Biblio

Export 21404 results:
2013
Austrian Cyber Security Strategy., 2013.
Wilson, Matthew C., and James A. Piazza. "Autocracies and Terrorism: Conditioning Effects of Authoritarian Regime Type on Terrorist Attacks." American Journal of Political Science 57, no. 4 (2013): 941-55.
Ava 500 e noviat robot za videosatrudnichestvo na iRobot i Cisco TelePresence. Computerworld, 2013.
Aviation Security Research Roadmap In COPRA (FP7-SEC-2011-261651) EU research project., 2013.
Azerbaijan Never Ruled Out Military Settlement of Karabakh Conflict. News from Azerbaijan, 2013.
"Azerbaijan Sharply Increases Military Spending." Atlantic Council (2013).
Leigh, Christopher. "Back to the Future? Pre-Soviet History and Political Thought in the Putin Era." Post-Soviet Politics: Politics, Foreign Policy and Strategic Competition (2013).
Doherty, Carroll. Balancing Act: National Security and Civil Liberties in Post-9/11 Era. Pew Research Center Fact Tank, 2013.
Dubriske, Steven D.. "Ballistic Missile Defense in Poland: Did the Costs Outweigh the Benefits?" Connections: The Quarterly Journal 12, no. 2 (2013): 95-102.
Ito, Pete. "Baltic Military Cooperative Projects: A Record of Success." In Apprenticeship, Partnership, Membership: Twenty Years of Defence Development in the Baltic States, 242. Tallin: International Centre for Defence Studies, 2013.
Aytaç, Uzman Ahmet. "Başbakanlik Osmanli Arşivi’ndeki Bazi Fonlar ve El Dokumaciliği İle Alakali Belgelere Dair." TURAN: Stratejik Arastirmalar Merkezi Dergisi 5, no. 17 (2013): 1-10.
"Base Agreement Will Boost Russia-Tajikistan Relations." The Oxford Analytica Daily Brief (2013).
On the basic principles to ensure cybersecurity of Ukraine In Law of Ukraine., 2013.
Herschinger, Eva. "A Battlefield of Meanings: The Struggle for Identity in the UN Debates on a Definition of International Terrorism." Terrorism and Political Violence 25, no. 2 (2013): 183-184.
Pielmus, Crisitina. "Between Two Cultures: From the Military Culture to University Culture. Conclusions on the Organisation for Police Officers’ Initial Training." Revista Academiei Fortelor Terestre 4, no. 72 (2013): 374-382.
Lawson, Sean. "Beyond Cyber-Doom: Assessing the Limits of Hypothetical Scenarios in the Framing of Cyber-Threats." Journal of Information Technology & Politics 10, no. 1 (2013).
Rahbek-Clemmensen, Jon. Beyond 'the soldier and the state'-the theoretical framework of elite civil-military relations. London: London School of Economics and Political Science, 2013.
Big Data. MSIS Wiki, 2013.
Ishikawa, Tomoya. "Big Data Business to Kojin Jyoho Hogo [Big Data Business and Protection of Personal Data]." Asahi Judiciary (2013).
Takahashi, Haruo. Big Data Hosei no Kokusai Hikaku [Comparison of Legal Framework of Big Data]. KDDI Research Institute, 2013.
Block, Cobus. Bilateral Trade Between Xinjiang and Kazakhstan: Challenges or Opportunities?. China Policy Institute Blog, 2013.
Sharma, Ajay, and Deo Brat Ojha. "Biometric Template Security Using Code Base Cryptosystem." Information & Security: An International Journal 26, no. 2 (2013): 47-57.
BMZ. BMZ Strategy Paper – An Overview of the Role of ICT in German Development Cooperation In Schlüsseltechnologien für eine nachhaltige Entwicklung. Informations- und Kommunikationstechnologien (IKT), 2013.
Azinovic, Vlado. "Bosnia and Herzegovina and Terrorism 1996-2011: Defining the Threat, Devising Counterterrorism Strategy." In The Dangerous Landscape, 191-209., 2013.
Perez, Evan, Devlin Barrett, and Andrew Grossman. "Boston Bomb Clues Surface." The Wall Street Journal (2013).

Pages