Biblio

Export 21297 results:
2000
Guohua, Li. "Open Up New Field for Dissemination of Military News." Jiefangjun Bao (2000).
Tomes, Robert. "Operation Allied Force and the Legal Basis for Humanitarian Interventions." Parameters (2000).
Istepanian, Robert S. H., and Arthur A. Petrosian. "Optimal Zonal Wavelet-Based ECG Data Compression for a Mobile Telecardiology System." IEEE Transaction on Information Technology in Biomedicine 4, no. 3 (2000): 200-211.
Gerrard, M.. Organising for E-Business: Getting it right. Gartner Advisory, 2000.
Willis, Larry, Lashon B. Booker, Gary N. Bundy, and Paul G. Foley. Overview of the Advanced Simulation Technology Thrust (ASTT) Program In Ninth Conference on Computer Generated Forces and Behavioral Representation. Orlando FL, 2000.
Blake, V.. PABX Security, Information Security Technical Report., 2000.
Mollov, Petar. "Participation in the Consortium of Defense Academies and Security Studies Institutes and Advanced Information Technologies." Information & Security: An International Journal 5 (2000): 115-124.
Livingstone, Robert Gerald. "The Party’s Over: Kohl's Disservice to German Democracy." Foreign Affairs 79 (2000): 13-17.
Suroi, Veton. "Past as Prologue?" The International Spectator 35, no. 1 (2000): 27-33.
Lowe, Steven Wallace. Peacekeeping, Peace building, Human security and Self-interest: Why Canada Remains the Foremost Peacekeeper. 3rd Annual Graduate Studies Symposium of the Canadian Defense Associations Institute, 2000.
Personal Data Protection Law, in force since 2000., 2000.
"Peru Tops List of EDC Basket Cases." Ottawa Citizen (2000): A4.
Machowski, Jacek. Piractwo w świetle historii i prawa. Warsaw, 2000.
Bratnicki, Mariusz. Podstawy współczesnego myślenia o zarządzaniu. Wyższa Szkoła Biznesu w Dąbrowie Górniczej, 2000.
Ong, Kelvin. “Policing the Peace: Towards a Workable Paradigm In conference report from the International Peace Academy. New York, 2000.
Wallace, Helen, and William Wallace. Policy Making in the EU. 4th ed. Oxford: Oxford University Press, 2000.
Cizre, Umit. Politics and Military in Turkey into the 21st century In EUI Working Paper., 2000.
Gladkevich, Yury. "Poshel v Gory (Into the Mountains)." Profil (2000).
Daqing, Wei. "On the Positive and Negative Aspects of Military Websites." Zhongguo Guofang Bao (2000).
Nelson, Daniel. "Post Communist Insecurity." In Problems of Post-Communism., 2000.
Moskos, Charles, John Allen Williams, and David Segal. Post Modern Militaries., 2000.
Vukadinovic, Radovan. Post-Cold War Trends in International Relations. Zagreb: Faculty of Political Science, 2000.
Lawford, Mark, Jeff McDougall, Peter Froebel, and Greg Moum. Practical Application of Functional and Relational Methods for the Specification and Verification of Safety Critical Software In Algebraic Methodology and Software Technology., 2000.
Song, Dawn Xiaodong, David Wagner, and Adrian Perrig. "Practical Techniques for Searches on Encrypted Data." In IEEE Symposium on Security and Privacy. Berkeley, CA, USA, 2000.
"Priming the Pump." Economist (2000).

Pages