Biblio

Export 21404 results:
0
Europol Activities (Agreements). EUROPOL.
Doo-Ywan, Kim, and Kim Tae-Ywan. "Evaluation of Classified Information on Web Agent Using Fuzzy Theory ." International Journal of Fuzzy Logic and Intelligent Systems 5, no. 3: 216-221.
Every resident […] who feels that his constitutional rights have been violated by an Administrative Body is entitled to call upon the protection of the Bavarian Constitutional Court.
Kille, Kent J., and Ryan C. Hendrickson. "Explaining International Organizations NATO and the United Nations: Debates and Trends in Institutional Coordination." Journal-iostudies, Researchgate.net.
Georgia’s Foreign Trade in 2013. Civil Georgia.
Jagić, Stjepan, and Marko Vučetić. "Globalization Processes and Culture." Acta Iadertina 9, no. 1: 15-24, quote on p. 20.
Huda, Solichul, Tohari Ahmad, Riyanarto Sarno, and Heru Agus Santoso. "Identification of process-based fraud patterns in credit application." In 2nd International Conference on Information and Communication Technology (ICoICT).
Chertoff, Michael, and Tobby Simon. The Impact of the Dark Web on Internet Governance and Cyber Security In GCIG Paper Series no. 6. Global Commission on Internet Governance and Chatham House.
Zayed, Khaled. "Information security awareness: managing web, mobile and endpoint security; overcoming the challenges of bring your own device." Int. J. Teaching and Case Studies 7, no. 3/4.
Bradley, M., and P. Lang. The International Affective Digitized Sounds: Affective Ratings of Sounds and Instruction Manual In IADS-2. NIMH Center for the Study of Emotion and Attention.
International CEP Handbook 2009 - Civil Emergency Planning in the NATO/EAPC Countries. Swedish Civil Contingencies Agency (MSB).
Abazi, Enika, and Albert Doja. "International Representations of Balkan Wars: A Socio-Anthropological Approach in International Relations Perspective,." Cambridge Review of International Affairs 29, no. 2.
Neumann, Peter R.. "Kapitel 13 Innere Sicherheit in Großbritannien. Die Reaktionen auf den Juni 2007." Jahrbuch Terrorismus 2.
Aliyev, Kenan. “Karimov Maintains Low Prole During U.S. Visit. Eurasianet.
Andriuškevičius, Arūnas. Kauno diena.
Tindemans, Leo. L’Union Européenne. Rapport de M.Leo Tindemans au Conseil Européen In Bulletin des Communautés Européennes, Supplément. Commission des Communautés Européennes.
Weick, Karl E., and Kathleen M. Sutcliffe. Managing the Unexpected, Resilient Performance in an Age of Uncertainty. Princeton: Princeton University Press.
Manifesto of the Pan-Russian National Front.
Velev, Grigor, and Maya Bozhilova. Model Cluster Routing Algorithm for Mobile Self-Organizing Defense and Security Networks In Scientific Conference with International Participation "The 21st Century Knowledge Society and Humanism," Sofia, (UniBIT, BAS).
Jolicoeur, Pierre, and Frederic Labarre. "NATO’s engagement in the South Caucasus: Looking for Energy Security or Expanding Norms and Values?" In Reassessing Security in the South Caucasus: Regional Conflicts and Transformation , 163-167. Farnham: Ashgate.
Thoß, Bruno. NATO-Strategie und nationale Verteidigungsplanung: Planung und Auf¬bau der Bundeswehr unter den Bedingungen einer massiven atomaren Vergel¬tungs¬strategie 1952 bis 1960 . München: München: Oldenbourg Verlag.
"Nuklearstrategie – Zwischen Abschreckung und Einsatzdoktrin." Bundeszentrale für politische Bildung.
Dai, You, Jin Yan, Xiaoxin Tang, Han Zhao, and Minyi Guo. "Online Credit Card Fraud Detection: A Hybrid Framework with Big Data Technologies." In IEEE Trustcom/BigDataSE/ISPA. Tianjin, China .
Ordinance of the Council of Ministers of 15 December 2009 .
S., Gaw, and Felten E.W.. Password Management Strategies For Online Accounts. USA: Symposium on Usable Privacy and Security (SOUPS) 2006.

Pages