Biblio

Export 21404 results:
2014
Hadnagy, Christopher. Unmasking the Social Engineering. The Human Element of Security. John Wiley & Sons, Inc., 2014.
Røberg, Pernille Monstad, Leif Skiftenes Flak, and Per Myrseth. "Unveiling Barriers and Enablers of Risk Management in Interoperability Efforts." In 47th Hawaii International Conference on System Sciences. Waikoloa, HI, USA : IEEE, 2014.
Update on the National Cyber Security Programme In Session 2014-15. UK Cabinet Office, 2014.
Lysychenko, Georgii V., Yuri Melnik, Oleksandr Lysenko, Tamara Dudar, and N. Nikitina. Uranium Ores of Ukraine: Geology, Production, and RAW management (in Ukrainian). Kiev: Naukova Dumka, 2014.
"US and EU hinder Russian actions in preventing global threats." FOCUS News Agency (2014).
Harvey, Patrick L.. U.S. Counterinsurgency: Spoilers of Instability. Carlisle Barracks, Pennsylvania: United States Army, U.S. Army War College, 2014.
Ratner, Michael, and Carol Glover. U.S. Energy: Overview and Key Statistics In Congressional Research Service., 2014.
U.S. Government Gain-of-Function Deliberative Process and Research Funding Pause on Selected Gain-of-Function Research Involving Influenza, MERS, and SARS Viruses., 2014.
US Government Policy for Institutional Oversight of Life Sciences Dual Use Research of Concern., 2014.
Lawson, Sean. "The US military's social media civil war: technology as antagonism in discourses of information-age conflict." Cambridge Review of International Affair 27, no. 2 (2014).
Lawson, S.. "The US military's social media civil war: technology as antagonism in discourses of information-age conflict." Cambridge Review of International Affairs 27, no. 2 (2014): 226-245.
Schmidt, Eric. "US Strategy to Fight Terrorism Increasingly Uses Proxies." New York Times (2014).
Garnaut, John. "US Unsettled by China’s Three Warfares Strategy: Pentagon Report." The Sydney Morning Herald (2014).
Almendra, Vinicius, and Denis Enachescu. "Using Self-Organizing Maps for Binary Classification With Highly Imbalanced Datasets." International Journal of Numerical Analysis and Modeling, Series B 5, no. 3 (2014): 238-254.
Kislov, Daniil. Uzbekistan: Karimov’s Power Unshatterable. Ferghana Information Agency, 2014.
Malashenko, Alexey. Uzbekistan: No Transition yet Visible. Moscow: The Carnegie Moscow Center, 2014.
Azizov, D.. Uzbekistan Presents Army Development Strategy. Trend, 2014.
Sakurai, Yoshiki. "The Value Improvement in Education Service by Grasping the Value Acceptance State with ICT Utilized Education Environment." In Human Interface and the Management of Information. Information and Knowledge in Applications and Services. HIMI 2014. Lecture Notes in Computer Science. Vol. 8522. Cham: Springer, 2014.
Sommestad, Teodor, Jonas Hallberg, Kristoffer Lundholm, and Johan Bengtsson. "Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies." Information Management and Computer Security 22, no. 1 (2014): 42-75.
Violence Against Women: Intimate Partner and Sexual Violence Against Women. World Health Organization, 2014.
Schmid, Alex P.. Violent and Non-Violent Extremism: Two Sides of the Same Coin?. The Hague: International Centre for Counter-Terrorism, 2014.
Vision 2020: Bulgaria in NATO and the European Defence . Sofia: Ministry of Defence, 2014.
Zhou, Dingfu. Vision-based moving pedestrian recognition from imprecise and uncertain data. Université de Technologie de Compiègne, 2014.
Camacho, José. "Visualizing Big Data with Compressed Score Plots: Approach and Research Challenges." Chemometrics and Intelligent Laboratory Systems 135 (2014): 110-125.
Lyamets, Sergey. Vladimir Dubrovksy: the Top-Down Power Structure Must Be Destroyed. Ekonomichna Pravda [Economic Truth], 2014.

Pages