Biblio

Export 21404 results:
2009
Stinchcombe, Neil. "Cloud computing in the spotlight." Infosecurity 6, no. 6 (2009).
Jennings, Roger. Cloud Computing with the Windows® Azure™ Platform. Indianapolis, IN: John Wiley, 2009.
Ciortea, Liviu, Stefan Bucur, Vitaly Chipounov, George Candea, and Cristian Zamfir. "Cloud9: A Software Testing Service." ACM SIGOPS Operating Systems Review 43:4 (2009).
Ganon, Zohar, and E. Zilbershtein. Cloud-based Performance Testing of Network Management Systems In IEEE 14th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD'09. Pisa, Italy, 2009.
Code of Practice for Life Cycle Costing, RTO-TR-SAS-069 . Paris: NATO Research and Technology Agency, 2009.
Kralev, Nicholas. "Cohen: Middle East fearful of Iran." The Washington Times (2009).
-Matos, Camarinha, H. Afsarmanesh, N. Galeano, A Molina, and L.M.. "Collaborative Networked Organizations – Concepts and Practice in Manufacturing Enterprises." Computers & Industrial Engineering 57, no. 1 (2009): 46-60.
de Borchave, Arnaud. Commentary: NATO Caveats., 2009.
Commission of the European Communities, A Community approach on the prevention of natural and man-made disasters. Brussels, 2009.
Communication from the Commission to the European Parliament and the Council on Strengthening Chemical, Biological, Radiological and Nuclear Security in the European Union – an EU CBRN Action Plan. European Commission, 2009.
Mohagheghi, Salman, J. Stoupis, and Z. Wang. "Communication Protocols and Networks for Power Systems – Current Status and Future Trends." In 2009 IEEE/PES Power Systems Conference and Exposition. Seattle, WA , 2009.
Tagarev, Todor. Competencies of the EU-12 defence-related supplier base, EDA study In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2009.
Haimes, Yacov Y.. "On the Complex Definition of Risk: A Systems-Based Approach." Risk Analysis 29, no. 12 (2009): 1647-54.
Matwiczak, Kenneth. A Comprehensive Database of Provincial Reconstruction Teams in Afghanistan. Austin, TX: Lyndon B. Johnson School of Public Affairs, The University of Texas at Austin, 2009.
Comprehensive National Cybersecurity Initiative. Washington, D.C.: The White House, 2009.
Henry, Matthew H., and Yacov Y. Haimes. "A Comprehensive Network Security Risk Model for Process Control Networks." Risk Analysis 29, no. 2 (2009): 223-248.
Cayirci, Erdal, and Dusan Marincic. Computer Assisted Exercises and Training: A Reference Guide. Chichester, UK: John Wiley, 2009.
Cayirci, Erdal, and Dusan Marincic. Computer Assisted Exercises and Training. A Reference Guide . Hoboken, NJ: John Wiley, 2009.
Earley, Pete. Comrade J: The Untold Secrets of Russia's Master Spy in America After the End of the Cold War. New York: Penguin Books, 2009.
Chen, Ching-Pu. "The Concepts and Design of ROC Defense Reorganization." Information & Security: An International Journal 23, no. 2 (2009): 149-162.
The Conclusion of the Government of Montenegro., 2009.
Peimani, Hooman. Conflict and Security in Central Asia and the Caucasus. Santa Barbara, CA: ABC-Clio, 2009.
Bichsel, Christine. Conflict Transformation in Central Asia: Irrigation Disputes in the Ferghana Valley. Abingdon, Oxon & New York: Routledge, 2009.
Rosenbach, Eric, and Aki J. Peritz. Confrontation or Collaboration? Congress and the Intelligence Community. Background Memos on the Intelligence Community Report. Belfer Center for Science and International Affairs, Harvard Kennedy School, 2009.
Popper, Karl. Conjectures and Refutations: The Growth of Scientific Knowledge. London: Routledge Classics, 2009.

Pages