Biblio

Export 21387 results:
2012
Security Annual Report. Cisco, 2012.
Alipiev, Ilian. Security challenges and functions of the intelligence community In CSDM Views. Sofia: Centre for Security and defence Management, 2012.
Milina, Velichka. "Security in a Communications Society: Opportunities and Challenges." Connections: The Quarterly Journal 11, no. 2 (2012): 53-66.
Security, Kazakhstan. London: IHS Global Limited, 2012.
Hadi, Raghad Mohammed. "Security protocol for a remote user authentication system over unsecure network." Science articles exchange (مقالات العلوم الصرف) 18, no. 76 (2012).
Security risk: Sensitive data can be harvested from a PC even if it is in standby mode, experts say. ScienceDaily.com, 2012.
Security Sector Reform Integrated Technical Guidance Notes. New York: UN SSR Task Force, 2012.
Security threat report 2013. Sophos, 2012.
Alpern, Robert, Michael Caplan, and Orson Moe. Seldin and Giebisch's The Kidney: Physiology and Pathophysiology. 5th ed. London: Academic Press, 2012.
"Serbia: A double-dip recession in the Western Balkans." The Economist Intelligence Unit (2012).
Tagarev, Todor, and Velichka Milina. "Shaping Energy Security Policy in Uncertainty." In International conference "Energy Security - National, Regional and Euroatlantic Frameworks". Sofia, 2012.
Gawliczek, Piotr. "Showing the Way: Contributions from NATO’s Newest Members." Connections: The Quarterly Journal 11, no. 4 (2012): 75-82.
Cohen, Gili. Sinai Peacekeeping Force Commander Warns of Weapons Smuggling to Gaza. Haaretz, 2012.
The situation in the Syrian Arab Republic In Resolution adopted by the General Assembly., 2012.
Six-Point Proposal of the Joint Special Envoy of the United Nations and the League of Arab States In Annex to S/RES/2042 (2012)., 2012.
Daskalov, Nikola. Slavnoto vreme. Sofia: Ciela, 2012.
Small Arms Survey 2012. Geneva: Graduate Institute of International and Development Studies, 2012.
Federal Communications Commision. Small Biz Cyber Planner 2.0., 2012.
Gaurav, Jayesh, Sanjive Tyagi, and Jayanthi Ranjan. "Smart Card Fraud Prevention Scheme Using Fingerprinting Authentication." International Journal of Computer Science and Information Technologies 3, no. 1 (2012): 3059-3062.
K. Lawlor, Blaine, and Martin J. Hornyak. "Smart Goals: How the Application of Smart Goals Can Contribute to Achievement of Student Learning Outcomes." Developments in Business Simulation and Experiential Learning 29 (2012).
Lerman, Kristina, Rumi Ghosh, and Tawan Surachawala. "Social Contagion: An Empirical Study of Information Spread on Digg and Twitter Follower Graphs." arXiv preprint arXiv:1202.3162 (2012).
Social network demographics in 2012., 2012.
Social Networks Security Aspects. A Technological and User Based Perspectives In Jubilee National Conference with Foreign Participation TELECOM ., 2012.
Brymann, A.. Social Research Methods. 4th edition. Oxford: Oxford University Press, 2012.
Brymann, Alan. Social Research Methods. 4th ed. Oxford, UK: Oxford University Press, 2012.

Pages