Biblio

Export 21393 results:
2019
World Employment and Social Outlook. Geneva: International Labor Organization, 2019.
Aron, Raymond, Kishore Mahbubani, Fawaz Gerges, Alioune Sall, Nicole Gnesotto, and Jared Cohen. The world in 10 years. Institut Français des Relations Internationales (IFRI) , 2019.
XII. Správa ZNB [12th Directorate of the National Security Corps]., 2019.
XII. Správa ZNB, popis odborov [12th Directorate of the National Security Corps, description of departments]., 2019.
Deutscher Bundestag. Zum Verhältnis der Militärausgaben der NATO-Mitgliedstaaten. Wissenschaftlicher Dienst, 2019.
Тарнавська, Ірина. Інформаційно-Аналітичне Забезпечення Євроінтеграційних Процесів в Україні. Vol. Дисертація. Дніпро: Дніпровський національний університет імені Олеся Гончара, Міністерство освіти і науки України, 2019.
Доронін, Іван. "Контрольні Повноваження Президента України у Сфері Національної Безпеки: Проблеми і Перспективи." Адміністративне право і процес 2 (2019).
Николић, Дејан Ж., Митар Ковач, and Влада М. Митић. "Менаџмент у одбрани – основне функције [Defence Management – Main Functions]." Воjно дело 71, no. 1 (2019): 99-126.
. Основи на киберсигурността . София: Авангард, 2019.
2018
10 IT management certifications for IT leaders. CIO, Communications, IDG, 2018.
2018 Aspen Cyber Summit., 2018.
2018 Best Practice Guidelines for the EU Code of Conduct on Data Centre Energy Efficiency In JRC Technical Reports. European Commission, 2018.
2018 Payment Security Report. Verizon, 2018.
Jiang, Luo, Juyong Zhang, Bailin Deng, Hao Li, and Ligang Liu. "3D Face Reconstruction with Geometry Details from a Single Image." IEEE Transactions on Image Processing 27, no. 10 (2018): 4756-4770.
Seif, George. The 5 Clustering Algorithms Data Scientists Need to Know., 2018.
Abschlussbericht des Sonderbeauftragten des Senats für die Aufklärung des Handelns der Berliner Behörden im Fall AMRI. Berlin.de , 2018.
J., Singh, Reed C., Cobbe J., Crowcroft J., and Millard C.. "Accountability in the IOT: Systems, Law, and Ways Forward." Computer 51, no. 7 (2018): 54-65.
United States Cyber Command. Achieve and Maintain Cyberspace Superiority: Command Vision for US Cyber Command., 2018.
Commission, European. Action Plan against Disinformation In High Representative of the Union for Foreign Affairs and Security Policy. Brussels, 2018.
Dong, Ying, Yuqing Zhang, Hua Ma, Qianru Wu, Qixu Liu, Kai Wang, and Wenjie Wang. "An adaptive system for detecting malicious queries in web attacks." Science China Information Sciences 61 (2018).
Akgül, Yakup. "Adoption of E-Government Services in Turkey." AJIT-e: Online Academic Journal of Information Technology 9, no. 32 (2018).
Brown, T.B., D. Mané, A. Roy, M. Abadi, and J. Gilmer. "Adversarial Patch." arXiv e-prints (2018).
Roloff, Ralf, and Pàl Dunay. "The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank." Connections: The Quarterly Journal 17, no. 2 (2018): 19-35.
Mylrea, Michael. AI Enabled Blockchain Smart Contracts: Cyber Resilient Energy Infrastructure and IoT In 2018 AAAI Spring Symposium Series., 2018.
Alert (TA18-106A) Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices. US Department of Homeland Security, 2018.

Pages