Biblio

Export 21393 results:
2013
Lawson, Sean. "Motivating Cybersecurity: Assessing the Status of Critical Infrastructure as an Object of Cyber Threats." In Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection, 168-189. IGI Global, 2013.
Nuriyev, Elkhan. "Motives and Incentives for Engagement – the Russian Perspective of a Eurasian Union." In Building Confidence in the South Caucasus: Strengthening the EU’s and NATO’s Soft Security Initiatives, 59-68. Vienna: National Defense Academy, 2013.
Landon-Murray, Michael. "Moving U.S. Academic Intelligence Education Forward: A Literature Inventory and Agenda." The International Journal of Intelligence and Counter Intelligence 26, no. 4 (2013).
Landon-Murray, Michael. "Moving U.S. Academic Intelligence Education Forward: A Literature Inventory and Agenda." International Journal of Intelligence and CounterIntelligence 26, no. 4 (2013).
Multi-Agent Based Approach for Botnet Detection in a Corporate Area Network Using Fuzzy Logic In Computer Networks Communications in Computer and Information Science, Proceedings of the 20th International Conference on Computer Networks CN 2013. Vol. 370. Lwówek Śląski, Poland, 2013.
Krawczak, Maciej. Multilayer Neural Networks: A Generalized Net Perspective. Springer International Publishing, 2013.
Nenova, Stefka. Multimedia Systems. Lectures., 2013.
Shao-hua, Jiang, and Tang Wen-sheng. "A Multi-source Image Fusion Framework Supporting Parameters Optimization." Computer Engineering 39, no. 10 (2013).
McChrystal, Stanley. My Share of the Task: a Memoir. New York: Penguin, 2013.
Anzalone, Christopher. "The Nairobi Attack and Al-Shabab’s Media Strategy." CTC Sentinel 6, no. 10 (2013): 2.
Wu, King-Chuen. "Nanotechnology in the Regulation of Stem Cell Behavior." Science and Technology of Advanced Materials 14 (2013).
Commission, European. Nanotechnology: The Invisible Giant Tackling Europe’s Future Challenges. Luxembourg: Publication Office of the European Union, 2013.
Cawley, Marguerite. Narcos Exchanging Arms for Protection from Paraguay's EPP: Officials. InSightCrime, 2013.
Hir, Joseph. Nasarawa Killings: How Police Insiders Tipped-off Cultists. allAfrica.com, 2013.
National Cyber Security Strategy and 2013-2014 Action Plan. Republic of Turkey Ministry of Transport, Maritime Affairs and Communications, 2013.
National Coordinator for Security and Counterterrorism. National Cyber Security Strategy of Netherland., 2013.
National Programme for Disaster Protection 2014-2018., 2013.
National progress report on the implementation of the Hyogo Framework for Action (2011-2013)., 2013.
On the National Strategy for the Development of Information Society “Digital Moldova 2020” In Government Decision of the Republic of Moldova., 2013.
National Waste Management Strategy., 2013.
Nations in Transit 2013: Authoritarian Aggression and the Pressures of Austerity. Washington, D.C.: Freedom House, 2013.
Simón, Luis. "NATO." In Tactical Nuclear Weapons and Euro-Atlantic Security: The Future of NATO, 107-124. New York: Routledge, 2013.
edivý, Jirí Š.. NATO and Reserve Forces – a Czech View. The Officer, 2013.
Nielsen, Nikolaj. "NATO Commander: EU could Not Do Libya without US." EU Observer (2013).
Conley, Heather A., and Maren Leed. NATO in the Land of Pretend. Center for Strategic and International Studies, 2013.

Pages