Found 13703 results
CCNA Security In Cisco Networking Academy., 2016.
Certifications In The Cisco Learning Network., 2016.
Minchev, Zlatogor. "Challenges to Human Factor for Advance Persistent Threats Proactive Identification in Modern Social Networks." Information & Security: An International Journal 34 (2016).
Zimmerman, Katherine, and Jon Diamond. "Challenging the Yemeni State: ISIS in Aden and al Mukalla." Critical Threats (2016).
Banasik, Mirosław. "A Changing Security Paradigm. New Roles for New Actors – The Russian Approach." Connections: The Quarterly Journal 15, no. 4 (2016): 31-43.
Stroup, Anthony. Chief, Nuclear, CBRN Defence and Arms Control Policy Branch In interviewed by the author. NATO International Military Staff, 2016.
Otuko, Apio Eunice. Children born of war in northern Uganda: kinship, marriage, and the politics of post-conflict reintegration in Lango society. Vol. Thesis submitted to the University of Birmingham for the degree of DOCTOR OF PHILOSOPHY. University of Birmingham, 2016.
Kennedy, William. China and the evolution of power: What is motivating China to adopt soft power strategies and how effective have these strategies been? In Political Science: International Relations. Vol. Master Thesis. Universiteit van Amsterdam, 2016.
Cisco Networking Academy., 2016.
The Committee on the Challenges of Modern Society., 2016.
King, Joseph B.. "A Comprehensive Strategy for Combating Terrorism." In Combating Transnational Terrorism, 253-270. Sofia: Procon, 2016.
Akin, Gülsün Kiliç. "Confidence of the University Youth in Armed Forces and Information Sources." In Current Topics in Social Sciences, 474-483. Sofia: St. Kliment Ohridski University Press, 2016.
Hoffman, Frank. The Contemporary Spectrum of Conflict. Protracted, Gray Zone, Ambiguous, and Hybrid Modes of War. Washington, D.C.: The Heritage Foundation, 2016.
Nowakowska-Krystman, Aneta, and Piotr Gawliczek. "Core Competencies of Piracy and Maritime Terrorism." Journal of Defense Resources Management (2016).
Counterfeiting. Encyclopedia Britannica Online, 2016.
Willis, Daniel C.. Countering Putin’s Nuclear-backed Aggression with a Continuous Nuclear-Capable Bomber Presence In Technical Report. Newport Ri, United States: Naval War College, 2016.
Mullins, Sam. "Countering Violent Extremism." In Combating Transnational Terrorism, 199-216. Sofia: Procon, 2016.
Sawicki, John. "Counter-Terrorist Financing." In Combating Transnational Terrorism, 217-234. Sofia: Procon, 2016.
Basra, Rajan, Peter Neumann, and Claudia Brunner. Criminal Pasts, Terrorist Futures: European Jihadists and the New Crime-Terror Nexus. Vol. 5. London: International Centre for the Study of Radicalisation, 2016.
Petrov, Lachezar, Nikolai Stoianov, and Todor Tagarev. Critical Information Infrastructure Protection Model and Methodology, Based on National and NATO Study In Advances in Dependability Engineering of Complex Systems, Proceedings of the Twelfth International Conference on Dependability Problems and Complex Systems DepCoS-RELCOMEX. Brunow, Poland, 2016.
Fitton, Oliver. "Cyber Operations and Gray Zones: Challenges for NATO." Connections: The Quarterly Journal 15, no. 2 (2016): 109-119.
Topham, Luke, Kashif Kifayat, Younis A. Younis, Qi Shi, and Bob Askwith. "Cyber Security Teaching and Learning Laboratories: A Survey." Information & Security: An International Journal 35, no. 1 (2016): 51-80.
Costigan, Sean S., Michael A. Hennessy, Scott Knight, Dinos Kerigan-Kyrou, Philip Lark, Chris Pallaris, Daniel Peder Bagge, Gigi Roman, Natalia Spinu, Todor Tagarev et al. Cybersecurity: A Generic Reference Curriculum. Kingston, ON: National Defence, 2016.
Dela, Piotr. "Cyberspace as the Environment Affected by Organized Crime Activity." Connections: The Quarterly Journal 15, no. 3 (2016): 55-64.
Balcerowicz, Boleslaw. Czym jest współczesna wojna?., 2016.