Biblio

Export 21387 results:
2009
Locasto, Michael E., and Sara Sinclair. An Experience Report on Undergraduate Cyber-Security Education and Outreach. ACEIS'09, 2009.
Kolb, Alice Y., and David A. Kolb. "Experiential Learning Theory: A Dynamic, Holistic Approach to Management Learning, Education and Development." In The SAGE Handbook of Management Learning, Education and Development, 13. SAGE Publications, 2009.
Woehle, Ralph, and Andrew Quinn. "An Experiment Comparing HBSE Graduate Social Work Classes: Face‐to‐Face and at a Distance." Journal of Teaching in Social Work 29, no. 4 (2009): 418-430.
Cooper, Stephen, Christine Nickell, Victor Piotrowski, Brenda Oldfield, Bill Caelli, and Lance Hoffman. "An Exploration of the Current State of Information Assurance Education." ACM SIGCSE Bulletin 41, no. 4 (2009): 109-125.
Ryan, Kurt J.. Exploring Alternative Strategic Access To Afghanistan. U.S. Army War College, 2009.
Komari, Iraj Elyasi, Vyacheslav Kharchenko, Eugene Babeshko, Anatoliy Gorbenko, and Alexander Siora. "Extended Dependability Analysis of Information and Control Systems by FME(C)A-technique: Models, Procedures, Application." In Fourth International Conference on Dependability of Computer Systems, 2009, DepCos-RELCOMEX'09., 2009.
Aly, Seham Mouawad, Raafat El Fouly, and Hoda Baraka. "Extended Kalman Filtering and Interacting Multiple Model for Tracking Maneuvering Targets in Sensor Netwotrks." In Aerospace Sciences & Aviation Technology, Asat., 2009.
"Fateful Tuna: Somali Pirates Have Kidnapped a Record Number of Russians." Novye Izvestia (2009).
Qiu-ju, You, Zhu Wei, and Bai Yong-qiang. "Fault tree analysis on risk factors of underground gas networks of Beijing city." Oil & Gas Storage and Transportation 28, no. 9 (2009): 24-30.
Wagstyl, Stefan, and Roman Olearchyk. "Fear of New Europe Gas Crisis." Financial Times (2009).
Holubenko, O.L., O.S. Petrov, and V.O. Horoshko. "Features of Training for Specialists in Information Security." Information Security (2009): 5-17.
Osipian, Ararat L.. "‘Feed from the Service’: corruption and coercion in state–university relations in Central Eurasia." Research in Comparative and International Education 4, no. 2 (2009).
Speckhard, Anne. "Female Suicide Bombers in Iraq." Democracy and Security 5, no. 1 (2009): 19-50.
Agordzo, Benjamin Kwasi. "Filling the ‘Security Gap’ in Post-conflict Situations: Could Formed Police Units Make a Difference?" International Peacekeeping 16, no. 2 (2009): 287-94.
Paget, François. Financial Fraud and Internet Banking: Threats and Countermeasures In McAfee report. Santa Clara: CA: McAfee, 2009.
Chen, Hua, and Yi Guo. "Fine-grained Security Model of Multi-agent Communication with XML Specifications." Journal of Xi'an Technological University 29, no. 1 (2009).
Böck, Benjamin. Firewire-based Physical Security Attacks on Windows 7, EFS and BitLocker. Security Research Lab Secure Business Austria, 2009.
First COI of the Sixteenth Election Period In Bundestag print., 2009.
Dorronsoro, Gilles. Focus and Exit: An Alternative Strategy for the Afghan War. Washington, D.C.: Carnegie Endowment for International Peace, 2009.
For a Euro-Atlantic Partnership (EAP) Looking to the Future: Proposals for NATO’s New Strategic Concept. Government of Austria, Ireland and Switzerland, 2009.
"For Irish, E.U. May Stand for Economic Unity." The New York Times (2009).
Tarasyuk, O.M., and A.V. Gorbenko. "For Methods for Development of Critical Software." In Lecture Materials. Kharkiv: National Aerospace University Institute “KhAI”, 2009.
Giegerich, B., and V. Comolli. FORESEC Deliverable D 4.5 Report on European Security: Trends, Drivers, Threats., 2009.
Mansour, Riham Hassan Abd. Formal Analysis and Design for Engineering Security (FADES). Vol. PhD Dissertation. Blacksburg, VA: Virginia Polytechnic Institute and State University, 2009.
Tagarev, Todor, Tsvetomir Tsachev, and Nikolay Zhivkov. "Formalizing the Optimization Problem in Long-Term Capability Planning." Information & Security: An International Journal 23, no. 1 (2009): 99-114.

Pages