Biblio

Export 21404 results:
2014
Trope, R. L., and L. L. Hantover. "In the Wake of Cyber Damage: Significant Decisions in Cybersecurity 2013-2014." Business Lawyer 70, no. 1 (2014).
Calderoni, Francesco, David Skillicorn, and Quan Zheng. "Inductive Discovery of Criminal Group Structure Using Spectral Embedding." Information & Security: An International Journal 31 (2014): 49-66.
Furter, Denise. The Influence of Legislation and Government Policy on Patterns of International Defence Trade and Future Markets: The Case of Offset and Directive 2009/81/EC In Doctoral thesis submitted to Brunel University United Kingdom ., 2014.
Sidoran, James. Information Assurance/Cyber Defence Research Framework In Technical Report. Paris: NATO Science and Technology Organization, 2014.
Information from the State Financial Monitoring Service., 2014.
GAO), United States Gov. Information Security Agencies Need to Improve Cyber Incident Response Practices., 2014.
Lebek, Benedict, Jörg Uffen, Markus Neumann, Bernd Hohler, and Michael Breitner. "Information Security Awareness and Behavior: A Theory-Based Literature Review." Management Research Review 37, no. 12 (2014).
Cheung, Simon K. S.. Information Security Management for Higher Education Institutions In Intelligent Data analysis and its Applications, Proceeding of the First Euro-China Conference on Intelligent Data Analysis and Applications. Vol. I. Shenzhen, China, 2014.
Wu, Ing-Long, Cheng-Hung Chuang, and Chien-Hua Hsu. "Information Sharing and Collaborative Behaviours in Enabling Supply Chain Performance: A Social Exchange Perspective." International Journal of Production Economics 148 (2014): 122-132.
Shalamanov, Velizar. Information technologies for good governance in defence, security, and the public sector: Experience and outlook In CSDM Views. Sofia: Centre for Security and Defence Management, 2014.
Hawramy, Fazel, Shalaw Mohammed, and Luke Harding. "Inside Islamic State’s Oil Empire: How Captured Oilfields Fuel Isis Insurgency." The Guardian (2014).
Goldman, Adam, and Julie Tate. "Inside the FBI’s Secret Relationship with the Military’s Special Operations." Washington Post (2014).
Gertz, Bill. "Inside the Ring: Cybercom’s Michael Rogers confirms Russia conducted cyber-attacks against Ukraine." The Washington Times (2014).
Instruction # 8121z 915 of 1 December 2014 on the conditions and procedures for performing operational protection during floods. State Gazette 101 (9 December 2014), 2014.
Takako, Sato. "Intaractive Multimadial Education System (IMES) for the interactive distance education [in Japanese] ." The journal of Sagami Women's University 78 (2014).
G Kumar, Saroj, Debasish Ghose, and A Vengadarajan. "An integrated estimation/guidance approach for seeker-less interceptors." Journal of Aerospace Engineering 229, no. 5 (2014): 891-905.
Tagarev, Todor. "Intelligence, Crime and Cybersecurity." Information & Security: An International Journal 31 (2014): 05-06.
Sibilla, Gustavo. "Intelligence for a safe city model." Information & Security: An International Journal 30, no. 2 (2014): 101-120.
Zeman, Petr. "Intelligence Services of the Czech Republic: Current Legal Status and Its Development." Information & Security: An International Journal 30, no. 2 (2014): 67-84.
Masete, Naledi Thabang, and Jacques Clarence Duvenhage. "(Inter) national standards on money laundering with regard to the FATF recommendation." International Journal of Public Law and Policy 4, no. 1 (2014).
Lewis, David. International Engagement and the Contested State in Contemporary Armenia In Working Paper., 2014.
Trochowska, Kamila. "International Experiences in the Operationalization of Culture for Military Operations—Field Research Results." Connections: The Quarterly Journal 13, no. 3 (2014): 83-103.
International Expert for Preparation of an Assessment Study for the Requirements for Preparation of a National Cyber Security Strategy. UNDP, 2014.
International Telecommunication Union. Statistics and Database., 2014.
Internet Usage Statistics for Africa In World Internet Statistics., 2014.

Pages