Biblio

Export 21393 results:
2014
Arfi, Nabat, and Shalini Agarwal. "A Study on Level of Knowledge Regarding Cybercrime Among Elderly Residing in Homes and Old Age HOMES." International Journal for Research in Applied Science and Engineering Technology 2, no. 7 (2014): 30-34.
Yin, Robert K.. Study Research, Design and Methods. 5th ed. Thousand Oaks: Sage Publications, 2014.
The sum total of state companies’ debt is 140 billion UAH – Yatsenyuk. RBC-Ukraine, 2014.
Young, Joseph K., and Laura Dugan. "Survival of the Fittest: Why Terrorist Groups Endure." Perspectives on Terrorism 8, no. 2 (2014): 2-23.
Jasna, Šinigoj, Podboj Martin, Komac Marko, Požar Mitja, Krivic Matija, and Jemec-Auflic Mateja. Susceptibility map of triggering landslides due to rainfall forecast as a part of innovative inspire compliant cloud based infrastructure – InGeoCloudS In Geophysical Research Abstracts., 2014.
Suspend and Hibernate. Archlinux.org, 2014.
Hawkins, Timothy G., Wesley S. Randall, Adam V. Coyne, and Mohammad H. Baitalma. "Sustainable integrity: how reverse auctions can benefit suppliers in emerging markets." Supply Chain Management: An International Journal 19, no. 2 (2014): 126-141.
Matusitz, Jonathan. Symbolism in Terrorism: Motivation, Communication, and Behavior. Lanham, MD: Rowman & Littlefield, 2014.
Jefferson, Catherine, Filippa Lentzos, and Claire Marris. "Synthetic Biology and Biosecurity: Challenging the ‘Myths’." Frontiers in Public Health 226, no. 115 (2014).
Nichols, Michelle. Syria Accuses Rebels of Planning Gas Attack Near Damascus. Vol. September 15, 2015. Reuters, 2014.
Sly, Liz, and Ahmed Ramadan. "Syrian regime, rebels reach deal to aid besieged Homs." The Washington Post (2014).
Ihmouda, Rabia, Najwa Hayaati Mo Alwi, and Ismail Abdullah. "A Systematic Review on E-government Security Aspects." International Journal of Enhanced Research in Management & Computer Applications 3, no. 6 (2014): 60-67.
System/Network Administrators from the Former Yugoslav Republic of Macedonia Train in Cyber Defence. NATO A-Z, 2014.
Minkina, Mirosław. Sztuka wywiadu w państwie współczesnym [The Art of Intelligence in the Modern State]. Warszawa: Oficyna Wydawnicza “Rytm”, 2014.
Frye, Timothy. "A Tale of Two Russian Narratives." Perspectives on Peace & Security (2014).
Powell, Jonathan. Talking to Terrorists: How to End Armed Conflicts. London: The Bodley Head, 2014.
Krempel, Erik, and Jürgen Beyerer. "TAM-VS: A Technology Acceptance Model for Video Surveillance." In Privacy Technologies and Policy, Lecture Notes in Computer Science, 86-100. Vol. 8450. Cham: Springer, 2014.
Zimmerman, Carson. Ten Strategies of a World-Class Cybersecurity Operations Center. MITRE, 2014.
Çağlar, Ü. "Terror and Economy." IPAD/İktisat Politikası Araştırmaları Dergisi 1, no. 1 (2014): 67-79.
Nissen, Thomas Elkjer. "Terror.com – IS’s Social Media Warfare in Syria and Iraq." Contemporary Conflicts 2, no. 2 (2014): 1-8.
Bachmann, Sascha-Dominik, and Hakan Gunneriusson. "Terrorism and Cyber Attacks as Hybrid Threats: Defining a Comprehensive Approach for Countering 21st Century Threats to Global Peace and Security." The Journal of Terorism and Security Analysis (2014): 26-36.
Levitt, Matthew. Terrorist Financing and the Islamic State In Testimony submitted to the House Committee on Financial Services. Washington Institute, 2014.
Cilluffo, Frank J., and Joseph R. Clark. "Thinking About Strategic Hybrid Threats – In Theory and in Practice." PRISM 4, no. 1 (2014): 47-63.
Milashina, Elena. "The Threat to Shoot Someone in the Forehead Is Not Illegal?" Novaya Gazeta (2014).
Threats to International Peace and Security Caused by Terrorist Acts In S/RES/2178 (2014). UN Security Council, 2014.

Pages