Biblio

Export 21404 results:
2012
Russian MID does not rule out insurgent victory in Syria. Vol. 13 December 2012. RT.com, 2012.
Braun, Thomas. "The Russian Military in 2020: Russia’s Way Back to Power Projection? Implications for NATO." Connections: The Quarterly Journal 11, no. 2 (2012): 67-78.
Russian Minister of Foreign Affairs S.V. Lavrov answers questions from media, Moscow, 1461-29-07-2012. Vol. 28 July 2012. Official website of the Russian Ministry of Foreign Affairs, 2012.
Kegö, Walter, Alexandru Molcean, Christina Wenngren, Liis Lill, Aurelijus Gutauskas, Greg Nizhnikau, Vladimir Ovchinsky, Alexander Sukharenko, and Andrejs Vilks. Russian Organized Crime: Recent Trends in the Baltic Sea Region. Washington, D.C.: Institute for Security and Development Policy, 2012.
Greene, James. Russian Responses to NATO and EU Enlargement and Outreach In Chatham House Briefing Paper., 2012.
Danilova, E.N.. Russians and Chinese in an Era of Change: A Comparative Study in St. Petersburg and Shanghai at the Beginning of the XXI Century. Мoscow: Logos, 2012.
Moshes, Arkady. "Russia's European policy under Medvedev: how sustainable is a new compromise?" International Affairs (Royal Institute of International Affairs 1944-) 88, no. 1 (2012): 17-30.
Herd, Graeme. "Russia's European Security Treaty and the Kyrgyz Crisis." In Russia and its Near Neighbours, 129-150. Palgrave Macmillan, 2012.
Stavridis, James C., and Elton C. Parker. "Sailing the Cyber Sea." Joint Forces Quarterly 65 (2012): 62.
Placek, Kevin. "The San Francisco System: Declining Relevance or Renewed Importance?" Quarterly Access 4, no. 1 (2012): 15-20.
Balzarotti, D. Second Report on Threats on the Future Internet and Research Roadmap, SySSec Consortia., 2012.
Nikooghadam, Morteza, and Ali Zakerolhosseini. "Secure Communication of Medical Information Using Mobile Agents." Journal of Medical Systems 36, no. 6 (2012): 3839-3850.
Karokola, Geoffrey, Louise Yngström, and Stewart Kowalski. "Secure e-Government Services: A Comparative Analysis of e-Government Maturity Models for the Developing Regions–The Need for Security Services." International Journal of Electronic Government Research (IJEGR) 8, no. 1 (2012).
SecureDoc™ for Lenovo. WinMagic Data Security, 2012.
Li, Xu, Xiaohui Liang, Rongxing Lu, Xuemin Shen, Xiaodong Lin, and Haojin Zhu. "Securing Smart Grid: Cyber Attacks, Countermeasures, and Challenges." IEEE Communications Magazine 50, no. 8 (2012): 38-45.
Barnard-Wills, David, and Debi Ashenden. "Securing Virtual Space: Cyber War, Cyber Terror, and Risk." Space and Culture XX, no. X (2012): 1-14.
Peyrouse, Sébastien, Jos Boonstra, and Marlène Laruelle. Security and Development Approaches to Central Asia. The EU Compared to China and Russia In Working Paper 11. EUCAM, 2012.
Security Annual Report. Cisco, 2012.
Alipiev, Ilian. Security challenges and functions of the intelligence community In CSDM Views. Sofia: Centre for Security and defence Management, 2012.
Milina, Velichka. "Security in a Communications Society: Opportunities and Challenges." Connections: The Quarterly Journal 11, no. 2 (2012): 53-66.
Security, Kazakhstan. London: IHS Global Limited, 2012.
Hadi, Raghad Mohammed. "Security protocol for a remote user authentication system over unsecure network." Science articles exchange (مقالات العلوم الصرف) 18, no. 76 (2012).
Security risk: Sensitive data can be harvested from a PC even if it is in standby mode, experts say. ScienceDaily.com, 2012.
Security Sector Reform Integrated Technical Guidance Notes. New York: UN SSR Task Force, 2012.
Security threat report 2013. Sophos, 2012.

Pages