Biblio
Export 8062 results:
Close the Blackwater Loophole." Huffington Post (2009).
"Closing the Loop. Towards Strategic Defence Management. The Hague: The Hague Centre for Strategic Studies, 2009.
Cloud computing in the spotlight." Infosecurity 6, no. 6 (2009).
"Cloud Computing with the Windows® Azure™ Platform. Indianapolis, IN: John Wiley, 2009.
Cloud9: A Software Testing Service." ACM SIGOPS Operating Systems Review 43:4 (2009).
"Cloud-based Performance Testing of Network Management Systems In IEEE 14th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD'09. Pisa, Italy, 2009.
Code of Practice for Life Cycle Costing, RTO-TR-SAS-069 . Paris: NATO Research and Technology Agency, 2009.
Commission of the European Communities, A Community approach on the prevention of natural and man-made disasters. Brussels, 2009.
Comprehensive National Cybersecurity Initiative. Washington, D.C.: The White House, 2009.
A Comprehensive Network Security Risk Model for Process Control Networks." Risk Analysis 29, no. 2 (2009): 223-248.
"Computer Assisted Exercises and Training. A Reference Guide . Hoboken, NJ: John Wiley, 2009.
Conflict and Security in Central Asia and the Caucasus. Santa Barbara, CA: ABC-Clio, 2009.
Content and Language Integrated Learning: Evidence from research in Europe. Bristol: Multilingual matters, 2009.
Continuation of the National Emergency with Respect to Iran In Presidential Documents., 2009.
Control of Infrastructure and Safety of Production Systems." Management Methods and Tools (2009).
"Cooperative Mechanisms in the Malacca Straits." In International Maritime Security Conference. Singapore: International Maritime Security Conference, 2009.
"The Corfu Process." In The Indivisibility of Security: Russia and Euro-Atlantic Security, 35 ff. Rome: NATO Defense College, 2009.
" Corruption Perceptions Index results for 2008. Transparency International, 2009.
Country Analysis Brief: China. U.S. Energy Information Administration, 2009.
Country Reports on Terrorism 2008. State Department, Office of the Coordinator for Counterterrorism, 2009.
Cyber Crime." In Cyberpower and National Security, 415. Washington, D.C.: National Defense University Press, 2009.
"Cyberdeterrence and Cyberwar . Santa Monica, CA: RAND, 2009.
Cyberdeterrence and Cyberwarfare. Santa Monica, CA: RAND, 2009.
Страници
- « първа
- ‹ предишна
- …
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- …
- следваща ›
- последна »