Biblio

Export 8060 results:
2010
Strategic Concept—Active Engagement, Modern Defence. Lisbon: NATO, North Atlantic Council, 2010.
Stigak, A.А.. "The structure of payment systems and modeling their performance based on system analysis(link is external)." Electronic modeling 6 (2010): 97-109.
"The Stuxnet Outbreak, A Worm in the Centrifuge – An Unusually Sophisticated Cyber-weapon is Mysterious but Important(link is external)." Economist (2010).
Salter, Mark B.. "Surveillance(link is external)." In The Routledge Handbook of New Security Studies. London: Routledge, 2010.
SySSec Project Web Page(link is external)., 2010.
Durbin, Pat, and Terry Doerscher. Taming Change with Portfolio Management: Unify Your Organization, Sharpen Your Strategy and Create Measurable Value (link is external). Austin, TX: Greenleaf Book Group Press, 2010.
Yu, Lian, Wei-Tek Tsai, Liangjie Tang, Wei Zhao, Xiangji Chen, Linqing Liu, and Yan Zhao. Testing as a Service over Cloud(link is external) In Fifth IEEE International Symposium on Service Oriented System Engineering (SOSE). Nanjing, China, 2010.
Time for a Human Approach(link is external). Zurich: ISN, 2010.
Rego, Francisco, Cristina Montiel, and Jorge Agudo. "Towards integrated fire management: The need for a European Framework Directive on Fire(link is external)." In Conference on Protection of Forests, Spanish Presidency of the European Union. La Granja–Valsaín, 2010.
Meyer, Oliver. "Towards quality CLIL: successful planning and teaching strategies." Puls 10 (2010): 11-29.
Ekström, Thomas. The Transformation from Defence Procurement to Defence Acquisition -Opportunities for New Forms of Analytical Support(link is external) In SAS-081 Symposium, Sofia., 2010.
Transparency International Corruption Perception Index 2010(link is external)., 2010.
Hughes, Rex. "A Treaty for Cyberspace." International Affairs 86, no. 2 (2010): 533.
Mihalka, Michael D., and Mark R. Wilcox. "Unintended Strategic Consequences of Security Assistance in the South Caucasus." Joint Force Quarterly (2010): 24-28.
The United States’ National Security Strategy 2010(link is external)., 2010.
"United States Nuclear Regulatory Commission, Cyber Security Programs For Nuclear Fa-cilities, Regulatory Guide (link is external)." (2010).
Uprising Worsens Kyrgyzstan Economic Woes(link is external). BBC News, 2010.
"Urgent Problems and the Logic of Military Reform(link is external)." Russian Politics and Law 48, no. 3 (2010): 59.
Alexander, Keith. U.S. Cybersecurity Policy and the Role of U.S. CYBERCOM(link is external) In CSIS Cybersecurity Policy Debate Series., 2010.
U.S. Department of Defense Quadrennial Defense Review(link is external). Washington, D.C.: U.S. Department of Defense, 2010.
Fairclough, Gordon. "U.S., Poland Amend Missile-Defense Plan." Wall Street Journal (2010).
Conley, Heather, and Jamie Kraut. "U.S. Strategic Interests in the Arctic(link is external)." Center for Strategic & International Studies (2010).
Tagarev, Todor. "Utilisation of Surplus Equipment and Infrastructure(link is external)." In Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices, 124-136. Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2010.
Dionysiou, Theodoras, Vasilios A. Siris, and George Stamatakis. "Utility-based channel assignment and topology control in wireless mesh networks(link is external)." In 2010 IEEE International Symposium on A World of Wireless, Mobile and Multimedia Net¬works (WoWMoM). Montreal, 2010.
Haralampiev, K., and G. Naidenov. "Waves of the Change and Change of the Waves." Sociological Problems Special Issue (2010).

Страници