Biblio

Export 21404 results:
2015
Lakomy, Miron. Cyberprzestrzeń jako nowy wymiar rywalizacji i współpracy państw. Vol. 21. Katowice: Wydawnictwo Uniwersytetu Śląskiego, 2015.
Nolan, Andrew. Cybersecurity and Information Sharing: Legal Challenges and Solutions In CRS Report. Congressional Research Service, 2015.
Newmeyer, K.. Cybersecurity and the 2015 State of the Union Address. Cyber Experts Blog at National Cybersecurity Institute., 2015.
"Cybersecurity and the Internet of Things ." EY (2015).
Delibert, A. C., M.W. Laurent, and Schneider L.L.. "Cybersecurity: Could Investment Company Directors be Liable for a Breach? ." The Investment Lawyer 22, no. 2 (2015).
Cybersecurity Doctrine of the Republic of Poland. National Security Bureau (Biuro Bezpieczenstwa Narodowego), 2015.
Newmeyer, K.. Cybersecurity in the President’s National Security Strategy. Cyber Experts Blog at National Cybersecurity Institute., 2015.
Pot, ii, Oleksandr V., Oleksandr V. Korneyko, and Yrii I. Gorbenko. "Cybersecurity in Ukraine: Problems and Perspectives." Information & Security: An International Journal 32, no. 1 (2015): 71-94.
Choejey, Pema, Chun Che Fung, Kok Wai Wong, David Murray, and Hong Xie. Cybersecurity Practices for E - Government: An Assessment in Bhutan In The 10 th International Conference on e - Business (iNCEB2015)., 2015.
Choejey, Pema, Chun Che Fung, Kok Wai Wong, David Murray, and Hong Xie. "Cybersecurity Practices for E-Government: An Assessment in Bhutan." In The 10th International Conference on e-Business (iNCEB2015)., 2015.
Okuku, Angela, Karen Renaud, and Brandon Valeriano. "Cybersecurity Strategy’s Role in Raising Kenyan Awareness of Mobile Internet Threats." Information & Security: An International Journal 32, no. 2 (2015): 155-174.
Williams, Patricia A. H., and Andrew J. Woodward. "Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem." Medical Devices 8 (2015): 305-316.
Atalay, Ata, and Gurur Sanci. "Cyberterrorism and Turkey’s Counter-Cyberterrorism Efforts." Information & Security: An International Journal 32, no. 1 (2015): 42-64.
Geng, Hwaiyu. Data Centre Handbook . USA: John Wiley & Sons, 2015.
Data from a survey presented by the sociologist Boryana Dimitrova at a press conference In called by the member of the European Parliament Svetoslav Malinov., 2015.
Data from the Ministry of Finance and the bulletin of UniCreditBulbank., 2015.
Devroe, Elke, and Philine Terwel. "De Politiefunctie Geprivatiseerd? Private Beveiliging in België En Nederland." Cahier Politiestudies 3, no. 36 (2015): 11-31.
Smith, Hannah Lucinda. "Death Row Prisoner Tells of Escape from ISIS Jail." The Times (2015).
Deaths from Conflict in Northern Ireland by Year and Status In Conflict Archive on the Internet (CAIN). University of Ulster, 2015.
Dobbs, Richard, Jonathan Woetzel, Susan Lund, and Mina Mutafchieva. Debt and (not much) deleveraging. McKinsey Global Institute, 2015.
December 2015 Ukraine power grid cyberattack. Wikipedia, 2015.
Decree of the President of Ukraine of 6 May 2015 on the Decision of National Security and Defence Council "On the National Security Strategy of Ukraine" (in Ukrainian)., 2015.
Schmidhuber, Juergen. "Deep Learning in Neural Networks: An Overview." Neural Networks 61 (2015): 85-117.
Nguyen, Anh, Jason Yosinski, and Jeff Clune. Deep neural networks are easily fooled: High confidence predictions for unrecognizable images In IEEE Conference on Computer Vision and Pattern Recognition., 2015.
DEEP Ukraine 2015 Programme Review In unclassified internal document. Political Affairs and Security Policy (PASP), 2015.

Pages