Biblio

Export 21386 results:
2014
Cybersecurity Capability Maturity Model (C2M2), Version 1.1., 2014.
Wandera, Max, Brent Jonasson, and Jacques Benoit. Cybersecurity Considerations for Electrical Distribution Systems In White Paper., 2014.
Cybersecurity in 2015: What to expect? In 2015 Global Megatrends in Cybersecurity. ZDNET, 2014.
Cybersecurity’s Maginot Line: A Real-World Assessment of the Defense-in-Depth Model In Complimentary Report . Milpitas: FireEye Inc., 2014.
Cybersecurity strategy of Ukraine In draft., 2014.
Cybersecurity's Maginot Line: A Real-world Assessment of the Defense-in-Depth Model In Complimentary Report. Milpitas: FireEye Inc., 2014.
Burt, David, Aaron Kleiner, Paul Nicholas, and Kevin Sullivan. Cyberspace 2025: Navigating the Future of Cybersecurity Policy. Microsoft Corporation, 2014.
Appel, Edward J.. Cybervetting: Internet Searches for Vetting, Investigations, and Open-Source Intelligence. Taylor & Francis Group, LLC, 2014.
Mehan, Julie. CyberWar, CyberTerror, CyberCrime and CyberActivism: An In-depth Guide to the Role of Standards in the Cybersecurity Environment. IT Governance Publishing, 2014.
Evangelista, Stefania, Giovanni De Marinis, Cristiana Di Cristo, and Angelo Leopardi. "Dam-break dry granular flows: experimental and numerical analysis." Wseas Transactions on Environment and Development 10 (2014).
Grande, Allison. Data Breaches Put Retail GCs in the Firing Line. New York: Law360, 2014.
Chen, Qi, Amanda Whitbrook, Uwe Aickelin, and Chris Roadknight. "Data classification using the Dempster–Shafer method." Journal of Experimental & Theoretical Artificial Intelligence 26, no. 4 (2014): 493-517.
David Delight Plus In Operator's Manual. Canada: Mind Alive Inc., 2014.
Vermaut, Vincent. De economische effecten van piraterij in Zuidoost-Azië. Vol. Master in de Maritieme Wetenschappen. Universiteit Antwerpen – Faculteit Toegepaste Economische Wetenschappen, Universiteit Gent – Faculteit Rechtsgeleerdheid, 2014.
Prucha, Nico. Death from Above: Jihadist Virtual Networks Respond to Drone Strikes in Yemen. Jihadica.com, 2014.
Larivé, Maxime H. A.. Debating European Security and Defense Policy: Understanding the Complexity. Farnham, Burlington: Ashgate Publishing Company, 2014.
Van Fenema, P, S Rietjens, and B. Besters. "De-Conflicting Civil-Military Networks." In Network Topology in Command and Control: Organization, Operation, and Evolution. IGI Global, 2014.
Muggah, Robert. "Deconstructing the Fragile City: Exploring Insecurity, Violence, and Resilience." Environment and Urbanization 26, no. 2 (2014): 345-58.
Petriashvili, Maka. Defense institution building: the dynamics of change in Georgia and the need for continuity of effort. Thesis : Monterey, California: Naval Postgraduate School, 2014.
Tzvetkov, Georgi. "Defense Policy and Reforms in Bulgaria since the End of the Cold War: A Critical Analysis." Connections: The Quarterly Journal 13, no. 2 (2014): 65-78.
Rodrigues, Renato. Defining a test automation system for mobile apps In Faculdade de Engenharia. Vol. Mestrado Integrado em Engenharia Informática e Computação. Universidade do Porto, 2014.
Gonnouni, Amina El, and Frederic Lehmann. "Deghosting method for multiple target tracking in a single frequency network." In 2014 International Radar Conference. Lille, France , 2014.
Aprasidze, David. "Democratization’s Vicious Circle or How Georgia Failed to Change." Connections: The Quarterly Journal 13, no. 4 (2014): 67-74.
Departments. Official site of the Ministry of Foreign Affairs of Georgia, 2014.
Deputies of the Minister of Defense. Ministry of Defense of the Republic of Armenia, 2014.

Pages