Biblio

Export 21377 results:
2013
Smirnov, Alexander, Alexey Kashevnik, Nikolay Shilov, and Nikolay Teslya. "Context-based access control model for smart space ." In 2013 5th International Conference on Cyber Conflict (CYCON 2013) . Tallinn, Estonia: IEEE , 2013.
Mabaso, Elias, and Siambabala B. Manyena. "Contingency planning in southern Africa: Events rather than processes?" Journal of Disaster Risk Studies 5, no. 1 (2013): article 95.
Merche, Jean-Dominique. Contre-terrorisme: le GIGN est en avance dans la guerre du temps. L’Opinion, 2013.
Denning, Tamara, Adam Lerner, Adam Shostack, and Tadayoshi Kohno. Control-Alt-Hack: The Design and Evaluation of a Card Game for Computer Security Awareness and Education. CCS'13, 2013.
Blease, Dennis, and Florian Qehaja. "The conundrum of local ownership in developing a security sector: the case of Kosovo." New Balkan Politics 14 (2013).
Convention on Cybercrime, Chart of Signatures and Ratifications. Council of Europe, 2013.
Osipian, Ararat L.. Corruption In Higher Education In Leadership and Policy Studies. Vol. Doctor Of Philosophy. Nashville, Tennessee: Vanderbilt University, 2013.
Seay, Edmond E.. Countdown to Chaos? Timelines and Implications of Procurement Decisions for NATO’s Dual-Capable Aircraft. Hamburg: British American Security Information Council (BASIC), 2013.
Foley, Frank. Countering Terrorism in Britain and France: Institutions, Norms and the Shadow of the Past. Kindle Edition. Cambridge: Cambridge University Press, 2013.
Bowley, Robin. Countering terrorism in the maritime domain: a contemporary evaluation of the international legal framework. University of Wollongong, 2013.
Bowley, Robin. Countering Terrorism In The Maritime Domain: A Contemporary Evaluation Of The International Legal Framework. University of Wollongong, 2013.
Banks, William C.. Counterinsurgency Law: New Directions in Asymmetric Warfare. Oxford University Press, 2013.
Hellenberg, Timo, and Pekka Visuri. Country Study: Estonia. ANVIL Project, 2013.
Hellenberg, Timo, and Pekka Visuri. Country Study: Lithuania. ANVIL Project, 2013.
Priest, Dana. "Covert Action in Colombia: US Intelligence, GPS Bomb Kits Help Latin American Nation Cripple Rebel Forces." Washington Post (2013).
Hartley, D., and L. Lacy. "Creating the foundations for modeling irregular warfare." In Advances in Design for Cross-Cultural Activities Part II. Taylor & Francis, 2013.
Li, Xingan, and Martti Juhola. "Crime and Its Social Context: Analysis Using the Self-Organizing Map." In European Intelligence and Security Informatics Conference. Uppsala, Sweden , 2013.
Ratchev, Valeri. Crisis management related research at the IT for Security Department., 2013.
Chen, Rong. "A Critical Analysis of the U.S. “Pivot” toward the Asia-Pacific: How Realistic is Neo-realism?" Connections: The Quarterly Journal 12, no. 3 (2013): 39-62.
Kerigan-Kyrou, Dinos. "Critical Energy Infrastructure: Operators, NATO, and Facing Future Challenges." Connections: The Quarterly Journal 12, no. 3 (2013): 109-117.
Army, British. Cultural Orientation Programme In Ghurka Training. British Ministry of Defense, 2013.
Barkun, Michael. A Culture of Conspiracy: Apocalyptic Visions in Contemporary America. Berkeley, CA: University of California Press, 2013.
Current risks and threats to the national security of the Republic of Bulgaria In Report by the Minister of the Interior to the Consultative Council for National Security., 2013.
Bronk, Christopher, and Eneken Tikk-Ringas. "The Cyber Attack on Saudi Aramco." Survival 55, no. 2 (2013): 81-96.
Boudreaux, Benjamin. "Cyber Diplomats." State Magazine (2013): 32.

Pages