Biblio

Found 13409 results
2016
Werther, Joseph, Michael Zhivich, Tim Leek, and Nickolai Zeldovich. Experiences In Cyber Security Education: The MIT Lincoln Laboratory Capture-the-Flag Exercise., 2016.
Facebook’s 2016 Year in Review. Facebook Newsroom, 2016.
Features and Specifications of Distance Education System Moodle In LLC “Open Technologies” - in Russian., 2016.
García, D.A. López. "A flexible e-voting scheme for debate tools ." Computers & Security 56 (2016).
García, D. A. López. "A flexible e-Voting scheme for debating tools ." Computers & Security 56 (2016).
Wither, James K., and Sam Mullins. "Foreword." In Combating Transnational Terrorism, vii-x. Sofia: Procon Ltd., 2016.
Pomorova, Oksana, and Sergii Lysenko. "Formal and Intelligent Methods for Security and Resilience: Education and Training Issues." Information & Security: An International Journal 35, no. 2 (2016): 133-150.
Frayed Partnership. German public opinion on Russia. Gütersloh: Bertelsmann Stiftung, 2016.
French Representative to Supreme Headquarters Allied Powers Europe In Interviewed by the author Tinatin Aghniashvili. Geneva, Switzerland, 2016.
Friends of Europe., 2016.
Vadillo, Alberto Perez. "From Munich to Warsaw: NATO Rethinks Deterrence." In British American Security Information Council., 2016.
From Spain to Russia extradited a native of Latvia, was involved in the smuggle 28 kilos of cocaine. News-4-u, 2016.
Fryc, Mariusz. "From Wales to Warsaw and Beyond: NATO’s Strategic Adaptation to the Russian Resurgence on Europe’s Eastern Flank." Connections: The Quarterly Journal 15, no. 4 (2016): 45-65.
Blasch, Erik, Youakim Badr, Salim Hariri, and Youssif Al-Nashif. "Fusion Trust Service Assessment for Crisis Management Environments." In Fusion Methodologies in Crisis Management, 389-420. Galina Rogova, Peter Scott ed. Vol. Part IV. Switzerland: Springer International Publishing, 2016.
Hunger, Iris, and Filippa Lentzos. "The Future of Biothreat Governance." In Biological Threats in the 21st Century. London: Imperial College Press, 2016.
Tagarev, Todor. "A Generic Reference Curriculum on Cybersecurity." Information & Security: An International Journal 35, no. 2 (2016): 181-184.
Geographic Distribution of Cisco Networking Academies., 2016.
Chitadze, Nika. "Global Dimensions of Organized Crime and Ways of Preventing Threats at International Level." Connections: The Quarterly Journal 15, no. 3 (2016): 17-32.
Sawin, Janet. Global Security Brief #3: Climate Change Poses Greater Security Threat than Terrorism. World Watch Institute, 2016.
Komin, Michael, and Alexander Vileykis. "‘Good’ and ‘Bad’ Investments: Everything You Always Wanted to Know about Ukrainian Commanders but Were Afraid to Ask." Connections: The Quarterly Journal 15, no. 1 (2016): 57-71 .
Government Technology., 2016.
Zahid, Farhan. "Growing Evidence of Islamic State in Pakistan." Terrorism Monitor 14, no. 3 (2016): 3-5.
Growth of IT-specialists Quantity on the Separate Types of the Certification Programs. Monster Blog, 2016.
Buriro, Attaullah, Bruno Crispo, Filippo Delfrari, and Konrad Wrona. Hold & Sign: A Novel Behavioral Biometrics for Smartphone User Authentication In Proceedings of the Mobile Security Technologies Workshop (MOST), in conjunction with 37th IEEE Symposium on Security and Privacy. San Jose, CA, 2016.
Kendall, Elisabeth. "How can al-Qaeda in the Arabian Peninsula be defeated?" Wash¬ington Post (2016).

Pages