Biblio

Export 21404 results:
2012
Boyd, Danah, and Kate Crawford. "Critical questions for Big Data." Journal Information, Communication & Society 15, no. 5 (2012): 662-679.
Prezelj, Iztok, Erik Kopač, Uroš Svete, and Aleš Žiberna. "Cross-sectoral Scanning of Critical Infrastructures: From Functional Differences to Policy-relevant Similarities." Journal of Homeland Security and Emergency Management 9, no. 1 (2012).
Applebaum, Anne, and Iron Curtain. The Crushing of Eastern Europe 1944–1956. London: Allen Lane, 2012.
CS 161, Fall 2012 Computer Security., 2012.
CSTO to Work at Building Collective Air Defense System in CA. Kazinform, 2012.
Cultural Awareness Afghanistan Course. British Army ADL, 2012.
MITRE Corporation. Cyber Information-Sharing Models: An Overview., 2012.
Liu, Jing, Yang Xiao, Shuhui Li, Wei Liang, and CL Philip Chen. "Cyber Security and Privacy Issues in Smart Grids." IEEE Communications Surveys & Tutorials 14, no. 4 (2012): 981-997.
Kortjan, Noluxolo, and Rossouw von Solms. Cyber Security Education in Developing Countries: A South African Perspective In e-Infrastructure and e-Services for Developing Countries. AFRICOMM 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Vol. 119. Berlin, Heidelberg: Springer, 2012.
Sklyar, Vladimir. "Cyber Security of Safety-Critical Infrastructures: A Case Study for Nuclear Facilities." Information & Security: An International Journal 28, no. 1 (2012): 98-107.
9. Noyes, Daniel. "Cyber Security Testing and Training Programs for Industrial Control Systems." In The 18th Pacific Basin Nuclear Conference (PBNC 2012), BEXCO. Busan, Korea, 2012.
Ferran, Lee, and Rhonda Schwartz. "Cyber Spy Program Flame Compromises Key Microsoft Security System." ABC News (2012).
Minchev, Zlatogor. Cyber Threats in Social Networks and Users’ Response Dynamics In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2012.
Nunez, Mariano. "Cyber-attacks on ERP systems: An analysis of the current threat landscape." Datenschutz und Datensicherheit 36, no. 9 (2012): 653-656.
Warner, Michael. "Cybersecurity: A Pre-History." Intelligence and National Security 27, no. 5 (2012): 781-799.
Aitel, Dave. "The Cybersecurity Act of 2012: Are We Smarter Than a Fifth Grader?" Huff Post Tech (2012).
Petkov, Petko. Cybersecurity: Emerging Characteristics and Impact on Defence In It4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2012.
Cybersecurity Policy Making at a Turning Point – Analysing a New Generation of National Cybersecurity Strategies for the Internet Economy. OECD, 2012.
OECD. Cybersecurity policy making at a turning point, Analysing a new generation of national cybersecurity strategies for the Internet economy., 2012.
Cavelty, Myriam Dunn. "Cyber(Un)Sicherheit: Grundlagen, Trends und Herausforderungen." Polit Bild (2012).
Ventre, Daniel. Cyberwar and Information Warfare . John Wiley & Sons, 2012.
"Cyberwar. War in the fifth domain." The Economist (2012).
da Graça, Pedro Miguel Dua. Da guerra à Paz, o contributo dos Corpos Militares com Funções de Polícia - A GNR no Iraque. Vol. Dissertação de Mestrado em Relações Internacionais. Universidade Autónoma de Lisboa, 2012.
Dzutsev, Valery. "Dagestan’s President Promises a Decisive Crackdown on the Insurgency." Eurasia Daily Monitor 9, no. 70 (2012).
Lukyanov, Fedor. A dangerous wind in the sails. Vol. 27 March 2012. Moscow News, 2012.

Pages