Biblio

Export 21401 results:
2010
Peltier, Thomas R.. Information Security Risk Analysis. 3rd ed. Boca Raton, FL: CRC Press, Taylor & Francis Group, 2010.
Savenko, Oleg, and Sergyi Lysenko. "Information Technology of Intelligent Trojan Detection in Computer Systems." Radioelectronic and Computer Systems 5 (2010): 120-126.
Initial National Communication on Climate Change of Montenegro to the United Nations Framework Convention on Climate Change. Podgorica: Ministry of Spatial Planning and Environment, 2010.
Frinking, Erik J., and J.G.M. Rademaker. "Inlichtingen en Veiligheidsdiensten." In Nationale Veiligheid en inlichtingen, 189-204. Alphen aan den Rijn: Kluwer, 2010.
Carr, Jeffrey. Inside Cyber Warfare. Sebastopol, CA: O’Reilly Media, 2010.
"Integrated Command and Control System Support." In NC3A Service Catalogue, 24., 2010.
Park, Sang-Gun, Tag-Gong Lee, NamKyu Lim, and Hyun-Sik Son. "Integrated Framework and Methodology for Capability Priority Decisions." Information & Security: An International Journal 25 (2010): 78-98.
Rajkovcevski, Rade. "Integration of Euro-Atlantic Norms and Values: Changes in the Military Culture of the Balkans." Connections: The Quarterly Journal 10, no. 1 (2010): 121-137.
Lucas, George. "Integrity Issues Related to Military Operations." In Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices, 149-162. Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2010.
Sahukar, Behram A.. "Intelligence and Defence Cooperation in India." In Intelligence Cooperation Practices in the 21st Century: Towards a Culture of Sharing, 31-41. Amsterdam: IOS Press, 2010.
Zhuang, M., C. Yongmei, P. Quan, L. Zhunga, and H. Jun. "An intelligent fusion method of sequential images based on improved DSmT for target recognition." In International Conference on Computational Aspects of Social Networks, CASoN'10. Taiyuan; China, 2010.
Pattath, Avin. Interactive visualization for mobile visual analytics In Engineering, Computer, Computer Science. Vol. Ph.D. Purdue University, 2010.
Internal Security Strategy for the European Union: Towards a European Security Model. European Union’s report , 2010.
Tikk, Eneken, Kadri Kaska, and Liis Vihul. International Cyber Incidents: Legal Considerations. Tallinn, Estonia: Cooperative Cyber Defence Center of Excellence, 2010.
"International Security Assistance Force." In Academic Dictionaries and Encyclopedias., 2010.
Herd, Graeme P., and Pàl Dunay. "International Security, Great Powers and World Order." In Great Powers and Strategic Stability in the 21st Century: Competing Visions of the World Order., 2010.
Schneckener, Ulrih. "Internationales Statebuilding: Dilemmata und Herausforderungen fur “Externe” Akteure." In Einsatz für den Frieden: Sicherheit und Entwicklung in Räumen begrenzter Staatlichkeit, 79-88. Walter de Gruyter GmbH & Co KG, 2010.
Rolf, Weber H.. "Internet of Things - New Security and Privacy challenges." Computer Law & Security 26, no. 1 (2010): 23-30.
Interview with G.A. Zyuganov for the newspaper Pravda on his trip to China., 2010.
Manning, Christopher, Prabhakar Raghavan, and Hinrich Schütze. "An Introduction to Information Retrieval." Natural Language Engineering 16, no. 1 (2010): 100-103.
Tagarev, Todor. Introduction to the Planning for Defence Capabilities In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2010.
Batara, Aditya. "The Involvement of Defence Personnel and Assets in Economic Activities." In Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices, 138-148. Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2010.
Seriot, Nicolas. iPhone Privacy. Black Hat DC, 2010.
Schwell, Alexandra. "The iron curtain revisited: the ‘Austrian way’ of policing the internal Schengen border." European Security 19, no. 2 (2010): 317-336.
"Israel’s siege mentality." The Economist (2010).

Pages