Biblio

Export 21401 results:
2011
UK Cyber Security Strategy. UK Cabinet Office, 2011.
Cabinet Office. The UK Cyber Security Strategy Protecting and Promoting the UK in a Digital World., 2011.
The UK Cyber Security Strategy: Protecting and promoting the UK in a digital world., 2011.
The UK’s Foreign Policy Approach to Afghanistan and Pakistan In Foreign Affairs Select Committee Report. London: House of Commons, 2011.
UN Development Programme. HDR Office, 2011.
UN Security Council Resolution 1973 In S/RES/1973 (2011)., 2011.
UN Security Council Resolution 2014., 2011.
UN Strategic Results Framework on Women, Peace and Security 2011–2020. New York: United Nations, 2011.
Guber, A. K., Y. A. Pachepsky, A. M. Yakirevich, D. R. Shelton, A. M. Sadeghi, D. C. Goodrich, and C. L. Unkrich. "Uncertainty in modelling of faecal coliform overland transport associated with manure application in Maryland." Hydrological processes 25, no. 15 (2011).
Underground Economies: Intellectual Capital and Sensitive Corporate Data Now the Latest Cybercrime Currency. McAfee and SAIC, 2011.
Diallo, Saikou Y., Heber Herencia-Zapana, Jose J. Padilla, and Andreas Tolk. Understanding interoperability In EAIA '11 Proceedings of the 2011 Emerging M&S Applications in Industry and Academia Symposium., 2011.
United Nations Security Council Resolution 1973., 2011.
Kitchen, Nicholas. The United States After Unipolarity: Executive Summary In IDEAS reports. London: London School of Economics and Political Science, 2011.
Universalen simulator ot Avstralia., 2011.
Cavelty, Myriam Dunn. "Unraveling the Stuxnet Efect: Of Much Persistence and Little Change in the Cyber Threats Debate." Military and Strategic Affairs 3, no. 3 (2011): 11-19.
Souleimanov, Emil. "The Upsurge of Islamist Violence in the North Caucasus: Exploring the Case Studies of Dagestan and Kabardino-Balkaria." Connections: The Quarterly Journal 10, no. 3 (2011): 117-126.
Mindling, George, and Robert Bolton. U.S. Air Force Tactical Missiles 1949-1969: The Pioneers. Morrisville, North Carolina: Lulu.com Publishing, 2011.
Schmidt, Howard. U.S. and Russia: Expanding the “Reset” to Cyberspace In The White House Blog., 2011.
Kretchik, Walter E.. U.S. Army Doctrine: From the American Revolution to the War on Terror. Lawrence, KS: University Press of Kansas, 2011.
Mattis, James N.. U.S. Central Command Posture Statement., 2011.
U.S. Department of State, Office of the Coordinator for Counterterrorism, Country Reports on Terrorism 2010 . Washington, D.C.: State Department, 2011.
Menn, Joseph. "U.S. Power Plants Vulnerable to Cyberattack." Financial Times (2011).
U.S. Shifts Supply Routes To Central Asia. Radio Free Europe/Radio Liberty, 2011.
Norris, Robert S., and Hans M. Kristensen. "U.S. Tactical Nuclear Weapons in Europe, 2011." Bulletin of the Atomic Scientists 67 (2011): 64-73.
Tian, Wang. U.S. Uses ‘Hedging’ Strategy to Deal with China’s Rise. People’s Daily, 2011.

Pages