Biblio

Export 21404 results:
2013
In the margins of the BRICS summit, Vladimir Putin met with Muhammed Morsi. Vol. 29 March 2013. Vesti.ru, 2013.
Willschick, Aaron. In Too ‘DEEP.’ NATO as an Institutional Educator In NATO Association of Canada., 2013.
Treffers, Stefan R.. "Increased Globalization of Crime." In Crime Classification Manual : A Standard System for Investigating and Classifying Violent Crimes, 431-470. John Wiley & Sons, 2013.
Atanassov, Krassimir, Evdokia Sotirova, and Veselina Bureva. "On Index Matrices Part 4: New Operations over Index Matrices." Advanced Studies in Contemporary Mathe¬matics (Kyungshang) 23, no. 3 (2013): 547-552.
Watson, Sarah J., and Christine C. Fair. "India’s Stalled Internal Security Reforms." India Review 12, no. 4 (2013): 280-299.
Mavhura, Emmanuel, Siambalala Benard Manyena, Andrew E. Collins, and Desmond Manatsa. "Indigenous knowledge, coping strategies and resilience of floods in Muzarabani, Zimbabwe." International Journal of Disaster Risk Reduction 5 (2013): 38-48.
Hristov, Stoyan. Inequality in Bulgaria – Dynamics, Comparative Analysis and Reasons. Sofia: Institute for Market Economics, 2013.
Jatkauskaitė, Justina. Influence of Eu Common Energy Policy on Lithuania’s Energy Security After the Treaty of Lisbon In Euro College. Vol. Master. Tartu: University Of Tartu, 2013.
Zharkov, Jaroslav M., Volodymyr M. Petryk, Mykola M. Prysjazhnjuk, Jevhen D. Skulysh, and Larysa F. Kompanceva. Informacijno-psyhologichne protyborstvo (evoljucija ta suchasnist): monografija. Kyiv: Vipol, 2013.
Ostapenko, Hryhoriy A., Lyudmyla V. Parynova, Volodymyr Y. Belonozhkyn, Yuriy L. Bataronov, and Kyryl V. Symonov. Informacyonnye ryski v socyalnyh setjah. Voronezh: Chair of NIB, 2013.
Hilmi, Mohd Faiz, Shahrier Pawanchik, Yanti Mustapha, and Hafizi Muhamad Ali. "Information Security Perspective of a Learning Management System: An Exploratory Study." International Journal of Knowledge Society Research 4, no. 2 (2013).
Rhodes-Ousley, M.. Information Security the Complete Reference. 2nd ed., 2013.
ISO/IEC. Information technology – Security techniques – Information security management systems – Requirement., 2013.
Saetta, S., L. Tiacci, and L. Cagnazzo. "The Innovative Model of the Virtual Development Office for Collaborative Networked Enterprises: The GPT Network Case Study." International Journal of Computer Integrated Manufacturing 26, no. (1-2) (2013): 41-54.
Pwanagba, Agabus. "Insecurity: Nigerian Army to Court Martial 17 Soldiers Who Erred in Peace Operations." DailyPost (2013).
Hopkins, Nick, and Julian Borger. "Inside GCHQ: how US pays Britain’s spy agency £100m for a very special relationship." Guardian (2013): 1-2.
"Inside the Files: when did we give our consent to a secret state?" Guardian (2013): 37.
Mladen, Bajagić. "Institucionalizacija Saradnje u Bezbednosti u Evropskoj Uniji." Bezbednost, Beograd 55, no. 3 (2013): 21-35.
Starov, Oleksii, and Sergiy Vilkomir. "Integrated TaaS platform for mobile development: Architecture solutions." In 8th International Workshop on Automation of Software Test (AST). San Francisco, CA, USA , 2013.
Ibrahim, Aisha Fofana. The Integration of a Gender Perspective in the Sierra Leone Police . Geneva: DCAF, 2013.
Polyakov, Leonid. "On Integrity of Intelligence in Countries of Eastern Europe." Information & Security: An International Journal 30, no. 1 (2013): 55-63.
Intelligence assessment. Wikipedia, 2013.
Kenney, Michael C.. "Intelligence Games: Comparing the Intelligence Capabilities of Law Enforcement Agencies and Drug Trafficking Enterprises." International Journal of Intelligence and CounterIntelligence (2013): 213.
Byman, Daniel. "The Intelligence War on Terrorism." Intelligence and National Security 29, no. 6 (2013): 847.
Murugan, Sethu, and Dr.K.Kuppusamy. "Intelligent Intrusion Detection Prevention Systems." Information & Security: An International Journal 26, no. 2 (2013): 109-119.

Pages