Biblio

Export 21404 results:
2014
Baker, David Mc. A.. "The Effects of Terrorism on the Travel and Tourism Industry." International Journal of Religious Tourism and Pilgrimage 2, no. 1 (2014): 64-5.
Bremananth, R., and Ahmad Sharieh. "An efficient Approach of e-Iris Enrolling and Authentication for FS e-Apps." e-AGE 2014, Arab States Research and Education Network (2014).
Al-Aghbari, Anas, Othman Ibrahim, and Faisal Saeed. "E-Government Readiness Ranking and Challenges in Yemen." In 1st International Conference of Recent Trends in Information and Communication Technologies., 2014.
Egyptian ex-Defense Minister As-Sisi wins 96.91 % of presidential election votes. Vol. 3 June 2014. ITAR-TASS, 2014.
Lis, Andrzej. " E-learning w organizacjach wojskowych: doświadczenia sojusznicze i wnioski dla sił zbrojnych (E-learning in Military Organisations: Lessons from the Allies and Recommendations for the Polish Armed Forces)." Studia Ekonomiczne 199 (2014): 134-145 .
Siponen, Mikko, Adam Mahmood, and Seppo Pahnila. "Employees’ Adherence to Information Security Policies: An Exploratory Field Study." Information and Management 51, no. 2 (2014): 217-24.
Armando, Alessandro, Gabriele Costa, Alessio Merlo, and Luca Verderame. Enabling BYOD Through Secure Meta-market In 2014 ACM Conference on Security and Privacy in Wireless & Mobile Networks, WiSec’14. Oxford, United Kingdom, 2014.
Enclaves in Central Asia: The Post-imperial Chessboard. The Economist, 2014.
Tucker, Spencer C.. The Encyclopedia of the Wars of the Early American Republic, 1783–1812: A Political, Social, and Military History. ABC-CLIO, 2014.
Ganz, Aurora. Energy Security Issues: Is NATO Becoming a (Pivotal) Actor?. SciencesPo, Centre de Recherches Internationales, 2014.
Söhret, Mesut. "Enerjđ Güvenlđğđ Kapsaminda Nato’nun Ortadoğu Polđtđkasi." In International Energy and Security Congress that took place at Kocaeli University. Turkey: Kocaeli University, 2014.
Söhret, Mesut. "Enerjđ Güvenlđğđ Kapsaminda Nato’nun Ortadoğu Polđtđkasi." In International Energy and Security Congress. Turkey: Kocaeli University, 2014.
Engaging Men: The Journey Towards Gender Transformation. Plan, 2014.
England Coast Path: Improving Public Access to the Coast. Government of UK, 2014.
Pitrėnaitė-Žilėnienė, Birutė, Andrea Carosi, and Paolo Vallesi. "Enhancing Societal Resilience against Disasters: Engaging the Public via Social Technologies." Social Technologies 4, no. 2 (2014): 318-332.
ENISA. ENISA Threat Landscape 2014: Overview of current and emerging cyber-threats., 2014.
Monev, Veselin. Enterprise IT security metrics: Classification, examples and characteristics (in Bulgarian) In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2014.
Entropy definition / Дефиниция на Ентропия. Whatis.com, 2014.
Petrov, Valentyn. "Establishing a National Cybersecurity System in the Context of National Security and Defence Sector Reform." Information & Security: An International Journal 31 (2014): 73-77.
Baraković, Sabina. "Establishment of a CERT body in Bosnia and Herzegovina." In DCAF Young Faces 2014 – Cybersecurity Winter School for the Western Balkans. Geneva: DCAF, 2014.
Baraković, Sabina. Establishment of CERT Body in Bosnia and Herzegovina In DCAF Young Faces 2014 – Cybersecurity Winter School for the Western Balkans., 2014.
Ministry of Economic Affairs and Communication. Estonia, Cyber Security Strategy 2014-2017., 2014.
Estonian Ministry of Defence. Estonian Defence Force’s Cyber Range., 2014.
Monteiro, Agostinho dos Reis. Ethics of Human Rights. Dordrecht: Springer, 2014.
Ethics of Security and Surveillance Technologies. European Group on Ethics in Science and New Technologies, 2014.

Pages