Biblio

Export 21404 results:
2017
Michev, Stefan. Protection of Critical Infrastructure – An Element of Security Policy In XIV International Scientific Conference Management and Engineering ’17 . Sozopol, Bulgaria, 2017.
On the Protection of Cultural Heritage In Law of Ukraine., 2017.
Protocol of the meeting für Inneres, Sicherheit und Ordnung., 2017.
Protocol of the meeting of the committee of home affairs Berliner Abgeordneten-haus., 2017.
Protocol of the special meetings No. 101., 2017.
Protocol of the special meetings No. 103., 2017.
Protocol of the special meetings No. 105., 2017.
NESA. Public Private Partnerships (PPP) Cooperative models. European Union Agency for Network and Information Security, 2017.
ENISA. Public Private Partnerships (PPP) – Cooperative Models., 2017.
K.E., Eichensehr. "Public-Private Cybersecurity." Texas Law Review 95, no. 3 (2017): 467-538.
Sinclair, Harriet. Putin Bans VPNs in Crackdown on Anonymous Internet Use in Russia. Newsweek, 2017.
Schindler, John R.. Putin’s Balkan Terror Plot Exposed. Observer, 2017.
Security, IBM. QRadar Version 7.3.1 Administration Guide., 2017.
Security, IBM. QRadar Version 7.3.1 User guide., 2017.
Poryazov, Stoyan, Dmytro Progonov, and Emiliya Saranova. "Quality of Telecommunications as a Composition of Qualities of Subservices, Including Security and Trusted Third Parties." In 2017 25th Telecommunication Forum (TELFOR). Belgrade, Serbia, 2017.
Hemmings, John. Quasi-alliances, managing the rise of China, and domestic politics: the US-Japan-Australia trilateral 1991-2015. Vol. PhD thesis. The London School of Economics and Political Science (LSE), 2017.
Castro-Arvizu, Juan Manuel, Jordi Vila`-Valls, Ana Moragrega, Pau Closas, and Juan A. Fernandez-Rubio. "Received signal strength–based indoor localization using a robust interacting multiple model–extended Kalman filter algorithm." International Journal of Distributed Sensor Networks 13, no. 8 (2017).
Castro-Arvizu, Juan Manuel, Jordi Vilà-Valls, Ana Moragrega, Pau Closas, and Juan A. Fernandez-Rubio. "Received signal strength–based indoor localization using a robust interacting multiple model–extended Kalman filter algorithm." International Journal of Distributed Sensor Networks 13, no. 8 (2017).
Hidayah, Maulidia Rahmah, Isa Akhlis, and Endang Sugiharti. "Recognition Number of The Vehicle Plate Using Otsu Method and K-Nearest Neighbour Classification." Scientific Journal of Informatics 4, no. 1 (2017).
Couture, Jean-René. "Reconciling Operational and Financial Planning Views in a Customer-Funded Organization: Making Customer-Funding Work for NC3A." Information & Security: An International Journal 38 (2017): 63-69.
Kaplan, Jeffrey. "Red Dawn is Now: Race vs. Nation and the American Election." Terrorism and Political Violence 29, no. 3 (2017).
Siudak, Piotr. "Redefining cybersecurity through processual ontology of the cyberspace." Politeja 50, no. 14 (2017): 194-211.
Reform der Sicherheitsbehörden – Wie wär’s mit einem deutschen FBI?. Spiegel online, 2017.
Croissant, Aurel, and David Kuehn. Reforming Civil-Military Relations in New Democracies: Democratic Control and Military Effectiveness in Comparative Perspectives. Springer International Publishing AG , 2017.
Kocharyan, Hayk. Regional Security Dynamics: Azerbaijan In Analytical Bulletin: Center for Civilization and Cultural Studies., 2017.

Pages