Biblio

Export 21387 results:
2010
Miles, Raymond, Charles C. Snow, Øystein Fjeldstad, Grant Miles, and Christopher Lettl. "Designing Organizations to Meet 21st-Century Opportunities and Challenges." Organizational Dynamic 39, no. 2 (2010): 93-103.
Androulidakis, Iosif. Detecting Cybercrime in Modern Telecommunication Systems In Seminar 64/2010, Cyber Crime & High Tech. Athens: European Police College (CEPOL), 2010.
Mirkovic, Jelena, Terry V. Benzel, Ted Faber, Robert Braden, John Wroclawski, and Stephen Schwab. The DETER Project In The DETER Project," in IEEE International Conference on Technologies for Homeland Security (HST ’10)., 2010.
Developed Information Society. Ministry of Information Society of Macedonia, 2010.
Sabev, Sabi. "Developing and Employing Expeditionary Capabilities: Key to Transforming Air Forces of Small NATO Nations." Information & Security: An International Journal 25 (2010): 47-56.
Morad, Ameer. "Developing E-Tender Advertising System." CSREA EEE (2010).
Tagarev, Todor. Developing Guidelines and RTD Strategies for Crisis Management in Natural Disasters In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2010.
Iliasov, Alexei, Elena Troubitsyna, Linas Laibinis, Alexander Romanovsky, Kimmo Varpaaniemi, Dubravka Ilic, and Timo Latvala. "Developing Mode-Rich Satellite Software by Refinement in Event-B." In Formal Methods for Industrial Critical Systems, FMICS 2010. Springer, 2010.
Bartolozzi, Marco. "Developing Regional Air Defence Capabilities: Role of NC3A." Information & Security: An International Journal 25 (2010): 113-122.
DHS Risk Lexicon. Department of Homeland Security. , 2010.
D, Albright, Brannan P, and Walrond C. Did Stuxnet Take Out 1,000 Centrifuges at the Natanz Enrichment Plant?. Institute for Science and International Security, 2010.
Distler, Werner. "Die Bedingungen der Intervention: Interaktion in einer Ausnahmesituation." In Interventionskultur: Zur Soziologie von Interventionsgesellschaften, 119-40. Wiesbaden: VS Verlag, 2010.
Dion, Maeve. "Different Legal Constructs for State Responsibility." In International Cyber Security Legal & Policy Proceedings 2010, 69. Tallinn, Estonia: Cooperative Cyber Defence Center of Excellence, 2010.
Rogers, Everett M.. Diffusion of Innovations . New York: Simon and Schuster, 2010.
A Digital Agenda for Europe. Brussels: EC, 2010.
Lillard, Terrence V., Clint P. Garrison, Craig A. Schiller, and James Steele. Digital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data. Syngress Publishing, 2010.
Garfinkel, Simson L.. "Digital Forensics Research: The Next 10 Years." Digital Investigation 7 (2010): S64-S73.
Kovács, László, and Csaba Krasznay. "Digital Mohács: A Cyberattack Scenario against Hungary." Nation and Security 44 (2010): 44-56.
Cutter, Susan L., Christopher G. Burton, and Christopher T. Emrich. "Disaster Resilience Indicators for Benchmarking Baseline Conditions." Journal of Homeland Security and Emergency Management 7, no. 1 (2010).
Haensch, Stephanie. "Distinct Clones of Yersinia pestis Caused the Black Death." PLoS Pathogens 6 10 (2010).
Klump, Ray, and Matthew Kwiatkowski. "Distributed IP Watchlist Generation for Intrusion Detection in the Electrical Smart Grid." In Critical Infrastructure Protection, 13-126. IV ed. Berlin: Springer, 2010.
Dmitry Medvedev answers Russian journalists’ questions. Vol. 16 April 2010. Official website of the President of Russia, 2010.
Kubert, Joe. Dong Xoai, Vietnam 1965. New York DC: Comics Library, 2010.
Draft Report on an EU Strategy for the South Caucasus. European Parliament Committee on Foreign Affairs, 2010.
Tagarev, Todor. Driving forces of security services’ reform in the countries of Eastern Europe In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2010.

Pages