Biblio

Export 21423 results:
2013
Jones, Adam. "Syrian Electronic Army Turns on Assad Regime(link is external)." Seczine: Security Magazine (2013).
Ioannidis, S., M. Stamatogiannakis, and Th. Petsas. SysSec Deliverable D7.3(link is external) In Advanced Report on Cyberattacks on Lightweight Devices., 2013.
Mortati, M.. Systemic Aspects of Innovation and Design: The Perspective of Collaborative Networks. Cham, Switzerland: Springer, 2013.
Schmitt, Michael N.. Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge: Cambridge University Press, 2013.
Schmitt, Michael N.. Tallinn Manual on the International Law Applicable to Cyber Warfare (link is external). New York: Cambridge University Press, 2013.
Weigel, David. "Tamerlan Tsarnaev, Dead Bombing Suspect: ‘I Don’t Have a Single American Friend’(link is external)." Slate (2013).
Andersson, Hilary. Tamerlan Tsarnaev Had Right-Wing Extremist Literature(link is external). BBC News, 2013.
Kashevarova, Anastasiya, and Yuliya Tsoy. "Tamerlan Tsarnaev Was Recruited by a Georgian Fund(link is external)." Izvestia (2013).
Masters, Jonathan. Targeted Killings(link is external) In Council on Foreign Relations, May 23, 2013., 2013.
McDermott, Roger. "Tashkent Strengthens Security Ties with Moscow Ahead of NATO Drawdown(link is external)." Eurasia Daily Monitor 10, no. 36 (2013).
Technically Recoverable Shale Oil and Shale Gas Resources: An Assessment of 137 Shale Formations in 41 Countries Outside the United States(link is external). U.S. Energy Information Administration (EIA), 2013.
Sbardella, Alex. Ten Tips for Mobile UX(link is external). Red Ant Blog, 2013.
Acharya, A.. Ten years after 9/11: Rethinking the jihadist threat., 2013.
Tensions Rise in Georgia’s Breakaway Regions(link is external). Radio Free Europe – Radio Liberty, 2013.
Terrorism and Financial Intelligence(link is external). US Department of the Treasury, 2013.
Freeman, Michael, and Moyara Ruehsen. "Terrorism Financing Methods: An Overview(link is external)." Perspectives on Terrorism 4, no. 7 (2013): 5-26.
Forster, Peter K.. "Terrorist Innovation: Homegrown Terrorism and the Internet." In The Dangerous Landscape, 79-86., 2013.
Abrams, Elliott. Tested by Zion: The Bush Administration and the Israeli-Palestinian Conflict. Cambridge University Press, 2013.
Zimmerman, Katherine L.. "Testimony: AQAP’s Role in the al Qaeda Network: Statement before the House Committee on Homeland Security Subcommittee on Counterterrorism and Intelligence(link is external)." In Understanding the Threat to the Homeland from AQAP. American Enterprise Institute for Public Policy Research (AEI), 2013.
Stavridis, James G.. Testimony before the 113th Congress, House and Senate Armed Services Committee Testimony., 2013.
Malhotra, Rahul, and Prince Jain. "Testing Techniques and its Challenges in a Cloud Computing Environment." The SIJ Transactions on Computer Science Engineering & its Applications (CSEA) 1, no. 3 (2013).
Tethered Aerostat Systems Application Note: System Assessment and Validation for Emergency Responders (SAVER). Space and Naval Warfare Systems Center Atlantic, 2013.
"Text of President Obama’s May 23 speech on national security(link is external)." Washington Post (2013).
Bamford, James. They know much more than you think. The New York Review of Books, 2013.
Howcroft, James. Things Americans Need to Know: How to Be Better Partners(link is external). Small Wars Journal, 2013.

Pages