Biblio

Export 8062 results:
2010
Strategic Concept—Active Engagement, Modern Defence. Lisbon: NATO, North Atlantic Council, 2010.
Stigak, A.А.. "The structure of payment systems and modeling their performance based on system analysis." Electronic modeling 6 (2010): 97-109.
"The Stuxnet Outbreak, A Worm in the Centrifuge – An Unusually Sophisticated Cyber-weapon is Mysterious but Important." Economist (2010).
Salter, Mark B.. "Surveillance." In The Routledge Handbook of New Security Studies. London: Routledge, 2010.
SySSec Project Web Page., 2010.
Durbin, Pat, and Terry Doerscher. Taming Change with Portfolio Management: Unify Your Organization, Sharpen Your Strategy and Create Measurable Value . Austin, TX: Greenleaf Book Group Press, 2010.
Yu, Lian, Wei-Tek Tsai, Liangjie Tang, Wei Zhao, Xiangji Chen, Linqing Liu, and Yan Zhao. Testing as a Service over Cloud In Fifth IEEE International Symposium on Service Oriented System Engineering (SOSE). Nanjing, China, 2010.
Time for a Human Approach. Zurich: ISN, 2010.
Rego, Francisco, Cristina Montiel, and Jorge Agudo. "Towards integrated fire management: The need for a European Framework Directive on Fire." In Conference on Protection of Forests, Spanish Presidency of the European Union. La Granja–Valsaín, 2010.
Meyer, Oliver. "Towards quality CLIL: successful planning and teaching strategies." Puls 10 (2010): 11-29.
Ekström, Thomas. The Transformation from Defence Procurement to Defence Acquisition -Opportunities for New Forms of Analytical Support In SAS-081 Symposium, Sofia., 2010.
Transparency International Corruption Perception Index 2010., 2010.
Hughes, Rex. "A Treaty for Cyberspace." International Affairs 86, no. 2 (2010): 533.
Mihalka, Michael D., and Mark R. Wilcox. "Unintended Strategic Consequences of Security Assistance in the South Caucasus." Joint Force Quarterly (2010): 24-28.
The United States’ National Security Strategy 2010., 2010.
"United States Nuclear Regulatory Commission, Cyber Security Programs For Nuclear Fa-cilities, Regulatory Guide ." (2010).
Uprising Worsens Kyrgyzstan Economic Woes. BBC News, 2010.
"Urgent Problems and the Logic of Military Reform." Russian Politics and Law 48, no. 3 (2010): 59.
Alexander, Keith. U.S. Cybersecurity Policy and the Role of U.S. CYBERCOM In CSIS Cybersecurity Policy Debate Series., 2010.
U.S. Department of Defense Quadrennial Defense Review. Washington, D.C.: U.S. Department of Defense, 2010.
Fairclough, Gordon. "U.S., Poland Amend Missile-Defense Plan." Wall Street Journal (2010).
Conley, Heather, and Jamie Kraut. "U.S. Strategic Interests in the Arctic." Center for Strategic & International Studies (2010).
Tagarev, Todor. "Utilisation of Surplus Equipment and Infrastructure." In Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices, 124-136. Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2010.
Dionysiou, Theodoras, Vasilios A. Siris, and George Stamatakis. "Utility-based channel assignment and topology control in wireless mesh networks." In 2010 IEEE International Symposium on A World of Wireless, Mobile and Multimedia Net¬works (WoWMoM). Montreal, 2010.
Haralampiev, K., and G. Naidenov. "Waves of the Change and Change of the Waves." Sociological Problems Special Issue (2010).

Страници