Biblio

Export 21404 results:
2014
Appel, Edward J.. Cybervetting: Internet Searches for Vetting, Investigations, and Open-Source Intelligence. Taylor & Francis Group, LLC, 2014.
Mehan, Julie. CyberWar, CyberTerror, CyberCrime and CyberActivism: An In-depth Guide to the Role of Standards in the Cybersecurity Environment. IT Governance Publishing, 2014.
Evangelista, Stefania, Giovanni De Marinis, Cristiana Di Cristo, and Angelo Leopardi. "Dam-break dry granular flows: experimental and numerical analysis." Wseas Transactions on Environment and Development 10 (2014).
Grande, Allison. Data Breaches Put Retail GCs in the Firing Line. New York: Law360, 2014.
Chen, Qi, Amanda Whitbrook, Uwe Aickelin, and Chris Roadknight. "Data classification using the Dempster–Shafer method." Journal of Experimental & Theoretical Artificial Intelligence 26, no. 4 (2014): 493-517.
David Delight Plus In Operator's Manual. Canada: Mind Alive Inc., 2014.
Vermaut, Vincent. De economische effecten van piraterij in Zuidoost-Azië. Vol. Master in de Maritieme Wetenschappen. Universiteit Antwerpen – Faculteit Toegepaste Economische Wetenschappen, Universiteit Gent – Faculteit Rechtsgeleerdheid, 2014.
Prucha, Nico. Death from Above: Jihadist Virtual Networks Respond to Drone Strikes in Yemen. Jihadica.com, 2014.
Larivé, Maxime H. A.. Debating European Security and Defense Policy: Understanding the Complexity. Farnham, Burlington: Ashgate Publishing Company, 2014.
Van Fenema, P, S Rietjens, and B. Besters. "De-Conflicting Civil-Military Networks." In Network Topology in Command and Control: Organization, Operation, and Evolution. IGI Global, 2014.
Muggah, Robert. "Deconstructing the Fragile City: Exploring Insecurity, Violence, and Resilience." Environment and Urbanization 26, no. 2 (2014): 345-58.
Petriashvili, Maka. Defense institution building: the dynamics of change in Georgia and the need for continuity of effort. Thesis : Monterey, California: Naval Postgraduate School, 2014.
Tzvetkov, Georgi. "Defense Policy and Reforms in Bulgaria since the End of the Cold War: A Critical Analysis." Connections: The Quarterly Journal 13, no. 2 (2014): 65-78.
Rodrigues, Renato. Defining a test automation system for mobile apps In Faculdade de Engenharia. Vol. Mestrado Integrado em Engenharia Informática e Computação. Universidade do Porto, 2014.
Gonnouni, Amina El, and Frederic Lehmann. "Deghosting method for multiple target tracking in a single frequency network." In 2014 International Radar Conference. Lille, France , 2014.
Aprasidze, David. "Democratization’s Vicious Circle or How Georgia Failed to Change." Connections: The Quarterly Journal 13, no. 4 (2014): 67-74.
Departments. Official site of the Ministry of Foreign Affairs of Georgia, 2014.
Deputies of the Minister of Defense. Ministry of Defense of the Republic of Armenia, 2014.
Ourdan, Rémy. "Derna, premier territoire de l’EI hors des frontières du ”califat” en Libye." Le Monde (2014).
Nathans, David. Designing and Building a Security Operations Centre. USA: Syngress, 2014.
McEwen, Adrian, and Hakim Cassimally. Designing the Internet of Things. Chichester, West Sussex: United Kingdom: John Wiley and Sons, 2014.
Légaré, Christian. Designing the Internet of Things: Part 1 — IoT Devices and Local Networks. EDN Network, 2014.
Satanovsky, Evgeniy. "The Destabilization of Central Asia. A Repetition of the Arab Spring on Russia’s Southern Borders Is More than Possible." Voenno-promishleniy Kurier 6(524) (2014).
Parsons, Kathryn, Agata McCormac, Marcus Butavicius, Malcolm Pattinson, and Cate Jerram. "Determining Employee Awareness Using the Human Aspects of Information Security Questionnaire (HAIS-Q)." Computers and Security 42 (2014): 165-76.
Davis, Paul K.. "Deterrence, Influence, Cyber Attack, and Cyber War." New York University Journal of International Law and Politics 47, no. 2 (2014): 327-355.

Pages