Biblio

Export 21393 results:
2012
Nikooghadam, Morteza, and Ali Zakerolhosseini. "Secure Communication of Medical Information Using Mobile Agents." Journal of Medical Systems 36, no. 6 (2012): 3839-3850.
Karokola, Geoffrey, Louise Yngström, and Stewart Kowalski. "Secure e-Government Services: A Comparative Analysis of e-Government Maturity Models for the Developing Regions–The Need for Security Services." International Journal of Electronic Government Research (IJEGR) 8, no. 1 (2012).
SecureDoc™ for Lenovo. WinMagic Data Security, 2012.
Li, Xu, Xiaohui Liang, Rongxing Lu, Xuemin Shen, Xiaodong Lin, and Haojin Zhu. "Securing Smart Grid: Cyber Attacks, Countermeasures, and Challenges." IEEE Communications Magazine 50, no. 8 (2012): 38-45.
Barnard-Wills, David, and Debi Ashenden. "Securing Virtual Space: Cyber War, Cyber Terror, and Risk." Space and Culture XX, no. X (2012): 1-14.
Peyrouse, Sébastien, Jos Boonstra, and Marlène Laruelle. Security and Development Approaches to Central Asia. The EU Compared to China and Russia In Working Paper 11. EUCAM, 2012.
Security Annual Report. Cisco, 2012.
Alipiev, Ilian. Security challenges and functions of the intelligence community In CSDM Views. Sofia: Centre for Security and defence Management, 2012.
Milina, Velichka. "Security in a Communications Society: Opportunities and Challenges." Connections: The Quarterly Journal 11, no. 2 (2012): 53-66.
Security, Kazakhstan. London: IHS Global Limited, 2012.
Hadi, Raghad Mohammed. "Security protocol for a remote user authentication system over unsecure network." Science articles exchange (مقالات العلوم الصرف) 18, no. 76 (2012).
Security risk: Sensitive data can be harvested from a PC even if it is in standby mode, experts say. ScienceDaily.com, 2012.
Security Sector Reform Integrated Technical Guidance Notes. New York: UN SSR Task Force, 2012.
Security threat report 2013. Sophos, 2012.
Alpern, Robert, Michael Caplan, and Orson Moe. Seldin and Giebisch's The Kidney: Physiology and Pathophysiology. 5th ed. London: Academic Press, 2012.
"Serbia: A double-dip recession in the Western Balkans." The Economist Intelligence Unit (2012).
Tagarev, Todor, and Velichka Milina. "Shaping Energy Security Policy in Uncertainty." In International conference "Energy Security - National, Regional and Euroatlantic Frameworks". Sofia, 2012.
Gawliczek, Piotr. "Showing the Way: Contributions from NATO’s Newest Members." Connections: The Quarterly Journal 11, no. 4 (2012): 75-82.
Cohen, Gili. Sinai Peacekeeping Force Commander Warns of Weapons Smuggling to Gaza. Haaretz, 2012.
The situation in the Syrian Arab Republic In Resolution adopted by the General Assembly., 2012.
Six-Point Proposal of the Joint Special Envoy of the United Nations and the League of Arab States In Annex to S/RES/2042 (2012)., 2012.
Daskalov, Nikola. Slavnoto vreme. Sofia: Ciela, 2012.
Small Arms Survey 2012. Geneva: Graduate Institute of International and Development Studies, 2012.
Federal Communications Commision. Small Biz Cyber Planner 2.0., 2012.
Gaurav, Jayesh, Sanjive Tyagi, and Jayanthi Ranjan. "Smart Card Fraud Prevention Scheme Using Fingerprinting Authentication." International Journal of Computer Science and Information Technologies 3, no. 1 (2012): 3059-3062.

Pages