Biblio

Export 21423 results:
Filters: Filter is   [Clear All Filters]
0
McCants, Nicholas. The Resource Allocation Process and the Effects on Cybersecurity Culture In . Vol. Doctor of Information Technology. Capella University.
Douglas, Nadja. "Revising the Framework of Civilian Control." In Public Control of Armed Forces in the Russian Federation, 63-104. Cham: Palgrave Macmillan.
Llanque, Marcus. "The Rhetoric of intellectual Manifestos from the First World War to the War against Terrorism." In The Ashgate Research Companion to the Politics of Democratization in Europe. Ashgate Publishing, Ltd.
"SARS-CoV-1 and SARS-CoV-2 are related but different viruses and produce related but different infections(link is external)." WHO.
Sato, H., M. Kubo, and A. Namatame. "Sato, H." In Soft Computing and Intelligent Systems (SCIS) and 13th International Symposium on Advanced Intelligent Systems (ISIS), 2012 Joint 6th International Conference on. Kobe: IEEE.
Navrátil, Matej, and Michal Onderco. "Slovakia: Creating and Transforming Civil-Military Relations." In Oxford Research Encyclopedia of Politics.
Kuldeep, Singh, Jøsang Audun, Sadek Ferdous, and Ravishankar Borgaonkar. Spam Filter Optimality Based on Signal Detection Theory In 2nd international conference on Security of information and networks. Famagusta, North Cyprus.
Standards of higher education 1701 “Information Security“(link is external).
On the State Program for Transition of the Armed Forces of Ukraine to Manning with Contract Military Servicemen(link is external) In Decree by the President of Ukraine No. 348/2002 .
Holliday, P.. "SWARMM - a mobility modelling tool for tactical military networks." In Military Communications Conference. San Diego, CA: IEEE.
Shaw, Mark. Typologies of Transnational Organized Crime Groups(link is external). Centre for International Crime Prevention, UNODC.
Ugroza terrorizma v Rossii sokhranaetsya [The Terrorist Threat in Russia Remains](link is external). Rosbalt.
Sapolsky, Harvey M., Eugene Gholz, and Caitlin Talmadge. US Defense Politics: The origins of security policy. Routledge.
U.S. Response to Crisis in Kyrgyz Republic, Uzbekistan(link is external). U.S. Department of State.
USD 39, 5 billion will be spent on Smart City Technologies in 2016(link is external) In Press release by ABI Research.
Adelantado, Martin, and Jean-Michel Mathe. "Using Agent Based Distillation to Explore Issues Related to Asymmetric Warfare.".
Brinkman, Richard, Jeroen Doumen, and Willem Jonker. "Using Secret Sharing for Searching in Encrypted Data." In Workshop on Secure Data Management in a Connected World. Toronto, Canada.
West Europe–West China Project to Increase Deliveries by Trucks Almost Four-fold(link is external). Government of the Republic of Kazakhstan.
Bigo, Didier. "“When Two Become One”." In International Relations Theory and the Politics of European Integration. London: Routledge.
İşeri, Emre, and A.Oğuz Dilek. "Yeni enerji jeopolitiğinde nato'nun enerji güvenliğinde tamamlayıcı rolü ve Türkiye'nin potansiyel katkıları." Gazi Akademik Bakış, no. 10: 229.
Zimbabwe - Disaster Statistics for 2014(link is external). Prevention Web.
Иванова, Петя. "Новите технологии и темпът на развитие на отбранителните системи." Военен журнал т. 109, no. бр. 2.
Бахчеванов, Георги. "Приносът на Република България за изграждане /на отбранителните способности на НАТО и ЕС." In Наука, образование, сигурност . Венелин Георгиев ed. София: Планета-3.

Pages