Biblio

Export 21393 results:
2013
"Base Agreement Will Boost Russia-Tajikistan Relations." The Oxford Analytica Daily Brief (2013).
On the basic principles to ensure cybersecurity of Ukraine In Law of Ukraine., 2013.
Herschinger, Eva. "A Battlefield of Meanings: The Struggle for Identity in the UN Debates on a Definition of International Terrorism." Terrorism and Political Violence 25, no. 2 (2013): 183-184.
Pielmus, Crisitina. "Between Two Cultures: From the Military Culture to University Culture. Conclusions on the Organisation for Police Officers’ Initial Training." Revista Academiei Fortelor Terestre 4, no. 72 (2013): 374-382.
Lawson, Sean. "Beyond Cyber-Doom: Assessing the Limits of Hypothetical Scenarios in the Framing of Cyber-Threats." Journal of Information Technology & Politics 10, no. 1 (2013).
Rahbek-Clemmensen, Jon. Beyond 'the soldier and the state'-the theoretical framework of elite civil-military relations. London: London School of Economics and Political Science, 2013.
Big Data. MSIS Wiki, 2013.
Ishikawa, Tomoya. "Big Data Business to Kojin Jyoho Hogo [Big Data Business and Protection of Personal Data]." Asahi Judiciary (2013).
Takahashi, Haruo. Big Data Hosei no Kokusai Hikaku [Comparison of Legal Framework of Big Data]. KDDI Research Institute, 2013.
Block, Cobus. Bilateral Trade Between Xinjiang and Kazakhstan: Challenges or Opportunities?. China Policy Institute Blog, 2013.
Sharma, Ajay, and Deo Brat Ojha. "Biometric Template Security Using Code Base Cryptosystem." Information & Security: An International Journal 26, no. 2 (2013): 47-57.
BMZ. BMZ Strategy Paper – An Overview of the Role of ICT in German Development Cooperation In Schlüsseltechnologien für eine nachhaltige Entwicklung. Informations- und Kommunikationstechnologien (IKT), 2013.
Azinovic, Vlado. "Bosnia and Herzegovina and Terrorism 1996-2011: Defining the Threat, Devising Counterterrorism Strategy." In The Dangerous Landscape, 191-209., 2013.
Perez, Evan, Devlin Barrett, and Andrew Grossman. "Boston Bomb Clues Surface." The Wall Street Journal (2013).
Cullison, Alan. "Boston Bombing Suspect Was Steeped in Conspiracies." The Wall Street Journal (2013).
Gerstein, Josh. Boston Bombing Suspects’ Parents Granted Divorce in 2011. Politico.com, 2013.
Madden, Lance. "Boston Marathon Bombing Suspect No. 1 Tamerlan Tsarnaev Trained to Box for U.S." Forbes (2013).
S., Lysenko, Savenko O., A. Kryshchuk, and Y. Klyots. Botnet detection technique for corporate area network In Proceedings of the 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems. Berlin, DE: IEEE, 2013.
"Brahimi to Stay on as Syria Envoy after Russia-U.S. Bid." Al-Arabiya (2013).
Roell, Peter. Brazilian and European Perspectives on the Global Security Order In ISPSW Strategy Series: Focus on Defense and International Security. Institut für Strategie- Politik- Sicherheits- und Wirtschaftsberatung ISPSW, 2013.
Borger, Julian, and Ian Traynor. "Brazilian president launches ferocious attack on NSA spying." Guardian (2013): 4.
Armando, Alessandro, Gabriele Costa, and Alessio Merlo. Bring Your Own Device, Securely In 28th Annual ACM Symposium on Applied Computing, SAC’13. Coimbra, Portugal, 2013.
British Ambassador Jonathan Allen: Should I be an Optimist or a Pessimist for Bulgaria? In Speech. Foreign & Commonwealth Office, 2013.
Rühle, Michael. The Broader Context of NATO’s Nuclear Policy and Posture. Rome: NATO Defense College, 2013.
Raybourn, Tracey. Bucketization Techniques for encrypted databases: Quantifying the impact of Query Distributions In Graduate College of Bowling Green State University. Vol. Master of Science., 2013.

Pages