Biblio

Export 21387 results:
2010
Srikrishna, Devabhaktuni. "Cyberwarfare: Surviving an Attack." Public Interest Report 63, no. 3 (2010).
Ware, Robert Bruce, and Enver Kisriev. Dagestan: Russian Hegemony and Islamic Resistance in the North Caucasus. Armonk, NY: M.E. Sharpe, 2010.
Kim, Cheonshik. Data Hiding Based on Compressed Dithering Images In Advances in Intelligent Information and Database Systems. Studies in Computational Intelligence. Vol. 283. Berlin, Heidelberg: Springer, 2010.
Kuner, Christopher. "Data Protection Law and International Jurisdiction on the Internet." International Journal of Law and Information Technology 19, no. 3 (2010): 227, 239.
Sato, Mitsuhisa, Takayuki Banzai, Hitoshi Koizumi, Ryo Kanbayashi, Takayuki Imada, and Toshihiro Hanawa. D-Cloud: Design of a Software Testing Environment for Reliable Distributed Systems Using Cloud Computing Technology In 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing (CCGRID'10). Melbourne, Australia, 2010.
DDR in Peace Operations: A Retrospective. New York: United Nations, 2010.
Declaration on the formation of a single economic space., 2010.
"Decreto del Presidente del Consiglio dei Ministri 5 maggio 2010 (D.C.P.M. 5 maggio 2010) “Organizzazione nazionale per la gestione di crisi”." Gazzetta ufficiale – Official Gazette/Journal of the Italian Republic 139 (2010).
Tagarev, Todor. "Defence Budgeting and Financial Management." In Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices, 63-79. Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2010.
Eldridge, Alice, Dominique Lamoureux, and Todor Tagarev. "The Defence Industry as an Ally in Reducing Corruption." In Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices, 266-276. Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2010.
Bucur-Marcu, Hari. Defence Institution Building – A Self-Assessment Kit. Geneva: : DCAF, 2010.
Tagarev, Todor. "Defence Procurement." In Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices, 80-95. Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2010.
J, William, and I Lynn. "Defending A New Domain: The Pentagon’s Cyberstrategy." Foreign Affairs (2010).
Lynn, William J.. "Defending a New Domain: The Pentagon’s Cyberstrategy." Foreign Affairs (2010).
Lynn, William. "Defending a new Domain: The Pentagon’s Cyberstrategy." Foreign Affairs (2010).
Defending Against Cyber Attacks. NATO, 2010.
Defense Against Terrorist Program. NATO, 2010.
Sticz, Laszlo. "The Defense Planning Systems and Their Implications." Journal of Defense Resources Management 1, no. 1 (2010).
Defense Report 2009. Sofia, 2010.
Ganor, Boaz. Defining Terrorism – Is One Man’s Terrorist Another Man’s Freedom Fighter?. Herzliya: International Institute for Counter-Terrorism, 2010.
Fazlagic, Samir. "Delegating signing capability in workflow systems ." In 2nd International Conference on Computer Engineering and Technology. Chengdu, China , 2010.
Tagarev, Todor. Democratic Legitimacy of Security Sector Governance in Crisis Situations In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2010.
Mema, Adriatik. Democratization in Albania : the OSCE, NATO and the European Union. Monterey, California: Naval Postgraduate School, 2010.
Padmadas, M., Krishnan Nallaperumal, V. Mualidharan, and P. Ravikumar. A deployable architecture of Intelligent Transportation System — A developing country perspective In IEEE International Conference on Computational Intelligence and Computing Research. Coimbatore, India : IEEE , 2010.
Hevner, Alan, and Samir Chatterjee. Design research in information systems: theory and practice. New York: Springer Science and Business Media, 2010.

Pages