Biblio

Export 21377 results:
2013
Treffers, Stefan R.. "Increased Globalization of Crime." In Crime Classification Manual : A Standard System for Investigating and Classifying Violent Crimes, 431-470. John Wiley & Sons, 2013.
Atanassov, Krassimir, Evdokia Sotirova, and Veselina Bureva. "On Index Matrices Part 4: New Operations over Index Matrices." Advanced Studies in Contemporary Mathe¬matics (Kyungshang) 23, no. 3 (2013): 547-552.
Watson, Sarah J., and Christine C. Fair. "India’s Stalled Internal Security Reforms." India Review 12, no. 4 (2013): 280-299.
Mavhura, Emmanuel, Siambalala Benard Manyena, Andrew E. Collins, and Desmond Manatsa. "Indigenous knowledge, coping strategies and resilience of floods in Muzarabani, Zimbabwe." International Journal of Disaster Risk Reduction 5 (2013): 38-48.
Hristov, Stoyan. Inequality in Bulgaria – Dynamics, Comparative Analysis and Reasons. Sofia: Institute for Market Economics, 2013.
Jatkauskaitė, Justina. Influence of Eu Common Energy Policy on Lithuania’s Energy Security After the Treaty of Lisbon In Euro College. Vol. Master. Tartu: University Of Tartu, 2013.
Zharkov, Jaroslav M., Volodymyr M. Petryk, Mykola M. Prysjazhnjuk, Jevhen D. Skulysh, and Larysa F. Kompanceva. Informacijno-psyhologichne protyborstvo (evoljucija ta suchasnist): monografija. Kyiv: Vipol, 2013.
Ostapenko, Hryhoriy A., Lyudmyla V. Parynova, Volodymyr Y. Belonozhkyn, Yuriy L. Bataronov, and Kyryl V. Symonov. Informacyonnye ryski v socyalnyh setjah. Voronezh: Chair of NIB, 2013.
Hilmi, Mohd Faiz, Shahrier Pawanchik, Yanti Mustapha, and Hafizi Muhamad Ali. "Information Security Perspective of a Learning Management System: An Exploratory Study." International Journal of Knowledge Society Research 4, no. 2 (2013).
Rhodes-Ousley, M.. Information Security the Complete Reference. 2nd ed., 2013.
ISO/IEC. Information technology – Security techniques – Information security management systems – Requirement., 2013.
Saetta, S., L. Tiacci, and L. Cagnazzo. "The Innovative Model of the Virtual Development Office for Collaborative Networked Enterprises: The GPT Network Case Study." International Journal of Computer Integrated Manufacturing 26, no. (1-2) (2013): 41-54.
Pwanagba, Agabus. "Insecurity: Nigerian Army to Court Martial 17 Soldiers Who Erred in Peace Operations." DailyPost (2013).
Hopkins, Nick, and Julian Borger. "Inside GCHQ: how US pays Britain’s spy agency £100m for a very special relationship." Guardian (2013): 1-2.
"Inside the Files: when did we give our consent to a secret state?" Guardian (2013): 37.
Mladen, Bajagić. "Institucionalizacija Saradnje u Bezbednosti u Evropskoj Uniji." Bezbednost, Beograd 55, no. 3 (2013): 21-35.
Starov, Oleksii, and Sergiy Vilkomir. "Integrated TaaS platform for mobile development: Architecture solutions." In 8th International Workshop on Automation of Software Test (AST). San Francisco, CA, USA , 2013.
Ibrahim, Aisha Fofana. The Integration of a Gender Perspective in the Sierra Leone Police . Geneva: DCAF, 2013.
Polyakov, Leonid. "On Integrity of Intelligence in Countries of Eastern Europe." Information & Security: An International Journal 30, no. 1 (2013): 55-63.
Intelligence assessment. Wikipedia, 2013.
Kenney, Michael C.. "Intelligence Games: Comparing the Intelligence Capabilities of Law Enforcement Agencies and Drug Trafficking Enterprises." International Journal of Intelligence and CounterIntelligence (2013): 213.
Byman, Daniel. "The Intelligence War on Terrorism." Intelligence and National Security 29, no. 6 (2013): 847.
Murugan, Sethu, and Dr.K.Kuppusamy. "Intelligent Intrusion Detection Prevention Systems." Information & Security: An International Journal 26, no. 2 (2013): 109-119.
"Intelligent Oversight." Guardian (2013): 13.
Busuncian, Tatiana. "International Intelligence Cooperation against Terrorist Targets – Phase II." In The Dangerous Landscape, 133-151., 2013.

Pages