Biblio

Export 21393 results:
2012
Reydams, Luc, Jan Wouters, and Cedric Ryngaert. International Prosecutors. Oxford: Oxford University Press, 2012.
International Standards on Combatting Money Laundering and the Financing of Terrorism & Proliferation: The FATF Recommendations. Paris: FATF, 2012.
Calandro, Enrico, Cristoph Stork, and Alison Gillwald. Internet Going Mobile: Internet Access and Usage in 11 African Countries In Research ICT Africa., 2012.
Souter, David, and Monica Kerrets-Makau. Internet Governance in Kenya: An Assessment. ICT Development Associates Ltd, 2012.
Hersent, Olivier, David Boswarthick, and Omar Elloumi. The Internet of Things - Key Applications and Protocols. Chichester, West Sussex,United Kingdom: John Wiley and Sons, 2012.
Internet Security Threat Report In 2011 trends, vol. 17. Symantec, 2012.
Interview of Russian Foreign Minister S.V. Lavrov on Sky News Arabia television channel, 1547-18-08-2012. Vol. 18 August 2012. Official website of the Russian Ministry of Foreign Affairs, 2012.
Interview of Russian Foreign Minister S.V. Lavrov on “Sky News Arabia” television channel, 1547-18-08-2012. Vol. 18 August 2012. Official website of the Russian Ministry of Foreign Affairs, 2012.
Shaikh, Nermeen. Interview with Lila Abu-Lughod, Asia Source: “Why we can’t save Afghan women., 2012.
Abouzeid, Rania. "Interview with Official of Jabhat al-Nusra, Syria’s Islamist Militia Group." Time Magazine (2012).
Interview with Russian television channels. Vol. 26 April 2012. Official website of the President of Russia, 2012.
"Interview with Sergey Lavrov." Rossisyskaya gazeta (2012).
Born, Hans, and Gabriel Geisler Mesevage. "Introducing Intelligence Oversight." In Overseeing Intelligence Services: A Toolkit. DCAF, 2012.
Kronsell, Annica, and Erika Svedberg. "Introduction." In Making Gender, Making War: Violence, Military and Peacekeeping Practices, 2. Kindle edition. New York/London: Routledge, 2012.
Tehranipoor, Mohammad, and Cliff Wang. Introduction to Hardware Security and Trust. New York, NY: Springer, 2012.
Gorbenko, Anatoliy, Vyacheslav Kharchenko, Olga Tarasyuk, and Alexander Romanovsky. "Intrusion-Avoidance via System Diversity." Information & Security: An International Journal 28, no. 1 (2012): 154-158.
Atanassov, Krassimir. On Intuitionistic Fuzzy Sets Theory . Berlin: Springer, 2012.
Warrick, Joby. "Iran Bolsters Retaliation Capability in the Persian Gulf, Experts Say." The Washington Post (2012).
Iranian Submarines to Navigate Caspian Sea. Russia Today, 2012.
Islam Karimov Says, Region Becomes Object of Close Attention. UzDaily.com, 2012.
ISO 22301:2012 Societal security — Business continuity management systems — Requirements In First edition. International Organization for Standardization, 2012.
Israel Signs $ 1.6 Billion Arms Deal with Azerbaijan. Haaretz, 2012.
Christin, Nicholas, Serge Egelman, Timothy Vidas, and Jens Grossklags. "It’s All about the Benjamins: An Empirical Study on Incentivizing Users to Ignore Security Advice." In Financial Cryptography and Data Security, 16-30. Berlin/Heidelberg: Springer, 2012.
Brewster, Ernest, Richard Griffiths, Aidan Lawes, and John Sansbury. IT Service Management: A Guide for ITIL Foundation Exam Candidates. Second ed. Swindon, UK: British Informatics Society Limited, 2012.
Vielmini, Fabrissi. It turns out that Kazakhstan is unstable. inoСМИ.ru, 2012.

Pages