Biblio
Export 8061 results:
Filters: Filter is [Clear All Filters]
Сигурност на дисковете с пълно хардуерно криптиране. Видове атаки In IT4Sec Reports. София: Институт по информационни и комуникационни технологии, 2014.
Що е реиндустриализация и има ли тя почва у нас. Glasove.com, 2014.
"2 e-mail services close and destroy data rather than reveal files." New York Times (2013).
2011 Request for Information on Tamerlan Tsarnaev from Foreign Government In National Press Release. Federal Bureau of Investigation, 2013.
2013 Freedom in the World. Washington, D.C.: Freedom House Report, 2013.
99 Red Balloons: How War With China Would Start. War on the Rocks, 2013.
Abkhazia: Russia’s Attempts to Create a Nation-state. Russia & India Report, 2013.
Abkhazia: The Long Road to Reconciliation In Europe Report. International Crisis Group, 2013.
About NRC. NATO-Russia Council Web Site, 2013.
Academics criticise spy agencies." Guardian (2013).
"Accrual Budgeting and Defence Funding: Theory and Simulations." Defence and Peace Economics 24, no. 3 (2013): 211-227.
"Afghan Lessons: Culture, Diplomacy and Counterinsurgency. Washington: Brookings Institution, 2013.
After Boston Bombing, American Ties with Russia Improve." New York Times (2013).
"Agreement with private companies protect US access to cables’ data for surveillance." Washington Post (2013).
"Air-Sea Battle: A Dangerous Way to Deal with China. The Diplomat, 2013.
Al Qaeda’s Recipe for Pressure-Cooker Bombs." The Daily Beast (2013).
"Ambitions of EU and East Partners for the Vilnius Summit In Press Releases Rapid., 2013.
America Is ‘Livid’ with the British and Could Launch Syria Strikes on its own In Business Insider., 2013.
The American Sequester and Us. European Union Institute for Security Studies, 2013.
Anarchy and Hegemony. Stratfor, 2013.
Ansar Jerusalem Announces Deaths of 3 Fighters, Including Commander. Threat Matrix, 2013.
The Applicability of International Law in Cyberspace-From If to How?. Panel Three at the Georgetown University Conference on the International Law on Cyber, 2013.
Страници
- « първа
- ‹ предишна
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- …
- следваща ›
- последна »