Biblio

Export 8062 results:
2009
Zelinsky, Aaron. "Close the Blackwater Loophole." Huffington Post (2009).
De Spiegeleire, Stephan, Chas Culpepper, Paul van Hooft, and René Willems. Closing the Loop. Towards Strategic Defence Management. The Hague: The Hague Centre for Strategic Studies, 2009.
Stinchcombe, Neil. "Cloud computing in the spotlight." Infosecurity 6, no. 6 (2009).
Jennings, Roger. Cloud Computing with the Windows® Azure™ Platform. Indianapolis, IN: John Wiley, 2009.
Ciortea, Liviu, Stefan Bucur, Vitaly Chipounov, George Candea, and Cristian Zamfir. "Cloud9: A Software Testing Service." ACM SIGOPS Operating Systems Review 43:4 (2009).
Ganon, Zohar, and E. Zilbershtein. Cloud-based Performance Testing of Network Management Systems In IEEE 14th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD'09. Pisa, Italy, 2009.
Code of Practice for Life Cycle Costing, RTO-TR-SAS-069 . Paris: NATO Research and Technology Agency, 2009.
Commission of the European Communities, A Community approach on the prevention of natural and man-made disasters. Brussels, 2009.
Comprehensive National Cybersecurity Initiative. Washington, D.C.: The White House, 2009.
Henry, Matthew H., and Yacov Y. Haimes. "A Comprehensive Network Security Risk Model for Process Control Networks." Risk Analysis 29, no. 2 (2009): 223-248.
Cayirci, Erdal, and Dusan Marincic. Computer Assisted Exercises and Training. A Reference Guide . Hoboken, NJ: John Wiley, 2009.
The Conclusion of the Government of Montenegro., 2009.
Peimani, Hooman. Conflict and Security in Central Asia and the Caucasus. Santa Barbara, CA: ABC-Clio, 2009.
de Zarobe, Yolanda Ruiz, and Rosa María Jim Catalan. Content and Language Integrated Learning: Evidence from research in Europe. Bristol: Multilingual matters, 2009.
Continuation of the National Emergency with Respect to Iran In Presidential Documents., 2009.
Iorsh, V.I., I.E. Kryukov, and I.N. Antonenko. "Control of Infrastructure and Safety of Production Systems." Management Methods and Tools (2009).
Ho, Joshua. "Cooperative Mechanisms in the Malacca Straits." In International Maritime Security Conference. Singapore: International Maritime Security Conference, 2009.
Lynch, Dov. "The Corfu Process." In The Indivisibility of Security: Russia and Euro-Atlantic Security, 35 ff. Rome: NATO Defense College, 2009.
Henninger, A.J.. Corruption: 15 Afghan Ministers under Investigation; Bribes, Perks, Skimming., 2009.
Corruption Perceptions Index results for 2008. Transparency International, 2009.
Country Analysis Brief: China. U.S. Energy Information Administration, 2009.
Country Reports on Terrorism 2008. State Department, Office of the Coordinator for Counterterrorism, 2009.
Wilson, Clay. "Cyber Crime." In Cyberpower and National Security, 415. Washington, D.C.: National Defense University Press, 2009.
Libicki, Martin C.. Cyberdeterrence and Cyberwar . Santa Monica, CA: RAND, 2009.
Libicki, Martin. Cyberdeterrence and Cyberwarfare. Santa Monica, CA: RAND, 2009.

Страници