Biblio

Export 21387 results:
2011
Gao, Jian, Jingjing Yan, and Zuyun Duanmu. The combination method for different kinds of beliefs In 2011 International Conference on Electronics and Optoelectronics. Dalian, Dalian , 2011.
Commander’s Guide to Female Engagement Teams. Handbook In Center for Army’s Lessons Learned. Kansas: CALL, 2011.
Common Cybersecurity Vulnerabilities in Industrial Control Systems In Homeland Security, Control Systems Security Program. Washington, D.C.: National Cyber Security Division, 2011.
Rožnovská, Jana. Comparation Of The Czech And Swedish Foreign Policy Focusing On Afghanistan In Faculty Of Science, Department Of Geography. Vol. Master. Palacký University, 2011.
Tagarev, Todor, and Georgi Tsvetkov. Comparative Defence Data Analysis In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2011.
Morag, Nadav. Comparative Homeland Security: Global Lessons. John Wiley & Sons, 2011.
Healey, Jason. Comparing Norms for National Conduct in Cyberspace. New Atlanticist, 2011.
Karrer, Brian, and Mark E. J. Newman. "Competing Epidemics on Complex Networks." Physical Review E 84 (2011): 036106.
Ţariuc, Mirel, and Aurel Cobianu. "Complexitatea mediului de securitate şi impactul asupra transformării armatei." In Echilibrul de Putere şi Mediul de Securitate, 177-185. Vol. 1. Bucureşti: Centrul de Studii Strategice de Apărare şi Securitate, Universitatea Naţională de Apărare „Carol I”, 2011.
Tzvetkova, Avgustina. "Comprehensive Approach: The Bulgarian Defence Experience in Crisis Management and Disaster Relief." Information & Security: An International Journal 27, no. 1 (2011): 25-27.
"The Comprehensive Approach to Crisis Management in a Concerted Weimar Effort." Genshagener Papiere 6 (2011).
Abbass, H., A. Bender, S. Gaidow, and P. Whitbread. "Computational Red Teaming: Past, Present and Future." Computational Intelligence Magazine 6, no. 1 (2011).
Nikolova, Irena. Computer Assisted Exercise Management Environment for Civil Security. Vol. PhD Thesis. Sofia: Institute of ICT, 2011.
Nikolova, Irena. "Computer Assisted Exercises Management Environment for Civil Security." Information & Security: An International Journal 27, no. 2 (2011): 147-159.
Nikolova, Irena. COMPUTER ASSISTED EXERCISES MANAGEMENT ENVIRONMENT FOR CIVIL SECURITY In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2011.
Solomon, Michael G., K. Rudolph, Ed Tittel, Neil Broom, and Diane Barrett. Computer Forensics Jumpstart . Indianapolis, IN: Wiley Publishing Inc., 2011.
Brauch, Hans Günter. "Concepts of Security Threats, Challenges, Vulnerabilities and Risk." In Coping with Global Environmental Change, Disasters and Security. Berlin and Heidelberg: Springer, Hexagon Series on Human and Environmental Security and Peace, 2011.
Boden, Dieter. "Conflict Settlement for Abkhazia and South Ossetia: Lessons and Prospects." In South Caucasus – 20 Years of Independence, 131. Berlin: Friedrich-Ebert-Stiftung, 2011.
Government, HM. Contest: The United Kingdom’s Strategy for Countering Terrorism., 2011.
A conversation with Vladimir Putin. Continued. Vol. 15 December 2011. television channels Russia 1, Russia 24 and RTR-Planeta and on radio stations Mayak, Vesti FM and Radio Rossiya, 2011.
Adams, Terri, Leigh Anderson, Milanika Turner, and Jonathan Armstrong. "Coping through a Disaster: Lessons from Hurricane Katrina." Journal of Homeland Security and Emergency Management 8, no. 1 (2011).
Goel, Ajay, O.P.Sahu, Aman Soni, and Punit Soni. "A Copy Attack on Robust Digital Watermarking in Multi Domain for the Stego Images." Information & Security: An International Journal 26, no. 1 (2011): 27-33.
Kazi, Reshmi. "The Correlation Between Non-State Actors and Weapons of Mass Destruction." Connections: The Quarterly Journal 10, no. 4 (2011): 1-10.
Corruption in Serbia: Bribery as experienced by the population. UNDOC, Statistical Office of the Republic of Serbia, 2011.
UK Cabinet Office & Detica. The Cost of Cyber Crime., 2011.

Pages