Biblio

Export 21387 results:
2009
Country Analysis Brief: China. U.S. Energy Information Administration, 2009.
Country Reports on Terrorism 2008. State Department, Office of the Coordinator for Counterterrorism, 2009.
Delamaire, L., HAH Abdou, and J. Pointon. "Credit card fraud and detection techniques : a review." Banks and Bank Systems 4, no. 2 (2009): 57-68.
Delamaire, Linda, Hussein Abdou, and John Pointon. "Credit card fraud and detection techniques: A review." Banks and Bank Systems 4, no. 2 (2009): 57 .
Tagarev, Todor. Crisis Management in a multilateral context In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2009.
Alutaibi, Khaled Shuraem. Critical Infrastructure Protection in Saudi Arabia: A Case on Petrochemical Industry Protection against Terrorist Attacks at Jubail Industrial City (JIC) In Diss. King Fahd University of Petroleum and Minerals., 2009.
Alutaibi, Khaled Shuraem. Critical Infrastructure Protection in Saudi Arabia: A Case Study on Petrochemical Industry Protection Against Terrorist Attacks at Jubail Industrial City. Dhahran, Saudi Arabia: King Fahd University of Petroleum & Minerals, 2009.
Lou, Eric Choen Weng, and Mustafa Alshawi. "Critical success factors for e-tendering implementation in construction collaborative environments: people and process issues." Journal of Information Technology in Construction (ITcon) 14 (2009).
Jackson, Richard, Marie Been Smyth, and Jeroen Gunning. Critical Terrorism Studies: A New Research Agenda. London: Routledge, 2009.
Lo, Nai Wei, and Kuo-Hui Yeh. "Cryptanalysis of Two Three-Party Encrypted Key Exchange Protocols." Computer Standards & Interfaces 31, no. 6 (2009).
Pilon, Juliana Geran. Cultural Intelligence for Winning the Peace. Washington DC: The Institute of World Politics Press, 2009.
Current Practices in Electronic Surveillance in the Investigation of Serious and Organized Crime In United Nations Publications. UNODC, 2009.
Wilson, Clay. "Cyber Crime." In Cyberpower and National Security, 415. Washington, D.C.: National Defense University Press, 2009.
Australian Government, Attorney-General's Department. Cyber Security Strategy of Australian., 2009.
Cyber Security Strategy of the United Kingdom: safety, security and resilience in cyber space. UK Cabinet Office, 2009.
Schaap, Arie J.. "Cyber Warfare Operations: Development and Use Under International Law." Air Force Law Review 64 (2009): 121-173.
Karatzogianni, Athina. Cyber-Conflict and Global Politics. Routledge, 2009.
Libicki, Martin C.. Cyberdeterrence and Cyberwar . Santa Monica, CA: RAND, 2009.
Libicki, Martin. Cyberdeterrence and Cyberwarfare. Santa Monica, CA: RAND, 2009.
Kramer, Franklin D.. "Cyberpower and National Security: Policy Recommendations for a Strategic Framework." In Cyberpower and National Security, 12. Washington, D.C.: National Defense University Press, 2009.
Harris, Shane. "The Cyberwar Plan." National Journal (2009).
de Groot, Bert, and Philip Hans Franses. "Cycles in basic innovations." Technological Forecasting & Social Change 76 (2009): 1021-1025.
Buhari-Gulmez, Didem. The Cyprus Conflict: A World Society Perspective In Politics and International Relations Working Paper., 2009.
Kohn, Richard H.. "The Danger of Militarization in an Endless "War" on Terrorism." The Journal of Military History 73, no. 1 (2009): 177-208.
"A Danger to Public Health and Welfare." New York Times (2009).

Pages