Biblio

Export 21393 results:
2014
Kovačević, Božo. "Američko javno-privatno partnerstvo i cyber sigurnost." Politička misao 51, no. 3 (2014): 76-100.
Amfilohije osudio politiku Crne Gore prema Rusiji [Amfilohije Condemned Montenegro’s Policy Towards Russia]. Blic, 2014.
Loretoni, Anna. Ampliare lo sguardo. Genere e teoria politica. Roma: Donzelli, 2014.
Ripley, Tim, and Bruce Jones. "Analysis: How Russia Annexed Crimea." IHS Jane’s Defense Weekly 51, no. 14 (2014): 5.
Gospodinova, Elitsa, Mario Angelov, and Taschko Nikolov. Analysis of a Security System for Distributed Data Transmission of Voice In MT&S-2013 Conference. Sofia: Defence Institute, 2014.
Calzarossa, M.C., and L. Massari. Analysis of header usage patterns of HTTP request messages In 16th IEEE Int. Conf. on High Performance Computing and Communications, 11th IEEE Int. Conf. on Embedded Software and Systems., 2014.
Kharchenko, Vyacheslav, and Yuriy P. Kondratenko. "Analysis of Peculiarities of Innovative Collaboration between Academic Institutions and IT Companies in Areas S2B and B2S." Technical News − in Ukrainian 39-40 (2014): 15-19.
Siddiqui, Abdul Hameed, Mansoor Ahsan, Shair Afgan Rind, and Attaullah Memon. "Analysis of varying control inputs for a fixed wing unmanned aerial vehicle." In 17th IEEE International Multi Topic Conference 2014 . Karachi, Pakistan, 2014.
Turgut, Erhan, Salih Ergün, and Abdülkadir Öz. "Analyzing and Determining the Ideal Response Force for Combatting Terrorist Groups." International Journal of Electronics and Communication Engineering 8, no. 3 (2014).
Darczewska, Jolanta. The Anatomy of Russian Information Warfare. The Crimean Operation, a Case Study In OSW Point of View series, Warsaw: Center for Eastern Studies. Vol. 42., 2014.
Angry Birds Web Page., 2014.
Annual National Plan 2014 for implementation of the National Programme for Disaster Protection 2014-2018., 2014.
Annual Report on the Implementation of the Swiss–Latvian Cooperation Programme in Latvia April 2013 – March 2014., 2014.
Ansar Beit al-Maqdis Pledges Allegiance to the Islamic State. SITE Intelligence, 2014.
Anti-corruption Policies Against State Capture. Sofia: Center for the Study of Democracy, 2014.
Li, Xingan. Application of Data Mining Methods in the Study of Crime Based on International Data Sources In School of Information Sciences. Vol. Academic dissertation. Tampere, Finland: University of Tampere, 2014.
Li, Xingan, and Martti Juhola. "Application of the self-organising map to visualisation of and exploration into historical development of criminal phenomena in the USA, 1960–2007 ." International Journal of Society Systems Science 6, no. 2 (2014).
Ivanova, Yoana. Applying Multimedia Technologies in The Information Systems of The Security and Defense Field In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2014.
Rist, L., A. Felton, and M. Nyström. "Applying Resilience Thinking to Production Ecosystems." Ecosphere 5, no. 6 (2014): 73.
AQAP and AQIM Release Joint Statement Condemning U.S.-led Alliance in Iraq and Syria, Urge Warring Factions to Unite. SITE Intelligence, 2014.
"Armenia Allowed in the Euroasian Union (Armeniiu vpustili v Evraziiskii soiuz)." Novaia gazeta (2014).
Russell, Stuart, and Peter Norvig. Artificial Intelligence: A Modern Approach. Third edition. Harlow, Essex, UK: Pearson Education, 2014.
Lister, Charles. "Assessing Syria’s Jihad." In Middle Eastern Security, the US Pivot and the Rise of ISIS, 73. New York: Routledge, 2014.
Jali, Mohd Zalisham, Shaharudin Ismail, and Zul Hilmi Abdullah. "An Assessment on the Password Practices Among Students." Journal of Theoretical and Applied Information Technology 66, no. 3 (2014).
Assessment Report. Criminal Justice Capacities on Cybercrime and Electronic Evidence in the Eastern Partnership Region. Council of Europe, 2014.

Pages