Biblio

Export 21376 results:
2015
OSCE Chairmanship Event on Effective Strategies to Cyber/ICT Security Threats. Belgrade, Serbia, 2015.
OSCE Guide on Non-military confidence-building Measures (CBMs)., 2015.
OSCE Mission to Serbia., 2015.
Itakura, Yoichiro. Oshu Iinkai Dokkinho Ikigai Tekiyou [The European Commission Implements the Extraterritorial Application in Competition Law]. FACTA Online, 2015.
Rahim, Tariq. An overview of helix antenna and its design., 2015.
OWASP Security Shepherd., 2015.
Rothkopf, David. "The Paradox of Power in the Network Age." Foreign Policy (2015): 98-100.
Souleimanov, Emil, and Megan Ouellette. The Participation of North Caucasian Jihadists in the Syrian Civil War and its Security Implications. Rubin Center, 2015.
Starr, Barbara, and Jamie Crawford. Pentagon Hunts for ISIS on the Secret Internet. CNN Politics, 2015.
Mak, Tim, and Nancy A. Youssef. "The Pentagon is Keeping Half of Gitmo Locked Up Against the White House’s Wishes." The Daily Beast (2015).
Wahid, AH. "Perbudakan dalam Pandangan Islam: Hadith and Sirah Nabawiyyah Textual and Contextual Studies." Nuansa VIII, no. 2 (2015): 141-154.
Alakpa, George Edafese U.. Perceptions of military personnel: Analysis of the Department of Defense's counter bioterrorism measures at the tactical level for the enhancement of civil security, leadership, management, and policy. Vol. Doctor of Science. New Jersey City University, 2015.
Bobić, Marinko. "Persistence of italian Mafia: Violent entrepreneurs in Developed States." In Development and the Politics of Human Rights. CRC Press, 2015.
Li, Na. Personal Learning with Social Media: Reputation, Privacy and Identity Perspectives In Faculty Of Engineering Sciences And Techniques, Institute Of Electrical And Electronic Engineering. Vol. Doctor In Science. Federal Institute Of Technology In Lausanne, 2015.
Shropshire, Jordan, Merrill Warkentin, and Shwadhin Sharma. "Personality, attitudes, and intentions: Predicting initial adoption of information security behavior." Computers and Security 49 (2015): 177-191.
Choucri, Nazli, Chrisma Jackson, Lyla Fischer, Brooke Gier, Vivian Peron, Ben Ze Yuan, Liu Yangyue, and Glenn Voelz. Perspectives!on!Cybersecurity:!! A!Collaborative!Study! In Research Paper. Massachusetts Institute of Technology, Political!Science!Department!, 2015.
Whaley, Floyd. "Philippine Rebels Give Up Dozens of Weapons in Step Toward Peace Deal." International New York Times (2015).
Harnisch, Sebastian, and Gordon Friedrichs. "The Pivot to Asia, a Pivot getting nowhere? A role study of U.S. leadership and contestation at home and abroad." In 2015 Annual convention of the International Studies Association. New Orleans, 2015.
Berzisa, Solvita, Ljupco Vangelski, Aljosa Zorc, Gatis Vitols, and Nicola Martinelli. "Platform for management of business and educational projects." Procedia Computer Science 77 (2015): 126-134.
PM Announces New Canadian Military Contribution in Ukraine., 2015.
Počelo sa radom Odjeljenje za informacionu bezbjednost (OIB)., 2015.
Petkov, Vesselin, and Todor Tagarev. Poland: Capabilities, Organisations, Policies, and Legislation in crisis management and disaster response In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2015.
Antczak-Barzan, Anna. "Poland’s National Potential and its International Position within the European Union – Research Remarks." Defense & Security Analysis 31, no. 3 (2015): 228-245.
Polish Ecumenical Council., 2015.
Polish Humanitarian Action., 2015.

Pages