Biblio

Export 21409 results:
Filters: Filter is   [Clear All Filters]
2019
State e-Government Agency., 2019.
A statement of the Sliven Metropolia. New.sliven.net, 2019.
National Service of Statistics. Statistical Information., 2019.
Wu, Da-Chun, Chin-Yu Hsiang, and Ming-Yao Chen. "Steganography via midi files by adjusting velocities of musical note sequences with monotonically non-increasing or non-decreasing pitches." IEEE Access 7 (2019): 154056-154075.
Gruber, William H.. Strategic Information for Competitive Advantage., 2019.
Kerttunen, Mika, and Eneken Tikk. Strategically Normative. Norms and Principles in National Cybersecurity Strategies In EU Cyber Direct., 2019.
Cannon, Jennifer Elizabeth. Strategies for Improving Data Protection to Reduce Data Loss from Cyberattacks In Management. Vol. Doctor of Business Administration (D.B.A.) . Walden University, 2019.
Smith, Shirley Denise. Strategies to Reduce the Fiscal Impact of Cyberattacks In School Business Administration. Vol. Doctor of Business Administration (D.B.A.) . Walden University, 2019.
Smith, Paul Alan. "Strategy Development and Implementation in a Complex Multi-National IT Organisation." Information & Security: An International Journal 42 (2019): 13-32.
Zālīte, Indulis. Structure and Main Directions of Action of the State Security Committee of the Latvia Soviet Socialist Republic in 1980-1991. LPRA, 2019.
Štruktúra ŠtB [StB Structure]., 2019.
Sestrimski, Borislav. "Study on the Level of Cybersecurity and the Mechanisms for Citizens' Contribution to Preventive Policies." In DIGILIENCE 2019. Sofia, Bulgaria, 2019.
Breitenbauch, Henrik, and Niels Byrjalsen. "Subversion, Statecraft and Liberal Democracy." Survival Global Politics and Strategy 61, no. 4 (2019).
Vilander, Jaakko, Antti-Tuomas Pulkka, Ville Erkkilä, Erkki Saarikoski, and Teija Norri-Sederholm. "Suomalaisten käsityksiä sodan sekä kyber- ja informaatiosodankäynnin uhkasta." Tiede Ja Ase 1 (2019).
Supervision and control. The Constitution Protection Bureau, 2019.
Hardwick, Jialin, and Alistair R. Anderson. "Supplier-customer engagement for collaborative innovation using video conferencing: A study of SMEs." Industrial Marketing Management 80 (2019): 43-57.
Pandey, Shipra, Rajesh K. Singh, and Angappa Gunasekaran. "Supply chain risks in Industry 4.0 environment: review and analysis framework." In Production Planning & Control: The Management of Operations ., 2019.
Beuran, Razvan, Dat Tang, Zheyu Tan, Shinobu Hasegawa, Yasuo Tan, and Yoichi Shinoda. "Supporting cybersecurity education and training via LMS integration: CyLMS." Education and Information Technologies 24 (2019): 3619-3643.
Khraisat, Ansam, Iqbal Gondal, Peter Vamplew, and Joarder Kamruzzaman. "Survey of intrusion detection systems: techniques, datasets and challenges." Cybersecurity 2 (2019).
SysSec Red Book Web Page., 2019.
Zaslavskyi, Volodymyr, and Maya Pasichna. "System Approach Towards the Creation of Secure and Resilient Information Technologies in the Energy Sector." Information & Security: An International Journal 43, no. 3 (2019): 318-330.
Shchoholiev, Maksym, and Violeta Tretynyk. "The System of Operative Determination of the Level of Tension in Society Based on Data from Social Networks." Information & Security: An International Journal 43, no. 3 (2019): 375-382.
Bertolino, Antonia, Guglielmo De Angelis, Micael Gallego, Boni García, Francisco Gortázar, Francesca Lonetti, and Eda Marchetti. "A Systematic Review on Cloud Testing." Systematic Review on Cloud Testing 52, no. 5A (2019).
Molodetska, Kateryna, and Yuriy Tymonin. "System-dynamic models of destructive informational influence in social networking services." International Journal of 3D Printing 3, no. 2 (2019): 137-146.
T/8029th Bill proposal . Prime Minister’s Office, 2019.

Pages