Biblio

Export 21362 results:
2015
Gohel, M.J., and Sajjan M. Gohel. The Legacy and Agenda of Hostage Taking. Asia Pacific Foundation, International Policy Assessment Group, 2015.
Kim, Y.H.. "Legal Strategy for the Sake of Safety in the Field of Leisure Sports." Chosun Law Journal 22, no. 2 (2015): 41-75.
Karber, Philip A.. Lessons Learned from the Russo-Ukrainian War. Vienna, VA: The Potomac Foundation, 2015.
Georgiev, Venelin. Levels of Cybersecurity Training and Education In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2015.
Angeli, Gabor, Melvin Premkumar, and Christopher D. Manning. Leveraging Linguistic Structure for Open Domain Information Extraction In 53rd Annual Meeting of the Association for Computational Linguistics and the 7th In-ternational Joint Conference on Natural Language Processing. Beijing, China, 2015.
List of official definitions as per different countries’ documents. Tallinn, Estonia: NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE), 2015.
Spassov, Philip, and Todor Tagarev. Lithuania: Capabilities, Organisations, Policies, and Legislation in crisis management and disaster response In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2015.
Lithuania to Ban Russian TV Channel for ‘Warmongering’. Deutsche Welle, 2015.
Lithuanian Ministry of Interior., 2015.
Lithuanian Public Procurement Portal., 2015.
Lithuanian Red Cross., 2015.
DiRenzo, Joseph, Dana A. Goward, and Fred S. Roberts. "The little-known challenge of maritime cyber security." In 6th International Conference on Information, Intelligence, Systems and Applications (IISA)., 2015.
Vego, Milan. "On Littoral Warfare." Naval War College Review 68, no. 2 (2015).
Herd, Graeme P.. "Living the ‘Chinese Dream’ in the ‘Russkiy Mir’: Central Asia between Sino-Russian Strategic Trilemmas?" In Russia, Eurasia and the New Geopolitics of Energy. London: Palgrave Macmillan, 2015.
Ljajić: U oktobru zakon o informacionoj bezbednosti (on Serbian language). Blic, 2015.
Skoczylis, Joshua J.. The Local Prevention of Terrorism: Strategy and Practice in the Fight Against Terrorism. Palgrave Macmillan, 2015.
Local Resources on Cybercrime In Cybercrime., 2015.
Steinke, Ralph R.. "A Look Back at NATO’s 1999 Kosovo Campaign: A Questionably "Legal" but Justifiable Exception?" Connections: The Quarterly Journal 14, no. 4 (2015): 43-55.
Tasevski, Predrag. "Macedonian Path Towards Cybersecurity." Information & Security: An International Journal 32, no. 2 (2015): 109-119.
Sarrayrih, Mohammad A., and B. Sriram. "Major challenges in developing a successful e-government: A review on the Sultanate of Oman." Journal of King Saud University - Computer and Information Sciences 27, no. 2 (2015): 230-235.
Souleimanov, Emil Aslan. "Making Jihad or Making Money? Understanding the Transformation of Dagestan’s Jamaats into Organised Crime Groups." Journal of Strategic Studiesm (2015): 1-25.
Ghazaryan, Sara. Making sense of EU’s conflict management strategy in South Caucasus In European College. Vol. Maste. Tartu: University of Tartu, 2015.
Sito-Sucic, Daria. Man who Fought in Syria Detained in Bosnia Over Police Killing. Al Arabiya, 2015.
Management of Information Security and Risk. Programme Specification. City University London, 2015.
Pederson, Joshua R., and Rachel M. McLaren. "Managing Information Following Hurtful Experiences: How Personal Network Members Negotiate Private Information." Journal of Social and Personal Relationships 33, no. 7 (2015): 961-983.

Pages