Biblio

Export 21393 results:
2009
Corruption Perceptions Index results for 2008. Transparency International, 2009.
Council Decision of 6 April 2009 establishing the European Police Office (Europol)., 2009.
Zajas, Stanisław. "Countering Air Terrorism." Connections: The Quarterly Journal 8, no. 4 (2009): 1-10.
Kirk-Smith, Michael, and James Dingley. "Countering Terrorism in Northern Ireland: The Role of Intelligence." Small Wars and Insurgencies 20, no. 3–4 (2009): 551-73.
Staff, Joint Chiefs of. Counterinsurgency Operations In Joint Publication., 2009.
Hoffman, Bruce. "A Counterterrorism Strategy for the Obama Administration." Terrorism and Political Violence 21 (2009): 369-70.
Country Analysis Brief: China. U.S. Energy Information Administration, 2009.
Country Reports on Terrorism 2008. State Department, Office of the Coordinator for Counterterrorism, 2009.
Delamaire, Linda, Hussein Abdou, and John Pointon. "Credit card fraud and detection techniques: A review." Banks and Bank Systems 4, no. 2 (2009): 57 .
Delamaire, L., HAH Abdou, and J. Pointon. "Credit card fraud and detection techniques : a review." Banks and Bank Systems 4, no. 2 (2009): 57-68.
Tagarev, Todor. Crisis Management in a multilateral context In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2009.
Alutaibi, Khaled Shuraem. Critical Infrastructure Protection in Saudi Arabia: A Case on Petrochemical Industry Protection against Terrorist Attacks at Jubail Industrial City (JIC) In Diss. King Fahd University of Petroleum and Minerals., 2009.
Alutaibi, Khaled Shuraem. Critical Infrastructure Protection in Saudi Arabia: A Case Study on Petrochemical Industry Protection Against Terrorist Attacks at Jubail Industrial City. Dhahran, Saudi Arabia: King Fahd University of Petroleum & Minerals, 2009.
Lou, Eric Choen Weng, and Mustafa Alshawi. "Critical success factors for e-tendering implementation in construction collaborative environments: people and process issues." Journal of Information Technology in Construction (ITcon) 14 (2009).
Jackson, Richard, Marie Been Smyth, and Jeroen Gunning. Critical Terrorism Studies: A New Research Agenda. London: Routledge, 2009.
Lo, Nai Wei, and Kuo-Hui Yeh. "Cryptanalysis of Two Three-Party Encrypted Key Exchange Protocols." Computer Standards & Interfaces 31, no. 6 (2009).
Pilon, Juliana Geran. Cultural Intelligence for Winning the Peace. Washington DC: The Institute of World Politics Press, 2009.
Current Practices in Electronic Surveillance in the Investigation of Serious and Organized Crime In United Nations Publications. UNODC, 2009.
Wilson, Clay. "Cyber Crime." In Cyberpower and National Security, 415. Washington, D.C.: National Defense University Press, 2009.
Australian Government, Attorney-General's Department. Cyber Security Strategy of Australian., 2009.
Cyber Security Strategy of the United Kingdom: safety, security and resilience in cyber space. UK Cabinet Office, 2009.
Schaap, Arie J.. "Cyber Warfare Operations: Development and Use Under International Law." Air Force Law Review 64 (2009): 121-173.
Karatzogianni, Athina. Cyber-Conflict and Global Politics. Routledge, 2009.
Libicki, Martin C.. Cyberdeterrence and Cyberwar . Santa Monica, CA: RAND, 2009.
Libicki, Martin. Cyberdeterrence and Cyberwarfare. Santa Monica, CA: RAND, 2009.

Pages