Export 17821 results:
Sestrimski, Borislav. "Study on the Level of Cybersecurity and the Mechanisms for Citizens' Contribution to Preventive Policies." In DIGILIENCE 2019. Sofia, Bulgaria, 2019.
SysSec Red Book Web Page., 2019.
Zaslavskyi, Volodymyr, and Maya Pasichna. "System Approach Towards the Creation of Secure and Resilient Information Technologies in the Energy Sector." Information & Security: An International Journal 43, no. 3 (2019): 318-330.
Shchoholiev, Maksym, and Violeta Tretynyk. "The System of Operative Determination of the Level of Tension in Society Based on Data from Social Networks." Information & Security: An International Journal 43, no. 3 (2019): 375-382.
Pernin, Christopher G., Jakub P. Hlavka, Matthew E. Boyer, John Gordon, IV, Michael Lerario, Jan Osburg, Michael Shurkin, and Daniel C. Gibson. Targeted interoperability: A new imperative for multinational operations. RAND Corporation, 2019.
Tumkevič, Agnija. Tarptautinio bendradarbiavimo ir konflikto potencialas kibernetinėje erdvėje. Vol. Daktaro disertacija. Vilniaus Universitetas, 2019.
Srivastava, Rachit. "Terrorism in Central Asia." Research journal of social sciences 10, no. 7 (2019): 179-185.
Andreev, Metodi. There was nothing in the reports of the special services about Russian espionage and Gebrev’s poisoning. FrogNews, 2019.
Iliev, Ilia. They are pointing to Russia, aiming at Europe. Trud, 2019.
Minchev, Zlatogor, Pavlin Kutinchev, and Ivan Gaydarski. Top 10 live threats to cyberspace in 2019 In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2019.
Traficom – About us., 2019.
Pitman, Lora. The Trojan Horse in Your Head: Cognitive Threats and How to Counter Them In International Studies. Vol. Doctor of Philosophy (PhD). Old Dominion University, 2019.
Waheed, Ahmed W.. "The ‘Truth About Pakistan’: Knowledge Production and Circulation in Think Tanks." In Constructing 'Pakistan' through Knowledge Production in International Relations and Area Studies. Singapore : Palgrave Macmillan, 2019.
Tagarev, Todor. "Understanding Hybrid Influence: Emerging Analysis Frameworks." In DIGILIENCE 2019. Sofia, Bulgaria, 2019.
Özkurt, Fatma Zeynep. "Understanding the Continuity and Change in the European Union’s Policies on the Mediterranean and the MENA Region after the Arab “Spring” Uprisings." Journal of Security Strategies (Güvenlik Stratejileri Dergisi) 15, no. 29 (2019): 43-77.
The Unified Modeling Language (UML) Web Page., 2019.
Uptime Institute., 2019.
Andriichuk, Oleh, Vitaliy Tsyganok, Dmitry Lande, Oleg Chertov, and Yaroslava Porplenko. "Usage of Decision Support Systems for Conflicts Modelling during Information Operations Recognition." In DIGILIENCE 2019., 2019.
Dulschi, Olivia. Utilisation of Security Systems in Public Administration In Conferinței Științifice Internaționale "Contribuția tinerilor cercetători la dezvoltarea administrației publice". Chișinău: Academia de Administare Publică, 2019.
Aaltola, Kirsi, and Petteri Taitto. "Utilising Experiential and Organizational Learning Theories to Improve Human Performance in Cyber Training." Information & Security: An International Journal 43, no. 2 (2019): 123-133.
Bontchev, Vesselin. "A VBA P-Code Disassembler." In DIGILIENCE 2019. Sofia, Bulgaria, 2019.
Verizon Data Breach Investigation Report 2019. Verizon business ready, 2019.
Petrov, Daniel. Vultures of Law and Morality., 2019.
Omelicheva, Mariya, and Lawrence Markowitz. Webs of Corruption: Trafficking and Terrorism in Central Asia. New York: Columbia University Press, 2019.
What are the Top Ten Data Center Best Practices?. TechXact, 2019.