Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21414 results:
RTF
EndNote XML
2009
Travers, Russell E.
.
"
Evaluating Progress in the War on Terror
."
The Intelligencer, Journal of US Intelligence Studies
(2009).
Google Scholar
RTF
EndNote XML
Exec. Order. No. 13492
., 2009.
Google Scholar
RTF
EndNote XML
"
The Executive Director of the Defence Company Terem was Arrested
."
DarikNews
(2009).
Google Scholar
RTF
EndNote XML
Locasto, Michael E.
, and
Sara Sinclair
.
An Experience Report on Undergraduate Cyber-Security Education and Outreach
. ACEIS'09, 2009.
Google Scholar
RTF
EndNote XML
Kolb, Alice Y.
, and
David A. Kolb
.
"
Experiential Learning Theory: A Dynamic, Holistic Approach to Management Learning, Education and Development
." In
The SAGE Handbook of Management Learning, Education and Development
, 13. SAGE Publications, 2009.
Google Scholar
RTF
EndNote XML
Woehle, Ralph
, and
Andrew Quinn
.
"
An Experiment Comparing HBSE Graduate Social Work Classes: Face‐to‐Face and at a Distance
."
Journal of Teaching in Social Work
29, no. 4 (2009): 418-430.
Google Scholar
RTF
EndNote XML
Cooper, Stephen
,
Christine Nickell
,
Victor Piotrowski
,
Brenda Oldfield
,
Bill Caelli
, and
Lance Hoffman
.
"
An Exploration of the Current State of Information Assurance Education
."
ACM SIGCSE Bulletin
41, no. 4 (2009): 109-125.
DOI
Google Scholar
RTF
EndNote XML
Ryan, Kurt J.
.
Exploring Alternative Strategic Access To Afghanistan
. U.S. Army War College, 2009.
Google Scholar
RTF
EndNote XML
Komari, Iraj Elyasi
,
Vyacheslav Kharchenko
,
Eugene Babeshko
,
Anatoliy Gorbenko
, and
Alexander Siora
.
"
Extended Dependability Analysis of Information and Control Systems by FME(C)A-technique: Models, Procedures, Application
." In
Fourth International Conference on Dependability of Computer Systems, 2009, DepCos-RELCOMEX'09
., 2009.
DOI
Google Scholar
RTF
EndNote XML
Aly, Seham Mouawad
,
Raafat El Fouly
, and
Hoda Baraka
.
"
Extended Kalman Filtering and Interacting Multiple Model for Tracking Maneuvering Targets in Sensor Netwotrks
." In
Aerospace Sciences & Aviation Technology, Asat
., 2009.
Google Scholar
RTF
EndNote XML
"
Fateful Tuna: Somali Pirates Have Kidnapped a Record Number of Russians
."
Novye Izvestia
(2009).
Google Scholar
RTF
EndNote XML
Qiu-ju, You
,
Zhu Wei
, and
Bai Yong-qiang
.
"
Fault tree analysis on risk factors of underground gas networks of Beijing city
."
Oil & Gas Storage and Transportation
28, no. 9 (2009): 24-30.
Google Scholar
RTF
EndNote XML
Wagstyl, Stefan
, and
Roman Olearchyk
.
"
Fear of New Europe Gas Crisis
."
Financial Times
(2009).
Google Scholar
RTF
EndNote XML
Holubenko, O.L.
,
O.S. Petrov
, and
V.O. Horoshko
.
"
Features of Training for Specialists in Information Security
."
Information Security
(2009): 5-17.
Google Scholar
RTF
EndNote XML
Osipian, Ararat L.
.
"
‘Feed from the Service’: corruption and coercion in state–university relations in Central Eurasia
."
Research in Comparative and International Education
4, no. 2 (2009).
Google Scholar
RTF
EndNote XML
Speckhard, Anne
.
"
Female Suicide Bombers in Iraq
."
Democracy and Security
5, no. 1 (2009): 19-50.
Google Scholar
RTF
EndNote XML
Agordzo, Benjamin Kwasi
.
"
Filling the ‘Security Gap’ in Post-conflict Situations: Could Formed Police Units Make a Difference?
"
International Peacekeeping
16, no. 2 (2009): 287-94.
Google Scholar
RTF
EndNote XML
Paget, François
.
Financial Fraud and Internet Banking: Threats and Countermeasures
In
McAfee report
. Santa Clara: CA: McAfee, 2009.
Google Scholar
RTF
EndNote XML
Chen, Hua
, and
Yi Guo
.
"
Fine-grained Security Model of Multi-agent Communication with XML Specifications
."
Journal of Xi'an Technological University
29, no. 1 (2009).
Google Scholar
RTF
EndNote XML
Böck, Benjamin
.
Firewire-based Physical Security Attacks on Windows 7, EFS and BitLocker
. Security Research Lab Secure Business Austria, 2009.
Google Scholar
RTF
EndNote XML
First COI of the Sixteenth Election Period
In
Bundestag print
., 2009.
Google Scholar
RTF
EndNote XML
Dorronsoro, Gilles
.
Focus and Exit: An Alternative Strategy for the Afghan War
. Washington, D.C.: Carnegie Endowment for International Peace, 2009.
Google Scholar
RTF
EndNote XML
For a Euro-Atlantic Partnership (EAP) Looking to the Future: Proposals for NATO’s New Strategic Concept
. Government of Austria, Ireland and Switzerland, 2009.
Google Scholar
RTF
EndNote XML
"
For Irish, E.U. May Stand for Economic Unity
."
The New York Times
(2009).
Google Scholar
RTF
EndNote XML
Tarasyuk, O.M.
, and
A.V. Gorbenko
.
"
For Methods for Development of Critical Software
." In
Lecture Materials
. Kharkiv: National Aerospace University Institute “KhAI”, 2009.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
452
453
454
455
456
457
458
459
460
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance