Biblio
Export 8461 results:
Should We Privatize the Peacekeeping." Washington Post (2000).
"Significance of Accountability under the New Approach to Public Governance." International Review of Administrative Sciences 66, no. 4 (2000): 599-618.
" Single Database Private Information Retrieval Implies Oblivious Transfer In Advances in Cryptology: EUROCRYPT’00: International Conference on the Theory and Application of Cryptographic Techniques . Vol. 1807. Bruges, Belgium, 2000.
Small firms must take Internet plunge or risk being sidelined." The Engineer 10 (2000): 10.
"Software Engineering: A Programming Approach. Vol. 3. Addison-Wesley, 2000.
Standing Before the Portals. Non-Profit Content Online in the Age of Commercial Gatekeepers In Shaping the Network Society: The Future of the Public Sphere in Cyberspace (DIAC2000). Seattle, U.S., 2000.
Statement for the Record before the Joint Economic Committee on Cyber Threats and the U.S. Economy ., 2000.
Strategia sukcesu firmy. Warsaw: PWE, 2000.
Strengthening Transatlantic Security: A U.S. Strategy for the 21st Century. Washington, DC: Department of Defense, 2000.
Structural Realism after the Cold War." International Security 25 (2000): 37.
"On the Sudden Emergence of Military Websites." Zhongguo Guofang Bao (2000).
"Survey on Information Appliances." IEEE Computer Graphics & Applications 20, no. 3 (2000): 24-31.
"Svobodomysliye v Kyrgyzstane: puti mezhreligioznogo dialoga (Freethinking in Kyrgyzstan:Ways for Dialogue between Different Religions)." In Central Asia and World Culture. Vol. 1-2., 2000.
"Tacit and Formal Knowledge and Learning in Small Business: An Exploratory Study on the Perceptions of Successful Businessmen In 4th International Conference on Technology Policy and Innovation. Curitiba, Brazil, 2000.
A Tale of Two Export Banks." Ottawa Citizen (2000): A4.
"Their Own Army?" Foreign Affairs 79, no. 4 (2000): 14.
"Theoretical Underpinnings of Situation Awareness: A Critical Review." Situation Awareness Analysis and Measurement (2000).
"They Shoot Trojan Horses, Don’t They? An Economic Analysis of Anti-Hacking Regulatory Models." Georgia Law Journal 89, no. 171 (2000): 214-217.
"Think Tanks and Civil Societies: Catalysts for Ideas and Action. New Brunswick, NJ: Transaction Publications, 2000.
The Third World War—Total Information War . Xinhua Publishing House, 2000.
This House Has Fallen . London: Penguin Books, 2000.
Three-Party Encrypted Key Exchange: Attacks and a Solution." ACM Operating Systems Review 34, no. 4 (2000): 12-20.
"Tools for Transformation: The Military Requirements Process. Hoover Institution, Stanford University, 2000.
Страницы
- « первая
- ‹ предыдущая
- …
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- …
- следующая ›
- последняя »