Biblio

Export 21404 results:
2012
CIA World Factbook - Armenia., 2012.
Kilcullen, David. "The City as a System: Future Conflict and Urban Resilience." The Fletcher Forum of World Affairs 36, no. 2 (2012): 19-39.
Procházková, Dana. "Civil protection." In International Conference on “Global Existential Risks” (Globálne existenciálne riziká) . Žilina, 2012.
Civil Protection Cooperation for the Candidate Countries and Potential Candidates In Analytical Study on Host Nation Support., 2012.
Tagarev, Todor. Civilian Control in Defence (in Russian)., 2012.
Appelrouth, Scott A., and Laura Desfor Edles. Classical and Contemporary Theory. 2nd Edition ed. Thousand Oaks, CA: Pine Forge Press, 2012.
Grishin, Vladimir. Classical Control Theory and Methods of Artificial Intelligence. Curse of Dimensionality., 2012.
Brzoska, Michael. "Climate change and the military in China, Russia, the United Kingdom, and the United States." Bulletin of the Atomic Scientists 62, no. 2 (2012): 43-54, p. 48.
Clover, Charles. "Clinton Vows Thwart New Soviet Union." Financial times (2012).
Vilkomir, Sergiy. "Cloud Testing: A State-of-the-Art Review." Information & Security: An International Journal 28, no. 2 (2012): 213-222.
Capodieci, A., A.L. Guido, L. Mainetti, and U. Barchetti. "Collaborative Process Management for the Networked Enterprise: A Case Study." In 26th IEEE International Conference on Advanced Information Networking and Applications Workshops. WAINA, 2012.
Williamson, Wade. Combating Emerging Threats Through Security Collaboration. Security Week, 2012.
Silk, Dan. Community Policing to Prevent Violent Extremism In FBI Law Enforcement Bulletin., 2012.
Hartley, Keith. "Company Survey Series: I: BAE Systems Plc." Defence and Peace Economics 23:4 (2012).
Djebbar, Fatiha, Beghdad Ayad, Karim Abed Meraim, and Habib Hamam. "Comparative study of digital audio steganography techniques." EURASIP Journal on Audio, Speech, and Music Processing 1 (2012): 25.
Son, Joon, Chinedum Irrechukwu, and Patrick Fitzgibbons. "A Comparison of Virtual Lab Solutions for Online Cyber Security Education." Communiactions of the IIMA 2, no. 4 (2012).
Weng, Lilian, Alessandro Flammini, Alessandro Vespignani, and Filippo Menczer. "Competition among Memes in a World with Limited Attention." Nature Scientific Reports 2, no. Article number: 335 (2012).
Schadlow, Nadia. "Competitive Engagement: Upgrading America’s Influence." Small Wars Journal (2012).
Prati, R., and G. Batista. "A complexity-invariant measure based on fractal dimension for time series classification." IJNCR 3, no. 3 (2012): 59-73.
Hemamali, Tennakoon. A Comprehensive Methodology for Profiling Cyber-criminals. Asia Pacific Institute of Information Technology, 2012.
McCarthy, N.K.. The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk . McGraw-Hill Osborne Media, 2012.
Rocha, L.. Computer Security Incident Handling – 6 Steps. Count Upon Security., 2012.
Chichonski, Paul, Tom Millar, Tim Grance, and Karen Scarfone. Computer Security Incident Handling Guide In Special Publication. National Institute of Standards and Technology (NIST), 2012.
López, David, Oscar Pastor, and Luis Javier García. "Comunicación de Eventos de Seguridad orientada al Análisis de Riesgos Dinámico." In XII Spanish Meeting on Cryptology and Information Security (RECSI), . San Sebastián, 2012.
Bechelloni, Giovanni. "Comunicazione Strategica e Strategie Communicative: le cose del Mondo tra Ignoranza e Avidita." In Studi di strategia: Guerra, politica, economia, semiotica, psicoanalisi, matematica. Egea, 2012.

Pages