Biblio

Export 21393 results:
2013
López, David, and Oscar Pastor. "Comprehensive Approach to Security Risk Management in Critical Infrastructures and Supply Chains." Information & Security: An International Journal 29, no. 1 (2013): 69-76.
The Comprehensive study on cybercrime 2013. United Nations Office of drugs and crimes, 2013.
Ivanova, Yoana, and Stefka Nenova. Computer graphics as a means of improving the quality of military education. Sofia: Publishing House of Military Academy, 2013.
Computer Science Curricula 2013. ACM, 2013.
Concept of the Foreign Policy of the Russian Federation. Ministry of Foreign Affairs of the Russian Federation, 2013.
Concepts on Ethics In FP7., 2013.
Gubanov, Dmitry, and Aleksandr Chkhartishvili. "Conceptual approach to the analysis of online social networks." Management of large systems 45 (2013): 222-236.
Feyyaz, Muhammad. "Conceptualizing Terrorism Trend Patterns in Pakistan – an Empirical Perspective." Perspectives on Terrorism 7, no. 1 (2013): 96.
Huang, Li-Chin, and Min-Shiang Hwang. "A Conference Key Distribution Scheme in Tree Hierarchies." International Journal of Network Security 15, no. 1 (2013): 59{64.
Taylor, Mark B.. Conflict Financing: What’s Wrong with War Economies?. The Norwegian Peacebuilding Resource Centre (NOREF), 2013.
Wilson, Kelce S.. "Conflicts among the Pillars of Information Assurance." IT Professional 15, no. 4 (2013): 44-49.
Cohen, Odeya. "The Conjoint Community Resiliency Assessment Measure as a Baseline for Profiling and Predicting Community Resilience for Emergencies." Technological Forecasting and Social Change 80, no. 9 (2013): 1732-1741.
Bayramov, Vugar. "Considering Accession to the Eurasia Economic Union: For Azerbaijan, Disadvantages Overweight Advantages." In Caucasus Analytical Digest, 14. Vol. 51–52., 2013.
Constitution of Slovenia. Official Gazette of the Republic of Slovenia Nos. 33/91-I, 42/97, 66/2000, 24/03, 69/04, 68/06, and 47/13, 2013.
Constitutional arrangements for the use of armed force of UK. UK Parliament, 2013.
Marazopoulos, Christos. Constructing the Western Balkans: Understanding the European Commission's Regional Approach from a Constructivist Perspective In Department of Politics, Languages and International Studies. Vol. Doctor of Philosophy. University of Bath, 2013.
Smirnov, Alexander, Alexey Kashevnik, Nikolay Shilov, and Nikolay Teslya. "Context-based access control model for smart space ." In 2013 5th International Conference on Cyber Conflict (CYCON 2013) . Tallinn, Estonia: IEEE , 2013.
Mabaso, Elias, and Siambabala B. Manyena. "Contingency planning in southern Africa: Events rather than processes?" Journal of Disaster Risk Studies 5, no. 1 (2013): article 95.
Merche, Jean-Dominique. Contre-terrorisme: le GIGN est en avance dans la guerre du temps. L’Opinion, 2013.
Denning, Tamara, Adam Lerner, Adam Shostack, and Tadayoshi Kohno. Control-Alt-Hack: The Design and Evaluation of a Card Game for Computer Security Awareness and Education. CCS'13, 2013.
Blease, Dennis, and Florian Qehaja. "The conundrum of local ownership in developing a security sector: the case of Kosovo." New Balkan Politics 14 (2013).
Convention on Cybercrime, Chart of Signatures and Ratifications. Council of Europe, 2013.
Osipian, Ararat L.. Corruption In Higher Education In Leadership and Policy Studies. Vol. Doctor Of Philosophy. Nashville, Tennessee: Vanderbilt University, 2013.
Seay, Edmond E.. Countdown to Chaos? Timelines and Implications of Procurement Decisions for NATO’s Dual-Capable Aircraft. Hamburg: British American Security Information Council (BASIC), 2013.
Foley, Frank. Countering Terrorism in Britain and France: Institutions, Norms and the Shadow of the Past. Kindle Edition. Cambridge: Cambridge University Press, 2013.

Pages