Biblio

Export 21393 results:
2013
Rhodes-Ousley, M.. Information Security the Complete Reference. 2nd ed., 2013.
ISO/IEC. Information technology – Security techniques – Information security management systems – Requirement., 2013.
Saetta, S., L. Tiacci, and L. Cagnazzo. "The Innovative Model of the Virtual Development Office for Collaborative Networked Enterprises: The GPT Network Case Study." International Journal of Computer Integrated Manufacturing 26, no. (1-2) (2013): 41-54.
Pwanagba, Agabus. "Insecurity: Nigerian Army to Court Martial 17 Soldiers Who Erred in Peace Operations." DailyPost (2013).
Hopkins, Nick, and Julian Borger. "Inside GCHQ: how US pays Britain’s spy agency £100m for a very special relationship." Guardian (2013): 1-2.
"Inside the Files: when did we give our consent to a secret state?" Guardian (2013): 37.
Mladen, Bajagić. "Institucionalizacija Saradnje u Bezbednosti u Evropskoj Uniji." Bezbednost, Beograd 55, no. 3 (2013): 21-35.
Starov, Oleksii, and Sergiy Vilkomir. "Integrated TaaS platform for mobile development: Architecture solutions." In 8th International Workshop on Automation of Software Test (AST). San Francisco, CA, USA , 2013.
Ibrahim, Aisha Fofana. The Integration of a Gender Perspective in the Sierra Leone Police . Geneva: DCAF, 2013.
Polyakov, Leonid. "On Integrity of Intelligence in Countries of Eastern Europe." Information & Security: An International Journal 30, no. 1 (2013): 55-63.
Intelligence assessment. Wikipedia, 2013.
Kenney, Michael C.. "Intelligence Games: Comparing the Intelligence Capabilities of Law Enforcement Agencies and Drug Trafficking Enterprises." International Journal of Intelligence and CounterIntelligence (2013): 213.
Byman, Daniel. "The Intelligence War on Terrorism." Intelligence and National Security 29, no. 6 (2013): 847.
Murugan, Sethu, and Dr.K.Kuppusamy. "Intelligent Intrusion Detection Prevention Systems." Information & Security: An International Journal 26, no. 2 (2013): 109-119.
"Intelligent Oversight." Guardian (2013): 13.
Busuncian, Tatiana. "International Intelligence Cooperation against Terrorist Targets – Phase II." In The Dangerous Landscape, 133-151., 2013.
International Law of Cyber Operations. NATO Cooperative Cyber Defense Centre of Excellence Web Site, 2013.
Schmid, Alex P.. "International Terrorism and International Tourism." In The Dangerous Landscape, 211-219., 2013.
Meltzer, Joshua P.. "The Internet, Cross-Border Data Flows and International Trade." SSRN Electronic Journal (2013).
Antoliš, Krunoslav. "Internet Forensics and Combating Terrorism." In The Dangerous Landscape, 37-45., 2013.
The Internet Of Everything – Global Private Sector Economic Analysis. Cisco, 2013.
Tagawa, Yoshihiro. "Internet Riyou ni okeru Tsushin no Himitsu [Secrecy of communication in the Use of the Internet]." Science of Information Security 5, no. 1 (2013): 33.
Soyer, Hubert. "Internet Science Risk, Risk Perception, and Cyberwar." Network Architectures and Services (2013).
Interview of State Secretary-Deputy Minister of Foreign Affairs of Russia G.B. Karasin in Rossijskaya gazeta, 269-13-02-2013. Vol. 13 February 2013. Official website of the Russian Ministry of Foreign Affairs, 2013.
Interview with Georgian Defense Minister Irakli Alasania., 2013.

Pages