Biblio

Export 21423 results:
Filters: Filter is   [Clear All Filters]
2012
Moshes, Arkady. "Russia's European policy under Medvedev: how sustainable is a new compromise?" International Affairs (Royal Institute of International Affairs 1944-) 88, no. 1 (2012): 17-30.
Herd, Graeme. "Russia's European Security Treaty and the Kyrgyz Crisis." In Russia and its Near Neighbours, 129-150. Palgrave Macmillan, 2012.
Stavridis, James C., and Elton C. Parker. "Sailing the Cyber Sea." Joint Forces Quarterly 65 (2012): 62.
Placek, Kevin. "The San Francisco System: Declining Relevance or Renewed Importance?" Quarterly Access 4, no. 1 (2012): 15-20.
Balzarotti, D. Second Report on Threats on the Future Internet and Research Roadmap, SySSec Consortia., 2012.
Nikooghadam, Morteza, and Ali Zakerolhosseini. "Secure Communication of Medical Information Using Mobile Agents." Journal of Medical Systems 36, no. 6 (2012): 3839-3850.
Karokola, Geoffrey, Louise Yngström, and Stewart Kowalski. "Secure e-Government Services: A Comparative Analysis of e-Government Maturity Models for the Developing Regions–The Need for Security Services." International Journal of Electronic Government Research (IJEGR) 8, no. 1 (2012).
SecureDoc™ for Lenovo. WinMagic Data Security, 2012.
Li, Xu, Xiaohui Liang, Rongxing Lu, Xuemin Shen, Xiaodong Lin, and Haojin Zhu. "Securing Smart Grid: Cyber Attacks, Countermeasures, and Challenges." IEEE Communications Magazine 50, no. 8 (2012): 38-45.
Barnard-Wills, David, and Debi Ashenden. "Securing Virtual Space: Cyber War, Cyber Terror, and Risk." Space and Culture XX, no. X (2012): 1-14.
Peyrouse, Sébastien, Jos Boonstra, and Marlène Laruelle. Security and Development Approaches to Central Asia. The EU Compared to China and Russia In Working Paper 11. EUCAM, 2012.
Security Annual Report. Cisco, 2012.
Alipiev, Ilian. Security challenges and functions of the intelligence community In CSDM Views. Sofia: Centre for Security and defence Management, 2012.
Milina, Velichka. "Security in a Communications Society: Opportunities and Challenges." Connections: The Quarterly Journal 11, no. 2 (2012): 53-66.
Security, Kazakhstan. London: IHS Global Limited, 2012.
Hadi, Raghad Mohammed. "Security protocol for a remote user authentication system over unsecure network." Science articles exchange (مقالات العلوم الصرف) 18, no. 76 (2012).
Security risk: Sensitive data can be harvested from a PC even if it is in standby mode, experts say. ScienceDaily.com, 2012.
Security Sector Reform Integrated Technical Guidance Notes. New York: UN SSR Task Force, 2012.
Security threat report 2013. Sophos, 2012.
Alpern, Robert, Michael Caplan, and Orson Moe. Seldin and Giebisch's The Kidney: Physiology and Pathophysiology. 5th ed. London: Academic Press, 2012.
"Serbia: A double-dip recession in the Western Balkans." The Economist Intelligence Unit (2012).
Tagarev, Todor, and Velichka Milina. "Shaping Energy Security Policy in Uncertainty." In International conference "Energy Security - National, Regional and Euroatlantic Frameworks". Sofia, 2012.
Gawliczek, Piotr. "Showing the Way: Contributions from NATO’s Newest Members." Connections: The Quarterly Journal 11, no. 4 (2012): 75-82.
Cohen, Gili. Sinai Peacekeeping Force Commander Warns of Weapons Smuggling to Gaza. Haaretz, 2012.
The situation in the Syrian Arab Republic In Resolution adopted by the General Assembly., 2012.

Pages