Realuyo, Celina B.. "
Following the Terrorist Money Trail."
Connections: The Quarterly Journal 10, no. 2 (2011): 105-124.
Tang, Yi, Sargur N. Srihari, Harish Kasiviswanathan, and Jason J. Corso. Footwear Print Retrieval System for Real Crime Scene Marks In
Computational Forensics, IWCF 2010. Lecture Notes in Computer Science. Vol. 6540. Berlin, Heidelberg: Springer, 2011.
Tagarev, Todor. Foresight-related terminology in defence In
IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2011.
Sibilio, Eleonora. Formal Methods for Wireless Systems. Vol. PhD Thesis. Verona, Italy: Dipartimento di Informatica, Universit`a di Verona, 2011.
Bourdieu, Cf. Pierre. "
Forms of Capital." In
Cultural Theory: An Anthology , 81-93. Imre Szeman and Timothy Kaposy ed. Oxford: Wiley-Blackwell, 2011.
France Country Report. European Network and Information Security Agency (ENISA), 2011.
Raffenne, Jean-Paul, and Jean-Francois Clair. "
The French Counterterrorism System." In
Toward a Grand Strategy Against Terrorism, 356. New York: McGraw Hill, 2011.
K., Zaborska N., and Zhukovskaya L. E.. Fundamentals of logistics: a textbook. Odessa: Odessa National O.S. Popov Academy of Telecommunications, 2011.
Piris, Jean-Claude. The Future of Europe. Cambridge: Cambridge University Press, 2011.
Nye, Joseph S.. The Future of Power. New York: PublicAffairs, 2011.
Murphy, Martin N.. "
Future Scenarios and Future Threats: What Happens if Piracy is not Controlled, and How Might Manifestations Change?" In
Global Challenge, Regional Responses: Forging a Common Approach to Maritime Piracy, 36-40. Dubai, UAE: Dubai School of Government, 2011.