Biblio

Export 21393 results:
2014
EU Agency for Network and Information Security. European Public Private Partnership for Resilience., 2014.
Cross, Maia K. Davies. A European Transgovernmental Intelligence Network and the Role of IntCen In Perspectives on European Politics and Society. ARENA Centre for European Studies, 2014.
Park, Jeanne. The European Union’s Eastern Partnership. Council on Foreign Relations, 2014.
Sharmа, Ruchir. "The Ever-Emerging Markets. Why Economic Forecasts Fail." Foreign Affairs (2014).
Brazova, Vera Karin, Piotr Matczak, and Viktoria Takacs. "Evolution of civil security systems: the case of three Central European countries." Journal of Risk Research 17 (2014).
Jovanović, M., and J. Burbiel. "The Evolving Concept of Security: A Critical Evaluation Across Four Dimensions." In Future Security Conference 2014. Berlin, 2014.
"EW Aircraft: Survive for a ‘Thick Veil’ of Interference (in Russian)." Army News (2014).
Tenet, George J., Porter J. Goss, Michael V. Hayden, John E. McLaughlin, Albert M. Calland, and Stephen R. Kappes. Ex-CIA Directors: Interrogations Saved Lives. Wall Street Journal, 2014.
Charbonneau, Louis. Exclusive: Russia Threatened Countries ahead of the U.N. Vote on Ukraine: Envoys. Reuters, 2014.
Mutlu, Mehmet Emin. Experience API ile Yaşam Günlüğüne Dayalı Öğrenme Deneyimlerinin Kaydedilmesi In inet-tr’14 - XIX. Türkiye'de İnternet Konferansı Bildirileri. İzmir: Yaşar Üniversitesi, 2014.
Vogel, Kathleen M.. "Expert Knowledge in Intelligence Assessments: Bird Flu and Bioterrorism." International Security 38 (2014): 39-71.
Holmes, James R.. "Exposing China’s Provocations." The Diplomat (2014).
ExpressCard, definition. Wikipedia.org, 2014.
K. Naik, Seena, G. A. Ramachandra, and M. V. Bramhan Reddy. "An Extended Security Framework for E-Government." International Journal of Advanced Research in Computer Science 5, no. 1 (2014): 152-154.
Gorenburg, Dmitry. External Support for Central Asian Military and Security Forces In Working Paper. Stockholm: Stockholm International Peace Research Institute and Open Society Foundations, 2014.
Lyubimov, Ivan. Extractive Institutions, Closed Borders and Economic Development., 2014.
Cao, Chen, Yanlin Weng, Shun Zhou, Yiying Tong, and Kun Zhou. "FaceWarehouse: A 3D Facial Expression Database for Visual Computing." IEEE Transactions on Visualization and Computer Graphics 20, no. 3 (2014): 413-425.
Otis, John. The FARC and Colombia’s Illegal Drug Trade. Wilson Center Latin American Program, 2014.
Federal Information Security Modernization Act., 2014.
Nita, M.-C., F. Pop, M. Mocanu, and V. Cristea. "FIM-SIM: Fault Injection Module for CloudSim Based on Statistical Distributions." Journal of Telecommunications and Information Technology 4 (2014): 14-23 .
Balzarotti, D.. Final Report on Threats on the Future Internet: A Research Outlook. SysSec Consortium, 2014.
Financial and Economic Data Relating to NATO Defence In COMMUNIQUE., 2014.
Brantly, Aaron. "Financing Terror Bit by Bit." CTC Sentinel 7, no. 10 (2014): 1-5.
First Expert Meeting of the GCTF “Foreign Terrorist Fighters” Initiative: Police and Border Law Enforcement, Judiciary, and Information Sharing. Global Counterterrorism Forum, 2014.
First SEENSA Thematic Work Group (TWG) Meeting on Cyber Defence. Belgrade: Directorate for Security of Classified Information of the Republic of Macedonia , 2014.

Pages