Biblio

Export 21393 results:
2012
Glazev, S. Y.. Contemporary Theory of Wave Length in the Economic Eevelopment., 2012.
Gunes, Cengiz. "Contesting Democracy and Pluralism: the Pro-Kurdish Political Parties in Turkey." In The Kurdish National Movement in Turkey: From Protest to Resistance, 154. New York: Routledge, 2012.
Ratchev, Valeri, Uwe Nerlich, and Todor Tagarev. Context Scenarios and Alternative Future EU Roles as a Global Security Actor In It4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2012.
Alipiev, Ilian. The control function in the draft laws on national security management, the intelligence, the military intelligence, and the national service for protection In CSDM Views. Sofia: Centre for Security and defence Management, 2012.
Anderson, David. Control Orders in 2011: Final Report of The Independent Reviewer on The Prevention of Terrorism Act 2005. London: The Stationery Office, 2012.
Fazlagic, Samir, Narcis Behlilovic, and Sasa Mrdovic. "Controlled Delegation of Signature in Workflow Systems." In 20th Telecommunications Forum (TELFOR). Belgrade, Serbia , 2012.
Cui, Shuguang, Zhu Han, Soummya Kar, Tung T. Kim, Vincent H. Poor, and Ali Tajer. "Coordinated Data-injection Attack and Detection in the Smart Grid: A Detailed Look at Enriching Detection Solutions." IEEE Signal Processing Magazine 29, no. 5 (2012): 106-115.
Brattberg, Erik. "Coordinating for Contingencies: Taking Stock of Post-9-11 Homeland Security Reforms." Journal of Contingencies and Crisis Management 20, no. 2 (2012): 86.
Counternarcotics Assistance: U.S. Agencies Have Allotted Billions in Andean Countries, but DOD Should Improve Its Reporting of Results. Washington, D.C.: GAO, 2012.
Hillebrand, Claudia. Counter-terrorism networks in the European Union: maintaining democratic legitimacy after 9/11., 2012.
Coverage of President Jonathan’s full speech on the occasion of the 2012 Armed Forces Remembrance Day., 2012.
The Criminal Procedural Law of Republic of Srpska. Official Gazette of Republic of Srpska, 53/12, 2012.
Dworzecki, Jacek. "Crisis Management System in Poland." The Science for Population Protection 4, no. 2 (2012).
Georgiev, Venelin. Critical Infrastructure and Supply Chain Protection: EU possible development paths and strategies In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2012.
Boyd, Danah, and Kate Crawford. "Critical questions for Big Data." Journal Information, Communication & Society 15, no. 5 (2012): 662-679.
Prezelj, Iztok, Erik Kopač, Uroš Svete, and Aleš Žiberna. "Cross-sectoral Scanning of Critical Infrastructures: From Functional Differences to Policy-relevant Similarities." Journal of Homeland Security and Emergency Management 9, no. 1 (2012).
Applebaum, Anne, and Iron Curtain. The Crushing of Eastern Europe 1944–1956. London: Allen Lane, 2012.
CS 161, Fall 2012 Computer Security., 2012.
CSTO to Work at Building Collective Air Defense System in CA. Kazinform, 2012.
Cultural Awareness Afghanistan Course. British Army ADL, 2012.
MITRE Corporation. Cyber Information-Sharing Models: An Overview., 2012.
Liu, Jing, Yang Xiao, Shuhui Li, Wei Liang, and CL Philip Chen. "Cyber Security and Privacy Issues in Smart Grids." IEEE Communications Surveys & Tutorials 14, no. 4 (2012): 981-997.
Kortjan, Noluxolo, and Rossouw von Solms. Cyber Security Education in Developing Countries: A South African Perspective In e-Infrastructure and e-Services for Developing Countries. AFRICOMM 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Vol. 119. Berlin, Heidelberg: Springer, 2012.
Sklyar, Vladimir. "Cyber Security of Safety-Critical Infrastructures: A Case Study for Nuclear Facilities." Information & Security: An International Journal 28, no. 1 (2012): 98-107.
9. Noyes, Daniel. "Cyber Security Testing and Training Programs for Industrial Control Systems." In The 18th Pacific Basin Nuclear Conference (PBNC 2012), BEXCO. Busan, Korea, 2012.

Pages