Biblio

Export 21404 results:
2015
Defense expenditures data for 2014 and estimates for 2015: financial and economic data relating to NATO defense In press release., 2015.
Spear, A.D., and B. Smith. " Defining ‘Function’. ." In Third International Workshop on Definitions in Ontologies IWOOD 2015. Lisbon, Portugal, 2015.
von Lampe, Klaus. Definitions of Organized Crime In collected by Oyster Bay Conferences., 2015.
Dell Secureworks Counter Threat Unit Threat Intelligence In Threat Analysis report. TeslaCrypt Ransomware, 2015.
Buckland, Benjamin S., Fred Schreier, and Theodor H. Winkler. Democratic Governance Challenges of Cyber Security In DCAF Horizon 2015 Working Paper., 2015.
Richards, Jason. "Denial-of-Service: The Estonian Cyberwar and Its Implications for U.S. National Security." International Affairs Review (2015).
García, Fernando Thauby. "Desarrollo de fuerzas basado en capacidades estratégicas ¿Evolución, revolución o más de lo mismo?" Revista Ensayos Militares 1, no. 14 (2015): 179-195.
Fisas, Vinceç. The Design and Architecture of Peace Processes: Lessons Learned in the Wake of Crises. Oslo: Norwegian Peacebuilding Resource Centre, 2015.
Santhi, S, and GS Sadasivam. "Design and development of compact monitoring system for disaster remote health centres." Indian J Med Microbiol [serial online] (2015): 33.
Deepa, R. Design of a clustering protocol and a Trust model for service discovery in Mobile ad hoc networks., 2015.
Designations of Foreign Terrorist Fighters In Press Release| Media Note, U.S. Department of State. Bureau of Public Affairs Department of State. The Office of Website Management, 2015.
Erickson, Anthony, Ben Shaw, Jane Murray, and Sara Branch. "Destructive Leadership: Causes, consequences and countermeasures." Organizational Dynamics 44 (2015): 266-72.
Navozenko, D.. Development of a program complex of password protection by the principle “inquiry answer”. Vol. MR Thesis [manuscript] - in Russian. Dnipropetrovsk, 2015.
Directorate for Science, Technology and Industry. The Development of Fixed Broadband Networks In OECD Digital Economy Papers ., 2015.
Shaporin, Volodymyr, and Olha Plachinda. "Development of Information Security Threat Models to Assess Harm for Assets." Technology audit and production reserves 4, no. 2(24) (2015): 10-15.
Shushpan, V.. Development of the Remote Laboratory Work on the Course “Applied cryptology”. Vol. MR Thesis [manuscript]– in Russian. Dnipropetrovsk, 2015.
Wedeck, Harry E., and Wade Baskin. Dictionary of Pagan Religions. New York: Philosophical Library, 2015.
Werrell, Caitlin E., Francesco Femia, and Troy Sternber. "Did We See It Coming? State Fragility, Climate Vulnerability, and the Uprisings in Syria and Egypt." SAIS Review of International Affairs 35, no. 1 (2015): 29-46, p. 33.
Cavelty, Myriam Dunn. "Die materiellen Ursachen des Cyberkriegs Cybersicherheitspolitik jenseits diskursiver Erklär ungen ." Journal of self-regulation and regulation 01 (2015).
Cavelty, Myriam Dunn. "Die materiellen Ursachen des Cyberkriegs Cybersicherheitspolitik jenseits diskursiver Erklärungen." Journal of self-regulation and regulation 01 (2015).
Commission, European. Digital Agenda for Europe, A Europe 2020 Initiative., 2015.
Committee on Payments and Market Infrastructures. Digital currencies. Bank for International Settlements, 2015.
Diplo Foundation., 2015.
Sending, Ole Jacob, Vincent Pouliot, and Iver B. Neumann. Diplomacy and the making of world politics. Cambridge University Press, 2015.
Commission, European. The Directive on security of network and information systems (NIS Directive) In Digital Agenda for Europe, A Europe 2020 Initiative, Network and Information Security., 2015.

Pages