard Companies Thrive in the New Business Environment. New York: W.W. Norton, 2001.
Newby, Gregory B.. "The Strong Cognitive Stance as a Conceptual Basis for the Role of Information in Informatics and Information System Design. Cognitive space and information space." NY: Journal of the American Society for Information Science and Technology archive 52, no. 12 (2001): 1026-1048.
Bailey, Scott M.. A Study Of Current Cyber Threats And Best Practices For Network Security In The Department Of Defense Information Network (DODIN), Faculty Of The U.S. Army Command And General Staff College In Partial Fulfillment. Vol. Master Of Military Art And Science General Studies. Muncie, Indiana: Ball State University, 2001.
Sahni, Ajai, and Bibhu Prasad Routray. SULFA: Terror by Another Name. Faultlines 9, 2001.
Choi, Thomas Y., Kevin J. Dooley, and Manus Rungtusanatham. "Supply Networks and Complex Adaptive Systems: Control Versus Emergence." Journal of Operations Man¬agement 19, no. 3 (2001): 351-366.
Rashid, Ahmed. Taliban: Militant Islam, Oil and Fundamentalism in Central Asia. New Haven, CT: Yale University Press, 2001.
Jackson, Brian. "Technology Acquisition by Terrorist Groups: Threat Assessment Informed by Lessons from Private Sector Technology Adoption." Studies in Conflict and Terrorism 24, no. 3 (2001): 183-213.
Delio, Michelle. "Technology: U.S., Chinese hackers vow to wage online war." Agence France-Presse (2001).
Brake, Jeffrey D.. Terrorism and the Military’s Role in Domestic Crisis Management: Background and Issues for Congress In CRS Report for Congress. Washington, D.C.: Congressional Research Service, 2001.
Dishman, Chris. "Terrorism, Crime and Transformation." Studies in Conflict and Terrorism 24, no. 1 (2001): 53-54.
Ganor, Boaz. Terrorism: No Prohibition Without Definition., 2001.
Wilkinson, Paul. Terrorism Versus Democracy: The Liberal State’s Response. London: Frank Cass, 2001.
Nachev, Atanas. "Testbed for implementation of advanced IT Participation." Information & Security: An International Journal 6 (2001): 132-137.
Hill, Fiona. Testimony before the Subcommittee on Central Asia and South Caucasus of the Committee on Foreign Relations of the U.S. Senate., 2001.
Asch, Beth J., and John T. Warner. "A Theory of Compensation and Personnel Policy in Hierarchical Organizations with Application to the United States Military." Journal of Labor Economics 19 (2001): 523-562.
Romaniuk, A.. "There are more and more of those wishing to become “cannon fodder” (Все більше і більше тих, хто бажає стати "гарматним кормом")." Segodnia (Today) (2001): 2.
Thermionics Quo Vadis? An Assessment of the DTRA’s Advanced Thermionics Research and Development Program. Washington, D.C.: National Academies Press, 2001.
Sharavin, A.. A third threat. Vol. 28 September 2001. site of Institute for Political and Military Analysis, 2001.

Pages