Biblio

Export 21393 results:
2012
Nakashima, Ellen. "In U.S.-Russia Deal, Nuclear Communication System May Be Used for Cybersecurity." Washington Post (2012).
Increase in Opium Production in Afghanistan Gives Cause for Concern. Tajikistan News-NA “Asia-Plus”, 2012.
Prusty, Nigam. Indian Government Wins Vote on Wal-Mart-type Stores. Reuters, 2012.
Infanterist der Zukunft. Deutsches Heeresamt, 2012.
Mikuž, Ivan. Influence Small State Force Design. Carlisle: United States Army War College, 2012.
Moharana, Chitta Ranjan, Manas Kumar Pal, and Debasish Rout. "Information and Network Security in E-Governance: Perspective and Issues." International Journal of Research in Engineering, IT and Social Sciences 16, no. 1 (2012).
Wawak, Slawomir. "Information Security Management in Context of Globalization." Journal of the Washington Institute of China Studies 6, no. 1 (2012): 41-52.
Lukorito, Graham Masinde. Information security threats and E-government initiatives at the Kenya Revenue Authority (KRA) In School of business. Vol. Master of Business Administration. University of Nairobi, 2012.
Sahi, Geetanjali, and Sushila Madan. "Information Security Threats in ERP Enabled E-Governance: Challenges and Solutions." In Strategic Enterprise Resource Planning Models for E-Government: Applications and Methodologies, 158-170. IGI Global, 2012.
Information Sharing with non-NATO Entities. NATO Joint Analysis and Lessons Learned Centre, 2012.
Wiredu, Gamel. "Information systems innovation in public organisations: an institutional perspective." Information Technology & People 25, no. 2 (2012): 188-206.
Dimitrov, Tulechka, and Paunova. Information Threats in the Internet, social networks and games.2012 In International Scientific Conference ‘Informatics in the Scientific Knowledge’. Varna, Bulgaria, 2012.
Lukasik, Sebastian H.. " Insurgent Airpower in Historical Perspective: An Introduction and Prospectus for Research." The Historian 74, no. 2 (2012): 217-240 .
Minchev, Z.. Integrated Border Security Aspects: Bulgarian Academic Experience and Development Perspectives In International Conference “The Eastern Partnership: Assessment of Past Achievements and Future Trends”. Bucharest, Romania: Military Publishing House, 2012.
Integrated Research and Industrial Roadmap for European Nanotechnology. Nanofutures, 2012.
Popova, Juliana. Integration of Roma Communities in Bulgaria and Romania. OP “Human Resources Development”, 2012.
Mejias, Roberto. An Integrative Model of Information Security Awareness for Assessing Information Systems Security Risk In Annual Hawaii International Conference on System Sciences., 2012.
Warner, Michael. "Intelligence and Reflexivity: An Invitation to a Dialogue." Intelligence and National Security 27, no. 2 (2012): 167-171.
Wippl, Joseph W.. "Intelligence Exchange Through InterIntel." International Journal of Intelligence and CounterIntelligence 25, no. 1 (2012): 1-18.
Gill, Peter, and Mark Phythian. Intelligence in an Insecure World. Cambridge: Polity, 2012.
Glassman, Michael, and Min Ju Kang. "Intelligence in the internet age: the emergence and evolution of OSINT." Computers in Human Behavior 28, no. 2 (2012): 673-682.
Gill, Peter. "Intelligence, Threat, Risk and the Challenge of Oversight." Intelligence and National Security 27, no. 2 (2012): 206-222.
Intel® Virtualization Technology for Directed I/O (VT-d): Enhancing Intel platforms for efficient virtualization of I/O devices. Software Intel.com, 2012.
Tasevski, Predrag. Interactive Cyber Security Awareness Program. Germany: Lambert Academic Publishing (LAP), 2012.
Zhou, Yan, and Jianxun Li. "Interactive multiple Kalman filters based 3-D target tracking for two airborne platforms with bearings-only measurements." In 2012 24th Chinese Control and Decision Conference, CCDC 2012. Taiyuan; China, 2012.

Pages