Biblio

Export 21423 results:
Filters: Filter is   [Clear All Filters]
2010
Yang, Zhou. Study on the vulnerability of road transport network based on Flow Interdiction Model. Beijing: Beijing Normal University, 2010.
"The Stuxnet Outbreak, A Worm in the Centrifuge – An Unusually Sophisticated Cyber-weapon is Mysterious but Important." Economist (2010).
Tsyganok, Vitaliy, and Sergii V. Kadenko. "On sufficiency of the consistency level of group ordinal estimates." Journal of Automation and Information Sciences 42, no. 8 (2010): 42-47.
Salter, Mark B.. "Surveillance." In The Routledge Handbook of New Security Studies. London: Routledge, 2010.
Teixeira, Thiago, and Gershon Dublon. "A Survey of Human-Sensing: Methods for Detecting Presence, Count, Location, Track, and Identity." ACM Computing Surveys 5 54, no. 1 (2010): 59.
SySSec Project Web Page., 2010.
Spencer, Alexander. The tabloid terrorist: The predicative construction of new terrorism in the media. New York: Palgrave Macmillan, 2010.
Durbin, Pat, and Terry Doerscher. Taming Change with Portfolio Management: Unify Your Organization, Sharpen Your Strategy and Create Measurable Value . Austin, TX: Greenleaf Book Group Press, 2010.
Bazhanov, Yevgeny. "Tangled Triangle of Russia, China and the U.S." The Moscow Times (2010).
Ivanova, Petya. Technical Evaluation Report In Analytical Support to Defence Transformation. Paris: NATO RTA, 2010.
Serih, Andrey. Technical regulation in construction. Analytical review of world experience. Chicago: SNIP, 2010.
Stocker, Mike. Technology Insertion and Management: Options for the Canadian Forces In Technical memorandum., 2010.
Hryshchuk, Ruslan V.. Teoretychni osnovy modeljuvannja procesiv napadu na informaciju metodamy teorij dyferencialnyh igor ta dyferencialnyh peretvoren. Zhytomyr: Ruta, 2010.
Servenay, David. Terroisme: pourquoi Alliance Base a fermé ȧ Paris. Rue 89, L’Obs, 2010.
Yu, Lian, Wei-Tek Tsai, Liangjie Tang, Wei Zhao, Xiangji Chen, Linqing Liu, and Yan Zhao. Testing as a Service over Cloud In Fifth IEEE International Symposium on Service Oriented System Engineering (SOSE). Nanjing, China, 2010.
Ahmad, Abu Umar Faruq. Theory and Practice of Modern Islamic Finance: The Case Analysis from Australia. Universal-Publishers, 2010.
Jaspal, Zafar Nawaz. "Threat of Extremism &Terrorist Syndicate beyond FATA." Journal of Political Studies 1, no. 2 (2010): 19-49.
Minchev, Zlatogor. Threats and Challenges in Social Networks. A European Glance and Alliance Perspective in the Context of the New Strategic Concept In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2010.
Time for a Human Approach. Zurich: ISN, 2010.
TK_02_60 Project Web Page., 2010.
Park, Hyun-A, JaeHyun Park, JaeTark Choi, and DongHoon Lee. Toward an integrated system between cloud computing and smartcard application In 5th International Conference on Computer Sciences and Convergence Information Technology. Seoul, South Korea , 2010.
Rego, Francisco, Cristina Montiel, and Jorge Agudo. "Towards integrated fire management: The need for a European Framework Directive on Fire." In Conference on Protection of Forests, Spanish Presidency of the European Union. La Granja–Valsaín, 2010.
Meyer, Oliver. "Towards quality CLIL: successful planning and teaching strategies." Puls 10 (2010): 11-29.
Ekström, Thomas. The Transformation from Defence Procurement to Defence Acquisition -Opportunities for New Forms of Analytical Support In SAS-081 Symposium, Sofia., 2010.
Tagarev, Todor. Transformation Strategies In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2010.

Pages