Biblio

Export 21404 results:
2009
Jackson, Richard, Marie Been Smyth, and Jeroen Gunning. Critical Terrorism Studies: A New Research Agenda. London: Routledge, 2009.
Lo, Nai Wei, and Kuo-Hui Yeh. "Cryptanalysis of Two Three-Party Encrypted Key Exchange Protocols." Computer Standards & Interfaces 31, no. 6 (2009).
Pilon, Juliana Geran. Cultural Intelligence for Winning the Peace. Washington DC: The Institute of World Politics Press, 2009.
Current Practices in Electronic Surveillance in the Investigation of Serious and Organized Crime In United Nations Publications. UNODC, 2009.
Wilson, Clay. "Cyber Crime." In Cyberpower and National Security, 415. Washington, D.C.: National Defense University Press, 2009.
Australian Government, Attorney-General's Department. Cyber Security Strategy of Australian., 2009.
Cyber Security Strategy of the United Kingdom: safety, security and resilience in cyber space. UK Cabinet Office, 2009.
Schaap, Arie J.. "Cyber Warfare Operations: Development and Use Under International Law." Air Force Law Review 64 (2009): 121-173.
Karatzogianni, Athina. Cyber-Conflict and Global Politics. Routledge, 2009.
Libicki, Martin C.. Cyberdeterrence and Cyberwar . Santa Monica, CA: RAND, 2009.
Libicki, Martin. Cyberdeterrence and Cyberwarfare. Santa Monica, CA: RAND, 2009.
Kramer, Franklin D.. "Cyberpower and National Security: Policy Recommendations for a Strategic Framework." In Cyberpower and National Security, 12. Washington, D.C.: National Defense University Press, 2009.
Harris, Shane. "The Cyberwar Plan." National Journal (2009).
de Groot, Bert, and Philip Hans Franses. "Cycles in basic innovations." Technological Forecasting & Social Change 76 (2009): 1021-1025.
Buhari-Gulmez, Didem. The Cyprus Conflict: A World Society Perspective In Politics and International Relations Working Paper., 2009.
Kohn, Richard H.. "The Danger of Militarization in an Endless "War" on Terrorism." The Journal of Military History 73, no. 1 (2009): 177-208.
"A Danger to Public Health and Welfare." New York Times (2009).
Kim, Cheonshik, Minho Jo, You-Sik Hong, and Hyun-Sook Park. "Data Hiding Based on EMD for Ordered Block Truncation Coding (ODBTC를 위한 EMD 기법에 기반한 데이터 은닉 )." The Institute of Electronics Engineers of Korea - Computer and Information 46, no. 6 (2009): 27-34.
Liu, Baolong, Joan Lu, and Jim Yip. "Data Integrity Based on Concatenated Hash Function." (IJCSIS) International Journal of Computer Science and Information Security 1, no. 1 (2009).
Bruckner, Till. "Decision-Making and Georgia’s Perpetual Revolution: The Case of IDP Housing." Caucasian Review of International Affairs 3, no. 2 (2009): 172-180.
Decree on the Organisation, Equipment and Training of Protection, Rescue and Relief Forces. Official Gazette of the Republic of Slovenia No 92/07, amended in 2009, 2009.
Tagarev, Todor. "Defence Decision-making and Corruption Risks." In Integrity in Defence: Effective, Transparent and Accountable Management, 189-214. Sofia: EuroAtlantic Education Initiative, 2009.
Marcu, Hari-Bucur, Philipp Fluri, and Todor Tagarev. Defence Management: An Introduction., 2009.
The Defence Ministry in a Financial and Morale Collapse. Mediapool.bg, 2009.
Tagarev, Todor. "Defence Planning – A Core Process in Defence Management." In Defence Management: An Introduction, 45-73. Security and Defence Management Series. Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2009.

Pages