Biblio

Export 21387 results:
2010
D’Agostino, Davi M.. Hybrid warfare (Report GAO-10-1036R Hybrid Warfare). Washington DC: US Government Accountability office, 2010.
Harmon, Christopher C.. "Illustrations of Discrete Uses of Force." In Toward a Grand Strategy Against Terrorism, 114-115. New York: McGraw-Hill, 2010.
Tudoroiu, Nicolae, Mohammed Zaheeruddin, Vladimir Cretu, and Elena-Roxana Tudoroiu. "IMM-UKF Versus Frequency Analysis [Past and Present]." IEEE Industrial Electronics Magazine 4, no. 3 (2010): 7-18.
Missiroli, Antonio. Implementing the Lisbon Treaty: The External Policy Dimension In Bruges Political Research Papers No. 14 ., 2010.
Cobb, Scott E.. The Importance of a U.S. Security Strategy in the Caspian Black Sea N/A Region In USMC Command and Staff College. Vol. Master of Military Studies . Quantico, VA: Marine Corps University, 2010.
Wegener, Anne-Christine, and Mark Pyman. "The Importance of Integrity Building." In Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices, 178-185. Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2010.
Markoff, John, and David E. Sanger. "In a Computer Worm, a Possible Biblical Clue." The New York Times (2010).
Krastev, Nikola. In U.S. Cybercrime Case, Track Record Indicates Russia Willing to Cooperate. Radio Free Europe/Radio Liberty, 2010.
Yau, Hon Keung, and Alison Lai Fong Cheng. "Influence of Organizational Defensive Actions on the Learning of Information and Communication Technology: An Attitude Study in Hong Kong." International Journal of Management 27, no. 3 (2010): 459-469,579.
Information on Defence Expenditures In NATO Topics., 2010.
Minchev, Zlatogor. Information Processes and Threats in Social Networks: A Case Study In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2010.
Peltier, Thomas R.. Information Security Risk Analysis. 3rd ed. Boca Raton, FL: CRC Press, Taylor & Francis Group, 2010.
Savenko, Oleg, and Sergyi Lysenko. "Information Technology of Intelligent Trojan Detection in Computer Systems." Radioelectronic and Computer Systems 5 (2010): 120-126.
Initial National Communication on Climate Change of Montenegro to the United Nations Framework Convention on Climate Change. Podgorica: Ministry of Spatial Planning and Environment, 2010.
Frinking, Erik J., and J.G.M. Rademaker. "Inlichtingen en Veiligheidsdiensten." In Nationale Veiligheid en inlichtingen, 189-204. Alphen aan den Rijn: Kluwer, 2010.
Carr, Jeffrey. Inside Cyber Warfare. Sebastopol, CA: O’Reilly Media, 2010.
"Integrated Command and Control System Support." In NC3A Service Catalogue, 24., 2010.
Park, Sang-Gun, Tag-Gong Lee, NamKyu Lim, and Hyun-Sik Son. "Integrated Framework and Methodology for Capability Priority Decisions." Information & Security: An International Journal 25 (2010): 78-98.
Rajkovcevski, Rade. "Integration of Euro-Atlantic Norms and Values: Changes in the Military Culture of the Balkans." Connections: The Quarterly Journal 10, no. 1 (2010): 121-137.
Lucas, George. "Integrity Issues Related to Military Operations." In Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices, 149-162. Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2010.
Sahukar, Behram A.. "Intelligence and Defence Cooperation in India." In Intelligence Cooperation Practices in the 21st Century: Towards a Culture of Sharing, 31-41. Amsterdam: IOS Press, 2010.
Zhuang, M., C. Yongmei, P. Quan, L. Zhunga, and H. Jun. "An intelligent fusion method of sequential images based on improved DSmT for target recognition." In International Conference on Computational Aspects of Social Networks, CASoN'10. Taiyuan; China, 2010.
Pattath, Avin. Interactive visualization for mobile visual analytics In Engineering, Computer, Computer Science. Vol. Ph.D. Purdue University, 2010.
Internal Security Strategy for the European Union: Towards a European Security Model. European Union’s report , 2010.
Tikk, Eneken, Kadri Kaska, and Liis Vihul. International Cyber Incidents: Legal Considerations. Tallinn, Estonia: Cooperative Cyber Defence Center of Excellence, 2010.

Pages