Biblio

Export 21402 results:
2017
Terroranschlag erneut einziges Thema im Innenausschuss. Berliner Morgenpost online, 2017.
Terrorfall Amri: Ausschuss im neuen NRW-Landtag nahm Arbeit auf. Westdeutsche Zeitung online, 2017.
Terrorfall Amri – Sonderermittler entlastet die Behörden in NRW. Der Tagesspiegel online, 2017.
Opper, Timothy. Terrorism and Transnational Organized Crime: Iran’s Islamic Revolutionary Guard Corps (Irgc) - Dual Threat to Canada’s National Security In School of Criminology and Criminal Justice. Vol. Master of Arts (Criminal Justice) ., 2017.
Tichý, Lukáš, and Jan Eichler. "Terrorist Attacks on the Energy Sector: The Case of Al Qaeda and the Islamic State." Studies in Conflict & Terrorism (2017).
Zalubovin, Igor. The Terrorist’s Ghost: Chasing Akbar Dzhalilov Who Blew Up the Underground. Snob (in Russian), 2017.
Sotiriadis, Stelios, Andrus Lehmets, Euripides G. M. Petrakis, and Nik Bessis. Testing Cloud Services Using the TestCast Tool In Information Technology - New Generations, 14th International Conference on Information Technology., 2017.
Thales has welcomed 9 startups within its Cyber@Station F programme. Thales, 2017.
Counter Threat Unit Research Team. Threat Analysis report on WannaCry., 2017.
ENISA. Threat-Landscape-Report 2017. Heraklion: European Union Agency for Network and Information Security, 2017.
Bergmane, Una. The Three Little Oligarchs: Latvia’s Corruption Scandal. Foreign Policy Research Institute, 2017.
Macnair, Logan, and Richard Frank. "“To My Brothers in the West . . .”: A Thematic Analysis of Videos Produced by the Islamic State’s al-Hayat Media Center." Journal of Contemporary Criminal Justice 33, no. 3 (2017): 234-253.
Shalamanov, Velizar. "Towards Effective and Efficient IT Organizations with Enhanced Cyber Resilience." Information & Security: An International Journal 38 (2017): 5-10.
Stoianov, Nikolai, Maya Bozhilova, and Grigor Velev. Towards Security Requirements of the SPIDER Projec In Scientific Conference with International Participation on Cyber security in the Information Society. Shumen, Bulgaria, 2017.
Rajamäki, Jyri, and Rauno Pirinen. Towards the cyber security paradigm of eHealth: Resilience and design aspects In Proceedings of the 1st International Conference on Applied Mathematics and Computer Science. Vol. 1836. Melville: AIP Publishing, 2017.
W., Buchanan, Thuemmler C., Prajapati B., Spyra G., Smales A., Thuemmler C., and Bai C.. "Towards Trust and Governance in Integrated Health and Social Care Platforms." In Health 4.0: How Virtualization and Big Data are Revolutionizing Healthcare, 219-231. Switzerland: Springer, 2017.
Tchesnokov, Serguei. "Traffic Pattern Analysis Inside Out." ScienceSoft (2017).
Swami, Praveen. "Train Suspect Shot Dead Was Named Last Year by Member of IS-Inspired Cell, Police Lost Trail." The Indian Express (2017).
Kirichek, Ruslan, Van-Dai Pham, Aleksey Kolechkin, Mahmood Al-Bahri, and Alexander Paramonov. "Transfer of Multimedia Data via LoRa." In Lecture Notes in Computer Science, 708-720. Vol. 10531. Cham: Springer, 2017.
Cuong, Ngo Huy. "Transnational organized crime, criminal market and criminal liability of legal entities: Three major issues to consider when developing the Penal Code." Legal studies (2017).
Sanger, David E., and William J. Broad. "Trump Inherits a Secret Cyberwar Against North Korean Missiles." The New York Times (2017).
Tunis will Kontaktmann Amris anklagen. Der Spiegel online, 2017.
Turkey nightclub attack: IS says it carried out shooting. BBC News, 2017.
Gulmez, Didem Buhari. "Turkey's Cyprus Dilemma: Europeanization as a Gatekeeper." In Europeanization in a Global Context, 119-139. Springer, 2017.
"Turning Strengths into Vulnerabilities: The Art of Asymmetric Warfare as Applied by the Russian Military in its Hybrid Warfare Concept." In Russia and Hybrid Warfare – Going Beyond the Label, 52-60, 55., 2017.

Pages