Biblio

Export 21377 results:
2013
Urciuoli, Luca, Toni Männistö, Juha Hintsa, and Tamanna Khan. "Supply Chain Cyber Security – Potential Threats." Information & Security: An International Journal 29, no. 1 (2013): 51-68.
Gardner, Timothy S.. "Synthetic Biology: From Hype to Impact." Trends in Biotechnology 31, no. 3 (2013): 123-125.
Yan, Holly. Syria Allies: Why Russia, Iran and China are Standing by the Regime. CNN.com, 2013.
Fitton, Oliver, and Mark Lacy. "The Syrian Electronic Army Is Rewriting the Rules of War." The Conversation (2013).
Jones, Adam. "Syrian Electronic Army Turns on Assad Regime." Seczine: Security Magazine (2013).
Ioannidis, S., M. Stamatogiannakis, and Th. Petsas. SysSec Deliverable D7.3 In Advanced Report on Cyberattacks on Lightweight Devices., 2013.
Mortati, M.. Systemic Aspects of Innovation and Design: The Perspective of Collaborative Networks. Cham, Switzerland: Springer, 2013.
Schmitt, Michael N.. Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge: Cambridge University Press, 2013.
Schmitt, Michael N.. Tallinn Manual on the International Law Applicable to Cyber Warfare . New York: Cambridge University Press, 2013.
Weigel, David. "Tamerlan Tsarnaev, Dead Bombing Suspect: ‘I Don’t Have a Single American Friend’." Slate (2013).
Andersson, Hilary. Tamerlan Tsarnaev Had Right-Wing Extremist Literature. BBC News, 2013.
Kashevarova, Anastasiya, and Yuliya Tsoy. "Tamerlan Tsarnaev Was Recruited by a Georgian Fund." Izvestia (2013).
Masters, Jonathan. Targeted Killings In Council on Foreign Relations, May 23, 2013., 2013.
McDermott, Roger. "Tashkent Strengthens Security Ties with Moscow Ahead of NATO Drawdown." Eurasia Daily Monitor 10, no. 36 (2013).
Technically Recoverable Shale Oil and Shale Gas Resources: An Assessment of 137 Shale Formations in 41 Countries Outside the United States. U.S. Energy Information Administration (EIA), 2013.
Sbardella, Alex. Ten Tips for Mobile UX. Red Ant Blog, 2013.
Acharya, A.. Ten years after 9/11: Rethinking the jihadist threat., 2013.
Tensions Rise in Georgia’s Breakaway Regions. Radio Free Europe – Radio Liberty, 2013.
Terrorism and Financial Intelligence. US Department of the Treasury, 2013.
Freeman, Michael, and Moyara Ruehsen. "Terrorism Financing Methods: An Overview." Perspectives on Terrorism 4, no. 7 (2013): 5-26.
Forster, Peter K.. "Terrorist Innovation: Homegrown Terrorism and the Internet." In The Dangerous Landscape, 79-86., 2013.
Abrams, Elliott. Tested by Zion: The Bush Administration and the Israeli-Palestinian Conflict. Cambridge University Press, 2013.
Zimmerman, Katherine L.. "Testimony: AQAP’s Role in the al Qaeda Network: Statement before the House Committee on Homeland Security Subcommittee on Counterterrorism and Intelligence." In Understanding the Threat to the Homeland from AQAP. American Enterprise Institute for Public Policy Research (AEI), 2013.
Stavridis, James G.. Testimony before the 113th Congress, House and Senate Armed Services Committee Testimony., 2013.
Malhotra, Rahul, and Prince Jain. "Testing Techniques and its Challenges in a Cloud Computing Environment." The SIJ Transactions on Computer Science Engineering & its Applications (CSEA) 1, no. 3 (2013).

Pages