Biblio

Export 21404 results:
2010
Strategija sodelovanja RS v mednarodnih operacijah in misijah In Uradni list RS., 2010.
Government of the Republic of Macedonia. Strategy for e-government of the Republic of Macedonia., 2010.
A Strong Britain in an Age of Uncertainty: The National Security Strategy. UK Cabinet Office, 2010.
Stigak, A.А.. "The structure of payment systems and modeling their performance based on system analysis." Electronic modeling 6 (2010): 97-109.
Di Mauro, Carmelo, Sara Bouchon, Christiaan Logtmeijer, Russell Pride, Thomas Hartung, and Jean-Pierre Nordvik. "A Structured Approach to Identifying European Critical Infrastructures." International Journal of Critical Infrastructures 6, no. 3 (2010).
Yang, Zhou. Study on the vulnerability of road transport network based on Flow Interdiction Model. Beijing: Beijing Normal University, 2010.
"The Stuxnet Outbreak, A Worm in the Centrifuge – An Unusually Sophisticated Cyber-weapon is Mysterious but Important." Economist (2010).
Tsyganok, Vitaliy, and Sergii V. Kadenko. "On sufficiency of the consistency level of group ordinal estimates." Journal of Automation and Information Sciences 42, no. 8 (2010): 42-47.
Salter, Mark B.. "Surveillance." In The Routledge Handbook of New Security Studies. London: Routledge, 2010.
Teixeira, Thiago, and Gershon Dublon. "A Survey of Human-Sensing: Methods for Detecting Presence, Count, Location, Track, and Identity." ACM Computing Surveys 5 54, no. 1 (2010): 59.
SySSec Project Web Page., 2010.
Spencer, Alexander. The tabloid terrorist: The predicative construction of new terrorism in the media. New York: Palgrave Macmillan, 2010.
Durbin, Pat, and Terry Doerscher. Taming Change with Portfolio Management: Unify Your Organization, Sharpen Your Strategy and Create Measurable Value . Austin, TX: Greenleaf Book Group Press, 2010.
Bazhanov, Yevgeny. "Tangled Triangle of Russia, China and the U.S." The Moscow Times (2010).
Ivanova, Petya. Technical Evaluation Report In Analytical Support to Defence Transformation. Paris: NATO RTA, 2010.
Serih, Andrey. Technical regulation in construction. Analytical review of world experience. Chicago: SNIP, 2010.
Stocker, Mike. Technology Insertion and Management: Options for the Canadian Forces In Technical memorandum., 2010.
Hryshchuk, Ruslan V.. Teoretychni osnovy modeljuvannja procesiv napadu na informaciju metodamy teorij dyferencialnyh igor ta dyferencialnyh peretvoren. Zhytomyr: Ruta, 2010.
Servenay, David. Terroisme: pourquoi Alliance Base a fermé ȧ Paris. Rue 89, L’Obs, 2010.
Yu, Lian, Wei-Tek Tsai, Liangjie Tang, Wei Zhao, Xiangji Chen, Linqing Liu, and Yan Zhao. Testing as a Service over Cloud In Fifth IEEE International Symposium on Service Oriented System Engineering (SOSE). Nanjing, China, 2010.
Ahmad, Abu Umar Faruq. Theory and Practice of Modern Islamic Finance: The Case Analysis from Australia. Universal-Publishers, 2010.
Jaspal, Zafar Nawaz. "Threat of Extremism &Terrorist Syndicate beyond FATA." Journal of Political Studies 1, no. 2 (2010): 19-49.
Minchev, Zlatogor. Threats and Challenges in Social Networks. A European Glance and Alliance Perspective in the Context of the New Strategic Concept In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2010.
Time for a Human Approach. Zurich: ISN, 2010.
TK_02_60 Project Web Page., 2010.

Pages