Biblio

Export 21404 results:
2013
National Institute of Standards and Technology. Security and Privacy Controls for Federal Information Systems and Organizations In Special Publication., 2013.
Masrom, Maslin, Edith AiLing Lim, and Sabariyah Din. "Security and Quality Issues in Trusting E-Government Service Delivery." In Managing Trust in Cyberspace., 2013.
Illiashenko, Oleg, Vyacheslav Kharchenko, and Myhailo Ahtyamov. Security Assessment and Green Issues of FPGA-Based Information and Control Systems In Proceedings of the IEEE Conference Digital Technologies DT2013. Žilina, Slovakia, 2013.
Kharchenko, Vyacheslav, and Myhailo Ahtyamov. Security assessment and green issues of FPGA-based information & control systems In Digital Technologies (DT), 2013 International Conference on, pp. 185-190. IEEE, 2013.
Freire, Maria Raquel. Security in the South Caucasus: the EU, NATO and Russia In NOREF Policy Brief. Norwegian Peacebuilding Resource Centre, 2013.
Fariborzi, Elham, and Hoda Anvari Kazemabad. "The Security of Information in Financial Transactions via Mobile: Algorithms." International Journal of Computer Networks and Communications Security 1, no. 6 (2013): 257-263.
Giragosian, Richard, Zaur Shiriyev, and Kornely Kakachia. "Security Perceptions: The Views from Armenia, Azerbaijan & Georgia." In The South Caucasus 2018: Facts, Trends, Future Scenarios, 205-206. Tbilisi: Konrad Adenauer Stiftung, 2013.
Security Policy 2013. Ministry of Interior, 2013.
Boonstra, Jos, Erica Marat, and Vera Axynova. Security Sector Reform in Kazakhstan, Kyrgyzstan and Tajikistan: What Role for Europe?. EUCAM, 2013.
Tagarev, Todor. Security Sector Reform: Policy and Management Aspects., 2013.
Bayliss, Thomas J., and Paul W. Burton. "Seismic hazard across Bulgaria and neighbouring areas: regional and site-specific maximum credible magnitudes and earthquake perceptibility." Natural Hazards 68, no. 2 (2013): 271-319.
Dahbour, Omar. Self-Determination without Nationalism: A Theory of Postnational Sovereignty. Philadelphia, PA: Temple University Press, 2013.
Semtech: AN1200.13 - SX1272/3/6/7/8 LoRa Modem Design Guide., 2013.
Ackerman, Spencer. "Senate interrogates NSA over extent of its snooping." Guardian (2013): 24.
Savage, Charlie, and David Sanger. "Senate Panel presses NSA on phone logs." New York Times (2013).
Lewis, Paul, and Dan Roberts. "Senators join forces to rein in NSA spying." Guardian (2013): 22.
Sergei Lavrov: press conference in Moscow., 2013.
Enloe, Cynthia. Seriously! Investigating Crashes and Crises as if Women Mattered. Kindle edition. Berkeley: University of California Press, 2013.
Baaz, Maria Eriksson, and Maria Stern. Sexual Violence as a Weapon of War? Perceptions, Prescriptions, Problems in the Congo and Beyond . London/New York: Zed Books in association with the Nordic Africa Institute, 2013.
Zagorski, Andrei. Share of Russia and China in external trade of Central Asian countries (2004 and 2011, % of turnover). GCSP, 2013.
Shell Energy Scenarios to 2050. Shell Global, 2013.
Hegghammer, Thomas. "Should I Stay or Should I Go? Explaining Variation in Western Jihadists’ Choice between Domestic and Foreign Fighting." American Political Science Review 107 107, no. 1 (2013): 1-15.
Gill, Peter. "Should the Intelligence Agencies ‘Show More Leg’ or Have They Just Been Stripped Naked?" Information & Security: An International Journal 30, no. 1 (2013): 11-28.
Jakimavičiūtė, Vaida. Šiaurės Šalių Gynybos Identitetai Ir Regioninis Saugumas In Politikos Mokslų Ir Diplomatijos Fakultetas, Regionistikos Katedra. Vol. Magistro. Kaunas: Vytauto Didţiojo Universitetas, 2013.
Çelik, Turgay, and Bedir Tekinerdogan. "S-IDE: A tool framework for optimizing deployment architecture of High Level Architecture based simulation systems." Journal of Systems and Software 86, no. 10 (2013): 2520-2541.

Pages