Biblio

Export 21387 results:
2010
Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organization – Active Engagement, Modern Defence. NATO, 2010.
Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organisation., 2010.
Strategic Concept for the Defense and Security of the Members of the North Atlantic Treaty Organization., 2010.
Strategic Concept—Active Engagement, Modern Defence. Lisbon: NATO, North Atlantic Council, 2010.
Tagarev, Todor. Strategic Defence Management: From Core Processes to Organizational Structures In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2010.
Tagarev, Todor. Strategic Defence Review: Purpose, Principles, Players In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2010.
Tagarev, Todor. Strategic Risk Assessment In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2010.
Gorbulin, Vladimir P., and A.B. Kachyns’kyj. Strategichne planuvannja: vyrishennja problem nacional’noi’ bezpeky [Strategic Planning: Solving National Security Problems]. Kyiv: NISD, 2010.
Strategija sodelovanja RS v mednarodnih operacijah in misijah In Uradni list RS., 2010.
Government of the Republic of Macedonia. Strategy for e-government of the Republic of Macedonia., 2010.
A Strong Britain in an Age of Uncertainty: The National Security Strategy. UK Cabinet Office, 2010.
Stigak, A.А.. "The structure of payment systems and modeling their performance based on system analysis." Electronic modeling 6 (2010): 97-109.
Di Mauro, Carmelo, Sara Bouchon, Christiaan Logtmeijer, Russell Pride, Thomas Hartung, and Jean-Pierre Nordvik. "A Structured Approach to Identifying European Critical Infrastructures." International Journal of Critical Infrastructures 6, no. 3 (2010).
Yang, Zhou. Study on the vulnerability of road transport network based on Flow Interdiction Model. Beijing: Beijing Normal University, 2010.
"The Stuxnet Outbreak, A Worm in the Centrifuge – An Unusually Sophisticated Cyber-weapon is Mysterious but Important." Economist (2010).
Tsyganok, Vitaliy, and Sergii V. Kadenko. "On sufficiency of the consistency level of group ordinal estimates." Journal of Automation and Information Sciences 42, no. 8 (2010): 42-47.
Salter, Mark B.. "Surveillance." In The Routledge Handbook of New Security Studies. London: Routledge, 2010.
Teixeira, Thiago, and Gershon Dublon. "A Survey of Human-Sensing: Methods for Detecting Presence, Count, Location, Track, and Identity." ACM Computing Surveys 5 54, no. 1 (2010): 59.
SySSec Project Web Page., 2010.
Spencer, Alexander. The tabloid terrorist: The predicative construction of new terrorism in the media. New York: Palgrave Macmillan, 2010.
Durbin, Pat, and Terry Doerscher. Taming Change with Portfolio Management: Unify Your Organization, Sharpen Your Strategy and Create Measurable Value . Austin, TX: Greenleaf Book Group Press, 2010.
Bazhanov, Yevgeny. "Tangled Triangle of Russia, China and the U.S." The Moscow Times (2010).
Ivanova, Petya. Technical Evaluation Report In Analytical Support to Defence Transformation. Paris: NATO RTA, 2010.
Serih, Andrey. Technical regulation in construction. Analytical review of world experience. Chicago: SNIP, 2010.
Stocker, Mike. Technology Insertion and Management: Options for the Canadian Forces In Technical memorandum., 2010.

Pages