Found 16334 results
Chertoff, Michael, and Tobby Simon. The Impact of the Dark Web on Internet Governance and Cyber Security In GCIG Paper Series no. 6. Global Commission on Internet Governance and Chatham House.
Zayed, Khaled. "Information security awareness: managing web, mobile and endpoint security; overcoming the challenges of bring your own device." Int. J. Teaching and Case Studies 7, no. 3/4.
Bradley, M., and P. Lang. The International Affective Digitized Sounds: Affective Ratings of Sounds and Instruction Manual In IADS-2. NIMH Center for the Study of Emotion and Attention.
International CEP Handbook 2009 - Civil Emergency Planning in the NATO/EAPC Countries. Swedish Civil Contingencies Agency (MSB).
Abazi, Enika, and Albert Doja. "International Representations of Balkan Wars: A Socio-Anthropological Approach in International Relations Perspective,." Cambridge Review of International Affairs 29, no. 2.
Neumann, Peter R.. "Kapitel 13 Innere Sicherheit in Großbritannien. Die Reaktionen auf den Juni 2007." Jahrbuch Terrorismus 2.
Aliyev, Kenan. “Karimov Maintains Low Prole During U.S. Visit. Eurasianet.
Andriuškevičius, Arūnas. Kauno diena.
Tindemans, Leo. L’Union Européenne. Rapport de M.Leo Tindemans au Conseil Européen In Bulletin des Communautés Européennes, Supplément. Commission des Communautés Européennes.
Manifesto of the Pan-Russian National Front.
Ordinance of the Council of Ministers of 15 December 2009 .
S., Gaw, and Felten E.W.. Password Management Strategies For Online Accounts. USA: Symposium on Usable Privacy and Security (SOUPS) 2006.
Gladkevich, Yury. "Poshel v Gory." Profil.
Reply by the Federal Government: Procurement of weapons from the East by the Federal Intelligence Service and transit shipment to friendly states In Bundestag print.
Linkevicius, Linas. "Reset with Russia, but with Reassurance." International Herald Tribune.
Douglas, Nadja. "Revising the Framework of Civilian Control." In Public Control of Armed Forces in the Russian Federation, 63-104. Cham: Palgrave Macmillan.
Llanque, Marcus. "The Rhetoric of intellectual Manifestos from the First World War to the War against Terrorism." In The Ashgate Research Companion to the Politics of Democratization in Europe. Ashgate Publishing, Ltd.
Sato, H., M. Kubo, and A. Namatame. "Sato, H." In Soft Computing and Intelligent Systems (SCIS) and 13th International Symposium on Advanced Intelligent Systems (ISIS), 2012 Joint 6th International Conference on. Kobe: IEEE.
Kuldeep, Singh, Jøsang Audun, Sadek Ferdous, and Ravishankar Borgaonkar. Spam Filter Optimality Based on Signal Detection Theory In 2nd international conference on Security of information and networks. Famagusta, North Cyprus.
Standards of higher education 1701 “Information Security“.
Holliday, P.. "SWARMM - a mobility modelling tool for tactical military networks." In Military Communications Conference. San Diego, CA: IEEE.
Shaw, Mark. Typologies of Transnational Organized Crime Groups. Centre for International Crime Prevention, UNODC.
Ugroza terrorizma v Rossii sokhranaetsya [The Terrorist Threat in Russia Remains]. Rosbalt.
Sapolsky, Harvey M., Eugene Gholz, and Caitlin Talmadge. US Defense Politics: The origins of security policy. Routledge.
U.S. Response to Crisis in Kyrgyz Republic, Uzbekistan. U.S. Department of State.