Biblio

Export 21393 results:
2014
Masi, Alessandria. "Here’s How ISIS Recruits Westerners." Business Insider (2014).
Bienaimé, Pierre. "Here’s Why So Many of Tunisia’s Youth Are Drawn to ISIS." Business Insider, last modified (2014).
Mantoux, Stéphane. Hide These Jihadists That I Can’t See: The French Volunteers In Syria. Jihadology, 2014.
High Representative of the Union for Foreign Affairs and Security Policy., 2014.
Barlow, Caleb. "Highlights and Insights." In RSA 2014 Conference., 2014.
How a Georgian sergeant became a Jihad leader in Iraq. Vol. 8 July 2014. BBC (Russian Service), 2014.
Karadsheh, Jomana, Jim Sciutto, and Laura Smith-Spark. How Foreign Fighters Are Swelling ISIS Ranks in Startling Numbers. CNN, 2014.
Ajbaili, Mustapha. How ISIS Conquered Social Media. Al Arabiya News, 2014.
J.M., Berger. How ISIS Games Twitter., 2014.
Pomerantsev, Peter. "How Russia Is Revolutionizing Information Warfare." Defense One (2014).
Read, Oliver. "How the 2010 Attack on Google Changed the US Government’s Threat Perception of Economic Cyber Espionage." In Cyberspace and International Relations, 203-230 . Berlin, Heidelberg : Springer, 2014.
Dokos, Thanos. "How the EU got it so Wrong in Ukraine." Europe’s World (2014).
Galeotti, Mark. "How the Invasion of Ukraine Is Shaking Up the Global Crime Scene." Vice News (2014).
Nuriyev, Elkhan. "How the West Helps Putin Fulfill His CIS Strategy." The Moscow Times (2014).
Bhalla, Gaurav. "How to plan and manage a project to co-create value with stakeholders." Strategy & Leadership 42, no. 2 (2014): 19-25.
Heiges, Mike, Rob Bever, and Kyle Carnahan. How to Safely Flight Test a UAV Subject to Cyber-Attacks In Cyber Defence Situation Awareness Symposium (STO-MP-IST-999), ., 2014.
HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack. HP News, 2014.
Human Development Index – Countries. United Nations, 2014.
Hai-Jew, S.. "Human rights, the global war on transnational terror, and the mixed roles of ICT: A meta-analysis." In Cyber Behavior: Concepts, Methodologies, Tools, and Applications , 1260-1294 ., 2014.
Solana, Javier. A Human Security Doctrine for Europe: The Barcelona Report of the Study Group on Europe’s Security Capabilities In Presented to EU Representative for Common and Security Policy. Study Group on Europe’s Security Capabilities, 2014.
The Huthis: From Saada to Sanaa. International Crisis Group, 2014.
Malekpour, Milad, Maryam Khademi, and Behrouz Minae-Bidgoli. "A Hybrid Data Mining Method for Intrusion and Fraud Detection in E-Banking Systems." Journal of Computational Intelligence and Electronic Systems 3, no. 1–6 (2014).
Hristov, Neno. "The Hybrid Threats: The New Challenge to the Security Sector (in Bulgarian)." Military Journal 121, no. 4 (2014): 111-117.
Horbulin, Volodymyr. "’Hybrid War’ as a key tool for Russian geostrategy of revenge." Strategic Priorities 4 (2014): 5.
"Hybrid Warfare: Briefing to the Subcommittee on Terrorism, Unconventional Threats and Capabilities." Committee on Armed Services, House of Representatives, 2014.

Pages