Biblio

Export 21347 results:
0
Chertoff, Michael, and Tobby Simon. The Impact of the Dark Web on Internet Governance and Cyber Security In GCIG Paper Series no. 6. Global Commission on Internet Governance and Chatham House.
Zayed, Khaled. "Information security awareness: managing web, mobile and endpoint security; overcoming the challenges of bring your own device." Int. J. Teaching and Case Studies 7, no. 3/4.
Bradley, M., and P. Lang. The International Affective Digitized Sounds: Affective Ratings of Sounds and Instruction Manual In IADS-2. NIMH Center for the Study of Emotion and Attention.
International CEP Handbook 2009 - Civil Emergency Planning in the NATO/EAPC Countries. Swedish Civil Contingencies Agency (MSB).
Abazi, Enika, and Albert Doja. "International Representations of Balkan Wars: A Socio-Anthropological Approach in International Relations Perspective,." Cambridge Review of International Affairs 29, no. 2.
Neumann, Peter R.. "Kapitel 13 Innere Sicherheit in Großbritannien. Die Reaktionen auf den Juni 2007." Jahrbuch Terrorismus 2.
Aliyev, Kenan. “Karimov Maintains Low Prole During U.S. Visit. Eurasianet.
Andriuškevičius, Arūnas. Kauno diena.
Tindemans, Leo. L’Union Européenne. Rapport de M.Leo Tindemans au Conseil Européen In Bulletin des Communautés Européennes, Supplément. Commission des Communautés Européennes.
Weick, Karl E., and Kathleen M. Sutcliffe. Managing the Unexpected, Resilient Performance in an Age of Uncertainty. Princeton: Princeton University Press.
Manifesto of the Pan-Russian National Front.
Velev, Grigor, and Maya Bozhilova. Model Cluster Routing Algorithm for Mobile Self-Organizing Defense and Security Networks In Scientific Conference with International Participation "The 21st Century Knowledge Society and Humanism," Sofia, (UniBIT, BAS).
Jolicoeur, Pierre, and Frederic Labarre. "NATO’s engagement in the South Caucasus: Looking for Energy Security or Expanding Norms and Values?" In Reassessing Security in the South Caucasus: Regional Conflicts and Transformation , 163-167. Farnham: Ashgate.
Thoß, Bruno. NATO-Strategie und nationale Verteidigungsplanung: Planung und Auf¬bau der Bundeswehr unter den Bedingungen einer massiven atomaren Vergel¬tungs¬strategie 1952 bis 1960 . München: München: Oldenbourg Verlag.
"Nuklearstrategie – Zwischen Abschreckung und Einsatzdoktrin." Bundeszentrale für politische Bildung.
Dai, You, Jin Yan, Xiaoxin Tang, Han Zhao, and Minyi Guo. "Online Credit Card Fraud Detection: A Hybrid Framework with Big Data Technologies." In IEEE Trustcom/BigDataSE/ISPA. Tianjin, China .
Ordinance of the Council of Ministers of 15 December 2009 .
S., Gaw, and Felten E.W.. Password Management Strategies For Online Accounts. USA: Symposium on Usable Privacy and Security (SOUPS) 2006.
Gupta, P.. "Pesticide Exposure." Toxicology Consulting Services Inc. 198: 83-90.
Gladkevich, Yury. "Poshel v Gory." Profil.
Shakespeare-Finch, Jane, Ian Shochet, Colette Roos, Cameron Craig, Deanne Maree Armstrong, Ross Young, and Astrid Wurfl. Promoting Posttraumatic Growth in Police Recruits: Preliminary Results of a Randomised Controlled Resilience Intervention Trial In Australian and New Zealand Disaster and Emergency Management Conference: Book of Proceedings. Australia: Association for Sustainability in Business Inc.
Remittance Prices Worldwide: Making Markets More Transparent. The World Bank.
Reply by the Federal Government: Procurement of weapons from the East by the Federal Intelligence Service and transit shipment to friendly states In Bundestag print.
Linkevicius, Linas. "Reset with Russia, but with Reassurance." International Herald Tribune.
McCants, Nicholas. The Resource Allocation Process and the Effects on Cybersecurity Culture In . Vol. Doctor of Information Technology. Capella University.

Pages