Biblio

Export 21393 results:
2014
ISO/IEC 27000:2014 (E) Technologies de l’Information — Techniques de sécurité — Systèmes de management de la sécurité de l’information — Vue d'ensemble et vo-cabulaire., 2014.
Kershen, Isabel. "Israel Says It Seised Iranian Shipment of Rockets Headed for Gaza, New York Times." The NY Times (2014).
Izvještaj o Stanju Sistema Zaštite i Spašavanja u Crnoj Gori u 2013 Godini. Ministry of Interior, 2014.
Hemmingsen, Ann-Sophie. "Jeg En Stat Mig Bygge Vil." In Terrorisme Og Trusselsvurderinger. København: Dansk Institut for Internationale Studier, 2014.
Jones, Sam. Jihad by Social Media: How Thousands of Young Muslims are Being Radicalised Through Social Networks and Propelled Towards Violence in Syria. FT Magazine, 2014.
Smith, Hannah Lucinda. The Jihadi Transporter. Vice, 2014.
Maiangwa, Benjamin. "Jihadism in West Africa: Adopting a Three-Dimensional Approach to Counterterrorism." Journal of Peacebuilding & Development 2, no. 3 (2014): 17-32.
Mandalenakis, Elena. "Joint Management: Peacemaking and Peacekeeping." In What Kind of Sovereignty? Examining Alternative Governance Methods in the South Caucasus, 43-57. Vienna: National Defence Academy, 2014.
Đuranović, Draško. Kad Moskva pozove [When Moscow Calls]. Portal Analitika, 2014.
Hidenori, Fuke. "Kaisen Kaiho no Rekishitei Igi: Bigdata to Tsushin no Himitsu no Kanten kara [Historical Implication of Liberalisation of Circuit Use: From the Perspective of Big Data and Secrecy of Telecommunications]." Journal of Global Media Studies 13, no. 3 (2014): 59-73.
Seidler, Felix. "Kapitel 16 Enduring Freedom und Active Endeavour: Wie effektiv kann maritime Terrorismusbekämpfung sein? ." Jahrbuch Terrorismus 6 (2014).
Gayer, Laurent. Karachi: Ordered Disorder and the Struggle for the City. New York: Oxford University Press, 2014.
Kazakhstan after … Kazakhstan without Nazarbayev: the moment of truth. Central Asia Monitor, 2014.
Kenya Cybersecurity Report 2014. Rethinking cyber security “An Integrated Approach: Process, Intelligence and Monitoring“. Serianu Ltd., 2014.
Raymond, David, Tom Cross, and Michael Nowatkowski. Key Terrain in Cyberspace: Seeking the High Ground In 6th International Conference on Cyber Conflict. Tallinn, Estonia, 2014.
Rubenstein-Dunlop, Sean. Khaled Sharrouf: The Australian radical fighting for Islamic State in Iraq and Syria. ABC News, 2014.
Lis, Andrzej. "Knowledge Creation and Conversion in Military Organizations: How the SECI Model is Applied within Armed Forces." Journal of Entrepreneurship Management and Innovation 10, no. 1 (2014): 57-78.
Mabey, C., A.L.Y. Wong, and L. Hsieh. "Knowledge Exchange in Networked Organizations: Does Place Matter? ." R&D Management 45, no. 5 (2014): 487-500.
Mabey, C., A.L.Y. Wong, and L. Hsieh. "Knowledge Exchange in Networked Organizations: Does Place Matter? ." R&D Management 45, no. 5 (2014): 487-500.
Klaic, Aleksandar. Knowledge Management Based Method for Modeling of Information Security Policies (in Croatian) In Faculty of Electrical Engineering and Computing. Vol. Doctoral Thesis. Zagreb, 2014.
Kontr-admiral Berezovskiy pytalsia zachvatit’ stab VMS Ukrainy [Rear Admiral Berezovskiy Tried to Seize the Headquarters of the Ukrainian navy]. Fakty i Kommentarii, 2014.
Jolicoeur, Pierre, and Frederic Labarre. "The Kosovo Model: A (Bad) Precedent for Conflict Management in the Caucasus?" Connections: The Quarterly Journal 13, no. 3 (2014): 41-57.
Pavlovskiy, Gleb. "The Kremlin: from Conservative Policy to Revolution (in Russian)." Russia in Global Affairs 3 (2014).
Ioffe, Julia. Kremlin Henchman: The Only Thing I Like About America is Tupac (And Sanctions Won’t Keep Me From Listening). New Republic, 2014.
Jundzis, Tālavs. "Krievijas karaspēka izvešana no Latvijas 1992-1994: diplomātiska uzvara vai politiska piekāpšanās?" LZA Vēstis 68, no. 3/4 (2014): 4-22.

Pages