Biblio

Export 21423 results:
Filters: Filter is   [Clear All Filters]
2014
Zuma, Buhle. "Contact Theory and the Concept of Prejudice: Metaphysical and Moral Explorations and an Epistemological Question." Theory & Psychology 24, no. 1 (2014): 40-57.
Gawlik-Kobylińska, Małgorzata, and Monika Lewińska. "Content Language Integrated Learning in Polish Higher Military Education." Connections: The Quarterly Journal 13, no. 3 (2014): 105-115.
Malthaner, Stefan. "Contextualizing Radicalization: The Emergence of the “Sauerland-Group” from Radical Networks and the Salafist Movement." Studies in Conflict and Terrorism 37, no. 8 (2014): 638-653.
Ben Dhiaf, Zouhour, Fatm Haouas, and Atef Hamouda. "Contributions in belief functions and plausible and paradoxical reasoning theories: Application to supervised classification of satellite images." In International Image Processing, Applications and Systems Conference. Sfax, Tunisia, 2014.
Convergence of Chemistry and Biology: Report of the Scientific Advisory Board’s Temporary Working Group. The Hague: OPCW: Organisation for the Prohibition of Chemical Weapons, 2014.
Kühn, Ulrich. "Cooperative Arms Control in Europe: The Consequences of Complexity, Decay, Power, and Norms." In Expert Roundtable on Conventional Arms Control and Confidence-Building Measures in Europe, OSCE Security Days. Vienna, 2014.
"Cops or Soldiers?(link is external)" The Economist (2014).
Corruption and Anti-Corruption in Bulgaria (2013-14)(link is external). Sofia: Center for Study of Democracy (CSD), 2014.
Council Decision of 24 June 2014 on the Arrangements for the Implementation by the Union of the Solidarity Clause(link is external)., 2014.
Zetter, Kim. Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon. New York: Crown, 2014.
"Countering Hybrid Threats: Challenges for the West." Strategic Comments 2014, no. 40 (2014): 21.
Peters, Allison. Countering Terrorism and Violent Extremism in Pakistan: Why Policewomen Must Have a Role(link is external) In Policybrief . Institute for Inclusive Security, 2014.
Patil, Sameer. Counter-Terrorism and Federalism(link is external). Gateway House (Indian Council on Global Relations), 2014.
Holehouse, Matthew. "Counter-Terrorism Bill: What It Contains(link is external)." Telegraph (2014).
Li, Xingan, and Martti Juhola. "Country crime analysis using the self-organizing map, with special regard to demographic factors." AI & SOCIETY 29, no. 1 (2014): 53-68.
Takacs, Viktoria, and Piotr Matczak. Country study: Hungary In Analysis of Civil Security Systems in Europe., 2014.
Matczak, Piotr, and Grzegorz Abgarowicz. Country study: Poland In Analysis of Civil Security Systems in Europe. Accessed., 2014.
Pulkki, Arto. "Crimea Invaded by High Readiness Forces of the Russian Federation." Suomen Sotilas (2014).
Carlile, L., and S. MacDonald. "The criminalisation of terrorists' online preparatory acts." In Cyberterrorism: Understanding, Assessment, and Response, 155-173., 2014.
Crisis Communication Action Plan - 2011 to 2013(link is external)., 2014.
Gurunath, R., K.R. Anil Kumar, and S.K. Srivatsa. "Critical evaluation of vital role of human beings and computer systems in decision making process." International Journal of Engineering Science and Innovative Technology (IJESIT) 3, no. 1 (2014).
Martin, Ioana. Critical Information Infrastructure Protection: Towards Global Cyber Security In Regional Department of Defense Resources Management Studies. Romanian National Defense University, 2014.
Kominsky, Mitchell. "The Current Landscape of Cybersecurity Policy: Legislative Issues in the 113th Congress." Harvard Law School National Security Journal (2014).
Cyber Glossary(link is external) In National Initiative for Cybersecurity Careers and Studies., 2014.
Cyber Security Challenge UK(link is external)., 2014.

Pages